<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Verification using Linguistic Divergence</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Arjun Mukherjee</string-name>
          <email>arjun@cs.uh.edu</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yifan Zhang</string-name>
          <email>yzhang114@uh.edu</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dainis Boumber</string-name>
          <email>dainis.boumber@gmail.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marjan Hosseinia</string-name>
          <email>ma.hosseinia@gmail.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fan Yang</string-name>
          <email>fyang11@uh.edu</email>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Authorship Verification, Unsupervised Learning, Language Modeling, Spam/Troll Detection</string-name>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <abstract>
        <p>We propose an unsupervised solution to the Authorship Verification task that utilizes pre-trained deep language models to compute a new metric called DV-Distance. The proposed metric is a measure of the diference between the two authors comparing against pre-trained language models. Our design addresses the problem of non-comparability in authorship verification, frequently encountered in small or cross-domain corpora. To the best of our knowledge, this paper is the first one to introduce a method designed with non-comparability in mind from the ground up, rather than indirectly. It is also one of the ifrst to use Deep Language Models in this setting. The approach is intuitive, and it is easy to understand and interpret through visualization. Experiments on four datasets show our methods matching or surpassing current state-of-the-art and strong baselines in most tasks.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Authorship Attribution (AA) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and Verification (AV) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] are challenging problems important
in this age of ”Fake News”. The former attempts to answer who wrote a specific document; the
latter concerns itself with the problem of finding out whether the same person authored several
documents or not. Ultimately, the goal of AV is to determine whether the same author wrote
any two documents of arbitrary authorship. These problems have attracted renewed attention
as we urgently need better tools to combat content farming, social bots and other forms of
communication pollutions.
      </p>
      <p>
        An interesting aspect of authorship problems is that technology used elsewhere in NLP has
not yet penetrated it. Up until the very recent PAN 2018 and PAN 2020 Authorship event
[
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ], the most popular and efective approaches still largely relies on n-gram features and
traditional machine learning classifiers, such as support vector machines (SVM) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and trees
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Elsewhere, these methods recently had to give up much of their spotlight to deep neural
networks. This phenomenon may be mostly attributed to the fact that authorship problems are
often data constrained — as the amount of text from a particular author is often very limited.
From what we know, only a few deep learning models have been proposed and shown to be
ROMCIR 2021: Workshop on Reducing Online Misinformation through Credible Information Retrieval, held as part of
efective in authorship tasks [
        <xref ref-type="bibr" rid="ref7 ref8 ref9">7, 8, 9</xref>
        ], and even these networks require a good amount of text
to perform well. Likewise, transfer learning may not have been utilized to its full potential, as
some of the recent work in deep language models shows it to be a silver bullet for tasks lacking
training data [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        We propose a deep authorship verification method that uses a new measurement, DV-Distance.
It estimates the magnitude and the direction of deviation of a document from the Normal Writing
Style (NWS) by modeling it with state-of-the-art language models such as the AWD-LSTM and
RoBERTa architecture introduced in [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ]. We proposed an unsupervised method which
directly utilize the DV-Distance and an supervised neural architecture which projecting these
vectors into a separate space. These proposed models have an intuitive and theoretically
sound architecture and comes with good interpretability. Experiments conducted on four
PAN Authorship Verification datasets show our method surpass state-of-the-art in three and
competitive in one.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Authorship Verification and Non-comparability Problem</title>
      <p>
        In the following sections, we use the symbol  to denote an authorship verification problem.
Each problem  consists of two elements: a set of known documents  , and unknown documents,
 . Similarly,  and  represent a single known and unknown document, respectively. The
task is then to find a hypothesis, ℎ, that takes in both components and correctly estimates the
probability that the same author writes them. Important in many forensic, academic, and other
scenarios, AV tasks remain very challenging due to several reasons. For one, in a cross-domain
authorship verification problem, the documents in  and  could be of entirely diferent genre
and type. More specifically,  could contain several novels written by a known author, while 
is a twitter post. Another example demonstrating why a cross-domain model may be necessary
is the case of a death note [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], as it is implausible to obtain a set of  containing death notes
written by the suspect. Furthermore, solving an authorship verification problem usually involves
addressing one or more types of limited training data challenges: a limited amount of training
problems  , out-of-set documents and authors appearing in test data, or a limited amount of
content in the document sets { ,  } of a particular problem  . Many methods use sophisticated
forms of test-time processing, data augmentation, or ensembling to successfully minimize these
challenges’ impact and achieve state-of-the-art results [
        <xref ref-type="bibr" rid="ref14 ref7">7, 14</xref>
        ]. However, such solutions typically
result in prohibitively slow performance, most require a considerable amount of tuning, and
almost all of them, to the best of our knowledge, require labeled data. As a result, existing
methods are not relevant in many real-world scenarios.
