<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Overview of the 8th Author Pro ling Task at PAN 2020: Pro ling Fake News Spreaders on Twitter</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Francisco Rangel</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anastasia Giachanou</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bilal Ghanem</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Paolo Rosso</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Symanto Research</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Universitat Politecnica de Valencia</institution>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This overview presents the Author Pro ling shared task at PAN 2020. The focus of this year's task is on determining whether or not the author of a Twitter feed is keen to spread fake news. Two have been the main aims: (i) to show the feasibility of automatically identifying potential fake news spreaders in Twitter; and (ii) to show the di culty of identifying them when they do not limit themselves to just retweet domain-speci c news. For this purpose a corpus with Twitter data has been provided, covering the English and Spanish languages. Altogether, the approaches of 66 participants have been evaluated.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        The rise of social media has given the opportunity to users to publish and share
content online in a very fast way. The easiness of publishing content in social
media has led to an increase in the amount of misinformation that is published
and shared. The propagation of fake news that is shown to be faster than the
one of real news [
        <xref ref-type="bibr" rid="ref64">64</xref>
        ] is causing several negative consequences in the society.
One of the most recent cases is the large amount of misinformation that was
propagated related to the origin, prevention, diagnosis, and treatment of
COVID19 pandemic and that a ected the society in di erent ways. For example, fake
news about the e ectiveness of the chloroquine led to an increase of cases of
chloroquine drug overdose [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The in uence of fake news is also evident in
other domains as for example in the political domain, and researchers have drawn
attention to their in uence regarding elections and referendums outcomes [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>Understanding whether a piece of news is fake or not is a very challenging
task for users who, in their majority are not experts. In addition, fake news
usually contain a mixture of real and fake claims in an attempt to further
confuse users. In an e ort to raise awareness and inform users about which pieces
of news contain fake information, several platforms (e.g., Snopes1, PolitiFact2,
Leadstories3) have been developed. These platforms employ journalists or other
domain experts who thoroughly examine the information presented in various
articles before they label them based on their factuality.</p>
      <p>Our hypothesis is that users who do not spread fake news may have a set
of di erent characteristics compared to users who tend to share fake news. For
example, they may use di erent linguistic patterns when they share posts
compared to fake news spreaders. This is what we aim at investigating in this year's
author pro ling shared task where we address the problem of fake news detection
from the author pro ling perspective. The nal goal is pro ling those authors
who have shared some fake news in the past. This will allow for identifying
possible fake news spreaders on Twitter as a rst step towards preventing fake news
from being propagated among social media users. This should help for their early
detection and, therefore, for preventing their further dissemination.</p>
      <p>The remainder of this paper is organized as follows. Section 2 covers the
state of the art, Section 3 describes the corpus and the evaluation measures,
and Section 4 presents the approaches submitted by the participants. Sections 5
and 6 discuss results and draw conclusions respectively.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>
        Fake news detection has recently received signi cant research attention. Among
others, researchers have focused on fake news [
        <xref ref-type="bibr" rid="ref29 ref52 ref59">52,59,29</xref>
        ], bots [
        <xref ref-type="bibr" rid="ref14 ref48">48,14</xref>
        ] and
clickbaits [
        <xref ref-type="bibr" rid="ref2 ref46">2,46</xref>
        ] detection. Some of the previously proposed approaches have explored
the e ectiveness of linguistic patterns such as the number of pronouns and
punctuation marks on the detection of fake news. For example, Rashkin et al. [
        <xref ref-type="bibr" rid="ref51">51</xref>
        ]
analysed various linguistic features such as personal pronouns and swear words
that were incorporated into a Long Short Term Memory (LSTM) network to
address credibility detection. Other researchers, proposed to use the emotions
expressed in the piece of news. In this direction, Giachanou et al. [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]
proposed emoCred, an LSTM-based neural network that utilised emotions from
text, whereas Ghanem et al. [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] proposed to incorporate emotions extracted
from text into an LSTM network and showed that emotions are useful for the
classi cation of the di erent types of fake news. Guo et al. [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] proposed a dual
emotion-based fake news detection framework to learn content and comment
emotion representations for publishers and users respectively, whereas Wang [
        <xref ref-type="bibr" rid="ref65">65</xref>
        ]
proposed a hybrid convolutional neural network to combine user metadata with
text for fake news detection.
      </p>
      <p>
        Although the detection of fake news, and credibility in general, has received
a lot of research attention [
        <xref ref-type="bibr" rid="ref23 ref29 ref59 ref65">23,65,29,59</xref>
        ], there are only few studies that have
addressed the problem from a user or author pro ling perspective. One of the
studies that focused on users was presented by Shu et al. [
        <xref ref-type="bibr" rid="ref60">60</xref>
        ] who analyzed
di erent features, such as registration time, and found that users that share fake
news have more recent accounts than users who share real news. Vo and Lee [
        <xref ref-type="bibr" rid="ref62">62</xref>
        ]
3 https://leadstories.com/
analyzed the linguistic characteristics (e.g., use of tenses, number of pronouns)
of fact-checking tweets and proposed a deep learning framework to generate
responses with fact-checking intention. Recently, Giachanou et al. [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] explored
the impact of the personality traits of users in discriminating between users
who tend to share fake news and fact-checkers. In their study, they proposed
a model based on a Convolutional Neural Network (CNN) that combines word
embeddings from the text with features that represent users' personality traits
and linguistic patterns and showed that those features are useful for the task.
Ghanem et al. [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] proposed a model that utilizes chunked timelines of tweets
and a recurrent neural model in order to infer the factuality of a Twitter news
account.
