{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T15:52:50Z","timestamp":1770565970231,"version":"3.49.0"},"reference-count":188,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T00:00:00Z","timestamp":1560816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2020,5,31]]},"abstract":"<jats:p>\n            Textual deception constitutes a major problem for online security. Many studies have argued that deceptiveness leaves traces in writing style, which could be detected using text classification techniques. By conducting an extensive literature review of existing empirical work, we demonstrate that while certain linguistic features have been indicative of deception in certain corpora, they fail to generalize across divergent semantic domains. We suggest that deceptiveness as such leaves no\n            <jats:italic>content-invariant stylistic trace<\/jats:italic>\n            , and textual similarity measures provide a superior means of classifying texts as potentially deceptive. Additionally, we discuss forms of deception beyond semantic content, focusing on hiding author identity by\n            <jats:italic>writing style obfuscation<\/jats:italic>\n            . Surveying the literature on both author identification and obfuscation techniques, we conclude that current style transformation methods fail to achieve reliable obfuscation while simultaneously ensuring semantic faithfulness to the original text. We propose that future work in style transformation should pay particular attention to disallowing semantically drastic changes.\n          <\/jats:p>","DOI":"10.1145\/3310331","type":"journal-article","created":{"date-parts":[[2019,6,19]],"date-time":"2019-06-19T12:05:38Z","timestamp":1560945938000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Text Analysis in Adversarial Settings"],"prefix":"10.1145","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1971-513X","authenticated-orcid":false,"given":"Tommi","family":"Gr\u00f6ndahl","sequence":"first","affiliation":[{"name":"Aalto University, Espoo, Finland"}]},{"given":"N.","family":"Asokan","sequence":"additional","affiliation":[{"name":"Aalto University, Espoo, Finland"}]}],"member":"320","published-online":{"date-parts":[[2019,6,18]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1344411.1344413"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.34"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.21"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660460.2660486"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1461928.1461959"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3054223"},{"key":"e_1_2_1_7_1","volume-title":"Working Notes of CLEF 2015 - Conference and Labs of the Evaluation Forum.","author":"Bagnall Douglas","year":"2015"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2016.7744427"},{"key":"e_1_2_1_9_1","volume-title":"A \u2018gay girl in Damascus","author":"Bennett Daniel"},{"key":"e_1_2_1_10_1","volume-title":"Longman Grammar of Spoken and Written English","author":"Biber Douglas"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3115\/1219044.1219075"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2307\/410284"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr1003_2"},{"key":"e_1_2_1_14_1","article-title":"Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity","volume":"15","author":"Brennan Michael","year":"2011","journal-title":"ACM Transactions on Information and System Security"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 21st Conference on Innovative Applications of Artificial Intelligence. 60--65","author":"Brennan Michael","year":"2009"},{"key":"e_1_2_1_16_1","volume-title":"Obaidat","author":"Brocardo Marcelo Luiz","year":"2017"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1996.tb00127.x"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1996.tb00129.x"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 1st NSF\/NIJ Conference on Intelligence and Security Informatics. Springer-Verlag","author":"Burgoon Judee K."},{"key":"e_1_2_1_20_1","volume-title":"Williams","author":"Burnap Pete","year":"2015"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/2.2.61"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2012.46"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the 3rd International Workshop on Social Data on the Web (SDoW\u201910)","author":"Cambria Erik","year":"2010"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2878632"},{"key":"e_1_2_1_25_1","volume-title":"3rd IEEE International Conference on Data Mining. 