{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:09:23Z","timestamp":1775912963295,"version":"3.50.1"},"reference-count":200,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Brazilian Coordination for the Improvement of Higher Education and Personnel \u2014 CAPES (DeepEyes project)"},{"name":"S\u00e3o Paulo Research Foundation \u2013 FAPESP (through the D\u00e9j\u00e0Vu Project)","award":["15\/19222-9"],"award-info":[{"award-number":["15\/19222-9"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1109\/tifs.2016.2603960","type":"journal-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T18:06:59Z","timestamp":1472494019000},"page":"5-33","source":"Crossref","is-referenced-by-count":159,"title":["Authorship Attribution for Social Media Forensics"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4236-8212","authenticated-orcid":false,"given":"Anderson","family":"Rocha","sequence":"first","affiliation":[]},{"given":"Walter J.","family":"Scheirer","sequence":"additional","affiliation":[]},{"given":"Christopher W.","family":"Forstall","sequence":"additional","affiliation":[]},{"given":"Thiago","family":"Cavalcante","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Theophilo","sequence":"additional","affiliation":[]},{"given":"Bingyu","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Ariadne R. B.","family":"Carvalho","sequence":"additional","affiliation":[]},{"given":"Efstathios","family":"Stamatatos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.3115\/1603899.1603922"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90055-A"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025786724466"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2007.05.012"},{"key":"ref173","year":"2014","journal-title":"Guess Language Guess the Natural Language of a Text"},{"key":"ref176","first-page":"421","article-title":"On the robustness of authorship attribution based on character n-gram features","volume":"21","author":"stamatatos","year":"2013","journal-title":"J Law Policy"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21001"},{"key":"ref178","first-page":"877","article-title":"Overview of the author identification task at PAN 2014","author":"stamatatos","year":"2014","journal-title":"Proc Conf CLEF"},{"key":"ref177","first-page":"1","article-title":"Overview of the author identification task at PAN 2015","author":"stamatatos","year":"2015","journal-title":"Proc Conf Labs Eval Forum (CLEF)"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.015"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22327-3_16"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1558\/sll.2001.8.1.1"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.17918\/etd-6327","article-title":"Stylometric fingerprints and privacy behavior in textual data","author":"caliskan-islam","year":"2015"},{"key":"ref32","first-page":"32","article-title":"Source code authorship attribution using n-grams","author":"burrows","year":"2007","journal-title":"Proc Austral Document Comput Symp"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/7.2.91"},{"key":"ref30","first-page":"167","article-title":"Computers and the study of literature","volume":"1","author":"burrows","year":"1992","journal-title":"Computers and Written Texts"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.01.019"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/e13040902"},{"key":"ref35","article-title":"When coding style survives compilation: De-anonymizing programmers from executable binaries","author":"caliskan-islam","year":"2015","journal-title":"CoRR"},{"key":"ref34","first-page":"255","article-title":"De-anonymizing programmers via code stylometry","author":"caliskan-islam","year":"2015","journal-title":"24th USENIX Security Symp"},{"key":"ref181","first-page":"1","article-title":"Classify, but verify: Breaking the closed-world assumption in stylometric authorship attribution","author":"stolerman","year":"2014","journal-title":"Proc Annu IFIP WG Int Conf Digit Forensics"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1023\/A:1002681919510"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367513"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqn022"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-0171-6_7"},{"key":"ref182","first-page":"167","article-title":"Efficient graph-based semi-supervised learning of structured tagging models","author":"subramanya","year":"2010","journal-title":"Proc Conf Empirical Methods Natural Lang Process"},{"key":"ref189","first-page":"1","article-title":"Fast kernels for string and tree matching","author":"vishwanathan","year":"2003","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.3115\/1218955.1218981"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1007\/BF00054024"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/13.2.77"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/2.2.61"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CITS.2013.6705711"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1162\/089120100750105920"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/BF02176636"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/14.4.445"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2307\/2983444"},{"key":"ref21","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref24","article-title":"Care and feeding of topic models: Problems, diagnostics, and improvements","author":"boyd-graber","year":"2014","journal-title":"Handbook of Mixed Membership Models and Their Applications"},{"key":"ref23","article-title":"Authorship attribution of short messages using multimodal features","author":"boutwell","year":"2011"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2382448.2382450"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"ref50","first-page":"1","article-title":"Stylometry with R: A suite of tools","author":"eder","year":"2013","journal-title":"Proc Digital Humanities"},{"key":"ref51","author":"eder","year":"2015","journal-title":"Stylo Functions for a