      </p>
      <p>
        With regards to author pro ling, early attempts focused on pro ling the
authors of blogs and formal text [
        <xref ref-type="bibr" rid="ref3 ref35">3,35</xref>
        ]. However, with the rise of social media
researchers proposed methodologies to pro le the authors of social media posts
where the language is more informal [
        <xref ref-type="bibr" rid="ref10 ref56">10,56</xref>
        ]. Previous author pro ling tasks at
PAN have tried to pro le di erent characteristics of users. In 2019 the PAN
author pro ling task aimed to classify an author of a tweet feed as a bot or
human [
        <xref ref-type="bibr" rid="ref48">48</xref>
        ], whereas in 2018 the task focused on multimodal gender identi cation
in Twitter for which images were also provided together with the text for the
classi cation [
        <xref ref-type="bibr" rid="ref50">50</xref>
        ]. Since 2013 a wide range of approaches have been developed
and tested in the author pro ling tasks. Maharjan et al. [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ] proposed a
MapReduce architecture to address the gender identi cation task with 3 million features
on the PAN-AP-2013 corpus, whereas Bayot and Goncalves [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] showed that word
embeddings work better than TF-IDF for gender detection on the PAN-AP-2016
corpus. At PAN 2019 the best results in bots detection in English was obtained
by Johansson [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ] who used Random Forest with a variety of stylistic features
such as term occurrences, tweets length or number of capital and lower letters,
user mentions etc., whereas in gender identi cation in English the best result
was obtained by Valencia et al. [
        <xref ref-type="bibr" rid="ref61">61</xref>
        ] with Logistic Regression and n-grams.
Finally, in Spanish, Pizarro [
        <xref ref-type="bibr" rid="ref44">44</xref>
        ] achieved the best results in both bots and gender
identi cation with combinations of n-grams and Support Vector Machines.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Evaluation Framework</title>
      <p>The purpose of this section is to introduce the technical background. We
outline the construction of the corpus, introduce the performance measures and
baselines, and describe the idea of so-called software submissions.
3.1</p>
      <sec id="sec-3-1">
        <title>Corpus</title>
        <p>
          To build the PAN-AP-2020 corpus4 we have proceeded as follows. Firstly, we
have reviewed fact-checking websites such as PolitiFact or Snopes to nd news
4 We should highlight that we are aware of the legal and ethical issues related to
collecting, analysing and pro ling social media data [
          <xref ref-type="bibr" rid="ref47">47</xref>
          ] and that we are committed
to legal and ethical compliance in our scienti c research and its outcomes.
labelled as fake5. Secondly, we have searched for these news on Twitter. We
downloaded all the possible tweets containing some information related to the
identi ed fake news (e.g., the topics mentioned on the news) and manually
inspected them to discard those not actually referring to the news. We also
manually inspected the collected tweets to re-label them as supporting or not the fake
news. With this step, we label as real news those tweets where the user warns
about the fake news. Thirdly, for the identi ed users, we collected their timelines
and checked all the tweets with the list of fake news identi ed in the rst step
together with an overall manual inspection. If the user has shared at least one
fake news, we labelled it as keen to spread fake news. Otherwise, if the user,
to the best of our knowledge, had not shared any fake news in her timeline, we
labelled the user as real news spreader. Finally, we have ordered the users by the
number of shared fake news and picked up the ones with the highest ranking.
We balanced the corpus picking up the same number of real news spreaders. To
ensure that the classi ers will not bias towards the identi ed fake news topics,
we have removed the tweets containing them from the whole corpus.
The performance of the systems has been ranked by accuracy. For each language,
we calculated individual accuracy in discriminating between the two classes.
Finally, we averaged the accuracy values per language to obtain the nal ranking.
3.3
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Baselines</title>
        <p>As baselines to compare the performance of the participants with, we have
selected:
{ RANDOM. A baseline that randomly generates the predictions among the
di erent classes.
5 We have manually reviewed these "fake news" to ensure that there was not political
manipulation behind them and that the news is clearly fake.
{ LSTM. An Long Short-Term Memory neural network that uses FastText6
embeddings to represent texts.
{ NN + w nGrams. Word n-grams with values for n from 1 to 3, and a Neural</p>
        <p>Network.
{ SVM + c nGrams. Character n-grams with values for n from 2 to 6, and a</p>
        <p>
          Support Vector Machine.
{ SYMANTO (LDSE) [
          <xref ref-type="bibr" rid="ref49">49</xref>
          ]. This method represents documents on the basis
of the probability distribution of occurrence of their words in the di erent
classes. The key concept of LDSE is a weight, representing the probability of
a term to belong to one of the di erent categories: fake news spreader / real
news spreader. The distribution of weights for a given document should be
closer to the weights of its corresponding category. LDSE takes advantage
of the whole vocabulary.
{ EIN. the Emotionally-Infused Neural (EIN) network [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] with word
embedding and emotional features as the input of an LSTM.
3.4
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>Software Submissions</title>
        <p>
          Similar to previous year, we asked for software submissions. Within software
submissions, participants submit executables of their author pro ling softwares
instead of just the output of their softwares on a given test set. For the software
submissions, the TIRA experimentation platform was employed [
          <xref ref-type="bibr" rid="ref27 ref28">27,28</xref>
          ], which
renders the handling of software submissions at scale as simple as handling run
submissions. Using TIRA, participants deploy their software on virtual machines
at our site, which allows us to keep them in a running state [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ].
4
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Overview of the Submitted Approaches</title>
      <p>This year, 66 teams participated in the Author Pro ling shared task and 33 of
them submitted the notebook paper. We analyse their approaches from three
perspectives: preprocessing, features used to represent the authors' texts and
classi cation approaches.
