{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T04:08:05Z","timestamp":1741752485023,"version":"3.38.0"},"reference-count":27,"publisher":"SAGE Publications","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IDA"],"published-print":{"date-parts":[[2017,10,10]]},"DOI":"10.3233\/ida-163026","type":"journal-article","created":{"date-parts":[[2017,10,17]],"date-time":"2017-10-17T16:15:57Z","timestamp":1508256957000},"page":"1117-1139","source":"Crossref","is-referenced-by-count":2,"title":["A graph model based feature set selection from short texts with application to document novelty detection"],"prefix":"10.1177","volume":"21","author":[{"given":"Novino Nirmal","family":"Arul Rayan","sequence":"first","affiliation":[]},{"given":"Kyung-Ah","family":"Sohn","sequence":"additional","affiliation":[]},{"given":"Tae-Sun","family":"Chung","sequence":"additional","affiliation":[]}],"member":"179","reference":[{"key":"10.3233\/IDA-163026_ref1","unstructured":"J. Smith and I. Fujinaga, A review of authorship attribution, Technical Report 15 (2008), 2010."},{"issue":"3","key":"10.3233\/IDA-163026_ref2","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1093\/llc\/13.3.111","article-title":"The evolution of stylometry in humanities scholarship","volume":"13","author":"Holmes","year":"1998","journal-title":"Literary and Linguistic Computing"},{"issue":"1","key":"10.3233\/IDA-163026_ref3","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1093\/biomet\/62.1.207","article-title":"Mendenhall\u2019s studies of word-length distribution in the works of shakespeare and bacon","volume":"62","author":"Williams","year":"1975","journal-title":"Biometrika"},{"issue":"2","key":"10.3233\/IDA-163026_ref4","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1093\/llc\/7.2.91","article-title":"Not unles you ask nicely: The interpretative nexus between analysis and information","volume":"7","author":"Burrows","year":"1992","journal-title":"Literary and Linguistic Computing"},{"key":"10.3233\/IDA-163026_ref5","doi-asserted-by":"crossref","unstructured":"T. Qian, B. Liu, L. Chen and Z. Peng, Tri-training for authorship attribution with limited training data, in: Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014.","DOI":"10.3115\/v1\/P14-2057"},{"issue":"4","key":"10.3233\/IDA-163026_ref6","first-page":"48","article-title":"Text classification for authorship attribution using naive bayes classifier with limited training data","volume":"5","author":"Howedi","year":"2014","journal-title":"Computer Engineering and Intelligent Systems"},{"issue":"1","key":"10.3233\/IDA-163026_ref7","doi-asserted-by":"crossref","first-page":"21","DOI":"10.3390\/mca19010021","article-title":"Authorship attribution using principal component analysis and competitive neural networks","volume":"19","author":"Can","year":"2014","journal-title":"Mathematical and Computational Applications"},{"key":"10.3233\/IDA-163026_ref8","unstructured":"T. Joachims, A probabilistic analysis of the rocchio algorithm with tfidf for text categorization, Technical report, DTIC Document, 1996."},{"key":"10.3233\/IDA-163026_ref9","doi-asserted-by":"crossref","unstructured":"G. Salton and M.J. McGill, Introduction to modern information retrieval, 1983.","DOI":"10.1145\/182.358466"},{"issue":"7","key":"10.3233\/IDA-163026_ref10","doi-asserted-by":"crossref","first-page":"1466","DOI":"10.1016\/j.neucom.2006.05.013","article-title":"One-class document classification via neural networks","volume":"70","author":"Manevitz","year":"2007","journal-title":"Neurocomputing"},{"key":"10.3233\/IDA-163026_ref11","first-page":"139","article-title":"One-class svms for document classification","volume":"2","author":"Manevitz","year":"2002","journal-title":"The Journal of Achine Learning Research"},{"issue":"1-2","key":"10.3233\/IDA-163026_ref12","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1023\/A:1023824908771","article-title":"Authorship attribution with support vector machines","volume":"19","author":"Diederich","year":"2003","journal-title":"Applied Intelligence"},{"key":"10.3233\/IDA-163026_ref13","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1109\/AMT.2005.1505383","article-title":"An email classification model based on rough set