{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T17:31:30Z","timestamp":1778175090945,"version":"3.51.4"},"reference-count":187,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2017,11,22]],"date-time":"2017-11-22T00:00:00Z","timestamp":1511308800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2018,11,30]]},"abstract":"<jats:p>The analysis of authorial style, termed stylometry, assumes that style is quantifiably measurable for evaluation of distinctive qualities. Stylometry research has yielded several methods and tools over the past 200 years to handle a variety of challenging cases. This survey reviews several articles within five prominent subtasks: authorship attribution, authorship verification, authorship profiling, stylochronometry, and adversarial stylometry. Discussions on datasets, features, experimental techniques, and recent approaches are provided. Further, a current research challenge lies in the inability of authorship analysis techniques to scale to a large number of authors with few text samples. Here, we perform an extensive performance analysis on a corpus of 1,000 authors to investigate authorship attribution, verification, and clustering using 14 algorithms from the literature. Finally, several remaining research challenges are discussed, along with descriptions of various open-source and commercial software that may be useful for stylometry subtasks.<\/jats:p>","DOI":"10.1145\/3132039","type":"journal-article","created":{"date-parts":[[2017,11,22]],"date-time":"2017-11-22T16:25:08Z","timestamp":1511367908000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":147,"title":["Surveying Stylometry Techniques and Applications"],"prefix":"10.1145","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6807-6277","authenticated-orcid":false,"given":"Tempestt","family":"Neal","sequence":"first","affiliation":[{"name":"University of Florida"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9668-4181","authenticated-orcid":false,"given":"Kalaivani","family":"Sundararajan","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Aneez","family":"Fatima","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Yiming","family":"Yan","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Yingfei","family":"Xiang","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Damon","family":"Woodard","sequence":"additional","affiliation":[{"name":"University of Florida"}]}],"member":"320","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the 2015 IEEE\/ACIS 14th International Conference on Computer and Information Science (ICIS\u201915)","author":"Nirmala Novino","unstructured":"Novino Nirmala , Kyung-Ah Sohn , and T. S. Chung . 2015. A graph model-based author attribution technique for single-class e-mail classification . In Proceedings of the 2015 IEEE\/ACIS 14th International Conference on Computer and Information Science (ICIS\u201915) . 191--196. Novino Nirmala, Kyung-Ah Sohn, and T. S. Chung. 2015. A graph model-based author attribution technique for single-class e-mail classification. In Proceedings of the 2015 IEEE\/ACIS 14th International Conference on Computer and Information Science (ICIS\u201915). 191--196."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1344411.1344413"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.21"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the 2015 10th International Conference on Intelligent Systems: Theories and Applications (SITA\u201915)","author":"Ahmed A. F.","unstructured":"A. F. Ahmed , R. Mohamed , B. Mostafa , and A. S. Mohammed . 2015. Authorship attribution in arabic poetry . In Proceedings of the 2015 10th International Conference on Intelligent Systems: Theories and Applications (SITA\u201915) . 1--6. A. F. Ahmed, R. Mohamed, B. Mostafa, and A. S. Mohammed. 2015. Authorship attribution in arabic poetry. In Proceedings of the 2015 10th International Conference on Intelligent Systems: Theories and Applications (SITA\u201915). 1--6."},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the 2014 IEEE\/ACS 11th International Conference on Computer Systems and Applications (AICCSA\u201914)","author":"Alsmearat K.","unstructured":"K. Alsmearat , M. Al-Ayyoub , and R. Al-Shalabi . 2014. An extensive study of the bag-of-words approach for gender identification of arabic articles . In Proceedings of the 2014 IEEE\/ACS 11th International Conference on Computer Systems and Applications (AICCSA\u201914) . 601--608. K. Alsmearat, M. Al-Ayyoub, and R. Al-Shalabi. 2014. An extensive study of the bag-of-words approach for gender identification of arabic articles. In Proceedings of the 2014 IEEE\/ACS 11th International Conference on Computer Systems and Applications (AICCSA\u201914). 601--608."},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the 2015 IEEE\/ACS 12th International Conference of Computer Systems and Applications (AICCSA\u201915)","author":"Alsmearat K.","unstructured":"K. Alsmearat , M. Shehab , M. Al-Ayyoub , R. Al-Shalabi , and G. Kanaan . 2015. Emotion analysis of arabic articles and its impact on identifying the author\u2019s gender . In Proceedings of the 2015 IEEE\/ACS 12th International Conference of Computer Systems and Applications (AICCSA\u201915) . 1--6. K. Alsmearat, M. Shehab, M. Al-Ayyoub, R. Al-Shalabi, and G. Kanaan. 2015. Emotion analysis of arabic articles and its impact on identifying the author\u2019s gender. In Proceedings of the 2015 IEEE\/ACS 12th International Conference of Computer Systems and Applications (AICCSA\u201915). 1--6."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2134847"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqn003"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of Clef (notebook Papers\/labs\/workshop).","author":"Argamon Shlomo","year":"2011","unstructured":"Shlomo Argamon and Patrick Juola . 2011 . Overview of the international authorship identification competition at pan-2011 . In Proceedings of Clef (notebook Papers\/labs\/workshop). Shlomo Argamon and Patrick Juola. 2011. Overview of the international authorship identification competition at pan-2011. In Proceedings of Clef (notebook Papers\/labs\/workshop)."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1461928.1461959"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2009.101"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/11.3.121"},{"key":"e_1_2_1_13_1","volume-title":"Word Frequency Distributions","author":"Baayen R. Harald","unstructured":"R. Harald Baayen . 2001. Word Frequency Distributions . Vol. 18 . Springer Science 8 Business Media. R. Harald Baayen. 2001. Word Frequency Distributions. Vol. 18. Springer Science 8 Business Media."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.10.016"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.1991.tb00688.x"},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Yasemin Bay and Erbu\u011d \u00c7elebi. 2016. Feature selection for enhanced author identification of Turkish text. (2016) 371--379.  Yasemin Bay and Erbu\u011d \u00c7elebi. 2016. Feature selection for enhanced author identification of Turkish text. (2016) 371--379.","DOI":"10.1007\/978-3-319-22635-4_34"},{"key":"e_1_2_1_17_1","first-page":"468","article-title":"Exploring performance-based music attributes for the stylometric analysis","volume":"3","author":"Bellaachia Abdellghani","year":"2009","unstructured":"Abdellghani Bellaachia and Edward Jimenez . 2009 . Exploring performance-based music attributes for the stylometric analysis . World Acad. Sci. Eng. Technol. 3 , 55 (2009), 468 -- 470 . Abdellghani Bellaachia and Edward Jimenez. 2009. Exploring performance-based music attributes for the stylometric analysis. World Acad. Sci. Eng. Technol. 3, 55 (2009), 468--70.","journal-title":"World Acad. Sci. Eng. Technol."