<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Overview of the Author Obfuscation Task at PAN 2017: Safety Evaluation Revisited</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Matthias</forename><surname>Hagen</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Bauhaus-Universität Weimar</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Martin</forename><surname>Potthast</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Bauhaus-Universität Weimar</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Benno</forename><surname>Stein</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Bauhaus-Universität Weimar</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">Overview of the Author Obfuscation Task at PAN 2017: Safety Evaluation Revisited</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">96D4EDB4EEC355492E9BD00DB96CB296</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T20:28+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>We report on the second large-scale evaluation of style obfuscation approaches in a shared task on author obfuscation, organized at the PAN 2017 lab on digital text forensics. Author obfuscation means to automatically paraphrase a given text such that state-of-the-art authorship verification approaches misjudge a given pair of documents as having been written by "different authors" if in fact they would have decided otherwise without obfuscation. This year, two new obfuscators are compared to the participants from last year's task against a total of 44 authorship verification approaches. The best-performing obfuscator successfully impacts the decision-making process of the authorship verifiers significantly. However, as in the last year, the paraphrased texts are often not really human-readable anymore and have some changed context, indicating that there is still way to go to "perfect" automatic obfuscation that (1) tricks verification approaches, (2) keeps the meaning of the original, and (3) is, regarding its obfuscation, unsuspicious to a human eye.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>At PAN 2017 we organized the second shared task on author obfuscation in order to foster exploring the potential vulnerabilities of author identification technology. Like in the first edition, the specific task is that of author masking against authorship verification, which in turn has been a shared task at PAN 2013-2015 <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b16">17,</ref><ref type="bibr" target="#b17">18]</ref>. The following synopses point out the differences:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Authorship Verification</head><p>Given two documents, decide whether both have been written by the same author.</p><p>vs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Author Masking</head><p>Given two documents from the same author, paraphrase the designated one such that an authorship verification will fail.</p><p>Figure <ref type="figure" target="#fig_0">1</ref> illustrates the setting and shows that the two tasks are diametrically opposed to each other: Success of a certain approach for one of these tasks depends on its "immunity" against the most effective approaches for the other. In our overview of last year's first author masking edition <ref type="bibr" target="#b15">[16]</ref>, we already included a survey of related work on author obfuscation. In particular, we introduced and discussed the "obfuscation impact measures" used in the evaluation, which we will quickly recap in Section 2. reviews the obfuscation approaches that have been submitted to this year's edition of the shared task, and Section 4 reports on their evaluation against the state of the art in authorship verification.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Evaluating Author Obfuscation</head><p>As of last year, we consider three performance dimensions according to which an author obfuscation approach must excel to be considered fit for practical use. Obviously, the obfuscation performance should depend on the capability of fooling forensic expertsbe it a piece of software or a human. However, fulfilling this requirement in isolation will disregard writers and their target audience, whose primary goal is to communicate, albeit safe from deanonymization: the quality of an obfuscated text along with the fact that its semantics is preserved are equally important. We hence call an obfuscation software 1. safe, if its obfuscated texts cannot be attributed to their original authors anymore, 2. sound, if its obfuscated texts are textually entailed by their originals, and 3. sensible, if its obfuscated texts are well-formed and inconspicuous. These dimensions are orthogonal; an obfuscation software may meet each of them to a certain degree of perfection. Related work on operationalizing measures for these dimensions has been included in our overview from the last year <ref type="bibr" target="#b15">[16]</ref>. In order to analyze the safety dimension, we run the obfuscated texts against 44 authorship verification approaches and measure the impact of the obfuscation on the verifiers in form of changed verification decisions (cf. last year's overview for details on the used measures <ref type="bibr" target="#b15">[16]</ref>). As for sensibleness and soundness we stick to manual inspection and grading of examples.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Survey of Submitted Obfuscation Approaches</head><p>The two approaches submitted to this year's edition of our shared task follow different strategies: sequence-to-sequence models and rule-based replacements. While a more conservative rule-based strategy often changes the to-be-obfuscated text only slightly, the sequence-to-sequence modeling can lead to substantial differences.