{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T05:38:20Z","timestamp":1775453900047,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T00:00:00Z","timestamp":1573084800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T00:00:00Z","timestamp":1573084800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s00521-019-04594-y","type":"journal-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T09:04:32Z","timestamp":1573117472000},"page":"10593-10607","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Scalable and language-independent embedding-based approach for plagiarism detection considering obfuscation type: no training phase"],"prefix":"10.1007","volume":"32","author":[{"given":"Erfaneh","family":"Gharavi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2372-7969","authenticated-orcid":false,"given":"Hadi","family":"Veisi","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Rosso","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,7]]},"reference":[{"issue":"6","key":"4594_CR1","doi-asserted-by":"publisher","first-page":"922","DOI":"10.1016\/j.ipm.2018.06.005","volume":"54","author":"B Agarwal","year":"2018","unstructured":"Agarwal B, Ramampiaro H, Langseth H, Ruocco M (2018) A deep network model for paraphrase detection in short text messages. Inf Process Manag 54(6):922\u2013937","journal-title":"Inf Process Manag"},{"key":"4594_CR2","first-page":"1","volume":"2","author":"M Al-Suhaiqi","year":"2018","unstructured":"Al-Suhaiqi M, Hazaa MAS, Albared M (2018) Arabic English cross-lingual plagiarism detection based on keyphrases extraction, monolingual and machine learning approach. Asian J Res Comput Sci 2:1\u201312","journal-title":"Asian J Res Comput Sci"},{"key":"4594_CR3","unstructured":"Alvi F, Stevenson M, Clough PD (2014) Hashing and merging heuristics for text reuse detection. CLEF (working notes), pp 939\u2013946"},{"key":"4594_CR4","unstructured":"Asghari H, Mohtaj S, Fatemi O, Faili H, Rosso P, Potthast M (2016) Algorithms and corpora for Persian plagiarism detection. In: CEUR workshop proceedings, 1737, pp 135\u2013144"},{"key":"4594_CR5","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1162\/153244303322533223","volume":"3","author":"Y Bengio","year":"2003","unstructured":"Bengio Y, Ducharme R, Vincent P, Janvin C (2003) A neural probabilistic language model. J Mach Learn Res 3:1137\u20131155. \nhttps:\/\/doi.org\/10.1162\/153244303322533223","journal-title":"J Mach Learn Res"},{"key":"4594_CR6","unstructured":"Bojanowski P, Grave E, Joulin A, Mikolov T (2016) Enriching word vectors with subword information. ArXiv preprint \narXiv:1607.04606"},{"key":"4594_CR7","unstructured":"Chong M, Specia L, Mitkov R (2010) Using natural language processing for automatic detection of plagiarism. Language. Retrieved from \nhttp:\/\/clg.wlv.ac.uk\/papers\/show_paper.php?ID=272"},{"key":"4594_CR8","unstructured":"Clough P (2003) Old and new challenges in automatic plagiarism detection. National Plagiarism Advisory Service (February), 14. Retrieved from \nhttp:\/\/scholar.google.com\/scholar?hl=en&btnG=Search&q=intitle:Old+and+new+challenges+in+automatic+plagiarism+detection#0"},{"key":"4594_CR9","first-page":"2493","volume":"12","author":"R Collobert","year":"2011","unstructured":"Collobert R, Weston J, Bottou L, Karlen M, Kavukcuoglu K, Kuksa P (2011) Natural language processing (almost) from scratch. J Mach Learn Res 12:2493\u20132537","journal-title":"J Mach Learn Res"},{"key":"4594_CR10","doi-asserted-by":"publisher","DOI":"10.1177\/0165551518787696","author":"N Ehsan","year":"2018","unstructured":"Ehsan N, Shakery A, Tompa FW (2018) Cross-lingual text alignment for fine-grained plagiarism detection. J Inf Sci. \nhttps:\/\/doi.org\/10.1177\/0165551518787696","journal-title":"J Inf Sci"},{"key":"4594_CR11","unstructured":"Esteki F, Esfahani FS (2016) A