{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:23:46Z","timestamp":1776889426250,"version":"3.51.2"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819980727","type":"print"},{"value":"9789819980734","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8073-4_9","type":"book-chapter","created":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T08:02:54Z","timestamp":1699948974000},"page":"109-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["CATS: Connection-Aware and\u00a0Interaction-Based Text Steganalysis in\u00a0Social Networks"],"prefix":"10.1007","author":[{"given":"Kaiyi","family":"Pang","sequence":"first","affiliation":[]},{"given":"Jinshuai","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Minhao","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Zhongliang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Minghu","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yongfeng","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,15]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Bak, P., Bieniasz, J., Krzeminski, M., Szczypiorski, K.: Application of perfectly undetectable network steganography method for malware hidden communication. In: 2018 4th International Conference on Frontiers of Signal Processing (ICFSP), pp. 34\u201338. IEEE (2018)","DOI":"10.1109\/ICFSP.2018.8552057"},{"key":"9_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2021.108341","volume":"190","author":"F Li","year":"2022","unstructured":"Li, F., Yu, Z., Qin, C.: GAN-based spatial image steganography with cross feedback mechanism. Signal Process. 190, 108341 (2022)","journal-title":"Signal Process."},{"issue":"2","key":"9_CR3","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/TIFS.2011.2108649","volume":"6","author":"YF Huang","year":"2011","unstructured":"Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296\u2013306 (2011). https:\/\/doi.org\/10.1109\/TIFS.2011.2108649","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR4","doi-asserted-by":"publisher","unstructured":"Kaptchuk, G., Jois, T.M., Green, M., Rubin, A.D.: Meteor: cryptographically secure steganography for realistic distributions. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS 2021, pp. 1529\u20131548. Association for Computing Machinery, New York (2021). https:\/\/doi.org\/10.1145\/3460120.3484550","DOI":"10.1145\/3460120.3484550"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1080\/0161-119291866883","volume":"16","author":"PC Wayner","year":"1992","unstructured":"Wayner, P.C.: Mimic functions. Cryptologia 16, 193\u2013214 (1992)","journal-title":"Cryptologia"},{"key":"9_CR6","doi-asserted-by":"publisher","unstructured":"Shirali-Shahreza, M.: Text steganography by changing words spelling. In: 2008 10th International Conference on Advanced Communication Technology, Gangwon, Korea (South), 2008, pp. 1912\u20131913 (2008). https:\/\/doi.org\/10.1109\/ICACT.2008.4494159","DOI":"10.1109\/ICACT.2008.4494159"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Ziegler, Z.M., Deng, Y., Rush, A.M.: Neural linguistic steganography. arXiv preprint arXiv:1909.01496 (2019)","DOI":"10.18653\/v1\/D19-1115"},{"issue":"5","key":"9_CR8","doi-asserted-by":"publisher","first-page":"2982","DOI":"10.1109\/TDSC.2021.3079957","volume":"19","author":"X Zhou","year":"2021","unstructured":"Zhou, X., Peng, W., Yang, B., Wen, J., Xue, Y., Zhong, P.: Linguistic steganography based on adaptive probability distribution. IEEE Trans. Depend. Secure Comput. 19(5), 2982\u20132997 (2021)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, S., Yang, Z., Yang, J., Huang, Y.: Provably secure generative linguistic steganography, pp. 3046\u20133055 (2021). https:\/\/aclanthology.org\/2021.findings-acl.268","DOI":"10.18653\/v1\/2021.findings-acl.268"},{"key":"9_CR10","unstructured":"de Witt, C.S., Sokota, S., Kolter, J.Z., Foerster, J., Strohmeier, M.: Perfectly secure steganography using minimum entropy coupling. arXiv preprint arXiv:2210.14889 (2022)"},{"key":"9_CR11","unstructured":"Ouyang, L., et al.: Training language models to follow instructions with human feedback. arXiv preprint arXiv:2203.02155 (2022)"},{"key":"9_CR12","unstructured":"Touvron, H., et al.: Llama: open and efficient foundation language models (2023)"},{"issue":"7","key":"9_CR13","doi-asserted-by":"publisher","first-page":"785","DOI":"10.4304\/jsw.5.7.785-792","volume":"5","author":"W Dai","year":"2010","unstructured":"Dai, W., Yu, Y., Dai, Y., Deng, B.: Text steganography system using markov chain source model and des algorithm. JSW 5(7), 785\u2013792 (2010)","journal-title":"JSW"},{"issue":"5","key":"9_CR14","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2018.2871746","volume":"14","author":"ZL Yang","year":"2018","unstructured":"Yang, Z.L., Guo, X.Q., Chen, Z.M., Huang, Y.F., Zhang, Y.J.: RNN-stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280\u20131295 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Dai, F., Cai, Z.: Towards near-imperceptible steganographic text. In: Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, pp. 4303\u20134308. Association for Computational Linguistics, Florence (2019). https:\/\/aclanthology.org\/ P19-1422 (2019)","DOI":"10.18653\/v1\/P19-1422"},{"issue":"4","key":"9_CR16","first-page":"661","volume":"19","author":"H Yang","year":"2010","unstructured":"Yang, H., Cao, X.: Linguistic steganalysis based on meta features and immune mechanism. Chin. J. Electron. 19(4), 661\u2013666 (2010)","journal-title":"Chin. J. Electron."},{"issue":"6","key":"9_CR17","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.1016\/j.compeleceng.2011.07.004","volume":"37","author":"Z Chen","year":"2011","unstructured":"Chen, Z., Huang, L., Miao, H., Yang, W., Meng, P.: Steganalysis against substitution-based linguistic steganography based on context clusters. Comput. Electr. Eng. 37(6), 1071\u20131081 (2011)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"9_CR18","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1007\/s11042-012-1313-8","volume":"71","author":"L Xiang","year":"2014","unstructured":"Xiang, L., Sun, X., Luo, G., Xia, B.: Linguistic steganalysis using the features derived from synonym frequency. Multimedia Tools Appl. 71(3), 1893\u20131911 (2014)","journal-title":"Multimedia Tools Appl."},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-16435-4_16","volume-title":"Information Hiding","author":"P Meng","year":"2010","unstructured":"Meng, P., Hang, L., Chen, Z., Hu, Y., Yang, W.: STBS: a statistical algorithm for steganalysis of translation-based steganography. In: B\u00f6hme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 208\u2013220. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16435-4_16"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Meng, P., Hang, L., Yang, W., Chen, Z., Zheng, H.: Linguistic steganography detection algorithm using statistical language model. In: 2009 International Conference on Information Technology and Computer Science, vol. 2, pp. 540\u2013543. IEEE (2009)","DOI":"10.1109\/ITCS.2009.246"},{"issue":"4","key":"9_CR21","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1109\/LSP.2019.2902095","volume":"26","author":"Z Yang","year":"2019","unstructured":"Yang, Z., Huang, Y., Zhang, Y.J.: A fast and efficient text steganalysis method. IEEE Signal Process. Lett. 26(4), 627\u2013631 (2019)","journal-title":"IEEE Signal Process. Lett."},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-030-69449-4_7","volume-title":"Digital Forensics and Watermarking","author":"J Zou","year":"2021","unstructured":"Zou, J., Yang, Z., Zhang, S., Rehman, S., Huang, Y.: High-performance linguistic steganalysis, capacity estimation and steganographic positioning. In: Zhao, X., Shi, Y.-Q., Piva, A., Kim, H.J. (eds.) IWDW 2020. LNCS, vol. 12617, pp. 80\u201393. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-69449-4_7"},{"key":"9_CR23","doi-asserted-by":"publisher","first-page":"18293","DOI":"10.1007\/s11042-020-08716-w","volume":"79","author":"Z Yang","year":"2020","unstructured":"Yang, Z., Huang, Y., Zhang, Y.J.: TS-CSW: text steganalysis and hidden capacity estimation based on convolutional sliding windows. Multimedia Tools Appl. 79, 18293\u201318316 (2020)","journal-title":"Multimedia Tools Appl."},{"issue":"12","key":"9_CR24","doi-asserted-by":"publisher","first-page":"1907","DOI":"10.1109\/LSP.2019.2953953","volume":"26","author":"Y Niu","year":"2019","unstructured":"Niu, Y., Wen, J., Zhong, P., Xue, Y.: A hybrid r-bilstm-c neural network based text steganalysis. IEEE Signal Process. Lett. 26(12), 1907\u20131911 (2019)","journal-title":"IEEE Signal Process. Lett."},{"key":"9_CR25","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/LSP.2023.3238283","volume":"30","author":"Q Xu","year":"2023","unstructured":"Xu, Q., Zhang, R., Liu, J.: Linguistic steganalysis by enhancing and integrating local and global features. IEEE Signal Process. Lett. 30, 16\u201320 (2023)","journal-title":"IEEE Signal Process. Lett."