{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:34:52Z","timestamp":1772120092133,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the National Key Research and Development Program of China","award":["2022YFC3302300"],"award-info":[{"award-number":["2022YFC3302300"]}]},{"name":"the National Key Research and Development Program of China","award":["2022YFC3302300"],"award-info":[{"award-number":["2022YFC3302300"]}]},{"name":"the National Key Research and Development Program of China","award":["2022YFC3302300"],"award-info":[{"award-number":["2022YFC3302300"]}]},{"name":"the National Key Research and Development Program of China","award":["2022YFC3302300"],"award-info":[{"award-number":["2022YFC3302300"]}]},{"name":"the National Key Research and Development Program of China","award":["2022YFC3302300"],"award-info":[{"award-number":["2022YFC3302300"]}]},{"name":"the National Key Research and Development Program of China","award":["2022YFC3302300"],"award-info":[{"award-number":["2022YFC3302300"]}]},{"name":"the Advanced Research Project","award":["7090201050307"],"award-info":[{"award-number":["7090201050307"]}]},{"name":"the Advanced Research Project","award":["7090201050307"],"award-info":[{"award-number":["7090201050307"]}]},{"name":"the Advanced Research Project","award":["7090201050307"],"award-info":[{"award-number":["7090201050307"]}]},{"name":"the Advanced Research Project","award":["7090201050307"],"award-info":[{"award-number":["7090201050307"]}]},{"name":"the Advanced Research Project","award":["7090201050307"],"award-info":[{"award-number":["7090201050307"]}]},{"name":"the Advanced Research Project","award":["7090201050307"],"award-info":[{"award-number":["7090201050307"]}]},{"name":"the National 242 Information Security Program","award":["2023A105"],"award-info":[{"award-number":["2023A105"]}]},{"name":"the National 242 Information Security Program","award":["2023A105"],"award-info":[{"award-number":["2023A105"]}]},{"name":"the National 242 Information Security Program","award":["2023A105"],"award-info":[{"award-number":["2023A105"]}]},{"name":"the National 242 Information Security Program","award":["2023A105"],"award-info":[{"award-number":["2023A105"]}]},{"name":"the National 242 Information Security Program","award":["2023A105"],"award-info":[{"award-number":["2023A105"]}]},{"name":"the National 242 Information Security Program","award":["2023A105"],"award-info":[{"award-number":["2023A105"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s13042-025-02616-x","type":"journal-article","created":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T09:31:11Z","timestamp":1747992671000},"page":"6095-6110","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["SILTD: Structural Information for LLM-Generated Text Detection"],"prefix":"10.1007","volume":"16","author":[{"given":"Jing","family":"Yang","sequence":"first","affiliation":[]},{"given":"Shi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kangli","family":"Zi","sequence":"additional","affiliation":[]},{"given":"Yanshun","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yuwei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Tianyu","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,23]]},"reference":[{"key":"2616_CR1","unstructured":"Achiam J, Adler S, Agarwal S et\u00a0al (2023) Gpt-4 technical report. arXiv preprint arXiv:2303.08774"},{"key":"2616_CR2","doi-asserted-by":"crossref","unstructured":"Adelani DI, Mai H, Fang F et\u00a0al (2020) Generating sentiment-preserving fake online reviews using neural language models and their human-and machine-based detection. In: Advanced information networking and applications: Proceedings of the 34th international conference on advanced information networking and applications (AINA-2020), Springer, pp. 1341\u20131354","DOI":"10.1007\/978-3-030-44041-1_114"},{"key":"2616_CR3","unstructured":"Badaskar S, Agarwal S, Arora S (2008) Identifying real or fake articles: towards better language modeling. In: Proceedings of the Third International Joint Conference on Natural Language Processing: Volume-II"},{"key":"2616_CR4","doi-asserted-by":"crossref","unstructured":"Baki S, Verma R, Mukherjee A, et\u00a0al (2017) Scaling and effectiveness of email masquerade attacks: Exploiting natural language generation. In: Proceedings of the 2017 ACM on Asia conference on computer and communications security, pp. 469\u2013482","DOI":"10.1145\/3052973.3053037"},{"key":"2616_CR5","unstructured":"Bengio Y, Ducharme R, Vincent P (2000) A neural probabilistic language model. Adv Neural Inform Process Syst 