{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:15:49Z","timestamp":1750220149876,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3535511.3535515","type":"proceedings-article","created":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T19:57:19Z","timestamp":1656619039000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Authorship Attribution with Temporal Data in Reddit"],"prefix":"10.1145","author":[{"given":"Guilherme Ramos","family":"Casimiro","sequence":"first","affiliation":[{"name":"School of Arts, Sciences and Humanities, University of Sao Paulo, Brazil"}]},{"given":"Luciano Antonio","family":"Digiampietri","sequence":"additional","affiliation":[{"name":"School of Arts, Sciences and Humanities, University of Sao Paulo, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2022,6,30]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"5","article-title":"Applying authorship analysis to extremist-group Web forum messages","volume":"20","author":"Abbasi A.","year":"2005","unstructured":"A. Abbasi and H. Chen . 2005 . Applying authorship analysis to extremist-group Web forum messages . IEEE Intelligent Systems 20 , 5 (Sep. 2005), 67\u201375. https:\/\/doi.org\/10.1109\/MIS.2005.81 A. Abbasi and H. Chen. 2005. Applying authorship analysis to extremist-group Web forum messages. IEEE Intelligent Systems 20, 5 (Sep. 2005), 67\u201375. https:\/\/doi.org\/10.1109\/MIS.2005.81","journal-title":"IEEE Intelligent Systems"},{"volume-title":"Machine learning for text","author":"Aggarwal C","key":"e_1_3_2_1_2_1","unstructured":"Charu\u00a0 C Aggarwal . 2018. Machine learning for text . Springer . Charu\u00a0C Aggarwal. 2018. Machine learning for text. Springer."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3233397.3233483"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767799"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2017.8284311"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Jason Baumgartner. 2019. Pushshift Reddit comments. https:\/\/files.pushshift.io\/reddit\/comments\/  Jason Baumgartner. 2019. Pushshift Reddit comments. https:\/\/files.pushshift.io\/reddit\/comments\/","DOI":"10.1609\/icwsm.v14i1.7347"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411564.3411616"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2766189"},{"key":"e_1_3_2_1_9_1","volume-title":"2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM","author":"M.","year":"2013","unstructured":"S.\u00a0E.\u00a0 M. El Bouanani and I. Kassou. 2013. Using lexicometry and vocabulary analysis techniques to detect a signature for web profile . In 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013 ). 1494\u20131498. https:\/\/doi.org\/10.1145\/2492517.2558568 S.\u00a0E.\u00a0M. El Bouanani and I. Kassou. 2013. Using lexicometry and vocabulary analysis techniques to detect a signature for web profile. In 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013). 1494\u20131498. https:\/\/doi.org\/10.1145\/2492517.2558568"},{"volume-title":"Deep learning","author":"Goodfellow Ian","key":"e_1_3_2_1_10_1","unstructured":"Ian Goodfellow , Yoshua Bengio , and Aaron Courville . 2016. Deep learning . MIT press . Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep learning. MIT press."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3104050"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148304"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2010.17"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180451"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342827.3342834"},{"key":"e_1_3_2_1_16_1","volume-title":"Fourth International AAAI Conference on Weblogs and Social Media.","author":"O\u2019Connor Brendan","year":"2010","unstructured":"Brendan O\u2019Connor , Ramnath Balasubramanyan , Bryan\u00a0 R Routledge , and Noah\u00a0 A Smith . 2010 . From tweets to polls: Linking text sentiment to public opinion time series . In Fourth International AAAI Conference on Weblogs and Social Media. Brendan O\u2019Connor, Ramnath Balasubramanyan, Bryan\u00a0R Routledge, and Noah\u00a0A Smith. 2010. From tweets to polls: Linking text sentiment to public opinion time series. In Fourth International AAAI Conference on Weblogs and Social Media."},{"key":"e_1_3_2_1_17_1","volume-title":"2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM","author":"Perez C.","year":"2013","unstructured":"C. Perez , B. Birregah , R. Layton , M. Lemercier , and P. Watters . 2013. REPLOT: Retrieving profile links on Twitter for suspicious networks detection . In 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013 ). 