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.88.048702"},{"key":"e_1_2_1_19_1","first-page":"2","article-title":"A simple stylometric comparator: Nifty assignment","volume":"31","author":"Benzel Steven","year":"2015","unstructured":"Steven Benzel . 2015 . A simple stylometric comparator: Nifty assignment . J. Comput. Sci. Coll. 31 , 2 (Dec. 2015), 283--284. Steven Benzel. 2015. A simple stylometric comparator: Nifty assignment. J. Comput. Sci. Coll. 31, 2 (Dec. 2015), 283--284.","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3115\/1225403.1225421"},{"key":"e_1_2_1_21_1","volume-title":"Natural Language Processing with Python. O\u2019Reilly Media","author":"Bird Steven","unstructured":"Steven Bird , Ewan Klein , and Edward Loper . 2009. Natural Language Processing with Python. O\u2019Reilly Media , Inc . Steven Bird, Ewan Klein, and Edward Loper. 2009. Natural Language Processing with Python. O\u2019Reilly Media, Inc."},{"key":"e_1_2_1_22_1","first-page":"993","article-title":"Latent dirichlet allocation","author":"Blei David M.","year":"2003","unstructured":"David M. Blei , Andrew Y. Ng , and Michael I. Jordan . 2003 . Latent dirichlet allocation . J. Mach. Learn. Res. 3 , Jan (2003), 993 -- 1022 . David M. Blei, Andrew Y. Ng, and Michael I. Jordan. 2003. Latent dirichlet allocation. J. Mach. Learn. Res. 3, Jan (2003), 993--1022.","journal-title":"J. Mach. Learn. Res. 3"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the 22nd International Symposium on Computer and Information Sciences (ISCIS\u201907)","author":"Bozkurt I. N.","unstructured":"I. N. Bozkurt , O. Baglioglu , and E. Uyar . 2007. Authorship attribution . In Proceedings of the 22nd International Symposium on Computer and Information Sciences (ISCIS\u201907) . 1--5. I. N. Bozkurt, O. Baglioglu, and E. Uyar. 2007. Authorship attribution. In Proceedings of the 22nd International Symposium on Computer and Information Sciences (ISCIS\u201907). 1--5."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382448.2382450"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 2014 12th Annual International Conference on Privacy, Security and Trust. 179--188","author":"Brocardo M. L.","unstructured":"M. L. Brocardo and I. Traore . 2014. Continuous authentication using micro-messages . In Proceedings of the 2014 12th Annual International Conference on Privacy, Security and Trust. 179--188 . M. L. Brocardo and I. Traore. 2014. Continuous authentication using micro-messages. In Proceedings of the 2014 12th Annual International Conference on Privacy, Security and Trust. 179--188."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CITS.2013.6705711"},{"key":"e_1_2_1_27_1","volume-title":"Obaidat","author":"Brocardo Marcelo Luiz","year":"2017","unstructured":"Marcelo Luiz Brocardo , Issa Traore , Isaac Woungang , and Mohammad S . Obaidat . 2017 . Authorship verification using deep belief network systems. Int. J. Commun. Syst . (2017). e3259 dac.3259 Marcelo Luiz Brocardo, Issa Traore, Isaac Woungang, and Mohammad S. Obaidat. 2017. Authorship verification using deep belief network systems. Int. J. Commun. Syst. (2017). e3259 dac.3259"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/17.3.267"},{"key":"e_1_2_1_29_1","volume-title":"The ICWSM 2009 spinn3r dataset. In Proceedings of the 3rd Annual Conference on Weblogs and Social Media (ICWSM\u201909)","author":"Burton Kevin","year":"2009","unstructured":"Kevin Burton , Akshay Java , and Ian Soboroff . 2009 . The ICWSM 2009 spinn3r dataset. In Proceedings of the 3rd Annual Conference on Weblogs and Social Media (ICWSM\u201909) . AAAI. Kevin Burton, Akshay Java, and Ian Soboroff. 2009. The ICWSM 2009 spinn3r dataset. In Proceedings of the 3rd Annual Conference on Weblogs and Social Media (ICWSM\u201909). AAAI."},{"key":"e_1_2_1_30_1","volume-title":"The ICWSM 2011 spinn3r dataset. In Proceedings of the Annual Conference on Weblogs and Social Media (ICWSM\u201911)","author":"Burton Kevin","year":"2011","unstructured":"Kevin Burton , Niels Kasch , and Ian Soboroff . 2011 . The ICWSM 2011 spinn3r dataset. In Proceedings of the Annual Conference on Weblogs and Social Media (ICWSM\u201911) . Kevin Burton, Niels Kasch, and Ian Soboroff. 2011. The ICWSM 2011 spinn3r dataset. In Proceedings of the Annual Conference on Weblogs and Social Media (ICWSM\u201911)."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:CHUM.0000009225.28847.77"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/09296174.2010.485444"},{"key":"e_1_2_1_33_1","volume-title":"Ola Sotoye, Linda Torres, and Greg Truley.","author":"Canales Omar","year":"2011","unstructured":"Omar Canales , Vinnie Monaco , Thomas Murphy , Edyta Zych , John Stewart , Charles Tappert Alex Castro , Ola Sotoye, Linda Torres, and Greg Truley. 2011 . A stylometry system for authenticating students taking online tests. In Proceedings of Student-Faculty Research Day, CSIS. Pace University ( 2011). Omar Canales, Vinnie Monaco, Thomas Murphy, Edyta Zych, John Stewart, Charles Tappert Alex Castro, Ola Sotoye, Linda Torres, and Greg Truley. 2011. A stylometry system for authenticating students taking online tests. In Proceedings of Student-Faculty Research Day, CSIS. Pace University (2011)."},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of IEEE Cascom Postgraduate Student Paper Conference","author":"Chakraborty Tanmoy","year":"2010","unstructured":"Tanmoy Chakraborty and Sivaji Bandyopadhyay . 2010 . Authorship identification using stylometry analysis: A CRF-based approach . In Proceedings of IEEE Cascom Postgraduate Student Paper Conference , Jadavpur University, Kolkata. 66--69. Tanmoy Chakraborty and Sivaji Bandyopadhyay. 2010. Authorship identification using stylometry analysis: A CRF-based approach. In Proceedings of IEEE Cascom Postgraduate Student Paper Conference, Jadavpur University, Kolkata. 66--69."},{"key":"e_1_2_1_35_1","volume-title":"Pennebaker","author":"Chung Cindy","year":"2007","unstructured":"Cindy Chung and James W . Pennebaker . 2007 . The psychological functions of function words. Social Communication ( 2007), 343--359. Cindy Chung and James W. Pennebaker. 2007. The psychological functions of function words. Social Communication (2007), 343--359."},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the 6th Mexican International Conference on Artificial Intelligence (MICAI\u201907)","author":"Jonathan","unstructured":"Jonathan H. Clark and Charles J. Hannon. 2007. A classifier system for author recognition using synonym-based features . In Proceedings of the 6th Mexican International Conference on Artificial Intelligence (MICAI\u201907) . Alexander Gelbukh and \u00c1ngel Fernando Kuri Morales (Eds.). Springer, Berlin, 839--849. Jonathan H. Clark and Charles J. Hannon. 2007. A classifier system for author recognition using synonym-based features. In Proceedings of the 6th Mexican International Conference on Artificial Intelligence (MICAI\u201907). Alexander Gelbukh and \u00c1ngel Fernando Kuri Morales (Eds.). Springer, Berlin, 839--849."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/11892755_87"},{"key":"e_1_2_1_38_1","volume-title":"Explanation in Computational Stylometry","author":"Daelemans Walter","unstructured":"Walter Daelemans . 2013. Explanation in Computational Stylometry . Springer , Berlin , 451--462. Walter Daelemans. 2013. Explanation in Computational Stylometry. Springer, Berlin, 451--462."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604272"},{"key":"e_1_2_1_40_1","volume-title":"Computational stylometry in adversarial settings. Master of Science in Artificial Intelligence Thesis","author":"Zoeten R\u00e9mi De","unstructured":"R\u00e9mi De Zoeten . 2015. Computational stylometry in adversarial settings. Master of Science in Artificial Intelligence Thesis , University of Amsterdam. https :\/\/esc.fnwi.uva.nl\/thesis\/centraal\/files\/f1650865434.pdf. R\u00e9mi De Zoeten. 