<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Overview of the Style Change Detection Task at PAN 2019</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Eva Zangerle</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Michael Tschuggnall</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Günther Specht</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Benno Stein</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Martin Potthast</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Bauhaus-Universität Weimar</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Leipzig University</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Innsbruck</institution>
          ,
          <country country="AT">Austria</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The task of style change detection aims at segmenting documents into stylistically homogeneous passages. These segments can subsequently be utilized for distinguishing different authors of a document. In this year's PAN style change detection task we asked the participants to answer the following questions for a given document: (1) Is the document written by one or more authors? and, (2) if the document is multi-authored, how many authors have collaborated? The task is performed and evaluated on a dataset compiled from an English Q&amp;A platform, covering a set of diverse topics. The paper in hand introduces the style change detection task and the underlying dataset, surveys the participant's submissions, and analyzes their performance.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        The task of style change detection aims at detecting whether a given document was
written by a single author or by multiple authors. Also previous PAN editions aimed
to analyze multi-authored documents: In 2016, the task was to identify and group
fragments of the document that correspond to individual authors [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. In 2017, the task was
to detect within a first step whether a given document is multi-authored. If this is indeed
the case, the next step was to determine the borders at which authorship changes [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ].
The results obtained showed that accurately identifying individual authors and their
specific contributions within a single document is hard to achieve. In 2018 the task hence
was substantially relaxed, asking participants to predict whether a given document is
single- or multi-authored [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], recasting it as a binary classification task. Considering
the promising results achieved by the submitted approaches, this year’s competition
continues this line of research and additionally asks participants to predict the number
of involved authors.
      </p>
      <p>The remainder of this paper is structured as follows. Section 2 presents previous
approaches towards style change detection. Section 3 introduces the style change
detection task as part of PAN 2019 along with the underlying dataset and the evaluation
procedure. Section 4 outlines the received submissions, and Section 5 analyzes and
compares the achieved results.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>
        Besides the aforementioned shared tasks and the contributions of its participants,
previous work on detecting style change and multi-author documents is still limited. Glover
and Hirst [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] were the first to suggest the detection of inconsistencies in collaborative
writing, mostly as a tool to aid writers to homogenize their style [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. In the context
of plagiarism detection, we introduced a class of algorithms for intrinsic plagiarism
detection [
        <xref ref-type="bibr" rid="ref15 ref26">15, 26</xref>
        ], which also formed part of our corresponding shared tasks on
plagiarism detection [
        <xref ref-type="bibr" rid="ref17 ref18 ref21">21, 17, 18</xref>
        ] and its underlying evaluation framework [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. A number
of participants tackled the problem of intrinsic plagiarism detection, most notably
Stamatatos [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], who made use of n-gram profiles to quantify style variation. In their series
of four subsequent works, Koppel et al. [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ] and Akiva and Koppel [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ] develop
methods to identify distinct components of multi-author documents and decomposing
them in an unsupervised manner. Similarly, we proposed an unsupervised
decomposition of multi-author documents based on grammar features [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]. Bensalem et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]
follow on Stamatatos’ earlier work and use n-grams to identify author style changes.
More recent contributions include that of Gianella [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] who employs stochastic
modeling to split a document by authorship, and that of Rexha et al. [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] who extend their
previous work to predict the number of authors who wrote a text. Dauber et al. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]
propose an approach to tackle authorship attribution on multi-author documents. Aldebei
et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] as well as Sarwar et al. [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] use hidden Markov models and basic stylometric
features to build a so-called co-authorship graph.