      </p>
      <p>k: I suppose that was the reason. We were waiting for you without knowing it. Hallo!
u: He maketh me to lie down in green pastures; he leadeth me beside the still waters.</p>
      <p>Based on our observations, it is not unusual for an authorship verification model to identify
some salient features in either  or  , yet fail to find a directly comparable case in the other
member of the pair. An example consisting of two brief segments from diferent authors is
shown in Figure 1. We can immediately notice that document  contains unusual words “maketh”
and “leadeth” which are Old English. In contrast, document  is written in relatively colloquial
and modern English. A naive method of authorship verification one may devise in this scenario
is to detect whether document  contains the usage of “makes”, the modern counterpart to
“maketh”. If there are occurrences of “makes” in  , we may be able to conclude that the two
documents are from diferent authors. The issue with this approach however, is the non-zero
probability of  containing no usages of “makes” at all.</p>
      <p>Although it is possible to overcome the problem of non-comparability hand-crafted features,
feature engineering is often a labor-intensive process that requires manual labeling. It is also
improbable to design all possible features that encode all characteristics of all words. On the
other hand, while some modern neural network based methods built upon the concept of
distributed representations (word embeddings), and was able to encode some of the essential
features, there is no existing approach explicitly attempt to address the non-comparability
problem.</p>
      <p>To address the non-compatibility, we formulate Normal Writing Style (NWS), which can be
seen as a universal way to distinguish between a pair of documents and solve the AV task in most
scenarios in an unsupervised manner. The documents diference or similarity is determined
with respect to NWS; to this end, we establish a new metric called Deviation Vector Distance
(DV-Distance). To the best of our knowledge, the proposed approach is the first model designed
with non-compatibility in mind from the ground up.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Normal Writing Style and Deviation Vector</title>
      <p>To make a small and often cross-domain document pair comparable, we propose to compare
both documents to the Normal Writing Style instead of directly comparing the pair. We can
define the Normal Writing Style or NWS, loosely as what average writers would write on
average, given a specific writing genre, era, and language. From a statistical perspective, the
NWS can be modeled as the averaged probability distribution of vocabulary at a location, given
its context. As manifested in Figure 1, the reason words maketh and leadth stand out in the
documents  is because they are rarely used in today’s writing. They are hence deviant from
the Normal Writing Style.</p>
      <p>
        We hypothesize that we can utilize modern neural language models to model NWS, and the
predicted word embedding at a given location is a good semantic proxy of what an average
writer would write at that location. And we also hypothesize that, generally, an author has a
consistent direction of deviance in the word embedding space. Consequently, if two documents
 and  have the same direction of deviation, then the two documents are likely from the same
author. Conversely, if two documents have a significantly diferent direction of deviation,
then they are probably from diferent authors. Previous empirical evidence shows that word
embedding constructed using neural language models are good at capturing syntactic and
semantic regularities in language [
        <xref ref-type="bibr" rid="ref15 ref16 ref17">15, 16, 17</xref>
        ]. The vector ofsets encode properties of words
and relationships between them. A famous example demonstrating these properties is the
embedding vector operation: “King - Man + Woman = Queen”, which indicates that there is a
specific vector ofset that encodes the diference in gender.
      </p>
      <p>Given the above context, we theorize it is possible to encode the deviance of maketh from
makes as “Maketh - Makes” in a similar manner. We shall refer to the ofset vector calculated
this way as the Deviation Vector (DV). Figure 2 shows an illustrative example that visualizes
the roles of Normal Writing Style modeling and the DVs. In the upper part of the figure, a
document  by a male author is suggested, containing a sentence, ”I hate shaving my beard.” At
the bottom half of the figure, we can see a document  written by a female author: ”My favorite
gift is a dress.” Assuming we have a NWS model that is able to correctly predict all the words
except at locations marked using a question mark. In place of those words, NWS may predict
very general terms, such as “do” or “thing”. The actual words at these locations deviate from
these general terms in the direction of the DV, represented in the figure using arrows. This
specific example contains the words “beard” and “dress”, usually associated with a particular
gender, while the general terms are gender-less. The DV then must have a component along
the direction of the gender axis in embedding space but in the opposite direction.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Language Model and Implementation Details</title>
      <p>
        We used the AWD-LSTM architecture [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], implemented as part of Universal Language Model
(ULMFit) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], and RoBERTa [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] to model the Normal Writing Style. AWD-LSTM is a
threelayered LSTM-based language model that trained by predicting the next word given the
preceding sequence. Meanwhile, RoBERTa is a BERT-based model trained by predicting the masked
word given an input sequence. Both of these language models are pre-trained on large corpuses
and thus their predicted embedding for the unseen words can be used as a proxy of statistical
distribution of Normal Writing Style.
      </p>
      <p>Assuming these language models can adequately model the Normal Writing Style, the
Deviation Vectors can be calculated by subtracting the actual embeddings of the words from the
predicted word embeddings. More formally, for an input sequence consist of  tokens { 1, ...,   }.
We use  
to denote the embedding layer of the language models, and use 
to denote
the language model itself. Then  (
 ) and  (
 ) will correspond to the embedding of the
actual token at location  and the predicted embedding by the language model at location  when
the corresponding token is the next token (AWD-LSTM) or is masked (RoBERTa). The DV at
location  can then be calculated as:
  =  (
 ) −  (

)
(1)
sequence using AWD-LSTM and RoBERTa. For AWD-LSTM, at each token location  , the
deviation vector is calculated by subtracting the predicted embedding generated at previous
token location  − 1 , by the embedding of the current word at  . Consequently, for a document
of  words, a total of  − 1 DVs can be generated. For RoBERTa, the predicted embedding
at location  is obtained by feeding the model complete sequence of text with the token at 
replaced by the “[mask]” token. A total of  such inference need to be conducted to obtain all
the predicted embeddings at each location. The DVs can then be calculated by subtracting the
predicted embeddings using the actual token embeddings, resulting in a total of  DVs.</p>
      <sec id="sec-4-1">
        <title>4.1. Unsupervised Method: DV-Distance</title>
        <p>To compare the direction of a deviation between two documents, we calculate the
elementwise mean of all the DVs throughout each document to obtain the “Averaged DVs”. For a
given document of  tokens,  () = Σ
between 
and  
, the corresponding 

=1</p>
        <p>/ . Notice that for locations with a deviance
shall exert a larger influence on the document level</p>
        <p>. Averaged DVs are calculated for both  and  , then the DV-Distance can be calculated as
the cosine similarity between  ( )
and  ( )</p>
        <p>.
