{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T23:39:05Z","timestamp":1774309145770,"version":"3.50.1"},"publisher-location":"Cham","reference-count":79,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319445632","type":"print"},{"value":"9783319445649","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-44564-9_28","type":"book-chapter","created":{"date-parts":[[2016,8,22]],"date-time":"2016-08-22T02:00:36Z","timestamp":1471831236000},"page":"332-350","source":"Crossref","is-referenced-by-count":18,"title":["Overview of PAN\u201916"],"prefix":"10.1007","author":[{"given":"Paolo","family":"Rosso","sequence":"first","affiliation":[]},{"given":"Francisco","family":"Rangel","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Potthast","sequence":"additional","affiliation":[]},{"given":"Efstathios","family":"Stamatatos","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Tschuggnall","sequence":"additional","affiliation":[]},{"given":"Benno","family":"Stein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,23]]},"reference":[{"key":"28_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/978-3-642-33167-1_18","volume-title":"Computer Security \u2013 ESORICS 2012","author":"M Almishari","year":"2012","unstructured":"Almishari, M., Tsudik, G.: Exploring linkability of user reviews. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 307\u2013324. Springer, Heidelberg (2012)"},{"key":"28_CR2","unstructured":"\u00c1lvarez-Carmona, M.A., L\u00f3pez-Monroy, A.P., Montes-Y-G\u00f3mez, M., Villase\u00f1or-Pineda, L., Jair-Escalante, H.: INAOE\u2019s Participation at PAN\u201915: author profiling task\u2013notebook for PAN at CLEF 2015. In: Working Notes Papers of the CLEF 2015 Evaluation Labs. CEUR-WS.org, vol. 1391 (2015)"},{"issue":"4","key":"28_CR3","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/s10791-008-9066-8","volume":"12","author":"E Amig\u00f3","year":"2009","unstructured":"Amig\u00f3, E., Gonzalo, J., Artiles, J., Verdejo, F.: A comparison of extrinsic clustering evaluation metrics based on formal constraints. Inf. Retrieval 12(4), 461\u2013486 (2009)","journal-title":"Inf. Retrieval"},{"key":"28_CR4","unstructured":"Argamon, S., Juola, P.: Overview of the international authorship identification competition at PAN-2011. In: Working Notes Papers of the CLEF 2011 Evaluation Labs (2011)"},{"key":"28_CR5","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1515\/text.2003.014","volume":"23","author":"S Argamon","year":"2003","unstructured":"Argamon, S., Koppel, M., Fine, J., Shimoni, A.R.: Gender, genre, and writing style in formal written texts. TEXT 23, 321\u2013346 (2003)","journal-title":"TEXT"},{"key":"28_CR6","unstructured":"Bagnall, D.: Author identification using multi-headed recurrent neural networks. In: Working Notes Papers of the CLEF 2015 Evaluation Labs. CEUR-WS.org, vol. 1391 (2015)"},{"key":"28_CR7","unstructured":"Bensalem, I., Boukhalfa, I., Rosso, P., Abouenour, L., Darwish, K., Chikhi, S.: Overview of the AraPlagDet PAN@ FIRE2015 shared task on arabic plagiarism detection. In: Notebook Papers of FIRE 2015. CEUR-WS.org, vol. 1587 (2015)"},{"key":"28_CR8","unstructured":"Burger, J.D., Henderson, J., Kim, G., Zarrella, G.: Discriminating gender on twitter. In: Proceedings of EMNLP 2011 (2011)"},{"issue":"3","key":"28_CR9","first-page":"43:1","volume":"4","author":"S Burrows","year":"2013","unstructured":"Burrows, S., Potthast, M., Stein, B.: