{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T18:34:29Z","timestamp":1768588469409,"version":"3.49.0"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-0424422"],"award-info":[{"award-number":["CCF-0424422"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Air Force Office of Scientific Research within the Multidisciplinary University Research Initiative","award":["FA9550-09-1-0539"],"award-info":[{"award-number":["FA9550-09-1-0539"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/tifs.2014.2368355","type":"journal-article","created":{"date-parts":[[2014,11,6]],"date-time":"2014-11-06T19:53:47Z","timestamp":1415303627000},"page":"200-212","source":"Crossref","is-referenced-by-count":20,"title":["What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications"],"prefix":"10.1109","volume":"10","author":[{"given":"Mathias","family":"Payer","sequence":"first","affiliation":[]},{"given":"Ling","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Neil Zhenqiang","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Borgolte","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Frank","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"401","article-title":"An empirical study of lazy multilabel classification algorithm","author":"spyromitros","year":"2008","journal-title":"Proc Helenic Conf Artif Intell"},{"key":"ref32","first-page":"22","article-title":"Discriminative methods for multi-labeled classification","author":"godbole","year":"2004","journal-title":"Proc PAKDD"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277813"},{"key":"ref30","first-page":"487","article-title":"The author-topic model for authors and documents","author":"rosen-zvi","year":"2004","journal-title":"Proc 20th UAI"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TMAG.2002.802794"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.12.019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604272"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000015881.36452.6e"},{"key":"ref13","first-page":"1","article-title":"Feature engineering and classifier ensemble for KDD cup 2010","author":"yu","year":"2010","journal-title":"Proc KDD Cup"},{"key":"ref14","author":"faridani","year":"2014","journal-title":"An NLP Library for Matlab"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/980972.981001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/BF00941892"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1002\/asi.20961","article-title":"Computational methods in authorship attribution","volume":"60","author":"jones","year":"2009","journal-title":"J Amer Soc Inf Sci Technol"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-009-9111-2"},{"key":"ref19","first-page":"361","article-title":"RCV1: A new benchmark collection for text categorization research","volume":"5","author":"lewis","year":"2004","journal-title":"J Mach Learn Res"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3115\/1073336.1073340"},{"key":"ref4","first-page":"993","article-title":"Latent Dirichlet allocation","volume":"3","author":"blei","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.46"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242591"},{"key":"ref6","first-page":"60","article-title":"Practical attacks against authorship recognition techniques","author":"brennan","year":"2009","journal-title":"Proc IAAI"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9124-7"},{"key":"ref5","article-title":"Author identification from citations","author":"bradley","year":"2008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013123110266"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2004.04.004"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.34"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1344411.1344413"},{"key":"ref20","first-page":"5","article-title":"Maintaining an online bibliographical database: The problem of data quality","author":"ley","year":"2006","journal-title":"Proc EGC"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.03.004"},{"key":"ref21","first-page":"1","article-title":"Author identification on the large scale","author":"madigan","year":"2005","journal-title":"Proc Joint Meeting Inter Classification Soc North Amer"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1126\/science.ns-9.214S.237","article-title":"The characteristic curves of composition","volume":"ns 9","author":"mendenhall","year":"1887","journal-title":"Science"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_16"},{"key":"ref26","first-page":"6","article-title":"Herbert west: Deanonymizer","author":"nanavati","year":"2011","journal-title":"Proc 6th HotSec"},{"key":"ref25","author":"mosteller","year":"1964","journal-title":"Inference and Disputed Authorship The Federalist"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6973056\/06949149.pdf?arnumber=6949149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:00:31Z","timestamp":1642003231000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6949149\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":35,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2368355","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1]]}}}