 ( ,  ) =
 ( ) ⋅  ( )
‖ ( )
‖ ‖ ( )
‖
(2)</p>
        <p>
          Since the DV-Distance method is completely unsupervised, the resulting distance values are
relative instead of absolute. I.E., it is dificult to determine the classification result of a single
document pair. Instead, a threshold value needs to be determined such that we can then classify
all the document pairs with DV-Distance values greater than the threshold as ”Not same author”
and vice versa. To determine the threshold, we follow previous PAN winners such as [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] and use
the median of DV-distance value between all  and  pairs within the dataset as the threshold.
Using this scheme is reasonable because PAN authorship verification datasets are guaranteed to
be balanced. During our experiments, we found that the threshold value is relatively stable for
a particular model in a given dataset, but can be quite diferent between LSTM and Bert-based
models. For real-world applications, the threshold value can be determined ahead of time using
a large dataset of similar genre and format as the problem to be evaluated.
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Supervised Method: DV-Projection</title>
        <p>One of the major deficiencies of our Deviation Vector theory is that it assumes all diferences in
the DV hyperspace are relevant. However, one can imagine this assumption does not always
hold in all the authorship verification settings. For example, the gender dimension shift shown
in Figure 2 can be a useful clue when conducting authorship verification on a Twitter dataset or
in the context of autobiographies. It may be less relevant if the gender shift occurs in a novel,
as the vocabularies used in the novel are more relevant to its characters’ genders instead of the
author’s.
models.</p>
        <p>To address this issue, we propose to use a supervised neural network architecture to project
the DVs onto axes that are most helpful for distinguishing authorship features. As we will
demonstrate in the results and analysis section of this work, these DV projections are very
efective when combining with the original token embeddings generated using the language</p>
        <p>Here we shall formally define the DV-Projection process. Given we have the embeddings
 
 ,  
 , 

 . We use dense layers   and  

and DVs for both a known document and an unknown document, each denoted using  
with embeddings and DVs respectively to
outputs of  
extract prominent features. These features are then feed together into dense layer  
. The
are then average-pooled along the sequence to produce document-level features.
Lastly, features from both known and unknown documents are connected to 2 additional
fullyconnected layers  1 ,  2 to produce the final output. These operations can be summarized in
equation 3 and visualized in figure 4, all layers are used in combination with hyperbolic tangent
as activation function:
   
   
 =  
 =  
(  ( 
(  ( 
 ),   (

 ),   (
  ))
  ))

 ,
(3)
  
  
 =   (   
 =   (   
 = 
2 ( 1 (  

)
 )
 ,   
 ))</p>
        <p>To allow training of the above model together with RoBERTa, we breaks documents from
the original training document pairs into segments of 128 tokens long. We then build smaller
training example pairs from these short document segments and label them accordingly. This
approach not only allows us to build a lot more training examples to properly train the network
parameters, it also forces the model to be more robust by limiting the amount of text it has
access to. The training loss used is binary cross entropy loss in combination with the Sigmoid
function.</p>
        <p>Because the DV-Projection method is a supervised model, from a theoretical perspective
the model can learn the optimal threshold for classification, therefore eliminating the needs
for using median value as threshold. However, the document segment based training pair
generation method can generates significantly more “same author” pairs than “diferent author”
pairs. Therefore the resulting trained model is biased and cannot be assumed to have a 0 valued
threshold1. To make it consistent, we also use the testing set median value as the threshold for
DV-Projection method2.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Experiments</title>
      <p>
        The goal of the empirical study described in the following section is to validate the proposed
DV-Distance and DV-Projection method. For this purpose, we use authorship verification
datasets released by PAN in 2013 [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], 2014 [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] and 2015 [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <sec id="sec-5-1">
        <title>5.1. Datasets</title>
        <p>The 2013 version of PAN dataset consists of 10 training problems and 30 testing problems. PAN
2014 includes two separate datasets, Novels and Essays. PAN 2014N consists of 100 English
novel problems for training and 200 English problems for testing. PAN 2014E consists of 200
English essay problems for training and 200 English essay problems for testing. PAN 2015
is a cross-topic, cross-genre author verification dataset, which means known documents and
an unknown document may come from diferent domains. PAN 2015 contains 100 training
problems and 500 testing problems.</p>
        <p>1In real-world application this problem can be easily addressed by simply generating a large and balanced
training dataset.</p>
        <p>2One can also opt to use training set median value as the threshold. To give an rough impression of how this
will impact the performance: On PAN14N dataset, using testing set median value as threshold will produce 61% in
accuracy, using training set median value as threshold will produce 65% in accuracy. On PAN14E dataset: using
testing set median value as threshold will produce 73% in accuracy, using training set median value as threshold will
produce 70% in accuracy.</p>
        <p>Category
Baseline
Baseline
Baseline
PAN
PAN
Our model
Our model
Our model
Category
Baseline
Baseline
Baseline
PAN
PAN
PAN
PAN
Our model
Our model</p>
        <p>
          Method
GNB
LR
MLP
FCMC [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]
Frery [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]
TE [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]
DV-Dist. L
DV-Dist. R
DV-Proj. R
Method
GNB
LR
MLP
MRNN [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]
Castro [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]
GenIM [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ]
CNG [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ]
TE [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]
DV-Dis. L
DV-Dis. R
0.5
0.491
        </p>
        <p>PAN14N
PAN15
ROC</p>
      </sec>
      <sec id="sec-5-2">
        <title>5.2. Evaluation Metrics</title>
        <p>
          For each PAN dataset, we follow that year’s challenge rules. PAN 2013 uses accuracy,
ReceiverOperating Characteristic (ROC) and   =    × 
measure to replace accuracy to potentially reward those contestants who choose not to provide
an answer in some circumstances. This metric was proposed in [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ], and it is defined as
where   is the number of problems correctly classified, and   is the number of open problems.
