Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Authorship attribution based on Life-Like Network Automata

  • Jeaneth Machicao,

    Roles Conceptualization, Investigation, Methodology, Visualization, Writing – original draft, Writing – review & editing

    Affiliation Scientific Computing Group, São Carlos Institute of Physics, University of São Paulo, PO Box 369, 13560-970, São Carlos, São Paulo, Brazil

  • Edilson A. Corrêa Jr.,

    Roles Conceptualization, Data curation, Investigation, Writing – original draft, Writing – review & editing

    Affiliation Institute of Mathematics and Computer Science, University of São Paulo, Avenida Trabalhador são-carlense, 400, 13566-590, São Carlos, São Paulo, Brazil

  • Gisele H. B. Miranda,

    Roles Methodology, Writing – review & editing

    Affiliation Institute of Mathematics and Computer Science, University of São Paulo, Avenida Trabalhador são-carlense, 400, 13566-590, São Carlos, São Paulo, Brazil

  • Diego R. Amancio,

    Roles Conceptualization, Supervision, Writing – original draft, Writing – review & editing

    Affiliation Institute of Mathematics and Computer Science, University of São Paulo, Avenida Trabalhador são-carlense, 400, 13566-590, São Carlos, São Paulo, Brazil

  • Odemir M. Bruno

    Roles Conceptualization, Supervision, Writing – review & editing

    bruno@ifsc.usp.br

    Affiliation Scientific Computing Group, São Carlos Institute of Physics, University of São Paulo, PO Box 369, 13560-970, São Carlos, São Paulo, Brazil

Abstract

The authorship attribution is a problem of considerable practical and technical interest. Several methods have been designed to infer the authorship of disputed documents in multiple contexts. While traditional statistical methods based solely on word counts and related measurements have provided a simple, yet effective solution in particular cases; they are prone to manipulation. Recently, texts have been successfully modeled as networks, where words are represented by nodes linked according to textual similarity measurements. Such models are useful to identify informative topological patterns for the authorship recognition task. However, there is no consensus on which measurements should be used. Thus, we proposed a novel method to characterize text networks, by considering both topological and dynamical aspects of networks. Using concepts and methods from cellular automata theory, we devised a strategy to grasp informative spatio-temporal patterns from this model. Our experiments revealed an outperformance over structural analysis relying only on topological measurements, such as clustering coefficient, betweenness and shortest paths. The optimized results obtained here pave the way for a better characterization of textual networks.

Introduction

The current massive production of data has brought up plenty of challenges to the areas of Data Mining, Natural Language Processing (NLP) and Machine Learning. An example of a current challenge in information sciences is the authorship attribution task, which amounts to the ability to assign authorship to anonymous or disputed documents. This task has drawn attention from researchers mostly for its implications in real applications, such as plagiarism detection [1, 2], forensics against cyber crimes [3] and resolution of disputed documents [4].

Several methods have been proposed to undertake the authorship attribution problem [4]. Traditional techniques use text analytics and natural language processing concepts to characterize authors’ writing styles [4]. For example, in several studies, it has been shown that the raw frequency of function words or the intermittency of content words is notably useful to discriminate authors’ styles [5, 6]. In recent years, deeper paradigms have been employed to tackle this problem. Syntactical and semantical features are some examples of features not relying only on simple statistical analyses [7]. Despite being effective in particular contexts, deeper paradigms require a more complex data handling, a painstaking effort that may not yield good results in generic scenarios. Even though methods based on simple statistical analyses yield, in general, excellent results with the advantage of not requiring a large corpora for training or language-dependent resources, they are prone to manipulation via obfuscation or imitation attacks [6, 8]. For this reason, more robust statistical methods have been proposed.

A recent trend in authorship attribution research is using the complex network framework, due to the success of its use in related tasks, mostly in text classification tasks [915]. In this paradigm, documents are modeled by means of a co-occurrence network [12], and the properties of the formed networks are used as authors’ fingerprints in the classification process [16]. Although such methods have proven useful for discriminating writing styles with a certain robustness provided by topological analysis, they usually provide no better results than traditional techniques based e.g. in n-grams models when used as a single source of text characterization. Complex network topologies, on the other hand, are less prone to direct manipulation, since the attacker cannot easily manipulate complex network features, which are mostly dependent on the interaction among all words in the text. Note that complex network-based measurements provide a complementary view of unstructured documents, a feature that can be further explored in hybrid approaches.

In a typical networked-based authorship recognition system, texts are modeled as a network and the structure of these networks is then used as a relevant feature to discriminate distinct authors [16]. While structural measurements are useful to understand the main topological properties of texts, they may provide an ambiguous characterization, mainly when subtleties in style are not mapped into equivalent informative network structures. For this reason, the creation of informative, efficient and unambiguous network measurements for specific models remains as an open problem in network science. In this context, we explore a novel network characterization based on cellular automata theory (CA) [17].

In the last decade, network science and cellular automata were combined in several applications [1821]. This discrete dynamical system, called as network automata, uses the network structure as the tessellation of the cellular automaton, whose dynamics is governed by a rule that defines the states of its nodes at each time step. Network automata turned out to be a powerful tool for pattern recognition purposes because it combines the advantages of the networks for modeling with the capabilities of CAs to extract complex patterns [21, 22].

In this manuscript, we propose a method to characterize networks representing written texts to tackle the authorship attribution task. The proposed method is based on Life-Like Network Automata (LLNA) [21], which was inspired by the 2D Life-like CA [23], a well-known set of rules explored in diverse fields [2427]. We depart from the well-known word-adjacency model and include a LLNA dynamics to characterize text networks. More specifically, our approach relies on a selection of informative LLNA’s rules and, therefore, we expect to obtain spatio-temporal patterns possessing two important properties: (i) the books written by the same author displays similar patterns; and (ii) books written by distinct authors display distinct spatio-temporal patterns. Using a collection of texts written by 8 authors, we obtained an accuracy of 70.5%, which is considerably more accurate than structural methods based solely on topological properties of networks and, therefore, demonstrating the good performance of the proposed method.

Related work

The first methods designed to automatically identify the authorship of disputed documents were proposed in the 19th century, with Mendenhall’s work applied to analyze Shakespeare’s plays [28]. Dominated by statistical and linguistic analysis, this area has since evolved into what we now define as authorship attribution task. Differently from what was done in early days, currently, the analysis has been mostly carried out through computational methods rather than using human experts [4].

Most methods propose the characterization of an author through the quantification of specific features, trying to capture the authors’ writing style [4]. Some simple features are: vocabulary size, frequency of function words and characters and the length of words and sentences. More complex features that require the use of advanced natural language processing techniques are: semantic features (e.g. semantic dependencies) [29], syntactic features (e.g. part-of-speech, sentence and phrase structure) [30] and other features relying on specific linguistic concepts [7]. All these features can be used as input to machine learning methods [4] or linguistic profiling techniques [7] to classify and identify authors.

