{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:24:39Z","timestamp":1766298279597,"version":"3.37.3"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"4-5","license":[{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST-106-2321-B-037-003","MOST-107-2221-E-110-065"],"award-info":[{"award-number":["MOST-106-2321-B-037-003","MOST-107-2221-E-110-065"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST-107-2622-E-110-008-CC3","MOST-107-EPA-F-012-001"],"award-info":[{"award-number":["MOST-107-2622-E-110-008-CC3","MOST-107-EPA-F-012-001"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Retrieval J"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s10791-021-09394-4","type":"journal-article","created":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T17:04:56Z","timestamp":1626282296000},"page":"298-321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Using word semantic concepts for plagiarism detection in text documents"],"prefix":"10.1007","volume":"24","author":[{"given":"Chia-Yang","family":"Chang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8004-4625","authenticated-orcid":false,"given":"Shie-Jue","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Chih-Hung","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chih-Feng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ching-Kuan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,14]]},"reference":[{"key":"9394_CR1","doi-asserted-by":"publisher","first-page":"8936","DOI":"10.1016\/j.eswa.2015.07.048","volume":"42","author":"A Abdi","year":"2015","unstructured":"Abdi, A., Idris, N., Alguliyev, R. M., & Aliguliyev, R. M. (2015). PDLK: Plagiarism detection using linguistic knowledge. Expert Systems with Applications, 42, 8936\u20138946.","journal-title":"Expert Systems with Applications"},{"key":"9394_CR2","volume-title":"Using sentence embedding for cross-language In lecture notes in computer science plagiarism detection","author":"N Alotaibi","year":"2020","unstructured":"Alotaibi, N., & Joy, M. (2020). Using sentence embedding for cross-language In lecture notes in computer science plagiarism detection. Berlin: Springer."},{"issue":"5","key":"9394_CR3","doi-asserted-by":"publisher","first-page":"2983","DOI":"10.3233\/JIFS-169483","volume":"34","author":"MA Alvarez-Carmona","year":"2018","unstructured":"Alvarez-Carmona, M. A., Franco-Salvador, M., Montes-y G\u00f3mez, M., Rosso, P., Villasenor-Pineda, L., & Villatoro-Tello, E. (2018). Semantically-informed distance and similarity measures for paraphrase plagiarism identification. Journal of Intelligent & Fuzzy Systems, 34(5), 2983\u20132990.","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"9394_CR4","unstructured":"Alzahrani, S., & Salim, N. (2010). Fuzzy semantic-based string similarity for extrinsic plagiarism detection. In Lab Report for PAN at CLEF 2010 - Conference and Labs of the Evaluation Forum CLEF (pp. 22\u201323)."},{"issue":"2","key":"9394_CR5","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TSMCC.2011.2134847","volume":"42","author":"SM Alzahrani","year":"2012","unstructured":"Alzahrani, S. M., Salim, N., & Abraham, A. (2012). Understanding plagiarism linguistic patterns, textual features, and detection methods. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42(2), 133\u2013149.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"},{"key":"9394_CR6","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1016\/j.procs.2017.06.038","volume":"111","author":"K Baba","year":"2017","unstructured":"Baba, K., Nakatoh, T., & Minami, T. (2017). Plagiarism detection using document similarity based on distributed representation. Procedia Computer Science, 111, 382\u2013387.","journal-title":"Procedia Computer Science"},{"key":"9394_CR7","volume-title":"Modern information retrieval: The concepts and technology behind search","author":"R Baeza-Yates","year":"2011","unstructured":"Baeza-Yates, R., & Ribeiro-Neto, B. (2011). Modern information retrieval: The concepts and technology behind search (2nd ed.). New York: ACM press.","edition":"2"},{"key":"9394_CR8","doi-asserted-by":"crossref","unstructured":"Barr\u00f3n-Cede\u00f1o, A., Rosso, P. & Bened\u00ed, J.