2018
DOI: 10.1007/978-3-319-76941-7_34
|View full text |Cite
|
Sign up to set email alerts
|

Authorship Verification in the Absence of Explicit Features and Thresholds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 28 publications
(29 citation statements)
references
References 12 publications
0
23
0
Order By: Relevance
“…During the last decade, PAN contributed to focus the attention of the research community on specific digital text forensics tasks, built benchmark datasets, and estimated the effectiveness as well as the weaknesses of the state of the art. The developed datasets cover multiple genres and languages while the top-ranked PAN submissions have been used as baselines in subsequent research [12,22]. In addition, the evolution of tasks within PAN made the exploration of new tasks feasible.…”
Section: Discussionmentioning
confidence: 99%
“…During the last decade, PAN contributed to focus the attention of the research community on specific digital text forensics tasks, built benchmark datasets, and estimated the effectiveness as well as the weaknesses of the state of the art. The developed datasets cover multiple genres and languages while the top-ranked PAN submissions have been used as baselines in subsequent research [12,22]. In addition, the evolution of tasks within PAN made the exploration of new tasks feasible.…”
Section: Discussionmentioning
confidence: 99%
“…The chat conversations stem from a variety of sources including emails and instant messengers (e. g., MSN, AOL or Yahoo), where for each conversation, we ensured that only chat lines from the offender were extracted. We applied the same problem construction procedure as for the corpus C DBLP , which resulted in 1,100 verification 7 https://dblp.uni-trier.de 8 Note that each document is single-authored. 9 For example, repetitions, metaphors, rhetorical questions, oxymorons, etc.…”
Section: Perverted Justice Corpusmentioning
confidence: 99%
“…Profile‐based methods are better able to handle cases with limited text length since they concatenate all available documents. This paradigm is more popular in recent studies (Ding et al, ; Halvani et al, ; Potha & Stamatatos, ). There are also some attempts to combine instance‐based and profile‐based paradigms (Bagnall, ; Sari & Stevenson, ).…”
Section: Previous Workmentioning
confidence: 99%
“…The latter can be determined by using information from other verification cases (Jankowska et al, ; Potha & Stamatatos, ). A recent study attempts to determine all necessary thresholds without using any additional resources (Halvani, Graner, & Vogel, ). In general, intrinsic methods are very efficient and robust methods, with few parameters to be set, and can be easily applied to any corpus.…”
Section: Previous Workmentioning
confidence: 99%