Following a current trend in NLP and other areas of science [31], the authorship attribution task has been tackled using the complex network framework [5, 12, 15, 16, 3235]. This approach usually consists of modeling entities of a problem as vertices and the interaction between these entities as edges. After the modeling phase, the final structure generated by this process can be characterized by several topological/dynamical measurements [36], which in turn can be used to feed a machine learning method [37]. The co-occurrence network [12] is a clear example of modeling texts into complex networks that has been explored in several works [5, 16, 38, 39] and even refined in some cases, such as networks based only on function words [32]. Although there are alternative models such as syntactic dependency and semantic networks, most of the recent works have kept the use of co-occurrence modeling given its simplicity and little dependence on linguistic resources (a deep limitation in some languages).

All of the network-based models mentioned above have demonstrated their ability to perform the authorship attribution task. Even though such methods can not be compared directly, given the use of different datasets, such methods still perform poorly when compared to traditional statistical methods. However, as shown in some studies [32, 39], the characteristics captured by these models are different from the traditional ones. Most importantly, when traditional statistical methods are combined with those based on network features, improved results can be obtained. This fact justifies the creation of more sophisticated techniques for the characterization of networks. Following this idea, in this work, instead of using structural measures commonly used in complex networks, we chose to characterize networks through methods based on cellular automata.

Material and methods

Proposal overview

In this section, we introduce an overview of the main proposal (see Fig 1) to understand not only the sequence of mathematical preliminaries, but also the experiments setup that are presented in Results and discussion section. First, we introduce the well-known network model of text representation, the word-adjacency model. We also present optional text pre-processing strategies, which may be applied to improve the characterization of texts. Some network measurements used to explore the properties of networks are presented. Next, we discuss the Life-Like network automata representation used in this article and their respective measurements. The measurements extracted from the Life-Like network automata dynamics are then used to characterize the style of each author.

thumbnail
Fig 1. Authorship attribution framework based on LLNA method.

The following steps are applied: (1) a written text is pre-processed; (2) a network is generated based on the extraction of keywords from the pre-processing; (3) a selected LLNA rule evolves over the textual network topology; (4) spatio-temporal features from the LLNA are extracted and then are used for the authorship attribution task.

https://doi.org/10.1371/journal.pone.0193703.g001

Modeling and characterizing texts as networks

In recent years, distinct ways to model texts as complex networks and graphs have been proposed [40]. Particularly, in the current study, we have used the so-called word adjacency (or co-occurrence) model, as it has been proven useful to grasp stylistic textual patterns [16, 41, 42]. In this model, each node represents a word and the edges are created whenever two words appear as adjacent in the text. Note that even the last word of a sentence can be linked to the first word of the next sentence, since punctuation marks are removed from the analysis (see next section). Mathematically, the word adjacency network is represented by an adjacency matrix A, whose elements Aij are defined as (1)

Network construction.

Prior to the transformation of the text as a network, some pre-processing steps may be required. In most of the applications devoted to represent texts as networks, the three following steps are performed. The first step is the tokenization, which is responsible to split the document into meaningful units, such as words and punctuation marks. The second step performs the removal of stopwords, which are the words conveying little semantic meaning such as articles and prepositions. The list of stopwords is shown in S1 File of the Supplementary Information. Note that, in this phase, punctuation marks are also disregarded, as they do not contribute to the semantic meaning of text. Finally, the third step, a lemmatization is applied to map the remaining words into their canonical forms. As such, verbs and nouns are mapped to their infinitive and singular forms, respectively. The lemmatization process usually requires the identification of the individual parts-of-speech to solve possible ambiguities. In this paper, we have used the Average Perceptron part-of-speech Tagger proposed by Collins [43]. An example of the pre-processing steps applied to a given short text “Complex networks model several properties of texts. A complex text displays a complex organization” and its corresponding network construction is illustrated in Fig 2 and S2 File of the Supplementary Information.

thumbnail
Fig 2. Exemplification of the network modeling.

Here was used a short text “Complex networks model several properties of texts. A complex text displays a complex organization”. In this example, we considered the lemmatization of all words to construct the network.

https://doi.org/10.1371/journal.pone.0193703.g002

Although lemmatization is often used in NLP tasks, Toman [44] argued that this pre-processing step does not affect the performance of general text classification systems. To our knowledge, there is no systematic analysis on the effect of lemmatization on network-based authorship recognition methods. For this reason, we have considered the following three variations in the application of pre-processing in raw texts: (i) none, no lemmatization is performed; (ii) partial, only nouns are lemmatized; and (iii) full, all words are lemmatized, as it is done in more traditional works. We have considered full lemmatization in (iii) over stemming because the lemmatization is a more informed technique to normalize words. Differently from stemming methods, the lemmatization can solve ambiguities in the normalization process by using the part-of-speech of the words.

Network measurements.

In this section, we present a brief description of measurements used to characterize the topological properties of complex networks. These measurements are used here to study how the properties of text networks vary with distinct pre-processing steps. In addition, these measurements are also used for comparison and validation purposes.

The simplest measurements are the number of nodes (N) and edges (E). The density of a network is defined as d = E/N(N − 1), i.e. the fraction between the total number of edges and the maximum possible number of edges obtained in an equivalent fully connected network.

The degree ki of a node i is defined as the number of neighbors that i and is given by (2)

The coefficient γ of the degree distribution P(k) = kγ is another widely known measurement in network science [45]. Similar to other real-world networks, text adjacency networks display the scale-free behavior [12]. To estimate the coefficient γ, we used the strategy defined in [46]. The degree is also usually measured in global terms as (3)

The quantity defined in Eq 3 is the average degree, a measurement that has been applied in a myriad of network contexts [45], even though many of the studied distributions makes this quantity not a representative element of the distribution, as many networks display a fat-tailed degree distribution [4750]. This is the case of text networks, whose fat-tailed degree distribution stems from the Zipf’s law [51]. However, in several cases, the average degree is useful to discriminate distinct topologies [45].

Another well known connectivity measurement is the hierarchical degree kh, which corresponds to the number of neighbors h nodes away from the reference node. This is a simple extension of the concept of node degree for further hierarchies. Despite its seeming simplicity, the use of hierarchies has proven useful to improve the characterization of several real-world networks.

While the degree is essentially a local measurement, some other indexes were specially devised to characterize the global topology of networks. This is the case of distance-based metrics. Measurements based on geodesic paths include the average shortest path length (〈L〉) and the diameter (D). The average shortest path length of a network is computed as (4) where dij is the length of the shortest distance between nodes i and j. The diameter of a network D, is the largest path length among all distances.

The transitivity of the network was measured by the average clustering coefficient 〈C〉 = 1/Ncci, where cci is the clustering coefficient computed for node i. This quantity measures the probability of any two neighbors of i being linked. Mathematically, the local clustering coefficient is computed as (5) where ei represents the number of edges between the neighbors of node i. Even though this measure was originally used in social sciences, the clustering coefficient has been used to identify the specificity of words in distinct contexts.

Finally, we used the assortativity measure to measure if similar nodes are connected to each other. In this case, we used the concept of degree correlation, which assigns a high assortativity value for networks with edges established mostly between nodes with similar degree [52]. The assortativity is given by (6)

In general, text networks are disassortative, i.e. Γ < 0 [12].