2015. Computational stylometry in adversarial settings. Master of Science in Artificial Intelligence Thesis, University of Amsterdam. https:\/\/esc.fnwi.uva.nl\/thesis\/centraal\/files\/f1650865434.pdf."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1023824908771"},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of Digital Humanities","author":"Eder Maciej","year":"2010","unstructured":"Maciej Eder . 2010 . Does size matter? authorship attribution, small samples, big problem . Proceedings of Digital Humanities (2010), 132--135. Maciej Eder. 2010. Does size matter? authorship attribution, small samples, big problem. Proceedings of Digital Humanities (2010), 132--135."},{"key":"e_1_2_1_43_1","article-title":"Authorship analysis studies: A survey","volume":"86","author":"Manar El Sara El","year":"2014","unstructured":"Sara El Manar El and Ismail Kassou . 2014 . Authorship analysis studies: A survey . Int. J. Comput. Appl. 86 , 12 (2014). Sara El Manar El and Ismail Kassou. 2014. Authorship analysis studies: A survey. Int. J. Comput. Appl. 86, 12 (2014).","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002472.2002510"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/2390665.2390708"},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201913)","author":"Feng Vanessa Wei","year":"2013","unstructured":"Vanessa Wei Feng and Graeme Hirst . 2013 . Authorship verification with entity coherence and other rich linguistic features notebook for PAN . In Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201913) . Vanessa Wei Feng and Graeme Hirst. 2013. Authorship verification with entity coherence and other rich linguistic features notebook for PAN. In Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201913)."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/14.4.467"},{"key":"e_1_2_1_48_1","first-page":"1","article-title":"Identifying authorship by byte-level n-grams: The source code author profile (scap) method","volume":"6","author":"Frantzeskou Georgia","year":"2007","unstructured":"Georgia Frantzeskou , Efstathios Stamatatos , Stefanos Gritzalis , Carole E. Chaski , and Blake Stephen Howald . 2007 . Identifying authorship by byte-level n-grams: The source code author profile (scap) method . Int. J. Dig. Evidence 6 , 1 (2007), 1 -- 18 . Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Carole E. Chaski, and Blake Stephen Howald. 2007. Identifying authorship by byte-level n-grams: The source code author profile (scap) method. Int. J. Dig. Evidence 6, 1 (2007), 1--18.","journal-title":"Int. J. Dig. Evidence"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2013.53"},{"key":"e_1_2_1_50_1","first-page":"1","article-title":"Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location","volume":"99","author":"Fridman L.","year":"2016","unstructured":"L. Fridman , S. Weber , R. Greenstadt , and M. Kam . 2016 . Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location . IEEE Syst. J. PP , 99 (2016), 1 -- 9 . L. Fridman, S. Weber, R. Greenstadt, and M. Kam. 2016. Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location. IEEE Syst. J. PP, 99 (2016), 1--9.","journal-title":"IEEE Syst. J. PP"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005710005970604"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqm020"},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201915)","author":"Grivas Andreas","year":"2015","unstructured":"Andreas Grivas , Anastasia Krithara , and George Giannakopoulos . 2015 . Author profiling using stylometric and structural feature groupings . In Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201915) . Andreas Grivas, Anastasia Krithara, and George Giannakopoulos. 2015. Author profiling using stylometric and structural feature groupings. In Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201915)."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066854"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.01.006"},{"key":"e_1_2_1_56_1","volume-title":"Proceedings of the International Conference on Data Mining (DMIN\u201914)","author":"Herz Jonathan","year":"2014","unstructured":"Jonathan Herz and Abdelghani Bellaachia . 2014 . The authorship of audacity: Data mining and stylometric analysis of barack obama speeches . In Proceedings of the International Conference on Data Mining (DMIN\u201914) . 1. Jonathan Herz and Abdelghani Bellaachia. 2014. The authorship of audacity: Data mining and stylometric analysis of barack obama speeches. In Proceedings of the International Conference on Data Mining (DMIN\u201914). 1."},{"key":"e_1_2_1_57_1","volume-title":"Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC\u201916)","author":"Hinh R.","unstructured":"R. Hinh , S. Shin , and J. Taylor . 2016. Using frame semantics in authorship attribution . In Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC\u201916) . 004093--004098. R. Hinh, S. Shin, and J. Taylor. 2016. Using frame semantics in authorship attribution. In Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC\u201916). 004093--004098."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01830689"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/13.3.111"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/10.2.111"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/09332480.2003.10554842"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022673822140"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/11861461_10"},{"key":"e_1_2_1_64_1","series-title":"Lecture Notes in Computer Science","volume-title":"Web-Age Information Management (WAIM\u201914), F. Li, G. Li, S. Hwang, B. Yao, and Z. Zhang (Eds)","author":"Huang Faliang","unstructured":"Faliang Huang , Chaoxiong Li , and Li Lin . 2014. Identifying gender of microblog users based on message mining . In Web-Age Information Management (WAIM\u201914), F. Li, G. Li, S. Hwang, B. Yao, and Z. Zhang (Eds) . Lecture Notes in Computer Science , vol. 8485 . Springer , Cham . Faliang Huang, Chaoxiong Li, and Li Lin. 2014. Identifying gender of microblog users based on message mining. In Web-Age Information Management (WAIM\u201914), F. Li, G. Li, S. Hwang, B. Yao, and Z. Zhang (Eds). Lecture Notes in Computer Science, vol. 8485. Springer, Cham."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2012.09.019"},{"key":"e_1_2_1_66_1","volume-title":"Proceedinsg of the 2009 17th European Signal Processing Conference. 1220--1224","author":"Jafarpour S.","unstructured":"S. Jafarpour , G. Polatkan , E. Brevdo , S. Hughes , A. Brasoveanu , and I. Daubechies . 2009. Stylistic analysis of paintings using wavelets and machine learning . In Proceedinsg of the 2009 17th European Signal Processing Conference. 1220--1224 . S. Jafarpour, G. Polatkan, E. Brevdo, S. Hughes, A. Brasoveanu, and I. Daubechies. 2009. Stylistic analysis of paintings using wavelets and machine learning. In Proceedinsg of the 2009 17th European Signal Processing Conference. 1220--1224."},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201913)","author":"Jankowska Magdalena","year":"2013","unstructured":"Magdalena Jankowska , Vlado Ke\u0161elj , and Evangelos Milios . 2013 . CNG text classification for authorship profiling task . In Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201913) . Magdalena Jankowska, Vlado Ke\u0161elj, and Evangelos Milios. 2013. CNG text classification for authorship profiling task. In Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201913)."},{"key":"e_1_2_1_68_1","volume-title":"Proceedings of the Digital Humanities Conference.","author":"Jannidis Fotis","year":"2015","unstructured":"Fotis Jannidis , Steffen Pielstr\u00f6m , Christof Sch\u00f6ch , and Thorsten Vitt . 