<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Bidirectional Echo State Network-based Reservoir Computing for Cross-domain Authorship Attribution</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Corpus</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Macro-averaged F</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Neuchaˆtel</institution>
          <addr-line>rue Emile Argand 11 2000 Neuchaˆtel</addr-line>
          ,
          <country country="CH">Switzerland</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <abstract>
        <p>This paper describes and evaluates a model for cross-domain authorship attribution using Bidirectional Echo State Network-based (ESN) Reservoir Computing. We applied this model to the cross-domain authorship attribution task of the PAN18 challenge and show that it can be applied to this task. This BD-ESN based on a word embedding layer of dimension 300 reaches an averaged F-1 score of 0.408 on the development corpus and 0.3870 on the test corpus. The evaluation is based on a collections of Fanfiction gathered online, covering different original work of art.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>In natural language processing, one might ask : who is the author of a given text or
document?, based on training corpus and a set of corresponding authors. This task is
known as authorship attribution and the motives behind this are multiple. For
example, authorship attribution can be applied to forensic linguistic investigation for cases of
phishing, spam, threats or cyber-bullying, or for any investigation requiring to identify
the true author of a threatening letter or email based on some text written by potential
suspects.</p>
      <p>A common variety of authorship attribution task is cross-domain authorship
attribution where given sample of documents coming from a finite and restricted set of
candidate authors are used to determine the most likely author of a previously unseen
document with unknown authorship. This tasks is made harder when documents of
known and unknown authorship are from different genre and thematic area.</p>
      <p>The classical line of research on authorship attribution is based on statistical
methods and researchers applied neural network methods with good results but with long
training time and high complexity. Neural models like Deep-learning are known to be
very efficient on image or video classification tasks. However, Deep-learning have face
more troubles on NLP tasks and recurrent neural networks (RNNs) have been applied
successfully to tasks like authorship attribution.</p>
      <p>
        However, RNNs are known to be difficult to train and suffer from the problem of
vanishing gradient, and use back-propagation through time (BPTT) which unfolds a
network in time. It’s in this context of slow and painful progress that a new approach,
named Reservoir Computing, has been discovered independently by researchers in the
field of machine learning under the name Echo State Network (ESN) and by
Neuroscientists as Liquid State Machine (LSM). The key concept is to separate the part where
the computing is done and the output layer where the training is done. The reservoir
part is randomly constructed and training only the output layer is often enough to have
good performances in practice. The training of an ESN is thus not only easier, since it
is done only on the output layer, but also because it results in solving a system of linear
equation. ESN has been applied to a large field of scientific domains, from astrophysics
to robotic motor control and interaction, temporal series forecasting and classification
in finance and weather forecasting, to image classification on the MNIST dataset [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ]
and to gender profiling [
        <xref ref-type="bibr" rid="ref5 ref8">5, 8</xref>
        ].
      </p>
      <p>As this year PAN18 challenge proposes a cross-domain authorship attribution task,
we decided to evaluate an echo state network-based Resevoir Computing model on this
task. This paper is organised as follow. Section 2 introduces the dataset used for