4.1</p>
      <sec id="sec-4-1">
        <title>Preprocessing</title>
        <p>
          With the aim at preventing bias towards some URLs, user mentions or
hashtags, the corpus was provided with these elements already masked. In the same
vein, some participants cleaned other Twitter-speci c elements such as RT,
VIA, and FAV7 reserved words [
          <xref ref-type="bibr" rid="ref24 ref30 ref43">24,30,43</xref>
          ], as well as emojis and other
nonalphanumeric characters [
          <xref ref-type="bibr" rid="ref16 ref24 ref37 ref39 ref45 ref57 ref63 ref9">9,45,63,24,16,39,37,57</xref>
          ], numbers [
          <xref ref-type="bibr" rid="ref16 ref24 ref30 ref45 ref57 ref63">45,63,24,16,30,57</xref>
          ] or
6 https://fasttext.cc/docs/en/crawl-vectors.html
7 RT is the acronym for retweet ; VIA is a way to give the authorship to a user (e.g.,
"via @kicorangel"); and FAV stands for favourite.
punctuation signs [
          <xref ref-type="bibr" rid="ref16 ref24 ref30 ref34 ref37 ref57 ref63">63,34,24,16,30,37,57</xref>
          ]. Various participants lower-cased the
texts [
          <xref ref-type="bibr" rid="ref43 ref45 ref63 ref9">9,45,63,43</xref>
          ], removed stop words [
          <xref ref-type="bibr" rid="ref17 ref24 ref30 ref34 ref37 ref57 ref63">63,34,24,17,30,37,57</xref>
          ] or treated
character ooding [
          <xref ref-type="bibr" rid="ref36 ref63">63,36</xref>
          ]. Finally, some users got rid of short texts [
          <xref ref-type="bibr" rid="ref63">63</xref>
          ], stemmed
or lemmatised [
          <xref ref-type="bibr" rid="ref24 ref30 ref37 ref57">24,30,37,57</xref>
          ] and tokenised [
          <xref ref-type="bibr" rid="ref17 ref18 ref36 ref37 ref5 ref57 ref63">63,36,18,17,37,57,5</xref>
          ]. Some users also
removed infrequent terms [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ].
4.2
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>Features</title>
        <p>
          The participants have used a high variety of di erent features and their
combinations, albeit we can group them into the following main groups: (i) n-grams;
(ii) stylistics; (iii) personality and emotions; and iv) embeddings. As every year,
one of the most used features has been the combination of n-grams. For
example, Pizarro [
          <xref ref-type="bibr" rid="ref45">45</xref>
          ] and Espinosa et al. [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] combined character and word n-grams.
TF-IDF n-grams have been used by Vogel et al. [
          <xref ref-type="bibr" rid="ref63">63</xref>
          ], Koloski et al. [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ],
LopezFernandez et al. [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] and Vijayasaradhi et al. [
          <xref ref-type="bibr" rid="ref43">43</xref>
          ]. Regarding combinations of
stylistic-based features, Manna et al. [
          <xref ref-type="bibr" rid="ref40">40</xref>
          ] combined the average number of
emojis (classi ed by category such as a ection, emotion, sceptical, concerned, etc.),
the number of URLs, spaces, digits, punctuation marks, tags, quotes, etc., and
lexical features such as groups of words expressing personal opinions in addition
to personal pronouns or verbs and expressions related to clickbait headlines.
        </p>
        <p>
          However, most participants combined n-grams with stylistic-,
personalityand emotional-based features. For instance, Buda and Bolonyai [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] combined
n-grams with some statistics from the tweets, such as their average length or
their lexical diversity. Lichouri et al. [
          <xref ref-type="bibr" rid="ref37">37</xref>
          ] combined TF-IDF word and
character n-grams with POS, stemmed and lemmatised tokens. Justin et al. [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]
combined personality, emotions, style-based features with word embeddings. For
personality extraction, they used a classi er to obtain the MBTI8 indicator [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ],
while for the emotions they used the NRC emotion lexicon [
          <xref ref-type="bibr" rid="ref41">41</xref>
          ]. Finally, they
also computed the frequencies of di erent grammatical constructs such as the
frequency of auxiliaries, verbs, pronouns, adjectives, punctuation, etc. Niven et
al. [
          <xref ref-type="bibr" rid="ref42">42</xref>
          ] obtained the frequencies of adverbs, impersonal and personal pronouns,
and all the function words. They also used a constituency tree parser to
measure the sentence complexity, taking the average branching factor, the average
max noun phrase and verb phrase heights, etc. Finally, they combined all the
previous features with a measure of emotional content by means of
SentiWordNet. Russo [
          <xref ref-type="bibr" rid="ref53">53</xref>
          ] has combined stylistic features such as type/token ratio, number
of mentions, URLs, hashtags, celebrities counting, punctuation signs or replies
with emotional features. Hortenhuemer [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ] combined 8 di erent feature sets:
TF-IDF, average word length, sentence embedding, POS tagging, recognition of
named entities, sentiment analysis (positive/negative), emotional analysis (10
emotions) and readability scores. Espinosa et al. [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] extracted psychographic
features with the Symanto API9. Concretely: (i) personality traits of the author
8 Myers-Briggs Type Indicator
9 https://developers.symanto.net/
of the tweets (emotional vs. rational); (ii) communication styles of the
Twitter user (self-revealing, action-seeking, information-seeking, fact-oriented); and
(iii) sentiment analysis (positive/negative). They combined the previous features
with other linguistic features, Twitter action features and headline analysis data.
Cardaioli et al. [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] used 10 stylometric features aiming to summarise the writing
style of the author. In particular, the diversity score, readability score, hashtags
average, user mentions average, URLs average, retweets, lower and upper cases,
punctuation signs, etc. They combined the previous features with the Big Five
personality traits10 obtained with Watson Personality Insights by IBM11.
        </p>
        <p>
          Some participants also combined the previous types of features with di erent
types of embeddings. For example, Spezzano et al. [
          <xref ref-type="bibr" rid="ref58">58</xref>
          ] combined: (i) style, such
as the average number of words, characters, lower and upper case words and
characters, stop words, punctuation symbols, hashtags, URLs, user mentions,
emojis and smiles; (ii) n-grams, obtaining TF-IDF for words and characters;
(iii) tweet embeddings, computed using BERT; and (iv) sentiment analysis, by
means of the Valence Aware Dictionary and sEntiment Reasoner (VADER) [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ].