Life-Like Network Automata

A network automata can be defined as a tuple . represents the network automata space, which is the topology of a network comprising N nodes (cells). is the set of binary states si, where si = 1 is the live state and si = 0 the dead state. The cell’s state can be identified by the function s, such that s(ci, t) gives the state of cell ci at time t. Finally, s0 represents the initial configuration of all cells (at t = 0) and ϕ is a transition function, i.e., the rule that governs the network automata dynamics by defining how the states of the cells are updated over time [21].

The LLNA, a powerful tool for pattern recognition [21], was proposed as a class of binary network automata inspired by the rules of the Life-like Cellular Automata (CA), which uses a set of outer-totalistic rules, i.e., rules that depend on the current state of cell ci and on the states of neighboring cells (i.e., the neighborhood density). The LLNA transition function is stated as (7) where the neighborhood density ρi of node i is the proportion of alive neighbors, i.e. (8) and ki the degree defined in Eq (2).

In Eq (7), variables x and y represent the conditions of the Life-Like rule which are stated in the form Bx0 x1x8-Sy0 y1y8, where B and S stand for “birth” and “survival”, respectively; and xi and yi varies from 0 to 9, for instance B3-S23 (see S3 File of the Supplementary Information). Moreover, given that the LLNA is based on Moore’s neighborhood, defined by a central cell and its eight nearest neighbors, the constant r = 9 accounts for all the combinations of the Life-Like family. Therefore, there exists a total of 29+9 = 262, 144 possible transition rules, which provides a vast space of optimal solutions for a specific problem [21].

LLNA spatio-temporal pattern

The dynamic of a network automata provides a global spatio-temporal pattern of evolution. Thus, each network node can be analyzed as a sequence of ones and zeros. Here, we qualitatively discuss the patterns arising from the dynamics of the LLNA modelling 40 books from 8 different authors, which are detailed later in the Dataset section. Fig 3 shows the spatio-temporal diagram of 40 networks using rule B2478-S25. A spatio-temporal diagram is the representation of the states along time, thus, each column represents the state of a given node and each line represents one time step. In this particular case, for each spatio-temporal diagram, the columns were ordered by the node degree. Thus, the leftmost columns are the nodes taking the lowest degrees k, and, the right-most, the ones taking the largest values of k. Note that the number of nodes N varies across networks, therefore, the diagrams are formed by a different number of columns. For simplicity’s sake, the diagrams were scaled to fit within the columns of the table.

thumbnail
Fig 3. Spatio-temporal diagrams.

Here was used the LLNA rule B2478-S25 obtained from books written by eight authors. The partial-dataset was used in this case. The LLNA dynamics was performed until t = 500 and the initial states s0 were defined by a random uniform distribution. The spatio-temporal diagram shows the nodes’ states: dead, in black; and alive, in white. While the horizontal axis represent the nodes (sorted by increasing order of degree k, for illustration purposes only), the vertical axis represents the temporal variable.

https://doi.org/10.1371/journal.pone.0193703.g003

Notice that for the particular LLNA rule B2478-S25, Fig 3 reveals a general pattern among all the authors. Three notable regions arise: the leftmost correspond to an oscillatory pattern with a higher tendency of alive nodes, followed by a row with tendency of dead nodes (region comprising nodes with average degree 〈k〉 = 3). Then, another shorter oscillatory region appears, followed by a second region, which also presents a higher frequency of dead nodes (region comprising nodes with average degree 〈k〉 = 5). The reader should note that rule B2478-S25 does not favor nodes with average degrees 3 and 5 for birth and survival conditions, which explains the distribution of these vertical patterns in the diagrams. The influence of this rule over the nodes with average degree 1 is less apparent due to the lower frequency of these nodes. The rightmost nodes, which correspond to hubs in the network, also show oscillatory patterns that are directly related to the dynamics of rule B2478-S25. This rule favors the birth of nodes and penalizes their survival. Such a behavior illustrates a dependency between rules and network topology.

Despite the above mentioned similar structures in the spatio-temporal diagram, author-dependent patterns can also be noted. For instance, the patterns obtained for Darwin in all five books are strongly similar. Darwin’s textual networks present a bigger region corresponding to nodes with average degree 〈k〉 = 3, and a major ratio of nodes with high connectivity which are influenced by the rule. Therefore, the spatio-temporal diagram suggests that the books written by the same author exhibits similar patterns, while allowing to distinguish among the other authors.

LLNA measurements.

Based on the spatio-temporal diagram, as the ones displayed in Fig 3, several measurements can be used to extract quantitative properties from each individual node that allow to characterize the textual networks in terms of a time series containing only zeros and ones. In this work, we focused on two measurements (the Shannon entropy and Lempel-Ziv complexity) as suggested in the literature [21].

The Shannon entropy of a binary sequence is defined as (9) where and are the probability of having ones and zeros in the sequence, respectively [53]. The Shannon entropy ranges in the interval [0, 1], where periodic and complex spatio-temporal patterns tend to higher entropy values, while steady patterns tend to lower values.

The Lempel-Ziv complexity μLi, different from Shannon entropy, is derived from the data compression algorithm proposed by Lempel&Ziv [54]. This measurement is based on the number of different blocks (g) that a sequence can contain. A minimum block is defined using the first bit on the left of the sequence. Then, one moves rightward, bit by bit, until an unseen subsequence appears, which is formed starting exactly after a previous block and ending at the current position. For instance, the binary sequence 11110001000111010010 of length l = 20, can be divided into g = 9 minimum blocks: 1|11|10|0|01|00|011|101|001. Given the number of blocks g, the Lempel-Ziv complexity is computed as (10)

Similar to the entropy, steady patterns will tend to lower Lempel-Ziv complexities, while more chaotic or randomly patterns will tend to higher values. However, some differences can be found between both measurements. For instances, given two sequences “01010101” and “01001101010111001001”, the first sequence repeats a steady pattern, while the second one seems random. In both cases, the highest entropy is obtained, while their complexities values are 1.30 and 1.35, since they contain 4 and 8 minimum blocks, respectively.

LLNA-based pattern recognition

We employed the LLNA method to extract the intrinsic patterns from textual networks, which aim to distinguish among authors’ written style. In the so-called training phase, these techniques first identify patterns for each author’s writing style. Then, the patterns identified in the previous phase are used to classify unseen instances in the classification phase. In this manuscript, we setup two systematic frameworks to evaluate the performance of the proposed method: as a one-class and multi-class problem.

In literature, some works have considered the authorship task as a one-class problem [55]. Thus, we addressed the authorship attribution problem by comparing all the collection of books from an author A against the same number of unknown exclusive books from X authors. Thus we determine if A is distinguishable from X. In this scenario, we used linear classification methods that have been in related text categorization methods, including Naive Bayes (NVB), k Nearest Neighbors (kNN) and Support Vector Machines (SVM), as suggested by Koppel [55].

In addition to the one-class framework, we also evaluated the performance of our method as a multi-class problem. Thus, besides the linear classifiers previously mentioned, several well-known supervised classification methods were also employed: Bayesian Networks (BNT), RBF Networks (RBF), Multi Layer Perceptron (MLP), C4.5 (C45) and Random Forest (RFO) [56]. All classifiers were set up with their default configuration of parameters, as suggested in Ref. [57].

