Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleSeptember 2024
Beyond Words: Stylometric Analysis for Detecting AI Manipulation on Social Media
AbstractRecently, there has been a noticeable growth in textual content generated through advanced language models, such as chatGPT, across various social networks. ChatGPT can produce content that closely emulates human writing, making it ...
- ArticleJuly 2024
Stylometric Analysis of Large Language Model-Generated Commentaries in the Context of Medical Neuroscience
AbstractThis study investigates the application of Large Language Models (LLMs) in generating commentaries on neuroscientific papers, with a focus on their stylometric differences from human-written texts. Utilizing three papers from reputable journals in ...
- ArticleJune 2024
A Fingerprinting-Based Strategy for Musical Genre Similarity
AbstractMusic information retrieval is a field of signal processing that offers sophisticated tools for generating computer-assisted musical systems. Acoustic fingerprinting is a well-known application of such discipline whose purpose is to extract ...
- research-articleJune 2024
Mining Minds: Predicting IQ Scores Using Social Media Textual Analytics
ICMLC '24: Proceedings of the 2024 16th International Conference on Machine Learning and ComputingPages 594–601https://doi.org/10.1145/3651671.3651750This research examines the innovative application of stylometry and machine learning in predicting individual IQ scores through analysis of textual data on social media platforms. Leveraging the rich and diverse linguistic landscape of social media, our ...
- ArticleJuly 2023
Attribute Relevance and Discretisation in Knowledge Discovery: A Study in Stylometric Domain
AbstractThe paper demonstrates the research methodology focused on observations of relations between attribute relevance, displayed by rankings, and discretisation. Instead of transforming all continuous attributes before data exploration, the variables ...
-
- research-articleJanuary 2023
Online grooming detection: A comprehensive survey of child exploitation in chat logs
AbstractSocial media platforms present significant threats against underage users targeted for predatory intents. Many early research works have applied the footprints left by online predators to investigate online grooming. While digital ...
Highlights- Presents a comprehensive survey of child exploitation in chat logs.
- Provides in-...
- research-articleMarch 2024
Should supervised discretisation always be trusted unreservedly? On combining characteristics of supervised and unsupervised discretisation algorithms in two-step processing
Procedia Computer Science (PROCS), Volume 225, Issue CPages 2136–2145https://doi.org/10.1016/j.procs.2023.10.204AbstractThe paper presents a description of the research methodology dedicated to a two-step discretisation process applied to the input numeric data, with combining the characteristics of selected supervised and unsupervised algorithms, which leads to ...
- research-articleDecember 2022
Improved score aggregation for authorship verification
Knowledge and Information Systems (KAIS), Volume 65, Issue 3Pages 1317–1336https://doi.org/10.1007/s10115-022-01798-yAbstractThe Impostors method is one of the most successful solvers of author verification problems. Given a pair of texts, it aims to find whether the same author wrote them or not. This paper describes a proposed approach with the primary objective of ...
- ArticleJuly 2022
Computer-Aided Forensic Authorship Identification in Criminology
- András Kicsi,
- Péter Sánta,
- Dániel Horváth,
- Norbert Kőhegyi,
- Viktor Szvoreny,
- Veronika Vincze,
- Eszter Főző,
- László Vidács
Computational Science and Its Applications – ICCSA 2022 WorkshopsPages 576–592https://doi.org/10.1007/978-3-031-10548-7_42AbstractThe increasingly anonymous methods people use to communicate in the modern world allow for more freedom of speech. The safety of anonymity, however, can enable criminals to cause harm to others through various means, such as blackmail, verbal ...
- ArticleJanuary 2023
Author Attribution of Literary Texts in Polish by the Sequence Averaging
AbstractThe paper concerns the authorship recognition in a collection of Polish literary texts from the late 19th and early 20th centuries, consisting of 99 novels from 33 authors. The authors divide the books into smaller parts and analyze the ...
