2015
DOI: 10.1002/asi.23460
|View full text |Cite
|
Sign up to set email alerts
|

Computational authorship verification method attributes a new work to a major 2nd centuryAfrican author

Abstract: We discuss a real-world application of a recently proposed machine learning method for authorship verification. Authorship verification is considered an extremely difficult task in computational text classification, because it does not assume that the correct author of an anonymous text is included in the candidate authors available. To determine whether 2 documents have been written by the same author, the verification method discussed uses repeated feature subsampling and a pool of impostor authors. We use t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(16 citation statements)
references
References 15 publications
0
15
0
1
Order By: Relevance
“…Standard applications of stylometry include dating literary works and resolving questions of attribution (26)(27)(28)(29)(30). Both ad hoc stylometric analysis and supervised machine learning with stylometric features have proven successful for such applications (31)(32)(33), including for cases in Latin literature (34).…”
Section: Significancementioning
confidence: 99%
“…Standard applications of stylometry include dating literary works and resolving questions of attribution (26)(27)(28)(29)(30). Both ad hoc stylometric analysis and supervised machine learning with stylometric features have proven successful for such applications (31)(32)(33), including for cases in Latin literature (34).…”
Section: Significancementioning
confidence: 99%
“…In this paper, we illustrate the broader applicability of computational authorship verification by reporting a high-profile case study from Classical Antiquity (Koppel & Seidman, 2013;Stover et al, 2016). The 'War Commentaries' by Julius Caesar (Corpus Caesarianum) refers to a group of Latin 20 prose commentaries, describing the military campaigns of the world-renowned statesman Julius Caesar (100-44 BC), the founder of the Roman Empire.…”
Section: Currently Receives Increasing Attention Inmentioning
confidence: 99%
“…In the relevant literature, there are several examples of applications associated with author verification technology. In digital humanities, author verification methods have been used to reveal the authorship of disputed documents of great literary or historical importance (Kestemont, Stover, Koppel, Karsdorp, & Daelemans, 2016;Stover, Winter, Koppel, & Kestemont, 2016;Tuccinardi, 2017). In cybersecurity, it has been used to detect compromised accounts in social networks (Barbon, Igawa, & Bogaz Zarpelão, 2017), perform spearphishing filtering (Duman, Kalkan-Cakmakci, Egele, Robertson, & Kirda, 2016), and continuous authentication of users (Brocardo, Traore, Woungang, & Obaidat, 2017).…”
Section: Introductionmentioning
confidence: 99%