13"},{"key":"2616_CR6","doi-asserted-by":"crossref","unstructured":"Bhattacharjee A, Kumarage T, Moraffah R, et\u00a0al. (2023) Conda: Contrastive domain adaptation for ai-generated text detection. arXiv preprint arXiv:2309.03992","DOI":"10.18653\/v1\/2023.ijcnlp-main.40"},{"issue":"4","key":"2616_CR7","first-page":"467","volume":"18","author":"PF Brown","year":"1992","unstructured":"Brown PF, Della Pietra VJ, Desouza PV et al (1992) Class-based n-gram models of natural language. Comput linguist 18(4):467\u2013480","journal-title":"Comput linguist"},{"key":"2616_CR8","first-page":"1877","volume":"33","author":"T Brown","year":"2020","unstructured":"Brown T, Mann B, Ryder N et al (2020) Language models are few-shot learners. Adv Neural Inform Process Syst 33:1877\u20131901","journal-title":"Adv Neural Inform Process Syst"},{"key":"2616_CR9","doi-asserted-by":"crossref","unstructured":"Cao Y, Peng H, Yu Z, et\u00a0al. (2024) Hierarchical and incremental structural entropy minimization for unsupervised social event detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 8255\u20138264","DOI":"10.1609\/aaai.v38i8.28666"},{"key":"2616_CR10","unstructured":"Chakraborty S, Bedi AS, Zhu S, et\u00a0al. (2023) On the possibilities of ai-generated text detection. arXiv preprint arXiv:2304.04736"},{"key":"2616_CR11","doi-asserted-by":"publisher","first-page":"17","DOI":"10.3354\/esep00195","volume":"21","author":"N Dehouche","year":"2021","unstructured":"Dehouche N (2021) Plagiarism in the age of massive generative pre-trained transformers (gpt-3). Ethics Sci Environ Polit 21:17\u201323","journal-title":"Ethics Sci Environ Polit"},{"key":"2616_CR12","unstructured":"Devlin J, Chang MW, Lee K, et\u00a0al (2018) Bert: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805"},{"key":"2616_CR13","doi-asserted-by":"crossref","unstructured":"Gehrmann S, Strobelt H, Rush AM (2019) Gltr: Statistical detection and visualization of generated text. arXiv preprint arXiv:1906.04043","DOI":"10.18653\/v1\/P19-3019"},{"key":"2616_CR14","doi-asserted-by":"crossref","unstructured":"Giaretta A, Dragoni N (2020) Community targeted phishing: a middle ground between massive and spear phishing through natural language generation. In: Proceedings of 6th International Conference in Software Engineering for Defence Applications: SEDA 2018 6, Springer, pp 86\u201393","DOI":"10.1007\/978-3-030-14687-0_8"},{"key":"2616_CR15","unstructured":"Guo B, Zhang X, Wang Z et\u00a0al (2023) How close is chatgpt to human experts? Comparison corpus, evaluation, and detection. arXiv preprint arXiv:2301.07597"},{"key":"2616_CR16","doi-asserted-by":"crossref","unstructured":"He X, Shen X, Chen Z et\u00a0al (2023) Mgtbench: benchmarking machine-generated text detection. arXiv preprint arXiv:2303.14822","DOI":"10.1145\/3658644.3670344"},{"key":"2616_CR17","doi-asserted-by":"crossref","unstructured":"Houvardas J, Stamatatos E (2006) N-gram feature selection for authorship identification. In: International conference on artificial intelligence: methodology, systems, and applications. Springer, pp. 77\u201386","DOI":"10.1007\/11861461_10"},{"key":"2616_CR18","unstructured":"Huang X, Peng H, Sun L, et\u00a0al. (2024) Structural entropy guided probabilistic coding. arXiv preprint arXiv:2412.08841"},{"key":"2616_CR19","unstructured":"Kurenkov A (2022) Lessons from the gpt-4chan controversy. https:\/\/thegradient.pub\/gpt-4chan-lessons. Accessed: 2024-07-29"},{"issue":"6","key":"2616_CR20","doi-asserted-by":"publisher","first-page":"3290","DOI":"10.1109\/TIT.2016.2555904","volume":"62","author":"A Li","year":"2016","unstructured":"Li A, Pan Y (2016) Structural information and dynamical complexity of networks. IEEE Trans Inform Theory 62(6):3290\u20133339","journal-title":"IEEE Trans Inform Theory"},{"key":"2616_CR21","doi-asserted-by":"crossref","unstructured":"Liu X, Zhang Z, Wang Y et\u00a0al (2022) Coco: coherence-enhanced machine-generated text detection under data limitation with contrastive learning. arXiv preprint arXiv:2212.10341","DOI":"10.18653\/v1\/2023.emnlp-main.1005"},{"key":"2616_CR22","unstructured":"Liu Y, Ott M, Goyal N, et\u00a0al. (2019) Roberta: a robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692"},{"key":"2616_CR23","unstructured":"Meta (2024) The llama 3 herd of models. https:\/\/ai.meta.com"},{"key":"2616_CR24","doi-asserted-by":"crossref","unstructured":"Mikolov T, Karafi\u00e1t M, Burget L, et\u00a0al. (2010) Recurrent neural network based language model. In: Interspeech, Makuhari, pp. 1045\u20131048","DOI":"10.21437\/Interspeech.2010-343"},{"key":"2616_CR25","unstructured":"Mitchell E, Lee Y, Khazatsky