3
3.1
      </p>
    </sec>
    <sec id="sec-3">
      <title>Style Change Detection Task</title>
      <sec id="sec-3-1">
        <title>Task Definition</title>
        <p>The PAN 2019 style change detection task is defined as follows. Given a document,
participants have to apply intrinsic style analyses (i.e., exploit the given document as
the only source) to answer, consecutively, the following two questions:
1. Do style changes exist? (which we interpret as the fact that the document is
multiauthored)
2. If the document is multi-authored, how many authors did collaborate?
The datasets provided for training, validation, and test were curated using the
StackExchange Q&amp;A platform,1 which provides a network of Q&amp;A-websites on a wide variety
of topics. Based on a publicly available dump we extracted user questions and answers
from all available sites such that a diverse set of topics is covered, ranging from
cooking over philosophy to bitcoin technology. Each site (topic) contains several subtopics,
identified by user-created tags. Within this year’s task only English documents were
considered.</p>
        <p>Based on this set of questions and answers (referred to as documents in what
follows), we remove the following documents (or parts thereof) to ensure that the dataset
contains only valid, parsable documents of sufficient length:
– short documents consisting of only a few words or symbols
– documents edited by users other than the original author
– external URLs
– embedded images
– code snippets (particularly, for the StackOverflow topic)
– bullet lists (including content)
– block quotes
– texts containing Arabic characters (particularly, for the Islam topic)</p>
        <p>If a document contains less than three sentences after having applied the above
cleansing steps, we remove it from the dataset.</p>
        <p>Based on the resulting set of documents, we compute the final dataset as follows.
For each subtopic of a main topic, we assemble a document based on the questions
and answers belonging to the same subtopic. This ensures that authors cannot be
distinguished based on the topic or content discussed. Particularly, the datasets per topic</p>
        <p>Parameter
Number of style changes
Number of collaborating authors
Document length
Change positions
Segment length distribution</p>
        <p>Configurations
0 - 10
1 - 5
300 - 1 500 tokens
at the end of paragraph, within paragraph, mixed
100 - 1 500
are assembled by varying the parameters shown in Table 1. Given that the first part
of the task—detecting whether a document contains a style change or not—is a
binary classification problem, we ensure that the two classes are balanced, i.e., 50% are
single-authored and 50% are multi-authored documents. For single-author documents,
we assemble one or more documents, resulting in a document containing 300-1 500
tokens. For multi-author documents, we vary not only the number of authors, but also the
number of style changes within the final document between 1 and 10, which is done
by combining multiple documents of multiple authors, varying the parameters stated in
Table 1. The resulting dataset contains a total of 5 028 documents.</p>
        <p>The compiled dataset was split into subsets for training, validation, and test. The
employs approximate stratified random sampling, yielding a 50% training, a 25%
validation, and a 25% test split. Both the training and the validation set were released to
participants while the test set was withheld for the final evaluation. An overview of the
datasets is given in Table 2, where we list the number of documents for the different
number of authors (as absolute numbers and relative shares) and the average number
of tokens per document for single- and multi-authored documents. The three datasets
feature a similar distribution in terms of the number of authors per document and the
average document length.
3.3</p>
      </sec>
      <sec id="sec-3-2">
        <title>Evaluation Framework</title>
        <p>
          For computing the desired evaluation measures (see Section 3.4) the participants had
the choice either to use the provided evaluation script or to work directly on the TIRA
platform [
          <xref ref-type="bibr" rid="ref10 ref19">10, 19</xref>
          ]. By deploying their system on the TIRA platform, the participants can
see the obtained performance values on the training and the validation set. For the final
evaluation (done with the test set), participants were asked to mark their favored run to
be considered in the overall ranking (see Section 5).
For the comparison of the submitted approaches we report both the achieved
performances for the subtasks in isolation and their combination as a staged task.
        </p>
        <p>
          For the first subtask, the binary classification of single- versus multi-authorship, the
accuracy metric is used, i.e., we compute the fraction of correctly classified documents.
For the second subtask, the prediction of the number of authors, we compute not only
the number of correctly classified documents regarding the number of authors, but we
also consider the extent to which the prediction differs from the true class. E.g.,
classifying a document authored by 5 authors as a 4-author document is here regarded as
a better result than classifying it as a 2-author document. For this “distance” between
the predicted and the true author number we employ the Ordinal Classification Index
(OCI) [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], which is based on the confusion matrices resulting from the classification
tasks. It yields a value between 0 and 1, with 0 being a perfect prediction.
