Authorship verification using deep belief network systems

被引:31
作者
Brocardo, Marcelo Luiz [1 ]
Traore, Issa [1 ]
Woungang, Isaac [2 ]
Obaidat, Mohammad S. [3 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC, Canada
[2] Ryerson Univ, Dept Comp Sci, 245 Church St, Toronto, ON M5B 2K3, Canada
[3] Fordham Univ, Dept Comp & Informat Sci, New York, NY 10023 USA
关键词
authorship verification; continuous authentication; Gaussian-Bernoulli deep belief network; stylometry;
D O I
10.1002/dac.3259
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper explores the use of deep belief networks for authorship verification model applicable for continuous authentication (CA). The proposed approach uses Gaussian units in the visible layer to model real-valued data on the basis of a Gaussian-Bernoulli deep belief network. The lexical, syntactic, and application-specific features are explored, leading to the proposal of a method to merge a pair of features into a single one. The CA is simulated by decomposing an online document into a sequence of short texts over which the CA decisions happen. The experimental evaluation of the proposed method uses block sizes of 140, 280, 500 characters, on the basis of the Twitter and Enron e-mail corpuses. Promising results are obtained, which consist of an equal error rate varying from 8.21% to 16.73%. Using relatively smaller forgery samples, an equal error rate varying from 5.48% to 12.3% is also obtained for different block sizes.
引用
收藏
页数:10
相关论文
共 25 条
[1]   Applying authorship analysis to extremist-group web forum messages [J].
Abbasi, A ;
Chen, HC .
IEEE INTELLIGENT SYSTEMS, 2005, 20 (05) :67-75
[2]   Biometric Recognition Based on Free-Text Keystroke Dynamics [J].
Ahmed, Ahmed A. ;
Traore, Issa .
IEEE TRANSACTIONS ON CYBERNETICS, 2014, 44 (04) :458-472
[3]  
[Anonymous], P 2006 C EMP METH NA
[4]  
[Anonymous], 2014, P 10 NCEE
[5]  
[Anonymous], P INT C ART INT STAT
[6]  
[Anonymous], P STUD FAC RES DAY C
[7]  
Barandela R, 2004, LECT NOTES COMPUT SC, V3138, P806
[8]  
Bengio S., 2004, P OD SPEAK LANG REC, P237
[9]  
Berger J., 2010, Proceedings of the Python for Scientific Computing Conference (SciPy), number Scipy, P1
[10]   Authorship verification of e-mail and tweet messages applied for continuous authentication [J].
Brocardo, Marcelo Luiz ;
Traore, Issa ;
Woungang, Isaac .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (08) :1429-1440