{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T14:35:38Z","timestamp":1771079738272,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16552-x","type":"journal-article","created":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T03:31:22Z","timestamp":1693539082000},"page":"26599-26619","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Evaluating and mitigating gender bias in machine learning based resume filtering"],"prefix":"10.1007","volume":"83","author":[{"family":"Gagandeep","sequence":"first","affiliation":[]},{"given":"Jaskirat","family":"Kaur","sequence":"additional","affiliation":[]},{"given":"Sanket","family":"Mathur","sequence":"additional","affiliation":[]},{"given":"Sukhpreet","family":"Kaur","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]},{"given":"Simar Preet","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Sandeep","family":"Mathur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,1]]},"reference":[{"key":"16552_CR1","doi-asserted-by":"publisher","unstructured":"Lin Y, Lei H, Addo PC, Li X (2016) Machine learned resume-job matching solution. Computation and Language,  ArXiv. \nhttps:\/\/doi.org\/10.48550\/arXiv.1607.07657","DOI":"10.48550\/arXiv.1607.07657"},{"issue":"2","key":"16552_CR2","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1111\/j.1559-1816.1996.tb01841.x","volume":"26","author":"JL Howard","year":"1996","unstructured":"Howard JL, Ferris GR (1996) The employment interview context: social and situational influences on interviewer decisions 1. J Appl Soc Psychol 26(2):112\u2013136","journal-title":"J Appl Soc Psychol"},{"key":"16552_CR3","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1016\/j.procs.2015.08.163","volume":"60","author":"L Zhang","year":"2015","unstructured":"Zhang L, Fei W, Wang L (2015) Pj matching model of knowledge workers. Procedia Comput Sci 60:1128\u20131137","journal-title":"Procedia Comput Sci"},{"issue":"3","key":"16552_CR4","first-page":"219","volume":"19","author":"JA Breaugh","year":"2009","unstructured":"Breaugh JA (2009) The use of biodata for employee selection: past research and future directions. Hum Resour Manag Rev 19(3):219\u2013231","journal-title":"Hum Resour Manag Rev"},{"key":"16552_CR5","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.ijinfomgt.2018.05.003","volume":"42","author":"PK Roy","year":"2018","unstructured":"Roy PK, Singh JP, Baabdullah AM, Kizgin H, Rana NP (2018) Identifying reputation collectors in community question answering (CQA) sites: exploring the dark side of social media. Int J Inf Manag 42:25\u201335","journal-title":"Int J Inf Manag"},{"key":"16552_CR6","volume-title":"An approach to extract special skills to improve the performance of resume selection. In International workshop on databases in networked information systems (pp. 256\u2013273)","author":"S Maheshwari","year":"2010","unstructured":"Maheshwari S, Sainani A, Reddy PK (2010) An approach to extract special skills to improve the performance of resume selection. In International workshop on databases in networked information systems (pp. 256\u2013273). Springer, Berlin, Heidelberg"},{"key":"16552_CR7","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.eswa.2016.04.013","volume":"60","author":"S Guo","year":"2016","unstructured":"Guo S, Alamudun F, Hammond T (2016) R\u00e9suMatcher: A personalized r\u00e9sum\u00e9-job matching system. Expert Syst Appl 60:169\u2013182","journal-title":"Expert Syst Appl"},{"issue":"10","key":"16552_CR8","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1145\/365628.365657","volume":"8","author":"H Rubenstein","year":"1965","unstructured":"Rubenstein H, Goodenough JB (1965) Contextual correlates of synonymy. Commun ACM 8(10):627\u2013633","journal-title":"Commun ACM"},{"key":"16552_CR9","unstructured":"Mikolov T, Yih WT, Zweig G (2013) Linguistic regularities