705--708","author":"Castro Antonio","year":"2013"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"key":"e_1_2_1_28_1","volume-title":"Pennebaker","author":"Chung Cindy K.","year":"2007"},{"key":"e_1_2_1_29_1","volume-title":"Hannon","author":"Clark Jonathan H.","year":"2007"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1070"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1093\/applin\/25.4.431"},{"key":"e_1_2_1_32_1","article-title":"Time for some traffic problems\u201d: Enhancing e-discovery and big data processing tools with linguistic methods for deception detection","volume":"9","author":"Crabb Erin Smith","year":"2014","journal-title":"Journal of Digital Forensics, Security and Law"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37256-8_37"},{"key":"e_1_2_1_34_1","volume-title":"Building Natural Language Generation Systems","author":"Dale Robert"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 11th Conference on Web and Social Media. 512--515","author":"Davidson Thomas","year":"2017"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568489"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604272"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-3348"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.129.1.74"},{"key":"e_1_2_1_40_1","volume-title":"BERT: Pre-training of deep bidirectional transformers for language understanding. CoRR abs\/1810.04805","author":"Devlin Jacob","year":"2018"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362394.2362400"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1002\/aris.1440380105"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.32614\/RJ-2016-007"},{"key":"e_1_2_1_44_1","volume-title":"Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage","author":"Ekman Paul","year":"1985"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/00332747.1969.11023575"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.46.9.913"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2007-619"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.03.003"},{"key":"e_1_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Christiane Fellbaum (Ed.). 1998. WordNet: An Electronic Lexical Database. MIT Press Cambridge.  Christiane Fellbaum (Ed.). 1998. WordNet: An Electronic Lexical Database. MIT Press Cambridge.","DOI":"10.7551\/mitpress\/7287.001.0001"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/2390665.2390708"},{"key":"e_1_2_1_51_1","first-page":"183","article-title":"Building a forensic corpus to test language-based indicators of deception","volume":"71","author":"Fitzpatrick Eileen","year":"2009","journal-title":"Language and Computers"},{"key":"e_1_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Eileen Fitzpatrick Joan Bachenko and Tommaso Fornaciari. 2015. Automatic Detection of Verbal Deception. Morgan 8 Claypool.   Eileen Fitzpatrick Joan Bachenko and Tommaso Fornaciari. 2015. Automatic Detection of Verbal Deception. Morgan 8 Claypool.","DOI":"10.1007\/978-3-031-02158-9"},{"key":"e_1_2_1_53_1","volume-title":"A Mainstream in European Literature","author":"Fokkema Douwe"},{"key":"e_1_2_1_54_1","volume-title":"Carlos Laorden G\u00f3mez, Igor Santos, and Pablo Garc\u00eda Bringas.","author":"Gal\u00e1n-Garc\u00eda Patxi","year":"2014"},{"key":"e_1_2_1_55_1","volume-title":"Benjamin Van Durme, and Chris Callison-Burch","author":"Ganitkevitch Juri","year":"2013"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005710005970604"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijmue.2015.10.4.21"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/3176748.3176757"},{"key":"e_1_2_1_59_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in Neural Information Processing Systems 27 (NIPS). 2672--2680.   Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in Neural Information Processing Systems 27 (NIPS). 2672--2680."},{"key":"e_1_2_1_60_1","volume-title":"Studies in the Way of Words","author":"Grice Paul"},{"key":"e_1_2_1_61_1","volume-title":"Quantitative authorship attribution: An evaluation of techniques. Literary and Linguistic Computing 22, 3","author":"Grieve Jack","year":"2007"},{"key":"e_1_2_1_62_1","volume-title":"Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security (AISec\u201911)","author":"Gr\u00f6ndahl Tommi"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/01638530701739181"},{"key":"e_1_2_1_64_1","volume-title":"Hancock","author":"Markowitz David M.","year":"2014"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqm023"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-2057"},{"key":"e_1_2_1_67_1","volume-title":"Fine-tuned language models for text classification. CoRR abs\/1801.06146","author":"Howard Jeremy","year":"2018"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.11.002"},{"key":"e_1_2_1_69_1","volume-title":"Proceedings of the International Conference on Machine Learning (ICML\u201917)","author":"Hu Zhiting"},{"key":"e_1_2_1_70_1","first-page":"267","article-title":"The pragmatics of swearing","volume":"4","author":"Jay