-M. (2009). Reducing the plagiarism detection search space on the basis of the Kullback-Leibler distance. In Proceedings of International conference on intelligent text processing and computational linguistics (pp. 523\u2013534). Springer.","DOI":"10.1007\/978-3-642-00382-0_42"},{"issue":"3","key":"9394_CR9","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1145\/3166.3197","volume":"28","author":"DC Blair","year":"1985","unstructured":"Blair, D. C., & Maron, M. E. (1985). An evaluation of retrieval effectiveness for a full-text document-retrieval system. Communications of the ACM, 28(3), 289\u2013299.","journal-title":"Communications of the ACM"},{"key":"9394_CR10","doi-asserted-by":"crossref","unstructured":"Bojanowski, P., Grave, E., Joulin, A. & Mikolov, T. (2017). Enriching word vectors with subword information. arXiv:1607.04606v2 [cs.CL].","DOI":"10.1162\/tacl_a_00051"},{"issue":"2","key":"9394_CR11","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1145\/568271.223855","volume":"24","author":"S Brin","year":"1995","unstructured":"Brin, S., Davis, J., & Garcia-Molina, H. (1995). Copy detection mechanisms for digital documents. ACM SIGMOD Record, 24(2), 398\u2013409.","journal-title":"ACM SIGMOD Record"},{"key":"9394_CR12","doi-asserted-by":"crossref","unstructured":"Campbell, D., Chen, W. & Smith, R. (2000). Copy detection systems for digital documents. In Proceedings IEEE Advances in Digital Libraries 2000 (pp. 78\u201388). IEEE.","DOI":"10.1109\/ADL.2000.848372"},{"key":"9394_CR13","doi-asserted-by":"crossref","unstructured":"Ceglarek, D. (2013). Evaluation of the SHAPD2 algorithm efficiency in plagiarism detection tasks. In 2013 The International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE) (pp. 465\u2013470).","DOI":"10.1109\/TAEECE.2013.6557319"},{"issue":"4","key":"9394_CR14","first-page":"18","volume":"8","author":"AM Chacko","year":"2018","unstructured":"Chacko, A. M. (2018). A comprehensive review on question answering systems. IOSR Journal of Engineering, 8(4), 18\u201321.","journal-title":"IOSR Journal of Engineering"},{"issue":"9","key":"9394_CR15","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1109\/TNN.2009.2023394","volume":"20","author":"TWS Chow","year":"2009","unstructured":"Chow, T. W. S., & Rahman, M. K. M. (2009). Multilayer SOM with tree-structured data for efficient document retrieval and plagiarism detection. IEEE Transactions on Neural Networks, 20(9), 1385\u20131402.","journal-title":"IEEE Transactions on Neural Networks"},{"key":"9394_CR16","volume-title":"Plagiarism in natural and programming languages: an overview of current tools and technologies Department of Computer Science, University of Sheffield","author":"P Clough","year":"2000","unstructured":"Clough, P. (2000). Plagiarism in natural and programming languages: an overview of current tools and technologies Department of Computer Science, University of Sheffield. Sheffield: Tech. rep."},{"issue":"10","key":"9394_CR17","first-page":"1403","volume":"11","author":"G Deepa","year":"2016","unstructured":"Deepa, G., Vani, K., & Leema, L. M. (2016). Plagiarism detection in text documents using sentence bounded stop word n-grams. Journal of Engineering Science and Technology, 11(10), 1403\u20131420.","journal-title":"Journal of Engineering Science and Technology"},{"key":"9394_CR18","unstructured":"Deerwester, S. (1988). Improving information retrieval with latent semantic indexing. In Proceedings of the 51st Annual Meeting of the American Society for Information Science (vol.\u00a025, pp. 36\u201340)."},{"key":"9394_CR19","unstructured":"Devlin, J., Chang, M.-W., Lee, K. & Toutanova, K. (2018). BERT: Pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805v2 [cs.CL]."},{"issue":"1\/2","key":"9394_CR20","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1023\/A:1007612920971","volume":"42","author":"IS Dhillon","year":"2012","unstructured":"Dhillon, I. S., & Modha, D. S. (2012). Concept decompositions for large sparse text data using clustering. Machine Learning, 42(1\/2), 143\u2013175.","journal-title":"Machine Learning"},{"key":"9394_CR21","volume-title":"A fast multi-level plagiarism detection method based In lecture notes in computer science on document embedding representation","author":"G Erfaneh","year":"2018","unstructured":"Erfaneh, G., Veisi, H., Bijari, K., & Zahirnia, K. (2018). A fast multi-level plagiarism detection method based In lecture notes in computer science on document embedding representation. Berlin: Springer."