{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T04:48:35Z","timestamp":1772599715434,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T00:00:00Z","timestamp":1670025600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T00:00:00Z","timestamp":1670025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s10115-022-01798-y","type":"journal-article","created":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T08:03:32Z","timestamp":1670054612000},"page":"1317-1336","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Improved score aggregation for authorship verification"],"prefix":"10.1007","volume":"65","author":[{"given":"Mahmoud","family":"Khonji","sequence":"first","affiliation":[]},{"given":"Youssef","family":"Iraqi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2432-9105","authenticated-orcid":false,"given":"Loubna","family":"Mekouar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,3]]},"reference":[{"key":"1798_CR1","doi-asserted-by":"crossref","unstructured":"Afroz S, Brennan M, Greenstadt R (2012) Detecting hoaxes, frauds, and deception in writing style online, In: \u2018Proceedings of the 2012 IEEE symposium on security and privacy\u2019, SP \u201912, IEEE Computer Society, Washington, DC, USA, pp\u00a0461\u2013475","DOI":"10.1109\/SP.2012.34"},{"key":"1798_CR2","doi-asserted-by":"crossref","unstructured":"Boenninghoff B, Hessler S, Kolossa D, Nickel RM (2019) Explainable authorship verification in social media via attention-based similarity learning, In: \u2018The IEEE International conference on big data\u2019, pp\u00a036\u201345","DOI":"10.1109\/BigData47090.2019.9005650"},{"key":"1798_CR3","unstructured":"Boenninghoff BT, Rupp J, Nickel RM, Kolossa D (2020) Deep bayes factor scoring for authorship verification, In: \u2018Working notes of CLEF 2020\u2014conference and labs of the evaluation forum\u2019, Vol 2696"},{"issue":"6","key":"1798_CR4","doi-asserted-by":"publisher","first-page":"6075","DOI":"10.3233\/JIFS-181934","volume":"36","author":"E Castillo","year":"2019","unstructured":"Castillo E, Cervantes O, Vilari\u00f1o D (2019) Authorship verification using a graph knowledge discovery approach. J Intell Fuzzy Syst 36(6):6075\u20136087","journal-title":"J Intell Fuzzy Syst"},{"key":"1798_CR5","doi-asserted-by":"crossref","unstructured":"Daelemans W (2013) Explanation in Computational Stylometry, In: \u2018Proceedings of the 14th International conference on computational linguistics and intelligent text processing\u2019, Vol 2 of CICLing\u201913, Springer-Verlag, Berlin, Heidelberg, pp\u00a0451\u2013462","DOI":"10.1007\/978-3-642-37256-8_37"},{"key":"1798_CR6","doi-asserted-by":"crossref","unstructured":"Halvani O, Graner L, Regev R (2020) Taveer: an interpretable topic-agnostic authorship verification method, In: \u2018The 15th international conference on availability, reliability and security\u2019, pp\u00a041:1\u201341:10","DOI":"10.1145\/3407023.3409194"},{"key":"1798_CR7","doi-asserted-by":"publisher","first-page":"S33","DOI":"10.1016\/j.diin.2016.01.006","volume":"16","author":"O Halvani","year":"2016","unstructured":"Halvani O, Winter C, Pflug A (2016) Authorship verification for different languages, genres and topics. Digit Investig 16:S33\u2013S43","journal-title":"Digit Investig"},{"key":"1798_CR8","unstructured":"Joula P, Stamatatos E (2013) Overview of the author identification task at PAN 2013, In: \u2018Conference and Labs of the Evaluation Forum\u2019"},{"key":"1798_CR9","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.eswa.2016.06.029","volume":"63","author":"M Kestemont","year":"2016","unstructured":"Kestemont M, Stover J, Koppel M, Karsdorp F, Daelemans W (2016) Authenticating the writings of Julius Caesar. Expert Syst Appl 63:86\u201396","journal-title":"Expert Syst Appl"},{"key":"1798_CR10","unstructured":"Khonji M, Iraqi Y (2014) A Slightly-modified GI-based Author-verifier with Lots of Features (ASGALF)\u2013Notebook for PAN at CLEF 2014. In: Cappellato L, Ferro N, Halvey M, Kraaij W (eds) CLEF 2014 Evaluation Labs and Workshop\u2014Working Notes Papers, 15\u201318 September, Sheffield, UK. CEUR-WS.org"},{"key":"1798_CR11","doi-asserted-by":"publisher","first-page":"149531","DOI":"10.1109\/ACCESS.2020.3016731","volume":"8","author":"M Khonji","year":"2020","unstructured":"Khonji M, Iraqi Y (2020) Evaluating author attribution on Emirati tweets. IEEE Access 8:149531\u2013149543","journal-title":"IEEE Access"},{"key":"1798_CR12","unstructured":"Koppel M, Seidman S (2013) Automatically