{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:34:18Z","timestamp":1759336458572,"version":"3.40.5"},"reference-count":59,"publisher":"Walter de Gruyter GmbH","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4,26]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Authorship verification is the task of determining whether two texts were written by the same author based on a writing style analysis. Author obfuscation is the adversarial task of preventing a successful verification by altering a text\u2019s style so that it does not resemble that of its original author anymore. This paper introduces new algorithms for both tasks and reports on a comprehensive evaluation to ascertain the merits of the state of the art in authorship verification to withstand obfuscation.<\/jats:p>\n               <jats:p>After introducing a new generalization of the well-known unmasking algorithm for short texts, thus completing our collection of state-of-the-art algorithms for verification, we introduce an approach that (1) models writing style difference as the Jensen-Shannon distance between the character n-gram distributions of texts, and (2) manipulates an author\u2019s writing style in a sophisticated manner using heuristic search. For obfuscation, we explore the huge space of textual variants in order to find a paraphrased version of the to-be-obfuscated text that has a sufficiently high Jensen-Shannon distance at minimal costs in terms of text quality loss. We analyze, quantify, and illustrate the rationale of this approach, define paraphrasing operators, derive text length-invariant thresholds for termination, and develop an effective obfuscation framework. Our authorship obfuscation approach defeats the presented state-of-the-art verification approaches, while keeping text changes at a minimum. As a final contribution, we discuss and experimentally evaluate a reverse obfuscation attack against our obfuscation approach as well as possible remedies.<\/jats:p>","DOI":"10.1515\/itit-2019-0046","type":"journal-article","created":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T09:03:37Z","timestamp":1583226217000},"page":"99-115","source":"Crossref","is-referenced-by-count":2,"title":["On divergence-based author obfuscation: An attack on the state of the art in statistical authorship verification"],"prefix":"10.1515","volume":"62","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3797-0559","authenticated-orcid":false,"given":"Janek","family":"Bevendorff","sequence":"first","affiliation":[{"name":"Bauhaus-Universit\u00e4t Weimar , Weimar , Germany"}]},{"given":"Tobias","family":"Wenzel","sequence":"additional","affiliation":[{"name":"Leipzig University , Leipzig , Germany"}]},{"given":"Martin","family":"Potthast","sequence":"additional","affiliation":[{"name":"Leipzig University , Leipzig , Germany"}]},{"given":"Matthias","family":"Hagen","sequence":"additional","affiliation":[{"name":"Martin-Luther-Universit\u00e4t Halle-Wittenberg , Halle , Germany"}]},{"given":"Benno","family":"Stein","sequence":"additional","affiliation":[{"name":"Bauhaus-Universit\u00e4t Weimar , Weimar , Germany"}]}],"member":"374","published-online":{"date-parts":[[2020,3,3]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"A. Abbasi and H. Chen. Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst., 26 (2): 7:1\u20137:29, Apr. 2008.","key":"2021062215161418504_j_itit-2019-0046_ref_001_w2aab3b8d353b1b7b1ab2ab1Aa","DOI":"10.1145\/1344411.1344413"},{"unstructured":"D. Bagnall. Author Identification using multi-headed Recurrent Neural Networks\u2014Notebook for PAN at CLEF 2015. In CLEF 2015 Evaluation Labs and Workshop\u2014Working Notes Papers.","key":"2021062215161418504_j_itit-2019-0046_ref_002_w2aab3b8d353b1b7b1ab2ab2Aa"},{"doi-asserted-by":"crossref","unstructured":"J. Bevendorff, M. Potthast, M. Hagen, and B. Stein. Heuristic Authorship Obfuscation. In 57th Annual Meeting of the Association for Computational Linguistics (ACL 2019), pages 1098\u20131108. Association for Computational Linguistics, July 2019.","key":"2021062215161418504_j_itit-2019-0046_ref_003_w2aab3b8d353b1b7b1ab2ab3Aa","DOI":"10.18653\/v1\/P19-1104"},{"doi-asserted-by":"crossref","unstructured":"J. Bevendorff, B. Stein, M. Hagen, and M. Potthast. Generalizing Unmasking for Short Texts. In 14th Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL 2019), pages 654\u2013659. Association for Computational Linguistics, June 2019.","key":"2021062215161418504_j_itit-2019-0046_ref_004_w2aab3b8d353b1b7b1ab2ab4Aa","DOI":"10.18653\/v1\/N19-1068"},{"doi-asserted-by":"crossref","unstructured":"J. Bevendorff, B. Stein, M. Hagen, and M. Potthast. Bias Analysis and Mitigation in the Evaluation of Authorship Verification. In 57th Annual Meeting of the Association for Computational Linguistics (ACL 2019), pages 6301\u20136306. Association for Computational Linguistics, July 2019.","key":"2021062215161418504_j_itit-2019-0046_ref_005_w2aab3b8d353b1b7b1ab2ab5Aa","DOI":"10.18653\/v1\/P19-1634"},{"unstructured":"H. Bo, S.\u2009H.\u2009H. Ding, B.\u2009C.\u2009M. Fung, and F. Iqbal. ER-AE: differentially-private text generation for authorship anonymization. CoRR, abs\/1907.08736, 2019.","key":"2021062215161418504_j_itit-2019-0046_ref_006_w2aab3b8d353b1b7b1ab2ab6Aa"},{"doi-asserted-by":"crossref","unstructured":"B.\u2009T. Boenninghoff, S. Hessler, D. Kolossa, and R.\u2009M. Nickel. Explainable authorship verification in social media via attention-based similarity learning. CoRR, abs\/1910.08144, 2019.","key":"2021062215161418504_j_itit-2019-0046_ref_007_w2aab3b8d353b1b7b1ab2ab7Aa","DOI":"10.1109\/BigData47090.2019.9005650"},{"doi-asserted-by":"crossref","unstructured":"D. Boumber, Y. Zhang, M. Hosseinia, and A. Mukherjee. Robust Authorship Verification with Transfer Learning, 2019.","key":"2021062215161418504_j_itit-2019-0046_ref_008_w2aab3b8d353b1b7b1ab2ab8Aa","DOI":"10.29007\/9nf3"},{"doi-asserted-by":"crossref","unstructured":"E.\u2009G. Bourne. The authorship of the federalist. The American Historical Review, 2 (3): 443\u2013460, 1897.","key":"2021062215161418504_j_itit-2019-0046_ref_009_w2aab3b8d353b1b7b1ab2ab9Aa","DOI":"10.2307\/1833399"},{"doi-asserted-by":"crossref","unstructured":"M. Brennan, S. Afroz, and R. Greenstadt. Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity. ACM Trans. Inf. Syst. Secur., 15 (3): 12, 2012.","key":"2021062215161418504_j_itit-2019-0046_ref_010_w2aab3b8d353b1b7b1ab2ac10Aa","DOI":"10.1145\/2382448.2382450"},{"unstructured":"P.\u2009F. Brown, S.\u2009D. Pietra, V.\u2009J.\u2009D. Pietra, J.\u2009C. Lai, and R.\u2009L. Mercer. An estimate of an upper bound for the entropy of English. Computational Linguistics, 18 (1): 31\u201340, 1992.","key":"2021062215161418504_j_itit-2019-0046_ref_011_w2aab3b8d353b1b7b1ab2ac11Aa"},{"unstructured":"D. Castro, Y. Adame, M. Pelaez, and R. Mu\u00f1oz. Authorship Verification, Combining Linguistic Features and Different Similarity Functions\u2014Notebook for PAN at CLEF 2015. In CLEF 2015 Evaluation Labs and Workshop\u2014Working Notes Papers.","key":"2021062215161418504_j_itit-2019-0046_ref_012_w2aab3b8d353b1b7b1ab2ac12Aa"},{"unstructured":"C. Emmery, E.