{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:01:24Z","timestamp":1758272484918},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1007\/s11390-015-1513-6","type":"journal-article","created":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T08:11:28Z","timestamp":1421741488000},"page":"200-213","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Review Authorship Attribution in a Similarity Space"],"prefix":"10.1007","volume":"30","author":[{"given":"Tie-Yun","family":"Qian","sequence":"first","affiliation":[]},{"given":"Bing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Si","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,21]]},"reference":[{"issue":"3","key":"1513_CR1","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1093\/llc\/fqm020","volume":"22","author":"J Grieve","year":"2007","unstructured":"Grieve J. Quantitative authorship attribution: An evaluation of techniques. Literary and Linguistic Computing, 2007, 22(3): 251-270.","journal-title":"Literary and Linguistic Computing"},{"issue":"3","key":"1513_CR2","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1093\/llc\/11.3.121","volume":"11","author":"H Baayen","year":"1996","unstructured":"Baayen H, van Halteren H, Tweedie F. Outside the cave of shadows: Using syntactic annotation to enhance authorship attribution. Literary and Linguistic Computing, 1996, 11(3): 121-132.","journal-title":"Literary and Linguistic Computing"},{"issue":"6","key":"1513_CR3","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1002\/asi.20553","volume":"58","author":"S Argamon","year":"2007","unstructured":"Argamon S, Whitelaw C, Chase P, Hota S R, Garg N, Levitan S. Stylistic text classification using functional lexical features: Research articles. Journal of the Association for Information Science and Technology, 2007, 58(6): 802-822.","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"1513_CR4","unstructured":"Hedegaard S, Simonsen J G. Lost in translation: Authorship attribution using frame semantics. In Proc. the 49th ACL, June 2011, pp. 65-70."},{"issue":"4","key":"1513_CR5","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1093\/llc\/fqm023","volume":"22","author":"G Hirst","year":"2007","unstructured":"Hirst G, Feiguina O. Bigrams of syntactic labels for authorship discrimination of short texts. Literary and Linguistic Computing, 2007, 22(4): 405-417.","journal-title":"Literary and Linguistic Computing"},{"issue":"2","key":"1513_CR6","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1093\/llc\/10.2.111","volume":"10","author":"DI Holmes","year":"1995","unstructured":"Holmes D I, Forsyth R S. The federalist revisited: New directions in authorship attribution. Literary and Linguistic Computing, 1995, 10(2): 111-127.","journal-title":"Literary and Linguistic Computing"},{"key":"1513_CR7","doi-asserted-by":"crossref","unstructured":"Koppel M, Schler J. Authorship verification as a one-class classification problem. In Proc. the 21st ICML, July 2004.","DOI":"10.1145\/1015330.1015448"},{"issue":"1\/2","key":"1513_CR8","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1023\/A:1023824908771","volume":"19","author":"J Diederich","year":"2000","unstructured":"Diederich J, Kindermann J, Leopold E, Paass G. Authorship attribution with support vector machines. Applied Intelligence, 2000, 19(1\/2): 109-123.","journal-title":"Applied Intelligence"},{"key":"1513_CR9","unstructured":"Escalante H J, Solorio T, Montes-y-G\u00f3mez M. Local histograms of character n-grams for authorship attribution. In Proc. the 49th ACL, June 2011, pp. 288-298."},{"issue":"4","key":"1513_CR10","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1145\/1121949.1121951","volume":"49","author":"J Li","year":"2006","unstructured":"Li J, Zheng R, Chen H. From fingerprint to writeprint. Communications of the ACM, 2006, 49(4): 76-82.","journal-title":"Communications of the ACM"},{"issue":"3","key":"1513_CR11","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1162\/089120100750105920","volume":"26","author":"E Stamatatos","year":"2000","unstructured":"Stamatatos E, Fakotakis N, Kokkinakis G. Automatic text categorization in terms of genre and author. Computational Linguistics, 2000, 26(3): 471-495.","journal-title":"Computational Linguistics"},{"key":"1513_CR12","doi-asserted-by":"crossref","unstructured":"Graham N, Hirst G, Marthi B. Segmenting documents by stylistic character. Natural Language Engineering, 2005, 11(4): 397-415.","DOI":"10.1017\/S1351324905003694"},{"key":"1513_CR13","unstructured":"Seroussi Y, Bohnert F, Zukerman I. Authorship attribution with author-aware topic models. In Proc. the 50th ACL, July 2012, pp. 264-269."