2015 . Improving Burrows\u2019 Delta\u2014an empirical evaluation of text distance measures . In Proceedings of the Digital Humanities Conference. Fotis Jannidis, Steffen Pielstr\u00f6m, Christof Sch\u00f6ch, and Thorsten Vitt. 2015. Improving Burrows\u2019 Delta\u2014an empirical evaluation of text distance measures. In Proceedings of the Digital Humanities Conference."},{"key":"e_1_2_1_69_1","volume-title":"Witten","author":"Jockers Matthew L.","year":"2010","unstructured":"Matthew L. Jockers and Daniela M . Witten . 2010 . A comparative study of machine-learning methods for authorship attribution. Lit. Linguist. Comput. (2010). Matthew L. Jockers and Daniela M. Witten. 2010. A comparative study of machine-learning methods for authorship attribution. Lit. Linguist. Comput. (2010)."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73742-3_8"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000005"},{"key":"e_1_2_1_72_1","volume-title":"Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201912)","author":"Juola Patrick","year":"2012","unstructured":"Patrick Juola . 2012 . An overview of the traditional authorship attribution subtask . In Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201912) (Online Working Notes\/Labs\/Workshop). Patrick Juola. 2012. An overview of the traditional authorship attribution subtask. In Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201912) (Online Working Notes\/Labs\/Workshop)."},{"key":"e_1_2_1_73_1","volume-title":"Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201913)","author":"Juola Patrick","year":"2013","unstructured":"Patrick Juola and Efstathios Stamatatos . 2013 . Overview of the author identification task at PAN 2013 . In Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201913) (Working Notes). Patrick Juola and Efstathios Stamatatos. 2013. Overview of the author identification task at PAN 2013. In Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201913) (Working Notes)."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24212-0_9"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.5555\/1273073.1273131"},{"key":"e_1_2_1_76_1","volume-title":"Information and Software Technologies. Communications in Computer and Information Science, G. Dregvaite and R. Damasevicius (Eds)","author":"Kapo\u010di\u016bt\u0117-Dzikien\u0117 Jurgita","unstructured":"Jurgita Kapo\u010di\u016bt\u0117-Dzikien\u0117 , Andrius Utka , and Ligita \u0160arkut\u0117 . 2015. Authorship attribution of internet comments with thousand candidate authors . In Information and Software Technologies. Communications in Computer and Information Science, G. Dregvaite and R. Damasevicius (Eds) , vol. 538 . Springer , Cham . Jurgita Kapo\u010di\u016bt\u0117-Dzikien\u0117, Andrius Utka, and Ligita \u0160arkut\u0117. 2015. Authorship attribution of internet comments with thousand candidate authors. In Information and Software Technologies. Communications in Computer and Information Science, G. Dregvaite and R. Damasevicius (Eds), vol. 538. Springer, Cham."},{"key":"e_1_2_1_77_1","volume-title":"Proceedings of the Conference Pacific Association for Computational Linguistics (PACLING\u201903)","volume":"3","author":"Ke\u0161elj Vlado","year":"2003","unstructured":"Vlado Ke\u0161elj , Fuchun Peng , Nick Cercone , and Calvin Thomas . 2003 . N-gram-based author profiles for authorship attribution . In Proceedings of the Conference Pacific Association for Computational Linguistics (PACLING\u201903) , Vol. 3 . 255--264. Vlado Ke\u0161elj, Fuchun Peng, Nick Cercone, and Calvin Thomas. 2003. N-gram-based author profiles for authorship attribution. In Proceedings of the Conference Pacific Association for Computational Linguistics (PACLING\u201903), Vol. 3. 255--264."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/860435.860456"},{"key":"e_1_2_1_79_1","volume-title":"Proceedings of the 2015 International Conference on Information and Communication Technology Research (ICTRC\u201915)","author":"Khonji M.","unstructured":"M. Khonji , Y. Iraqi , and A. Jones . 2015. An evaluation of authorship attribution using random forests . In Proceedings of the 2015 International Conference on Information and Communication Technology Research (ICTRC\u201915) . 68--71. M. Khonji, Y. Iraqi, and A. Jones. 2015. An evaluation of authorship attribution using random forests. In Proceedings of the 2015 International Conference on Information and Communication Technology Research (ICTRC\u201915). 68--71."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2010.153"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1994.400086"},{"key":"e_1_2_1_82_1","volume-title":"Stylochronometry: Timeline prediction in stylometric analysis. In Research and Development in Intelligent Systems XXXII (SGAI\u201915), M. Bramer and M. Petridis (Eds)","author":"Klaussner Carmen","year":"2015","unstructured":"Carmen Klaussner and Carl Vogel . 2015 . Stylochronometry: Timeline prediction in stylometric analysis. In Research and Development in Intelligent Systems XXXII (SGAI\u201915), M. Bramer and M. Petridis (Eds) . Springer , Cham . Carmen Klaussner and Carl Vogel. 2015. Stylochronometry: Timeline prediction in stylometric analysis. In Research and Development in Intelligent Systems XXXII (SGAI\u201915), M. Bramer and M. Petridis (Eds). Springer, Cham."},{"key":"e_1_2_1_83_1","volume-title":"The Enron Corpus: A New Dataset for Email Classification Research","author":"Klimt Bryan","unstructured":"Bryan Klimt and Yiming Yang . 2004. The Enron Corpus: A New Dataset for Email Classification Research . Springer , Berlin , 217--226. Bryan Klimt and Yiming Yang. 2004. The Enron Corpus: A New Dataset for Email Classification Research. Springer, Berlin, 217--226."},{"key":"e_1_2_1_84_1","volume-title":"Proceedings of the Workshop on Computational Approaches to Style Analysis and Synthesis (IJCAI\u201903)","author":"Koppel Moshe","year":"2003","unstructured":"Moshe Koppel and Jonathan Schler . 2003 . Exploiting stylistic idiosyncrasies for authorship attribution . In Proceedings of the Workshop on Computational Approaches to Style Analysis and Synthesis (IJCAI\u201903) . 69--72. Moshe Koppel and Jonathan Schler. 2003. Exploiting stylistic idiosyncrasies for authorship attribution. In Proceedings of the Workshop on Computational Approaches to Style Analysis and Synthesis (IJCAI\u201903). 69--72."},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015448"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v60:1"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-009-9111-2"},{"key":"e_1_2_1_88_1","first-page":"1261","article-title":"Measuring differentiability: Unmasking pseudonymous authors","author":"Koppel Moshe","year":"2007","unstructured":"Moshe Koppel , Jonathan Schler , and Elisheva Bonchek-Dokow . 2007 . Measuring differentiability: Unmasking pseudonymous authors . J. Mach. Learn. Res. 8 , Jun (2007), 1261 -- 1276 . Moshe Koppel, Jonathan Schler, and Elisheva Bonchek-Dokow. 2007. Measuring differentiability: Unmasking pseudonymous authors. J. Mach. Learn. Res. 8, Jun (2007), 1261--1276.","journal-title":"J. Mach. Learn. Res. 8"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22954"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556325.2567881"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010478226705"},{"key":"e_1_2_1_92_1","volume-title":"Proceedings of the 2015 International Conference on Circuit, Power and Computing Technologies (ICCPCT\u201915)","author":"Kuruvilla A. M.","unstructured":"A. M. Kuruvilla and S. Varghese . 2015. A detection system to counter identity deception in social media applications . In Proceedings of the 2015 International Conference on Circuit, Power and Computing Technologies (ICCPCT\u201915) . 1--5. A. M. Kuruvilla and S. Varghese. 