},{"issue":"1","key":"9394_CR22","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.disopt.2010.09.006","volume":"8","author":"MR Fellows","year":"2011","unstructured":"Fellows, M. R., Guo, J., Komusiewicz, C., Niedermeier, R., & Uhlmann, J. (2011). Graph-based data clustering with overlaps. Discrete Optimization, 8(1), 2\u201317.","journal-title":"Discrete Optimization"},{"issue":"4","key":"9394_CR23","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1016\/j.ipm.2015.12.004","volume":"52","author":"M Franco-Salvador","year":"2016","unstructured":"Franco-Salvador, M., Rosso, P., & Montes-y G\u00f3mez, M. (2016). A systematic study of knowledge graph analysis for cross-language plagiarism detection. Information Processing & Management, 52(4), 550\u2013570.","journal-title":"Information Processing & Management"},{"key":"9394_CR24","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.ins.2016.05.003","volume":"363","author":"M Gagolewski","year":"2016","unstructured":"Gagolewski, M., Bartoszuk, M., & Cena, A. (2016). Genie: A new, fast, and outlier-resistant hierarchical clustering algorithm. Information Sciences, 363, 8\u201323.","journal-title":"Information Sciences"},{"key":"9394_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-06394-8","volume-title":"Citation-based plagiarism detection","author":"B Gipp","year":"2014","unstructured":"Gipp, B. (2014). Citation-based plagiarism detection. New York: Springer Vieweg Research."},{"key":"9394_CR26","unstructured":"Gonzalez-Agirre, A. (2017). Computational models for semantic textual similarity. Ph.D. thesis, Department of Computer Languages and Systems, University of the Basque Country."},{"key":"9394_CR27","unstructured":"Google, cited Jan. 2020. word2vec. https:\/\/code.google.com\/archive\/p\/word2vec\/."},{"issue":"151","key":"9394_CR28","first-page":"1","volume":"11","author":"A-R Hedar","year":"2018","unstructured":"Hedar, A.-R., Ibrahim, A.-M.M., Abdel-Hakim, A. E., & SewisyDhillon, A. A. (2018). K-means cloning: Adaptive spherical k-means clustering. Algorithms, 11(151), 1\u201321.","journal-title":"Algorithms"},{"key":"9394_CR29","doi-asserted-by":"crossref","unstructured":"Henzinger, M. (2006). Finding near-duplicate web pages: a large-scale evaluation of algorithms. In Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval (pp. 284\u2013291). ACM.","DOI":"10.1145\/1148170.1148222"},{"issue":"2","key":"9394_CR30","doi-asserted-by":"publisher","first-page":"31","DOI":"10.4156\/ijmia.vol2.issue2.4","volume":"2","author":"A Jadalla","year":"2012","unstructured":"Jadalla, A., & Elnagar, A. (2012). Iqtebas 1.0: A fingerprinting-based plagiarism detection system for arabic text-based documents. International Journal on Data Mining and Intelligent Information Technology Applications, 2(2), 31\u201343.","journal-title":"International Journal on Data Mining and Intelligent Information Technology Applications"},{"key":"9394_CR31","volume-title":"Principal Component Analysis","author":"IT Jolliffe","year":"2002","unstructured":"Jolliffe, I. T. (2002). Principal Component Analysis. New York: Springer-Verlag."},{"issue":"3","key":"9394_CR32","first-page":"555","volume":"14","author":"NJ Kadhim","year":"2019","unstructured":"Kadhim, N. J., & Mohammed, M. T. (2019). VSM based models and integration of exact and fuzzy similarity for improving detection of external textual plagiarism. Journal of Mechanics of Continua and Mathematical Sciences, 14(3), 555\u2013578.","journal-title":"Journal of Mechanics of Continua and Mathematical Sciences"},{"key":"9394_CR33","unstructured":"Kasprzak, J. & Brandejs, M. (2010). Improving the reliability of the plagiarism detection system. In Lab Report for PAN at CLEF 2010 - Conference and Labs of the Evaluation Forum CLEF."},{"key":"9394_CR34","unstructured":"Kuznetsov, M., Motrenko, A., Kuznetsova, R. & Strijov, V. (2016). Methods for intrinsic plagiarism detection and authordiarization. In Working Notes for PAN at CLEF 2016 - Conference and Labs of the Evaluation Forum (pp. 912\u2013919)."