},{"issue":"4","key":"1513_CR14","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1145\/604264.604272","volume":"30","author":"O Vel de","year":"2001","unstructured":"de Vel O, Anderson A, Corney M, Mohay G. Mining e-mail content for author identification forensics. ACM SIGMOD Record, 2001, 30(4): 55-64.","journal-title":"ACM SIGMOD Record"},{"issue":"1","key":"1513_CR15","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s10579-009-9111-2","volume":"45","author":"M Koppel","year":"2011","unstructured":"Koppel M, Schler J, Argamon S. Authorship attribution in the wild. Language Resources and Evaluation, 2011, 45(1): 83-94.","journal-title":"Language Resources and Evaluation"},{"key":"1513_CR16","doi-asserted-by":"crossref","unstructured":"Solorio T, Pillay S, Raghavan S, y G\u00f3mez M M. Modality specific meta features for authorship attribution in Web forum posts. In Proc. the 5th IJCNLP, Nov. 2011, pp. 156-164.","DOI":"10.1109\/ecrime.2010.5706693"},{"key":"1513_CR17","doi-asserted-by":"crossref","unstructured":"Kim S, Kim H, Weninger T, Han J, Kim H D. Authorship classification: A discriminative syntactic tree mining approach. In Proc. the 34th SIGIR, July 2011, pp. 455-464.","DOI":"10.1145\/2009916.2009979"},{"key":"1513_CR18","doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B. Opinion spam and analysis. In Proc. WSDM, Feb. 2008, pp. 219-230.","DOI":"10.1145\/1341531.1341560"},{"key":"1513_CR19","first-page":"2233","volume":"10","author":"C Rudin","year":"2009","unstructured":"Rudin C. The p-norm push: A simple convex ranking algorithm that concentrates at the top of the list. The Journal of Machine Learning Research, 2009, 10: 2233-2271.","journal-title":"The Journal of Machine Learning Research"},{"key":"1513_CR20","unstructured":"Yih W, Meek C. Improving similarity measures for short segments of text. In Proc. AAAI, Nov. 2007, pp. 1489-1494."},{"key":"1513_CR21","doi-asserted-by":"crossref","unstructured":"Agichtein E, Brill E, Dumais S T, Ragno R. Learning user interaction models for predicting web search result preferences. In Proc. the 29th SIGIR, Aug. 2006, pp. 3-10.","DOI":"10.1145\/1148170.1148175"},{"key":"1513_CR22","unstructured":"Mosteller F, Wallace D L. Inference and Disputed Authorship: The Federalist. Addison-Wesley, 1964."},{"key":"1513_CR23","unstructured":"Argamon S, Levitan S. Measuring the usefulness of function words for authorship attribution. In Proc. the 2005 ACH\/ALLC Conference, June 2005."},{"key":"1513_CR24","doi-asserted-by":"crossref","unstructured":"Gamon M. Linguistic correlates of style: Authorship classification with deep linguistic analysis features. In Proc. the 20th COLING, Aug. 2004, Article No. 611.","DOI":"10.3115\/1220355.1220443"},{"key":"1513_CR25","doi-asserted-by":"crossref","unstructured":"Peng F, Schuurmans D, Wang S, Keselj V. Language independent authorship attribution using character level language models. In Proc. EACL, April 2003, pp. 267-274.","DOI":"10.3115\/1067807.1067843"},{"issue":"2","key":"1513_CR26","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1093\/llc\/7.2.91","volume":"7","author":"JF Burrows","year":"1992","unstructured":"Burrows J F. Not unless you ask nicely: The interpretative nexus between analysis and information. Literary and Linguistic Computing, 1992, 7(2): 91-109.","journal-title":"Literary and Linguistic Computing"},{"key":"1513_CR27","doi-asserted-by":"crossref","unstructured":"Sanderson C, Guenter S. Short text authorship attribution via sequence kernels, Markov chains and author unmasking: An investigation. In Proc. EMNLP, July 2006, pp. 482-491.","DOI":"10.3115\/1610075.1610142"},{"key":"1513_CR28","unstructured":"Madigan D, Genkin A, Lewis D, Argamon S, Fradkin D, Ye L. Author identification on the large scale. In Proc. CSNA, June 2005."},{"key":"1513_CR29","doi-asserted-by":"crossref","unstructured":"Cao Y, Xu J, Liu T, Li H, Huang Y, Hon H. Adapting ranking SVM to document retrieval. In Proc. the 29th SIGIR, Oct. 2006, pp. 186-193.","DOI":"10.1145\/1148170.1148205"},{"key":"1513_CR30","doi-asserted-by":"crossref","unstructured":"Stamatatos E. A survey of modern authorship attribution methods. Journal of the Association for Information Science and Technology, Aug. 2009, 60(3): 538-556.","DOI":"10.1002\/asi.21001"},{"issue":"4","key":"1513_CR31","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1093\/llc\/16.4.421","volume":"16","author":"DL Hoover","year":"2001","unstructured":"Hoover D L. Statistical stylistics