2015. A detection system to counter identity deception in social media applications. In Proceedings of the 2015 International Conference on Circuit, Power and Computing Technologies (ICCPCT\u201915). 1--5."},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/NEUREL.2012.6419997"},{"key":"e_1_2_1_94_1","volume-title":"Proceedings of the 2016 4th International Conference on Biometrics and Forensics (IWBF\u201916)","author":"Kuzu R. S.","unstructured":"R. S. Kuzu , K. Balci , and A. A. Salah . 2016. Authorship recognition in a multiparty chat scenario . In Proceedings of the 2016 4th International Conference on Biometrics and Forensics (IWBF\u201916) . 1--6. R. S. Kuzu, K. Balci, and A. A. Salah. 2016. Authorship recognition in a multiparty chat scenario. In Proceedings of the 2016 4th International Conference on Biometrics and Forensics (IWBF\u201916). 1--6."},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1076\/jqul.8.3.213.4100"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqi063"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1080\/09296170600850601"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2010.17"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08407-7_14"},{"key":"e_1_2_1_100_1","volume-title":"An investigation of authorship authentication in short messages from a social networking site","author":"Jenny S. Li.","unstructured":"Jenny S. Li. 2015. An investigation of authorship authentication in short messages from a social networking site . ETD Collection for Pace University . Paper AAI3711057. http:\/\/digitalcommons.pace.edu\/dissertations\/AAI3711057. Jenny S. Li. 2015. An investigation of authorship authentication in short messages from a social networking site. ETD Collection for Pace University. Paper AAI3711057. http:\/\/digitalcommons.pace.edu\/dissertations\/AAI3711057."},{"key":"e_1_2_1_101_1","volume-title":"Proceedings of the Notebook for PAN at the Conference and Labs of the Evaluation Forum (CLEF\u201913)","author":"Lim Wee-Yong","unstructured":"Wee-Yong Lim , Jonathan Goh , and Vrizlynn L. L. Thing . 2013. Content-centric age and gender profiling . Proceedings of the Notebook for PAN at the Conference and Labs of the Evaluation Forum (CLEF\u201913) . Wee-Yong Lim, Jonathan Goh, and Vrizlynn L. L. Thing. 2013. Content-centric age and gender profiling. Proceedings of the Notebook for PAN at the Conference and Labs of the Evaluation Forum (CLEF\u201913)."},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.4156\/jdcta.vol5.issue3.12"},{"key":"e_1_2_1_103_1","volume-title":"Proceedings of the 6th International Conference on Advanced Language Processing and Web Information Technology (ALPIT\u201907)","author":"Liu W.","unstructured":"W. Liu , B. Allison , D. Guthrie , and L. Guthrie . 2007. Chinese text classification without automatic word segmentation . In Proceedings of the 6th International Conference on Advanced Language Processing and Web Information Technology (ALPIT\u201907) . 45--50. W. Liu, B. Allison, D. Guthrie, and L. Guthrie. 2007. Chinese text classification without automatic word segmentation. In Proceedings of the 6th International Conference on Advanced Language Processing and Web Information Technology (ALPIT\u201907). 45--50."},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.3115\/1118108.1118117"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.5555\/1599081.1599146"},{"key":"e_1_2_1_106_1","volume-title":"Proceedings of the 6th International Conference on Language Resources and Evaluation (LREC\u201908)","author":"Luyckx Kim","year":"2008","unstructured":"Kim Luyckx and Walter Daelemans . 2008 . Personae: A corpus for author and personality prediction from text . Proceedings of the 6th International Conference on Language Resources and Evaluation (LREC\u201908) (2008). Kim Luyckx and Walter Daelemans. 2008. Personae: A corpus for author and personality prediction from text. Proceedings of the 6th International Conference on Language Resources and Evaluation (LREC\u201908) (2008)."},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqq013"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01393-5_3"},{"key":"e_1_2_1_109_1","volume-title":"Proceedings of the Meeting of the Classification Society of North America. 13","author":"Madigan David","year":"2005","unstructured":"David Madigan , Alexander Genkin , David D. Lewis , Shlomo Argamon , Dmitriy Fradkin , and Li Ye . 2005 . Author identification on the large scale . In Proceedings of the Meeting of the Classification Society of North America. 13 . David Madigan, Alexander Genkin, David D. Lewis, Shlomo Argamon, Dmitriy Fradkin, and Li Ye. 2005. Author identification on the large scale. In Proceedings of the Meeting of the Classification Society of North America. 13."},{"key":"e_1_2_1_110_1","volume-title":"Authorship Attribution of Texts: A Review","author":"Malyutov M. B.","unstructured":"M. B. Malyutov . 2006. Authorship Attribution of Texts: A Review . Springer , Berlin , 362--380. M. B. Malyutov. 2006. Authorship Attribution of Texts: A Review. Springer, Berlin, 362--380."},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-5010"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31865-1_22"},{"key":"e_1_2_1_113_1","volume-title":"Proceedings of the 2014 International Conference on Information Science Applications (ICISA\u201914)","author":"Marukatat R.","unstructured":"R. Marukatat , R. Somkiadcharoen , R. Nalintasnai , and T. Aramboonpong . 2014. Authorship attribution analysis of thai online messages . In Proceedings of the 2014 International Conference on Information Science Applications (ICISA\u201914) . 1--4. R. Marukatat, R. Somkiadcharoen, R. Nalintasnai, and T. Aramboonpong. 2014. Authorship attribution analysis of thai online messages. In Proceedings of the 2014 International Conference on Information Science Applications (ICISA\u201914). 1--4."},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/8.4.203"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/9.1.1"},{"key":"e_1_2_1_116_1","volume-title":"Authorship attribution and gender identification in greek blogs. Methods Appl. Quant. Linguist. 21","author":"Mikros George K.","year":"2012","unstructured":"George K. Mikros . 2012. Authorship attribution and gender identification in greek blogs. Methods Appl. Quant. Linguist. 21 ( 2012 ). George K. Mikros. 2012. Authorship attribution and gender identification in greek blogs. Methods Appl. Quant. Linguist. 21 (2012)."},{"key":"e_1_2_1_117_1","unstructured":"Frederick Mosteller and David Wallace. 1964. Inference and disputed authorship: The Federalist. (1964).  Frederick Mosteller and David Wallace. 1964. Inference and disputed authorship: The Federalist. (1964)."},{"key":"e_1_2_1_118_1","volume-title":"Proceedings of a Harvard Symposium on Digital Computers and Their Applications. 163--197","author":"Mosteller Frederick","unstructured":"Frederick Mosteller and David L. Wallace . 1962. Notes on an authorship problem . In Proceedings of a Harvard Symposium on Digital Computers and Their Applications. 163--197 . Frederick Mosteller and David L. Wallace. 1962. Notes on an authorship problem. In Proceedings of a Harvard Symposium on Digital Computers and Their Applications. 163--197."},{"key":"e_1_2_1_119_1","first-page":"275","article-title":"Inference in an authorship problem: A comparative study of discrimination methods applied to the authorship of the disputed federalist papers","volume":"58","author":"Mosteller Frederick","year":"1963","unstructured":"Frederick Mosteller and David L. Wallace . 1963 . Inference in an authorship problem: A comparative study of discrimination methods applied to the authorship of the disputed federalist papers . J. Amer. Statist. Assoc. 58 , 302 (1963), 275 -- 309 . Frederick Mosteller and David L. Wallace. 