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Bakhteev and Khazov</head><p>The approach of Bakhteev and Khazov <ref type="bibr" target="#b0">[1]</ref> is mainly based on different sequence-to-sequence models and some small set of rules. The rules replace contractions (e.g., 'll → will), split or concatenate sentences using conjunctive words (e.g., and), and add or remove introductory phrases (e.g., anyway) to and from sentences respectively. The main idea of sequence-to-sequence modeling comes in two flavors: (1) replacing synonyms based on nearest neighbors in word embeddings from a Wikipedia dump, and (2) an encoder-decoder approach that generates some "reproduced" version of the original text, which is also based on embeddings trained on a Wikipedia dump. In both cases, the author choose from different possible variants of an obfuscated sentence that one that best matches a language model trained on Shakespeare texts.</p><p>As for the resulting texts, the strategy for combining and splitting sentences should pay more attention to the local situation, since otherwise it will quickly lead to incomplete or overlong constructions. A more detailed analysis of the text quality follows in the evaluation (cf. Section 4).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Castro et al.</head><p>The approach of Castro et al. <ref type="bibr" target="#b5">[6]</ref> focuses on simple rule-or patternbased replacements. Using the FreeLing NLP tool for pre-processing texts (POS tagging, word sense disambiguation, etc.) several ideas are combined. Contractions are replaced based on a dictionary or the long version if it is used more often, synonyms are substituted using FreeLing functionality, and sentences are shortened by leaving out parts in parentheses, by leaving out discourse markers, or by eliminating appositions based on two simple patterns that identify explanations if named entities are introduced in the text.</p><p>The resulting text will usually be shorter than the original text, which, however, is intended by the authors. Most of the removals do not dramatically change the meaning of the text; a similar observation applies to the treatment of contractions. Still, leaving out information from the original may render parts of the resulting text hard to understand. Depending on FreeLing's synonym functionality, synonyms are often not appropriately chosen since the context seems not to be considered when selecting a replacement candidate. A more detailed analysis of the text quality follows in the evaluation (cf. Section 4).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Evaluation</head><p>As in the last year, we automatically evaluate the safety of the submitted obfuscation approaches against 44 authorship verifiers which have been submitted to the previous three shared tasks on authorship identification at PAN 2013-2015. Sensibleness and soundness of the obfuscated texts are assessed manually by human inspection.</p><p>The evaluation setup is the cloud-based evaluation platform TIRA <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b14">15]</ref>, <ref type="foot" target="#foot_0">1</ref> which is being developed as part of our long-term evaluation-as-a-service initiative <ref type="bibr" target="#b9">[10]</ref>. We Table <ref type="table">1</ref>. Safety evaluation of five obfuscators, including those submitted to PAN 2016, against sets of 26-36 authorship verification approaches submitted to PAN 2013 through PAN 2015. The column group "PAN measures" shows the average performance delta on the evaluation measures ROC AUC, C@1, and the final score AUC • C@1 applied at PAN. The four row groups belong to the four English PAN test datasets; the rows within the row groups are ordered by average impact (avg imp, see the last column).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Obfuscator</head><p>Verifier Dataset PAN Measures Obfuscation Measures want to point out that-by using TIRA-it was possible to run 44 of the 49 authorship verification approaches (which have been submitted to the shared tasks at PAN 2013-2015) on the outputs of the submitted obfuscation approaches. The outputs, in turn, were generated from the authorship verification corpora PAN13, PAN14 EE, PAN14 EN, and PAN15.</p><formula xml:id="formula_0">Team [Reference] |Y | D test |D + test | ∆ AUC ∆ C@1 ∆ final ∆ acc ∆ rec avg imp</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Safety</head><p>Table <ref type="table">1</ref> shows the results of our safety evaluation of the two approaches from this year compared to the three approaches from last year against 44 authorship verification approaches on the aforementioned four PAN evaluation datasets. We combine the two rankings into an overall ranking of obfuscation approaches suggested so far in order to interpret the results of this year's participants in context. The best-performing approach this year was submitted by Castro et al. <ref type="bibr" target="#b5">[6]</ref>, which achieve second rank overall across both years as per average impact; the average impact quantifies the averaged ratio of true positive decisions turned false negative. However, this result must be taken with a grain of salt since this approach basically removed large parts of the original text. The approach of Bakhteev and Khazov <ref type="bibr" target="#b0">[1]</ref> performs second-best this year, and ranks fourth out of five overall. The ranking induced by average impact is the same as that induced by all other measures, rendering the measures perfectly consistent. This consistency, however, forecloses more insights that can usually be derived from differing performance characteristics. In this regard, the qualitative assessment of sensibleness and soundness presented in the following subsection is important. Altogether, the approach of Mihaylova et al. <ref type="bibr" target="#b13">[14]</ref> still performs best among all approaches.