Paraphrase acquisition via crowdsourcing and machine learning. ACM TIST 4(3), 43:1\u201343:21 (2013)","journal-title":"ACM TIST"},{"key":"28_CR10","unstructured":"Castillo, E., Cervantes, O., Vilari\u00f1o, D., Pinto, D., Le\u00f3n, S.: Unsupervised method for the authorship identification task. In: CLEF 2014 Labs and Workshops, Notebook Papers. CEUR-WS.org, vol. 1180 (2014)"},{"key":"28_CR11","first-page":"1","volume":"4","author":"CE Chaski","year":"2005","unstructured":"Chaski, C.E.: Who\u2019s at the keyboard: authorship attribution in digital evidence invesigations. Int. J. Digit. Evid. 4, 1\u201313 (2005)","journal-title":"Int. J. Digit. Evid."},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Clarke, C.L., Craswell, N., Soboroff, I., Voorhees, E.M.: Overview of the TREC 2009 web track. In: DTIC Document (2009)","DOI":"10.6028\/NIST.SP.500-278.web-overview"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Flores, E., Rosso, P., Moreno, L., Villatoro, E.: On the detection of source code re-use. In: ACM FIRE 2014 Post Proceedings of the Forum for Information Retrieval Evaluation, pp. 21\u201330 (2015)","DOI":"10.1145\/2824864.2824878"},{"key":"28_CR14","unstructured":"Flores, E., Rosso, P., Villatoro, E., Moreno, L., Alcover, R., Chirivella, V.: PAN@FIRE: overview of CL-SOCO track on the detection of cross-language source code re-use. In: Notebook Papers of FIRE 2015. CEUR-WS.org, vol. 1587 (2015)"},{"key":"28_CR15","unstructured":"Fr\u00e9ry, J., Largeron, C., Juganaru-Mathieu, M.: UJM at clef in author identification. In: CLEF 2014 Labs and Workshops, Notebook Papers. CEUR-WS.org, vol. 1180 (2014)"},{"key":"28_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1007\/978-3-642-40802-1_28","volume-title":"Information Access Evaluation","author":"T Gollub","year":"2013","unstructured":"Gollub, T., Potthast, M., Beyer, A., Busse, M., Rangel, F., Rosso, P., Stamatatos, E., Stein, B.: Recent trends in digital text forensics and its evaluation. In: Forner, P., M\u00fcller, H., Paredes, R., Rosso, P., Stein, B. (eds.) CLEF 2013. LNCS, vol. 8138, pp. 282\u2013302. Springer, Heidelberg (2013)"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Gollub, T., Stein, B., Burrows, S.: Ousting Ivory tower research: towards a web framework for providing experiments as a service. In: Proceedings of SIGIR 12. ACM (2012)","DOI":"10.1145\/2348283.2348501"},{"key":"28_CR18","unstructured":"Hagen, M., Potthast, M., Stein, B.: Source retrieval for plagiarism detection from large web corpora: recent approaches. In: Working Notes Papers of the CLEF 2015 Evaluation Labs. CEUR-WS.org, vol. 1391 (2015)"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"van Halteren, H.: Linguistic profiling for author recognition and verification. In: Proceedings of ACL 2004 (2004)","DOI":"10.3115\/1218955.1218981"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Holmes, J., Meyerhoff, M.: The Handbook of Language and Gender. Blackwell Handbooks in Linguistics, Wiley (2003)","DOI":"10.1002\/9780470756942"},{"issue":"1\u20132","key":"28_CR21","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.diin.2010.03.003","volume":"7","author":"F Iqbal","year":"2010","unstructured":"Iqbal, F., Binsalleeh, H., Fung, B.C.M., Debbabi, M.: Mining writeprints from anonymous e-mails for forensic investigation. Digit. Investig. 7(1\u20132), 56\u201364 (2010)","journal-title":"Digit. Investig."