{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:57:31Z","timestamp":1760597851354,"version":"3.41.0"},"reference-count":70,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2018,11,12]],"date-time":"2018-11-12T00:00:00Z","timestamp":1541980800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Canada Research Chairs (CRC) Program","award":["950-230623"],"award-info":[{"award-number":["950-230623"]}]},{"name":"Natural Sciences and Engineering Research Council of Canada (NSERC) Discovery Grants","award":["RGPIN-2018-03872"],"award-info":[{"award-number":["RGPIN-2018-03872"]}]},{"name":"Zayed University Research Incentive Fund","award":["R14025 and R13059"],"award-info":[{"award-number":["R14025 and R13059"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Asian Low-Resour. Lang. Inf. Process."],"published-print":{"date-parts":[[2019,3,31]]},"abstract":"<jats:p>\n            Law enforcement faces problems in tracing the true identity of offenders in cybercrime investigations. Most offenders mask their true identity, impersonate people of high authority, or use identity deception and obfuscation tactics to avoid detection and traceability. To address the problem of anonymity, authorship analysis is used to identify individuals by their writing styles without knowing their actual identities. Most authorship studies are dedicated to English due to its widespread use over the Internet, but recent cyber-attacks such as the distribution of Stuxnet indicate that Internet crimes are not limited to a certain community, language, culture, ideology, or ethnicity. To effectively investigate cybercrime and to address the problem of anonymity in online communication, there is a pressing need to study authorship analysis of languages such as Arabic, Chinese, Turkish, and so on. Arabic, the focus of this study, is the fourth most widely used language on the Internet. This study investigates authorship of Arabic discourse\/text, especially tiny text, Twitter posts. We benchmark the performance of a profile-based approach that uses\n            <jats:italic>n<\/jats:italic>\n            -grams as features and compare it with state-of-the-art instance-based classification techniques. Then we adapt an event-visualization tool that is developed for English to accommodate both Arabic and English languages and visualize the result of the attribution evidence. In addition, we investigate the relative effect of the training set, the length of tweets, and the number of authors on authorship classification accuracy. Finally, we show that diacritics have an insignificant effect on the attribution process and part-of-speech tags are less effective than character-level and word-level\n            <jats:italic>n<\/jats:italic>\n            -grams.\n          <\/jats:p>","DOI":"10.1145\/3236391","type":"journal-article","created":{"date-parts":[[2018,11,13]],"date-time":"2018-11-13T13:20:16Z","timestamp":1542115216000},"page":"1-51","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Arabic Authorship Attribution"],"prefix":"10.1145","volume":"18","author":[{"given":"Malik H.","family":"Altakrori","sequence":"first","affiliation":[{"name":"School of Computer Science, McGill University, QC, Canada"}]},{"given":"Farkhund","family":"Iqbal","sequence":"additional","affiliation":[{"name":"College of Technological Innovation, Zayed University, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8423-2906","authenticated-orcid":false,"given":"Benjamin C. M.","family":"Fung","sequence":"additional","affiliation":[{"name":"School of Information Studies, McGill University, QC, Canada"}]},{"given":"Steven H. H.","family":"Ding","sequence":"additional","affiliation":[{"name":"School of Information Studies, McGill University, QC, Canada"}]},{"given":"Abdallah","family":"Tubaishat","sequence":"additional","affiliation":[{"name":"College of Technological Innovation, Zayed University, Abu Dhabi, United Arab Emirates"}]}],"member":"320","published-online":{"date-parts":[[2018,11,12]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11427995_15"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2005.81"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_6"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJWIS-03-2016-0011"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0452-1"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2014.06.006"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2014.6841973"},{"key":"e_1_2_1_8_1","unstructured":"ArabiNames.com. 2015. Arabi Names. Retreived from http:\/\/arabinames.com\/categories.aspx.  