R Kaur, S Singh, H Kumar - Applied Soft Computing, 2020 - Elsevier
… focuses on the viability of authorshipverification process for the … the task of authorship verification on short texts and applies text … [7] on e-mail and Twitter data using lexical, syntactic and …
… Experiments were carried out using a dataset from Twitter composed by tweets of 1000 users. All the three steps were individually evaluated, and the results show that the developed …
R Kaur, S Singh, H Kumar - Soft Computing, 2021 - Springer
… of continuousauthentication on short texts and applies text … in this work using authorship verification process which involves … ) performed continuousauthentication on e-mail and Twitter …
ML Brocardo, I Traore, I Woungang… - International Journal of …, 2017 - Wiley Online Library
… , on the basis of the Twitter and Enron e-mail corpuses. Promising … Continuousauthentication (CA) is a reinforcement of the … of which the merging and selection processes were applied. …
NM Demir, M Can - Southeast Europe Journal of Soft …, 2018 - scjournal.ius.edu.ba
… of authorship attribution for an online social network Twitter … for authorshipverification model of continuousauthentication. … feature set and used for e-mailauthentication. 71 of them are …
NM Demir - Southeast Europe Journal of Soft Computing, 2018 - ask2014.ius.edu.ba
… of authorship attribution for an online social network Twitter … for authorshipverification model of continuousauthentication. … feature set and used for e-mailauthentication. 72 of them are …
M Litvak - Information Management and Big Data: 5th …, 2019 - Springer
… the problem of authorshipverification of short messages, which can be accurately applied on a “… Experimental evaluation on the Enron email and Twitter datasets produced EER results …
… We then apply the BOW approach to compute the uni-gram features of the … In this work, the aim is to identify the author of a given tweet based on its content. Three different sets of …
S Alterkavı, H Erbay - Multimedia Tools and Applications, 2021 - Springer
… On the other hand, the current study introduces a model to verify the authorship of a tweet by … users were crawled, then each tweet was applied to the cleaning process. After that, …