Timothy","year":"2008","journal-title":"Journal of Politeness Research. Language, Behaviour, Culture"},{"key":"e_1_2_1_71_1","volume-title":"Proceedings of the 2004 Joint International Conference of the Association for Literary and Linguistic Computing and the Association for Computers and the Humanities (ALLC\/ACH\u201904)","author":"Juola Patrick","year":"2004"},{"key":"e_1_2_1_72_1","article-title":"JGAAP: A system for comparative evaluation of authorship attribution","volume":"1","author":"Juola Patrick","year":"2009","journal-title":"Journal of Digital Humanities and Computer Science"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1080\/0013838X.2012.668792"},{"key":"e_1_2_1_74_1","first-page":"287","article-title":"Stylometry and immigration: A case study","volume":"21","author":"Juola Patrick","year":"2013","journal-title":"Journal of Law and Policy"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fql019"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866423.1866427"},{"key":"e_1_2_1_77_1","volume-title":"Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS\u201918)","author":"Juuti Mika"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.5555\/1273073.1273131"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65813-1_18"},{"key":"e_1_2_1_80_1","volume-title":"Centers for Advanced Studies Conference. 17--20","author":"Parambir"},{"key":"e_1_2_1_81_1","volume-title":"CLEF 2016 Evaluation Labs and Workshop -- Working Notes Papers, Krisztian Balog, Linda Cappellato, Nicola Ferro, and Craig Macdonald (Eds.).","author":"Keswani Yashwant","year":"2016"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.5555\/2227976.2227980"},{"key":"e_1_2_1_83_1","volume-title":"Proceedings of the Digital Humanities. 177--181","author":"Khosmood Foaad","year":"2009"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2010.153"},{"key":"e_1_2_1_85_1","volume-title":"Machine Learning: 15th European Conference on Machine Learning (ECML\u201904)","author":"Klimt Bryan","year":"2004"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1979.tb00640.x"},{"key":"e_1_2_1_87_1","volume-title":"Europarl: A parallel corpus for statistical machine translation. In MT Summit. 79--86.","author":"Koehn Philipp","year":"2005"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.5555\/1557769.1557821"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015448"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010478226705"},{"key":"e_1_2_1_91_1","volume-title":"Language in Use: Readings in Sociolinguistics","author":"Labov William"},{"key":"e_1_2_1_92_1","volume-title":"Eady","author":"Clayton Lafferty J.","year":"1974"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-679X.2012.00450.x"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070710.2070716"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2009.23.1.24"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/318723.318728"},{"key":"e_1_2_1_97_1","volume-title":"Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing (EMNLP\u201913)","author":"Li Jiwei","year":"2013"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1147"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1421"},{"key":"e_1_2_1_100_1","volume-title":"Proceedings of the 32nd Annual Conference of the Cognitive Science Society. 961--966","author":"Louwerse Max","year":"2010"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:CHUM.0000031185.88395.b1"},{"key":"e_1_2_1_102_1","volume-title":"Proceedings of the 2nd Conference on Email and Anti-Spam (CEAS\u201905)","author":"Lowd Daniel","year":"2005"},{"key":"e_1_2_1_103_1","volume-title":"Manning","author":"Luong Minh-Thang","year":"2015"},{"key":"e_1_2_1_104_1","unstructured":"Wicenty Lutoslawski. 1898. Principes de stylometrie. E. Leroux.  Wicenty Lutoslawski. 1898. Principes de stylometrie. E. Leroux."},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJMLC.2015.V5.543"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1162\/coli_a_00002"},{"key":"e_1_2_1_107_1","volume-title":"CLEF 2016 Evaluation Labs and Workshop -- Working Notes Papers, Krisztian Balog, Linda Cappellato, Nicola Ferro, and Craig Macdonald (Eds.).","author":"Mansoorizadeh Muharram","year":"2016"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31865-1_22"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_16"},{"key":"e_1_2_1_110_1","volume-title":"McMenamin and Dongdoo Choi","author":"Gerald","year":"2002"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-3638"},{"key":"e_1_2_1_112_1","volume-title":"The characteristic curves of composition. Science IX","author":"Mendenhall Thomas Corwin","year":"1887"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.5555\/1667583.1667679"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/K15-1032"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-2065"},{"key":"e_1_2_1_116_1","volume-title":"CLEF 