The Score for PAN 2014 and 2015 is calculated as the product of c@1 and ROC, @1 × 
.
(4)
        </p>
      </sec>
      <sec id="sec-5-3">
        <title>5.3. Baselines</title>
        <p>
          Classic Models with N-gram Features: In our study we use a set of baselines reported in
[
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. They are produced using seven sets of features, including word n-grams, POS n-grams,
and character 4-gram. The features need to be transformed because baselines are standard
classification algorithms. According to the authors, simple concatenation of two documents’
features produces poor results, and use seven diferent functions to measure the similarity
between feature vectors from both documents, including Cosine Distance, Euclidean Distance,
and Linear Kernel. Several common classifiers are trained and evaluated using these similarity
measurements, providing a reasonable representation of the performance that is achievable
using classic machine learning models and n-gram feature sets. Out of all the baseline results,
three classifiers with the highest performance are reported along with the other PAN results for
comparison. The selected classifiers are Gaussian Naive Bayes (GNB), Logistic Regression (LR)
and Multi-Layer Perceptron (MLP). We compare them with the proposed approach along with
the state-of-the-art methods.
        </p>
        <p>
          PAN Winners: We compare our results to the best performing methods submitted to PAN
each year. The evaluation results of the participant teams are compiled in the overview reports
of PAN 2013 [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ], 2014 [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ] and 2015 [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. In PAN 2013, the best-performing methods are
the General Imposters Method (GenIM) proposed by [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ] and the Common N-Gram (CNG)
dissimilarity measure proposed by [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ]. In PAN 2014 challenge, the best method for English
Essay dataset is proposed by [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ] (Frery), and the best method for English Novel dataset is by
[
          <xref ref-type="bibr" rid="ref22">22</xref>
          ] which uses Fuzzy C-Means Clustering (FCMC). In PAN 2015, the Multi-headed Recurrent
Neural Networks (MRNN) proposed in [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] outperforms the second best submission (Castro)
[
          <xref ref-type="bibr" rid="ref24">24</xref>
          ] of the same year by a large margin.
        </p>
        <p>
          Transformation Encoder: In [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], an auto-encoder based authorship verification model
performed competitively on PAN. We include its results to evaluate our model against one of
the newest and strongest performers.
        </p>
        <p>
          2WD-UAV: A language modeling based approach that relies on transfer learning an ensemble
of heavily regularized deep classification models and data augmentation shows state-of-the-art
performance, surpassing all verification methods evaluated on PAN that we are aware of [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
Like our approach, it is based on a deep language model; however, it is otherwise similar to the
majority of solid AV performers.
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Results and Discussion</title>
      <p>Table 1 shows the results from experiments on PAN datasets, detailed in Section 5. The proposed
unsupervised DV-Distance method conducted using AWD-LSTM and RoBERTa is denoted as
“DV-Dist. L” and “DV-Dist. R”, respectively. The proposed supervised DV-Projection method
is trained using DVs produced by RoBERTa and is labeled as “DV-Proj. R” in the table. We
were only able to train the projection model on PAN14E and PAN14N due to both of them have
relatively large training set.</p>
      <p>For PAN 2013, our results are slightly below the best performer of that year in terms of
accuracy and AUC-ROC; the 0.1 diference in accuracy translates to 3 problems diference out of
30 testing problems. The PAN 2013 corpus are text segments from published Computer Science
textbooks. The best performing model in this dataset is the neural network-based model from
2WD-UAV.</p>
      <p>For PAN 2014, we observed some interesting results. For the Novels part of the challenge, our
unsupervised DV-Distance method based on LSTMs drastically improves upon previous
stateof-the-art models, surpasses the previous best result by 18 percent. On the other hand, for the
Essay dataset, both unsupervised DV-Distance methods failed to capture the feature necessary
to complete the task, showing only 58% and 52% in accuracy. However, the supervised
DVProjection method successfully projects the DVs generated using RoBERTa into a hyperspace
that is suitable for the essay AV problems, resulting in significant performance improvement
over the unsupervised models and slightly outperforms the previous best result from 2WD-UAV.</p>
      <p>
        PAN 2015 edition places its focus on cross-genre and cross-topic authorship verification task.
Based on our observations, the corpus mainly consists of snippets of novels of diferent genres
and sometimes poems. Our proposed DV-Distance method based on multi-layer LSTMs once
again shows excellent performance in this dataset, slightly outperforms the previous best model
MRNN [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. In cross-domain settings like PAN 2015, the problem of non-comparability is likely
to be very pronounced. The strong performance of our methods in this dataset therefore verifies
that these methods are quite robust against domain shift and non-comparability.