plagiarism detection approach based on SVM for Persian texts. In: CEUR workshop proceedings, 1737, pp 149\u2013153"},{"key":"4594_CR12","doi-asserted-by":"publisher","unstructured":"Ferrero J, Besacier L, Schwab D, Agn\u00e8s F (2017) Using word embedding for cross-language plagiarism detection. In: Proceedings of the 15th conference of the European chapter of the association for computational linguistics: volume 2, short papers. \nhttps:\/\/doi.org\/10.18653\/v1\/E17-2066","DOI":"10.18653\/v1\/E17-2066"},{"key":"4594_CR13","unstructured":"Firth JR (1957) A synopsis of linguistic theory, 1930\u20131955. Studies in linguistic analysis"},{"key":"4594_CR14","doi-asserted-by":"publisher","unstructured":"Gharavi E, Veisi H, Bijari K, Zahirnia K (2018) A fast multi-level plagiarism detection method based on document embedding representation. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics). \nhttps:\/\/doi.org\/10.1007\/978-3-319-73606-8_7","DOI":"10.1007\/978-3-319-73606-8_7"},{"key":"4594_CR15","unstructured":"Gharavi E, Bijari K, Veisi H, Zahirnia K (2016) A deep learning approach to Persian plagiarism detection. Retrieved from \nhttps:\/\/pdfs.semanticscholar.org\/b0a8\/7335289264368a7ee804acc7715fc4799310.pdf"},{"key":"4594_CR16","unstructured":"Glinos DG (2014) A hybrid architecture for plagiarism detection. CLEF (working notes), pp 958\u2013965"},{"key":"4594_CR17","unstructured":"Gross P, Modaresi P (2014) Plagiarism alignment detection by merging context seeds. CLEF (working notes), pp 966\u2013972"},{"key":"4594_CR18","doi-asserted-by":"publisher","unstructured":"Hinton G (1986) Learning distributed representations of concepts. In: CSS, pp 1\u201312. \nhttps:\/\/doi.org\/10.1109\/69.917563","DOI":"10.1109\/69.917563"},{"key":"4594_CR19","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1002\/asi.10170","volume":"54","author":"TC Hoad","year":"2003","unstructured":"Hoad TC, Zobel J (2003) Methods for identifying versioned and plagiarized documents. J Am Soc Inf Sci Technol 54:203\u2013215. \nhttps:\/\/doi.org\/10.1002\/asi.10170","journal-title":"J Am Soc Inf Sci Technol"},{"key":"4594_CR20","doi-asserted-by":"publisher","unstructured":"Kalchbrenner N, Grefenstette E, Blunsom P (2014) A convolutional neural network for modelling sentences. In: ACL, pp 655\u2013665. \nhttps:\/\/doi.org\/10.3115\/v1\/P14-1062","DOI":"10.3115\/v1\/P14-1062"},{"key":"4594_CR21","doi-asserted-by":"publisher","unstructured":"Le QV, Mikolov T (2014) Distributed representations of sentences and documents, vol 32. \nhttps:\/\/doi.org\/10.1145\/2740908.2742760","DOI":"10.1145\/2740908.2742760"},{"key":"4594_CR22","unstructured":"Leilei K, Haoliang Q, Cuixia D, Mingxing W, Zhongyuan H (2013) Approaches for source retrieval and text alignment of plagiarism detection: notebook for PAN at CLEF 2013. In: CEUR workshop proceedings, 1179"},{"key":"4594_CR23","unstructured":"Leilei K, Haoliang Q, Shuai W, Cuixia D (2012) Approaches for candidate document retrieval and detailed comparison of plagiarism detection. Notebook for PAN at CLEF 2012. Retrieved from \nhttp:\/\/www.uni-weimar.de\/medien\/webis\/research\/events\/pan-12\/pan12-papers-final\/pan12-plagiarism-detection\/kong12-notebook.pdf"},{"key":"4594_CR24","unstructured":"Livermore MA, Dadgostari F, Guim M, Beling P, Rockmore D (2018) Law search as prediction. Virginia Public Law and Legal Theory Research Paper (2018-61)"},{"key":"4594_CR25","unstructured":"Mashhadirajab F, Shamsfard M (2016) A text alignment algorithm based on prediction of obfuscation types using SVM neural network. FIRE (working notes), pp 167\u2013171"},{"key":"4594_CR26","doi-asserted-by":"publisher","unstructured":"Mikolov T, Corrado G, Chen K, Dean J (2013) Efficient estimation of word representations in vector space. In: Proceedings of the international conference on learning