{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T07:42:14Z","timestamp":1777707734550,"version":"3.51.4"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:00:00Z","timestamp":1768348800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:00:00Z","timestamp":1768348800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026,1,14]]},"DOI":"10.1109\/icoin68469.2026.11480532","type":"proceedings-article","created":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T19:45:18Z","timestamp":1777405518000},"page":"581-586","source":"Crossref","is-referenced-by-count":0,"title":["Identifying Fakes in Social Media Text Messages Using Stylometry"],"prefix":"10.1109","author":[{"given":"Cristian G.","family":"Butzke","sequence":"first","affiliation":[{"name":"BCC\/ IFC,Rio do Sul,Brazil"}]},{"given":"Marcelo L.","family":"Brocardo","sequence":"additional","affiliation":[{"name":"ESAG\/ UDESC,Florian&#x00F3;polis,Brazil"}]},{"given":"Wesley R.","family":"Bezerra","sequence":"additional","affiliation":[{"name":"BCC\/ IFC,Rio do Sul,Brazil"}]},{"given":"Carlos B.","family":"Westphall","sequence":"additional","affiliation":[{"name":"PPGCCI UFSC,Florian&#x00F3;polis,Brazil"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3657054.3657141"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3633203"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623209"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3630106.3658911"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v28i7.13226"},{"key":"ref6","first-page":"16","article-title":"Identifying aigenerated art with deep learning","author":"Bianco","year":"2023","journal-title":"CREAI@AI*IA"},{"key":"ref7","volume-title":"Continuous authentication using stylometry","author":"Brocardo","year":"2015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106770"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3700146"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/engproc2024062006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s21175967"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10361-2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11680-4_14"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-181934"},{"key":"ref15","volume-title":"Evaluating adversarial stylometry using textfooler","author":"DATASET"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v19i1.35920"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3675669.3675682"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1162\/qss_a_00337"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1177\/0306312718772086"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/78\/1\/012057"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5195\/jmla.2017.88"},{"issue":"1","key":"ref22","first-page":"22","article-title":"Machine learning-based authentication of banknotes: a comprehensive analysis","volume":"4","author":"Ghasem Abadi","year":"2024","journal-title":"Big data and computing visions"},{"key":"ref23","volume-title":"Practical natural language processing: a comprehensive guide to building real-world NLP systems","author":"Vajjala","year":"2020"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1111\/itor.13522"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.69996\/jcai.2025007"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-3972-7"},{"key":"ref27","volume-title":"Speech & language processing","author":"Jurafsky","year":"2000"},{"key":"ref28","author":"Manual","year":"2013","journal-title":"An introduction to statistical learning with applications in r"},{"key":"ref29","volume-title":"Introduction to machine learning","author":"Alpaydin","year":"2020"},{"key":"ref30","volume-title":"Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow: Concepts, tools, and techniques to build intelligent systems","author":"G\u00e9ron","year":"2022"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.001"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT48121.2019.8981504"}],"event":{"name":"2026 40th International Conference on Information Networking (ICOIN)","location":"Hanoi, Vietnam","start":{"date-parts":[[2026,1,14]]},"end":{"date-parts":[[2026,1,16]]}},"container-title":["2026 40th International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11480424\/11480459\/11480532.pdf?arnumber=11480532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:50:45Z","timestamp":1777456245000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11480532\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,14]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icoin68469.2026.11480532","relation":{},"subject":[],"published":{"date-parts":[[2026,1,14]]}}}