},{"key":"28_CR22","unstructured":"Jankowska, M., Keselj, V., Milios, E.: CNG text classification for authorship profiling task-notebook for PAN at CLEF 2013. In: Working Notes Papers of the CLEF 2013 Evaluation Labs. CEUR-WS.org, vol. 1179 (2013)"},{"key":"28_CR23","unstructured":"Juola, P.: An overview of the traditional authorship attribution subtask. In: Working Notes Papers of the CLEF 2012 Evaluation Labs (2012)"},{"key":"28_CR24","first-page":"234","volume":"1","author":"P Juola","year":"2008","unstructured":"Juola, P.: Authorship attribution. Found. Trends Inf. Retrieval 1, 234\u2013334 (2008)","journal-title":"Found. Trends Inf. Retrieval"},{"key":"28_CR25","unstructured":"Juola, P.: How a computer program helped reveal J.K. rowling as author of a Cuckoo\u2019s calling. In: Scientific American (2013)"},{"key":"28_CR26","unstructured":"Juola, P., Stamatatos, E.: Overview of the author identification task at PAN-2013. In:Working Notes Papers of the CLEF 2013 Evaluation Labs. CEUR-WS.org vol. 1179 (2013)"},{"key":"28_CR27","unstructured":"Keswani, Y., Trivedi, H., Mehta, P., Majumder, P.: Author masking through translation-notebook for PAN at CLEF 2016. In: Conference and Labs of the Evaluation Forum, CLEF (2016)"},{"issue":"4","key":"28_CR28","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1093\/llc\/17.4.401","volume":"17","author":"M Koppel","year":"2002","unstructured":"Koppel, M., Argamon, S., Shimoni, A.R.: Automatically categorizing written texts by author gender. Literary Linguist. Comput. 17(4), 401\u2013412 (2002)","journal-title":"Literary Linguist. Comput."},{"key":"28_CR29","first-page":"1261","volume":"8","author":"M Koppel","year":"2007","unstructured":"Koppel, M., Schler, J., Bonchek-Dokow, E.: Measuring differentiability: unmasking pseudonymous authors. J. Mach. Learn. Res. 8, 1261\u20131276 (2007)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"28_CR30","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1002\/asi.22954","volume":"65","author":"M Koppel","year":"2014","unstructured":"Koppel, M., Winter, Y.: Determining if two documents are written by the same author. J. Am. Soc. Inf. Sci. Technol. 65(1), 178\u2013187 (2014)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"issue":"1","key":"28_CR31","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1017\/S1351324911000313","volume":"19","author":"R Layton","year":"2013","unstructured":"Layton, R., Watters, P., Dazeley, R.: Automated unsupervised authorship analysis using evidence accumulation clustering. Nat. Lang. Eng. 19(1), 95\u2013120 (2013)","journal-title":"Nat. Lang. Eng."},{"key":"28_CR32","unstructured":"L\u00f3pez-Monroy, A.P., Montes-y G\u00f3mez, M., Jair-Escalante, H., Villasenor-Pineda, L.V.: Using intra-profile information for author profiling-notebook for PAN at CLEF 2014. In: Working Notes Papers of the CLEF 2014 Evaluation Labs. CEUR-WS.org, vol. 1180 (2014)"},{"key":"28_CR33","unstructured":"L\u00f3pez-Monroy, A.P., Montes-y G\u00f3mez, M., Jair-Escalante, H., Villasenor-Pineda, L., Villatoro-Tello, E.: INAOE\u2019s participation at PAN\u201913: author profiling task-notebook for PAN at CLEF 2013. In: Working Notes Papers of the CLEF 2013 Evaluation Labs. CEUR-WS.org, vol. 1179 (2013)"},{"key":"28_CR34","doi-asserted-by":"crossref","unstructured":"Luyckx, K., Daelemans, W.: Authorship attribution and verification with many authors and limited data. In: Proceedings of COLING (2008)","DOI":"10.3115\/1599081.1599146"},{"key":"28_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/978-3-319-12027-0_8","volume-title":"Advances in Artificial Intelligence \u2013 IBERAMIA 2014","author":"S Maharjan","year":"2014","unstructured":"Maharjan, S., Shrestha, P., Solorio, T., Hasan, R.: A straightforward author profiling approach in MapReduce. In: Bazzan, A.L.C., Pichara, K. (eds.) IBERAMIA 2014. LNCS, vol. 8864, pp. 95\u2013107. Springer, Heidelberg (2014)"},{"key":"28_CR36","unstructured":"Mansoorizadeh, M.: Submission to the author obfuscation task at PAN 2016. In: Conference and Labs of the Evaluation Forum, CLEF (2016)"},{"key":"28_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1007\/11735106_66","volume-title":"Advances in Information Retrieval","author":"SM Eissen","year":"2006","unstructured":"Eissen, S.M., Stein, B.: Intrinsic plagiarism detection. In: Lalmas, M., MacFarlane, A., R\u00fcger, S.M., Tombros, A., Tsikrika, T., Yavlinsky, A. (eds.) ECIR 2006. LNCS, vol. 3936, pp. 565\u2013569. Springer, Heidelberg (2006)"},{"key":"28_CR38","unstructured":"Mihaylova, T., Karadjov, G., Nakov, P., Kiprov, Y., Georgiev, G., Koychev, I.: SU@PAN\u20192016: author obfuscation-notebook for PAN at CLEF 2016. In: Conference and Labs of the Evaluation Forum, CLEF (2016)"},{"issue":"2","key":"28_CR39","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1109\/TASL.2011.2125954","volume":"20","author":"XA Miro","year":"2012","unstructured":"Miro, X.A., Bozonnet, S., Evans, N., Fredouille, C., Friedland, G., Vinyals, O.: Speaker diarization: a review of recent research. Audio Speech Language Process. IEEE Trans. 20(2), 356\u2013370 (2012)","journal-title":"Audio Speech Language Process. IEEE Trans."},{"key":"28_CR40","unstructured":"Moreau, E., Jayapal, A., Lynch, G., Vogel, C.: Author verification: basic stacked generalization applied to predictions from a set of heterogeneous learners. In: Working Notes Papers of the CLEF 2015 Evaluation Labs. CEUR-WS.org, vol. 1391 (2015)"},{"key":"28_CR41","unstructured":"Nguyen, D., Gravel, R., Trieschnigg, D., Meder, T.: How old do you think I am? a study of language and age in twitter. In: Proceedings of ICWSM 13. AAAI (2013)"},{"key":"28_CR42","unstructured":"Pe\u00f1as, A., Rodrigo, A.: A Simple measure to assess non-response. In: Proceedings of HLT 2011 (2011)"},{"issue":"1","key":"28_CR43","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1146\/annurev.psych.54.101601.145041","volume":"54","author":"JW Pennebaker","year":"2003","unstructured":"Pennebaker, J.W., Mehl, M.R., Niederhoffer, K.G.: Psychological aspects of natural language use: our words, our selves. Ann. Rev. Psychol. 54(1), 547\u2013577 (2003)","journal-title":"Ann. Rev. Psychol."},{"key":"28_CR44","unstructured":"Potthast, M., Barr\u00f3n-Cede\u00f1o, A., Eiselt, A., Stein, B., Rosso, P.: Overview of the 2nd international competition on plagiarism detection. In: Working Notes Papers of the CLEF 2010 Evaluation Labs (2010)"},{"key":"28_CR45","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s10579-009-9114-z","volume":"45","author":"M Potthast","year":"2011","unstructured":"Potthast, M., Barr\u00f3n-Cede\u00f1o, A., Stein, B., Rosso, P.: Cross-language plagiarism detection. Lang. Resour. Eval. (LREC) 45, 45\u201362 (2011)","journal-title":"Lang. Resour. Eval. (LREC)"},{"key":"28_CR46","unstructured":"Potthast, M., Eiselt, A., Barr\u00f3n-Cede\u00f1o, A., Stein, B., Rosso, P.: Overview of the 3rd international competition on plagiarism detection. In: Working Notes Papers of the CLEF 2011 Evaluation Labs (2011)"},{"key":"28_CR47","unstructured":"Potthast, M., Gollub, T., Hagen, M., Gra\u00dfegger, J., Kiesel, J., Michel, M., Oberl\u00e4nder, A., Tippmann, M., Barr\u00f3n-Cede\u00f1o, A., Gupta, P., Rosso, P., Stein, B.: Overview of the 4th international competition on plagiarism detection. In: Working Notes Papers of the CLEF 2012 Evaluation Labs (2012)"},{"key":"28_CR48","unstructured":"Potthast, M., Gollub, T., Hagen, M., Tippmann, M., Kiesel, J., Rosso, P., Stamatatos, E., Stein, B.: Overview of the 5th international competition on plagiarism detection. In: Working Notes Papers of the CLEF 2013 Evaluation Labs. CEUR-WS.org, vol. 1179 (2013)"},{"key":"28_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/978-3-319-11382-1_22","volume-title":"Information Access Evaluation","author":"M Potthast","year":"2014","unstructured":"Potthast, M., Gollub, T., Rangel, F., Rosso, P., Stamatatos, E., Stein, B.: Improving the reproducibility of PAN\u2019s shared tasks: plagiarism detection, author identification, and author profiling. In: Kanoulas, E., Lupu, M., Clough, P., Sanderson, M., Hall, M., Hanbury, A., Toms, E. (eds.) CLEF 2014. LNCS, vol. 8685, pp. 268\u2013299. Springer, Heidelberg (2014)"},{"key":"28_CR50","unstructured":"Potthast, M., Hagen, M., Beyer, A., Busse, M., Tippmann, M., Rosso, P., Stein, B.: Overview of the 6th international competition on plagiarism detection. In: Working Notes Papers of the CLEF 2014 Evaluation Labs. CEUR-WS.org, vol. 1180 (2014)"},{"key":"28_CR51","unstructured":"Potthast, M., Hagen, M., Stein, B.: Author obfuscation: attacking the state of the art in authorship verification. In: CLEF 2016 Working Notes. CEUR-WS.org (2016)"},{"key":"28_CR52","unstructured":"Potthast, M., G\u00f6ring, S., Rosso, P., Stein, B.: Towards data submissions for shared tasks: first experiences for the task of text alignment. In: Working Notes Papers of the CLEF 2015 Evaluation Labs. CEUR-WS.org, vol. 1391 (2015)"},{"key":"28_CR53","doi-asserted-by":"crossref","unstructured":"Potthast, M., Hagen, M., Stein, B., Gra\u00dfegger, J., Michel, M., Tippmann, M., Welsch, C.: ChatNoir: a search engine for the ClueWeb09 corpus. In: Proceedings of SIGIR 12. ACM (2012)","DOI":"10.1145\/2348283.2348429"},{"key":"28_CR54","unstructured":"Potthast, M., Hagen, M., V\u00f6lske, M., Stein, B.: Crowdsourcing interaction logs to understand text reuse from the web. In: Proceedings of ACL 13. ACL (2013)"},{"key":"28_CR55","unstructured":"Potthast, M., Stein, B., Barr\u00f3n-Cede\u00f1o, A., Rosso, P.: An evaluation framework for plagiarism detection. In: Proceedings of COLING 10. ACL (2010)"},{"key":"28_CR56","unstructured":"Potthast, M., Stein, B., Eiselt, A., Barr\u00f3n-Cede\u00f1o, A., Rosso, P.: Overview of the 1st international competition on plagiarism detection. In: Proceedings of PAN at SEPLN 09. CEUR-WS.org 502 (2009)"},{"issue":"1","key":"28_CR57","first-page":"73","volume":"52","author":"F Rangel","year":"2016","unstructured":"Rangel, F., Rosso, P.: On the impact of emotions on author profiling. Inf. Process. Manage. Spec. Issue Emot. Sentiment Soc. Expressive Media 52(1), 73\u201392 (2016)","journal-title":"Inf. Process. Manage. Spec. Issue Emot. Sentiment Soc. Expressive Media"},{"key":"28_CR58","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-319-24027-5_28","volume-title":"Experimental IR Meets Multilinguality, Multimodality, and Interaction","author":"F Rangel","year":"2015","unstructured":"Rangel, F., Rosso, P.: On the multilingual and genre robustness of emographs for author profiling in social media. In: Mothe, J., et al. (eds.) CLEF 2015. LNCS, vol. 9283, pp. 274\u2013280. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-24027-5_28"},{"key":"28_CR59","unstructured":"Rangel, F., Rosso, P., Celli, F., Potthast, M., Stein, B., Daelemans, W.: Overview of the 3rd author profiling task at PAN 2015. In: Working Notes Papers of the CLEF 2015 Evaluation Labs. CEUR-WS.org, vol. 1391 (2015)"},{"key":"28_CR60","unstructured":"Rangel, F., Rosso, P., Chugur, I., Potthast, M., Trenkmann, M., Stein, B., Verhoeven, B., Daelemans, W.: Overview of the 2nd author profiling task at PAN 2014. In: Working Notes Papers of the CLEF 2014 Evaluation Labs. CEUR-WS.org, vol. 1180 (2014)"},{"key":"28_CR61","unstructured":"Rangel, F., Rosso, P., Koppel, M., Stamatatos, E., Inches, G.: Overview of the author profiling task at PAN 2013\u2013notebook for PAN at CLEF 2013. In: Working Notes Papers of the CLEF 2013 Evaluation Labs. CEUR-WS.org, vol. 1179 (2013)"},{"key":"28_CR62","unstructured":"Rangel, F., Rosso, P., Verhoeven, B., Daelemans, W., Potthast, M., Stein, B.: Overview of the 4th author profiling task at PAN 2016: cross-genre evaluations. In: CLEF 2016 Working Notes. CEUR-WS.org (2016)"},{"key":"28_CR63","unstructured":"Samdani, R., Chang, K., Roth, D.: A discriminative latent variable model for online clustering. In: Proceedings of The 31st International Conference on Machine Learning, pp. 1\u20139 (2014)"},{"key":"28_CR64","doi-asserted-by":"crossref","unstructured":"Sapkota, U., Bethard, S., Montes-y-G\u00f3mez, M., Solorio, T.: Not all character N-grams are created equal: a study in authorship attribution. In: Proceedings of NAACL 15. ACL (2015)","DOI":"10.3115\/v1\/N15-1010"},{"key":"28_CR65","unstructured":"Sapkota, U., Solorio, T., Montes-y-G\u00f3mez, M., Bethard, S., Rosso, P.: Cross-topic authorship attribution: will out-of-topic data help? In: Proceedings of COLING 14 (2014)"},{"key":"28_CR66","unstructured":"Schler, J., Koppel, M., Argamon, S., Pennebaker, J.W.: Effects of age and gender on blogging. In: AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs. AAAI (2006)"},{"issue":"9","key":"28_CR67","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1371\/journal.pone.0073791","volume":"8","author":"HA Schwartz","year":"2013","unstructured":"Schwartz, H.A., Eichstaedt, J.C., Kern, M.L., Dziurzynski, L., Ramones, S.M., Agrawal, M., Shah, A., Kosinski, M., Stillwell, D., Seligman, M.E., et al.: Personality, gender, and age in the language of social media: the open-vocabulary approach. PloS One 8(9), 773\u2013791 (2013)","journal-title":"PloS One"},{"key":"28_CR68","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A survey of modern authorship attribution methods. J. Am. Soc. Inf. Sci. Technol. 