development and testing, as well as the measures and methodology used to evaluate our
approach. Section 3 explains the proposed Echo State Network-based Reservoir
Computing model used to classify the texts. In section 4, we evaluate the strategy we created
and compare results on the test collections. In the last section, we draw conclusions on
the main findings and possible future improvements.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Corpus and Methodology</title>
      <p>
        To compare different experimental results on cross-domain authorship attribution
task with different models, we need a common ground composed of the same datasets
and evaluation measures. In order to create this common ground, and to allow the large
study in the domain of cross-domain authorship attribution, the PAN CLEF evaluation
campaign was launched [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Multiple research groups with different backgrounds from
around the world have proposed a classification algorithm to be evaluated in the PAN
CLEF 2018 campaign [
        <xref ref-type="bibr" rid="ref1 ref9">9, 1</xref>
        ] with the same methodology [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        All teams have used the TIRA platform to evaluate their strategy. This platform can be
used to automatically deploy and evaluate a software [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The algorithms are evaluated
      </p>
      <sec id="sec-2-1">
        <title>Language English</title>
      </sec>
      <sec id="sec-2-2">
        <title>French</title>
      </sec>
      <sec id="sec-2-3">
        <title>Italian</title>
      </sec>
      <sec id="sec-2-4">
        <title>Spanish</title>
      </sec>
      <sec id="sec-2-5">
        <title>Polish</title>
        <p>on a common evaluation dataset and with the same measures, but also on the base of
the time need to produce the response. The access to this evaluation dataset is restricted
so that there is no data leakage to the participants during a software run.</p>
        <p>To create our algorithm for the PAN CLEF 2018 evaluation campaign, a development
corpus was created with highly similar characteristics to the evaluation corpus
comprising a set of cross-domain authorship attribution problems for 5 languages, English,
French, Italian, Spanish and Polish. The term ”training corpus” is not used because the
sets of possible authors of the development and evaluation corpora is not overlapping.
Based on these collection, the problem to address was to identify the authors of a set of
unknown documents given another set of documents (known fanfics) written by a small
set (5 to 20) of candidate authors.</p>
        <p>The development corpus is composed of 10 problems, 2 per language with various
number of known and unknown documents. An overview of this corpus is depicted
in table 1. The number of known and unknown documents is given under the label
”Known” and ”Unknown” and the size of the author set for each problem under the
label ”Authors”. Each author has written at least one of the unknown document and all
documents belong to the same fandom. However, known document belong to several
fandoms excluding target fandom and is not necessarily the same for all candidate
authors. Fanfiction refers to a form of litterature produced by admirers (”fans”) of certain
authors, novel or TV series, and is also known as transformative literature. The fandom
refers the original work of art or genre.</p>
        <p>A corpus with similar characteristics will be used to compare the participants’
software of the PAN CLEF 2018 campaign, and we don’t have information about its size
due to the TIRA system. The response of the software is the name of the predicted
author for each unknown document belong to each language. The overall performance of
the system is the macro-averaged F-1 score.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Echo State Network-based Reservoir Computing (ESN)</title>
      <p>The main kind of network used in the paper comes directly from equation 1, the
highly non-linear dimensional vector at time , , is defined by
 
