{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T02:49:28Z","timestamp":1764557368692,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319455068"},{"type":"electronic","value":"9783319455075"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45507-5_2","type":"book-chapter","created":{"date-parts":[[2016,8,22]],"date-time":"2016-08-22T11:11:04Z","timestamp":1471864264000},"page":"19-28","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Your Paper has been Accepted, Rejected, or Whatever: Automatic Generation of Scientific Paper Reviews"],"prefix":"10.1007","author":[{"given":"Alberto","family":"Bartoli","sequence":"first","affiliation":[]},{"given":"Andrea","family":"De Lorenzo","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Medvet","sequence":"additional","affiliation":[]},{"given":"Fabiano","family":"Tarlao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,23]]},"reference":[{"issue":"5","key":"2_CR1","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1080\/01972243.2014.944731","volume":"30","author":"A Bartoli","year":"2014","unstructured":"Bartoli, A., Medvet, E.: Bibliometric evaluation of researchers in the internet age. Inf. Soc. 30(5), 349\u2013354 (2014)","journal-title":"Inf. Soc."},{"issue":"7599","key":"2_CR2","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1038\/532306a","volume":"532","author":"A Csiszar","year":"2016","unstructured":"Csiszar, A.: Peer review: troubled from the start. Nature 532(7599), 306\u2013308 (2016)","journal-title":"Nature"},{"key":"2_CR3","unstructured":"HEFC: Identification and dissemination of lessons learned by institutions participating in the research excellence framework (ref) bibliometrics pilot. Technical report, Higher Education Funding Council for England (2009)"},{"key":"2_CR4","unstructured":"Beall, J.: List of predatory publishers (2016). \n                      https:\/\/scholarlyoa.com\/2016\/01\/05\/bealls-list-of-predatory-publishers-2016\n                      \n                    . Accessed 29 April 2016"},{"issue":"10","key":"2_CR5","doi-asserted-by":"crossref","first-page":"176","DOI":"10.5688\/ajpe7810176","volume":"78","author":"John D. Bowman","year":"2014","unstructured":"Bowman, J.D.: Predatory publishing, questionable peer review, and fraudulent conferences. Am. J. Pharm. Educ. 78(10), 6 pages (2014). \n                      http:\/\/www.ajpe.org\/doi\/abs\/10.5688\/ajpe7810176","journal-title":"American Journal of Pharmaceutical Education"},{"issue":"4","key":"2_CR6","first-page":"621","volume":"5","author":"M Dadkhah","year":"2015","unstructured":"Dadkhah, M., Alharbi, A.M., Al-Khresheh, M.H., Sutikno, T., Maliszewski, T., Jazi, M.D., Shamshirband, S.: Affiliation oriented journals: don\u2019t worry about peer review if you have good affiliation. Int. J. Electr. Comput. Eng. 5(4), 621 (2015)","journal-title":"Int. J. Electr. Comput. Eng."},{"issue":"7442","key":"2_CR7","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1038\/495433a","volume":"495","author":"D Butler","year":"2013","unstructured":"Butler, D., et al.: The dark side of publishing. Nature 495(7442), 433\u2013435 (2013)","journal-title":"Nature"},{"key":"2_CR8","unstructured":"Eldredge, N.: Mathgen paper accepted! Technical report, That\u2019s Mathematics (2012)"},{"key":"2_CR9","unstructured":"Oremus, W.: This is what happens when no one proofreads an academic paper (2016). \n                      http:\/\/www.slate.com\/blogs\/future_tense\/2014\/11\/11\/_crappy_gabor_paper_overly_honest_citation_slips_into_peer_reviewed_journal.html"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1038\/463142a","volume":"463","author":"J Qiu","year":"2010","unstructured":"Qiu, J., Schrope, M., Jones, N., Borrell, B., Tollefson, J., Kaplan, M., Lovett, R.A., Dalton, R., Merali, Z.: News publish or Perish in China. Nature 463, 142\u2013143 (2010)","journal-title":"Nature"},{"key":"2_CR11","unstructured":"Reller, T.: Faking peer reviews. Technical report, Elsevier Connect (2012)"},{"key":"2_CR12","unstructured":"Fischman, J.: Fake peer reviews, the latest form of scientific fraud, fool journals. Technical report, The Chronicle of Higher Education (2012)"},{"issue":"7528","key":"2_CR13","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1038\/515480a","volume":"515","author":"C Ferguson","year":"2014","unstructured":"Ferguson, C., Marcus, A., Oransky, I.: Publishing: the peer-review scam. Nature 515(7528), 480\u2013482 (2014)","journal-title":"Nature"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Callaway, E.: Faked peer reviews prompt 64 retractions. Nature, August 2015. \n                      http:\/\/www.nature.com\/news\/faked-peer-reviews-prompt-64-retractions-1.18202","DOI":"10.1038\/nature.2015.18202"},{"key":"2_CR15","unstructured":"Noorden, R.V.: Publishers withdraw more than 120 gibberish papers. Nature 24, February 2014. \n                      http:\/\/www.nature.com\/news\/publishers-withdraw-more-than-120-gibberish-papers-1.14763"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Wen, T.H., Gasic, M., Mrk\u0161i\u0107, N., Su, P.H., Vandyke, D., Young, S.: Semantically conditioned LSTM-based natural language generation for spoken dialogue systems, pp. 1711\u20131721, September 2015","DOI":"10.18653\/v1\/D15-1199"},{"key":"2_CR17","unstructured":"Sutskever, I., Vinyals, O., Le, Q.V.: Sequence to sequence learning with neural networks. In: Advances in Neural Information Processing Systems, pp. 3104\u20133112 (2014)"},{"issue":"11","key":"2_CR18","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/2820421","volume":"58","author":"A Wright","year":"2015","unstructured":"Wright, A.: Algorithmic authors. Commun. ACM 58(11), 12\u201314 (2015)","journal-title":"Commun. ACM"},{"issue":"1","key":"2_CR19","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/s11192-012-0781-y","volume":"94","author":"C Labb\u00e9","year":"2013","unstructured":"Labb\u00e9, C., Labb\u00e9, D.: Duplicate and fake publications in the scientific literature: how many scigen papers in computer science? Scientometrics 94(1), 379\u2013396 (2013)","journal-title":"Scientometrics"},{"issue":"3","key":"2_CR20","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/S0885-2308(02)00012-8","volume":"16","author":"AH Oh","year":"2002","unstructured":"Oh, A.H., Rudnicky, A.I.: Stochastic natural language generation for spoken dialog systems. Comput. Speech Lang. 16(3), 387\u2013407 (2002)","journal-title":"Comput. Speech Lang."