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Sensibleness and Soundness</head><p>As in last year's edition, a human assessor conducted an in-depth manual assessment on problem instances 135, and 430. Spot checks on other instances again indicated that the overall characteristics of the output texts are similar on other instances. The human assessor started by reading the obfuscated texts without knowing which was the output of what approach. During this reading phase, the assessor marked up errors (typos, grammar) and assigned school grades (on a scale from 1 (excellent) to 5 (fail)) for the sensibleness of each of the sample problem instances. The sensibleness scores obtained in the last year were a grade 2 for Mansoorizadeh et al.'s approach <ref type="bibr" target="#b12">[13]</ref> that does not really change a lot on a per sentence basis, a grade 4 for Mihaylova et al.'s obfuscator <ref type="bibr" target="#b13">[14]</ref>, and a grade 5 for Keswani et al.'s obfuscator <ref type="bibr" target="#b11">[12]</ref>. This year's approaches get a grade 4 for Bakhteev's and Khazov's approach <ref type="bibr" target="#b0">[1]</ref>, since there are a lot of issues with respect to uppercasing at sentence starts as well as many grammatical problems due to problematic sentence splits and merges, and due to inappropriate use of synonyms. As for Castro et al.'s approach <ref type="bibr" target="#b5">[6]</ref> grade 2s were assigned if only some problematically short sentences were grammatically incorrect or if spacing around punctuation marks was incorrect, while other documents got a grade 3 for too short sentences that were grammatically wrong or for synonyms not making sense in some contexts.</p><p>After grading the sensibleness of the obfuscated texts, the assessor read the original texts and judged the textual differences in various ways to evaluate the soundness of the obfuscated texts on a three-point scale as either "correct", "passable", or "incorrect". The obfuscated texts of Mihaylova et al.'s and Keswani et al.'s approaches were all judged "incorrect", while Mansoorizadeh et al.'s very conservative approach achieved "correct" and "passable" scores. This year's approaches (Bakhteev's and Khazov's, and Castro et al.'s) both got "incorrect" as judgments-but for different reasons: With regard to Bakhteev's and Khazov's approach, many parts of the resulting texts were not understandable anymore because of overly rigid changes in sentences, which completely removed the original meaning. With regard to Castro et al.'s approach, the judgment results from the fact that the obfuscated text covers only a small portion of the original text (about the first third of the original), maybe an undesired side-effect due to some pre-processing problems. The parts that are still contained in the obfuscated version often achieve at least a "passable" judgment, and they could even be judged as "correct". However, the fact that about two thirds of the original was omitted precluded a better outcome.</p><p>In the second year of evaluating author obfuscation approaches in terms of their safety against the state of the art in authorship verification, two new approaches were added to the three approaches from last year. The best-performing obfuscator flips on average about 42% of an authorship verifier's decisions towards choosing "different author" when the opposite decision would have been correct, indicating some level of safety against verification approaches. As for soundness and sensibleness, though, the approaches often produce rather unreadable text or text whose meaning is significantly changed. Still, such insights are mainly obtained from manual inspection.</p><p>The challenge of evaluating author obfuscation approaches properly and at scale would definitely benefit from new technologies that are capable of recognizing paraphrases, textual entailment, grammaticality, and style deception. However, a very important direction for future research in the authorship obfuscation domain is that on producing safe and still sound and sensible texts. So far, there are only two groups of obfuscation approaches: (1) approaches that are somewhat safe but that often produce unreadable text or text that is neither sound nor sensible, and (2) approaches that produce sound and sensible texts but that are not safe against authorship verification.</p><p>A significant improvement of current obfuscation technology requires a much better consideration and integration of the surrounding context when replacing, adding, or removing words. Note that such kind of sensible text operations can also be operationalized by applying paraphrasing rules from the PPDB <ref type="bibr" target="#b7">[8]</ref>, as is done for instance in an approach on constrained paraphrasing <ref type="bibr" target="#b18">[19]</ref>.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 .</head><label>1</label><figDesc>Figure1illustrates the setting and shows that the two tasks are diametrically opposed to each other: Success of a certain approach for one of these tasks depends on its "immunity" against the most effective approaches for the other. In our overview of last year's first author masking edition<ref type="bibr" target="#b15">[16]</ref>, we already included a survey of related work on author obfuscation. In particular, we introduced and discussed the "obfuscation impact measures" used in the evaluation, which we will quickly recap in Section 2. Section 3</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">www.tira.io</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>We thank the participating teams of the two editions of this shared task.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Bibliography</head></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Author Masking using Sequence-to-Sequence Models-Notebook for PAN at CLEF</title>
		<author>
			<persName><forename type="first">O</forename><surname>Bakhteev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Khazov</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-/" />
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<ptr target="http://www.clef-initiative.eu/publication/working-notes" />
	</analytic>
	<monogr>
		<title level="m">CLEF 2016 Evaluation Labs and Workshop -Working Notes Papers</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<editor>
