{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T20:29:02Z","timestamp":1723235342495},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3377231","type":"journal-article","created":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T19:20:26Z","timestamp":1710357626000},"page":"39783-39803","source":"Crossref","is-referenced-by-count":1,"title":["Semantic Clustering and Transfer Learning in Social Media Texts Authorship Attribution"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7844-4363","authenticated-orcid":false,"given":"Anastasia","family":"Fedotova","sequence":"first","affiliation":[{"name":"Department of Security, Tomsk State University of Control Systems and Radioelectronics, Tomsk, Russia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5619-1836","authenticated-orcid":false,"given":"Anna","family":"Kurtukova","sequence":"additional","affiliation":[{"name":"Department of Security, Tomsk State University of Control Systems and Radioelectronics, Tomsk, Russia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2587-2222","authenticated-orcid":false,"given":"Aleksandr","family":"Romanov","sequence":"additional","affiliation":[{"name":"Department of Security, Tomsk State University of Control Systems and Radioelectronics, Tomsk, Russia"}]},{"given":"Alexander","family":"Shelupanov","sequence":"additional","affiliation":[{"name":"Department of Security, Tomsk State University of Control Systems and Radioelectronics, Tomsk, Russia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/fi14010004"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/a16010013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/fi13010003"},{"key":"ref4","volume-title":"RuBERT Model","year":"2024"},{"key":"ref5","volume-title":"MultiBERT Model","year":"2024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/info13090435"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2005.81"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3342827.3342834"},{"key":"ref10","volume-title":"Dark Web Forums","year":"2023"},{"key":"ref11","first-page":"2607","article-title":"Text-to-text transformer in authorship verification via stylistic and semantical analysis","volume-title":"Proc. CLEF","author":"Najafi"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/math10020277"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1017\/s1351324921000383"},{"key":"ref14","first-page":"124","article-title":"Automated detection of destructive content in social media","volume-title":"4th Int. Conf. Recent Develop. Control, Automat. Power Eng. (RDCAPE)","author":"Nagavi"},{"key":"ref15","first-page":"140","article-title":"Monitoring and identifying destructive information influences in modern social media","author":"Minaev","year":"2022","journal-title":"Inf. Secur., Yesterday, Today, Tomorrow"},{"issue":"1","key":"ref16","first-page":"188","article-title":"Methods of automatic annotation and selection of keywords in problems of detecting extremist information on the Internet","volume":"12","author":"Mashechkin","year":"2016","journal-title":"Modern Inf. Technol. IT Educ."},{"issue":"3","key":"ref17","first-page":"18","article-title":"Machine learning methods for the task of detecting and monitoring extremist information on the Internet","author":"Mashechkin","year":"2019","journal-title":"Programming"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/app10186527"},{"issue":"8","key":"ref19","first-page":"91","article-title":"Automated analysis of extremist texts","author":"Goncharov","year":"2019","journal-title":"Math. Methods Eng. Technol."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63007-2_58"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.02.024"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41278-3_74"},{"key":"ref23","volume-title":"BLEU Metric","year":"2024"},{"key":"ref24","volume-title":"ROUGE Metric","year":"2024"},{"key":"ref25","volume-title":"Scikit-learn Metrics","year":"2023"},{"key":"ref26","volume-title":"Latent Dirichlet Allocation","year":"2023"},{"key":"ref27","first-page":"110","article-title":"Tune your Brown clustering, please","volume-title":"Proc. Int. Conf. Recent Adv. Natural Lang. Process.","volume":"2015","author":"Derczynski"},{"key":"ref28","volume-title":"BERTopic","year":"2023"},{"key":"ref29","volume-title":"SentenceTransformers Documentation","year":"2023"},{"key":"ref30","volume-title":"UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction","year":"2023"},{"key":"ref31","volume-title":"How HDBSCAN Works","year":"2023"},{"key":"ref32","volume-title":"How ISIS Uses Twitter","year":"2023"},{"key":"ref33","volume-title":"Silhouette Score","year":"2023"},{"key":"ref34","volume-title":"Davies Bouldin Score","year":"2023"},{"key":"ref35","volume-title":"LaBSE","year":"2023"},{"key":"ref36","first-page":"2790","article-title":"Parameter-efficient transfer learning for NLP","volume-title":"Proc. Int. Conf. Mach. Learning.","author":"Houlsby"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-acl.438"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.47672\/ejt.1490"},{"key":"ref39","volume-title":"Russian Toxicity Classifier","year":"2023"},{"key":"ref40","volume-title":"Emotion Detection","year":"2023"},{"key":"ref41","volume-title":"Russian Sensitive Topics","year":"2023"},{"key":"ref42","first-page":"26","article-title":"Detecting inappropriate messages on sensitive topics that could harm a company\u2019s reputation","volume-title":"Proc. 8th Workshop Balto-Slavic Natural Lang. Process.","author":"Babakov"},{"key":"ref43","first-page":"45","article-title":"Development of a system for finding extremist texts","volume-title":"CEUR Workshop Proc.","author":"Moshkin"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/acit50332.2020.9300086"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/eiconrus.2018.8317386"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1051\/e3sconf\/202343602004"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/info14090492"},{"key":"ref48","volume-title":"Destructive Dataset Demo Version","year":"2024"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10472512.pdf?arnumber=10472512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T06:31:41Z","timestamp":1712903501000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10472512\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3377231","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}