\u2009M. Ar\u00e9valo, and G. Chrupala. Style obfuscation by invariance. In Proceedings of the 27th International Conference on Computational Linguistics, COLING 2018, Santa Fe, New Mexico, USA, August 20\u201326, 2018, pages 984\u2013996, 2018.","key":"2021062215161418504_j_itit-2019-0046_ref_013_w2aab3b8d353b1b7b1ab2ac13Aa"},{"doi-asserted-by":"crossref","unstructured":"D.\u2009M. Endres and J.\u2009E. Schindelin. A new metric for probability distributions. IEEE Trans. Information Theory, 49 (7): 1858\u20131860, 2003.","key":"2021062215161418504_j_itit-2019-0046_ref_014_w2aab3b8d353b1b7b1ab2ac14Aa","DOI":"10.1109\/TIT.2003.813506"},{"unstructured":"J. Fr\u00e9ry, C. Largeron, and M. Juganaru-Mathieu. UJM at CLEF in Author Identification\u2014Notebook for PAN at CLEF 2014. In CLEF 2014 Evaluation Labs and Workshop\u2014Working Notes Papers.","key":"2021062215161418504_j_itit-2019-0046_ref_015_w2aab3b8d353b1b7b1ab2ac15Aa"},{"unstructured":"D. Grangier and M. Auli. Quickedit: Editing text & translations via simple delete actions. CoRR, abs\/1711.04805, 2017.","key":"2021062215161418504_j_itit-2019-0046_ref_016_w2aab3b8d353b1b7b1ab2ac16Aa"},{"unstructured":"K. Guu, T.\u2009B. Hashimoto, Y. Oren, and P. Liang. Generating sentences by editing prototypes. CoRR, abs\/1709.08878, 2017.","key":"2021062215161418504_j_itit-2019-0046_ref_017_w2aab3b8d353b1b7b1ab2ac17Aa"},{"unstructured":"M. Hagen, M. Potthast, and B. Stein. Overview of the Author Obfuscation Task at PAN 2017: Safety Evaluation Revisited. In Working Notes Papers of the CLEF 2017 Evaluation Labs, volume 1866 of CEUR Workshop Proceedings.","key":"2021062215161418504_j_itit-2019-0046_ref_018_w2aab3b8d353b1b7b1ab2ac18Aa"},{"unstructured":"O. Halvani, C. Winter, and L. Graner. Authorship verification based on compression-models. CoRR, abs\/1706.00516, 2017.","key":"2021062215161418504_j_itit-2019-0046_ref_019_w2aab3b8d353b1b7b1ab2ac19Aa"},{"doi-asserted-by":"crossref","unstructured":"O. Halvani, C. Winter, and L. Graner. Assessing the applicability of authorship verification methods. In Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26\u201329, 2019, pages 38:1\u201338:10, 2019.","key":"2021062215161418504_j_itit-2019-0046_ref_020_w2aab3b8d353b1b7b1ab2ac20Aa","DOI":"10.1145\/3339252.3340508"},{"unstructured":"P.\u2009G. Howard. The design and analysis of efficient lossless data compression systems. Brown University, 1993.","key":"2021062215161418504_j_itit-2019-0046_ref_021_w2aab3b8d353b1b7b1ab2ac21Aa"},{"doi-asserted-by":"crossref","unstructured":"F. Iqbal, R. Hadjidj, B.\u2009C. Fung, and M. Debbabi. A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digital Investigation, 5: S42\u2013S51, 2008.","key":"2021062215161418504_j_itit-2019-0046_ref_022_w2aab3b8d353b1b7b1ab2ac22Aa","DOI":"10.1016\/j.diin.2008.05.001"},{"doi-asserted-by":"crossref","unstructured":"P. Juola. Authorship Attribution. Foundations and Trends Information Retrieval, 1 (3): 233\u2013334, Dec. 2006.","key":"2021062215161418504_j_itit-2019-0046_ref_023_w2aab3b8d353b1b7b1ab2ac23Aa","DOI":"10.1561\/1500000005"},{"unstructured":"P. Juola and E. Stamatatos. Overview of the Author Identification Task at PAN 2013. In P. Forner, R. Navigli, and D. Tufis, editors, CLEF 2013 Evaluation Labs and Workshop\u2014Working Notes Papers, 23\u201326 September, Valencia, Spain. CEUR-WS.org, Sept. 