no code implementations • 13 Mar 2024 • Andrea Nini, Oren Halvani, Lukas Graner, Valerio Gherardi, Shunichi Ishihara
Existing state-of-the-art AV methods use computational solutions that are not supported by a plausible scientific explanation for their functioning and that are often difficult for analysts to interpret.
no code implementations • 1 Aug 2020 • Oren Halvani, Lukas Graner, Roey Regev
A central problem that has been researched for many years in the field of digital text forensics is the question whether two documents were written by the same author.
no code implementations • 22 Jun 2020 • Oren Halvani, Lukas Graner, Roey Regev
A central problem that has been researched for many years in the field of digital text forensics is the question whether two documents were written by the same author.
no code implementations • 2 May 2020 • Oren Halvani, Lukas Graner
In recent years, a variety of AV methods have been proposed that focus on this problem and can be divided into two categories: The first category refers to such methods that are based on explicitly defined features, where one has full control over which features are considered and what they actually represent.
no code implementations • 24 Jun 2019 • Oren Halvani, Christian Winter, Lukas Graner
Our results indicate that part of the methods are able to cope with very challenging verification cases such as 250 characters long informal chat conversations (72. 7% accuracy) or cases in which two scientific documents were written at different times with an average difference of 15. 6 years (> 75% accuracy).
no code implementations • 31 Dec 2018 • Oren Halvani, Christian Winter, Lukas Graner
Even though AV represents a unary classification problem, a number of existing approaches consider it as a binary classification task.
1 code implementation • 1 Mar 2018 • Oren Halvani, Lukas Graner, Inna Vogel
Moreover, many existing AV methods are based on explicit thresholds (needed to accept or reject a stated authorship), which are determined on training corpora.
1 code implementation • 1 Jun 2017 • Oren Halvani, Christian Winter, Lukas Graner
Instead, the only three key components of our method are a compressing algorithm, a dissimilarity measure and a threshold, needed to accept or reject the authorship of the questioned document.