239
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Authorship Attribution via Occupancy-problem-type Indices

, &

References

  • Binongo, J. N. G. (2003). Who wrote the 15th book of Oz? An application of multivariate analysis to authorship attribution. Chance, 16(2), 9–17. https://doi.org/10.1080/09332480.2003.10554843
  • Bunge, J., & Fitzpatrick, M. (1993). Estimating the number of species: A review. Journal of the American Statistical Association, 88(421), 364–373.
  • Chaudhuri, S., Motwani, R., & Narasayya, V. (1998). Random sampling for histogram construction: How much is enough? In Proceedings of the 1998 ACM SIGMOD International Conference on Management of Data, SIGMOD’98, New York, NY, USA, (Vol. 27, pp. 436–447). ACM.
  • Davison, A. C., & Hinkley, D. V. (1997). Bootstrap methods and their application (Vol. 1). Cambridge university press.
  • De Vel, O. (2000, August). Mining e-mail authorship. In Proc. Workshop on Text Mining, ACM International Conference on Knowledge Discovery and Data Mining (KDD’2000), Boston, MA.
  • Garcia, A. M., & Martin, J. C. (2006). Function words in authorship attribution studies. Literary and Linguistic Computing, 22(1), 49–66. https://doi.org/10.1093/llc/fql048
  • Gardner, M., & Nye, R. B. (1957). The Wizard of Oz & Who He Was. Michigan State University Press.
  • Gnedin, A., Hansen, B., & Pitman, J. (2007). Notes on the occupancy problem with infinitely many boxes: General asymptotics and power laws. Probability Surveys, 4, 146–171. https://doi.org/10.1214/07-PS092
  • Grabchak, M., Cao, L., & Zhang, Z. (2018). Authorship attribution using diversity profiles. Journal of Quantitative Linguistics, 25(2), 142–155. https://doi.org/10.1080/09296174.2017.1343268
  • Grabchak, M., Zhang, Z., & Zhang, D. T. (2013). Authorship attribution using entropy. Journal of Quantitative Linguistics, 20(4), 301–313. https://doi.org/10.1080/09296174.2013.830551
  • Grieve, J. (2007). Quantitative authorship attribution: An evaluation of techniques. Literary and Linguistic Computing, 22(3), 251–270. https://doi.org/10.1093/llc/fqm020
  • Holmes, D. I., Robertson, M., & Paez, R. (2001). Stephen Crane and the New-York Tribune: A case study in traditional and non-traditional authorship attribution. Computers and the Humanities, 35(3), 315–331. https://doi.org/10.1023/A:1017549100097
  • Roberts, F., & Tesman, B. (2009). Applied combinatorics. Chapman and Hall/CRC.
  • Rocha, A., Scheirer, W. J., Forstall, C. W., Cavalcante, T., Theophilo, A., Shen, B., & Stamatatos, E. (2017). Authorship attribution for social media forensics. IEEE Transactions on Information Forensics and Security, 12(1), 5–33. https://doi.org/10.1109/TIFS.2016.2603960
  • Segarra, S., Eisen, M., & Ribeiro, A. (2015). Authorship attribution through function word adjacency networks. IEEE Transactions on Signal Processing, 63(20), 5464–5478. https://doi.org/10.1109/TSP.2015.2451111
  • Shaker, K., Corne, D., & Everson, R. (2007, September). Investigating hybrids of evolutionary search and linear discriminant analysis for authorship attribution. In 2007 IEEE Congress on Evolutionary Computation, Singapore (pp. 2071–2077). IEEE.
  • Skinner, C. J., & Elliot, M. J. (2002). A measure of disclosure risk for microdata. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 64(4), 855–867. https://doi.org/10.1111/1467-9868.00365
  • Stamatatos, E. (2009). A survey of modern authorship attribution methods. Journal of the American Society for Information Science and Technology, 60(3), 538–556. https://doi.org/10.1002/asi.21001
  • Vysotska, V., Burov, Y., Lytvyn, V., & Demchuk, A. (2018, August). Defining Author’s Style for Plagiarism Detection in Academic Environment. In 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine (pp. 128–133). IEEE.
  • Zenkov, A. V. (2018). A Method of Text Attribution Based on the Statistics of Numerals. Journal of Quantitative Linguistics, 25(3), 256–270. https://doi.org/10.1080/09296174.2017.1371915
  • Zheng, R., Qin, Y., Huang, Z., & Chen, H. (2003, June). Authorship analysis in cybercrime investigation. In International conference on intelligence and security informatics (pp. 59–73). Springer, Berlin, Heidelberg.
  • Zheng, L., & Zheng, H. (2020). Authorship Attribution via Coupon-Collector-Type Indices. Journal of Quantitative Linguistics, 27(4), 321–333. https://doi.org/10.1080/09296174.2019.1577939

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.