representations (ICLR 2013), pp 1\u201312. \nhttps:\/\/doi.org\/10.1162\/153244303322533223","DOI":"10.1162\/153244303322533223"},{"key":"4594_CR27","unstructured":"Mikolov T, Yih W, Zweig G (2013) Linguistic regularities in continuous space word representations. In: Proceedings of NAACL-HLT (June), pp 746\u2013751. Retrieved from \nhttp:\/\/scholar.google.com\/scholar?hl=en&btnG=Search&q=intitle:Linguistic+Regularities+in+Continuous+Space+Word+Representations#0%5Cnhttps:\/\/www.aclweb.org\/anthology\/N\/N13\/N13-1090.pdf"},{"key":"4594_CR28","unstructured":"Minaei B, Niknam M (2016) An n-gram based method for nearly copy detection in plagiarism systems. FIRE (working notes), pp 172\u2013175"},{"issue":"8","key":"4594_CR29","doi-asserted-by":"publisher","first-page":"1388","DOI":"10.1111\/j.1551-6709.2010.01106.x","volume":"34","author":"J Mitchell","year":"2010","unstructured":"Mitchell J, Lapata M (2010) Composition in distributional models of semantics. Cognit Sci 34(8):1388\u20131429. \nhttps:\/\/doi.org\/10.1111\/j.1551-6709.2010.01106.x","journal-title":"Cognit Sci"},{"key":"4594_CR30","unstructured":"Momtaz M, Bijari K, Salehi M, Veisi H (2016) Graph-based approach to text alignment for plagiarism detection in persian documents. FIRE (working notes), pp 176\u2013179"},{"key":"4594_CR31","unstructured":"Palkovskii Y, Belov A (2013) Using hybrid similarity methods for plagiarism detection. Notebook for PAN at CLEF 2013"},{"key":"4594_CR32","unstructured":"Palkovskii Y, Belov A (2014) Developing high-resolution universal multi-type N-gram plagiarism detector. Working notes papers of the CLEF 2014 evaluation labs, pp 984\u2013989"},{"key":"4594_CR33","doi-asserted-by":"publisher","unstructured":"Pennington J, Socher R, Manning CD (2014) GloVe: global vectors for word representation. In: Proceedings of the 2014 conference on empirical methods in natural language processing, pp 1532\u20131543. \nhttps:\/\/doi.org\/10.3115\/v1\/D14-1162","DOI":"10.3115\/v1\/D14-1162"},{"key":"4594_CR34","unstructured":"Potthast M, Stein B, Eiselt A, Barr\u00f3n-Cede\u00f1o A, Rosso P (2009) Overview of the 1st international competition on plagiarism detection. In: SEPLN 09 workshop on uncovering plagiarism, authorship, and social software misuse, pp 1\u20139. Retrieved from \nhttp:\/\/ceur-ws.org\/Vol-502"},{"key":"4594_CR35","unstructured":"Potthast M, Hagen M, Beyer A, Busse M, Tippmann M, Rosso P, Stein B (2014) Overview of the 6th international competition on plagiarism detection. Notebook for PAN at CLEF 2014, pp 845\u2013876"},{"key":"4594_CR36","unstructured":"Potthast M, Hagen M, Gollub T, Tippmann M, Kiesel J, Rosso P, Stamatatos E, Stein B (2013) Overview of the 5th international competition on plagiarism detection. In: CEUR workshop proceedings, 1179"},{"key":"4594_CR37","unstructured":"Potthast M, Stein B, Barr\u00f3n-cede\u00f1o A, Rosso P (2010) An evaluation framework for plagiarism detection. In: Proceedings of the 23rd international conference on computational linguistics (COLING 2010) (August), pp 997\u20131005. Retrieved from \nhttp:\/\/dl.acm.org\/citation.cfm?id=1944566.1944681"},{"issue":"4","key":"4594_CR38","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1007\/s00521-014-1792-9","volume":"26","author":"C Qimin","year":"2015","unstructured":"Qimin C, Qiao G, Yongliang W, Xianghua W (2015) Text clustering using VSM with feature clusters. Neural Comput Appl 26(4):995\u20131003","journal-title":"Neural Comput Appl"},{"key":"4594_CR39","unstructured":"Rodr\u00edguez Torrej\u00f3n D, Mart\u00edn Ramos J (2014) CoReMo 2.3 plagiarism detector text alignment module: notebook for PAN at CLEF 2014. In: CEUR workshop proceedings, 1180, pp 997\u20131003"},{"key":"4594_CR40","unstructured":"Sanchez-Perez MA, Sidorov G, Gelbukh A (2014) The winning approach to text alignment for text