      </p>
      <p>Overall, we have observed two consistent trends in our experiments. First, we find that
the AWD-LSTM based DV-Distance method consistently performs better than the RoBERTa
based DV-Distance method. At first glance, this may seems counter-intuitive, as BERT-based
models are generally regarded as one of the best performing model for language modeling.
We theorize that this is precisely the culprit: RoBERTa was able to predict the target word
much more accurately, both due to its architectural advantage and it simply has access to more
contextual information. However, if the language model is performing “too accurate”, it failed
to act as a model which represents averaged writing style, but instead mimicking the author’s
tone and style. From a mathematical perspective, predictions that are “too accurate” will cause
 s calculated using equation (1) to have a magnitude close to zero, then later steps in equation
(2) or (3) will have very little information to work with.</p>
      <p>Second, we find that our proposed methods are most suitable for novel and fiction-type
documents. Our methods demonstrated state-of-the-art performance in both PAN 2014 Novel
and PAN 2015; both consist of mainly novel documents. On the other hand, PAN 2013 and PAN
2014 essay contains writing styles that are more formal and academic-oriented, for which our
models performed less competitive. We theorize that this is because essay documents are easier
to predict, whereas novels are much more “unpredictable”. This diference in predictability
means in novel datasets, we can obtain higher quality DVs; while in essay datasets, the language
models are once again making predictions that are “too accurate”, corroborating the first theory
we discussed above.</p>
      <p>Deviation vectors of two PAN 2015 document pairs are visualized in Figure 5. Figure 5a
shows two documents from diferent authors while Figure 5b shows two documents by the same
author. The plots are generated by conducting PCA on the DVs at each word, projecting the 400
dimension DVs from AWD-LSTM to 2 dimension. A longer line in the plots hence represents a
bigger deviation from the NWS. We can observe that in Figure 5a the DVs’ directions are in
opposite direction while in Figure 5b their directions are similar.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Related Work</title>
      <p>
        Much of the existing work in authorship verification is based on vocabulary distributions, such
as n-gram frequency. The hypothesis behind these models is that the relative frequencies of
words or word combinations can be used for profiling the author’s writing style [
        <xref ref-type="bibr" rid="ref1 ref29">1, 29</xref>
        ]. One can
conclude that two documents are more likely to be from the same author when the distributions
of the vocabularies are similar. For example, in one document we may find that the author
frequently uses “I like ...”, while in another document the author usually writes “I enjoy ...”.
Such a diference may probably indicate that the documents are from diferent authors. This
(a) DVs of a document pair by diferent authors.
      </p>
      <p>
        (b) DVs of a document pair by the same author.
well-studied approach has had many successes, such as settling the dispute of ”Federalist Papers”
[
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]. However, its results are often less than ideal when dealing with a limited data challenge.
      </p>
      <p>
        The amount of documents in  and  is often insuficient to build two uni-gram word
distributions that are comparable, let alone 3-gram or 4-gram ones. The depth of diference
between two sets of documents is often measured using the unmasking technique while ignoring
the negative examples [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]. This one-class technique achieves high accuracy for 21 considerably
large (over 500K) eBooks. A simple feed-forward three layer auto-encoder (AE) can be used for
AV, considering it a one-class classification problem [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ]. Authors observe the behavior of the
AE for documents by diferent authors and build a classifier for each author. The idea originates
from one of the first applications of auto-encoders for novelty detection in classification problems
[
        <xref ref-type="bibr" rid="ref33">33</xref>
        ].
      </p>
      <p>
        AV is studied for detecting linguistic traits of sock-puppets to verify the authorship of a pair
of accounts in online discussion communities [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ]. A spy induction method was proposed to
leverage the test data during the training step under ”out-of-training” setting, where the author
in question is from a closed set of candidates while appearing unknown to the verifier [ 35].
      </p>
      <p>
        In a more realistic setting, we have no specified writing samples of a questioned author, and
there is no closed candidate set of authors. Since 2013, a surge of interest arose for this type
of AV problem. [36] investigate whether one document is one of the outliers in a corpus by
generalizing the Many-Candidate method by [37]. The best method of PAN 2014E optimizes a
decision tree. Its method is enriched by adopting a variety of features and similarity measures
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. For PAN 2014N, the best results are achieved by using fuzzy C-Means clustering [38]. In
an alternative approach, [39] generate a set of impostor documents and apply iterative feature
randomization to compute the similarity distance between pairs of documents. One of the
more exciting and powerful approaches investigates the language model of all authors using
a shared recurrent layer and builds a classifier for each author [ 40]. Parallel recurrent neural
network and transformation auto-encoder approaches produce excellent results for a variety of
AV problems [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], ranging from PAN to scientific publication’s authorship attribution [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. In 2017,
a non-Machine Learning model comprised of a compression algorithm, a dissimilarity method,
and a threshold was proposed for AV tasks, achieving first place in two of four challenges [ 41].
      </p>
      <p>
        Among the models mentioned above, MRNN proposed in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] is the most comparable method
to what we have introduced in this work. MRNN is an RNN-based character-level neural
language model that models the flow of the known author documents  and then is applied
to the unknown document  . If the language model proves to be pretty good at predicting the
next word on the unknown document (lower cross-entropy), then one can conclude they are
likely written by the same author. While both MRNN and our DV-Distance-based methods
utilize neural language modeling, for MRNN the language model represents a specific author’s
writing style and need to be trained on the corpus  . In practice, training a language model
on a small corpus without overfitting can be very challenging, if not impossible. In contrast,
the DV-Distance methods proposed in this work does not require training a author-specific
language model, instead, both known and unknown documents are compared against a common
language model, allowing for evaluation on AV problems with shorter documents.