1307\u20131314. https:\/\/doi.org\/10.1145\/2492517.2500234 C. Perez, B. Birregah, R. Layton, M. Lemercier, and P. Watters. 2013. REPLOT: Retrieving profile links on Twitter for suspicious networks detection. In 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013). 1307\u20131314. https:\/\/doi.org\/10.1145\/2492517.2500234"},{"key":"e_1_3_2_1_18_1","volume-title":"Building the Semantic Similarity Model for Social Network Data Streams. In 2018 IEEE Second International Conference on Data Stream Mining Processing (DSMP). 21\u201324","author":"Petrasova S.","year":"2018","unstructured":"S. Petrasova , N. Khairova , and W. Lewoniewski . 2018 . Building the Semantic Similarity Model for Social Network Data Streams. In 2018 IEEE Second International Conference on Data Stream Mining Processing (DSMP). 21\u201324 . https:\/\/doi.org\/10.1109\/DSMP. 2018 .8478480 S. Petrasova, N. Khairova, and W. Lewoniewski. 2018. Building the Semantic Similarity Model for Social Network Data Streams. In 2018 IEEE Second International Conference on Data Stream Mining Processing (DSMP). 21\u201324. https:\/\/doi.org\/10.1109\/DSMP.2018.8478480"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"S.\u00a0R. Pillay and T. Solorio. 2010. Authorship attribution of web forum posts. In 2010 eCrime Researchers Summit. 1\u20137. https:\/\/doi.org\/10.1109\/ecrime.2010.5706693  S.\u00a0R. Pillay and T. Solorio. 2010. Authorship attribution of web forum posts. In 2010 eCrime Researchers Summit. 1\u20137. https:\/\/doi.org\/10.1109\/ecrime.2010.5706693","DOI":"10.1109\/ecrime.2010.5706693"},{"key":"e_1_3_2_1_20_1","volume-title":"2013 IEEE 14th International Conference on Information Reuse Integration (IRI). 497\u2013503","author":"Seker E.","year":"2013","unstructured":"S.\u00a0 E. Seker , K. Al-Naami , and L. Khan . 2013. Author attribution on streaming data . In 2013 IEEE 14th International Conference on Information Reuse Integration (IRI). 497\u2013503 . https:\/\/doi.org\/10.1109\/IRI. 2013 .6642511 S.\u00a0E. Seker, K. Al-Naami, and L. Khan. 2013. Author attribution on streaming data. In 2013 IEEE 14th International Conference on Information Reuse Integration (IRI). 497\u2013503. https:\/\/doi.org\/10.1109\/IRI.2013.6642511"},{"key":"e_1_3_2_1_21_1","volume-title":"Authorship Analysis on Dark Marketplace Forums. In 2015 European Intelligence and Security Informatics Conference. 1\u20138. https:\/\/doi.org\/10","author":"Spitters M.","year":"2015","unstructured":"M. Spitters , F. Klaver , G. Koot , and M. v. Staalduinen . 2015 . Authorship Analysis on Dark Marketplace Forums. In 2015 European Intelligence and Security Informatics Conference. 1\u20138. https:\/\/doi.org\/10 .1109\/EISIC.2015.47 M. Spitters, F. Klaver, G. Koot, and M. v. Staalduinen. 2015. Authorship Analysis on Dark Marketplace Forums. In 2015 European Intelligence and Security Informatics Conference. 1\u20138. https:\/\/doi.org\/10.1109\/EISIC.2015.47"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1527090.1527102"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2017.8122650"},{"key":"e_1_3_2_1_24_1","volume-title":"Authorship Identification for Online Text. In 2010 International Conference on Cyberworlds. 155\u2013162","author":"Tan R.","year":"2010","unstructured":"R.\u00a0H.\u00a0 R. Tan and F.\u00a0 S. Tsai . 2010 . Authorship Identification for Online Text. In 2010 International Conference on Cyberworlds. 155\u2013162 . https:\/\/doi.org\/10.1109\/CW.2010.50 R.\u00a0H.\u00a0R. Tan and F.\u00a0S. Tsai. 2010. Authorship Identification for Online Text. In 2010 International Conference on Cyberworlds. 155\u2013162. https:\/\/doi.org\/10.1109\/CW.2010.50"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/URTC.2016.8361150"}],"event":{"name":"SBSI: XVIII Brazilian Symposium on Information Systems","acronym":"SBSI","location":"Curitiba Brazil"},"container-title":["XVIII Brazilian Symposium on Information Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3535511.3535515","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3535511.3535515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:08Z","timestamp":1750186808000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3535511.3535515"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":25,"alternative-id":["10.1145\/3535511.3535515","10.1145\/3535511"],"URL":"https:\/\/doi.org\/10.1145\/3535511.3535515","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-06-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}