Agirrezabal et al. [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] combined word embeddings, including also the standard
deviation of each dimension of the vectors, with bag-of-pos, the average length
of the tweets, or the ratio of upper-cased characters. Fahim et al. [
          <xref ref-type="bibr" rid="ref54">54</xref>
          ] used
a combination of word embeddings (Glove Twitter 5D) with stylistic features
obtained from the hashtags, elongated words, emphasis words, curse words or
emoticons. Ogaltsov et al. [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] combined TF-IDF features with hand-crafted ones
such as whether the tweet contained the name of a celebrity, Shashirekha et
al. [
          <xref ref-type="bibr" rid="ref57">57</xref>
          ] ensembled TF-IDF n-grams of di erent size with Doc2vec embeddings,
and Babaei [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ] combined TF-IDF and word n-grams with ConceptNet word
embeddings. Labadie et al. [
          <xref ref-type="bibr" rid="ref36">36</xref>
          ] combined the relationship between the use of
grammatical structures like the number of nouns, adjectives, lengths of words and
function words, with the encoding of a dense vector at the word- and
characterlevel. Hashemi et al.. [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ] combined word embeddings, with TF-IDF vectors
and statistical features such as the ratio of retweets, the average number of
mentions/URLs/hashtags per tweet, and the average length of the tweet.
        </p>
        <p>
          Other participants approached the task only with embeddings. Cilet et al. [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]
used a multilingual sentence encoder to feed their pre-trained CNN. Similarly,
Majumder [
          <xref ref-type="bibr" rid="ref39">39</xref>
          ] used Google's universal sentence encoder for their LSTM
approach. The popular BERT has been used by Kaushik et al. [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], Baruah et
al. [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], and Chien et al. [
          <xref ref-type="bibr" rid="ref66">66</xref>
          ].
        </p>
        <p>
          Finally, a couple of participants approached the task from di erent
perspectives. Moreno-Sandoval et al. [
          <xref ref-type="bibr" rid="ref55">55</xref>
          ] obtained social network tokens such us
hashtags, URLs and user mentions, and then analysed the statistics of central
tendency metrics. They combined the previous features with sentiments and
emotions. Ikae et al. [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ] estimated the occurrence probability di erence of terms in
both classes and generated a couple of clusters with them, reducing the
dimensionality with a chi-square method.
10 https://en.wikipedia.org/wiki/Big_Five_personality_traits
11 https://personality-insights-demo.ng.bluemix.net/
Regarding the classi cation approaches, most participants used traditional
approaches, mainly Support Vector Machines (SVM) [
          <xref ref-type="bibr" rid="ref1 ref16 ref18 ref19 ref30 ref34 ref37 ref45 ref63">45,63,34,16,18,30,37,1,19</xref>
          ],
Logistic Regression [
          <xref ref-type="bibr" rid="ref1 ref31 ref34 ref40 ref43 ref63 ref9">9,63,34,31,43,1,40</xref>
          ], or a combination of both depending on
the language. Random Forest [
          <xref ref-type="bibr" rid="ref1 ref12 ref17 ref30 ref40 ref55">12,17,30,1,55,40</xref>
          ] is the third most used classi
cation algorithm. Ensembles of classi ers have been used by various authors.
For example, Decision Tree, Random Forest and XGB [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ]; SVM, Logistic
Regression, Random Forest and Extra Tree [
          <xref ref-type="bibr" rid="ref58">58</xref>
          ]; Linear SVM and Logistic
Regression [
          <xref ref-type="bibr" rid="ref57">57</xref>
          ]; or SVM, Random Forest and Naive Bayes with XGBoost [
          <xref ref-type="bibr" rid="ref42">42</xref>
          ].
        </p>
        <p>
          The author of [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] has used Multilayer Perceptron and the authors in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] a
Neural Network with Dense layer. However, only a few participants went beyond
to experiment with more deep approaches. For example, Fully-Connected Neural
Networks [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ], CNN [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], LSTM [
          <xref ref-type="bibr" rid="ref36 ref39">39,36</xref>
          ], or Bi-LSTM with self-attention [
          <xref ref-type="bibr" rid="ref54">54</xref>
          ].
Finally, the authors of [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] ensembled a GRU-based aggregation model with CNN.
5
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Evaluation and Discussion of the Results</title>
      <p>In this section, we present the results of the shared task, as well as we
analyse the most common errors made by the best performing teams. Although
we recommended to participate in both languages (English and Spanish), some
participants only participated in English. We present the results for the two
languages, and obtain the ranking by averaging them.
5.1</p>
      <sec id="sec-5-1">
        <title>Global Ranking</title>
        <p>In Table 3, the overall performance of the participants is presented. The results
are shown in terms of accuracy for both languages, and the ranking is its average.</p>
        <p>
          The best results have been obtained in Spanish (82% vs. 75%). The overall
best result (77.75%) has been obtained in a tie by Pizarro [
          <xref ref-type="bibr" rid="ref45">45</xref>
          ] and Buda and
Bolonyai [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. Pizarro obtained the best result in Spanish (82% vs. 80.05%) while
Buda and Bolonyai did in English (75% vs. 73.5%). Pizarro approached the task
with combinations of character and word n-grams and Support Vector Machines
whereas Buda and Bolonyai approached the task with a Logistic Regression
ensemble of ve sub-models: n-grams with Logistic Regression, n-grams with
SVM, n-grams with Random Forest, n-grams with XGBoost and XGBoost with
features based on textual descriptive statistics such as the average length of the
tweets or their lexical diversity.
        </p>
        <p>PARTICIPANT</p>
        <p>EN</p>
        <p>ES</p>
        <p>AVG</p>
        <p>Participant</p>
        <p>En</p>
        <p>Es</p>
        <p>Avg
Spanish) are ranked by the average accuracy between both languages, teams
that participated only in English (bottom right) are ranked by the accuracy on
English. The best results for each language are printed in bold.</p>
        <p>
          We should highlight the high performance of the n-grams-based approaches
on this task. The participants in the following positions also used this kind of
features. Koloski et al. used Logistic Regression and Support Vector Machines,
depending on the language, with combinations of character and word n-grams,
and Vogel et al. [
          <xref ref-type="bibr" rid="ref63">63</xref>
          ] also used TF-IDF and character n-grams to train a
Support Vector Machine classi er. De-Borja and Higueras-Porras12 approached the
problem with TF-IDF word and character n-grams and Support Vector Machines
and Nave Bayes respectively. Babaei et al. [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ] is the top-ranked participant who
used some kind of deep learning approach. Concretely, they used a Fully
Connected Neural Network combining a word embedding representation based on
CoceptNet with TF-IDF word n-grams. Only Pizarro and Buda and Bolonyai
outperformed the Symanto (LDSE) [
          <xref ref-type="bibr" rid="ref49">49</xref>
          ] baseline.