- posterJuly 2022
Improving LSTMs’ under-performance in Authorship Attribution for short texts
EICC '22: Proceedings of the 2022 European Interdisciplinary Cybersecurity ConferencePages 99–101https://doi.org/10.1145/3528580.3532994We present a novel approach for conducting authorship attribution over tweets using Long-Short Term Memory networks (LSTMs). Vanilla LSTMs use the last hidden state for prediction. Our strategy introduces a mechanism based on Max Pooling to process all ...
- research-articleJanuary 2022
Ranking of attributes—comparative study based on data from stylometric domain
Procedia Computer Science (PROCS), Volume 207, Issue CPages 2737–2746https://doi.org/10.1016/j.procs.2022.09.332AbstractThe area of feature selection methods constantly expands along with the development of artificial intelligence domain, and has great impact on almost every field, whenever data is processed and explored. The paper presents research where a ranking ...
- research-articleJanuary 2022
On heterogeneity or sub-classes aspect in construction of stylometric input datasets
Procedia Computer Science (PROCS), Volume 207, Issue CPages 2526–2535https://doi.org/10.1016/j.procs.2022.09.311AbstractStylometric analysis of texts relies on learning characteristic traits of writing styles for authors. Once these patterns are discovered, they can be compared to the ones present in other text samples, to recognise their authorship. This ...
- research-articleJanuary 2021
Standard vs. non-standard cross-validation: evaluation of performance in a space with structured distribution of datapoints
Procedia Computer Science (PROCS), Volume 192, Issue CPages 1245–1254https://doi.org/10.1016/j.procs.2021.08.128AbstractCross-validation is a popularly used approach to evaluation of performance for classifiers. It relies on random selection of independent samples for training and testing, and assumes that if any similarities among samples exist, they do not lead ...
- ArticleDecember 2020
Authorship Identification Using Stylometry and Document Fingerprinting
AbstractAuthorship identification focuses on finding the particular author of an anonymous or unknown document by extracting various predictive features related to that document. It helps to predict the most probable author of articles, messages, codes, ...
- ArticleOctober 2020
Stylometrics Features Under Domain Shift: Do They Really “Context-Independent”?
AbstractThe problem of determining the author of a text, i.e. authorship attribution (AA), is based on the assumption on the stability and uniqueness of the authorial style. Since it is obvious that a lot of content words bear topical information, ...
- research-articleJune 2020
An efficient novel approach for iris recognition based on stylometric features and machine learning techniques
- Saša Adamović,
- Vladislav Miškovic,
- Nemanja Maček,
- Milan Milosavljević,
- Marko Šarac,
- Muzafer Saračević,
- Milan Gnjatović
Future Generation Computer Systems (FGCS), Volume 107, Issue CPages 144–157https://doi.org/10.1016/j.future.2020.01.056AbstractThis paper presents a novel iris recognition system based on machine learning methods. The motivation behind this research resides in the interrelatedness of biometric systems and stylometry, as shown in our previous research. The main ...
Highlights- Virtually perfect classification with zero false acceptance rates.
- Extremely ...
- research-articleMay 2020
Improved algorithms for extrinsic author verification
Knowledge and Information Systems (KAIS), Volume 62, Issue 5Pages 1903–1921https://doi.org/10.1007/s10115-019-01408-4AbstractAuthor verification is a fundamental problem in authorship attribution, and it suits most relevant applications where it is not possible to predefine a closed set of suspects. So far, the most successful approaches attempt to sample the non-target ...
- research-articleApril 2020
eDarkFind: Unsupervised Multi-view Learning for Sybil Account Detection
- Ramnath Kumar,
- Shweta Yadav,
- Raminta Daniulaityte,
- Francois Lamy,
- Krishnaprasad Thirunarayan,
- Usha Lokala,
- Amit Sheth
WWW '20: Proceedings of The Web Conference 2020Pages 1955–1965https://doi.org/10.1145/3366423.3380263Darknet crypto markets are online marketplaces using crypto currencies (e.g., Bitcoin, Monero) and advanced encryption techniques to offer anonymity to vendors and consumers trading for illegal goods or services. The exact volume of substances ...