},{"issue":"4","key":"2_CR21","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1017\/S1351324907004664","volume":"14","author":"A Belz","year":"2008","unstructured":"Belz, A.: Automatic generation of weather forecast texts using comprehensive probabilistic generation-space models. Nat. Lang. Eng. 14(4), 431\u2013455 (2008)","journal-title":"Nat. Lang. Eng."},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science(LNAI)","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-642-15573-4_6","volume-title":"Empirical Methods in Natural Language Generation","author":"V Rieser","year":"2010","unstructured":"Rieser, V., Lemon, O.: Natural language generation as planning under uncertainty for spoken dialogue systems. In: Krahmer, E., Theune, M. (eds.) Empirical Methods in NLG. LNCS(LNAI), vol. 5790, pp. 105\u2013120. Springer, Heidelberg (2010)"},{"key":"2_CR23","series-title":"NATO ASI Series","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-94-009-3645-4_26","volume-title":"Natural Language Generation","author":"K Kukich","year":"1987","unstructured":"Kukich, K.: Where do phrases come from: Some preliminary experiments in connectionist phrase generation. In: Kempen, G. (ed.) Natural Language Generation. NATO ASI Series, vol. 135, pp. 405\u2013421. Springer, Netherlands (1987)"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Mikolov, T., Karafi\u00e1t, M., Burget, L., Cernock\u1ef3, J., Khudanpur, S.: Recurrent neural network based language model. In: INTERSPEECH, vol. 2, p. 3 (2010)","DOI":"10.1109\/ICASSP.2011.5947611"},{"issue":"8","key":"2_CR25","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"2_CR26","unstructured":"Graves, A.: Generating sequences with recurrent neural networks (2013). arXiv preprint: \n                      arXiv:1308.0850"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Potash, P., Romanov, A., Rumshisky, A.: Ghostwriter: using an LSTM for automatic RAP lyric generation, pp. 1919\u20131924 (2015)","DOI":"10.18653\/v1\/D15-1221"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, X., Lapata, M.: Chinese poetry generation with recurrent neural networks. In: EMNLP, pp. 670\u2013680 (2014)","DOI":"10.3115\/v1\/D14-1074"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Karpathy, A., Fei-Fei, L.: Deep visual-semantic alignments for generating image descriptions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3128\u20133137 (2015)","DOI":"10.1109\/CVPR.2015.7298932"},{"key":"2_CR30","unstructured":"Mao, J., Xu, W., Yang, Y., Wang, J., Huang, Z., Yuille, A.: Deep captioning with multimodal recurrent neural networks (m-RNN) (2014). arXiv preprint: \n                      arXiv:1412.6632"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Vinyals, O., Toshev, A., Bengio, S., Erhan, D.: Show and tell: a neural image caption generator. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3156\u20133164 (2015)","DOI":"10.1109\/CVPR.2015.7298935"},{"key":"2_CR32","unstructured":"Venugopalan, S., Xu, H., Donahue, J., Rohrbach, M., Mooney, R., Saenko, K.: Translating videos to natural language using deep recurrent neural networks (2014). arXiv preprint: \n                      arXiv:1412.4729"},{"key":"2_CR33","unstructured":"Chatfield, K., Simonyan, K., Vedaldi, A., Zisserman, A.: Return of the devil in the details: Delving deep into convolutional nets (2014). arXiv preprint: \n                      arXiv:1405.3531"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Finkel, J.R., Grenager, T., Manning, C.: Incorporating non-local information into information extraction systems by gibbs sampling. In: Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics, pp. 363\u2013370. Association for Computational Linguistics (2005)","DOI":"10.3115\/1219840.1219885"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Toutanova, K., Klein, D., Manning, C.D., Singer, Y.: Feature-rich part-of-speech tagging with a cyclic dependency network. In: Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology, vol. 1, pp. 173\u2013180. Association for Computational Linguistics (2003)","DOI":"10.3115\/1073445.1073478"},{"key":"2_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-642-41278-3_24","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2013","author":"V Narayanan","year":"2013","unstructured":"Narayanan, V., Arora, I., Bhatia, A.: Fast and accurate sentiment classification using an enhanced Naive Bayes model. In: Yin, H., Tang, K., Gao, Y., Klawonn, F., Lee, M., Weise, T., Li, B., Yao, X. (eds.) IDEAL 2013. LNCS, vol. 8206, pp. 194\u2013201. Springer, Heidelberg (2013)"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Manning, C., Klein, D.: Optimization, maxent models, and conditional estimation without magic. In: Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology: Tutorials, vol. 5, p. 8. Association for Computational Linguistics (2003)","DOI":"10.3115\/1075168.1075176"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability, and Security in Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45507-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,22]],"date-time":"2020-08-22T00:17:00Z","timestamp":1598055420000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45507-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319455068","9783319455075"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45507-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"23 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CD-ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salzburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ieeeares2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}