theory","author":"Zhao","year":"2005","journal-title":"Active Media Technology, 2005. (AMT 2005), Proceedings of the 2005 International Conference on"},{"key":"10.3233\/IDA-163026_ref14","first-page":"8","article-title":"Emailsift: Email classification based on structure and content","author":"Aery","year":"2005","journal-title":"Data Mining, Fifth IEEE International Conference on"},{"key":"10.3233\/IDA-163026_ref15","first-page":"103","article-title":"Challenges of the email domain for text classification","author":"Brutlag","year":"2000","journal-title":"ICML"},{"issue":"4","key":"10.3233\/IDA-163026_ref16","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1145\/604264.604272","article-title":"Mining e-mail content for author identification forensics","volume":"30","author":"De\u00a0Vel","year":"2001","journal-title":"ACM Sigmod Record"},{"key":"10.3233\/IDA-163026_ref17","first-page":"282","article-title":"Gender-preferential text mining of e-mail discourse","author":"Corney","year":"2002","journal-title":"Computer Security Applications Conference"},{"key":"10.3233\/IDA-163026_ref18","unstructured":"R. Goodman, M. Hahn, M. Marella, C. Ojar and S. Westcott, The use of stylometry for email author identification: a feasibility study, Proc. Student\/Faculty Research Day, CSIS, Pace University, White Plains, NY, 2007, pp.\u00a01\u20137."},{"key":"10.3233\/IDA-163026_ref19","unstructured":"K. Calix, M. Connors, D. Levy, H. Manzar, G. MCabe and S. Westcott, Stylometry for e-mail author identification and authentication, Proceedings of CSIS Research Day, Pace University, 2008."},{"key":"10.3233\/IDA-163026_ref20","unstructured":"L. Douglas Baker, T. Hofmann, A. McCallum and Y. Yang, A hierarchical probabilistic model for novelty detection in text, in: Proceedings of International Conference on Machine Learning, Citeseer, 1999."},{"key":"10.3233\/IDA-163026_ref21","first-page":"518","article-title":"A novelty detection approach to classification","author":"Japkowicz","year":"1995","journal-title":"IJCAI"},{"key":"10.3233\/IDA-163026_ref22","doi-asserted-by":"crossref","first-page":"2878","DOI":"10.1109\/IJCNN.2002.1007605","article-title":"Implicit learning in autoencoder novelty assessment","author":"Thompson","year":"2002","journal-title":"Neural Networks, 2002. IJCNN\u201902. Proceedings of the 2002 International Joint Conference on"},{"issue":"2","key":"10.3233\/IDA-163026_ref23","first-page":"161","article-title":"N-gram-based text categorization","volume":"48113","author":"Cavnar","year":"1994","journal-title":"Ann Arbor MI"},{"issue":"3","key":"10.3233\/IDA-163026_ref24","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1142\/S0218001404003241","article-title":"Classification of web documents using graph matching","volume":"18","author":"Schenker","year":"2004","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"issue":"7","key":"10.3233\/IDA-163026_ref25","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1162\/089976601750264965","article-title":"Estimating the support of a high-dimensional distribution","volume":"13","author":"Sch\u00f6lkopf","year":"2001","journal-title":"Neural Computation"},{"key":"10.3233\/IDA-163026_ref26","first-page":"217","article-title":"A programmatic introduction to neo4j","author":"Webber","year":"2012","journal-title":"Proceedings of the 3rd annual conference on Systems, programming, and applications: software for humanity"},{"issue":"3","key":"10.3233\/IDA-163026_ref27","first-page":"27","article-title":"Libsvm: a library for support vector machines","volume":"2","author":"Chang","year":"2011","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"}],"container-title":["Intelligent Data Analysis"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/IDA-163026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T00:51:26Z","timestamp":1741654286000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/IDA-163026"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,10]]},"references-count":27,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.3233\/ida-163026","relation":{},"ISSN":["1088-467X","1571-4128"],"issn-type":[{"type":"print","value":"1088-467X"},{"type":"electronic","value":"1571-4128"}],"subject":[],"published":{"date-parts":[[2017,10,10]]}}}