ArabiNames.com. 2015. Arabi Names. Retreived from http:\/\/arabinames.com\/categories.aspx."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13388-014-0010-8"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03689-2_3"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"volume-title":"Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications","author":"Cavalcante Thiago","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_2_1_14_1","first-page":"1","article-title":"Who\u2019s at the keyboard? Authorship attribution in digital evidence investigations","volume":"4","author":"Chaski Carole E.","year":"2005","journal-title":"J. Dig. Evidence"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.04.002"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11892755_87"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604272"},{"key":"e_1_2_1_18_1","unstructured":"Mona Diab Kadri Hacioglu and Daniel Jurafsky. 2007. Automated methods for processing arabic text: From tokenization to base phrase chunking. Arabic Computational Morphology: Knowledge-Based and Empirical Methods. (2007).  Mona Diab Kadri Hacioglu and Daniel Jurafsky. 2007. Automated methods for processing arabic text: From tokenization to base phrase chunking. Arabic Computational Morphology: Knowledge-Based and Empirical Methods. (2007)."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699910"},{"key":"e_1_2_1_20_1","first-page":"1","article-title":"Identifying authorship by byte-level N-grams: The source code author profile (SCAP) method","volume":"6","author":"Frantzeskou Georgia","year":"2007","journal-title":"Int. J. Dig. Evidence"},{"volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence. 4212--4213","author":"Ge Zhenhao","key":"e_1_2_1_21_1"},{"volume-title":"Deep Learning","author":"Goodfellow Ian","key":"e_1_2_1_22_1"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.3115\/1219840.1219911"},{"key":"e_1_2_1_24_1","unstructured":"M. A. Hall. 1998. Correlation-based feature subset selection for machine learning. (unpublished).  M. A. Hall. 1998. Correlation-based feature subset selection for machine learning. (unpublished)."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"volume-title":"Data Mining: Concepts and Techniques. Morgan Kaufmann","year":"2001","author":"Han Jiawei","key":"e_1_2_1_26_1"},{"volume-title":"RapidMiner: Data Mining Use Cases and Business Analytics Applications","author":"Hofmann Markus","key":"e_1_2_1_27_1","doi-asserted-by":"crossref","DOI":"10.1201\/b16023"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.45"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.001"},{"volume-title":"Proceedings of the Australasian Language Technology Association Workshop","year":"2011","author":"Ishihara Shunichi","key":"e_1_2_1_30_1"},{"volume-title":"Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence. Morgan Kaufmann","author":"George","key":"e_1_2_1_31_1"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000005"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the Conference Pacific Association for Computational Linguistics (PACLING\u201903)","volume":"3","author":"Ke\u0161elj Vlado","year":"2003"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(94)90029-9"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1484611.1484627"},{"key":"e_1_2_1_37_1","first-page":"1","article-title":"Assessment on stylometry for multilingual manuscript","volume":"2","author":"Kumar Sushil","year":"2012","journal-title":"Assessment"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2012.11"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2010.17"},{"volume-title":"Recentred local profiles for authorship attribution. Nat. Lang. Eng. 18, 3 (7","year":"2012","author":"Layton Robert","key":"e_1_2_1_40_1"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1082"},{"key":"e_1_2_1_42_1","unstructured":"Mark Liberman. 2008. Ask Language Log: Comparing the Vocabularies of Different Languages. Retrieved from http:\/\/itre.cis.upenn.edu\/ myl\/languagelog\/archives\/005514.html.  Mark Liberman. 2008. Ask Language Log: Comparing the Vocabularies of Different Languages. Retrieved from http:\/\/itre.cis.upenn.edu\/ myl\/languagelog\/archives\/005514.html."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/1599081.1599146"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqq013"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-5010"},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the AAAI Workshop on Learning for Text Categorization","volume":"752","author":"McCallum Andrew","year":"1998"},{"key":"e_1_2_1_47_1","unstructured":"Miniwatts Marketing Group. 