2013.","key":"2021062215161418504_j_itit-2019-0046_ref_024_w2aab3b8d353b1b7b1ab2ac24Aa"},{"doi-asserted-by":"crossref","unstructured":"P. Juola and D. Vescovi. Analyzing Stylometric Approaches to Author Obfuscation. In Advances in Digital Forensics VII\u20147th IFIP WG 11.9 International Conference on Digital Forensics, Revised Selected Papers, Orlando, FL, USA, January 31\u2013February 2, 2011, volume 361 of IFIP Advances in Information and Communication Technology, pages 115\u2013125.","key":"2021062215161418504_j_itit-2019-0046_ref_025_w2aab3b8d353b1b7b1ab2ac25Aa","DOI":"10.1007\/978-3-642-24212-0_9"},{"doi-asserted-by":"crossref","unstructured":"G. Kacmarcik and M. Gamon. Obfuscating Document Stylometry to Preserve Author Anonymity. In ACL 2006, 21st International Conference on Computational Linguistics and 44th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference, Sydney, Australia, 17\u201321 July 2006.","key":"2021062215161418504_j_itit-2019-0046_ref_026_w2aab3b8d353b1b7b1ab2ac26Aa","DOI":"10.3115\/1273073.1273131"},{"doi-asserted-by":"crossref","unstructured":"M. Kestemont, K. Luyckx, W. Daelemans, and T. Crombez. Cross-genre authorship verification using unmasking. English Studies, 93 (3): 340\u2013356, 2012.","key":"2021062215161418504_j_itit-2019-0046_ref_027_w2aab3b8d353b1b7b1ab2ac27Aa","DOI":"10.1080\/0013838X.2012.668793"},{"doi-asserted-by":"crossref","unstructured":"D.\u2009V. Khmelev and W.\u2009J. Teahan. A repetition based measure for verification of text collections and for text categorization. In SIGIR 2003: Proceedings of the 26th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, July 28\u2013August 1, 2003, Toronto, Canada, pages 104\u2013110.","key":"2021062215161418504_j_itit-2019-0046_ref_028_w2aab3b8d353b1b7b1ab2ac28Aa","DOI":"10.1145\/860435.860456"},{"unstructured":"M. Khonji and Y. Iraqi. A Slightly-modified GI-based Author-verifier with Lots of Features (ASGALF)\u2014Notebook for PAN at CLEF 2014. In CLEF 2014 Evaluation Labs and Workshop\u2014Working Notes Papers.","key":"2021062215161418504_j_itit-2019-0046_ref_029_w2aab3b8d353b1b7b1ab2ac29Aa"},{"unstructured":"M. Kocher and J. Savoy. UniNE at CLEF 2015: Author Identification\u2014Notebook for PAN at CLEF 2015. In CLEF 2015 Evaluation Labs and Workshop\u2014Working Notes Papers.","key":"2021062215161418504_j_itit-2019-0046_ref_030_w2aab3b8d353b1b7b1ab2ac30Aa"},{"doi-asserted-by":"crossref","unstructured":"M. Kocher and J. Savoy. A simple and efficient algorithm for authorship verification. JASIST, 68 (1): 259\u2013269, 2017.","key":"2021062215161418504_j_itit-2019-0046_ref_031_w2aab3b8d353b1b7b1ab2ac31Aa","DOI":"10.1002\/asi.23648"},{"doi-asserted-by":"crossref","unstructured":"M. Kocher and J. Savoy. Distance measures in author profiling. Inf. Process. Manage., 53 (5): 1103\u20131119, 2017.","key":"2021062215161418504_j_itit-2019-0046_ref_032_w2aab3b8d353b1b7b1ab2ac32Aa","DOI":"10.1016\/j.ipm.2017.04.004"},{"unstructured":"M. Koppel and J. Schler. Authorship Verification as a One-Class Classification Problem. In C. Brodley, editor, Proceedings of the Twenty-First International Conference on Machine Learning, pages 1\u20137.","key":"2021062215161418504_j_itit-2019-0046_ref_033_w2aab3b8d353b1b7b1ab2ac33Aa"},{"doi-asserted-by":"crossref","unstructured":"A. Mahmood, F. Ahmad, Z. Shafiq, P. Srinivasan, and F. Zaffar. A girl has no name: Automated authorship obfuscation using mutant-x. PoPETs, 2019 (4): 54\u201371, 