To evaluate the performance of both one-class and multi-class classification schemes, we used the k-fold cross-validation strategy [56]. To perform the evaluation, this method splits the data into two sets: the training dataset is the set of samples used for training purposes, while the test set is used for validation purposes. Since these two sets are mutually exclusive and, therefore, the evaluation is performed over unknown instances, the cross-validation method is a reliable strategy. In this study, we use k = 5 because each author was characterized by a set of 5 books (see description of the dataset in the next section. Thus, at each iteration, one book of each author is chosen to compound the test dataset, while the remaining books are selected to form the training dataset.

The results were also further probed by using confusion matrices, which are structures, reporting for each possible class (in our case, for each distinct author) the relationship between predicted and real classes. Traditionally, a confusion matrix is used to identify the following patterns of performance: , which is the number of instances belonging to class mi which were correctly assigned to mi; while is the number of instances belonging to class mi which were incorrectly assigned to class mj. Specially, the quantity will be useful to identify which authors cannot be discriminated with the proposed technique.

Dataset

An English corpus of known authors (labeled instances in the supervised training phase) was created to evaluate the accuracy of the proposed method. The corpus comprises 100 books in English language, which were obtained from the Project Gutenberg repository [58]. The books in our dataset were written by 20 distinct authors. The full list of books and the respective authors is provided in S4 File of the Supplementary Information. The distribution of books for authors is uniform, i.e. each author is represented by a set of 5 books. In this study, we considered the task of discriminating among 8 distinct authors, namely Doyle, Stoker, Darwin, Dickens, Hardy, Wodehouse, Poe and Munro. This dataset is hereafter referred to as classification-dataset. Note that datasets using a similar distribution of authors and genres have been considered in related works [5, 16, 59]. The remaining set of 12 authors, namely Melville, Grey, Lang, Davis, James, Bower, Irving, Wells, Alger, Twain and Hawthorne; hereafter referred to as rule-selection-dataset, was used to the particular process of selecting the best LLNA set of rules. The choice of best rules was performed in a different dataset to generate an unbiased classifier [56]. The former dataset was used for rule selection, while the classification-dataset was used to evaluate the performance of the classifiers. This procedure ensures that different datasets are employed for the learning and the classification processes. Moreover, due to the k-fold cross validation scheme, the training and testing steps were made regarding the classification-dataset.

In the general scenario of textual classification, the application of pre-processing steps may be useful for the task in hand. In semantical tasks, such as the word sense disambiguation, the lemmatization of words plays an important role on the performance [60]. In the authorship attribution task, conversely, this same lemmatization step may lead to a great loss of information, hindering the accurate identification of authors’ particular writing choices [4]. However, it has been shown that in network based techniques, the lemmatization step is important to cluster distinct writing forms into the same node. In our experiments, we also evaluated three types of lemmatization strategies to generate the textual networks, which led to the generation of three distinct variations of lemmatization datasets (none-dataset, partial-dataset and full-dataset). The three variations also follow the same methodology detailed before for the creation of both classification-dataset and rule-selection-dataset. The details of all three variations are summarized below:

  1. none-dataset: the original dataset was kept, i.e. the lemmatization step was disregarded.
  2. partial-dataset: the lemmatization was applied only in nouns. Thus, all nouns are mapped to their singular forms.
  3. full-dataset: the lemmatization was applied to all words. Therefore, verbs and nouns are mapped to their infinitive and singular forms, respectively.

Results and discussion

The main purpose of this manuscript is to characterize networks representing written texts to obtain informative features for the authorship attribution task. Differently from traditional approaches, here we explored the use of LLNA rules to discriminate network topologies. We have used this approach because it has been shown that authors’ particular writing choices modify word adjacency networks in a consistent form [16].

As described in the Material and methods section, our dataset comprises 100 books written by 20 distinct authors, and three distinct pre-processing strategies were probed to generate the textual networks. Before presenting the results of the classification based on the LLNA approach, we first address the LLNA rule selection, which is detailed in the next section. Thus, we perform the selection of the best LLNA rules using the rule-selection-dataset containing the 12 authors. Later, these rules are applied in the authorship problem using the classification-dataset comprising the 8 authors. We also compared the proposed approach with the one based on structural measurements [16]. Finally, we explore the effects of the lemmatization process on the properties of the networks.

LLNA rule selection

The rule selection is as important parameter to achieve higher accuracies using the LLNA method [21]. In fact, the set of Life-like rules can be understood as a parameter that might provide the best classification rates when applied in distinct applications. We evaluated, exhaustively, each of the 262, 144 possible Life-Like rules using the rule-selection-dataset comprising 12 authors. As discussed before, the reader should note that the rule selection was performed in different dataset in order to obtain LLNA rules that best represent a true classifier generalization [56].

The LLNA dynamics were evolved during t = 400 time steps. To characterize the dynamics of the LLNA, we extracted a feature vector composed by the concatenation of the Shannon entropy and the Lempel-Ziv distributions , which consist of 60 attributes. The first vector contains the distribution of the Shannon entropy μSi and the second vector is composed by the Lempel-Ziv complexity distribution . Both distributions are windowed over 30 bins. Additionally, we performed an analysis of the influence of the two parameters mentioned: the number of time steps and the number of bins of the distributions (see S5 File of the Supplementary Information). We adopted t = 400 and the number of bins as 30 in the subsequent experiments performed in this paper, as explained in the next section.

Because the choice of the best rule encompasses the induction and evaluation of 262, 144 classifiers, we only used in this phase the kNN method. We have chosen particularly this method because, in general, it generates better results while keeping an excellent processing time [56]. Note that, the application of other methods in this phase, such as neural networks or SVM, would be impractical owing to the time complexity associated to these methods [56].

Fig 4 depicts the histogram distribution of the accuracies obtained for the complete rule-space of the LLNA. Most of the rules yielded low accuracy classifiers. Typically, accuracies lower than 40% have been found. Conversely, there is a small number of rules that achieved accuracies greater than 60%, corresponding to approximately 50 rules. However, as the rule selection is made through an optimization procedure [21], therefore, in this study, we considered a bigger bunch of solutions, which included also the ones that obtained accuracy rates greater than 55%, which correspond approximately to 400 rules. This strategy is justified since we find better accuracies when tested on the unseen data, as explained later.

thumbnail
Fig 4. Histogram of the distribution of accuracy.

This figure shows the histogram of the distribution of accuracy for all 262, 144 evaluated rules of the LLNA in the rule-selection-dataset comprising 12 authors. From left to right, the histograms for each of the 3 datasets none, partial and full, are shown respectively. As an example, the highlighted five rules maximizes the classification of the rule-selection-dataset, when a partial lemmatization was applied. For this rule selection experiment, both Shannon entropy and Lempel-Ziv complexity were considered as corresponding feature vectors, and kNN classifier.

https://doi.org/10.1371/journal.pone.0193703.g004

Note that the selection of best rules is performed independently in each of three datasets: none-, partial- and full- from the rule-selection-dataset. Moreover, as the rule selection is a preliminary phase, one should expect that among the set of best rules further improvement can be achieved by using other LLNA measurements [21].