+1 = (1 − ) +  ( +1 +  +  )
(1)
where  ∈  , with  the number of neurons in the reservoir, is its activation

vector at time . The matrix  ∈ ×  , with  the dimension of the input signal,
represents the weights applied to the inputs , and  ∈ ×  is the matrix of
internal weights. Figure 1 shows the complete ESN architecture. We start usually by
a null state  = 0 for the initial vector.  is the leaky rate which allows to adapt the

network’s dynamic to the one of the task to learn and  is bias to the reservoir’s units.
The function  is a nonlinear function, usually the sigmoid function. The network’s
outputs ^ is then defined by,

^ = ( )
(2)
 
where  ∈ ×  , with  the number of outputs, and  the output weights
matrix.  is a linear function, usually the identity function. The learning phase consists

to solve a system of linear equations to minimise the error (,  ) between the

target to be learned and the network’s output. The matrix  can be computer by linear

regression,   =  , where  ∈ ×  is the matrix containing the reservoir states
resulting of the training phase, and  ∈ ×  is the matrix containing each target

outputs, with  the length of the training set. To find  , it is possible to use the Ridge
Regression, which minimise the magnitude of the output weights,

 =   ( +  )− 1
(3)
where  is the regularisation factor which must be fined tuned for each specific task.

The matrices of internal weights  and input-to-reservoir weights  are generated
randomly. The leaky rate  is tuned using grid search. Some parameters should be taken
into account at the creation of the reservoir weights. More precisely, it is necessary to
ensure the presence of the Echo State Property which guaranties that inputs will vanish
with time and will not be amplified. The most commonly used method to ensure that a
reservoir has the Echo State Property is to set its spectral radius below 1. The spectral
radius of a matrix  , noted  ( ), is its highest absolute Eigen value.</p>
      <p>To transform input text to input signal, we used word embedding pre-trained with
Glove. The text is fed into the reservoir word after word which result in an input time
series of dimension 300.</p>
      <p>In this paper, we used a specific variety of ESN named Bidirectional-ESN (BDESN).
With this model, the inputs are fed into the reservoir in normal and reverse order. The
resulting joined states, () ∪ (−) , are used to compute the output ^, where ()
and () are respectively the states resulting from inputs in normal (left-to-right) and
reverse order (right-to-left). To implement our model, we used EchoTorch 1 and
TorchLanguage 2, two packages based on pyTorch designed respectively for Reservoir
Computing and Natural Language Processing.
1 https://github.com/nschaetti/EchoTorch
2 https://github.com/nschaetti/TorchLanguage</p>
      <sec id="sec-3-1">
        <title>French</title>
      </sec>
      <sec id="sec-3-2">
        <title>Italian</title>
      </sec>
      <sec id="sec-3-3">
        <title>Polish</title>
      </sec>
      <sec id="sec-3-4">
        <title>Spanish</title>
      </sec>
      <sec id="sec-3-5">
        <title>Overall</title>
      </sec>
      <sec id="sec-3-6">
        <title>Problem Problem0001 Problem0002</title>
      </sec>
      <sec id="sec-3-7">
        <title>Problem0003 Problem0004</title>
      </sec>
      <sec id="sec-3-8">
        <title>Problem0005 Problem0006</title>
      </sec>
      <sec id="sec-3-9">
        <title>Problem0007 Problem0008</title>
      </sec>
      <sec id="sec-3-10">
        <title>Problem0009</title>
        <p>Problem0010</p>
        <p>To evaluate our model we tested their macro-averaged F1 on the development and test
corpora. The table 2 shows macro-averaged F1 for each 10 problems in the development
set. For English, our model attains respectively an macro-averaged F1 score of 0.153
and 0.595 for problem 1 and 2, and an average of 0.374. For French, the model got
0.353 and 0.501 respectively for problem 3 and 4, and an average of 0.427. For Italian,
the model got 0.286 and 0.529 respectively for problem 5 and 6, and an average of
0.408. For Polish, the model got 0.289 and 0.533 respectively for problem 7 and 8, and
an average of 0.411. Finally, for Spanish, the model got 0.327 and 0.512 respectively
for problem 9 and 10, and an average of 0.420. Our model got an average of 0.408 on
the development corpus.</p>
        <p>The table 3 shows the results on the test corpus obtained on the TIRA platform. Our
model got an average of 0.387 on the test corpus, not far from the result obtained on the
development corpus.
5</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>This paper evaluated an Echo State Network-based Reservoir Computing model for
cross-domain authorship attribution based on fan-fiction gathered on the internet. Based
on the hypothesis that textual documents of known authors can be used to identify the
author of unknown documents, we introduced an ESN classifier for document
classification that can predict this characteristics. However, this model shows low performance
compared to results obtained on other datasets with the same model. We think there is
two reasons for our model’s low performance.</p>
      <p>First, even if ESN is known to be less greedy in data, the training set is may be too</p>
      <sec id="sec-4-1">
        <title>Development</title>
      </sec>
      <sec id="sec-4-2">
        <title>Test</title>
        <p>0.408
0.3870
small for this neural model. Secondly, our model is based on a word embedding layer
and therefore on words meaning, this is probably not appropriate for cross-domain
authorship attribution and we obtained very good results on other datasets with character
embedding and we plan therefore to test this solution in the future.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Kestemont</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tschugnall</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stamatatos</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Daelemans</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Specht</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Overview of the Author Identification Task at PAN-2018: Cross-domain Authorship Attribution and Style Change Detection</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Nie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.Y.</given-names>
            ,
            <surname>Soulier</surname>
          </string-name>
          ,
          <string-name>
            <surname>L</surname>