        </p>
        <p>Finally, we combine the two measures into a single rank measure, where we put
equal weight on accuracy and OCI (recall that OCI is an error measure):
rank =
accuracy + (1
2</p>
        <p>OCI)
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Survey of Submissions</title>
      <p>The style change detection task at PAN 2019 received two submissions, which are
outlined in the following.
4.1</p>
      <sec id="sec-4-1">
        <title>Clustering-based Style Change Detection</title>
        <p>
          The approach by Nath [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] is based on the combination of two clustering approaches.
The authors propose to first divide documents into windows of similar size. For each
of these windows, a representation based on the 50 most frequent tokens is computed.
In this regard, the authors resort to the normalized frequency of the 50 most frequent
tokens in each document to represent each window. Based on the pair-wise distances of
documents, two clustering approaches are applied: Threshold-based Clustering (TBC)
and Window Merge Clustering (WMC), where the assumption is that windows assigned
to the same cluster have been written by the same author. Threshold-based clustering
operates on the distance matrix of individual windows, and clusters are formed by
iterating over the list of pairwise window distances (sorted by distance in ascending order).
For each window pair, either these windows are joint to a new cluster, they extend an
existing cluster (in which one of the two windows is already contained in), or two
clusters are merged based on a given threshold. The Window Merge Clustering follows the
hierarchical clustering paradigm, where pairs of clusters (initially one window per
cluster) are joint iteratively until a certain threshold in terms of cluster similarity is reached.
The authors propose to combine the results of the two clustering approaches by taking
their combined minimum. Furthermore, the authors employ statistics about the number
of duplicated sentences contained per number of authors in the training set, and they
add this information also to the clustering procedure. The authors report that utilizing
the TBC-based method achieves the best results (cf. Section 5).
4.2
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>Feed-forward Network-based Style Change Detection</title>
        <p>
          Zuo et al. [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ] propose to split the given task into two subtasks, which are dealt with
individually. For the first subtask, the binary classification of single- vs. multi-authored
documents, the authors propose a multi-layer perceptron (MLP) with a single hidden
layer. Each document is represented by its TFIDF-weighted word vector. For the
second task, the authors compute a number of established features at the paragraph-level
for each of the multi-authored documents, which is based on the winning submission of
the PAN style change detection task 2018 [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ]: lexical features (e.g., POS tags,
number of sentences or token length), contracted word forms, British or American English,
frequent words, and readability scores (e.g., Flesch-Kincaid grade level or Gunning
Fog Index). Furthermore, they add the TFIDF-weighted words. Based on this
representation, they propose to cluster segments by applying an ensemble of three clustering
approaches to predict the number of authors for a given document: k-means clustering
based on the TFIDF-representation of segments, hierarchical clustering with all
features, and an MLP classifier.
5
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Evaluation Results</title>
      <p>
        The submissions were evaluated on the TIRA experimentation platform. For
comparison, we also evaluated two baselines:
1. BASELINE-RND. An enhanced guessing baseline that exploits the data set
statistics with respect to document lengths and style changes. In particular it is assumed
that longer documents tend to contain more style changes shorter documents.
2. BASELINE-C99. A baseline that employs the C99 text segmentation algorithm to
predict the number of segments [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>To get a deeper understanding of the performance of the submitted approaches, we
also analyze the results with respect to certain document characteristics. For Subtask 1
we compute the respective accuracy values, and for Subtask 2 we compute the absolute
prediction errors. Figures 2 and 3 overview the results. Figures 2a and 2b show the
average performance of the approaches and the random baseline grouped by document
length in tokens. We observe that Nath is able to outperform the approach by Zuo et al.