      </p>
    </sec>
    <sec id="sec-8">
      <title>8. Conclusion</title>
      <p>In this paper, we present a novel approach to the authorship verification problem. Our method
relies on using deep neural language models to model the Normal Writing Style and then
computes the proposed DV-Distance between the set of known documents and the unknown
document. The evaluation shows that authorship style diference strongly correlated with
the distance metric we proposed. Our method outperforms several state-of-the-art models on
multiple datasets, both in terms of accuracy and speed.</p>
    </sec>
    <sec id="sec-9">
      <title>9. Acknowledgement</title>
      <p>Research was supported in part by grants NSF 1838147, NSF 1838145, ARO W911NF-20-1-0254.
The views and conclusions contained in this document are those of the authors and not of
the sponsors. The U.S. Government is authorized to reproduce and distribute reprints for
Government purposes notwithstanding any copyright notation herein.
Wide Web, International World Wide Web Conferences Steering Committee, 2017, pp.
857–866.
[35] M. Hosseinia, A. Mukherjee, Detecting sockpuppets in deceptive opinion spam, Computing</p>
      <p>Research Repository abs/1703.03149 (2017).
[36] S. Seidman, Authorship verification using the impostors method, in: Conference and Labs
Evaluation Forum 2013 Evaluation Labs and Workshop–Working Notes Papers, Citeseer,
2013, pp. 23–26.
[37] M. Koppel, J. Schler, S. Argamon, Authorship attribution in the wild, Language Resources
and Evaluation 45 (2011) 83–94.
[38] P. Modaresi, P. Gross, A language independent author verifier using fuzzy c-means
clustering., in: Conference and Labs Evaluation Forum (Working Notes), 2014, pp. 1084–1091.
[39] M. Koppel, Y. Winter, Determining if two documents are written by the same author, in:
Journal of the Association for Information Science and Technology, volume 65, Wiley
Online Library, 2014, pp. 178–187.
[40] Bagnall, Douglas, Author identification using multi-headed recurrent neural networks,
arXiv preprint arXiv:1506.04891 60 (2009) 9–26.
[41] O. Halvani, C. Winter, L. Graner, On the usefulness of compression models for authorship
verification, in: Proceedings of the 12th International Conference on Availability, Reliability
and Security, ACM, 2017, p. 54.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>E.</given-names>
            <surname>Stamatatos</surname>
          </string-name>
          ,
          <article-title>A survey of modern authorship attribution methods</article-title>
          ,
          <source>Journal of the American Society for Information Science and Technology</source>
          <volume>60</volume>
          (
          <year>2009</year>
          )
          <fpage>538</fpage>
          -
          <lpage>556</lpage>
          . URL: http: //doi.wiley.
          <source>com/10.1002/asi.21001. doi:1 0 . 1 0 0 2 / a s i . 2 1</source>
          <volume>0 0 1 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>K.</given-names>
            <surname>Luyckx</surname>
          </string-name>
          , W. Daelemans,
          <article-title>Authorship Attribution and Verification with Many Authors and Limited Data</article-title>
          ,
          <source>Technical Report</source>
          ,
          <year>2008</year>
          . URL: http://www.cnts.ua.ac.be/.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kestemont</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tschuggnall</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Stamatatos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Daelemans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Specht</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Stein</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Potthast, Overview of the Author Identification Task at PAN-2018 Cross-domain Authorship Attribution and Style Change Detection</article-title>
          ,
          <source>Technical Report</source>
          ,
          <year>2018</year>
          . URL: http://pan.webis.de.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.</given-names>
            <surname>Bevendorf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Ghanem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Giachanou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kestemont</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Manjavacas</surname>
          </string-name>
          , I. Markov,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mayerl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Potthast</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Rangel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Rosso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Specht</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Stamatatos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Stein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wiegmann</surname>
          </string-name>
          , E. Zangerle, Overview of PAN 2020:
          <article-title>Authorship Verification, Celebrity Profiling, Profiling Fake News Spreaders on Twitter, and Style Change Detection</article-title>
          ,
          <source>Technical Report</source>
          ,
          <year>2020</year>
          .
          <source>doi:1 0 . 1 0</source>
          <volume>0 7 / 9 7 8 - 3 - 0 3 0 - 5 8 2 1 9 - 7</volume>
          _
          <fpage>2</fpage>
          5 .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>C.</given-names>
            <surname>Cortes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vapnik</surname>
          </string-name>
          ,
          <article-title>Support-vector networks</article-title>
          ,
          <source>Machine learning 20</source>
          (
          <year>1995</year>
          )
          <fpage>273</fpage>
          -
          <lpage>297</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Frery</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Largeron</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Juganaru-Mathieu</surname>
          </string-name>
          ,
          <article-title>Ujm at clef in author verification based on optimized classification trees</article-title>
          ,
          <source>in: Conference and Labs Evaluation Forum</source>
          <year>2014</year>
          ,
          <year>2014</year>
          , p.
          <fpage>7p</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>D.</given-names>
            <surname>Bagnall</surname>
          </string-name>
          ,
          <article-title>Author Identification using Multi-headed Recurrent Neural Networks</article-title>
          ,
          <string-name>
            <surname>Arxiv</surname>
          </string-name>
          (
          <year>2015</year>
          ). URL: http://arxiv.org/abs/1506.04891.
