{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:54:08Z","timestamp":1730343248227,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.23919\/cnsm46954.2019.9012722","type":"proceedings-article","created":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T09:56:25Z","timestamp":1582883785000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["Compromised Tweet Detection Using Siamese Networks and fastText Representations"],"prefix":"10.23919","author":[{"given":"Mihir","family":"Joshi","sequence":"first","affiliation":[]},{"given":"Parmeet","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2010.17"},{"key":"ref11","first-page":"1","article-title":"Identifying authorship by byte-level n-grams: The source code author profile (scap) method","volume":"6","author":"frantzeskou","year":"2007","journal-title":"International Journal of Digital Evidence"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/5254.708428"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3115\/1220175.1220213"},{"journal-title":"Author attribution with cnns","year":"2016","author":"rhodes","key":"ref14"},{"journal-title":"Project Gutenberg","year":"1971","author":"hart","key":"ref15"},{"journal-title":"Deep learning based authorship identification","year":"2017","author":"qian","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"journal-title":"Towards a universal document encoder for authorship attribution","year":"2018","author":"parikh","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11861461_10"},{"key":"ref4","first-page":"1880","article-title":"Authorship attribution of micro-messages","author":"schwartz","year":"2013","journal-title":"Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing"},{"key":"ref3","first-page":"29","article-title":"The reuters corpus volume 1-from yesterdays news to tomorrows language resources","author":"rose","year":"2002","journal-title":"Proceedings of the Third International Conference on Language Resources and Evaluation"},{"key":"ref6","article-title":"User identification via neural network based language models","author":"phan","year":"2018","journal-title":"International Journal of Network Management"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-2106"},{"key":"ref8","article-title":"Siamese neural networks for one-shot image recognition","volume":"2","author":"koch","year":"2015","journal-title":"ICML Deep Learning Workshop"},{"key":"ref7","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"2013","journal-title":"arXiv preprint arXiv 1301 3781"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-1107"},{"key":"ref1","first-page":"1","article-title":"Benno TABLE II: Accuracy for different users, each trained with 100 tweets. Stein, and Martin Potthast. Overview of the author identification task at pan-2018: cross-domain authorship attribution and style change detection","author":"kestemont","year":"2018","journal-title":"Working Notes Papers of the CLEF 2018 Evaluation Labs"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2911075"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683405"},{"journal-title":"Introduction to Modern Information Retrieval","year":"1986","author":"salton","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.01.006"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/0146-664X(80)90054-4"},{"key":"ref23","article-title":"Bag of tricks for efficient text classification","author":"joulin","year":"2016","journal-title":"arXiv preprint arXiv 1607 01759"},{"key":"ref26","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv preprint arXiv 1412 6980"},{"key":"ref25","first-page":"1735","article-title":"Dimensionality reduction by learning an invariant mapping","author":"hadsell","year":"2006","journal-title":"null"}],"event":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2019,10,21]]},"location":"Halifax, NS, Canada","end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 15th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8977268\/9012657\/09012722.pdf?arnumber=9012722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T03:56:10Z","timestamp":1586490970000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9012722\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.23919\/cnsm46954.2019.9012722","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}