2013. Internet World Users by Language. Retreived from http:\/\/www.internetworldstats.com\/stats7.htm.  Miniwatts Marketing Group. 2013. Internet World Users by Language. Retreived from http:\/\/www.internetworldstats.com\/stats7.htm."},{"volume-title":"Inference and Disputed Authorship: The Federalist","author":"Mosteller Frederick","key":"e_1_2_1_48_1"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2014.6841971"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2013.31"},{"key":"e_1_2_1_51_1","volume-title":"Proceedings of the International Conference on Language Resources and Evaluation (LREC'14)","volume":"14","author":"Pasha Arfath","year":"2014"},{"volume-title":"Programs for machine learning","author":"Quinlan John Ross","key":"e_1_2_1_52_1"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2016.7945818"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIInfS.2013.6732015"},{"volume-title":"Retrieved","year":"2015","author":"Rhodes Dylan","key":"e_1_2_1_55_1"},{"key":"e_1_2_1_56_1","first-page":"171","article-title":"Word-initial and word-final Ngram frequencies","volume":"10","author":"Rubin David C.","year":"1978","journal-title":"J. Literacy Res."},{"volume-title":"Breslin","year":"2016","author":"Ruder Sebastian","key":"e_1_2_1_57_1"},{"volume-title":"Proceedings of the Conference on Empirical Methods on Natural Language Processing (EMNLP\u201913)","year":"2013","author":"Schwartz Roy","key":"e_1_2_1_58_1"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/UKCI.2010.5625580"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2007.4424728"},{"volume-title":"Support Vector Machines","author":"Shmilovici Armin","key":"e_1_2_1_61_1"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-2106"},{"volume-title":"Natural Language Processing and Information Systems","author":"Silva Rui Sousa","key":"e_1_2_1_63_1"},{"key":"e_1_2_1_64_1","unstructured":"Steve Simon. 2005. When the F Test Is Significant but Tukey Is Not. Retrieved from http:\/\/www.pmean.com\/05\/TukeyTest.html.  Steve Simon. 2005. When the F Test Is Significant but Tukey Is Not. Retrieved from http:\/\/www.pmean.com\/05\/TukeyTest.html."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21001"},{"key":"e_1_2_1_66_1","unstructured":"Nick Taylor. 2015. Twitter and Open Data in Academia. Retrieved from https:\/\/twittercommunity.com\/t\/twitter-and-open-data-in-academia\/51934.  Nick Taylor. 2015. Twitter and Open Data in Academia. Retrieved from https:\/\/twittercommunity.com\/t\/twitter-and-open-data-in-academia\/51934."},{"key":"e_1_2_1_67_1","unstructured":"Twitter. 2017. Developer Agreement and Policy. Retrieved from https:\/\/dev.twitter.com\/overview\/terms\/agreement-and-policy  Twitter. 2017. Developer Agreement and Policy. Retrieved from https:\/\/dev.twitter.com\/overview\/terms\/agreement-and-policy"},{"volume-title":"Witten and Eibe Frank","year":"2005","author":"Ian","key":"e_1_2_1_68_1"},{"key":"e_1_2_1_69_1","unstructured":"Xiang Zhang Junbo Zhao and Yann LeCun. 2015. Character-level convolutional networks for text classification. In Advances in Neural Information Processing Systems. 649--657.   Xiang Zhang Junbo Zhao and Yann LeCun. 2015. Character-level convolutional networks for text classification. In Advances in Neural Information Processing Systems. 649--657."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.5555\/1115657.1115669"}],"container-title":["ACM Transactions on Asian and Low-Resource Language Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236391","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3236391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:39Z","timestamp":1750210779000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236391"}},"subtitle":["An Extensive Study on Twitter Posts"],"short-title":[],"issued":{"date-parts":[[2018,11,12]]},"references-count":70,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,3,31]]}},"alternative-id":["10.1145\/3236391"],"URL":"https:\/\/doi.org\/10.1145\/3236391","relation":{},"ISSN":["2375-4699","2375-4702"],"issn-type":[{"type":"print","value":"2375-4699"},{"type":"electronic","value":"2375-4702"}],"subject":[],"published":{"date-parts":[[2018,11,12]]},"assertion":[{"value":"2015-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-11-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}