1963. Inference in an authorship problem: A comparative study of discrimination methods applied to the authorship of the disputed federalist papers. J. Amer. Statist. Assoc. 58, 302 (1963), 275--309.","journal-title":"J. Amer. Statist. Assoc."},{"key":"e_1_2_1_120_1","volume-title":"Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, D. Mandal, R. Kar, S. Das, and B. Panigrahi (Eds)","author":"Nagaprasad S.","unstructured":"S. Nagaprasad , T. Raghunadha Reddy , P. Vijayapal Reddy , A. Vinaya Babu , and B. VishnuVardhan . 2015. Empirical evaluations using character and word n-grams on authorship attribution for Telugu text . In Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, D. Mandal, R. Kar, S. Das, and B. Panigrahi (Eds) , vol. 343 . Springer , New Delhi . S. Nagaprasad, T. Raghunadha Reddy, P. Vijayapal Reddy, A. Vinaya Babu, and B. VishnuVardhan. 2015. Empirical evaluations using character and word n-grams on authorship attribution for Telugu text. In Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, D. Mandal, R. Kar, S. Das, and B. Panigrahi (Eds), vol. 343. Springer, New Delhi."},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.46"},{"key":"e_1_2_1_122_1","volume-title":"Proceedings of the URECA@NTU 2013-14","author":"Nguyen Dinh Phuc","year":"2014","unstructured":"Dinh Phuc Nguyen . 2014 . Obfuscation techniques for java source code . In Proceedings of the URECA@NTU 2013-14 . Student research paper, Nanyang Technological University. Dinh Phuc Nguyen. 2014. Obfuscation techniques for java source code. In Proceedings of the URECA@NTU 2013-14. Student research paper, Nanyang Technological University."},{"key":"e_1_2_1_123_1","volume-title":"Literary Detective Work on the Computer","author":"Oakes Michael P.","unstructured":"Michael P. Oakes . 2014. Literary Detective Work on the Computer . Vol. 12 . John Benjamins Publishing Company . Michael P. Oakes. 2014. Literary Detective Work on the Computer. Vol. 12. John Benjamins Publishing Company."},{"key":"e_1_2_1_124_1","volume-title":"Proceedings of the 2014 5th International Conference\u2014Confluence: The Next Generation Information Technology Summit (CONFLUENCE\u201914)","author":"Pateriya P. K.","unstructured":"P. K. Pateriya , Lakshmi, and G. Raj . 2014. A pragmatic validation of stylometric techniques using BPA . In Proceedings of the 2014 5th International Conference\u2014Confluence: The Next Generation Information Technology Summit (CONFLUENCE\u201914) . 124--131. P. K. Pateriya, Lakshmi, and G. Raj. 2014. A pragmatic validation of stylometric techniques using BPA. In Proceedings of the 2014 5th International Conference\u2014Confluence: The Next Generation Information Technology Summit (CONFLUENCE\u201914). 124--131."},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.110"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/2065023.2065035"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:INRT.0000011209.19643.e2"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.3115\/1067807.1067843"},{"key":"e_1_2_1_129_1","first-page":"1","article-title":"Authorship attribution of web forum posts","volume":"2010","author":"Pillay S. R.","year":"2010","unstructured":"S. R. Pillay and T. Solorio . 2010 . Authorship attribution of web forum posts . In Proceedings of the eCrime Researchers Summit (eCrime) , 2010. 1 -- 7 . S. R. Pillay and T. Solorio. 2010. Authorship attribution of web forum posts. In Proceedings of the eCrime Researchers Summit (eCrime), 2010. 1--7.","journal-title":"Proceedings of the eCrime Researchers Summit (eCrime)"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87881-0_22"},{"key":"e_1_2_1_131_1","volume-title":"Working Notes Papers of the Conference and Labs of the Evaluation Forum (CLEF\u201915)","author":"Posadas-Dur\u00e1n J.","year":"2015","unstructured":"J. Posadas-Dur\u00e1n , Ilia Markov , Helena G\u00f3mez-Adorno , Grigori Sidorov , Ildar Batyrshin , Alexander Gelbukh , and Obdulia Pichardo-Lagunas . 2015 . Syntactic n-grams as features for the author profiling task . Working Notes Papers of the Conference and Labs of the Evaluation Forum (CLEF\u201915) . J. Posadas-Dur\u00e1n, Ilia Markov, Helena G\u00f3mez-Adorno, Grigori Sidorov, Ildar Batyrshin, Alexander Gelbukh, and Obdulia Pichardo-Lagunas. 2015. Syntactic n-grams as features for the author profiling task. Working Notes Papers of the Conference and Labs of the Evaluation Forum (CLEF\u201915)."},{"key":"e_1_2_1_132_1","volume-title":"Complete Syntactic N-grams as Style Markers for Authorship Attribution","author":"Posadas-Duran Juan-Pablo","unstructured":"Juan-Pablo Posadas-Duran , Grigori Sidorov , and Ildar Batyrshin . 2014. Complete Syntactic N-grams as Style Markers for Authorship Attribution . Springer International Publishing , Cham , 9--17. Juan-Pablo Posadas-Duran, Grigori Sidorov, and Ildar Batyrshin. 2014. Complete Syntactic N-grams as Style Markers for Authorship Attribution. Springer International Publishing, Cham, 9--17."},{"key":"e_1_2_1_133_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-49001-4","volume-title":"Jakob K\u00f6hler, Winfried L\u00f6tzsch, Fabian M\u00fcller, Maike Elisa M\u00fcller, Robert Pa\u00dfmann","author":"Potthast Martin","year":"2016","unstructured":"Martin Potthast , Sarah Braun , Tolga Buz , Fabian Duffhauss , Florian Friedrich , J\u00f6rg Marvin G\u00fclzow , Jakob K\u00f6hler, Winfried L\u00f6tzsch, Fabian M\u00fcller, Maike Elisa M\u00fcller, Robert Pa\u00dfmann , Bernhard Reinke , Lucas Rettenmeier, Thomas Rometsch, Timo Sommer, Michael Tr\u00e4ger, Sebastian Wilhelm, Benno Stein, Efstathios Stamatatos, and Matthias Hagen. 2016 . Who wrote the web? Revisiting influential author identification research applicable to information retrieval. In Advances in Information Retrieval (ECIR\u201916), N. Ferro et al. (Eds), Lecture Notes in Computer Science , vol. 9626 . Springer , Cham. Martin Potthast, Sarah Braun, Tolga Buz, Fabian Duffhauss, Florian Friedrich, J\u00f6rg Marvin G\u00fclzow, Jakob K\u00f6hler, Winfried L\u00f6tzsch, Fabian M\u00fcller, Maike Elisa M\u00fcller, Robert Pa\u00dfmann, Bernhard Reinke, Lucas Rettenmeier, Thomas Rometsch, Timo Sommer, Michael Tr\u00e4ger, Sebastian Wilhelm, Benno Stein, Efstathios Stamatatos, and Matthias Hagen. 2016. Who wrote the web? Revisiting influential author identification research applicable to information retrieval. In Advances in Information Retrieval (ECIR\u201916), N. Ferro et al. (Eds), Lecture Notes in Computer Science, vol. 9626. Springer, Cham."},{"key":"e_1_2_1_134_1","volume-title":"Proceedings of the 2013 IEEE 8th International Conference on Industrial and Information Systems. 387--392","author":"Ragel R.","unstructured":"R. Ragel , P. Herath , and U. Senanayake . 2013. Authorship detection of SMS messages using unigrams . In Proceedings of the 2013 IEEE 8th International Conference on Industrial and Information Systems. 387--392 . R. Ragel, P. Herath, and U. Senanayake. 2013. Authorship detection of SMS messages using unigrams. In Proceedings of the 2013 IEEE 8th International Conference on Industrial and Information Systems. 387--392."},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.5555\/1858842.1858850"},{"key":"e_1_2_1_136_1","doi-asserted-by":"crossref","unstructured":"Hoshiladevi Ramnial Shireen Panchoo and Sameerchand Pudaruth. 2016. Gender Profiling from PhD theses using k-nearest neighbour and sequential minimal optimisation. Intelligent Systems Technologies and Applications. 369\u2013377.  Hoshiladevi Ramnial Shireen Panchoo and Sameerchand Pudaruth. 2016. Gender Profiling from PhD theses using k-nearest neighbour and sequential minimal optimisation. Intelligent Systems Technologies and Applications. 