Variety of Stylometric Analyses"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"ref153","author":"rashid","year":"2013","journal-title":"Simple Ways to Make Anonymous Phone Calls Secure Your Data"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2274735"},{"key":"ref155","first-page":"45","article-title":"Software framework for topic modelling with large corpora","author":"?eh??ek","year":"2010","journal-title":"New Challenges for NLP Frameworks Workshop LREC"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1023\/B:INRT.0000011209.19643.e2"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-2057"},{"key":"ref151","first-page":"1","article-title":"Kernel methods and string kernels for authorship analysis","author":"popescu","year":"2012","journal-title":"Proc CLEF Eval Labs"},{"key":"ref146","first-page":"1","article-title":"Improved part-of-speech tagging for online conversational text with word clusters","author":"owoputi","year":"2013","journal-title":"Proc NAACL"},{"key":"ref147","first-page":"1","article-title":"Random forest with increased generalization: A universal background approach for authorship verification","author":"pacheco","year":"2015","journal-title":"Proc CLEF Eval Labs"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.4114\/ia.v11i36.892"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.3115\/1067807.1067843"},{"key":"ref59","first-page":"1","article-title":"Identifying authorship by byte-level n-grams: The source code author profile (SCAP) method","volume":"6","author":"frantzeskou","year":"2007","journal-title":"Int l J Digital Evidence"},{"key":"ref58","first-page":"470","article-title":"Source code authorship analysis for supporting the cybercrime investigation process","author":"frantzeskou","year":"2006","journal-title":"Handbook of Research on Computational Forensics Digital Crime and Investigation Methods and Solutions"},{"key":"ref57","first-page":"7","article-title":"Features from frequency: Authorship and stylistic analysis using repetitive sound","author":"forstall","year":"2009","journal-title":"Proc Chicago Colloq Digit Humanities Comput Sci"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqr029"},{"key":"ref55","first-page":"3133","article-title":"Do we need hundreds of classifiers to solve real world classification problems?","volume":"15","author":"fern\u00e1ndez-delgado","year":"2014","journal-title":"J Mach Learn Res"},{"key":"ref54","first-page":"1871","article-title":"LIBLINEAR: A library for large linear classification","volume":"9","author":"fan","year":"2008","journal-title":"J Mach Learn Res"},{"key":"ref53","first-page":"288","article-title":"Local histograms of character N-grams for authorship attribution","author":"escalante","year":"2011","journal-title":"Ann Meeting Assoc Computational Linguistics Human Lang Techn"},{"key":"ref52","first-page":"85","article-title":"A Statistical method for determining authorship","volume":"40","author":"elleg\u00e5rd","year":"1964","journal-title":"Junius Lett"},{"key":"ref40","first-page":"1","article-title":"Who&#x2019;s at the keyboard? authorship attribution in digital evidence investigations","volume":"4","author":"chaski","year":"2005","journal-title":"Int l J Digital Evidence"},{"key":"ref167","first-page":"264","article-title":"Authorship attribution with author-aware topic models","author":"seroussi","year":"2012","journal-title":"Proc 32nd Ann Meeting Assoc for Computational Linguistics"},{"key":"ref166","first-page":"1880","article-title":"Authorship attribution of micro-messages","author":"schwartz","year":"2013","journal-title":"Proc Conf Empirical Methods Natural Lang Process"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.256"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2321392"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqq029"},{"key":"ref161","first-page":"1","article-title":"The Federalist Papers revisited: A collaborative attribution scheme","volume":"50","author":"savoy","year":"2013","journal-title":"Amer Soc Inf Sci Technol"},{"key":"ref160","first-page":"1228","article-title":"Cross-topic authorship attribution: Will out-of-topic data help?","author":"sapkota","year":"2014","journal-title":"Proc Int Conf Comput Linguistics Tech Papers"},{"key":"ref4","first-page":"448","article-title":"Using big data analytics for authorship authentication of arabic tweets","author":"albadarneh","year":"2015","journal-title":"Proc IEEE\/ACM Int Conf Utility Cloud Comput"},{"key":"ref3","first-page":"212","article-title":"Doppelg&#x00E4;nger finder: Taking stylometry to the underground","author":"afroz","year":"2014","journal-title":"Proc IEEE Secur Privacy"},{"key":"ref6","first-page":"1","article-title":"Multi-topic e-mail authorship attribution forensics","author":"anderson","year":"2001","journal-title":"Proc ACM Conf Computer Commun Secur"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665966"},{"key":"ref8","first-page":"1","article-title":"Style-based text categorization: What newspaper am I reading?","author":"argamon-engelson","year":"1998","journal-title":"Proc AAAI Workshop Learning for Text Categorization"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/N15-1010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23126"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqt066"},{"key":"ref157","author":"salton","year":"1986","journal-title":"Introduction to Modern Information Retrieval"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20553"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.3115\/1610075.1610142"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604272"},{"key":"ref45","first-page":"441","article-title":"On admissible linguistic evidence","volume":"21","author":"coulthard","year":"2012","journal-title":"J Law Policy"},{"key":"ref48","first-page":"21","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"Proc 13th Conf USENIX Secur Symp"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1023\/A:1023824908771"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/18.4.423"},{"key":"ref41","author":"chen","year":"2015","journal-title":"The