2016
DOI: 10.13053/rcs-123-1-1
|View full text |Cite
|
Sign up to set email alerts
|

Authorship Verification: A Review of Recent Advances

Abstract: Authorship verification attempts to decide whether the author of a given set of texts is also the author of a disputed text. In comparison to closed-set and open-set attribution, the most popular tasks in relevant literature, the verification setting has some important advantages. First, it is more general since any attribution problem can be decomposed into a series of verification cases. Then, certain factors that affect the performance of closed-set and open-set attribution, like the candidate set size and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 28 publications
(22 citation statements)
references
References 29 publications
0
17
0
Order By: Relevance
“…The former attempts to discover and exploit differences in the set of documents of known authorship (Jankowska et al, 2014;Khonji & Iraqi, 2014;Seidman, 2013). The majority of PAN submissions follow this paradigm (Stamatatos, 2016). On the other hand, profile-based approaches handle all available known texts cumulatively (Kocher & Savoy, 2017;Pacheco et al, 2015;Potha & Stamatatos, 2014).…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The former attempts to discover and exploit differences in the set of documents of known authorship (Jankowska et al, 2014;Khonji & Iraqi, 2014;Seidman, 2013). The majority of PAN submissions follow this paradigm (Stamatatos, 2016). On the other hand, profile-based approaches handle all available known texts cumulatively (Kocher & Savoy, 2017;Pacheco et al, 2015;Potha & Stamatatos, 2014).…”
Section: Previous Workmentioning
confidence: 99%
“…A supervised learning algorithm can be used to learn a general verification model (Fréry et al, ; Hürlimann, Weck, van den Berg, Šuster, & Nissim, ; Pacheco et al, ). These eager verification approaches (Stamatatos, ) can follow either the intrinsic paradigm (each verification instance is represented using only information from d u and D known ) (Hürlimann et al, ) or the extrinsic paradigm (each instance is represented using information from d u , D known , and D external ) (Pacheco et al, ). The effectiveness of such methods heavily depend on the representativeness of the training set of instances (Stamatatos et al, ).…”
Section: Previous Workmentioning
confidence: 99%
“…The extraction of stylistic information from documents is usually based on very frequent patterns found in texts. In authorship attribution research there is a wide variety of measures that attempt to capture nuances of the personal style of the authors [129,131]. The basic categories of text representation features used for stylistic purposes are described below:…”
Section: Stylometric Featuresmentioning
confidence: 99%
“…A supervised learning algorithm can be used to learn a general verification model [28,43,87,88,93]. These eager verification approaches [131] can follow either the intrinsic paradigm (each verification instance is represented using only information from d unknown and D known ) [8,43,86,117] or the extrinsic paradigm (each instance is represented using information from d unknown , D known , and D external ) [88,93]. The effectiveness of such methods heavily depend on the representativeness of the training set of instances [137].…”
Section: Eager Approachesmentioning
confidence: 99%
See 1 more Smart Citation