        </p>
        <p>As can be seen in Figure 1 and Table 2, the results for Spanish are higher
than for English both in terms of average (73.18% vs. 67.33%) and maximum
(82% vs. 75%) accuracies. Although the standard deviation is larger for Spanish
(6.5% vs. 5.11%), the inter-quartile range is larger for English (5.88% vs. 4%),
showing a slightly more sparse distribution in this last language. This might be
due to the highest number of outliers in the Spanish distribution, as shown in
Figure 2.
12 Although the authors did not submit their working notes, they sent us a brief
description of their system.</p>
        <p>Fig. 2: Distribution of results in the di erent languages. The gure on the left
represents all the systems. The gure on the right removes the outliers.
5.2</p>
      </sec>
      <sec id="sec-5-2">
        <title>Error Analysis</title>
        <p>We have aggregated all the participants' predictions for the fake news
spreaders vs. real news spreaders discrimination task, except baselines, and plotted
the respective confusion matrices for English and Spanish in Figures 3 and 4,
respectively.</p>
        <p>In the case of English (Figure 3), the highest confusion is from real news
spreaders to fake news spreaders (35.50% vs. 30.03%). This means that, for this
language in this corpus, the number of false positives is higher than one-third.
Regarding Spanish (Figure 4), the highest confusion is from fake news spreaders
to real news spreaders (35.09% vs. 20.23%). In this case, the number of false
negatives is higher, but the number of false positives is still high (one- fth).</p>
        <p>
          In both languages, there is a large number of false positives which should be
taken into account in further research, since a misclassi cation might have some
consequences for the pro led user and lead to ethical or legal implications [
          <xref ref-type="bibr" rid="ref47">47</xref>
          ].
5.3
        </p>
      </sec>
      <sec id="sec-5-3">
        <title>Best Results</title>
        <p>In Table 4 we summarise the best results per language. The best result in English
(0.750) has been obtained with a combination of n-grams models and stylistic
features in a Logistic Regression ensemble. The best result in Spanish (0.820) has
been obtained with combinations of character and word n-grams with Support
Vector Machines.</p>
        <p>
          Buda and Bolonyai [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] (0.750) Pizarro [
          <xref ref-type="bibr" rid="ref45">45</xref>
          ] (0.820)
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>In this paper, we have presented the results of the 8th International Author
Pro ling Shared Task at PAN 2020, hosted at CLEF 2020. The participants had
to discriminate from Twitter authors whether they are keen to spread fake news
or not. The provided data cover the English and Spanish languages.</p>
      <p>
        The participants used di erent features to address the task, mainly: (i)
ngrams; (ii) stylistics; (iii) personality and emotions; and (iv) embeddings.
Concerning machine learning algorithms, the most used ones were Support
Vector Machines and Logistic Regression, or combinations of both. Nevertheless,
few participants approached the task with deep learning techniques. In such
cases, they used Fully-Connected Neural Networks, CNN, LSTM and Bi-LSTM
with self-attention. According to the results, traditional approaches obtained
higher accuracies than deep learning ones. The six teams with the highest
performance [
        <xref ref-type="bibr" rid="ref34 ref45 ref63 ref9">9,45,34,63</xref>
        ]13 used combinations of n-grams with traditional machine
learning algorithms such as SVM or Logistic Regression. The rst time a deep
learning approach appears in the ranking is with the seventh-best performing
team [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. They used a Fully-Connected Neural Network combining word
embeddings based on ConceptNet with TF-IDF word n-grams.
      </p>
      <p>
        The best results have been obtained in Spanish (0.820) by Pizarro [
        <xref ref-type="bibr" rid="ref45">45</xref>
        ] with
combinations of character and word n-grams and Support Vector Machines. The
best result in English (0.750) has been obtained by Buda and Bolonyai [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] with
a Logistic Regression ensemble of combinations of n-grams and some textual
descriptive statistics. The overall best result (0.775) has been obtained in a tie
by them.
      </p>
      <p>The error analysis shows that the highest confusion in English is from Real
News spreaders to Fake News Spreaders (false positives) (35.50% vs. 30.03%),
whereas in Spanish is the other way around, from Fake News Spreaders to Real
News Spreaders (false negatives) (35.09% vs. 20.23%). In this second case, the
di erence is much higher (14.86% vs. 5.47%).</p>
      <p>
        Looking at the results and the error analysis, we can conclude that: (i) it
is feasible to automatically identify potential Fake News Spreaders in Twitter
with high precision, even when only textual features are used; but (ii) we have
to bear in mind false positives since especially in English, they sum up to
onethird of the total predictions, and misclassi cation might lead to ethical or legal
implications [
        <xref ref-type="bibr" rid="ref47">47</xref>
        ].
7
      </p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>First of all we thank the participants: 66 this year, record in terms of
participants at PAN Lab since 2009! We have to thank also Martin Potthast, Matti
Wiegmann, and Nikolay Kolyada to help with the 66 Virtual Machines in the
TIRA platform. We thank Symanto for sponsoring the ex aequo award for the
13 Together with De Borja and Higueras-Porras, who did not submit their working
notes
two best performing systems at the author pro ling shared task of this year. The
work of Paolo Rosso was partially funded by the Spanish MICINN under the
research project MISMIS-FAKEnHATE on Misinformation and
Miscommunication in social media: FAKE news and HATE speech (PGC2018-096212-B-C31).