2019.","key":"2021062215161418504_j_itit-2019-0046_ref_034_w2aab3b8d353b1b7b1ab2ac34Aa","DOI":"10.2478\/popets-2019-0058"},{"doi-asserted-by":"crossref","unstructured":"A. McDonald, S. Afroz, A. Caliskan, A. Stolerman, and R. Greenstadt. Use Fewer Instances of the Letter \u201ci\u201d: Toward Writing Style Anonymization. In S. Fischer-H\u00fcbner and M. Wright, editors, Privacy Enhancing Technologies\u201412th International Symposium, PETS 2012, Vigo, Spain, July 11\u201313, 2012, volume 7384 of Lecture Notes in Computer Science, pages 299\u2013318.","key":"2021062215161418504_j_itit-2019-0046_ref_035_w2aab3b8d353b1b7b1ab2ac35Aa","DOI":"10.1007\/978-3-642-31680-7_16"},{"doi-asserted-by":"crossref","unstructured":"G.\u2009A. Miller. Wordnet: A lexical database for english. Commun. ACM, 38 (11): 39\u201341, Nov. 1995.","key":"2021062215161418504_j_itit-2019-0046_ref_036_w2aab3b8d353b1b7b1ab2ac36Aa","DOI":"10.1145\/219717.219748"},{"doi-asserted-by":"crossref","unstructured":"A. Narayanan, H.\u2009S. Paskov, N.\u2009Z. Gong, J. Bethencourt, E. Stefanov, E.\u2009C.\u2009R. Shin, and D. Song. On the feasibility of internet-scale author identification. In IEEE Symposium on Security and Privacy, SP 2012, 21\u201323 May 2012, San Francisco, California, USA, pages 300\u2013314.","key":"2021062215161418504_j_itit-2019-0046_ref_037_w2aab3b8d353b1b7b1ab2ac37Aa","DOI":"10.1109\/SP.2012.46"},{"unstructured":"J. Pearl. Heuristics\u2014intelligent search strategies for computer problem solving. Addison-Wesley series in artificial intelligence.","key":"2021062215161418504_j_itit-2019-0046_ref_038_w2aab3b8d353b1b7b1ab2ac38Aa"},{"doi-asserted-by":"crossref","unstructured":"N. Potha and E. Stamatatos. Improved algorithms for extrinsic author verification. Knowledge and Information Systems, Oct. 2019.","key":"2021062215161418504_j_itit-2019-0046_ref_039_w2aab3b8d353b1b7b1ab2ac39Aa","DOI":"10.1007\/s10115-019-01408-4"},{"unstructured":"M. Potthast, M. Hagen, and B. Stein. Author Obfuscation: Attacking the State of the Art in Authorship Verification. In Working Notes Papers of the CLEF 2016 Evaluation Labs, volume 1609 of CEUR Workshop Proceedings.","key":"2021062215161418504_j_itit-2019-0046_ref_040_w2aab3b8d353b1b7b1ab2ac40Aa"},{"unstructured":"M. Potthast, F. Schremmer, M. Hagen, and B. Stein. Overview of the Author Obfuscation Task at PAN 2018: A New Approach to Measuring Safety. In L. Cappellato, N. Ferro, J.-Y. Nie, and L. Soulier, editors, Working Notes Papers of the CLEF 2018 Evaluation Labs, volume 2125 of CEUR Workshop Proceedings.","key":"2021062215161418504_j_itit-2019-0046_ref_041_w2aab3b8d353b1b7b1ab2ac41Aa"},{"unstructured":"J. Rao and P. Rohatgi. Can Pseudonymity Really Guarantee Privacy? In S. Bellovin and G. Rose, editors, 9th USENIX Security Symposium, Denver, Colorado, USA, August 14\u201317, 2000. USENIX Association, 2000.","key":"2021062215161418504_j_itit-2019-0046_ref_042_w2aab3b8d353b1b7b1ab2ac42Aa"},{"unstructured":"P. Rosso, F. Rangel, M. Potthast, E. Stamatatos, M. Tschuggnall, and B. Stein. Overview of PAN 2016\u2014New Challenges for Authorship Analysis: Cross-genre Profiling, Clustering, Diarization, and Obfuscation. In Experimental IR Meets Multilinguality, Multimodality, and Interaction. 7th International Conference of the CLEF Initiative (CLEF 2016), Berlin Heidelberg New York, Sept. 2016.","key":"2021062215161418504_j_itit-2019-0046_ref_043_w2aab3b8d353b1b7b1ab2ac43Aa"},{"doi-asserted-by":"crossref","unstructured":"C. Sanderson and S. Guenter. Short text authorship attribution via sequence kernels, markov chains and author unmasking: An investigation. In Proceedings of the 2006 Conference on Empirical Methods in Natural Language Processing, pages 482\u2013491, July 2006.","key":"2021062215161418504_j_itit-2019-0046_ref_044_w2aab3b8d353b1b7b1ab2ac44Aa","DOI":"10.3115\/1610075.1610142"},{"unstructured":"D. Sculley and C.