59
Views
0
CrossRef citations to date
0
Altmetric
Articles

A discriminative random sampling strategy with individual-author feature selection for writeprint recognition of Chinese texts

, , , , &
Pages 94-101 | Received 14 Aug 2015, Accepted 28 Feb 2016, Published online: 23 Mar 2016

References

  • Brocardo ML, Traore I, Woungang I. Authorship verification of e-mail and tweet messages applied for continuous authentication. J. Comput. Syst. Sci. 2015;81:1429–1440. doi:10.1016/j.jcss.2014.12.019.
  • Nizamani S, Memon N. CEAI: CCM-based email authorship identification model. Egypt. Inf. J. 2013;14:239–249.10.1016/j.eij.2013.10.001
  • Iqbal F, Hadjidj R, Fung BCM, et al. A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digital Invest. 2008;5:S42–S51.10.1016/j.diin.2008.05.001
  • Alrabaee S, Saleem N, Preda S, et al. OBA2: an onion approach to binary code authorship attribution. Digital Invest. 2014;11:S94–S103.10.1016/j.diin.2014.03.012
  • Bandara U, Wijayarathna G. Source code author identification with unsupervised feature learning. Pattern Recognit. Lett. 2013;34:330–334.10.1016/j.patrec.2012.10.027
  • Abbasi A, Chen H. Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. 2008;26:1–29.
  • Li J, Zheng R, Chen H. From fingerprint to writeprint. Commun. ACM. 2006;49:76–82.10.1145/1121949
  • Zheng R, Li J, Chen H, et al. A framework for authorship identification of online messages: writing-style features and classification techniques. J. Am. Soc. Inf. Sci. Technol. 2006;57:378–393.10.1002/(ISSN)1532-2890
  • Keselj V, Peng F, Cercone N, et al. N-gram based author profiles for authorship attribution. In: Proceedings of the Conference Pacific Association for Computational Linguistics; 2003. p. 255–264. Halifax.
  • Houvardas J, Stamatatos E. N-gram feature selection for authorship recognition. In: Proceedings of the 12th International Conference on Artificial Intelligence: Methodology, Systems, Applications; 2006. p. 77–86. Varna.
  • Iqbal F, Binsalleeh H, Fung BCM, et al. Mining writeprints from anonymous e-mails for forensic investigation. Digital Invest. 2010;7:56–64.10.1016/j.diin.2010.03.003
  • Iqbal F, Binsalleeh H, Fung BCM, et al. A unified data mining solution for authorship analysis in anonymous textual communications. Inf. Sci. 2013;231:98–112.10.1016/j.ins.2011.03.006
  • Schmid MR, Iqbal F, Fung BCM. E-mail authorship attribution using customized associative classification. Digital Invest. 2015;14:S116–S126.10.1016/j.diin.2015.05.012
  • Nizamani S, Memon N. CEAI: CCM-based email authorship identification model. Egypt. Inf. J. 2013;14:239–249.10.1016/j.eij.2013.10.001
  • Ho TK. The random subspace method for constructing decision forests. IEEE Trans. Pattern Anal. Mach. Intell. 1998;20:832–844.
  • Stamatatos E. Ensemble-based author recognition using character n-grams. Proceedings of TIR’06, 2006, 41–46.
  • Stamatatos E. Authorship attribution based on feature set subspacing ensembles. Int. J. Artif. Intell. Tools. 2006;15:823–838.10.1142/S0218213006002965
  • Liu Z, Yang Z, Liu S, et al. Semi-random subspace method for writeprint identification. Neurocomputing. 2013;108:93–102.10.1016/j.neucom.2012.11.015
  • Wang X, Tang X. Random sampling LDA for face recognition. In: Proceedings of the 2004 IEEE Conference on Computer Vision and Pattern Recognition; 2004. p. 259–265. Washington, DC.
  • Wang X, Tang X. Random sampling for subspace face recognition. Int. J. Comput. Vision. 2006;70:91–104.10.1007/s11263-006-8098-z
  • Belhumeur PN, Hespanha J, Kriegman D. Eigenfaces vs. fisherfaces: recognition using class specific linear projection. IEEE Trans. Pattern Anal. Mach. Intell. 1997;19:711–720.10.1109/34.598228
  • Salles T, Rocha L, Gonçalves MA, et al. A quantitative analysis of the temporal effects on automatic text classification. J. Assoc. Inf. Sci. Technol. 2015. doi:10.1002/asi.23452.
  • Theodoridis S, Koutroumbas K. Pattern recognition. 4th ed. Amsterdam: Elsevier Science; 2009.
  • Wu X, Kumar V, Quinlan JR, et al. Top 10 algorithms in data mining. Knowl. Inf. Syst. 2008;14:1–37.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.