over all document lengths. In Figures 2c and 2d, by analyzing the results based on the
number of authors, we observe that the approach by Nath is able to exploit documents
with a lower number of authors better for Subtask 2, while Zuo et al. are able to exploit
documents with more than two authors better and predict the number of authors more
accurately. For Subtask 1, Nath achieves better results than both Zuo et al. and the
random baseline for single-authored documents. Looking into the lengths of segments
of individual authors (cf. Figures 3a and 3b), we observe quite diverging behaviors for
the submitted approaches for Subtask 1, whereas for Subtask 2 the differences are more
subtle: With regard to the number of style changes in a document (Figures 3c and 3d),
for documents with a lower number of style changes the approach by Nath achieves a
lower accuracy as well as a higher deviation in terms of the prediction of the author
number than does the approach by Zuo et al.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Akiva</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koppel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Identifying distinct components of a multi-author document</article-title>
          . In: Memon,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Zeng</surname>
          </string-name>
          ,
          <string-name>
            <surname>D</surname>
          </string-name>
          . (eds.) 2012
          <source>European Intelligence and Security Informatics Conference, EISIC</source>
          <year>2012</year>
          , Odense, Denmark,
          <source>August 22-24</source>
          ,
          <year>2012</year>
          . pp.
          <fpage>205</fpage>
          -
          <lpage>209</lpage>
          . IEEE Computer Society (
          <year>2012</year>
          ), https://doi.org/10.1109/EISIC.
          <year>2012</year>
          .16
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Akiva</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koppel</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A generic unsupervised method for decomposing multi-author documents</article-title>
          .
          <source>JASIST</source>
          <volume>64</volume>
          (
          <issue>11</issue>
          ),
          <fpage>2256</fpage>
          -
          <lpage>2264</lpage>
          (
          <year>2013</year>
          ), https://doi.org/10.1002/asi.22924
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Aldebei</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>He</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jia</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yeh</surname>
            ,
            <given-names>W.:</given-names>
          </string-name>
          <article-title>SUDMAD: sequential and unsupervised decomposition of a multi-author document based on a hidden markov model</article-title>
          .
          <source>JASIST</source>
          <volume>69</volume>
          (
          <issue>2</issue>
          ),
          <fpage>201</fpage>
          -
          <lpage>214</lpage>
          (
          <year>2018</year>
          ), https://doi.org/10.1002/asi.23956
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Bensalem</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chikhi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Intrinsic plagiarism detection using n-gram classes</article-title>
          .
          <source>In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP)</source>
          . pp.
          <fpage>1459</fpage>
          -
          <lpage>1464</lpage>
          . Association for Computational Linguistics, Doha, Qatar (Oct
          <year>2014</year>
          ), https://www.aclweb.org/anthology/D14-1153
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Cardoso</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sousa</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Measuring the performance of ordinal classification</article-title>
          .
          <source>International Journal of Pattern Recognition and Artificial Intelligence</source>
          <volume>25</volume>
          (
          <issue>08</issue>
          ),
          <fpage>1173</fpage>
          -
          <lpage>1195</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Choi</surname>
            ,
            <given-names>F.Y.Y.</given-names>
          </string-name>
          :
          <article-title>Advances in domain independent linear text segmentation</article-title>
          .
          <source>In: Proceedings of the 1st North American Chapter of the Association for Computational Linguistics Conference</source>
          . pp.
          <fpage>26</fpage>
          -
          <lpage>33</lpage>
          . NAACL 2000,
          <article-title>Association for Computational Linguistics</article-title>
          , Stroudsburg, PA, USA (
          <year>2000</year>
          ), http://dl.acm.org/citation.cfm?id=
          <volume>974305</volume>
          .
          <fpage>974309</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Dauber</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Overdorf</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Greenstadt</surname>
          </string-name>
          , R.:
          <article-title>Stylometric authorship attribution of collaborative documents</article-title>
          . In: Dolev,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Lodha</surname>
          </string-name>
          , S. (eds.)