Classification of authorship networks

For the authorship identification problem, we applied the best rules obtained to identify authorship in the classification-dataset comprising the 8 authors. First, we compared the three datasets, none-, partial- and full-dataset by using different measurements extracted from the LLNA dynamics: the Shannon entropy distribution and the Lempel-Ziv distribution .

We evaluated the performance of the classification by using different LLNA measurements, extracted from the spatio-temporal pattern, in two ways, isolated and combined. Thus, two feature vectors were used to characterize authors’ styles. The first feature vector is composed by the distribution of the Shannon entropy μSi, which is divided into 30 bins, therefore, contains 30 attributes. Similarly, the second feature vector is composed by the Lempel-Ziv complexity distribution divided into 30 bins. We adopted arbitrarily 30 bins, since this value does not influence the accuracy rates (see S5 File of the Supplementary Information). This vector was normalized by the maximum value achieved among the group of samples. Finally, the combined vector is the one that concatenates both measurements, which contains 60 attributes.

We tested the accuracy of the 400 selected rules with different feature vectors as well as the combination of them for different classifiers. We emphasize that, as the rule selection is made through an optimization procedure for a specific problem [21], we must assume that the set of solutions (set of selected rules) also bring out some rules that do not fulfill the expectation when presented new dataset. For this reason, we recommended to explore a bigger bunch of solutions (rules), so in this manner we can find better rules.

Table 1 presents the best rules obtained for the classification-dataset. The columns and show the accuracy rates obtained for each distinct feature vector. The results when combining these distributions are shown in the last column of the same table. Note that the isolated feature vector yielded the maximum accuracy of 70.5% (± 13.44%) for rule B2478-S25 when using the partial-dataset.

thumbnail
Table 1. Accuracy rate (%) obtained using different measurements ( and ) and their combinations as attributes ([〈μS〉, 〈μL〉]) to classify 8 authors of the classification-dataset.

To select the best rules, we used the kNN with k = 1 and 5-fold cross validation. The best result among all classifiers were also obtained with the kNN method.

https://doi.org/10.1371/journal.pone.0193703.t001

To illustrate the discriminability obtained with our method, in Fig 5a, we show a canonical analysis project into two dimensions. In this case, the partial-dataset was analyzed, with a dynamics based on the rule B2478-S25 and a characterization performed in terms of the feature vector . Even though only two dimensions were used to visualize our data, there is a clear separation between Darwin and the other authors. A similar pattern occurs for Hardy, while others can considerably vary their styles from book to book (e.g. Dickens).

thumbnail
Fig 5. Authorship recognition performance using LLNA.

a) Canonical analysis performed for the authorship recognition task using the five books from the authors of the classification-dataset using partial lemmatization. For this plot was used rule B2478-S25 and the Lempel-Ziv distribution as a feature vector. b) Confusion matrix using kNN method achieved by the best classification rate. Each cell shows the number of correct predicted instances, where nonzero elements are indicated. c) Comparison of the accuracy obtained by the proposed method treating the authorship verification as a one-class classification problem. The accuracy was calculated as the average and standard deviation for the classification of five books of an author A against five books from unknown authors X, using three different classifiers.

https://doi.org/10.1371/journal.pone.0193703.g005

In Fig 5b we provide the confusion matrix obtained with the best rule. As expected, Darwin is easily distinguished from the other authors. In a similar fashion, the induced classifier can discriminate among Darwin, Hardy, Wodehouse and Munro. The author with the lowest classification accuracy is Stoker, since three of his books were incorrectly assigned to Dickens, Hardy and Wodehouse.

The best accuracy rate found using the best configuration of parameters shows unequivocally that the proposed features can capture authors’ particularities in written styles, allowing thus the discrimination of authors in unknown texts. Note that a random authorship attribution would accurately recognize authors with probability p = 1/8 = 0.125 in our dataset comprising nb = 40 books. Thus, the p-value associated with the obtained accuracy of na = 29 books accurately classified (see Fig 5) is (11) confirming thus the significance of the obtained results. Furthermore, we also analyzed the authorship task as a one-class problem. Thus, we evaluated the accuracy of an author A against X submitted to a 5-fold cross-validation experiment. As the number of books for all the authors in our validation corpus is five, we randomly choose a book from mutually exclusive authors. In this context there are 21 possible combinations . Therefore, we determined the accuracies in terms of the average and standard deviation for each author independently. Additionally, we used three different linear classifiers: kNN, NVB and SVM. The results for this experiment are reported in Fig 5c.

Evaluation of structural measurements and robustness analysis

We compared the results obtained with the Life-Like network automata with structural measurements used to characterize complex networks [16]. We selected the following measurements to compose the feature vector: mean degree (〈k〉), average hierarchical degree at the first level (), average hierarchical degree at the second level (), average clustering coefficient (〈C〉), average path length (l) and degree assortativity (Γ). Each measurement was calculated directly from the textual networks comprising the three datasets (none, partial and full). The left side of Table 2 shows the accuracy obtained in the classification of the network models when using structural measurements. Note that the performance of the structural measurements method, in general, is improved when no lemmatization is applied. The best result was obtained with the SVM classifier (61.30%), which is similar to the best results reported in [16]. A similar performance was also obtained with the MLP classifier (59.23%). The right side of Table 2 shows the results obtained with the proposed method. Rules B124-S257, B2478-S25, B3567-S03468 provided the highest accuracies for the none-, partial- and full-dataset when using only the Lempel-Ziv distribution .

thumbnail
Table 2. Comparison of the accuracy rate (%) obtained using network structural measurements and the proposed method based on network automata.

The structural measurements’ feature vector was composed by: mean degree (〈k〉), average hierarchical degree of level 1 (), average hierarchical degree of level 2 (), average clustering coefficient (〈C〉), average path length (l) and degree assortativity (Γ). Remarkably, our method outperforms the latter by an average margin of 9.2%.

https://doi.org/10.1371/journal.pone.0193703.t002

Considering all datasets and classifiers, the highest accuracy rate was 70.5%. This means that our method outperformed the network structural measurements by a margin of 9.2%, (when compared to the best performance of the structural measurements). The best results obtained by each strategy are also illustrated in Fig 6a. In addition, when comparing the results per datasets, we can see that the performance obtained with LLNA descriptors for k-NN classifier outperforms the structural measurements with a margin of 16.5%, 21.1% and 24.35% for none, partial and full datasets, respectively. For the SVM classifier, only the results for the none-dataset were outperformed for the structural measurements.

thumbnail
Fig 6. Comparison performance regarding network structural measurements and robustness performance.