New York Times Magazine"},{"key":"ref44","first-page":"91","article-title":"Open set source camera attribution and device linking","volume":"39","author":"de","year":"2014","journal-title":"Pattern Recognit Lett"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-3675-0"},{"key":"ref73","first-page":"65","article-title":"Lost in translation: Authorship attribution using frame semantics","volume":"2","author":"hedegaard","year":"2011","journal-title":"Ann Meeting Assoc Computational Linguistics Human Lang Techn"},{"key":"ref72","first-page":"79","article-title":"Authorship attribution: A principal component and linear discriminant analysis of the consistent programmer hypothesis","volume":"15","author":"hayes","year":"2008","journal-title":"Int J Comput Appl"},{"key":"ref71","author":"hastie","year":"2009","journal-title":"The Elements of Statistical Learning Data Mining Inference and Prediction"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1093\/biostatistics\/kxj035"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1023\/A:1017549100097"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/1964858.1964870"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqm023"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/10.2.111"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/14.3.311"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/17.2.157"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134445"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2472579"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2014.10.018"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/948542.948551"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3115\/1220355.1220443"},{"key":"ref65","first-page":"42","article-title":"Part-of-speech tagging for Twitter: Annotation, features, and experiments","volume":"2","author":"gimpel","year":"2011","journal-title":"Ann Meeting Assoc Computational Linguistics Human Lang Techn"},{"key":"ref66","first-page":"467","article-title":"TXT4N6: Method, consistency, and distinctiveness in the analysis of SMS text messages","volume":"21","author":"grant","year":"2012","journal-title":"J Law Policy"},{"key":"ref67","first-page":"1","article-title":"Comparing frequency-and style-based features for Twitter author identification","author":"green","year":"2013","journal-title":"Proc FLAIRS Conf"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqm020"},{"key":"ref69","year":"2013","journal-title":"In Search of OPSEC Magic Sauce Hacker OPSEC Blog"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1007\/11880592_8"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20316"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-002-0070-3"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10590-1_53"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20161-5_34"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1007\/11562382_14"},{"key":"ref196","first-page":"59","article-title":"Searching with style: Authorship attribution in classic literature","volume":"62","author":"zhao","year":"2007","journal-title":"Proc Australian Computer Science Conf"},{"key":"ref95","author":"kelly","year":"2014","journal-title":"Pyenchant A spellchecking Library for Python"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.3115\/1273073.1273131"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/15.2.187"},{"key":"ref93","author":"jurafsky","year":"2008","journal-title":"Speech and Language Processing"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15552-9_40"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24212-0_9"},{"key":"ref192","first-page":"2344","article-title":"Power mean SVM for large scale visual classification","author":"wu","year":"2012","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit"},{"key":"ref91","first-page":"1","article-title":"Overview of the author identification task at PAN 2013","author":"juola","year":"2013","journal-title":"Proc CLEF LABs Workshops Notebook Papers"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqi024"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-0908"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqt063"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.525"},{"key":"ref97","first-page":"255","article-title":"N-gram-based author profiles for authorship attribution","author":"ke\u0161elj","year":"2003","journal-title":"Proc Conf Pacific Assoc Comput Linguistics"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/19.4.453"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/19.4.477"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390208"},{"key":"ref83","first-page":"1","article-title":"topicmodels: An R package for fitting topic models","volume":"40","author":"hornik","year":"2011","journal-title":"J Statist Softw"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/18.4.341"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1561\/1500000005"},{"key":"ref85","first-page":"1","article-title":"Recognition of compromised accounts on Twitter","author":"igawa","year":"2015","journal-title":"Proc Annu Conf Brazilian Symp Inf Syst Inf Syst"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10578-9_26"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqq001"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqn040"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674434929"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/16.3.299"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/860435.860456"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/BF01830395"},{"key":"ref126","author":"manning","year":"1999","journal-title":"Foundations of Statistical Natural Language Processing"},{"key":"ref125","first-page":"139","article-title":"One-class SVMs for document classification","volume":"2","author":"manevitz","year":"2002","journal-title":"J Mach Learn