          <source>Cyber Security Cryptography and Machine Learning - First International Conference, CSCML</source>
          <year>2017</year>
          ,
          <article-title>Beer-</article-title>
          <string-name>
            <surname>Sheva</surname>
          </string-name>
          , Israel, June 29-30,
          <year>2017</year>
          ,
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <volume>10332</volume>
          , pp.
          <fpage>115</fpage>
          -
          <lpage>135</lpage>
          . Springer (
          <year>2017</year>
          ), https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -60080-
          <issue>2</issue>
          _
          <fpage>9</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Giannella</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>An improved algorithm for unsupervised decomposition of a multi-author document</article-title>
          .
          <source>JASIST</source>
          <volume>67</volume>
          (
          <issue>2</issue>
          ),
          <fpage>400</fpage>
          -
          <lpage>411</lpage>
          (
          <year>2016</year>
          ), https://doi.org/10.1002/asi.23375
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Glover</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hirst</surname>
          </string-name>
          , G.:
          <article-title>Detecting Stylistic Inconsistencies in Collaborative Writing</article-title>
          , pp.
          <fpage>147</fpage>
          -
          <lpage>168</lpage>
          . Springer London, London (
          <year>1996</year>
          ), https://doi.org/10.1007/978-1-
          <fpage>4471</fpage>
          -1482-6_
          <fpage>12</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Gollub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burrows</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Ousting ivory tower research: towards a web framework for providing experiments as a service</article-title>
          .
          <source>In: Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval</source>
          . pp.
          <fpage>1125</fpage>
          -
          <lpage>1126</lpage>
          . ACM (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Graham</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hirst</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marthi</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Segmenting documents by stylistic character</article-title>
          .
          <source>Natural Language Engineering</source>
          <volume>11</volume>
          (
          <issue>4</issue>
          ),
          <fpage>397</fpage>
          -
          <lpage>415</lpage>
          (
          <year>2005</year>
          ), https://doi.org/10.1017/S1351324905003694
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Kestemont</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tschuggnall</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stamatatos</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Daelemans</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Specht</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Overview of the author identification task at PAN-2018: cross-domain authorship attribution and style change detection</article-title>
          .
          <source>In: Working Notes Papers of the CLEF</source>
          <year>2018</year>
          <article-title>Evaluation Labs</article-title>
          . Avignon, France,
          <source>September 10-14</source>
          ,
          <year>2018</year>
          /Cappellato, Linda [edit.]; et al. pp.
          <fpage>1</fpage>
          -
          <lpage>25</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Koppel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Akiva</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dershowitz</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dershowitz</surname>
          </string-name>
          , N.:
          <article-title>Unsupervised decomposition of a document into authorial components</article-title>
          .
          <source>In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies</source>
          . pp.
          <fpage>1356</fpage>
          -
          <lpage>1364</lpage>
          . Association for Computational Linguistics, Portland, Oregon, USA (Jun
          <year>2011</year>
          ), https://www.aclweb.org/anthology/P11-1136
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Koppel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Akiva</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dershowitz</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dershowitz</surname>
          </string-name>
          , N.:
          <article-title>Unsupervised decomposition of a document into authorial components</article-title>
          . In: Lin,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Matsumoto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Mihalcea</surname>
          </string-name>
          ,
          <string-name>
            <surname>R</surname>
          </string-name>
          . (eds.)
          <article-title>The 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies</article-title>
          ,
          <source>Proceedings of the Conference</source>
          ,
          <volume>19</volume>
          -
          <fpage>24</fpage>
          June,
          <year>2011</year>
          , Portland, Oregon, USA. pp.
          <fpage>1356</fpage>
          -
          <lpage>1364</lpage>
          . The Association for Computer Linguistics (
          <year>2011</year>
          ), http://www.aclweb.org/anthology/P11-1136
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15] Meyer zu Eißen,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Stein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Kulig</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          :
          <article-title>Plagiarism Detection without Reference Collections</article-title>
          . In: Decker,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Lenz</surname>
          </string-name>
          , H. (eds.)
          <article-title>Advances in Data Analysis</article-title>
          .
