|
[1] S.ArgamonandM.Koppel.SystemicFunctionalApproachtoAutomatedAuthorship Analysis, A. 2013. [2] J. Binongo. Who wrote the 15th book of Oz? An application of multivariate analysis to authorship attribution. Chance, pages 9–17, 2003. [3] Z. Bu, Z. Xia, and J. Wang. A sock puppet detection algorithm on virtual spaces. Knowledge-Based Systems, 37:366–377, 2013. [4] F. Chierichetti, R. Kumar, S. Pandey, and S. Vassilvitskii. Finding the jaccard me- dian. In Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms, pages 293–311. Society for Industrial and Applied Mathematics, 2010. [5] S. Hiremath and M. Otari. Plagiarism Detection-Different Methods and Their Analy- sis: Review. 1(7):41–47, 2014. [6] J. M. Hughes, N. J. Foti, D. C. Krakauer, and D. N. Rockmore. Quantitative pat- terns of stylistic influence in the evolution of literature. Proceedings of the National Academy of Sciences of the United States of America, 109(20):7682–6, May 2012. [7] Journal of Vibration and Control. Journal of Vibration and Control. 2015. [8] P. Juola. Authorship Attribution. Foundations and Trends in Information Retrieval, 1(3):233–334, 2007. [9] S. Kim, H. Kim, T. Weninger, J. Han, and H. Kim. Authorship classification: a discriminative syntactic tree mining approach. Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval, pages 455–464, 2011. [10] M. Koppel, J. Schler, and S. Argamon. Computational methods in authorship attri- bution. Journal of the American Society for information Science and Technology, 60(1):9–26, 2009. [11] C. Martindale and D. McKenzie. On the utility of content analysis in author attribu- tion: The Federalist. Computers and the Humanities, (t 964):259–270, 1995. [12] R. Morin. Scholar Invents Fan To Answer His Critics, 2003. [13] F. Mosteller and D. L. Wallace. Inference in an Authorship Problem. Journal of the American Statistical Association, 58(302):275–309, 1963. [14] RetractionWatch.SAGEPublicationsbusts”peerreviewandcitationring,”60papers retracted, 2014. [15] B. Stein, N. Lipka, and P. Prettenhofer. Intrinsic plagiarism analysis. Language Resources and Evaluation, 45(1):63–82, Jan. 2010. [16] O. D. Vel. Mining e-mail authorship. Proc. Workshop on Text Mining, ACM Interna- tional Conference on Knowledge Discovery and Data Mining, 2000. [17] Z. Xia and Z. Bu. Community detection based on a semantic network. Knowledge- Based Systems, 26:30–39, Feb. 2012. [18] R. Zheng, J. Li, H. Chen, and Z. Huang. A framework for authorship identification of online messages:Writing-style features and classification techniques. Journal of the American Society for Information Science and Technology, 57(3):378–393, Feb. 2006. [19] R. Zheng, Y. Qin, Z. Huang, and H. Chen. Authorship analysis in cybercrime inves- tigation. Intelligence and Security Informatics, pages 59–73, 2003. |