{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:OVRB77H2JDCCKETRHS3DIPNBYB","short_pith_number":"pith:OVRB77H2","schema_version":"1.0","canonical_sha256":"75621ffcfa48c42512713cb6343da1c0691147f98c9695f6362324f6c152441a","source":{"kind":"arxiv","id":"1902.08939","version":2},"attestation_state":"computed","paper":{"title":"Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CL","authors_text":"N. Asokan, Tommi Gr\\\"ondahl","submitted_at":"2019-02-24T13:18:27Z","abstract_excerpt":"Textual deception constitutes a major problem for online security. Many studies have argued that deceptiveness leaves traces in writing style, which could be detected using text classification techniques. By conducting an extensive literature review of existing empirical work, we demonstrate that while certain linguistic features have been indicative of deception in certain corpora, they fail to generalize across divergent semantic domains. We suggest that deceptiveness as such leaves no content-invariant stylistic trace, and textual similarity measures provide superior means of classifying te"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1902.08939","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CL","submitted_at":"2019-02-24T13:18:27Z","cross_cats_sorted":[],"title_canon_sha256":"a1412bde3617e26dba9563653dba55ce0bc12121fb69aa885e5247e035a97776","abstract_canon_sha256":"123de4587fe4b97c91bc1a21c0dcab53ac60579eb54167ea3a0758957df731a0"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:52:35.750822Z","signature_b64":"139o2tGuabBI7NOd+08/cBQO0AbLWLBTDFlzRsrOORea85kkSSlze4hV6Pyr/GnSLqy80zAsBYGa8Ar328ORCA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"75621ffcfa48c42512713cb6343da1c0691147f98c9695f6362324f6c152441a","last_reissued_at":"2026-05-17T23:52:35.750374Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:52:35.750374Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CL","authors_text":"N. Asokan, Tommi Gr\\\"ondahl","submitted_at":"2019-02-24T13:18:27Z","abstract_excerpt":"Textual deception constitutes a major problem for online security. Many studies have argued that deceptiveness leaves traces in writing style, which could be detected using text classification techniques. By conducting an extensive literature review of existing empirical work, we demonstrate that while certain linguistic features have been indicative of deception in certain corpora, they fail to generalize across divergent semantic domains. We suggest that deceptiveness as such leaves no content-invariant stylistic trace, and textual similarity measures provide superior means of classifying te"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1902.08939","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1902.08939","created_at":"2026-05-17T23:52:35.750441+00:00"},{"alias_kind":"arxiv_version","alias_value":"1902.08939v2","created_at":"2026-05-17T23:52:35.750441+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1902.08939","created_at":"2026-05-17T23:52:35.750441+00:00"},{"alias_kind":"pith_short_12","alias_value":"OVRB77H2JDCC","created_at":"2026-05-18T12:33:24.271573+00:00"},{"alias_kind":"pith_short_16","alias_value":"OVRB77H2JDCCKETR","created_at":"2026-05-18T12:33:24.271573+00:00"},{"alias_kind":"pith_short_8","alias_value":"OVRB77H2","created_at":"2026-05-18T12:33:24.271573+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/OVRB77H2JDCCKETRHS3DIPNBYB","json":"https://pith.science/pith/OVRB77H2JDCCKETRHS3DIPNBYB.json","graph_json":"https://pith.science/api/pith-number/OVRB77H2JDCCKETRHS3DIPNBYB/graph.json","events_json":"https://pith.science/api/pith-number/OVRB77H2JDCCKETRHS3DIPNBYB/events.json","paper":"https://pith.science/paper/OVRB77H2"},"agent_actions":{"view_html":"https://pith.science/pith/OVRB77H2JDCCKETRHS3DIPNBYB","download_json":"https://pith.science/pith/OVRB77H2JDCCKETRHS3DIPNBYB.json","view_paper":"https://pith.science/paper/OVRB77H2","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1902.08939&json=true","fetch_graph":"https://pith.science/api/pith-number/OVRB77H2JDCCKETRHS3DIPNBYB/graph.json","fetch_events":"https://pith.science/api/pith-number/OVRB77H2JDCCKETRHS3DIPNBYB/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/OVRB77H2JDCCKETRHS3DIPNBYB/action/timestamp_anchor","attest_storage":"https://pith.science/pith/OVRB77H2JDCCKETRHS3DIPNBYB/action/storage_attestation","attest_author":"https://pith.science/pith/OVRB77H2JDCCKETRHS3DIPNBYB/action/author_attestation","sign_citation":"https://pith.science/pith/OVRB77H2JDCCKETRHS3DIPNBYB/action/citation_signature","submit_replication":"https://pith.science/pith/OVRB77H2JDCCKETRHS3DIPNBYB/action/replication_record"}},"created_at":"2026-05-17T23:52:35.750441+00:00","updated_at":"2026-05-17T23:52:35.750441+00:00"}