a) Comparison of the accuracy obtained by the proposed method (left side) and the classical network measurements (right side). The histograms on the left (mean and standard deviation) represent the best accuracies obtained when using rules B124-S257, B2478-S25 and B3567-S03468 for none-, partial- and full-dataset, respectively. In a similar way, the histograms on the right show the best accuracies obtained using the combination of the network measurements: mean degree (〈k〉), average hierarchical degree of level 1 (), average hierarchical degree of level 2 (), average clustering coefficient (〈C〉), average path length (l) and degree assortativity (Γ), as a feature vector. b) Average accuracy obtained in the variations of the original dataset. Each variation considers a different number of authors, which ranges from 2 to 8. c) Performance evaluation for different text size, ranging from 2000 to 22000 words, using rule B2478-S25. For all these experiments kNN method was used.

https://doi.org/10.1371/journal.pone.0193703.g006

The robustness of the proposed methodology with regard to the total number of authors was verified by considering other variations of authors in the classification-dataset. To do so, we selected all variations of 8 authors among the total of 20 authors. We then applied the proposed methodology to probe the sensibility of our method to specific datasets. As shown in Fig 6b, there is only a minor variation in the accuracy when considering datasets of 8 authors, suggesting that our method is robust with regard to the variation of datasets. A similar procedure was performed to study the robustness in datasets comprising a distinct number of authors (from 2 to 7 authors). Note that, in these other scenarios, a similar robust behavior was found. Interestingly, similar accuracy results have been obtained when considering 3 and 8 authors, suggesting thus that our method is more effective when more complex authorship attribution tasks are considered.

Furthermore, as in real world authorship attribution problems, the size of a text is an issue, we also evaluated the tolerance of our proposed method with regard to the number of words within the books. We explored different bunch of words (2000, 4000 …, 22000). The accuracies obtained using the kNN classifier are shown in Fig 6c. According to the results, we observed that the performance is hampered for shorten texts, however for reasonable text size the accuracy is improved.

Effect of the lemmatization on network measurements

Table 3 shows the topological properties for one of Doyle’s book modeled as a network, considering the three lemmatization processes (none, partial and full). See the complete set of measurements in S6 File of the Supplementary Information. The columns show the measurements presented in the Material and methods section, as follows: number of nodes N, number of edges E, average degree 〈k〉, clustering coefficient 〈C〉, average path length 〈L〉, power-law exponent γ, diameter D, density d and degree assortativity Γ.

thumbnail
Table 3. Measurements extracted for the textual network corresponding to Doyle’s book “Uncle Bernac—A Memory of the Empire” regarding the three types of lemmatization process (none-, partial- and full-dataset).

https://doi.org/10.1371/journal.pone.0193703.t003

From the same table, one can note a decreasing of both the number of nodes N and edges E, while the average degree 〈k〉 increases. This effect can be explained by the fact that when the lemmatization process is performed, the multiple representations of a word are all transformed to its canonical form, e.g., the words has and have will have only one representation in a network, the node have, instead of having two. Moreover, the diameter for all the networks is maintained around 11. We also observed that all networks studied here obey a power law constant around ≈ 2.27. Therefore, these textual networks have a scale-free structure, which is supported by the maximum likelihood method and the Kolmogorov-Smirnov statistic that accepts the hypotheses of a reasonable fit. Moreover, this property is consistent with the scale-free textual networks found in the literature.

Fig 7 presents a set of average topological measurements calculated for each author of the classification-dataset. The standard deviation was obtained considering the five books of each author. Fig 7 also shows the values obtained for the three variations of dataset. The main results concerning each measurement are described below:

  • Total number of nodes (N) and edges (E): N decreases with the lemmatization process, whereas E is not influenced by this process. This effect occurs because, even when nodes are removed during the lemmatization, adjacency relationships are not affected, and, consequently, the degree of the remaining nodes tends to increase. This effect is evident in the top-right diagram displaying the average network connectivity 〈k〉.
  • Average clustering coefficient (〈C〉): This measurement was influenced by both N and k. 〈C〉 tends to increase with the lemmatization process because the network remains with almost the same number of edges, while the number of nodes decreases as a consequence of mapping distinct variations of the same concept into the same node.
  • Average shortest path length (〈L〉): Similarly to the number of edges, the average shortest path length is not much affected by the lemmatization process. However, note that the values of 〈L〉 tend to decrease as a consequence of the decrease in the total number of nodes.
  • Diameter (D): In most cases, the diameter increases by a short margin when the lemmatization process is performed. However, this pattern seems to depend from author to author. Note, e.g. that the average diameter decreases when the full lemmatization is applied for books authored by Doyle. Conversely, the lemmatization process seems to cause an opposite effect on networks modelling books written by Allan Poe.
  • Density (d): The density of links increases in most cases, as the lemmatization process removes nodes, and the number of edges is practically not affected. An exception occurs for Darwin. Remarkably, the average density of the none- and full- datasets are in a similar fashion.
  • Power-law exponent (γ): Almost all the textual networks present power exponent between 2 and 3, which is a characteristic that have been demonstrated for many real-world networks [45, 61] and, particularly in text networks, is a consequence of the Zipf’s Law. Concerning the effect of the lemmatization process on this feature, no clear pattern can be identified, as opposite effects have been found e.g. for Stoker and Poe.
thumbnail
Fig 7. Average network measurements.

Network structural measurement extracted from eight authors highlighted in the diagrams and for the three datasets: none-, partial- and full-dataset (see description in the Material and methods section). The following distributions are shown for each author: number of nodes (N), number of edges (E), average connectivity (〈k〉), average clustering coefficient (〈C〉), average path length (〈L〉), diameter (D), density (d), power-law exponent (γ) and degree assortativity (Γ).

https://doi.org/10.1371/journal.pone.0193703.g007

Conclusion

In this paper, we have addressed the authorship attribution problem, which is a task of practical relevance in many contexts of information science research. We have specifically studied the effect of the textual organization in the discriminability of documents written by distinct authors. To capture the structural properties of texts, we have used the well-known network framework, given its potential revealed in related applications. Unlike the approaches based only on topological properties of networks, we have proposed here a methodology to capture further information concerning authors’ particular styles. To do so, we have represented networks modelling texts as network automata with a dynamics based on Life-Like rules. The LLNA method searches the whole rule space for an optimal solution to one specific problem. The best rule for a single dataset may not perform as well as for a second dataset. Therefore, there is no generalization regarding the optimization procedure of finding the best Life-Like rule. This is not a limitation of the method, however this issue reflects intrinsic characteristics of each data source. Consequently, the selection of the best rules has to be performed per dataset. The results presented in this paper are supported by the rule optimization procedure which was performed for the dataset of interest aiming at solving a specific authorship attribution problem. The insertion of new authors in this dataset would require a new training procedure. Upon selecting a set of discriminative rules that serve to coordinate the automata dynamics, we have found that the variations in the binary states of nodes are more discriminative than simple network structural measurements approach. More specifically, we have outperformed the latter approach in 9.2% for the classification of 8 distinct authors. Interestingly, the best results were obtained with a partial lemmatization process, suggesting that this procedure is more adequate than just lemmatizing all words when text networks are used as the underlying model for this task.