The work of Anastasia Giachanou is supported by the SNSF Early Postdoc
Mobility grant under the project Early Fake News Detection on Social Media,
Switzerland (P2TIP2 181441).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Agirrezabal</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>KU-CST at the Pro ling Fake News spreaders Shared Task</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Anand</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chakraborty</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Park</surname>
          </string-name>
          , N.:
          <article-title>We used Neural Networks to Detect Clickbaits: You won't Believe what Happened Next!</article-title>
          <source>In: Proceedings of the 2017 European Conference on Information Retrieval</source>
          . pp.
          <volume>541</volume>
          {
          <fpage>547</fpage>
          . ECIR '
          <volume>17</volume>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Argamon</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koppel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fine</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shimoni</surname>
            ,
            <given-names>A.R.</given-names>
          </string-name>
          : Gender, genre, and
          <article-title>writing style in formal written texts</article-title>
          .
          <source>Text &amp; Talk</source>
          <volume>23</volume>
          (
          <issue>3</issue>
          ),
          <volume>321</volume>
          {
          <fpage>346</fpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bakhteev</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ogaltsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ostroukhov</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Fake News Spreader Detection using Neural Tweet Aggregation</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Baruah</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Das</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barbhuiya</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dey</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Automatic Detection of Fake News Spreaders Using BERT</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Bastos</surname>
            ,
            <given-names>M.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mercea</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>The Brexit Botnet and User-Generated Hyperpartisan News</article-title>
          .
          <source>Social Science Computer Review</source>
          <volume>37</volume>
          (
          <issue>1</issue>
          ),
          <volume>38</volume>
          {
          <fpage>54</fpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Bayot</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goncalves</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Multilingual author pro ling using word embedding averages and svms</article-title>
          .
          <source>In: 2016 10th International Conference on Software, Knowledge, Information Management &amp; Applications (SKIMA)</source>
          . pp.
          <volume>382</volume>
          {
          <fpage>386</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Briggs-Myers</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Myers</surname>
          </string-name>
          , P.B.:
          <article-title>Gifts di ering: Understanding personality type (</article-title>
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Buda</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bolonyai</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>An Ensemble Model Using N-grams and Statistical Features to Identify Fake News Spreaders on Twitter</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEURWS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Burger</surname>
            ,
            <given-names>J.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Henderson</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zarrella</surname>
          </string-name>
          , G.:
          <article-title>Discriminating gender on twitter</article-title>
          .
          <source>In: Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing</source>
          . pp.
          <volume>1301</volume>
          {
          <issue>1309</issue>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Busari</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adebayo</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Nigeria Records Chloroquine Poisoning after Trump Endorses it for Coronavirus Treatment</article-title>
          .
          <source>CNN</source>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Cardaioli</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cecconello</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Conti</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pajola</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turrin</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Fake News Spreaders Pro ling Through Behavioural Analysis</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEURWS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Chilet</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mart</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Pro ling Fake News Spreaders on Twitter</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Chu</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gianvecchio</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jajodia</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Detecting automation of twitter accounts: Are you a human, bot, or cyborg</article-title>
          ?
          <source>IEEE Transactions on Dependable and Secure Computing</source>
          <volume>9</volume>
          (
          <issue>6</issue>
          ),
          <volume>811</volume>
          {
          <fpage>824</fpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Das</surname>
            ,
            <given-names>K.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baruah</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barbhuiya</surname>
            ,
            <given-names>F.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dey</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Ensemble of ELECTRA for Pro ling Fake News Spreaders</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Espinosa</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gomez-Adorno</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sidorov</surname>
          </string-name>
          , G.:
          <article-title>Pro ling Fake News Spreaders using Character and Words N-grams</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Espinosa</surname>
            ,
            <given-names>M.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Centeno</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , Rodrigo, :
          <article-title>Analyzing User Pro les for Detection of Fake News Spreaders on Twitter</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Fernandez</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ram</surname>
            <given-names>rez</given-names>
          </string-name>
          ,
          <string-name>
            <surname>J.A.L.</surname>
          </string-name>
          :
          <article-title>Approaches to the Pro ling Fake News Spreaders on Twitter Task in English and Spanish</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEURWS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Fersini</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Armanini</surname>
          </string-name>
          , J.,
          <string-name>
            <surname>D'Intorni</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Pro ling Fake News Spreaders: Stylometry, Personality, Emotions and Embeddings</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEURWS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Ghanem</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ponzetto</surname>
            ,
            <given-names>S.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          : FacTweet:
          <article-title>Pro ling Fake News Twitter Accounts</article-title>
          .
          <source>In: Statistical Language and Speech Processing (SLSP). Lecture Notes in Computer Science</source>
          . Springer, Cham (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Ghanem</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rangel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>An Emotional Analysis of False Information in Social Media and News Articles</article-title>
          .
          <source>ACM Transactions on Internet Technology (TOIT) 20(2)</source>
          ,
          <volume>1</volume>
          {
          <fpage>18</fpage>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Giachanou</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , R ssola,
          <string-name>
            <given-names>E.A.</given-names>
            ,
            <surname>Ghanem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Crestani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Rosso</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          :
          <article-title>The Role of Personality and Linguistic Patterns in Discriminating Between Fake News Spreaders and Fact Checkers</article-title>
          .
          <source>In: International Conference on Applications of Natural Language to Information Systems</source>
          . pp.
          <volume>181</volume>
          {
          <fpage>192</fpage>
          . Springer (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Giachanou</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Crestani</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Leveraging Emotional Signals for Credibility Detection</article-title>
          .
          <source>In: Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          . pp.
          <volume>877</volume>
          {
          <issue>880</issue>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Giglou</surname>
            ,
            <given-names>H.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Razmara</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rahgouy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sanaei</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>LSACoNet: A Combination of Lexical and Conceptual Features for Analysis of Fake News Spreaders on Twitter</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Gilbert</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hutto</surname>
          </string-name>
          , E.:
          <article-title>Vader: A parsimonious rule-based model for sentiment analysis of social media text</article-title>
          . In: Eighth International Conference on Weblogs and
          <article-title>Social Media (ICWSM-14)</article-title>
          . Available at (
          <volume>20</volume>
          /04/16) http://comp. social. gatech. edu/papers/icwsm14. vader. hutto. pdf. vol.