\u2009E. Brodley. Compression and machine learning: A new perspective on feature space vectors. In 2006 Data Compression Conference (DCC 2006), 28\u201330 March 2006, Snowbird, UT, USA, pages 332. IEEE Computer Society, 2006.","key":"2021062215161418504_j_itit-2019-0046_ref_045_w2aab3b8d353b1b7b1ab2ac45Aa"},{"doi-asserted-by":"crossref","unstructured":"E. Stamatatos. A Survey of Modern Authorship Attribution Methods. Journal of the American Society for Information Science and Technology, 60 (3): 538\u2013556, Mar. 2009.","key":"2021062215161418504_j_itit-2019-0046_ref_046_w2aab3b8d353b1b7b1ab2ac46Aa","DOI":"10.1002\/asi.21001"},{"unstructured":"E. Stamatatos, W. Daelemans, B. Verhoeven, M. Potthast, B. Stein, P. Juola, M. Sanchez-Perez, and A. Barr\u00f3n-Cede\u00f1o. Overview of the Author Identification Task at PAN 2014. In Working Notes Papers of the CLEF 2014 Evaluation Labs, CEUR Workshop Proceedings. CLEF and CEUR-WS.org, Sept. 2014.","key":"2021062215161418504_j_itit-2019-0046_ref_047_w2aab3b8d353b1b7b1ab2ac47Aa"},{"unstructured":"E. Stamatatos, W. Daelemans, B. Verhoeven, M. Potthast, B. Stein, P. Juola, M. Sanchez-Perez, and A. Barr\u00f3n-Cede\u00f1o. Overview of the Author Identification Task at PAN 2014. In CLEF 2014 Evaluation Labs and Workshop\u2014Working Notes Papers.","key":"2021062215161418504_j_itit-2019-0046_ref_048_w2aab3b8d353b1b7b1ab2ac48Aa"},{"unstructured":"E. Stamatatos, W.\u2009D. amd Ben Verhoeven, P. Juola, A. L\u00f3pez-L\u00f3pez, M. Potthast, and B. Stein. Overview of the Author Identification Task at PAN 2015. In CLEF 2015 Evaluation Labs and Workshop\u2014Working Notes Papers.","key":"2021062215161418504_j_itit-2019-0046_ref_049_w2aab3b8d353b1b7b1ab2ac49Aa"},{"doi-asserted-by":"crossref","unstructured":"E. Stamatatos, W. Daelemans, B. Verhoeven, P. Juola, A. L\u00f3pez L\u00f3pez, M. Potthast, and B. Stein. Overview of the Author Identification Task at PAN 2015. In Working Notes Papers of the CLEF 2015 Evaluation Labs, CEUR Workshop Proceedings.","key":"2021062215161418504_j_itit-2019-0046_ref_050_w2aab3b8d353b1b7b1ab2ac50Aa","DOI":"10.1007\/978-3-319-24027-5_49"},{"doi-asserted-by":"crossref","unstructured":"B. Stein, N. Lipka, and S. Meyer zu Ei\u00dfen. Meta Analysis within Authorship Verification. In A. Tjoa and R. Wagner, editors, 5th International Workshop on Text-Based Information Retrieval (TIR 2008) at DEXA, pages 34\u201339. IEEE, Sept. 2008.","key":"2021062215161418504_j_itit-2019-0046_ref_051_w2aab3b8d353b1b7b1ab2ac51Aa","DOI":"10.1109\/DEXA.2008.20"},{"doi-asserted-by":"crossref","unstructured":"B. Stein, M. Potthast, and M. Trenkmann. Retrieving Customary Web Language to Assist Writers. In C. Gurrin, Y. He, G. Kazai, U. Kruschwitz, S. Little, T. Roelleke, S.\u2009M. R\u00fcger, and K. van Rijsbergen, editors, Advances in Information Retrieval. 32nd European Conference on Information Retrieval (ECIR 2010), volume 5993 of Lecture Notes in Computer Science, pages 631\u2013635, Berlin Heidelberg New York, Mar. 2010.","key":"2021062215161418504_j_itit-2019-0046_ref_052_w2aab3b8d353b1b7b1ab2ac52Aa","DOI":"10.1007\/978-3-642-12275-0_64"},{"unstructured":"B. Stein, M. Hagen, and C. Br\u00e4utigam. Generating Acrostics via Paraphrasing and Heuristic Search. In J. Tsujii and J. Hajic, editors, 25th International Conference on Computational Linguistics (COLING 2014), pages 2014\u20132029. Association for Computational Linguistics, Aug. 2014.","key":"2021062215161418504_j_itit-2019-0046_ref_053_w2aab3b8d353b1b7b1ab2ac53Aa"},{"doi-asserted-by":"crossref","unstructured":"W.