2017
DOI: 10.1109/tifs.2016.2603960
|View full text |Cite
|
Sign up to set email alerts
|

Authorship Attribution for Social Media Forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

3
116
0
9

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 193 publications
(128 citation statements)
references
References 122 publications
3
116
0
9
Order By: Relevance
“…Not surprisingly, even just a few short sentences can carry a great deal of information that a human analyst can use for identification, but that information goes beyond the style of the writing. Additional techniques that are capable of exploiting specific domain information are needed; the work of [18] suggests that contextual analysis and tolerance to uncertainty are especially needed for the identification of individuals in social media forensics.…”
Section: Related Workmentioning
confidence: 99%
“…Not surprisingly, even just a few short sentences can carry a great deal of information that a human analyst can use for identification, but that information goes beyond the style of the writing. Additional techniques that are capable of exploiting specific domain information are needed; the work of [18] suggests that contextual analysis and tolerance to uncertainty are especially needed for the identification of individuals in social media forensics.…”
Section: Related Workmentioning
confidence: 99%
“…Not surprisingly, even just a few short sentences can carry a great deal of information that a human analyst can use for identification, but that information goes beyond the style of the writing. Additional techniques that are capable of exploiting specific domain information are needed; the work of [23] suggests that contextual analysis and tolerance to uncertainty are especially needed for the identification of individuals in social media forensics- [24], on the other hand, also incorporates non-verbal behavior to aid user identification.…”
Section: Related Workmentioning
confidence: 99%
“…In their work they studied two models, the writerdependent and writer-independent. Rocha et al (2016) wrote a review about authorship attribution for social media forensics. They collected data from Twitter and used 50 authors' tweets.…”
Section: Related Workmentioning
confidence: 99%
“…Like an additional authentication mechanism, the written messages may be e study has been usually conducted in long text, even though authorship authentication with the application of stylometry has been a prominent field. For the identification of authors with regard to the style of their and scholars of the humanities have been together contributing to the development of automated methods during the past 50 years (Rocha, 2016). Each author has have impacts on the forms and contents of written them.…”
Section: Introductionmentioning
confidence: 99%