},{"issue":"9","key":"9394_CR35","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.13189\/ujer.2017.050922","volume":"5","author":"CH Leung","year":"2017","unstructured":"Leung, C. H., & Cheng, S. C. L. (2017). An instructional approach to practical solutions for plagiarism. Universal Journal of Educational Research, 5(9), 1646\u20131652.","journal-title":"Universal Journal of Educational Research"},{"issue":"2","key":"9394_CR36","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TIT.1982.1056489","volume":"28","author":"SP Lloyd","year":"1982","unstructured":"Lloyd, S. P. (1982). Least square quantization in PCM. IEEE Transactions on Information Theory, 28(2), 129\u2013137.","journal-title":"IEEE Transactions on Information Theory"},{"key":"9394_CR37","doi-asserted-by":"crossref","unstructured":"Luo, S., Zhang, C., Zhang, W. & Cao, X. (2018). Consistent and specific multi-view subspace clustering. In Proceedings of 32nd AAAI Conference on Artificial Intelligence (pp. 3730\u20133737).","DOI":"10.1609\/aaai.v32i1.11617"},{"key":"9394_CR38","volume-title":"A text semantic similarity approach for arabic paraphrase detection In Lecture Notes in Computer Science","author":"A Mahmoud","year":"2017","unstructured":"Mahmoud, A., Zrigui, A., & Zrigui, M. (2017). A text semantic similarity approach for arabic paraphrase detection In Lecture Notes in Computer Science. Berlin: Springer."},{"issue":"4","key":"9394_CR39","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1162\/COLI_a_00153","volume":"39","author":"MA Marti","year":"2013","unstructured":"Marti, M. A., Barr\u00f3n-Cede\u00f1o, A., Vila, M., & Rosso, P. (2013). Plagiarism meets paraphrasing: Insights for the next generation in automatic plagiarism detection. Computational Linguistics, 39(4), 917\u2013947.","journal-title":"Computational Linguistics"},{"key":"9394_CR40","doi-asserted-by":"crossref","unstructured":"Meuschke, N., Schubotz, M., Hamborg, F., Skopal, T. & Gipp, B. (2017). Analyzing mathematical content to detect academic plagiarism. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management (pp. 2211\u20132214). ACM.","DOI":"10.1145\/3132847.3133144"},{"key":"9394_CR41","doi-asserted-by":"crossref","unstructured":"Meyer\u00a0zu Eissen, S. & Stein, B. (2006). Intrinsic plagiarism detection. In Proceedings of 28th European Conference on IR Research (pp. 565\u2013569).","DOI":"10.1007\/11735106_66"},{"key":"9394_CR42","unstructured":"Mikolov, T., Chen, K., Corrado, G. & Dean, J. (2013a). Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781."},{"key":"9394_CR43","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G.\u00a0S., & Dean, J. (2013b). Distributed representations of words and phrases and their compositionality. arXiv preprint arXiv:1310.4546v1 [cs.CL]."},{"key":"9394_CR44","doi-asserted-by":"crossref","unstructured":"Monostori, K., Zaslavsky, A. & Schmidt, H. (2000). Document overlap detection system for distributed digital libraries. In Proceedings of the fifth ACM conference on Digital Libraries (pp. 226\u2013227).","DOI":"10.1145\/336597.336667"},{"key":"9394_CR45","unstructured":"Muhr, M., Zechner, M., Kern, R., & Granitzer, M. (2009). External and intrinsic plagiarism detection using vector space models. CEUR Workshop Proceedings., 502, 47\u201355."},{"issue":"4","key":"9394_CR46","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/TCBB.2016.2542803","volume":"14","author":"RMA Naawab","year":"2016","unstructured":"Naawab, R. M. A., Stevenson, M., & Clough, P. (2016). An ir-based approach utilizing query expansion for plagiarism detection in MEDLINE. IEEE Transactions on Computational Biology and Bioinformatics, 14(4), 796\u2013804.","journal-title":"IEEE Transactions on Computational Biology and Bioinformatics"},{"key":"9394_CR47","unstructured":"P4PIN, cited Jan. 2020. Paraphrasing. http:\/\/ccc.inaoep.mx\/~mmontesg\/resources\/corpusP4PIN.zip."},{"key":"9394_CR48","unstructured":"PAN, cited Jan. 2020. Plagiarism detection. https:\/\/pan.webis.de."