          <source>Selected papers from the 30th Annual Conference of the German Classification Society (GFKL</source>
          <year>2006</year>
          ). pp.
          <fpage>359</fpage>
          -
          <lpage>366</lpage>
          . Studies in Classification,
          <source>Data Analysis, and Knowledge Organization</source>
          , Springer, Berlin Heidelberg New York (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Nath</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>UniNE at PAN-CLEF 2019: Style Change Detection by Threshold Based and Window Merge Clustering Methods</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Losada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Müller</surname>
          </string-name>
          , H. (eds.)
          <article-title>CLEF 2019 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barrón-Cedeño</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eiselt</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Overview of the 2nd International Competition on Plagiarism Detection</article-title>
          . In: Braschler,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Harman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Pianta</surname>
          </string-name>
          , E. (eds.)
          <source>Working Notes Papers of the CLEF 2010 Evaluation Labs (Sep</source>
          <year>2010</year>
          ), http://www.clef-initiative.eu/publication/working-notes
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eiselt</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barrón-Cedeño</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Overview of the 3rd International Competition on Plagiarism Detection</article-title>
          . In: Petras,
          <string-name>
            <given-names>V.</given-names>
            ,
            <surname>Forner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Clough</surname>
          </string-name>
          , P. (eds.)
          <source>Working Notes Papers of the CLEF 2011 Evaluation Labs (Sep</source>
          <year>2011</year>
          ), http://www.clef-initiative.eu/publication/working-notes
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gollub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rangel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stamatatos</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Improving the reproducibility of PAN's shared tasks</article-title>
          .
          <source>In: International Conference of the Cross-Language Evaluation Forum for European Languages</source>
          . pp.
          <fpage>268</fpage>
          -
          <lpage>299</lpage>
          . Springer (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barrón-Cedeño</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>An Evaluation Framework for Plagiarism Detection</article-title>
          . In: Huang,
          <string-name>
            <given-names>C.R.</given-names>
            ,
            <surname>Jurafsky</surname>
          </string-name>
          ,
          <string-name>
            <surname>D</surname>
          </string-name>
          . (eds.) 23rd
          <source>International Conference on Computational Linguistics (COLING 10)</source>
          . pp.
          <fpage>997</fpage>
          -
          <lpage>1005</lpage>
          . Association for Computational Linguistics, Stroudsburg,
          <source>Pennsylvania (Aug</source>
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eiselt</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barrón-Cedeño</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Overview of the 1st International Competition on Plagiarism Detection</article-title>
          . In: Stein,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Rosso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Stamatatos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Koppel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Agirre</surname>
          </string-name>
          , E. (eds.)
          <source>SEPLN 2009 Workshop on Uncovering Plagiarism, Authorship, and Social Software Misuse (PAN</source>
          <year>2009</year>
          ). pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          . CEUR-WS.
          <source>org (Sep</source>
          <year>2009</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-502
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Rexha</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klampfl</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kröll</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kern</surname>
          </string-name>
          , R.:
          <article-title>Towards a more fine grained analysis of scientific authorship: Predicting the number of authors using stylometric features</article-title>
          . In: Mayr,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Frommholz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Cabanac</surname>
          </string-name>
          ,
          <string-name>
            <surname>G</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the Third Workshop on Bibliometric-enhanced Information Retrieval co-located with the 38th European Conference on Information Retrieval (ECIR</source>
          <year>2016</year>
          ), Padova, Italy, March
          <volume>20</volume>
          ,
          <year>2016</year>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>1567</volume>
          , pp.
          <fpage>26</fpage>
          -
          <lpage>31</lpage>
          . CEUR-WS.org (
          <year>2016</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>1567</volume>
          /paper3.pdf
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rangel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stamatatos</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tschuggnall</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Overview of PAN'16-New Challenges for Authorship Analysis: Cross-genre Profiling, Clustering, Diarization, and Obfuscation</article-title>
          . In: Fuhr,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Quaresma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Larsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Gonçalves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Balog</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            ,
            <surname>Macdonald</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Cappellato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          , N. (eds.)
