2014
DOI: 10.1007/978-3-662-44952-3_13
|View full text |Cite
|
Sign up to set email alerts
|

Breaking the Closed-World Assumption in Stylometric Authorship Attribution

Abstract: Stylometry is a form of authorship attribution that relies on the linguistic information found in a document. While there has been significant work in stylometry, most research focuses on the closed-world problem where the author of the document is in a known suspect set. For open-world problems where the author may not be in the suspect set, traditional classification methods are ineffective. This paper proposes the "classify-verify" method that augments classification with a binary verification step evaluate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(29 citation statements)
references
References 20 publications
0
28
0
Order By: Relevance
“…This is a form of Abstaining classification [5]. In this paper, we use the modified "Classify-Verify" approach as discussed by Stolerman et al [27].…”
Section: Classify-verifymentioning
confidence: 99%
See 1 more Smart Citation
“…This is a form of Abstaining classification [5]. In this paper, we use the modified "Classify-Verify" approach as discussed by Stolerman et al [27].…”
Section: Classify-verifymentioning
confidence: 99%
“…If the verification score of D is less than the determined threshold, the classifier's output will be rejected. Unlike Stolerman et al [27], we maximize F β instead of F 1 to choose threshold by adjusting weights for precision and recall. β ≤ 0.5 achieves fewer false positives at the cost of true positives than β > 0.5. attacks.…”
Section: Classify-verifymentioning
confidence: 99%
“…The distributed nature of cyber space provides an ideal anonymous channel for computer-mediated malicious activities, e.g., phishing scams, spamming, ransom messages, harassment, money laundering, illegal material distribution, etc., because the network-based origins such as IP address can be easily repudiated. Several authorship identification techniques have been developed for the purpose of cyber investigation on SMS text-messaging slips [Ragel et al 2014], personal e-mails [Iqbal et al 2013;Ding et al 2015], and social blogs [Yang and Chow 2014;Stolerman et al 2014]. Stylometric techniques have been used as evidence in the form of expert knowledge in the courts of the UK, the US, and Australia [Juola 2006;Brennan et al 2012].…”
Section: Introductionmentioning
confidence: 99%
“…To decide whether a target trace is monitored or unmonitored, we use a method proposed by Stolerman et al [60]. We assign the target trace to the monitored class if and only if the classifier predicts this class with probability larger than a threshold t, and to unmonitored otherwise.…”
Section: Evaluating N-grams Featuresmentioning
confidence: 99%