369\u2013377.","DOI":"10.1007\/978-3-319-23258-4_32"},{"key":"e_1_2_1_137_1","volume-title":"Proceedings of International Conference on Machine Learning.","author":"Ramyaa Congzhou He","year":"2004","unstructured":"Congzhou He Ramyaa and Khaled Rasheed . 2004 . Using machine-learning techniques for stylometry . In Proceedings of International Conference on Machine Learning. Congzhou He Ramyaa and Khaled Rasheed. 2004. Using machine-learning techniques for stylometry. In Proceedings of International Conference on Machine Learning."},{"key":"e_1_2_1_138_1","volume-title":"Proceedings of the Conference and Labs of the Evaluation Forum on Multilingual and Multimodal Information Access Evaluation (CLEF\u201913)","author":"Rangel Francisco","year":"2013","unstructured":"Francisco Rangel , Paolo Rosso , Moshe Moshe Koppel , Efstathios Stamatatos , and Giacomo Inches . 2013 . Overview of the author profiling task at PAN 2013 . In Proceedings of the Conference and Labs of the Evaluation Forum on Multilingual and Multimodal Information Access Evaluation (CLEF\u201913) . 352--365. Francisco Rangel, Paolo Rosso, Moshe Moshe Koppel, Efstathios Stamatatos, and Giacomo Inches. 2013. Overview of the author profiling task at PAN 2013. In Proceedings of the Conference and Labs of the Evaluation Forum on Multilingual and Multimodal Information Access Evaluation (CLEF\u201913). 352--365."},{"key":"e_1_2_1_139_1","volume-title":"Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201915)","author":"Rangel Francisco","year":"2015","unstructured":"Francisco Rangel , Paolo Rosso , Martin Potthast , Benno Stein , and Walter Daelemans . 2015 . Overview of the 3rd author profiling task at PAN 2015 . In Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201915) . Francisco Rangel, Paolo Rosso, Martin Potthast, Benno Stein, and Walter Daelemans. 2015. Overview of the 3rd author profiling task at PAN 2015. In Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201915)."},{"key":"e_1_2_1_140_1","volume-title":"Proceedings of the CEUR Workshop","volume":"1180","author":"Rangel Francisco","year":"2014","unstructured":"Francisco Rangel , Paolo Rosso , Martin Potthast , Martin Trenkmann , Benno Stein , Ben Verhoeven , Walter Daeleman , 2014 . Overview of the 2nd author profiling task at pan 2014 . In Proceedings of the CEUR Workshop , Vol. 1180 , 898--927. Francisco Rangel, Paolo Rosso, Martin Potthast, Martin Trenkmann, Benno Stein, Ben Verhoeven, Walter Daeleman, et al. 2014. Overview of the 2nd author profiling task at pan 2014. In Proceedings of the CEUR Workshop, Vol. 1180, 898--927."},{"key":"e_1_2_1_141_1","volume-title":"Working Notes Papers of the Conference and Labs of the Evaluation Forum (CLEF\u201916)","author":"Rangel Francisco","year":"2016","unstructured":"Francisco Rangel , Paolo Rosso , Ben Verhoeven , Walter Daelemans , Martin Potthast , and Benno Stein . 2016 . Overview of the 4th author profiling task at PAN 2016: Cross-genre evaluations . Working Notes Papers of the Conference and Labs of the Evaluation Forum (CLEF\u201916) . Francisco Rangel, Paolo Rosso, Ben Verhoeven, Walter Daelemans, Martin Potthast, and Benno Stein. 2016. Overview of the 4th author profiling task at PAN 2016: Cross-genre evaluations. Working Notes Papers of the Conference and Labs of the Evaluation Forum (CLEF\u201916)."},{"key":"e_1_2_1_142_1","first-page":"3092","article-title":"A survey on authorship profiling techniques","volume":"11","author":"Reddy T. Raghunadha","year":"2016","unstructured":"T. Raghunadha Reddy , B. Vishnu Vardhan , and P. Vijayapal Reddy . 2016 . A survey on authorship profiling techniques . Int. J. Appl. Eng. Res. 11 , 5 (2016), 3092 -- 3102 . T. Raghunadha Reddy, B. Vishnu Vardhan, and P. Vijayapal Reddy. 2016. A survey on authorship profiling techniques. Int. J. Appl. Eng. Res. 11, 5 (2016), 3092--3102.","journal-title":"Int. J. Appl. Eng. Res."},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.5555\/1036843.1036902"},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1001018624850"},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37256-8_38"},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqt047"},{"key":"e_1_2_1_147_1","volume-title":"Proceedings of the AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs","volume":"6","author":"Schler Jonathan","unstructured":"Jonathan Schler , Moshe Koppel , Shlomo Argamon , and James W. Pennebaker . 2006. Effects of age and gender on blogging . In Proceedings of the AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs , Vol. 6 . 199--205. Jonathan Schler, Moshe Koppel, Shlomo Argamon, and James W. Pennebaker. 2006. Effects of age and gender on blogging. In Proceedings of the AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs, Vol. 6. 199--205."},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.5555\/2390665.2390728"},{"key":"e_1_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.015"},{"key":"e_1_2_1_150_1","volume-title":"Measurement of diversity. Nature 163","author":"Simpson E. H.","year":"1949","unstructured":"E. H. Simpson . 1949. Measurement of diversity. Nature 163 ( 1949 ). E. H. Simpson. 1949. Measurement of diversity. Nature 163 (1949)."},{"key":"e_1_2_1_151_1","first-page":"2063","article-title":"Pattern for python","author":"Smedt Tom De","year":"2012","unstructured":"Tom De Smedt and Walter Daelemans . 2012 . Pattern for python . J. Mach. Learn. Res. 13 , Jun (2012), 2063 -- 2067 . Tom De Smedt and Walter Daelemans. 2012. Pattern for python. J. Mach. Learn. Res. 13, Jun (2012), 2063--2067.","journal-title":"J. Mach. Learn. Res. 13"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1109\/UKCI.2010.5625589"},{"key":"e_1_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218213006002965"},{"key":"e_1_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2007.41"},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v60:3"},{"key":"e_1_2_1_156_1","series-title":"Lecture Notes in Morphogenesis","volume-title":"Creativity and Universality in Language, M. Degli Esposti, E. Altmann, and F. Pachet (Eds)","author":"Stamatatos Efstathios","unstructured":"Efstathios Stamatatos . 2016. Universality of stylistic traits in texts . In Creativity and Universality in Language, M. Degli Esposti, E. Altmann, and F. Pachet (Eds) , Lecture Notes in Morphogenesis . Springer , Cham . Efstathios Stamatatos. 2016. Universality of stylistic traits in texts. In Creativity and Universality in Language, M. Degli Esposti, E. Altmann, and F. Pachet (Eds), Lecture Notes in Morphogenesis. Springer, Cham."},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.3115\/977035.977057"},{"key":"e_1_2_1_158_1","volume-title":"Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201914)","author":"Stamatatos Efstathios","year":"2014","unstructured":"Efstathios Stamatatos , Walter Daelemans , Ben Verhoeven , Patrick Juola , Aurelio L\u00f3pez-L\u00f3pez , Martin Potthast , and Benno Stein . 2014 . Overview of the author identification task at PAN 2014 . In Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201914) (Working Notes). 877--897. Efstathios Stamatatos, Walter Daelemans, Ben Verhoeven, Patrick Juola, Aurelio L\u00f3pez-L\u00f3pez, Martin Potthast, and Benno Stein. 2014. Overview of the author identification task at PAN 2014. In Proceedings of the Conference and Labs of the Evaluation Forum (CLEF\u201914) (Working Notes). 877--897."},{"key":"e_1_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1002681919510"},{"key":"e_1_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24027-5_49"},{"key":"e_1_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24027-5_49"},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqm029"},{"key":"e_1_2_1_163_1","volume-title":"Man\u2013Machine Interactions 4. Advances in Intelligent Systems and Computing, A. Gruca, A. Brachman, S. Kozielski, and T. Czach\u00f3rski (Eds)","author":"Sta\u0144czyk Urszula","unstructured":"Urszula Sta\u0144czyk . 