Cannabis Indica

Unused sources[edit]

FUTON, looked at, could potentially be useful (e.g., if exhaustively reviewing all proposed methods)[edit]

Non-FUTON, not even looked at[edit]

  • Khonji, Mahmoud; Iraqi, Youssesf (2015). "Stylometric Anonymity: Is Imitation the Best Strategy?". 2015 IEEE Trustcom/BigDataSE/ISPA. pp. 974–982. doi:10.1109/Trustcom.2015.472. ISBN 978-1-4673-7952-6. S2CID 39014446.
  • Brunton, Finn; Nissenbaum, Helen (11 September 2015). Obfuscation: A User's Guide for Privacy and Protest. ISBN 9780262331326.
  • Juola, Patrick; Vescovi, Darren (2010). "Empirical evaluation of authorship obfuscation using JGAAP". Proceedings of the 3rd ACM workshop on Artificial intelligence and security - AISec '10. p. 14. doi:10.1145/1866423.1866427. ISBN 9781450300889. S2CID 14394643.
  • Day, Siobahn; Brown, James; Thomas, Zachery; Gregory, India; Bass, Lowell; Dozier, Gerry (2016). "Adversarial Authorship, Author Webs, and Entropy-Based Evolutionary Clustering". 2016 25th International Conference on Computer Communication and Networks (ICCCN). pp. 1–6. doi:10.1109/ICCCN.2016.7568489. ISBN 978-1-5090-2279-3. S2CID 17584987.
  • Faust, Christina; Dozier, Gerry; Xu, Jinsheng; King, Michael C. (2017). "Adversarial authorship, interactive evolutionary hill-climbing, and author CAAT-III". 2017 IEEE Symposium Series on Computational Intelligence (SSCI). pp. 1–8. doi:10.1109/SSCI.2017.8285355. ISBN 978-1-5386-2726-6. S2CID 3313052.
  • Stuart, Lauren M.; Tazhibayeva, Saltanat; Wagoner, Amy R.; Taylor, Julia M. (2013). "On Identifying Authors with Style". 2013 IEEE International Conference on Systems, Man, and Cybernetics. pp. 3048–3053. doi:10.1109/SMC.2013.520. ISBN 978-1-4799-0652-9. S2CID 9969606.
  • Koppel, Moshe; Schler, Jonathan (2004). "Authorship verification as a one-class classification problem". Twenty-first international conference on Machine learning - ICML '04. p. 62. doi:10.1145/1015330.1015448. ISBN 1581138285. S2CID 2545890. {{cite book}}: Check |isbn= value: checksum (help)
  • Khosmood, Foaad; Levinson, Robert (2010). "Automatic Synonym and Phrase Replacement Show Promise for Style Transformation". 2010 Ninth International Conference on Machine Learning and Applications. pp. 958–961. doi:10.1109/ICMLA.2010.153. ISBN 978-1-4244-9211-4. S2CID 16811193.
  • Caliskan, Aylin; Greenstadt, Rachel (2012). "Translate Once, Translate Twice, Translate Thrice and Attribute: Identifying Authors and Machine Translation Tools in Translated Text". 2012 IEEE Sixth International Conference on Semantic Computing. pp. 121–125. doi:10.1109/ICSC.2012.46. ISBN 978-1-4673-4433-3. S2CID 8766224.
  • Somers, Harold; Tweedie, Fiona (2003). "Authorship Attribution and Pastiche". Computers and the Humanities. 37 (4): 407–429. doi:10.1023/A:1025786724466. JSTOR 30204914. S2CID 40870902.
  • Bevendorff, Janek; Wenzel, Tobias; Potthast, Martin; Hagen, Matthias; Stein, Benno (2020). "On divergence-based author obfuscation: An attack on the state of the art in statistical authorship verification". It - Information Technology. 62 (2): 99–115. doi:10.1515/itit-2019-0046. S2CID 214625252.

Leave a Reply