and authorship attribution: An empirical investigation. Literary and Linguistic Computing, 2001, 16(4): 421-444.","journal-title":"Literary and Linguistic Computing"},{"issue":"3","key":"1513_CR32","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1002\/asi.20316","volume":"57","author":"R Zheng","year":"2006","unstructured":"Zheng R, Li J, Chen H, Huang Z. A framework for authorship identification of online messages: Writing style features and classification techniques. Journal of the Association for Information Science and Technology, 2006, 57(3): 378-393.","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"1513_CR33","doi-asserted-by":"crossref","unstructured":"Uzuner \u00d6, Katz B. A comparative study of language models for book and author recognition. In Proc. the 2nd IJCNLP, Oct. 2005, pp. 969-980.","DOI":"10.1007\/11562214_84"},{"key":"1513_CR34","doi-asserted-by":"crossref","unstructured":"Zhao Y, Zobel J. Effective and scalable authorship attribution using function words. In Proc. the 2nd Asia Information Retrieval Symposium, Oct. 2005, pp. 174-189.","DOI":"10.1007\/11562382_14"},{"key":"1513_CR35","doi-asserted-by":"crossref","unstructured":"Luyckx K, Daelemans W. Authorship attribution and verification with many authors and limited data. In Proc. the 22nd COLING, Aug. 2008, pp. 513-520.","DOI":"10.3115\/1599081.1599146"},{"key":"1513_CR36","unstructured":"Vapnik V N. Statistical Learning Theory. Wiley-Interscience, 1998."},{"key":"1513_CR37","unstructured":"Graepely T, Herbrichz R, Bollmann-Sdorraz P, Obermayery K. Classification on pairwise proximity data. In Proc. NIPS, Jan. 1999, pp. 438-444."},{"key":"1513_CR38","first-page":"747","volume":"10","author":"Y Chen","year":"2009","unstructured":"Chen Y, Garcia E K, Gupta M R, Rahimi A, Cazzanti L. Similarity-based classification: Concepts and algorithms. The Journal of Machine Learning Research, 2009, 10: 747-776.","journal-title":"The Journal of Machine Learning Research"},{"issue":"8","key":"1513_CR39","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1016\/S0167-8655(02)00024-7","volume":"23","author":"E Pezkalska","year":"2002","unstructured":"Pezkalska E, Duin R P W. Dissimilarity representations allow for building good classifiers. Pattern Recognition Letters, 2002, 23(8): 943-956.","journal-title":"Pattern Recognition Letters"},{"key":"1513_CR40","doi-asserted-by":"crossref","unstructured":"Liao L, Noble W S. Combining pairwise sequence similarity and support vector machines for remote protein homology detection. In Proc. the 6th RECOMB, April 2002, pp. 225-232.","DOI":"10.1145\/565196.565225"},{"key":"1513_CR41","doi-asserted-by":"crossref","unstructured":"Wang L, Yang C, Feng J. On learning with dissimilarity functions. In Proc. the 24th ICML, June 2007, pp. 991-998.","DOI":"10.1145\/1273496.1273621"},{"issue":"1\/2","key":"1513_CR42","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10994-008-5059-5","volume":"72","author":"MF Balcan","year":"2008","unstructured":"Balcan M F, Blum A, Srebro N. A theory of learning with similarity functions. Machine Learning, 2008, 72(1\/2): 89-112.","journal-title":"Machine Learning"},{"key":"1513_CR43","unstructured":"Kar P, Jain P. Similarity-based learning via data driven embeddings. In Proc. the 25th NIPS, Dec. 2011."},{"key":"1513_CR44","unstructured":"Yule G U. The Statistical Study of Literary Vocabulary. Cambridge University Press, 1944."},{"key":"1513_CR45","doi-asserted-by":"crossref","unstructured":"Metzler D, Bernstein Y, Croft W B, Moffat A, Zobel J. Similarity measures for tracking information flow. In Proc. the 14th CIKM, Oct. 2005, pp. 517-524.","DOI":"10.1145\/1099554.1099695"},{"key":"1513_CR46","doi-asserted-by":"crossref","unstructured":"Joachims T. Training linear SVMs in linear time. In Proc. the 12th KDD, Aug. 2006, pp. 217-226.","DOI":"10.1145\/1150402.1150429"},{"key":"1513_CR47","doi-asserted-by":"crossref","unstructured":"Klein D, Manning C D. Accurate unlexicalized parsing. In Proc. the 41st ACL, July 2003, pp. 423-430.","DOI":"10.3115\/1075096.1075150"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-015-1513-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-015-1513-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-015-1513-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T02:14:33Z","timestamp":1651025673000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-015-1513-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["1513"],"URL":"https:\/\/doi.org\/10.1007\/s11390-015-1513-6","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1]]}}}