in continuous space word representations. In: Proceedings of the 2013 conference of the north american chapter of the association for computational linguistics: human language technologies, Association for Computational Linguistics, pp 746\u2013751"},{"key":"16552_CR10","doi-asserted-by":"crossref","unstructured":"Wang T, Zhao J, Yatskar M, Chang KW, Ordonez V (2019) Balanced datasets are not enough: estimating and mitigating gender bias in deep image representations. In: proceedings of the IEEE\/CVF international conference on computer vision, Computer Vision and Pattern Recognition, pp 5310\u20135319","DOI":"10.1109\/ICCV.2019.00541"},{"key":"16552_CR11","doi-asserted-by":"crossref","unstructured":"Sun T, Gaut A, Tang S, Huang Y, ElSherief M, Zhao J, Mirza D, Belding E, Chang K, Wang WY (2019) Mitigating gender bias in natural language processing: Literature review. arXiv. In: Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, Association for Computational Linguistics, pp 1630\u20131640","DOI":"10.18653\/v1\/P19-1159"},{"key":"16552_CR12","unstructured":"Bolukbasi T, Chang KW, Zou JY, Saligrama V, Kalai AT (2016) Man is to computer programmer as woman is to homemaker? Debiasing word embeddings. Neural Information Processing Systems (NIPS 2016), Barcelona, Spain,\u00a0pp 1\u20139. https:\/\/arxiv.org\/abs\/1607.06520"},{"key":"16552_CR13","doi-asserted-by":"publisher","unstructured":"Deshpande KV, Pan S, Foulds JR (2020) Mitigating demographic Bias in AI-based resume filtering. In: Adjunct publication of the 28th ACM conference on user modeling, adaptation and personalization. Adaptation and Personalization. Association for Computing Machinery, pp 268\u2013275. https:\/\/doi.org\/10.1145\/3386392.3399569","DOI":"10.1145\/3386392.3399569"},{"key":"16552_CR14","doi-asserted-by":"publisher","first-page":"29","DOI":"10.5121\/ijnlc.2019.8503","volume":"8","author":"S Zu","year":"2019","unstructured":"Zu S, Wang X (2019) Resume information extraction with a novel text block segmentation algorithm. Int J Nat Lang Comput 8:29\u201348","journal-title":"Int J Nat Lang Comput"},{"key":"16552_CR15","doi-asserted-by":"publisher","unstructured":"Yu K, Guan G, Zhou M (2005) Resume information extraction with cascaded hybrid model. In: Proceedings of the 43rd annual meeting of the Association for Computational Linguistics (ACL\u201905), pp 499\u2013506. https:\/\/doi.org\/10.3115\/1219840.1219902","DOI":"10.3115\/1219840.1219902"},{"key":"16552_CR16","unstructured":"Okazaki N (2007) Crfsuite: a fast implementation of conditional random fields (crfs)  http:\/\/www.chokkan.org\/software\/crfsuite\/"},{"issue":"17","key":"16552_CR17","first-page":"1","volume":"2016","author":"J Chen","year":"2016","unstructured":"Chen J, Gao L, Tang Z (2016) Information extraction from resume documents in pdf format. Electron Imaging 2016(17):1\u20138","journal-title":"Electron Imaging"},{"key":"16552_CR18","doi-asserted-by":"publisher","unstructured":"Chen J, Zhang C, Niu Z (2018) A two-step resume information extraction algorithm.  Math Probl Eng 2018:8. https:\/\/doi.org\/10.1155\/2018\/5761287","DOI":"10.1155\/2018\/5761287"},{"key":"16552_CR19","unstructured":"Van Rijsbergen C (1979) Information retrieval: theory and practice. In: Proceedings of the Joint IBM\/University of Newcastle upon Tyne Seminar on Data Base Systems, vol 79, pp 1\u201314"},{"key":"16552_CR20","doi-asserted-by":"publisher","first-page":"2318","DOI":"10.1016\/j.procs.2020.03.284","volume":"167","author":"PK Roy","year":"2020","unstructured":"Roy PK, Chowdhary SS, Bhatia R (2020) A machine learning approach for automation of resume recommendation system. Procedia Comput Sci 167:2318\u20132327","journal-title":"Procedia Comput Sci"},{"key":"16552_CR21","doi-asserted-by":"publisher","unstructured":"Zhang BH, Lemoine B, Mitchell M (2018) Mitigating