identifying pseudepigraphic texts, In: \u2018EMNLP\u2019, ACL, pp\u00a01449\u20131454"},{"key":"1798_CR13","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1002\/asi.22954","volume":"65","author":"M Koppel","year":"2014","unstructured":"Koppel M, Winter Y (2014) Determining if two documents are written by the same author. J Assoc Inf Sci Technol 65:178\u2013187","journal-title":"J Assoc Inf Sci Technol"},{"key":"1798_CR14","doi-asserted-by":"crossref","unstructured":"Narayanan A, Paskov H, Gong NZ, Bethencourt J, Stefanov E, Shin ECR, Song D (2012) On the feasibility of internet-scale author identification, In: \u2018Proceedings of the 2012 IEEE symposium on security and privacy\u2019, SP \u201912, IEEE Computer Society, Washington, DC, USA, pp\u00a0300\u2013314","DOI":"10.1109\/SP.2012.46"},{"key":"1798_CR15","unstructured":"Noreen EW (1989) Computer-intensive methods for testing hypotheses?: An Introduction. Wiley-Interscience"},{"key":"1798_CR16","doi-asserted-by":"crossref","unstructured":"Ouyang L, Zhang Y, Liu H, Chen Y, Wang Y (2020) Gated pos-level language model for authorship verification, In: \u2018Proceedings of the twenty-ninth international joint conference on artificial intelligence\u2019, pp\u00a04025\u20134031","DOI":"10.24963\/ijcai.2020\/557"},{"key":"1798_CR17","doi-asserted-by":"crossref","unstructured":"Pokhriyal N, Tayal K, Nwogu I, Govindaraju V (2017) Cognitive-biometric recognition from language usage: a feasibility study. IEEE Trans Inf Forensics Secur 12(1):134\u2013143","DOI":"10.1109\/TIFS.2016.2604213"},{"key":"1798_CR18","doi-asserted-by":"crossref","unstructured":"Potha N, Stamatatos E (2017) An improved impostors method for authorship verification, In: \u2018CLEF\u2019, pp\u00a0138\u2013144","DOI":"10.1007\/978-3-319-65813-1_14"},{"key":"1798_CR19","doi-asserted-by":"crossref","unstructured":"Potha N, Stamatatos E (2019a) Improved algorithms for extrinsic author verification, Knowl Inf Syst","DOI":"10.1007\/s10115-019-01408-4"},{"issue":"10","key":"1798_CR20","doi-asserted-by":"publisher","first-page":"1074","DOI":"10.1002\/asi.24183","volume":"70","author":"N Potha","year":"2019","unstructured":"Potha N, Stamatatos E (2019) Improving author verification based on topic modeling. J Assoc Inf Sci Technol 70(10):1074\u20131088","journal-title":"J Assoc Inf Sci Technol"},{"key":"1798_CR21","unstructured":"Potthast M, Hagen M, Stein B (2016) Author obfuscation: attacking the state of the art in authorship verification, In: Working notes papers of the CLEF 2016 evaluation labs\u2019, CEUR workshop proceedings, CLEF and CEUR-WS.org. http:\/\/ceur-ws.org\/Vol-1609\/"},{"key":"1798_CR22","unstructured":"Rao JR, Rohatgi P (2000) Can pseudonymity really guarantee privacy?, In: \u2018Proceedings of the 9th USENIX Security Symposium\u2019, USENIX, USENIX, pp\u00a085\u201396"},{"key":"1798_CR23","unstructured":"Seidman S (2013) Authorship verification using the impostors method\u2013notebook for pan at clef, (2013). In: Forner P, Navigli R, Tufis D (eds) \u2018CLEF 2013 Evaluation Labs and Workshop\u2014Working Notes Papers, 23\u201326 September. Spain\u2019, Valencia"},{"key":"1798_CR24","unstructured":"Stamatatos E, Daelemans W, Verhoeven B, Stein B, Potthast M, Juola P, S\u00e1nchez-P\u00e9rez MA, Barr\u00f3n-Cede\u00f1o A (2014) Overview of the author identification task at pan 2014, In: \u2018CLEF 2014 Evaluation Labs and Workshop\u2014Working Notes Papers\u2019. Sheffield, UK"},{"key":"1798_CR25","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1002\/asi.23460","volume":"67","author":"J Stover","year":"2015","unstructured":"Stover J, Winter Y, Koppel M, Kestemont M (2015) Computational authorship verification method attributes a new work to a major 2nd century African author. J Assoc Inf Sci Technol 67:239\u2013242","journal-title":"J Assoc Inf Sci Technol"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-022-01798-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-022-01798-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-022-01798-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T07:14:51Z","timestamp":1676618091000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-022-01798-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,3]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["1798"],"URL":"https:\/\/doi.org\/10.1007\/s10115-022-01798-y","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,3]]},"assertion":[{"value":"8 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}