          <article-title>a r X i v : 1 5 0 6 . 0 4 8 9 1</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Hosseinia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mukherjee</surname>
          </string-name>
          ,
          <article-title>Experiments with neural networks for small and large scale authorship verification</article-title>
          , CoRR abs/
          <year>1803</year>
          .06456 (
          <year>2018</year>
          ). URL: http://arxiv.org/abs/
          <year>1803</year>
          .06456.
          <article-title>a r X i v : 1 8 0 3 . 0 6 4 5 6</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>D.</given-names>
            <surname>Boumber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , A. Mukherjee,
          <article-title>Experiments with convolutional neural networks for multi-label authorship attribution</article-title>
          , in: N. C. C. chair), K. Choukri,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cieri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Declerck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Goggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Hasida</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Isahara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Maegaard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mariani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Mazo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Moreno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Odijk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Piperidis</surname>
          </string-name>
          , T. Tokunaga (Eds.),
          <source>Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC</source>
          <year>2018</year>
          ),
          <source>European Language Resources Association (ELRA)</source>
          , Paris, France,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Howard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ruder</surname>
          </string-name>
          ,
          <article-title>Universal language model fine-tuning for text classification</article-title>
          ,
          <year>2018</year>
          .
          <article-title>a r X i v : 1 8 0 1 . 0 6 1 4 6</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Merity</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. S.</given-names>
            <surname>Keskar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Socher</surname>
          </string-name>
          ,
          <article-title>Regularizing and optimizing LSTM language models</article-title>
          ,
          <source>CoRR abs/1708</source>
          .02182 (
          <year>2017</year>
          ). URL: http://arxiv.org/abs/1708.02182.
          <article-title>a r X i v : 1 7 0 8 . 0 2 1 8 2</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ott</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Goyal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Joshi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Levy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lewis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zettlemoyer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Stoyanov</surname>
          </string-name>
          ,
          <article-title>Roberta: A robustly optimized bert pretraining approach</article-title>
          , arXiv (
          <year>2019</year>
          ). URL: http://arxiv.org/abs/
          <year>1907</year>
          .11692.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>E.</given-names>
            <surname>Stamatatos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Daelemans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Verhoeven</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Juola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>López-López</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Potthast</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Stein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Cappellato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ferro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Jones</surname>
          </string-name>
          , E. San Juan,
          <source>Overview of the Author Identification Task at PAN</source>
          <year>2015</year>
          (
          <year>2015</year>
          )
          <fpage>8</fpage>
          -
          <lpage>11</lpage>
          . URL: http://pan.webis.de.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
            <surname>Boumber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hosseinia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mukherjee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Vilalta</surname>
          </string-name>
          ,
          <article-title>Robust authorship verification with transfer learning</article-title>
          ,
          <source>EasyChair Preprint no. 865</source>
          ,
          <year>2019</year>
          .
          <source>doi:1 0 . 2 9</source>
          <volume>0 0 7</volume>
          / 9 n f 3 .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>T.</given-names>
            <surname>Mikolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Chen</surname>
          </string-name>
          , G. Corrado,
          <string-name>
            <given-names>J.</given-names>
            <surname>Dean</surname>
          </string-name>
          ,
          <article-title>Eficient estimation of word representations in vector space</article-title>
          ,
          <source>Computing Research Repository abs/1301</source>
          .3781 (
          <year>2013</year>
          ). URL: http://arxiv.org/ abs/1301.3781.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>T.</given-names>
            <surname>Mikolov</surname>
          </string-name>
          , I. Sutskever,
          <string-name>
            <given-names>K.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. S.</given-names>
            <surname>Corrado</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Dean</surname>
          </string-name>
          ,
          <article-title>Distributed representations of words and phrases and their compositionality</article-title>
          ,
          <source>in: Advances in Neural Information Processing Systems</source>
          , Curran Associates, Inc.,
          <year>2013</year>
          , pp.
          <fpage>3111</fpage>
          -
          <lpage>3119</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J.</given-names>
            <surname>Pennington</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Socher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Manning</surname>
          </string-name>
          , Glove:
          <article-title>Global vectors for word representation</article-title>
          ,
          <source>in: Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP)</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>1532</fpage>
          -
          <lpage>1543</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>P.</given-names>
            <surname>Juola</surname>
          </string-name>
          , E. Stamatatos,
          <article-title>Overview of the author identification task at pan 2013</article-title>
          ., in: CLEF (Working Notes),
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>E.</given-names>
            <surname>Stamatatos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Daelemans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Verhoeven</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Potthast</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Stein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Juola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>SanchezPerez</surname>
          </string-name>
          , A.
          <string-name>
            <surname>Barrón-Cedeño</surname>
          </string-name>
          ,
          <article-title>Overview of the author identification task at pan 2014, in: CLEF 2014 Evaluation Labs</article-title>
          and Workshop Working Notes Papers, Shefield, UK,
          <year>2014</year>
          ,
          <year>2014</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>21</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>E.</given-names>
            <surname>Stamatatos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Potthast</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Rangel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Rosso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Stein</surname>
          </string-name>
          ,
          <article-title>Overview of the pan/clef 2015 evaluation lab</article-title>
          ,
          <source>in: International Conference of the Cross-Language Evaluation Forum for European Languages</source>
          , Springer,
          <year>2015</year>
          , pp.