Res"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/11889342_20"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/8.4.203"},{"key":"ref128","first-page":"453","article-title":"Curves of Pauline and pseudo-Pauline style I","volume":"30","author":"mascol","year":"1888","journal-title":"Unitarian Review"},{"key":"ref130","author":"mccallum","year":"2002","journal-title":"Mallet A machine learning for language toolkit"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1126\/science.ns-9.214S.237"},{"key":"ref134","first-page":"81","article-title":"What Shakespeare wrote in Henry VIII (part I)","volume":"2","author":"merriam","year":"1979","journal-title":"Bard"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_16"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/10.3.171"},{"key":"ref136","first-page":"1","article-title":"The authorship of Sir Thomas More","volume":"10","author":"merriam","year":"1982","journal-title":"ALLC Bull Assoc Library Linguistic Comput"},{"key":"ref135","first-page":"11","article-title":"What Shakespeare wrote in Henry VIII (part II)","volume":"2","author":"merriam","year":"1980","journal-title":"Bard"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/9.1.1"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/11.1.19"},{"key":"ref139","first-page":"17","article-title":"Authorship attribution in Greek tweets using authors multilevel n-gram profiles","author":"mikros","year":"2013","journal-title":"Proc AAAI Spring Symp Series"},{"key":"ref140","author":"morton","year":"1978","journal-title":"Literary Detection How to Prove Authorship and Fraud in Literature and Documents"},{"key":"ref141","author":"mosteller","year":"1964","journal-title":"Inference and Disputed Authorship The Federalist"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.46"},{"key":"ref143","first-page":"1","article-title":"TweetMotif: Exploratory search and topic summarization for Twitter","author":"o\u2019connor","year":"2010","journal-title":"Proc ICWSM"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1344411.1344413"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2014.7004491"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2005.81"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2013.02.025"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-009-9111-2"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20961"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015448"},{"key":"ref106","first-page":"72","article-title":"Exploiting stylistic idiosyncrasies for authorship attribution","volume":"69","author":"koppel","year":"2003","journal-title":"Proc Workshop Comput Approaches Style Anal Synth"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1995.537938"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(94)90029-9"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/9.2.119"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1994.400086"},{"key":"ref111","first-page":"1261","article-title":"Measuring differentiability: Unmasking pseudonymous authors","volume":"8","author":"koppel","year":"2007","journal-title":"J Mach Learn Res"},{"key":"ref112","first-page":"624","article-title":"Determining an author&#x2019;s native language by mining a text for errors","author":"koppel","year":"2005","journal-title":"Proc ACM SIGKDD Int Conf Knowl Discovery Data Mining"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148304"},{"key":"ref10","article-title":"Computational analysis of authorship and identity for immigration","author":"juola","year":"2016"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767799"},{"key":"ref12","first-page":"29","article-title":"An experiment in authorship attribution","author":"baayen","year":"2002","journal-title":"Proc 6th Journ&#x00E9;es Int d&#x2019;Analyse Statist Donn&#x00E9;es Textuelles"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/11.3.121"},{"key":"ref14","first-page":"1","article-title":"Author identification using multiheaded recurrent neural networks","author":"bagnall","year":"2015"},{"key":"ref15","first-page":"1","article-title":"An author verification approach based on differential features","author":"bartoli","year":"2015","journal-title":"Proc CLEF Eval Labs"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.88.048702"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/1121949.1121951"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1561\/9781601982957","author":"bengio","year":"2009","journal-title":"Learning Deep Architectures for AI"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/9.3.235"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03689-2_3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/09332480.2003.10554843"},{"key":"ref119","first-page":"640","article-title":"Generating templates of entity summaries with an entity-aspect model and pattern mining","author":"li","year":"2010","journal-title":"Proc 32nd Ann Meeting Assoc for Computational Linguistics"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010478226705"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22954"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2010.17"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2012.11"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/BF01829876"},{"key":"ref121","author":"luyckx","year":"2010","journal-title":"Scalability Issues in Authorship Attribution"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.3115\/1599081.1599146"},{"key":"ref123","first-page":"1","article-title":"Authorship verification: An approach based on random forest","author":"maitra","year":"2015","journal-title":"Proc CLEF Eval Labs"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7726079\/07555393.pdf?arnumber=7555393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T07:47:04Z","timestamp":1657180024000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7555393\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":200,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2016.2603960","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1]]}}}