},{"key":"9394_CR49","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R. & Manning, C. (Oct. 2014). GloVe: Global vectors for word representation. In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP) (pp. 1532\u20131543). Association for Computational Linguistics, Doha, Qatar. https:\/\/www.aclweb.org\/anthology\/D14-1162.","DOI":"10.3115\/v1\/D14-1162"},{"key":"9394_CR50","unstructured":"Potthast, M., Barr\u00f3n-Cede\u00f1o, A., Eiselt, A., Stein, B. & Rosso, P. (2010a). Overview of the 2nd international competition on plagiarism detection. In Notebook Papers of CLEF 2010 LABs and Workshops."},{"key":"9394_CR51","unstructured":"Potthast, M., Stein, B., Eiselt, A., Barr\u00f3n-Cede\u00f1o, A., & Rosso, P. (2009). Overview of the 1st international competition on plagiarism detection. CEUR Workshop Proceedings., 502, 1\u20139."},{"key":"9394_CR52","unstructured":"Potthast, M., Stein, B., no, A. B.-C. & Rosso, P. (2010b). An evaluation framework for plagiarism detection. In Proceedings of 23rd International Conference on Computational Linguistics (pp. 997\u20131005)."},{"key":"9394_CR53","first-page":"343","volume":"95","author":"R Pratap","year":"2018","unstructured":"Pratap, R., Deshmukh, A., Nair, P., & Dutt, T. (2018). A faster sampling algorithm for spherical k-means. Proceedings of Machine Learning Research - Asian Conference on Machine Learning., 95, 343\u2013358.","journal-title":"Proceedings of Machine Learning Research - Asian Conference on Machine Learning."},{"issue":"4","key":"9394_CR54","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1561\/1500000019","volume":"3","author":"S Robertson","year":"2009","unstructured":"Robertson, S., & Zaragoza, H. (2009). The probabilistic relevance framework: BM25 and beyond. Foundations and Trends in Information Retrieval, 3(4), 333\u2013389.","journal-title":"Foundations and Trends in Information Retrieval"},{"key":"9394_CR55","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1007\/s10044-017-0674-z","volume":"22","author":"F S\u00e1nchez-Vega","year":"2017","unstructured":"S\u00e1nchez-Vega, F., Villatoro-Tello, E., y G\u00f3mez, M. M., Rosso, P., Stamatatos, E., & Pineda, L. V. (2017). Paraphrase plagiarism identification with character-level features. Pattern Analysis and Applications, 22, 669\u2013681.","journal-title":"Pattern Analysis and Applications"},{"key":"9394_CR56","doi-asserted-by":"crossref","unstructured":"Sarmiento, A., Fond\u00f3n, I., Dur\u00e1n-D\u00edaz, I., & Cruces, S. (2019). Centroid-based clustering with $$\\alpha \\beta $$-divergences. Entropy, 21(196).","DOI":"10.3390\/e21020196"},{"key":"9394_CR57","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.jbi.2017.03.001","volume":"68","author":"M Sarrouti","year":"2017","unstructured":"Sarrouti, M., & Alaoui, S. O. E. (2017). A passage retrieval method based on probabilistic information retrieval model and UMLS concepts in biomedical question answering. Journal of Biomedical Informatics, 68, 96\u2013103.","journal-title":"Journal of Biomedical Informatics"},{"issue":"6","key":"9394_CR58","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1080\/03075079.2015.1085007","volume":"42","author":"S Sattler","year":"2017","unstructured":"Sattler, S., Wiegel, C., & Veen, Fv. (2017). The use frequency of 10 different methods for preventing and detecting academic dishonesty and the factors influencing their use. Studies in Higher Education, 42(6), 1126\u20131144.","journal-title":"Studies in Higher Education"},{"issue":"3","key":"9394_CR59","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1109\/TLT.2017.2720171","volume":"11","author":"J Schneider","year":"2018","unstructured":"Schneider, J., Bernstein, A., vom Brocke, J., Damevski, K., & Shepherd, D. (2018). Detecting plagiarism based on the creation process. IEEE Transactions on Learning Technologies, 11(3), 348\u2013361.","journal-title":"IEEE Transactions on Learning Technologies"},{"key":"9394_CR60","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09996-y","author":"H Shahmohammadi","year":"2020","unstructured":"Shahmohammadi, H., Dezfoulian, M., & Mansoorizadeh, M. (2020). Paraphrase detection using LSTM networks and handcrafted features. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-020-09996-y.","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"9394_CR61","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1016\/j.eswa.2013.08.015","volume":"41","author":"G Sidorov","year":"2014","unstructured":"Sidorov, G., Velasquez, F., Stamatatos, E., Gelbukh, A., & Chanona-Hern\u00e1ndez, L. (2014). Syntactic n-grams as machine learning features for natural language processing. Expert Systems with Applications, 41(3), 853\u2013860.","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"9394_CR62","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1145\/1328964.1328976","volume":"41","author":"B Stein","year":"2007","unstructured":"Stein, B., Koppel, M., & Stamatatos, E. (2007a). Plagiarism analysis, authorship identification, and near-duplicate detection pan\u201907. ACM SIGIR Forum, 41(2), 68\u201371.","journal-title":"ACM SIGIR Forum"},{"issue":"1","key":"9394_CR63","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10579-010-9115-y","volume":"45","author":"B Stein","year":"2011","unstructured":"Stein, B., Lipka, N., & Prettenhofer, P. (2011). Intrinsic plagiarism analysis. Language Resources and Evaluation, 45(1), 63\u201382.","journal-title":"Language Resources and Evaluation"},{"key":"9394_CR64","doi-asserted-by":"crossref","unstructured":"Stein, B., Meyer\u00a0zu Eissen, S. & Potthast, M. (2007b). Strategies for retrieving plagiarized documents. In Proceedings of 30th Annual International ACM SIGIR Conference (pp. 825\u2013826). ACM.","DOI":"10.1145\/1277741.1277928"},{"key":"9394_CR65","doi-asserted-by":"crossref","unstructured":"Vysotska, V., Burov, Y., Lytvyn, V. & Demchuk, A. (2018). Defining author\u2019s style for plagiarism detection in academic environment. In 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP) (pp. 128\u2013133). IEEE.","DOI":"10.1109\/DSMP.2018.8478574"},{"issue":"12","key":"9394_CR66","first-page":"2703","volume":"5","author":"A Waheeb","year":"2016","unstructured":"Waheeb, A., & Babu, A. P. (2016). Answer extraction and passage retrieval for questionanswering systems. International Journal of Advanced Research in Computer Engineering & Technology, 5(12), 2703\u20132706.","journal-title":"International Journal of Advanced Research in Computer Engineering & Technology"},{"issue":"218","key":"9394_CR67","first-page":"1","volume":"8","author":"T Wang","year":"2019","unstructured":"Wang, T., Ren, C., Luo, Y., & Tian, J. (2019). NS-DBSCAN: A density-based clustering algorithm in network space. International Journal of Geo-Information, 8(218), 1\u201320.","journal-title":"International Journal of Geo-Information"},{"issue":"1\u20133","key":"9394_CR68","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/0169-7439(87)80084-9","volume":"2","author":"S Wold","year":"1987","unstructured":"Wold, S., Esbensen, K., & Geladi, P. (1987). Principal component analysis. Chemometrics and Intelligent Laboratory Systems, 2(1\u20133), 37\u201352.","journal-title":"Chemometrics and Intelligent Laboratory Systems"},{"issue":"2","key":"9394_CR69","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/j.patcog.2010.08.023","volume":"44","author":"H Zhang","year":"2011","unstructured":"Zhang, H., & Chow, T. W. (2011). A coarse-to-fine framework to efficiently thwart plagiarism. Pattern Recognition, 44(2), 471\u2013487.","journal-title":"Pattern Recognition"}],"container-title":["Information Retrieval Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-021-09394-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-021-09394-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-021-09394-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T14:08:34Z","timestamp":1704204514000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-021-09394-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,14]]},"references-count":69,"journal-issue":{"issue":"4-5","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["9394"],"URL":"https:\/\/doi.org\/10.1007\/s10791-021-09394-4","relation":{},"ISSN":["1386-4564","1573-7659"],"issn-type":[{"type":"print","value":"1386-4564"},{"type":"electronic","value":"1573-7659"}],"subject":[],"published":{"date-parts":[[2021,7,14]]},"assertion":[{"value":"7 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}