60, 538\u2013556 (2009)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"28_CR69","first-page":"421","volume":"21","author":"E Stamatatos","year":"2013","unstructured":"Stamatatos, E.: On the robustness of authorship attribution based on character n-gram features. J. Law Policy 21, 421\u2013439 (2013)","journal-title":"J. Law Policy"},{"key":"28_CR70","unstructured":"Stamatatos, E., Tschuggnall, M., Verhoeven, B., Daelemans, W., Specht, G., Stein, B., Potthast, M.: Clustering by authorship within and across documents. In: CLEF 2016 Working Notes. CEUR-WS.org (2016)"},{"key":"28_CR71","doi-asserted-by":"crossref","unstructured":"Stamatatos, E., Daelemans, W., Verhoeven, B., Juola, P., L\u00f3pez-L\u00f3pez, A., Potthast, M., Stein, B.: Overview of the author identification task at PAN-2015. In: Working Notes Papers of the CLEF 2015 Evaluation Labs. CEUR-WS.org, vol. 1391 (2015)","DOI":"10.1007\/978-3-319-24027-5_49"},{"key":"28_CR72","unstructured":"Stamatatos, E., Daelemans, W., Verhoeven, B., Stein, B., Potthast, M., Juola, P., S\u00e1nchez-P\u00e9rez, M.A., Barr\u00f3n-Cede\u00f1o, A.: Overview of the author identification task at PAN 2014. In: Working Notes Papers of the CLEF 2014 Evaluation Labs. CEUR-WS.org, vol. 1180 (2014)"},{"issue":"4","key":"28_CR73","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1162\/089120100750105920","volume":"26","author":"E Stamatatos","year":"2000","unstructured":"Stamatatos, E., Fakotakis, N., Kokkinakis, G.: Automatic text categorization in terms of genre and author. Comput. Linguist. 26(4), 471\u2013495 (2000)","journal-title":"Comput. Linguist."},{"key":"28_CR74","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s10579-010-9115-y","volume":"45","author":"B Stein","year":"2011","unstructured":"Stein, B., Lipka, N., Prettenhofer, P.: Intrinsic plagiarism analysis. Lang. Resour. Eval. (LRE) 45, 63\u201382 (2011)","journal-title":"Lang. Resour. Eval. (LRE)"},{"key":"28_CR75","doi-asserted-by":"crossref","unstructured":"Stein, B., Meyer zu Ei\u00dfen, S.: Near Similarity Search and Plagiarism Analysis. In: Proceedings of GFKL 05. Springer, Heidelberg, pp. 430\u2013437 (2006)","DOI":"10.1007\/3-540-31314-1_52"},{"key":"28_CR76","unstructured":"Verhoeven, B., Daelemans, W.: Clips stylometry investigation (csi) corpus: a dutch corpus for the detection of age, gender, personality, sentiment and deception in text. In: Proceedings of LREC 2014 (2014)"},{"key":"28_CR77","unstructured":"Verhoeven, B., Daelemans, W.: CLiPS stylometry investigation (CSI) corpus: a dutch corpus for the detection of age, gender, personality, sentiment and deception in text. In: Proceedings of the 9th International Conference on Language Resources and Evaluation, LREC (2014)"},{"issue":"3","key":"28_CR78","first-page":"266","volume":"5","author":"E Weren","year":"2014","unstructured":"Weren, E., Kauer, A., Mizusaki, L., Moreira, V., de Oliveira, P., Wives, L.: Examining multiple features for author profiling. J. Inf. Data Manage. 5(3), 266\u2013280 (2014)","journal-title":"J. Inf. Data Manage."},{"key":"28_CR79","unstructured":"Zhang, C., Zhang, P.: Predicting Gender from Blog Posts. Technical Report. University of Massachusetts Amherst, USA (2010)"}],"container-title":["Lecture Notes in Computer Science","Experimental IR Meets Multilinguality, Multimodality, and Interaction"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-44564-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:13:12Z","timestamp":1718755992000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-44564-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319445632","9783319445649"],"references-count":79,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-44564-9_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}