reuse detection at PAN 2014: notebook for PAN at CLEF 2014. In: CEUR workshop proceedings, 1180, pp 1004\u20131011"},{"issue":"2","key":"4594_CR41","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1007\/s10044-017-0674-z","volume":"22","author":"F S\u00e1nchez-Vega","year":"2019","unstructured":"S\u00e1nchez-Vega F, Villatoro-Tello E, Montes-y-G\u00f3mez M, Rosso P, Stamatatos E, Villase\u00f1or-Pineda L (2019) Paraphrase plagiarism identification with character-level features. Pattern Anal Appl 22(2):669\u2013681","journal-title":"Pattern Anal Appl"},{"key":"4594_CR42","unstructured":"Shrestha P, Maharjan S, Solorio T (2014) Machine translation evaluation metric for text alignment. CLEF (working notes), pp 1012\u20131016"},{"key":"4594_CR43","unstructured":"Shrestha P, Solorio T (2013) Using a variety of n-grams for the detection of different kinds of plagiarism. Notebook for PAN at CLEF"},{"key":"4594_CR44","unstructured":"Socher R (2014) Recursive deep learning for natural language processing and computer vision. Ph.D. thesis (August). \nhttps:\/\/papers.nips.cc\/paper\/4204-dynamic-pooling-and-unfolding-recursive-autoencoders-for-paraphrase-detection.pdf"},{"key":"4594_CR45","unstructured":"Socher R, Huang E, Pennington J (2011) Dynamic pooling and unfolding recursive autoencoders for paraphrase detection. In: Advances in neural information processing systems, pp 801\u2013809. Retrieved from http:\/\/machinelearning.wustl.edu\/mlpapers\/paper_files\/NIPS2011_0538.pdf%5Cnhttps:\/\/papers.nips.cc\/paper\/4204-dynamic-pooling-and-unfolding-recursive-autoencoders-for-paraphrase-detection.pdf"},{"key":"4594_CR46","doi-asserted-by":"publisher","unstructured":"Socher R, Manning CDC, Ng AYA (2010) Learning continuous phrase representations and syntactic parsing with recursive neural networks. In: Proceedings of the NIPS-2010 deep learning and unsupervised feature learning workshop, pp 1\u20139. \nhttps:\/\/doi.org\/10.1007\/978-3-540-87479-9","DOI":"10.1007\/978-3-540-87479-9"},{"key":"4594_CR47","doi-asserted-by":"publisher","unstructured":"Socher R, Manning C, Huval B, Ng A (2012) Semantic compositionality through recursive matrix-vector spaces. In: EMNLP-CoNLL\u201912: Proceedings of the 2012 joint conference on empirical methods in natural language processing and computational natural language learning, pp 1201\u20131211. \nhttps:\/\/doi.org\/10.1162\/153244303322533223","DOI":"10.1162\/153244303322533223"},{"key":"4594_CR48","unstructured":"Suchomel \u0160, Kasprzak J, Brandejs M et al (2013) Diverse queries and feature type selection for plagiarism discovery. Notebook for PAN at CLEF 2013"},{"key":"4594_CR49","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0023","author":"KS Tai","year":"2015","unstructured":"Tai KS, Socher R, Manning CD (2015) Improved semantic representations from tree-structured long short-term memory networks. Proc ACL. \nhttps:\/\/doi.org\/10.1515\/popets-2015-0023","journal-title":"Proc ACL"},{"key":"4594_CR50","unstructured":"Talebpour A, Shirzadi M, Aminolroaya Z (2016) Plagiarism detection based on a novel trie-based approach. In: CEUR workshop proceedings, 1737, pp 180\u2013183"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-019-04594-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-019-04594-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-019-04594-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T00:51:18Z","timestamp":1604623878000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-019-04594-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,7]]},"references-count":50,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["4594"],"URL":"https:\/\/doi.org\/10.1007\/s00521-019-04594-y","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,7]]},"assertion":[{"value":"30 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}