2016. The class imbalance problem in construction of training datasets for authorship attribution . In Man\u2013Machine Interactions 4. Advances in Intelligent Systems and Computing, A. Gruca, A. Brachman, S. Kozielski, and T. Czach\u00f3rski (Eds) , vol. 391 . Springer , Cham . Urszula Sta\u0144czyk. 2016. The class imbalance problem in construction of training datasets for authorship attribution. In Man\u2013Machine Interactions 4. Advances in Intelligent Systems and Computing, A. Gruca, A. Brachman, S. Kozielski, and T. Czach\u00f3rski (Eds), vol. 391. Springer, Cham."},{"key":"e_1_2_1_164_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328964.1328976"},{"key":"e_1_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-010-9115-y"},{"key":"e_1_2_1_166_1","volume-title":"Delta. In Proceedings of the Digital Humanities Conference. Citeseer, 207--209","author":"Stein Sterling","year":"2006","unstructured":"Sterling Stein and Shlomo Argamon . 2006 . A mathematical explanation of Burrows\u2019s Delta. In Proceedings of the Digital Humanities Conference. Citeseer, 207--209 . Sterling Stein and Shlomo Argamon. 2006. A mathematical explanation of Burrows\u2019s Delta. In Proceedings of the Digital Humanities Conference. Citeseer, 207--209."},{"key":"e_1_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.520"},{"key":"e_1_2_1_168_1","doi-asserted-by":"crossref","unstructured":"K. Surendran O. P. Harilal P. Hrudya Prabaharan Poornachandran and N. K. Suchetha. 2017. Stylometry Detection Using Deep Learning. Springer Singapore 749--757.  K. Surendran O. P. Harilal P. Hrudya Prabaharan Poornachandran and N. K. Suchetha. 2017. Stylometry Detection Using Deep Learning. Springer Singapore 749--757.","DOI":"10.1007\/978-981-10-3874-7_71"},{"key":"e_1_2_1_169_1","volume-title":"Proceedings of the Conference on Recent Advances in Slavonic Natural Language Processing (RASLAN\u201915)","author":"\u0160vec J\u00e1n","year":"2015","unstructured":"J\u00e1n \u0160vec and Jan Rygl . 2015 . Slavonic corpus for stylometry research . Proceedings of the Conference on Recent Advances in Slavonic Natural Language Processing (RASLAN\u201915) , 11. J\u00e1n \u0160vec and Jan Rygl. 2015. Slavonic corpus for stylometry research. Proceedings of the Conference on Recent Advances in Slavonic Natural Language Processing (RASLAN\u201915), 11."},{"key":"e_1_2_1_170_1","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2010.50"},{"key":"e_1_2_1_171_1","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X09351676"},{"key":"e_1_2_1_172_1","volume-title":"Harper","author":"Teahan William J.","year":"2003","unstructured":"William J. Teahan and David J . Harper . 2003 . Using compression-based language models for text categorization. In Language Modeling for Information Retrieval. Springer , 141--165. William J. Teahan and David J. Harper. 2003. Using compression-based language models for text categorization. In Language Modeling for Information Retrieval. Springer, 141--165."},{"key":"e_1_2_1_173_1","doi-asserted-by":"publisher","DOI":"10.1109\/RESER.2013.12"},{"key":"e_1_2_1_174_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00054024"},{"key":"e_1_2_1_175_1","doi-asserted-by":"publisher","DOI":"10.1145\/1326561.1326564"},{"key":"e_1_2_1_177_1","volume-title":"Proceedings of the 2011 International Joint Conference on Neural Networks (IJCNN\u201911)","author":"Varela P.","unstructured":"P. Varela , E. Justino , and L. S. Oliveira . 2011. Selecting syntactic attributes for authorship attribution . In Proceedings of the 2011 International Joint Conference on Neural Networks (IJCNN\u201911) . 167--172. P. Varela, E. Justino, and L. S. Oliveira. 2011. Selecting syntactic attributes for authorship attribution. In Proceedings of the 2011 International Joint Conference on Neural Networks (IJCNN\u201911). 167--172."},{"key":"e_1_2_1_178_1","volume-title":"Proceedings of the 9th International Conference on Language Resources and Evaluation (LREC\u201914)","author":"Verhoeven Ben","year":"2014","unstructured":"Ben Verhoeven and Walter Daelemans . 2014 . Clips stylometry investigation (CSI) corpus: A dutch corpus for the detection of age, gender, personality, sentiment and deception in text . In Proceedings of the 9th International Conference on Language Resources and Evaluation (LREC\u201914) . 3081--3085. Ben Verhoeven and Walter Daelemans. 2014. Clips stylometry investigation (CSI) corpus: A dutch corpus for the detection of age, gender, personality, sentiment and deception in text. In Proceedings of the 9th International Conference on Language Resources and Evaluation (LREC\u201914). 3081--3085."},{"key":"e_1_2_1_179_1","volume-title":"Proceedings of the 10th International Conference on Language Resources and Evaluation (LREC\u201916)","author":"Verhoeven Ben","year":"2016","unstructured":"Ben Verhoeven , Walter Daelemans , and Barbara Plank . 2016 . Twisty: A multilingual Twitter stylometry corpus for gender and personality profiling . In Proceedings of the 10th International Conference on Language Resources and Evaluation (LREC\u201916) . Ben Verhoeven, Walter Daelemans, and Barbara Plank. 2016. Twisty: A multilingual Twitter stylometry corpus for gender and personality profiling. In Proceedings of the 10th International Conference on Language Resources and Evaluation (LREC\u201916)."},{"key":"e_1_2_1_180_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659522.2659527"},{"key":"e_1_2_1_181_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-1418"},{"key":"e_1_2_1_182_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00055109"},{"key":"e_1_2_1_183_1","volume-title":"Authorship Attribution with Topic Drift Model","author":"Yang Min","year":"2017","unstructured":"Min Yang , Dingju Zhu , Yong Tang , and Jingxuan Wang . 2017. Authorship Attribution with Topic Drift Model ( 2017 ). Retrieved from https:\/\/aaai.org\/ocs\/index.php\/AAAI\/AAAI17\/paper\/view\/14152. Min Yang, Dingju Zhu, Yong Tang, and Jingxuan Wang. 2017. Authorship Attribution with Topic Drift Model (2017). Retrieved from https:\/\/aaai.org\/ocs\/index.php\/AAAI\/AAAI17\/paper\/view\/14152."},{"key":"e_1_2_1_184_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840809"},{"key":"e_1_2_1_185_1","volume-title":"Proceedings of the NAACL-HLT 2012 Workshop on Computational Linguistics for Literature. Association for Computational Linguistics, 45--53","author":"Yu Bei","year":"2012","unstructured":"Bei Yu . 2012 . Function words for chinese authorship attribution . In Proceedings of the NAACL-HLT 2012 Workshop on Computational Linguistics for Literature. Association for Computational Linguistics, 45--53 . Bei Yu. 2012. Function words for chinese authorship attribution. In Proceedings of the NAACL-HLT 2012 Workshop on Computational Linguistics for Literature. Association for Computational Linguistics, 45--53."},{"key":"e_1_2_1_186_1","doi-asserted-by":"publisher","DOI":"10.3115\/1119250.1119280"},{"key":"e_1_2_1_187_1","doi-asserted-by":"publisher","DOI":"10.1007\/11562382_14"},{"key":"e_1_2_1_188_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v57:3"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132039","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:34Z","timestamp":1750217434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132039"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,22]]},"references-count":187,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,11,30]]}},"alternative-id":["10.1145\/3132039"],"URL":"https:\/\/doi.org\/10.1145\/3132039","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,22]]},"assertion":[{"value":"2016-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}