          </string-name>
          . (eds.)
          <article-title>Working Notes Papers of the CLEF 2018 Evaluation Labs</article-title>
          .
          <source>CEUR Workshop Proceedings, CLEF and CEUR-WS.org (Sep</source>
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gollub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rangel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stamatatos</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Improving the Reproducibility of PAN's Shared Tasks: Plagiarism Detection, Author Identification, and Author Profiling</article-title>
          . In: Kanoulas,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Lupu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Clough</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Sanderson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Hall</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Hanbury</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Toms</surname>
          </string-name>
          , E. (eds.)
          <article-title>Information Access Evaluation meets Multilinguality, Multimodality, and Visualization</article-title>
          .
          <source>5th International Conference of the CLEF Initiative (CLEF 14)</source>
          . pp.
          <fpage>268</fpage>
          -
          <lpage>299</lpage>
          . Springer, Berlin Heidelberg New York (
          <year>Sep 2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rangel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tschuggnall</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stamatatos</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          : Overview of PAN'17:
          <string-name>
            <surname>Author</surname>
            <given-names>Identification</given-names>
          </string-name>
          , Author Profiling, and
          <string-name>
            <given-names>Author</given-names>
            <surname>Obfuscation</surname>
          </string-name>
          . In: Jones,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Lawless</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Gonzalo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Kelly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Goeuriot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Mandl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Cappellato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          , N. (eds.)
          <string-name>
            <surname>Experimental IR Meets Multilinguality</surname>
          </string-name>
          , Multimodality, and
          <string-name>
            <surname>Interaction</surname>
          </string-name>
          .
          <source>8th International Conference of the CLEF Association, CLEF</source>
          <year>2017</year>
          , Dublin, Ireland,
          <source>Septembre 11-14</source>
          ,
          <year>2017</year>
          , Proceedings. Springer, Berlin Heidelberg New York (
          <year>Sep 2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Rangel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Verhoeven</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Daelemans</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Overview of the 4th author profiling task at pan 2016: cross-genre evaluations</article-title>
          .
          <source>Working Notes Papers of the CLEF</source>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Schaetti</surname>
          </string-name>
          , N.: Unine at clef 2017:
          <article-title>Tf-idf and deep-learning for author profiling</article-title>
          .
          <source>PAN CLEF</source>
          <year>2017</year>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Schaetti</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Couturier</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salomon</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Reservoir computing: E´tude the´orique et pratique en reconnaissance de chiffres manuscrits</article-title>
          , me´moire de master (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Schaetti</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salomon</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Couturier</surname>
          </string-name>
          , R.:
          <article-title>Echo state networks-based reservoir computing for mnist handwritten digits recognition</article-title>
          .
          <source>19th IEEE International Conference on Computational Science and Engineering (CSE</source>
          <year>2016</year>
          )
          <article-title>(</article-title>
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Schaetti</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savoy</surname>
          </string-name>
          , J.:
          <article-title>Comparison of Neural Models for Gender Profiling</article-title>
          . In: Domenica Fioredistella Iezzi, Livia Celardo, M.M. (ed.)
          <source>Proceedings of the 14th international conference on statistical analysis of textual data (Jun</source>
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Stamatatos</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rangel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tschuggnall</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kestemont</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Overview of PAN-2018: Author Identification, Author Profiling, and Author Obfuscation</article-title>
          . In: Bellot,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Trabelsi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Mothe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Murtagh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Nie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Soulier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Sanjuan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Cappellato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          , N. (eds.)
          <string-name>
            <surname>Experimental IR Meets Multilinguality</surname>
          </string-name>
          , Multimodality, and
          <string-name>
            <surname>Interaction</surname>
          </string-name>
          .
          <source>9th International Conference of the CLEF Initiative (CLEF 18)</source>
          . Springer, Berlin Heidelberg New York (
          <year>Sep 2018</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>