The methodology proposed here paves the way for improving the characterization of related information systems modelled in terms of networks. This is evident if we recall that network automata approaches are specially suitable to describe networks with scale-free distributions [21] and, as a consequence, documents following Zipf’s Law. Further works could investigate the effectiveness of our approach e.g. in the analysis of the complexity of texts or in applications related to extractive summarization. Given the complementarity of the analysis provided by the network automata framework, we argue that the combination of the proposed technique with those relying on traditional superficial features [6265] could lead to optimized results, since word adjacency networks are oftentimes used as an additional tool in natural language processing problems.

Supporting information

S1 File. List of stopwords and preprocessing steps.

https://doi.org/10.1371/journal.pone.0193703.s001

(PDF)

S3 File. Illustration of LLNA rule B3/S23.

https://doi.org/10.1371/journal.pone.0193703.s003

(PDF)

S4 File. List of books, authors and networks datasets.

https://doi.org/10.1371/journal.pone.0193703.s004

(ZIP)

S5 File. Analysis and selection of parameters time t and number of bins.

a) Accuracy (%) in relation to the evolved time t. b) Accuracy (%) for different number of bins to compose the feature vector using the Lempel-Ziv complexity distributions (μL). Both experiments in a) and b) were made using rule B2478-S25 and the partial-dataset and classifier kNN with k = 1 and 5-fold cross validation.

https://doi.org/10.1371/journal.pone.0193703.s005

(PDF)

S6 File. Network measurements for the three datasets.

https://doi.org/10.1371/journal.pone.0193703.s006

(XLSX)

Acknowledgments

J.M. is grateful for the support of the Coordination for the Improvement of Higher Education Personnel (CAPES) and the National Council for Scientific and Technological Development (CNPq) grant #405503/2017-2. E.A.C.J. and D.R.A. are grateful for the support from Google (Google Research Awards in Latin America grant). G.H.B.M. is grateful for the support from CAPES and São Paulo Research Foundation (FAPESP) with grant #2015/05899-7. D.R.A. is also grateful for the financial support from FAPESP (grants #2014/20830-0, #2016/19069-9 and #2017/13464-6). O.M.B. gratefully acknowledges the financial support of CNPq (grants #307797/2014-7 and #405503/2017-2) and FAPESP (grants #2014/08026-1 and #2015/05899-7). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

