Plagiarism detection has evolved significantly in recent years, partly in response to the media attention attracted by high-profile plagiarism cases involving journalists and politicians. A culture of control has been establishing itself to guarantee integrity and honesty in all areas related to copyright and authorship, including implementation of policies, codes of conduct, tariffs of penalties, and matching detection software. The latter has dramatically improved alongside the technological developments over the years. Currently instances of linguistic plagiarism can easily be matched to the original, while pointing out differences between the plagiarised and the plagiarising texts. These methods work particularly well with same language texts; however, systematically detecting translingual plagiarism - i.e. where a derivative text copies from a source in another language without attribution - remains a problem area. This is especially so because the possibilities of combining language pairs are immense, thus requiring an enormous data processing power. This session presents illustrative cases of translingual plagiarism and discusses some of the approaches adopted by forensic linguists to investigate and prove that a certain translated text is an instance of plagiarism. The keynote concludes by encouraging a discussion of computational approaches that can be adopted to assist forensic linguists in their own investigation.
Given a document, who wrote it?
This task focuses on author clustering and author diarization (also known as intrinsic plagiarism detection). Both tasks are concerned with measuring author similarity across and within texts.
Given a document, what're its author's traits?
This task is concerned with predicting an author's demographics from her writing. For example, an author's style may reveal her age and gender.
Given a document, hide its author.
This task works against identification and profiling by automatically paraphrasing a text to obfuscate its author's style. The tasks offered are author masking and obfuscation evaluation.
Important Dates Hawaii time zone
|March 1, 2016 (optional)||Early bird software submission|
|April 29, 2016 (extended)||Final software submission|
|May 13, 2016||TIRA evaluation deadline|
|May 25, 2016||Notebook paper submission|
|June 17, 2016||Peer review notification|
|July 1, 2016||Camery-ready notbook submission|
|July 24, 2016 (tentative)||Early bird conference registration|
|September 5-8, 2016||Conference|
Support PAN by making a donation.
Organizing PAN entails a significant investment of time and money on our part. If you wish to support us, please consider making a donation.