\u2009J. Teahan and D.\u2009J. Harper. Using compression-based language models for text categorization. In Language modeling for information retrieval, pages 141\u2013165.","key":"2021062215161418504_j_itit-2019-0046_ref_054_w2aab3b8d353b1b7b1ab2ac54Aa","DOI":"10.1007\/978-94-017-0171-6_7"},{"doi-asserted-by":"crossref","unstructured":"C. Wu, X. Ren, F. Luo, and X. Sun. A Hierarchical Reinforced Sequence Operation Method for Unsupervised Text Style Transfer. In Proceedings of the 57th Conference of the Association for Computational Linguistics, ACL 2019, Florence, Italy, July 28\u2013August 2, 2019, volume 1 of Long Papers, pages 4873\u20134883, July 2019.","key":"2021062215161418504_j_itit-2019-0046_ref_055_w2aab3b8d353b1b7b1ab2ac55Aa","DOI":"10.18653\/v1\/P19-1482"},{"unstructured":"W. Xu, A. Ritter, B. Dolan, R. Grishman, and C. Cherry. Paraphrasing for style. In Proceedings of COLING 2012, pages 2899\u20132914, Mumbai, India, December 2012.","key":"2021062215161418504_j_itit-2019-0046_ref_056_w2aab3b8d353b1b7b1ab2ac56Aa"},{"unstructured":"Y. Zhao and J. Zobel. Searching with style: Authorship attribution in classic literature. In Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC2007), Ballarat, Victoria, Australia, January 30\u2013February 2, 2007, pages 59\u201368, 2007.","key":"2021062215161418504_j_itit-2019-0046_ref_057_w2aab3b8d353b1b7b1ab2ac57Aa"},{"doi-asserted-by":"crossref","unstructured":"Y. Zhao, J. Zobel, and P. Vines. Using Relative Entropy for Authorship Attribution. In H.\u2009T. Ng, M. Leong, M. Kan, and D. Ji, editors, Information Retrieval Technology, Third Asia Information Retrieval Symposium, AIRS 2006, Singapore, October 16\u201318, 2006, volume 4182 of Lecture Notes in Computer Science, pages 92\u2013105.","key":"2021062215161418504_j_itit-2019-0046_ref_058_w2aab3b8d353b1b7b1ab2ac58Aa","DOI":"10.1007\/11880592_8"},{"doi-asserted-by":"crossref","unstructured":"R. Zheng, J. Li, H. Chen, and Z. Huang. A framework for authorship identification of online messages: Writing-style features and classification techniques. Journal of the American Society for Information Science and Technology, 57 (3): 378\u2013393, 2006.","key":"2021062215161418504_j_itit-2019-0046_ref_059_w2aab3b8d353b1b7b1ab2ac59Aa","DOI":"10.1002\/asi.20316"}],"container-title":["it - Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/itit\/62\/2\/article-p99.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/itit-2019-0046\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/itit-2019-0046\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T12:07:01Z","timestamp":1624450021000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/itit-2019-0046\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,3]]},"references-count":59,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2020,3,14]]},"published-print":{"date-parts":[[2020,4,26]]}},"alternative-id":["10.1515\/itit-2019-0046"],"URL":"https:\/\/doi.org\/10.1515\/itit-2019-0046","relation":{},"ISSN":["2196-7032","1611-2776"],"issn-type":[{"type":"electronic","value":"2196-7032"},{"type":"print","value":"1611-2776"}],"subject":[],"published":{"date-parts":[[2020,3,3]]}}}