{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T13:21:07Z","timestamp":1768828867698,"version":"3.49.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T00:00:00Z","timestamp":1513814400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"CONACYT Mexico","award":["258345"],"award-info":[{"award-number":["258345"]}]},{"name":"CONACYT Mexico","award":["224483"],"award-info":[{"award-number":["224483"]}]},{"name":"CONACYT Mexico","award":["258588"],"award-info":[{"award-number":["258588"]}]},{"name":"CONACYT Mexico","award":["247870"],"award-info":[{"award-number":["247870"]}]},{"name":"SomEMBED","award":["TIN2015-71147-C2-1-P MINECO"],"award-info":[{"award-number":["TIN2015-71147-C2-1-P MINECO"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s10044-017-0674-z","type":"journal-article","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T02:59:51Z","timestamp":1513825191000},"page":"669-681","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Paraphrase plagiarism identification with character-level features"],"prefix":"10.1007","volume":"22","author":[{"given":"Fernando","family":"S\u00e1nchez-Vega","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1322-0358","authenticated-orcid":false,"given":"Esa\u00fa","family":"Villatoro-Tello","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Montes-y-G\u00f3mez","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Rosso","sequence":"additional","affiliation":[]},{"given":"Efstathios","family":"Stamatatos","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Villase\u00f1or-Pineda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,21]]},"reference":[{"key":"674_CR1","doi-asserted-by":"crossref","unstructured":"Barr\u00f3n-Cede\u00f1o A, Rosso P (2009) On automatic plagiarism detection based on n-grams comparison. In: Proceedings of the 31th European conference on IR research on advances in information retrieval (ECIR), LNCS vol 5478, Springer, Berlin, pp 696\u2013700","DOI":"10.1007\/978-3-642-00958-7_69"},{"issue":"4","key":"674_CR2","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1162\/COLI_a_00153","volume":"39","author":"A Barron-Cede\u00f1o","year":"2013","unstructured":"Barron-Cede\u00f1o A, Vila M, Mart\u00ed MA, Rosso P (2013) Plagiarism meets paraphrasing: insights for the next generation in automatic plagiarism detection. Comput Linguist 39(4):917\u2013947","journal-title":"Comput Linguist"},{"key":"674_CR3","unstructured":"Basile C, Benedetto D, Caglioti E, Cristadoro G, Esposti M (2009) A plagiarism detection procedure in three steps: selection, matches and \u201csquares\u201d. In: Proceedings of the SEPLN 2009 workshop on uncovering plagiarism, authorship and social software misuse (PAN 2009), CEUR-WS vol 502. Donostia-San Sebastian, Spain"},{"key":"674_CR4","unstructured":"Biggins S, Mohammed S, Oakley S (2012) University of shefield: two approaches to semantic text similarity. In: First joint conference on lexical and computational semantics (SEM at NAACL 2012), Montreal, Canada, pp 655\u2013661"},{"issue":"3","key":"674_CR5","doi-asserted-by":"publisher","first-page":"43:1","DOI":"10.1145\/2483669.2483676","volume":"4","author":"S Burrows","year":"2013","unstructured":"Burrows S, Potthast M, Stein B (2013) Paraphrase acquisition via crowdsourcing and machine learning. ACM Trans Intell Syst Technol 4(3):43:1\u201343:21. \n                    https:\/\/doi.org\/10.1145\/2483669.2483676","journal-title":"ACM Trans Intell Syst Technol"},{"issue":"3","key":"674_CR6","doi-asserted-by":"publisher","first-page":"517554","DOI":"10.13053\/cys-18-3-2044","volume":"18","author":"H Calvo","year":"2014","unstructured":"Calvo H, Segura-Olivares A, Garc\u00eda A (2014) Dependency vs. constituent based syntactic n-grams in text similarity measures for paraphrase recognition. Computaci\u00f3n y Sistemas 18(3):517554","journal-title":"Computaci\u00f3n y Sistemas"},{"issue":"3","key":"674_CR7","first-page":"34","volume":"2","author":"C Chien-Ying","year":"2010","unstructured":"Chien-Ying C, Jen-Yuan Y, Hao-Ren K (2010) Plagiarism detection using rouge and wordnet. J Comput 2(3):34\u201344","journal-title":"J Comput"},{"key":"674_CR8","unstructured":"Chong M, Specia L, Mitkov R (2010) Using natural language processing for automatic detection of plagiarism. In: Proceedings of the 4th international plagiarism conference. Newcastle-upon-Tyne, UK"},{"key":"674_CR9","unstructured":"Clough P (2003) Old a new challenges in automatic plagiarism detection. In: National plagiarism advisory service, pp 391\u2013407"},{"key":"674_CR10","doi-asserted-by":"crossref","unstructured":"Clough P, Gaizauskas R, Piao SS, Wilks Y (2002) Meter: Measuring text reuse. In: Proceedings of the 40th annual meeting of the association for computational linguistics (ACL). Philadelphia","DOI":"10.3115\/1073083.1073110"},{"key":"674_CR11","unstructured":"Courtney C, Mihalcea R (2005) Measuring the semantic similarity of texts. In: Proceedings of the ACL workshop on empirical modeling of semantic equivalence and entailment (EMSEE at NAALC 2005), pp 13\u201318"},{"key":"674_CR12","doi-asserted-by":"crossref","unstructured":"Daelemans W (2013) Explanation in computational stylometry. In: 14th International conference on intelligent text processing and computational linguistics (CIC-Ling 2013), Lecture Notes in Computer Science LNCS, vol 7817, pp 451\u2013462","DOI":"10.1007\/978-3-642-37256-8_37"},{"key":"674_CR13","doi-asserted-by":"publisher","unstructured":"Ehsan N, Shakery A (2016) Candidate document retrieval for cross-lingual plagiarism detection using two-level proximity information. Inf Process Manag. \n                    https:\/\/doi.org\/10.1016\/j.ipm.2016.04.006","DOI":"10.1016\/j.ipm.2016.04.006"},{"issue":"3","key":"674_CR14","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1093\/llc\/fqm020","volume":"22","author":"J Grieve","year":"2007","unstructured":"Grieve J (2007) Quantitative authorship attribution: an evaluation of techniques. Lit Linguist Comput 22(3):251\u2013270","journal-title":"Lit Linguist Comput"},{"key":"674_CR15","doi-asserted-by":"crossref","unstructured":"Hartrumpf S, vor Der Br\u00fcck T, Eichhorn C (2010) Semantic duplicate identification with parsing and machine learning. In: Eleventh international conference on text, speech and dialogue (TSD 2010) LNAI vol 6231, Springer, Berlin, pp 84\u201392. Brno, Czech Republic","DOI":"10.1007\/978-3-642-15760-8_12"},{"key":"674_CR16","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1002\/asi.10170","volume":"54","author":"TC Hoad","year":"2003","unstructured":"Hoad TC, Zobel J (2003) Methods for identifying versioned and plagiarised documents. J Am Soc Inform Sci Technol 54:203\u2013215","journal-title":"J Am Soc Inform Sci Technol"},{"issue":"1","key":"674_CR17","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1002\/asi.20961","volume":"60","author":"M Koppel","year":"2009","unstructured":"Koppel M, Schler J, Argamon S (2009) Computational methods in authorship attribution. J Am Soc Inf Sci Technol 60(1):9\u201326","journal-title":"J Am Soc Inf Sci Technol"},{"key":"674_CR18","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10579-009-9111-2","volume":"45","author":"M Koppel","year":"2011","unstructured":"Koppel M, Schler J, Argamon S (2011) Authorship attribution in the wild. Lang Resour Eval 45:83\u201394","journal-title":"Lang Resour Eval"},{"key":"674_CR19","unstructured":"Man PD (1983) Blindness and insight: essays in the rhetoric of contemporary criticism, 2nd ed. chap. Literature and Language: A Commentary, pp. 277\u201389. Routtloedge"},{"issue":"1\u20132","key":"674_CR20","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1023\/B:INRT.0000009441.78971.be","volume":"7","author":"P McNamee","year":"2004","unstructured":"McNamee P, Mayfield J (2004) Character n-gram tokenization for european language text retrieval. Inf Retr 7(1\u20132):73\u201397","journal-title":"Inf Retr"},{"key":"674_CR21","unstructured":"Oberreuter G, L\u2019Huillier G, R\u00edos SA, Vel\u00e1squez JD (2011) Approaches for intrinsic and external plagiarism detection. In: Notebook for PAN at CLEF\u201911"},{"key":"674_CR22","unstructured":"Palkovskii Y, Belov A, Muzyka I (2011) Using wordnet-based semantic similarity measurement in external plagiarism detection. In: Notebook for PAN at CLEF\u201911"},{"key":"674_CR23","unstructured":"Potthast M, Hagen M, Gollub T, Tippmann M, Kiesel J, Rosso P, Stamatatos E, Stein B (2013) Overview of the 5th international competition on plagiarism detection. In: CLEF 2013 evaluation labs and workshop working notes papers"},{"key":"674_CR24","unstructured":"Ravi NR, Gupta D (2015) Efficient paragraph based chunking and download filtering for plagiarism source retrieval. In: Notebook for PAN at CLEF 2015 evaluation labs and workshop working notes papers, PAN \u201915. \n                    http:\/\/www.uni-weimar.de\/medien\/webis\/events\/pan-15\/pan15-papers-final\/pan15-plagiarism-detection\/ravi15-notebook.pdf"},{"key":"674_CR25","doi-asserted-by":"crossref","unstructured":"Sapkota U, Bethard S, Montes-y G\u00f3mez M, Solorio T (2015) Not all character n-grams are created equal: a study in authorship attribution. In: Conference of the North American chapter of the association for computational linguistics human language technologies (NAACL-HLT 2015), pp 93\u2013102","DOI":"10.3115\/v1\/N15-1010"},{"key":"674_CR26","unstructured":"Sapkota U, Solorio T, Montes M, Bethard S, Rosso P (2014) Cross-topic authorship attribution: will out-of-topic data help? In: Proceedings of COLING 2014, the 25th international conference on computational linguistics: technical papers, pp 1228\u20131237. Dublin City University and Association for Computational Linguistics. \n                    http:\/\/aclweb.org\/anthology\/C14-1116"},{"key":"674_CR27","doi-asserted-by":"publisher","unstructured":"Schleimer S, Wilkerson DS, Aiken A (2003) Winnowing: local algorithms for document fingerprinting. In: Proceedings of the 2003 ACM SIGMOD international conference on management of data, SIGMOD \u201903, pp 76\u201385. ACM, New York. \n                    https:\/\/doi.org\/10.1145\/872757.872770","DOI":"10.1145\/872757.872770"},{"key":"674_CR28","doi-asserted-by":"publisher","unstructured":"Sediyono A, Mahamud K (2008) Algorithm of the longest commonly consecutive word for plagiarism detection in text based document. In: Digital information management, ICDIM \u201908, pp 253\u2013259. IEEE. \n                    https:\/\/doi.org\/10.1109\/ICDIM.2008.4746827","DOI":"10.1109\/ICDIM.2008.4746827"},{"key":"674_CR29","unstructured":"Shivakumar N, Garcia-Molina H (1995) Scam: a copy detection mechanism for digital documents. In: Proceedings of the second annual conference on the theory and practice of digital libraries"},{"key":"674_CR30","doi-asserted-by":"publisher","unstructured":"Si A, Leong HV, Lau RWH (1997) Check: a document plagiarism detection system. In: Proceedings of ACM symposium for applied computing, SAC \u201997, pp. 70\u201377. ACM, New York. \n                    https:\/\/doi.org\/10.1145\/331697.335176","DOI":"10.1145\/331697.335176"},{"issue":"5","key":"674_CR31","doi-asserted-by":"publisher","first-page":"1804","DOI":"10.1016\/j.eswa.2012.09.021","volume":"40","author":"F S\u00e1nchez-Vega","year":"2013","unstructured":"S\u00e1nchez-Vega F, Villatoro-Tello E, Montes-y G\u00f3mez M, Villase\u00f1or-Pineda L, Rosso P (2013) Determining and characterizing the reused text for plagiarism detection. Expert Syst Appl 40(5):1804\u20131813","journal-title":"Expert Syst Appl"},{"issue":"12","key":"674_CR32","doi-asserted-by":"publisher","first-page":"2512","DOI":"10.1002\/asi.21630","volume":"62","author":"E Stamatatos","year":"2011","unstructured":"Stamatatos E (2011) Plagiarism detection using stopword n-grams. J Am Soc Inf Sci Technol 62(12):2512\u20132527","journal-title":"J Am Soc Inf Sci Technol"},{"issue":"2","key":"674_CR33","first-page":"421","volume":"21","author":"E Stamatatos","year":"2013","unstructured":"Stamatatos E (2013) On the robustness of authorship attribution based on character n-gram features. J Law Policy 21(2):421\u2013439","journal-title":"J Law Policy"},{"key":"674_CR34","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/1988852.1988860","volume":"45","author":"B Stein","year":"2011","unstructured":"Stein B, Potthast M, Rosso P, Barr\u00f3n-Cede\u00f1o A, Stamatatos E, Koppel M (2011) Fourth international workshop on uncovering plagiarism, authorship, and social software misuse. SIGIR Forum 45:45\u201348","journal-title":"SIGIR Forum"},{"key":"674_CR35","doi-asserted-by":"crossref","unstructured":"Uzuner \u00d6zlem, Katz B, Nahnsen T (2005) Using syntactic information to identify plagiarism. In: Proceedings of 2nd workshop on building educational applications using NLP. Ann Arbor","DOI":"10.3115\/1609829.1609836"},{"key":"674_CR36","unstructured":"Xu W, Ritter A, Dolan WB, Grishman R, Cherry C (2012) Paraphrasing for style. In: Proceedings of COLING 2012: Technical Papers, pp 2899\u20132914. Mumbai"},{"key":"674_CR37","unstructured":"Zechner M, Muhr M, Kern R, Granitzer M (2009) External and intrinsic plagiarism detection using vector space models. In: SEPLN 2009, workshop on uncovering plagiarism, authorship, and social software misuse (PAN 09), pp 45\u201355"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-017-0674-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10044-017-0674-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-017-0674-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T08:58:18Z","timestamp":1557478698000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10044-017-0674-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,21]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["674"],"URL":"https:\/\/doi.org\/10.1007\/s10044-017-0674-z","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,21]]},"assertion":[{"value":"10 March 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}