          <string-name>
            <surname>Experimental IR Meets Multilinguality</surname>
          </string-name>
          , Multimodality, and
          <string-name>
            <surname>Interaction</surname>
          </string-name>
          .
          <source>7th International Conference of the CLEF Initiative (CLEF 16)</source>
          . Springer, Berlin Heidelberg New York (
          <year>Sep 2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Sarwar</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nutanong</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Urailertprasert</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vannaboot</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rakthanmanon</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>A scalable framework for stylometric analysis of multi-author documents</article-title>
          . In: Pei,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Manolopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Sadiq</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.W.</given-names>
            ,
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <article-title>Database Systems for Advanced Applications -</article-title>
          23rd International Conference, DASFAA 2018, Gold Coast,
          <string-name>
            <surname>QLD</surname>
          </string-name>
          , Australia, May
          <volume>21</volume>
          -24,
          <year>2018</year>
          , Proceedings,
          <source>Part I. Lecture Notes in Computer Science</source>
          , vol.
          <volume>10827</volume>
          , pp.
          <fpage>813</fpage>
          -
          <lpage>829</lpage>
          . Springer (
          <year>2018</year>
          ), https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -91452-7_
          <fpage>52</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Stamatatos</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>Intrinsic Plagiarism Detection Using Character n-gram Profiles</article-title>
          . In: Stein,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Rosso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Stamatatos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Koppel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Agirre</surname>
          </string-name>
          , E. (eds.)
          <source>SEPLN 2009 Workshop on Uncovering Plagiarism, Authorship, and Social Software Misuse (PAN 09)</source>
          . pp.
          <fpage>38</fpage>
          -
          <lpage>46</lpage>
          . Universidad Politécnica de Valencia and
          <article-title>CEUR-WS</article-title>
          .
          <source>org (Sep</source>
          <year>2009</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-502
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lipka</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prettenhofer</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Intrinsic Plagiarism Analysis</article-title>
          .
          <article-title>Language Resources and Evaluation (LRE) 45(1</article-title>
          ),
          <fpage>63</fpage>
          -
          <lpage>82</lpage>
          (
          <year>Mar 2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Tschuggnall</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Specht</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Automatic decomposition of multi-author documents using grammar analysis</article-title>
          . In: Klan,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Specht</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Gamper</surname>
          </string-name>
          , H. (eds.)
          <source>Proceedings of the 26th GI-Workshop Grundlagen von Datenbanken</source>
          , Bozen-Bolzano, Italy,
          <source>October 21st to 24th</source>
          ,
          <year>2014</year>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>1313</volume>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>22</lpage>
          . CEUR-WS.org (
          <year>2014</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>1313</volume>
          /paper_4.pdf
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Tschuggnall</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stamatatos</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Verhoeven</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Daelemans</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Specht</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Overview of the author identification task at pan-2017: style breach detection and author clustering</article-title>
          .
          <source>In: Working Notes Papers of the CLEF 2017 Evaluation Labs/Cappellato</source>
          , Linda [edit.]; et al. pp.
          <fpage>1</fpage>
          -
          <lpage>22</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Zlatkova</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kopev</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mitov</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Atanasov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hardalov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koychev</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nakov</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>An ensemble-rich multi-aspect approach for robust style change detection</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Nie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.Y.</given-names>
            ,
            <surname>Soulier</surname>
          </string-name>
          ,
          <string-name>
            <surname>L</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2018 Working Nots of CLEF 2018 - Conference and Labs of the Evaluation Forum</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Zuo</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Banerjee</surname>
          </string-name>
          , R.:
          <article-title>Style Change Detection with Feedforward Neural Networks Notebook for PAN at CLEF 2019</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Losada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Müller</surname>
          </string-name>
          , H. (eds.)
          <article-title>CLEF 2019 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>