Machine Learning Methods for Stylometry


Book Description

This book presents methods and approaches used to identify the true author of a doubtful document or text excerpt. It provides a broad introduction to all text categorization problems (like authorship attribution, psychological traits of the author, detecting fake news, etc.) grounded in stylistic features. Specifically, machine learning models as valuable tools for verifying hypotheses or revealing significant patterns hidden in datasets are presented in detail. Stylometry is a multi-disciplinary field combining linguistics with both statistics and computer science. The content is divided into three parts. The first, which consists of the first three chapters, offers a general introduction to stylometry, its potential applications and limitations. Further, it introduces the ongoing example used to illustrate the concepts discussed throughout the remainder of the book. The four chapters of the second part are more devoted to computer science with a focus on machine learning models. Their main aim is to explain machine learning models for solving stylometric problems. Several general strategies used to identify, extract, select, and represent stylistic markers are explained. As deep learning represents an active field of research, information on neural network models and word embeddings applied to stylometry is provided, as well as a general introduction to the deep learning approach to solving stylometric questions. In turn, the third part illustrates the application of the previously discussed approaches in real cases: an authorship attribution problem, seeking to discover the secret hand behind the nom de plume Elena Ferrante, an Italian writer known worldwide for her My Brilliant Friend’s saga; author profiling in order to identify whether a set of tweets were generated by a bot or a human being and in this second case, whether it is a man or a woman; and an exploration of stylistic variations over time using US political speeches covering a period of ca. 230 years. A solutions-based approach is adopted throughout the book, and explanations are supported by examples written in R. To complement the main content and discussions on stylometric models and techniques, examples and datasets are freely available at the author’s Github website.




Authorship Attribution


Book Description

Authorship Attribution surveys the history and present state of the discipline, presenting some comparative results where available. It also provides a theoretical and empirically-tested basis for further work. Many modern techniques are described and evaluated, along with some insights for application for novices and experts alike.




Versification and Authorship Attribution


Book Description

The technique known as contemporary stylometry uses different methods, including machine learning, to discover a poem’s author based on features like the frequencies of words and character n-grams. However, there is one potential textual fingerprint stylometry tends to ignore: versification, or the very making of language into verse. Using poetic texts in three different languages (Czech, German, and Spanish), Petr Plecháč asks whether versification features like rhythm patterns and types of rhyme can help determine authorship. He then tests its findings on two unsolved literary mysteries. In the first, Plecháč distinguishes the parts of the Elizabethan verse play The Two Noble Kinsmen written by William Shakespeare from those written by his coauthor, John Fletcher. In the second, he seeks to solve a case of suspected forgery: how authentic was a group of poems first published as the work of the nineteenth-century Russian author Gavriil Stepanovich Batenkov? This book of poetic investigation should appeal to literary sleuths the world over.




Computational Intelligence in Data Mining


Book Description

The book presents high quality papers presented at the International Conference on Computational Intelligence in Data Mining (ICCIDM 2016) organized by School of Computer Engineering, Kalinga Institute of Industrial Technology (KIIT), Bhubaneswar, Odisha, India during December 10 – 11, 2016. The book disseminates the knowledge about innovative, active research directions in the field of data mining, machine and computational intelligence, along with current issues and applications of related topics. The volume aims to explicate and address the difficulties and challenges that of seamless integration of the two core disciplines of computer science.




Quantitative Methods in Corpus-based Translation Studies


Book Description

This is a comprehensive guidebook to the quantitative methods needed for Corpus-Based Translation Studies (CBTS). It provides a systematic description of the various statistical tests used in Corpus Linguistics which can be used in translation research. In Part 1, Theoretical Explorations, the interplay between quantitative and qualitative methodologies is explored. Part 2, Essential Corpus Studies, describes how to undertake quantitative studies, with a suitable level of technical and relevant case studies. Part 3, Quantitative Explorations of Literary Translations, looks at translations of classic works by Cao Xueqin, James Joyce and other authors. Finally, Part 4 on Translation Lexis uses a variety of techniques new to translation studies, including multivariate analysis and game theory. This book is aimed at students and researchers of corpus linguistics, translation studies and quantitative linguistics. It will significantly advance current translation studies in terms of methodological innovation and will fill in an important gap in the development of quantitative methods for interdisciplinary translation studies.




Intelligent Systems Technologies and Applications


Book Description

This book constitutes the thoroughly refereed post-conference proceedings of the third International Symposium on Intelligent Systems Technologies and Applications (ISTA’17), September 13-16, 2017, Manipal, Karnataka, India. All submissions were evaluated on the basis of their significance, novelty, and technical quality. This proceedings contains 34 papers selected for presentation at the Symposium.




›Prometheus Bound‹ - A Separate Authorial Trace in the Aeschylean Corpus


Book Description

Classics, Computer Science, and Linguistics are brought together in this book, in an attempt to provide an answer to the authorship question concerning Prometheus Bound, a disputed play in the Aeschylean corpus, by applying some well-established Computer Stylistics methods. One of the main objectives of Stylometry, which, broadly speaking, is the study of quantified style, is Authorship Attribution. In its traditional form it can range from manually calculating descriptive statistics to the use of computer-assisted methodologies. However, non-traditional Authorship Attribution drastically changed the field. It brought together modern Linguistics and Artificial Intelligence applications (machine learning, natural language processing), and its key characteristic is that it aims at developing fully-automated systems for the attribution of texts of unknown authorship. In this book the author employs a series of supervised and unsupervised techniques used in non-traditional Authorship Attribution–applied here for the first time in ancient drama. The outcome of the analysis indicates a significant distance between the disputed text and the secure plays of Aeschylus, but also various interesting (micro-linguistic) ties of affinity with other authors, especially Sophocles and Euripides.




Cyber Security Cryptography and Machine Learning


Book Description

This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.




Smart Technologies, Systems and Applications


Book Description

This book constitutes the refereed proceedings of the 3rd International Conference on Smart Technologies, Systems and Applications, SmartTech-IC 2022, held in Cuenca, Ecuador, in November 16–18, 2022. The 37 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Smart Technologies, Smart Systems, Smart Trends and Applications.




Handbook of Digital Politics


Book Description

This thoroughly revised second edition Handbook examines the latest knowledge and perspectives on digital politics. Leading scholars explore the expansion of digital technologies, channels and styles as it shapes political dynamics.