},{"issue":"1","key":"9_CR26","doi-asserted-by":"publisher","first-page":"76","DOI":"10.23919\/cje.2022.00.009","volume":"32","author":"J Wen","year":"2023","unstructured":"Wen, J., Deng, Y., Peng, W., Xue, Y.: Linguistic steganalysis via fusing multi-granularity attentional text features. Chin. J. Electron. 32(1), 76\u201384 (2023)","journal-title":"Chin. J. Electron."},{"key":"9_CR27","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1109\/LSP.2021.3062233","volume":"28","author":"H Wu","year":"2021","unstructured":"Wu, H., Yi, B., Ding, F., Feng, G., Zhang, X.: Linguistic steganalysis with graph neural networks. IEEE Signal Process. Lett. 28, 558\u2013562 (2021)","journal-title":"IEEE Signal Process. Lett."},{"key":"9_CR28","doi-asserted-by":"publisher","first-page":"1734","DOI":"10.1109\/LSP.2022.3194844","volume":"29","author":"Z Fu","year":"2022","unstructured":"Fu, Z., Yu, Q., Wang, F., Ding, C.: HGA: hierarchical feature extraction with graph and attention mechanism for linguistic steganalysis. IEEE Signal Process. Lett. 29, 1734\u20131738 (2022)","journal-title":"IEEE Signal Process. Lett."},{"key":"9_CR29","doi-asserted-by":"publisher","first-page":"1510","DOI":"10.1109\/LSP.2021.3097241","volume":"28","author":"W Peng","year":"2021","unstructured":"Peng, W., Zhang, J., Xue, Y., Yang, Z.: Real-time text steganalysis based on multi-stage transfer learning. IEEE Signal Process. Lett. 28, 1510\u20131514 (2021)","journal-title":"IEEE Signal Process. Lett."},{"key":"9_CR30","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/LSP.2021.3122901","volume":"29","author":"J Yang","year":"2021","unstructured":"Yang, J., Yang, Z., Zhang, S., Tu, H., Huang, Y.: SeSy: linguistic steganalysis framework integrating semantic and syntactic features. IEEE Signal Process. Lett. 29, 31\u201335 (2021)","journal-title":"IEEE Signal Process. Lett."},{"key":"9_CR31","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1109\/TIFS.2022.3226909","volume":"18","author":"J Yang","year":"2023","unstructured":"Yang, J., Yang, Z., Zou, J., Tu, H., Huang, Y.: Linguistic steganalysis toward social network. IEEE Trans. Inf. Forensics Secur. 18, 859\u2013871 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"9_CR32","doi-asserted-by":"publisher","first-page":"1743","DOI":"10.1109\/LSP.2019.2920452","volume":"26","author":"Z Yang","year":"2019","unstructured":"Yang, Z., Wang, K., Li, J., Huang, Y., Zhang, Y.-J.: TS-RNN: text steganalysis based on recurrent neural networks. IEEE Signal Process. Lett. 26(12), 1743\u20131747 (2019)","journal-title":"IEEE Signal Process. Lett."},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Gao, T., Yao, X., Chen, D.: Simcse: simple contrastive learning of sentence embeddings. arXiv preprint arXiv:2104.08821 (2021)","DOI":"10.18653\/v1\/2021.emnlp-main.552"},{"key":"9_CR34","unstructured":"Zhang, J., Shi, X., Xie, J., Ma, H., King, I., Yeung, D.Y.: Gaan: gated attention networks for learning on large and spatiotemporal graphs. In: 34th Conference on Uncertainty in Artificial Intelligence 2018, UAI 2018 (2018)"},{"key":"9_CR35","unstructured":"Loshchilov, I., Hutter, F.: Decoupled weight decay regularization. arXiv preprint arXiv:1711.05101 (2017)"},{"key":"9_CR36","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1109\/TIFS.2020.3023279","volume":"16","author":"ZL Yang","year":"2020","unstructured":"Yang, Z.L., Zhang, S.Y., Hu, Y.T., Hu, Z.W., Huang, Y.F.: VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Trans. Inf. Forensics Secur. 16, 880\u2013895 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8073-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T18:36:31Z","timestamp":1710354991000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8073-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"ISBN":["9789819980727","9789819980734"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8073-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"15 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Changsha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iconip2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1274","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"650","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"51% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.14","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.46","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}