Proceedings of the 12th International Conference on Availability, Reliability and Security 2017
DOI: 10.1145/3098954.3104050
|View full text |Cite
|
Sign up to set email alerts
|

On the Usefulness of Compression Models for Authorship Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 21 publications
(21 citation statements)
references
References 14 publications
0
21
0
Order By: Relevance
“…As a second corpus, we compiled C Perv , which represents a collection of 1,645 chat conversations of 550 sex offenders crawled from the Perverted-Justice portal 10 . The chat conversations stem from a variety of sources including emails and instant messengers (e. g., MSN, AOL or Yahoo), where for each conversation, we ensured that only chat lines from the offender were extracted.…”
Section: Perverted Justice Corpusmentioning
confidence: 99%
“…As a second corpus, we compiled C Perv , which represents a collection of 1,645 chat conversations of 550 sex offenders crawled from the Perverted-Justice portal 10 . The chat conversations stem from a variety of sources including emails and instant messengers (e. g., MSN, AOL or Yahoo), where for each conversation, we ensured that only chat lines from the offender were extracted.…”
Section: Perverted Justice Corpusmentioning
confidence: 99%
“…As baselines, we use the best results reported by Halvani and Graner () on the same corpus. In more detail, the best results so far in this corpus are obtained by a profile‐based and intrinsic verification method based on text compression (Halvani et al, ) and the GI method (Seidman, ). As expected, the set of e‐mail impostors assists extrinsic methods to achieve higher results in comparison to the where case genre‐agnostic external documents are used.…”
Section: Experimental Studymentioning
confidence: 99%
“…It is remarkable that the top-performing approaches in all three PAN shared tasks in author verification follow this paradigm (Bagnall, 2015;Khonji & Iraqi, 2014;Seidman, 2013). However, recent studies show that intrinsic methods can be equally competitive (Ding et al, 2019;Halvani, Winter, & Graner, 2017;Potha & Stamatatos, 2018). Extrinsic methods are heavily influenced by the suitability of documents in D external for a given verification case.…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Syntactic features, on the other hand, are less sensitive to content but require the use of a robust part-of-speech tagger. In addition, non-linguistic features such as compression-based models were shown to be successful as well [13,14]. The employed compression model, i.e.…”
Section: Introductionmentioning
confidence: 99%