			<persName><forename type="first">K</forename><surname>Balog</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Cappellato</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><surname>Ferro</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Macdonald</surname></persName>
		</editor>
		<meeting><address><addrLine>Évora, Portugal</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016-09">September. 2016</date>
			<biblScope unit="page" from="5" to="8" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<ptr target="http://www.clef-initiative.eu/publication/working-notes" />
	</analytic>
	<monogr>
		<title level="m">CLEF 2017 Evaluation Labs and Workshop -Working Notes Papers</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<editor>
			<persName><forename type="first">L</forename><surname>Cappellato</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><surname>Ferro</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Goeuriot</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Mandl</surname></persName>
		</editor>
		<meeting><address><addrLine>Dublin, Ireland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017-09">September. 2017</date>
			<biblScope unit="page" from="11" to="14" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<ptr target="http://www.clef-initiative.eu/publication/working-notes" />
	</analytic>
	<monogr>
		<title level="m">CLEF 2014 Evaluation Labs and Workshop -Working Notes Papers</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<editor>
			<persName><forename type="first">L</forename><surname>Cappellato</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><surname>Ferro</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Halvey</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">W</forename><surname>Kraaij</surname></persName>
		</editor>
		<meeting><address><addrLine>Sheffield, UK</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014-09">September. 2014</date>
			<biblScope unit="page" from="15" to="18" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<ptr target="http://www.clef-initiative.eu/publication/working-notes" />
	</analytic>
	<monogr>
		<title level="m">CLEF 2015 Evaluation Labs and Workshop -Working Notes Papers</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<editor>
			<persName><forename type="first">L</forename><surname>Cappellato</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><surname>Ferro</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Jones</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>San Juan</surname></persName>
		</editor>
		<meeting><address><addrLine>Toulouse, France</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015-09">September. 2015</date>
			<biblScope unit="page" from="8" to="11" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Author Masking by Sentence Transformation-Notebook for PAN at CLEF</title>
		<author>
			<persName><forename type="first">D</forename><surname>Castro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ortega</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Muñoz</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-/" />
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<ptr target="http://www.clef-initiative.eu/publication/working-notes" />
		<title level="m">CLEF 2013 Evaluation Labs and Workshop -Working Notes Papers</title>
				<editor>
			<persName><forename type="first">P</forename><surname>Forner</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Navigli</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Tufis</surname></persName>
		</editor>
		<meeting><address><addrLine>Valencia, Spain</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013-09">September. 2013</date>
			<biblScope unit="page" from="23" to="26" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">PPDB: The paraphrase database</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ganitkevitch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Van Durme</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Callison-Burch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Human Language Technologies: Conference of the North American Chapter of the Association of Computational Linguistics, Proceedings</title>
				<meeting><address><addrLine>Westin Peachtree Plaza Hotel, Atlanta, Georgia, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">June 9-14, 2013. 2013</date>
			<biblScope unit="page" from="758" to="764" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Ousting Ivory Tower Research: Towards a Web Framework for Providing Experiments as a Service</title>
		<author>
			<persName><forename type="first">T</forename><surname>Gollub</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Stein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Burrows</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">35th International ACM Conference on Research and Development in Information Retrieval (SIGIR 12)</title>
				<editor>
			<persName><forename type="first">B</forename><surname>Hersh</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Callan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>Maarek</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Sanderson</surname></persName>
		</editor>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2012-08">Aug 2012</date>
			<biblScope unit="page" from="1125" to="1126" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Hanbury</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Müller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Balog</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Brodt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Cormack</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Eggel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Gollub</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Hopfgartner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kalpathy-Cramer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kando</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Krithara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Mercer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Potthast</surname></persName>