2016. In CLEF 2016 Evaluation Labs and Workshop -- Working Notes Papers, Krisztian Balog, Linda Cappellato, Nicola Ferro, and Craig Macdonald (Eds.).","author":"Mihaylova Tsvetomila","year":"2016"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"e_1_2_1_118_1","volume-title":"Wallace","author":"Mosteller Frederick","year":"1964"},{"key":"e_1_2_1_119_1","volume-title":"Proceedings of the 7th International Conference on Weblogs and Social Media (ICWSM\u201913)","author":"Mukherjee Arjun"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1041"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.46"},{"key":"e_1_2_1_122_1","volume-title":"Unsupervised spam detection based on string alienness measures. Discovery Science","author":"Narisawa Kazuyuki","year":"2007"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132039"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167203029005010"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883062"},{"key":"e_1_2_1_126_1","volume-title":"A survey on natural language processing for fake news detection. CoRR abs\/1811.00770","author":"Oshikawa Ray","year":"2018"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1515\/applirev-2015-0014"},{"key":"e_1_2_1_128_1","volume-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies (ACL-HLT\u201911)","author":"Ott Myle"},{"key":"e_1_2_1_129_1","volume-title":"Hancock","author":"Ott Myle","year":"2013"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0021"},{"key":"e_1_2_1_131_1","volume-title":"Francis","author":"Pennebaker James W.","year":"2007"},{"key":"e_1_2_1_132_1","volume-title":"Proceedings of the 27th International Conference on Computational Linguistics. 3391--3401","author":"P\u00e9rez-Rosas Ver\u00f3nica","year":"2018"},{"key":"e_1_2_1_133_1","doi-asserted-by":"crossref","volume-title":"Complete syntactic N-grams as style markers for authorship attribution","author":"Posadas-Duran Juan-Pablo","DOI":"10.1007\/978-3-319-13647-9_2"},{"key":"e_1_2_1_134_1","volume-title":"Jakob K\u00f6hler, Winfried L\u00f6tzsch, Fabian M\u00fcller, Maike Elisa M\u00fcller, Robert Pa\u00dfmann","author":"Potthast Martin","year":"2016"},{"key":"e_1_2_1_135_1","volume-title":"CLEF 2016 Working Notes.","author":"Potthast Martin","year":"2016"},{"key":"e_1_2_1_136_1","volume-title":"Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Long Papers). 866--876","author":"Prabhumoye Shrimai"},{"key":"e_1_2_1_137_1","volume-title":"Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics. 1074--1084","author":"Rabinovich Ella","year":"2016"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIInfS.2013.6732015"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.5555\/1858842.1858850"},{"key":"e_1_2_1_140_1","volume-title":"Proceedings of the ACL SENSEVAL. 217--221","author":"Ramakrishnan Ganesh","year":"2004"},{"key":"e_1_2_1_141_1","volume-title":"Proceedings of the International Conference on Artificial Intelligence (IC-AI\u201904)","volume":"2","author":"Ramyaa Congzhou He","year":"2004"},{"key":"e_1_2_1_142_1","volume-title":"9th USENIX Security Symposium, Steven M. Bellovin and Gregory G. (Eds.).","author":"Josyula"},{"key":"e_1_2_1_143_1","volume-title":"Tetreault","author":"Rao Sudha","year":"2018"},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"e_1_2_1_145_1","first-page":"295","article-title":"Grammatical word class variation within the British national corpus sampler","volume":"36","author":"Rayson Paul","year":"2001","journal-title":"Language and Computers"},{"key":"e_1_2_1_146_1","volume-title":"Proceedings of the 25th European Conference on Information Systems (ECIS\u201917)","author":"Rinta-Kahila Tapani","year":"2017"},{"key":"e_1_2_1_147_1","volume-title":"The SAGE Handbook of Social Media Research Methods, Luke Sloan and Anabel Quan-Haase (Eds.)","author":"Rubin Victoria L."},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1001018624850"},{"key":"e_1_2_1_149_1","volume-title":"Proceedings of the Digital Humanities. 217--219","author":"Rudman Joseph","year":"2010"},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1086\/214279"},{"key":"e_1_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-1101"},{"key":"e_1_2_1_153_1","volume-title":"Proceedings of the 18th International Conference on Information Fusion. 792--799","author":"Seah Chun Wei","year":"2015"},{"key":"e_1_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1080\/14792779143000006"},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1005"},{"key":"e_1_2_1_156_1","volume-title":"Proceedings of Neural Information Processing Systems (NIPS\u201917)","author":"Shen Tianxiao","year":"2017"},{"key":"e_1_2_1_157_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX Security\u201918)","author":"Shetty Rakshith","year":"2018"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.5555\/1873738.1873755"},{"key":"e_1_2_1_159_1","volume-title":"Proceedings of the 13th European Workshop on Natural Language Generation. 