unwanted biases with adversarial learning. In: Proceedings of the 2018 AAAI\/ACM conference on AI, ethics, and society, Machine learning, pp 335\u2013340. https:\/\/doi.org\/10.48550\/arXiv.1801.07593","DOI":"10.48550\/arXiv.1801.07593"},{"key":"16552_CR22","doi-asserted-by":"crossref","unstructured":"Zhao J, Wang T, Yatskar M, Ordonez V, Chang KW (2018) Gender bias in coreference resolution: evaluation and debiasing methods. arXiv. In: Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, vol 2, pp 15\u201320","DOI":"10.18653\/v1\/N18-2003"},{"key":"16552_CR23","volume-title":"Gender bias in neural natural language processing. In Logic, language, and security (pp. 189\u2013202)","author":"K Lu","year":"2020","unstructured":"Lu K, Mardziel P, Wu F, Amancharla P, Datta A (2020) Gender bias in neural natural language processing. In Logic, language, and security (pp. 189\u2013202). Springer, Cham"},{"key":"16552_CR24","doi-asserted-by":"publisher","unstructured":"Kiritchenko S, Mohammad SM (2018) Examining gender and race bias in two hundred sentiment analysis systems. arXiv. In: Proceedings of the 7th Joint Conference on Lexical and Computational Semantics (SEM).\nhttps:\/\/doi.org\/10.48550\/arXiv.1805.04508","DOI":"10.48550\/arXiv.1805.04508"},{"issue":"8","key":"16552_CR25","doi-asserted-by":"publisher","first-page":"1138","DOI":"10.1109\/TKDE.2006.130","volume":"18","author":"Y Li","year":"2006","unstructured":"Li Y, McLean D, Bandar ZA, O'shea JD, Crockett K (2006) Sentence similarity based on semantic nets and corpus statistics. IEEE Trans Knowl Data Eng 18(8):1138\u20131150","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"16552_CR26","doi-asserted-by":"crossref","unstructured":"Singh S, Singh H, Gehlot A, kaur J, deep G\u00a0(2023) IR and visible image fusion using DWT and bilateral filter. Microsystem Technologies 29(4):457\u2013467","DOI":"10.1007\/s00542-022-05315-7"},{"issue":"2","key":"16552_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1376815.1376819","volume":"2","author":"A Islam","year":"2008","unstructured":"Islam A, Inkpen D (2008) Semantic text similarity using corpus-based word similarity and string similarity. ACM Trans Knowl Discov Data (TKDD) 2(2):1\u201325","journal-title":"ACM Trans Knowl Discov Data (TKDD)"},{"issue":"9","key":"16552_CR28","first-page":"29","volume":"120","author":"N Pradhan","year":"2015","unstructured":"Pradhan N, Gyanchandani M, Wadhvani R (2015) A review on text similarity technique used in IR and its application. Int J Comput Appl 120(9):29\u201334","journal-title":"Int J Comput Appl"},{"key":"16552_CR29","doi-asserted-by":"publisher","unstructured":"Wang Z, Mi H, Ittycheriah A (2016) Sentence similarity learning by lexical decomposition and composition. arXiv. In: Proceedings of Coling 2016. \nhttps:\/\/doi.org\/10.48550\/arXiv.1602.07019","DOI":"10.48550\/arXiv.1602.07019"},{"key":"16552_CR30","doi-asserted-by":"publisher","unstructured":"Chicco D (2021) Siamese neural networks: An overview. Artificial Neural Networks, vol 2190, pp 73\u201394. https:\/\/doi.org\/10.1007\/978-1-0716-0826-5_3","DOI":"10.1007\/978-1-0716-0826-5_3"},{"key":"16552_CR31","unstructured":"Bennett K (2004) Linguistic steganography: survey, analysis, and robustness concerns for hiding information in text, Computer Science, Purdue University, 2004"},{"key":"16552_CR32","doi-asserted-by":"crossref","unstructured":"Narayana VL, Kumar NA (2018) Different techniques for hiding the text information using text steganography techniques: a survey. Ing\u00e9nierie des Syst\u00e8mes d'Information 23(6):115\u2013125","DOI":"10.3166\/isi.23.6.115-125"},{"issue":"3","key":"16552_CR33","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1002\/asi.23968","volume":"69","author":"E Stamatatos","year":"2018","unstructured":"Stamatatos E (2018) Masking topic-related information