          <volume>81</volume>
          , p.
          <volume>82</volume>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Gollub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beyer</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Busse</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rangel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stamatatos</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Recent trends in digital text forensics and its evaluation</article-title>
          .
          <source>In: International Conference of the Cross-Language Evaluation Forum for European Languages</source>
          . pp.
          <volume>282</volume>
          {
          <fpage>302</fpage>
          . Springer (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Gollub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burrows</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Ousting ivory tower research: Towards a web framework for providing experiments as a service</article-title>
          .
          <source>In: Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval</source>
          . pp.
          <volume>1125</volume>
          {
          <issue>1126</issue>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Gollub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burrows</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hoppe</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          : Tira:
          <article-title>Con guring, executing, and disseminating information retrieval experiments</article-title>
          .
          <source>In: 2012 23rd International Workshop on Database and Expert Systems Applications</source>
          . pp.
          <volume>151</volume>
          {
          <fpage>155</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Guo</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cao</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shu</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>Dean: Learning dual emotion for fake news detection on social media</article-title>
          . arXiv preprint arXiv:
          <year>1903</year>
          .
          <volume>01728</volume>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Hashemi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zarei</surname>
            ,
            <given-names>M.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moosavi</surname>
            ,
            <given-names>M.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Taheri</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Fake News Spreader Identi cation in Twitter using Ensemble Modeling Notebook for PAN at CLEF 2020</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31. Hortennhuemer,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Zangerle</surname>
          </string-name>
          , E.:
          <article-title>A Multi-Aspect Classi cation Ensemble Approach for Pro ling Fake News Spreaders on Twitter</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Ikade</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savoy</surname>
          </string-name>
          , J.: UniNE at PAN-CLEF
          <year>2020</year>
          :
          <article-title>Pro ling Fake News Spreaders on Twitter</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Johansson</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Supervised Classi cation of Twitter Accounts Based on Textual Content of Tweets</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Losada</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          , Muller, H. (eds.)
          <article-title>CLEF 2019 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2019</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2380</volume>
          /
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Koloski</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pollak</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Skrlj</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Multilingual Detection of Fake News Spreaders via Sparse Matrix Factorization</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Koppel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Argamon</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shimoni</surname>
            ,
            <given-names>A.R.</given-names>
          </string-name>
          :
          <article-title>Automatically categorizing written texts by author gender</article-title>
          .
          <source>Literary and linguistic computing 17(4)</source>
          ,
          <volume>401</volume>
          {
          <fpage>412</fpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Labadie</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Castro</surname>
            ,
            <given-names>D.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bueno</surname>
            ,
            <given-names>R.O.</given-names>
          </string-name>
          :
          <article-title>Fusing Stylistic Features with Deeplearning methods for Pro ling Fake News Spreader</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Lichouri</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abbas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Benaziz</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Pro ling Fake News Spreaders on Twitter based on TFIDF Features and Morphological Process Notebook for PAN at CLEF 2020</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Maharjan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shrestha</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Solorio</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hasan</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>A straightforward author proling approach in mapreduce</article-title>
          .
          <source>In: Ibero-American Conference on Arti cial Intelligence</source>
          . pp.
          <volume>95</volume>
          {
          <fpage>107</fpage>
          . Springer (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Majumder</surname>
            ,
            <given-names>S.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Das</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Detecting Fake News Spreaders on Twitter Using Universal Sentence Encoder</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Manna</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pascucci</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Monti</surname>
          </string-name>
          , J.:
          <article-title>Pro ling Fake News Spreaders through Stylometry and Lexical Features. UniOR NLP @PAN2020</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Mohammad</surname>
            ,
            <given-names>S.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turney</surname>
          </string-name>
          , P.D.:
          <article-title>Nrc emotion lexicon</article-title>
          .
          <source>National Research Council, Canada</source>
          <volume>2</volume>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Niven</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kao</surname>
            ,
            <given-names>H.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
          </string-name>
          , H.Y.:
          <article-title>Pro ling Spreaders of Disinformation on Twitter: IKMLab and Softbank Submission</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEURWS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <surname>Pinnaparaju</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Indurthi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varma</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Identifying Fake News Spreaders in Social Media</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          44.
          <string-name>
            <surname>Pizarro</surname>
          </string-name>
          , J.:
          <article-title>Using N-grams to Detect Bots on Twitter</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Losada</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          , Muller, H. (eds.)
          <article-title>CLEF 2019 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2019</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2380</volume>
          /
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          45.
          <string-name>
            <surname>Pizarro</surname>
          </string-name>
          , J.:
          <article-title>Using N-grams to detect Fake News Spreaders on Twitter</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          46.
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>K</surname>
          </string-name>
          opsel,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Stein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Hagen</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          :
          <article-title>Clickbait detection</article-title>
          .
          <source>In: European Conference on Information Retrieval</source>
          . pp.
          <volume>810</volume>
          {
          <fpage>817</fpage>
          . Springer (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          47.
          <string-name>
            <surname>Rangel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>On the implications of the general data protection regulation on the organisation of evaluation tasks</article-title>
          .
          <source>Language and Law= Linguagem e Direito</source>
          <volume>5</volume>
          (
          <issue>2</issue>
          ),
          <volume>95</volume>
          {
          <fpage>117</fpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          48.
          <string-name>
            <surname>Rangel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Overview of the 7th Author Pro ling Task at PAN 2019: Bots and Gender Pro ling in Twitter</article-title>
          .
          <source>In: CLEF 2019 Labs and Workshops</source>
          , Notebook
          <string-name>
            <surname>Papers</surname>
          </string-name>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          49.