2--11","author":"Siddharthan Advaith","year":"2011"},{"key":"e_1_2_1_160_1","volume-title":"Technical Report AMRL-TR-66-22. Aerospace Medical Division, Wright-Paterson AFB, Ohio.","author":"Smith Edgar A.","year":"1967"},{"key":"e_1_2_1_161_1","volume-title":"Proceedings of the Workshop on Language in Social Media. 59--68","author":"Solorio Thamar","year":"2013"},{"key":"e_1_2_1_162_1","volume-title":"Relevance: Communication and Cognition","author":"Sperber Dan","year":"1995","edition":"2"},{"key":"e_1_2_1_163_1","doi-asserted-by":"publisher","DOI":"10.5555\/1527090.1527102"},{"key":"e_1_2_1_164_1","doi-asserted-by":"crossref","unstructured":"K. Surendran O. P. Harilal Hrudya Poroli Prabaharan Poornachandran and N. K. Suchetha. 2017. Stylometry detection using deep learning. In Computational Intelligence in Data Mining. 749--757.  K. Surendran O. P. Harilal Hrudya Poroli Prabaharan Poornachandran and N. K. Suchetha. 2017. Stylometry detection using deep learning. In Computational Intelligence in Data Mining. 749--757.","DOI":"10.1007\/978-981-10-3874-7_71"},{"key":"e_1_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X09351676"},{"key":"e_1_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2011.01619.x"},{"key":"e_1_2_1_167_1","first-page":"231","article-title":"Unsupervised spam detection by document probability estimation with maximal overlap method","volume":"6","author":"Uemura Takashi","year":"2011","journal-title":"Information and Media Technologies"},{"key":"e_1_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1080\/09296170500055350"},{"key":"e_1_2_1_169_1","volume-title":"Proceedings of the 21st International Conference on World Wide Web (WWW\u201912)","author":"Wang Gand"},{"key":"e_1_2_1_170_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2013"},{"key":"e_1_2_1_171_1","volume-title":"Google\u2019s neural machine translation system: Bridging the gap between human and machine translation. CoRR abs\/1609.08144","author":"Wu Yonghui","year":"2016"},{"key":"e_1_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.3115\/981732.981751"},{"key":"e_1_2_1_173_1","volume-title":"Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics (ACL\u201912)","author":"Wubben Sander"},{"key":"e_1_2_1_174_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052591"},{"key":"e_1_2_1_175_1","doi-asserted-by":"publisher","DOI":"10.1145\/2346676.2346686"},{"key":"e_1_2_1_176_1","volume-title":"Proceedings of COLING. 2899--2914","author":"Xu Wei","year":"2012"},{"key":"e_1_2_1_177_1","doi-asserted-by":"publisher","DOI":"10.5555\/2832249.2832350"},{"key":"e_1_2_1_178_1","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201917)","author":"Yao Yuanshun"},{"key":"e_1_2_1_179_1","volume-title":"Information and Communication Technologies in Tourism 2009: Proceedings of the International Conference","author":"Yoo Kyung-Hyan"},{"key":"e_1_2_1_180_1","volume-title":"Recent trends in deep learning based natural language processing. CoRR abs\/1708.02709","author":"Young Tom","year":"2017"},{"key":"e_1_2_1_181_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93417-4_48"},{"key":"e_1_2_1_182_1","doi-asserted-by":"publisher","DOI":"10.1007\/11562382_14"},{"key":"e_1_2_1_183_1","doi-asserted-by":"publisher","DOI":"10.5555\/1115657.1115669"},{"key":"e_1_2_1_184_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:GRUP.0000011944.62889.6f"},{"key":"e_1_2_1_185_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2004.11045779"},{"key":"e_1_2_1_186_1","volume-title":"Twitchell","author":"Zhou Lina","year":"2010"},{"key":"e_1_2_1_187_1","volume-title":"Proceedings of the 36th Hawaii International Conference on Systems Science.","author":"Zhou Lina"},{"key":"e_1_2_1_188_1","volume-title":"19th IEEE International Conference on Tools with Artificial Intelligence (ICTAI\u201907)","author":"Zhou Yan"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3310331","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3310331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:36Z","timestamp":1750204416000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3310331"}},"subtitle":["Does Deception Leave a Stylistic Trace?"],"short-title":[],"issued":{"date-parts":[[2019,6,18]]},"references-count":188,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,5,31]]}},"alternative-id":["10.1145\/3310331"],"URL":"https:\/\/doi.org\/10.1145\/3310331","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,18]]},"assertion":[{"value":"2017-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}