          <fpage>518</fpage>
          -
          <lpage>538</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Penas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rodrigo</surname>
          </string-name>
          ,
          <source>J. del Rosal</source>
          ,
          <string-name>
            <given-names>A Simple</given-names>
            <surname>Measure to Assess</surname>
          </string-name>
          Non-response.,
          <source>HLT '11 Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies</source>
          <volume>1</volume>
          (
          <year>2011</year>
          )
          <fpage>1415</fpage>
          -
          <lpage>1424</lpage>
          . URL: http://hnk.ffzg.hr/bibl/acl2011/ Long/pdf/ACL-HLT2011142.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>P.</given-names>
            <surname>Modaresi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Gross</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Language</given-names>
            <surname>Independent Author Verifier Using Fuzzy C-Means Clustering</surname>
          </string-name>
          <article-title>Notebook for PAN at CLEF 2014</article-title>
          ,
          <source>Technical Report</source>
          ,
          <year>2014</year>
          . URL: https://pdfs. semanticscholar.org/6e7a/326a5075ff3fd2c8d1c692b11c856a2f5f3c.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>J.</given-names>
            <surname>Fréry</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Largeron</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Juganaru-Mathieu, UJM at CLEF in Author Verification based on optimized classification trees</article-title>
          .
          <source>Notebook for PAN at CLEF</source>
          <year>2014</year>
          ,
          <source>Technical Report</source>
          ,
          <year>2014</year>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>1180</volume>
          /
          <fpage>CLEF2014wn</fpage>
          -Pan-FreryEt2014.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>D.</given-names>
            <surname>Castro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Adame</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pelaez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Muñoz</surname>
          </string-name>
          ,
          <article-title>Authorship verification, combining linguistic features and diferent similarity functions</article-title>
          ,
          <source>CLEF (Working Notes)</source>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>S.</given-names>
            <surname>Seidman</surname>
          </string-name>
          ,
          <article-title>Authorship Verification Using the Impostors Method</article-title>
          ,
          <source>Technical Report</source>
          ,
          <year>2013</year>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>1179</volume>
          /
          <article-title>CLEF2013wn-PAN-Seidman2013</article-title>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>M.</given-names>
            <surname>Jankowska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kešelj</surname>
          </string-name>
          , E. Milios,
          <article-title>Proximity based one-class classification with Common N-Gram dissimilarity for authorship verification task</article-title>
          ,
          <source>Technical Report</source>
          ,
          <year>2013</year>
          . URL: https: //pdfs.semanticscholar.org/6b31/8009ebee54573e6402a4e5247089accd16a2.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>P.</given-names>
            <surname>Juola</surname>
          </string-name>
          , E. Stamatatos,
          <source>Overview of the Author Identification Task at PAN</source>
          <year>2013</year>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>E.</given-names>
            <surname>Stamatatos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Daelemans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Verhoeven</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Potthast</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Stein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Juola</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>SanchezPerez, A</article-title>
          .
          <string-name>
            <surname>Barrón-Cedeño</surname>
          </string-name>
          ,
          <source>Overview of the Author Identification Task at PAN</source>
          <year>2014</year>
          1180 (
          <year>2014</year>
          )
          <fpage>877</fpage>
          -
          <lpage>897</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>D. L.</given-names>
            <surname>Hoover</surname>
          </string-name>
          ,
          <article-title>Statistical Stylistics and Authorship Attribution: an Empirical Investigation</article-title>
          ,
          <source>Literary and Linguistic Computing</source>
          <volume>16</volume>
          (
          <year>2001</year>
          )
          <fpage>421</fpage>
          -
          <lpage>444</lpage>
          . URL: https://academic.oup.com/dsh/ article-lookup/doi/10.1093/llc/16.4.421.
          <source>doi:1 0 . 1 0</source>
          <volume>9 3</volume>
          / l l c /
          <article-title>1 6 . 4 . 4 2 1</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>J.</given-names>
            <surname>Rudman</surname>
          </string-name>
          ,
          <article-title>The twelve disputed 'federalist'papers: A case for collaboration (</article-title>
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>M.</given-names>
            <surname>Koppel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Schler</surname>
          </string-name>
          ,
          <article-title>Authorship verification as a one-class classification problem</article-title>
          ,
          <source>in: Proceedings of the Twenty-First International Conference on Machine learning, Association for Computing Machinery</source>
          ,
          <year>2004</year>
          , p.
          <fpage>62</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>L.</given-names>
            <surname>Manevitz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yousef</surname>
          </string-name>
          ,
          <article-title>One-class document classification via neural networks</article-title>
          ,
          <source>in: Neurocomputing</source>
          , volume
          <volume>70</volume>
          ,
          <string-name>
            <surname>Elsevier</surname>
          </string-name>
          ,
          <year>2007</year>
          , pp.
          <fpage>1466</fpage>
          -
          <lpage>1481</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>N.</given-names>
            <surname>Japkowicz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Myers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gluck</surname>
          </string-name>
          , et al.,
          <article-title>A novelty detection approach to classification</article-title>
          , in: IJCAI, volume
          <volume>1</volume>
          ,
          <year>1995</year>
          , pp.
          <fpage>518</fpage>
          -
          <lpage>523</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kumar</surname>
          </string-name>
          , J. Cheng, J.
          <string-name>
            <surname>Leskovec</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Subrahmanian</surname>
          </string-name>
          ,
          <article-title>An army of me: Sockpuppets in online discussion communities</article-title>
          ,
          <source>in: Proceedings of the 26th International Conference on World</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>