		</author>
		<idno>ArXiv e-prints</idno>
		<ptr target="http://arxiv.org/abs/1512.07454" />
		<title level="m">Evaluation-as-a-Service: Overview and Outlook</title>
				<imprint>
			<date type="published" when="2015-12">Dec 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Overview of the Author Identification Task at PAN</title>
		<author>
			<persName><forename type="first">P</forename><surname>Juola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Stamatatos</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Author Masking through Translation-Notebook for PAN at CLEF</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Keswani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Trivedi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mehta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Majumder</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-1609/" />
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Author Obfuscation using WordNet and Language Models-Notebook for PAN at CLEF</title>
		<author>
			<persName><forename type="first">M</forename><surname>Mansoorizadeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Rahgooy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Aminiyan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Eskandari</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-1609/" />
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">SU@PAN&apos;2016: Author Obfuscation-Notebook for PAN at CLEF</title>
		<author>
			<persName><forename type="first">T</forename><surname>Mihaylova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Karadjov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Nakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kiprov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Georgiev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Koychev</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-1609/" />
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Improving the Reproducibility of PAN&apos;s Shared Tasks: Plagiarism Detection, Author Identification, and Author Profiling</title>
		<author>
			<persName><forename type="first">M</forename><surname>Potthast</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Gollub</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Rangel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Rosso</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Stamatatos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Stein</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Information Access Evaluation meets Multilinguality, Multimodality, and Visualization. 5th International Conference of the CLEF Initiative (CLEF 14</title>
				<editor>
			<persName><forename type="first">E</forename><surname>Kanoulas</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Lupu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Clough</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Sanderson</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Hall</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Hanbury</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Toms</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg New York</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014-09">Sep 2014</date>
			<biblScope unit="page" from="268" to="299" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Author Obfuscation: Attacking the State of the Art in Authorship Verification</title>
		<author>
			<persName><forename type="first">M</forename><surname>Potthast</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hagen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Stein</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-1609/" />
	</analytic>
	<monogr>
		<title level="m">Working Notes Papers of the CLEF 2016 Evaluation Labs. CEUR Workshop Proceedings, CLEF and CEUR-WS</title>
				<imprint>
			<date type="published" when="2016-09">Sep 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Overview of the Author Identification Task at PAN</title>
		<author>
			<persName><forename type="first">E</forename><surname>Stamatatos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">D</forename><surname>Amd Ben Verhoeven</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Juola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>López-López</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Potthast</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Stein</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">Overview of the Author Identification Task at PAN</title>
		<author>
			<persName><forename type="first">E</forename><surname>Stamatatos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Daelemans</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Verhoeven</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Potthast</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Stein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Juola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sanchez-Perez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Barrón-Cedeño</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Generating Acrostics via Paraphrasing and Heuristic Search</title>
		<author>
			<persName><forename type="first">B</forename><surname>Stein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hagen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Bräutigam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">25th International Conference on Computational Linguistics (COLING 14</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Tsujii</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Hajic</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2014-08">Aug 2014</date>
			<biblScope unit="page" from="2018" to="2029" />
		</imprint>
	</monogr>
	<note>Association for Computational Linguistics</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