          <string-name>
            <surname>Rangel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Franco-Salvador</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <string-name>
            <given-names>A Low</given-names>
            <surname>Dimensionality</surname>
          </string-name>
          <article-title>Representation for Language Variety Identi cation</article-title>
          .
          <source>In: In 17th International Conference on Intelligent Text Processing and Computational Linguistics</source>
          ,
          <source>CICLing'16</source>
          . Springer-Verlag,
          <source>LNCS(9624)</source>
          . pp.
          <volume>156</volume>
          {
          <issue>169</issue>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          50.
          <string-name>
            <surname>Rangel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montes-y Gomez</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Overview of the 6th author pro ling task at pan 2018: Multimodal gender identi cation in twitter</article-title>
          .
          <source>In: Working Notes Papers of the CLEF</source>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          51.
          <string-name>
            <surname>Rashkin</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Choi</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jang</surname>
            ,
            <given-names>J.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Volkova</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Choi</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Truth of Varying Shades: Analyzing Language in Fake News and Political Fact-Checking</article-title>
          .
          <source>In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing</source>
          . pp.
          <volume>2931</volume>
          {
          <fpage>2937</fpage>
          . EMNLP '
          <volume>17</volume>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          52.
          <string-name>
            <surname>Ruchansky</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seo</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , Liu,
          <string-name>
            <surname>Y.</surname>
          </string-name>
          :
          <article-title>CSI: A Hybrid Deep Model for Fake News Detection</article-title>
          .
          <source>In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management</source>
          . pp.
          <volume>797</volume>
          {
          <fpage>806</fpage>
          . CIKM '
          <volume>17</volume>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          53.
          <string-name>
            <surname>Russo</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Sadness and Fear: Classi cation of Fake News Spreaders Content on Twitter</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          54.
          <string-name>
            <surname>Saeed</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fahim</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shirazi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Pro ling Fake News Spreaders on Twitter using Deep Learning LSTM and BI-LSTM Approach</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          55.
          <string-name>
            <surname>Sandoval</surname>
            ,
            <given-names>L.G.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Puertas</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Quimbaya</surname>
            ,
            <given-names>A.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Valencia</surname>
            ,
            <given-names>J.A.A.</given-names>
          </string-name>
          :
          <article-title>Assembly of Polarity, Emotion and User Statistics for Detection of Fake Pro les</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          56.
          <string-name>
            <surname>Schwartz</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eichstaedt</surname>
            ,
            <given-names>J.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kern</surname>
            ,
            <given-names>M.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dziurzynski</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ramones</surname>
            ,
            <given-names>S.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Agrawal</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shah</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kosinski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stillwell</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seligman</surname>
            ,
            <given-names>M.E.</given-names>
          </string-name>
          , et al.:
          <article-title>Personality, gender, and age in the language of social media: The open-vocabulary approach</article-title>
          .
          <source>PloS one 8</source>
          (
          <issue>9</issue>
          ),
          <year>e73791</year>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          57.
          <string-name>
            <surname>Shashirekha</surname>
            ,
            <given-names>H.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Balouchzahi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>ULMFiT for Twitter Fake News Pro ling</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          58.
          <string-name>
            <surname>Shrestha</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Spezzano</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joy</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Detecting Fake News Spreaders in Social Networks via Linguistic and Personality Features</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          59.
          <string-name>
            <surname>Shu</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
          </string-name>
          , H.:
          <article-title>Detecting fake news on social media</article-title>
          .
          <source>Synthesis Lectures on Data Mining and Knowledge Discovery</source>
          <volume>11</volume>
          (
          <issue>3</issue>
          ),
          <volume>1</volume>
          {
          <fpage>129</fpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          60.
          <string-name>
            <surname>Shu</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , Liu, H.:
          <article-title>Understanding User Pro les on Social Media for Fake News Detection</article-title>
          .
          <source>In: 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)</source>
          . pp.
          <volume>430</volume>
          {
          <fpage>435</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          61.
          <string-name>
            <surname>Valencia</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gomez</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rhodes</surname>
            ,
            <given-names>C.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fuentes</surname>
            ,
            <given-names>G.P.</given-names>
          </string-name>
          :
          <article-title>Bots and Gender Identi cation Based on Stylometry of Tweet Minimal Structure and n-Grams Model</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Losada</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          , Muller, H. (eds.)
          <article-title>CLEF 2019 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2019</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2380</volume>
          /
        </mixed-citation>
      </ref>
      <ref id="ref62">
        <mixed-citation>
          62.
          <string-name>
            <surname>Vo</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Learning from Fact-checkers: Analysis and Generation of Factchecking Language</article-title>
          .
          <source>In: Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          . pp.
          <volume>335</volume>
          {
          <issue>344</issue>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref63">
        <mixed-citation>
          63.
          <string-name>
            <surname>Vogel</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meghana</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Fake News Spreader Detection on Twitter using Character N-Grams</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref64">
        <mixed-citation>
          64.
          <string-name>
            <surname>Vosoughi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Roy</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aral</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>The Spread of True and False News Online</article-title>
          .
          <source>Science</source>
          <volume>359</volume>
          (
          <issue>6380</issue>
          ),
          <volume>1146</volume>
          {
          <fpage>1151</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref65">
        <mixed-citation>
          65.
          <string-name>
            <surname>Wang</surname>
          </string-name>
          , W.Y.:
          <article-title>Liar, Liar Pants on Fire: A New Benchmark Dataset for Fake News Detection</article-title>
          .
          <source>In: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers)</source>
          . pp.
          <volume>422</volume>
          {
          <fpage>426</fpage>
          . ACL '
          <volume>17</volume>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref66">
        <mixed-citation>
          66.
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>S.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chien</surname>
            ,
            <given-names>S.L.</given-names>
          </string-name>
          :
          <article-title>A BERT based Two-stage Fake News Spreader Pro ling System</article-title>
          . In: Cappellato,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Eickho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Neveol</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <article-title>CLEF 2020 Labs and Workshops, Notebook Papers</article-title>
          .
          <source>CEUR-WS.org (Sep</source>
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>