to enhance authorship attribution. J Assoc Inf Sci Technol 69(3):461\u2013473","journal-title":"J Assoc Inf Sci Technol"},{"key":"16552_CR34","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.ins.2015.02.024","volume":"307","author":"P Xia","year":"2015","unstructured":"Xia P, Zhang L, Li F (2015) Learning similarity with cosine similarity ensemble. Inf Sci 307:39\u201352","journal-title":"Inf Sci"},{"issue":"5","key":"16552_CR35","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1080\/08839514.2020.1723868","volume":"34","author":"K Park","year":"2020","unstructured":"Park K, Hong JS, Kim W (2020) A methodology combining cosine similarity with classifier for text classification. Appl Artif Intell 34(5):396\u2013411","journal-title":"Appl Artif Intell"},{"key":"16552_CR36","doi-asserted-by":"publisher","unstructured":"Cowgill B (2018) Bias and productivity in humans and algorithms: theory and evidence from resume screening. Columbia Business School, MI: W.E. Upjohn Institute for Employment Research. https:\/\/doi.org\/10.2139\/ssrn.343373729","DOI":"10.2139\/ssrn.343373729"},{"issue":"1","key":"16552_CR37","doi-asserted-by":"publisher","first-page":"141","DOI":"10.3906\/elk-1304-130","volume":"24","author":"D Celik","year":"2016","unstructured":"Celik D (2016) Towards a semantic-based information extraction system for matching r\u00e9sum\u00e9s to job openings. Turk J Electr Eng Comput Sci 24(1):141\u2013159","journal-title":"Turk J Electr Eng Comput Sci"},{"key":"16552_CR38","volume-title":"Getting to know your data. In Data mining (Vol. 2, pp. 39\u201382)","author":"J Han","year":"2012","unstructured":"Han J, Kamber M, Pei J (2012) Getting to know your data. In Data mining (Vol. 2, pp. 39\u201382). Morgan Kaufmann, Boston, MA"},{"key":"16552_CR39","doi-asserted-by":"publisher","unstructured":"Deep G, Kaur J, Singh SP, Nayak SR, Kumar M, Kautish S (2022) MeQryEP: A Texture Based Descriptor for Biomedical Image Retrieval. J Healthc Eng 2022:20. https:\/\/doi.org\/10.1155\/2022\/9505229","DOI":"10.1155\/2022\/9505229"},{"key":"16552_CR40","doi-asserted-by":"crossref","unstructured":"Solanki A, Kumar A, Rohan C, Singh S P, Tayal A (2019) Prediction of breast and lung Cancer, comparative review and analysis using machine learning techniques. In: Smart computing and self-adaptive systems. CRC Press,\u00a0Boca Raton, pp 251\u2013271","DOI":"10.1201\/9781003156123-13"},{"key":"16552_CR41","doi-asserted-by":"crossref","unstructured":"Kaur H, Singh S P, Bhatnagar S, Solanki A (2021) Intelligent smart home energy efficiency model using artificial intelligence and internet of things. In: Artificial intelligence to solve pervasive internet of things issues. Academic Press, pp 183\u2013210","DOI":"10.1016\/B978-0-12-818576-6.00010-1"},{"issue":"4","key":"16552_CR42","doi-asserted-by":"publisher","first-page":"285","DOI":"10.21512\/comtech.v7i4.3746","volume":"7","author":"H Christian","year":"2016","unstructured":"Christian H, Agus MP, Suhartono D (2016) Single document automatic text summarization using term frequency-inverse document frequency (TF-IDF). ComTech: Comput Math Eng Appl 7(4):285\u2013294","journal-title":"ComTech: Comput Math Eng Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16552-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16552-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16552-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T10:51:30Z","timestamp":1709203890000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16552-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,1]]},"references-count":42,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["16552"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16552-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,1]]},"assertion":[{"value":"12 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}