References

  1. 1. Franco-Salvador M, Rosso P, Montes-y-Gómez M. A systematic study of knowledge graph analysis for cross-language plagiarism detection. Information Processing & Management. 2016;52(4):550–570.
  2. 2. Labbé C, Labbé D. Duplicate and fake publications in the scientific literature: how many SCIgen papers in computer science? Scientometrics. 2013;94(1):379–396.
  3. 3. Vacca JR. Computer Forensics: Computer Crime Scene Investigation (Networking Series) (Networking Series). Rockland, MA, USA: Charles River Media, Inc.; 2005.
  4. 4. Stamatatos E. A survey of modern authorship attribution methods. Journal of the American Society for Information Science and Technology. 2009;60(3):538–556.
  5. 5. Amancio DR. Authorship recognition via fluctuation analysis of network topology and word intermittency. Journal of Statistical Mechanics: Theory and Experiment. 2015;2015(3):P03005.
  6. 6. Brennan M, Afroz S, Greenstadt R. Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity. ACM Trans Inf Syst Secur. 2012;15(3):12:1–12:22.
  7. 7. Halteren HV. Author verification by linguistic profiling: an exploration of the parameter space. ACM Trans Speech Lang Process. 2007;4(1):1–17.
  8. 8. Brennan, MR, Greenstadt, R. Practical Attacks Against Authorship Recognition Techniques. In: IAAI; 2009.
  9. 9. Martincic-Ipsic S, Margan D, Mestrovic A. Multilayer network of language: a unified framework for structural analysis of linguistic subsystems. Physica A: Statistical Mechanics and its Applications. 2016;457:117–128.
  10. 10. Dorogovtsev SN, Mendes JFF. Language as an evolving word web. Proceedings of the Royal Society of London B: Biological Sciences. 2001;268(1485):2603–2606.
  11. 11. Amancio DR, Aluisio SM, Oliveira ON Jr, Costa LF. Complex networks analysis of language complexity. EPL (Europhysics Letters). 2012;100(5):58002.
  12. 12. Amancio DR, Altmann EG, Rybski D, Oliveira ON Jr, Costa LF. Probing the statistical properties of unknown texts: application to the Voynich manuscript. PLoS ONE. 2013;8(7):e67310. pmid:23844002
  13. 13. Liu H, Xu C. Can syntactic networks indicate morphological complexity of a language? EPL (Europhysics Letters). 2011;93(2):28005.
  14. 14. Liu H, Hu F. What role does syntax play in a language network? EPL (Europhysics Letters). 2008;83(1):18002.
  15. 15. Mehri A, Darooneh AH, Shariati A. The complex networks approach for authorship attribution of books. Physica A: Statistical Mechanics and its Applications. 2012;391(7):2429–2437.
  16. 16. Amancio DR, Altmann EG, Oliveira ON Jr, Costa LF. Comparing intermittency and network measurements of words and their dependence on authorship. New Journal of Physics. 2011;13(12):123024.
  17. 17. Wolfram S. Universality and complexity in cellular automata. Physica D: Nonlinear Phenomena. 1984;10(1):1–35.
  18. 18. Watts DJ. Small worlds: the dynamics of networks between order and randomness. Princeton university press; 1999.
  19. 19. Tomassini M, Giacobini M, Darabos C. Evolution and dynamics of small-world cellular automata. Complex Systems. 2005;15(4):261–284.
  20. 20. Marr C, Hütt MT. Cellular Automata on Graphs: Topological Properties of ER Graphs Evolved towards Low-Entropy Dynamics. Entropy. 2012;14(6):993–1010.
  21. 21. Miranda GHB, Machicao J, Bruno OM. Exploring Spatio-temporal Dynamics of Cellular Automata for Pattern Recognition in Networks. Scientific Reports. 2016;6(37329).
  22. 22. Gonçalves WN, Martinez AS, Bruno OM. Complex network classification using partially self-avoiding deterministic walks. Chaos: An Interdisciplinary Journal of Nonlinear Science. 2012;22(3):033139.
  23. 23. Gardner M. Mathematical games the fantastic combinations of John Conway’s new solitaire game “life”. vol. 223; 1970. p. 120–123.
  24. 24. Soto JMG, Wuensche A. The X-Rule: Universal Computation in a Non-Isotropic Life-Like Cellular Automaton. J Cellular Automata. 2015;10:261–294.
  25. 25. Machicao J, Marco AG, Bruno OM. Chaotic encryption method based on life-like cellular automata. Expert Systems with Applications. 2012;39(16):12626–12635.
  26. 26. Broderick G, Rúaini M, Chan E, Ellison MJ. A life-like virtual cell membrane using discrete automata. In Silico Biology. 2004;5:163–178.
  27. 27. Csuhaj-Varjú E, Kelemen J, Kelemenová A, Paun G. Eco-Grammar Systems: A Grammatical Framework for Studying Life-Like Interaction. Artificial Life. 1997;3:1–28. pmid:9090156
  28. 28. Mendenhall TC. The characteristic curves of composition. Science. 1887; p. 237–249. pmid:17736020
  29. 29. Gamon M. Linguistic correlates of style: authorship classification with deep linguistic analysis features. In: Proceedings of the 20th international conference on Computational Linguistics. Association for Computational Linguistics; 2004. p. 611.
  30. 30. Baayen H, Van Halteren H, Tweedie F. Outside the cave of shadows: Using syntactic annotation to enhance authorship attribution. Literary and Linguistic Computing. 1996;11(3):121–132.
  31. 31. Costa LdF, Oliveira ON Jr, Travieso G, Rodrigues FA, Villas Boas PR, Antiqueira L, et al. Analyzing and modeling real-world phenomena with complex networks: a survey of applications. Advances in Physics. 2011;60(3):329–412.
  32. 32. Segarra S, Eisen M, Ribeiro A. Authorship attribution through function word adjacency networks. IEEE Transactions on Signal Processing. 2015;63(20):5464–5478.
  33. 33. Amancio DR, Oliveira ON Jr, da F Costa L. Structure-semantics interplay in complex networks and its effects on the predictability of similarity in texts. Physica A. 2012;391(18):4406–4419.
  34. 34. Segarra S, Eisen M, Ribeiro A. Authorship attribution using function words adjacency networks. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing; 2013. p. 5563–5567.
  35. 35. Arun R, Suresh V, Madhavan CEV. Stopword Graphs and Authorship Attribution in Text Corpora. In: Proceedings of the 2009 IEEE International Conference on Semantic Computing. ICSC’09. Washington, DC, USA: IEEE Computer Society; 2009. p. 192–196.
  36. 36. Costa LF, Rodrigues F, Travieso G, Villas Boas P. Characterization of complex networks: A survey of measurements. Advances in Physics. 2007;56(1):167–242.
  37. 37. Costa LF, Boas PV, Silva F, Rodrigues F. A pattern recognition approach to complex networks. Journal of Statistical Mechanics: Theory and Experiment. 2010;2010(11):P11015.
  38. 38. Amancio DR, Silva FN, Costa LdF. Concentric network symmetry grasps authors’ styles in word adjacency networks. EPL (Europhysics Letters). 2015;110(6):68001.
  39. 39. Amancio DR. A complex network approach to stylometry. PloS one. 2015;10(8):e0136076. pmid:26313921
  40. 40. Mihalcea R, Radev D. Graph-based natural language processing and information retrieval. Cambridge University Press; 2011.
  41. 41. Solé RV, Corominas-Murtra B, Valverde S, Steels L. Language networks: Their structure, function, and evolution. Complexity. 2010;15(6):20–26.
  42. 42. Amancio DR, Nunes MGV, Oliveira ON Jr, da F Costa L. Using complex networks concepts to assess approaches for citations in scientific papers. Scientometrics. 2012;91(3):827–842.
  43. 43. Collins M. Discriminative training methods for hidden markov models: Theory and experiments with perceptron algorithms. In: Proceedings of the ACL-02 conference on Empirical methods in natural language processing-Volume 10. Association for Computational Linguistics; 2002. p. 1–8.
  44. 44. Toman M, Tesar R, Jezek K. Influence of word normalization on text classification. Proceedings of InSciT. 2006;4:354–358.
  45. 45. Newman MEJ. Networks: An Introduction. New York, NY, USA: Oxford University Press, Inc.; 2010.
  46. 46. Clauset A, Shalizi CR, Newman MEJ. Power-Law Distributions in Empirical Data. SIAM Rev. 2009;51(4):661–703.
  47. 47. Li T, Liu X, Wu J, Wan C, Guan ZH, Wang Y. An epidemic spreading model on adaptive scale-free networks with feedback mechanism. Physica A: Statistical Mechanics and its Applications. 2016;450:649–656. http://dx.doi.org/10.1016/j.physa.2016.01.045.
  48. 48. Williams O, Del Genio CI. Degree Correlations in Directed Scale-Free Networks. PLoS ONE. 2014;9(10):1–6.
  49. 49. Morita S. Six Susceptible-Infected-Susceptible Models on Scale-free Networks. Scientific Reports. 2016;6:22506 EP. pmid:26936025
  50. 50. Carron PM, Kenna R. Universal properties of mythological networks. EPL (Europhysics Letters). 2012;99(2):28002.
  51. 51. Costa LF, Sporns O, Antiqueira L, Nunes MGV, Oliveira ON Jr. Correlations between structure and random walk dynamics in directed complex networks. Applied Physics Letters. 2007;91(5). http://dx.doi.org/10.1063/1.2766683.
  52. 52. Newman MEJ. Assortative Mixing in Networks. Phys Rev Lett. 2002;89:208701. pmid:12443515
  53. 53. Shannon CE. A mathematical theory of communication. The Bell System Technical Journal. 1948;27(3):379–423.
  54. 54. Abraham L, Jacob Z. On the Complexity of Finite Sequences. IEEE Trans Inf Theor. 1976;22(1):75–81.
  55. 55. Koppel M, Schler J, Bonchek-Dokow E. Measuring Differentiability: Unmasking Pseudonymous Authors. J Mach Learn Res. 2007;8:1261–1276.
  56. 56. Bishop CM. Pattern Recognition and Machine Learning (Information Science and Statistics). Secaucus, NJ, USA: Springer-Verlag New York, Inc.; 2006.
  57. 57. Amancio DR, Comin CH, Casanova D, Travieso G, Bruno OM, Rodrigues FA, et al. A Systematic Comparison of Supervised Classifiers. PLoS ONE. 2014;9(4):e94137. pmid:24763312
  58. 58. Project Gutenberg (n d). Free ebooks by Project Gutenberg. (Date of access:05/04/2017);. www.gutenberg.org.
  59. 59. Ebrahimpour M, Putniņš TJ, Berryman MJ, Allison A, Ng BWH, Abbott D. Automated authorship attribution using advanced signal classification techniques. PloS ONE. 2013;8(2):e54998. pmid:23437047
  60. 60. Navigli R. Word Sense Disambiguation: A Survey. ACM Comput Surv. 2009;41(2):10:1–10:69.
  61. 61. Dorogovtsev SN, Mendes JFF. Evolution of networks. Advances in physics. 2002;51(4):1079–1187.
  62. 62. Qian T, Liu B, Chen L, Peng Z, Zhong M, He G, et al. Tri-Training for authorship attribution with limited training data: a comprehensive study. Neurocomputing. 2016;171:798–806.
  63. 63. Sapkota U, Bethard S, y Gómez MM, Solorio T. Not all character n-grams are created equal: A study in authorship attribution. In: 2015 Conference of the North American Chapter of the Association for Computational Linguistics—Human Language Technologies (NAACL HLT 2015). Denver, Colorado: ACL; 2015. p. 93–102.
  64. 64. Seroussi Y, Zukerman I, Bohnert F. Authorship Attribution with Topic Models. Comput Linguist. 2014;40(2):269–310.
  65. 65. Layton R, Watters P, Dazeley R. Recentred local profiles for authorship attribution. Natural Language Engineering. 2012;18(3):293–312.