{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:32:02Z","timestamp":1770222722092,"version":"3.49.0"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008628","name":"Ministry of Electronics and Information Technology, Government of India","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008628","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1109\/tcss.2021.3067736","type":"journal-article","created":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T19:40:43Z","timestamp":1617306043000},"page":"1038-1047","source":"Crossref","is-referenced-by-count":8,"title":["Authorship Attribution of Microtext Using Capsule Networks"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0204-4835","authenticated-orcid":false,"given":"Chanchal","family":"Suman","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, IIT Patna, Patna, India"}]},{"given":"Ayush","family":"Raj","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, International Institute of Information Technology at Bhubaneswar, Bhubaneswar, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5494-9391","authenticated-orcid":false,"given":"Sriparna","family":"Saha","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, IIT Patna, Patna, India"}]},{"given":"Pushpak","family":"Bhattacharyya","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, IIT Patna, Patna, India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC42975.2020.9283214"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.26615\/978-954-452-056-4_062"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2018.00049"},{"key":"ref4","first-page":"20","article-title":"Author identification on the large scale","volume-title":"Proc. Meeting Classification Soc. North Amer.","author":"Madigan"},{"key":"ref5","first-page":"584","article-title":"Leveraging discourse information effectively for authorship attribution","volume-title":"Proc. 8th Int. Joint Conf. Natural Lang. Process.","volume":"1","author":"Ferracane"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-2106"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.10.033"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1350"},{"key":"ref9","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","volume-title":"arXiv:1810.04805","author":"Devlin","year":"2018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00012"},{"key":"ref11","first-page":"1880","article-title":"Authorship attribution of micro-messages","volume-title":"Proc. Conf. Empirical Methods Natural Lang. Process.","author":"Schwartz"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21001"},{"key":"ref13","article-title":"Character-level and multi-channel convolutional neural networks for large-scale authorship attribution","volume-title":"arXiv:1609.06686","author":"Ruder","year":"2016"},{"key":"ref14","volume-title":"Author Attribution With CNN\u2019s","author":"Rhodes","year":"2015"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012722"},{"key":"ref16","article-title":"Siamese networks for large-scale author identification","volume-title":"arXiv:1912.10616","author":"Saedi","year":"2019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2603960"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3897\/jucs.2020.009"},{"key":"ref19","first-page":"343","article-title":"Topic or style? Exploring the most useful features for authorship attribution","volume-title":"Proc. 27th Int. Conf. Comput. Linguistics","author":"Sari"},{"key":"ref20","first-page":"17","article-title":"Overview of the author identification task at PAN 2015","volume-title":"Proc. CLEF","author":"Stamatatos"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1294"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49161-1_22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63004-5_20"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/URTC.2016.8361150"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60290-1_17"},{"key":"ref26","first-page":"1","article-title":"BertAA: Bert fine-tuning for authorship attribution","volume-title":"Proc. ICON","author":"Fabien"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.020"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-53360-1_8"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60290-1_20"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22954"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-2043"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.10.065"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IROS45743.2020.9341703"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP40778.2020.9190694"},{"key":"ref35","article-title":"Overview of the 7th author profiling task at PAN 2019: Bots and gender profiling in Twitter","volume-title":"Proc. Conf. Labs Eval. Forum","volume":"2380","author":"Pardo"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1108\/00220410410560573"},{"key":"ref37","first-page":"1228","article-title":"Cross-topic authorship attribution: Will out-of-topic data help?","volume-title":"Proc. 25th Int. Conf. Comput. Linguistics, Tech. Papers (COLING)","author":"Sapkota"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37256-8_38"},{"key":"ref39","first-page":"1","article-title":"Overview of the 8th author profiling task at pan 2020: Profiling fake news spreaders on Twitter","volume-title":"Proc. CLEF","author":"Rangel"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/9845710\/09393500.pdf?arnumber=9393500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:19:59Z","timestamp":1704845999000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9393500\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":39,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2021.3067736","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"value":"2329-924X","type":"electronic"},{"value":"2373-7476","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8]]}}}