A, et\u00a0al. (2023) Detectgpt: zero-shot machine-generated text detection using probability curvature. In: International Conference on Machine Learning, PMLR, pp 24950\u201324962"},{"key":"2616_CR26","doi-asserted-by":"crossref","unstructured":"Ng MKP, Li X, Ye Y (2011) Multirank: co-ranking for objects and relations in multi-relational data. In: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 1217\u20131225","DOI":"10.1145\/2020408.2020594"},{"key":"2616_CR27","first-page":"27730","volume":"35","author":"L Ouyang","year":"2022","unstructured":"Ouyang L, Wu J, Jiang X et al (2022) Training language models to follow instructions with human feedback. Adv Neural Inform Process Syst 35:27730\u201327744","journal-title":"Adv Neural Inform Process Syst"},{"issue":"6","key":"2616_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3660522","volume":"42","author":"H Peng","year":"2024","unstructured":"Peng H, Zhang J, Huang X et al (2024) Unsupervised social bot detection via structural information theory. ACM Trans Inform Syst 42(6):1\u201342","journal-title":"ACM Trans Inform Syst"},{"issue":"8","key":"2616_CR29","first-page":"9","volume":"1","author":"A Radford","year":"2019","unstructured":"Radford A, Wu J, Child R et al (2019) Language models are unsupervised multitask learners. OpenAI blog 1(8):9","journal-title":"OpenAI blog"},{"issue":"8","key":"2616_CR30","doi-asserted-by":"publisher","first-page":"1270","DOI":"10.1109\/5.880083","volume":"88","author":"R Rosenfeld","year":"2000","unstructured":"Rosenfeld R (2000) Two decades of statistical language modeling: where do we go from here? Proc IEEE 88(8):1270\u20131278","journal-title":"Proc IEEE"},{"key":"2616_CR31","doi-asserted-by":"crossref","unstructured":"Shu K, Wang S, Lee D, et\u00a0al (2020) Mining disinformation and fake news: Concepts, methods, and recent advancements. In: Disinformation, misinformation, and fake news in social media: emerging research challenges and opportunities, pp 1\u201319","DOI":"10.1007\/978-3-030-42699-6_1"},{"key":"2616_CR32","unstructured":"Solaiman I, Brundage M, Clark J, et\u00a0al. (2019) Release strategies and the social impacts of language models. arXiv preprint arXiv:1908.09203"},{"issue":"4","key":"2616_CR33","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s41060-021-00299-5","volume":"13","author":"H Stiff","year":"2022","unstructured":"Stiff H, Johansson F (2022) Detecting computer-generated disinformation. Int J Data Sci Anal 13(4):363\u2013383","journal-title":"Int J Data Sci Anal"},{"key":"2616_CR34","doi-asserted-by":"crossref","unstructured":"Stolcke A, et\u00a0al. (2002) Srilm-an extensible language modeling toolkit. In: Interspeech, p 2002","DOI":"10.21437\/ICSLP.2002-303"},{"key":"2616_CR35","doi-asserted-by":"crossref","unstructured":"Su J, Zhuo TY, Wang D et\u00a0al (2023) Detectllm: Leveraging log rank information for zero-shot detection of machine-generated text. arXiv preprint arXiv:2306.05540","DOI":"10.18653\/v1\/2023.findings-emnlp.827"},{"key":"2616_CR36","unstructured":"Sutskever I, Vinyals O, Le QV (2014) Sequence to sequence learning with neural networks. Adv Neural Information Process Syst 27"},{"key":"2616_CR37","unstructured":"Touvron H, Lavril T, Izacard G et\u00a0al. (2023) Llama: open and efficient foundation language models (2023). arXiv preprint arXiv:2302.13971"},{"key":"2616_CR38","unstructured":"Vaswani A, Shazeer N, Parmar N et\u00a0al. (2017) Attention is all you need. Adv Neural Inform Process Syst 30"},{"key":"2616_CR39","doi-asserted-by":"crossref","unstructured":"Verma V, Fleisig E, Tomlin N et\u00a0al (2023) Ghostbuster: detecting text ghostwritten by large language models. arXiv preprint arXiv:2305.15047","DOI":"10.18653\/v1\/2024.naacl-long.95"},{"key":"2616_CR40","unstructured":"Wang S, Wang P, Wu B et\u00a0al (2024) Structural entropy minimization combining graph representation for money laundering dentification. Int J Mach Learn Cybern:1\u201318"},{"key":"2616_CR41","unstructured":"Wu J, Chen X, Xu K et\u00a0al (2022) Structural entropy guided graph hierarchical pooling. In: International conference on machine learning, PMLR, pp. 24017\u201324030"},{"key":"2616_CR42","doi-asserted-by":"crossref","unstructured":"Yang R, Peng H, Li A et\u00a0al (2024) Hierarchical abstracting graph kernel. IEEE Trans Knowl Data Eng","DOI":"10.1109\/TKDE.2024.3509028"},{"key":"2616_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2024.104175","volume":"334","author":"R Yang","year":"2024","unstructured":"Yang R, Peng H, Liu C et al (2024) Incremental measurement of structural entropy for dynamic graphs. Artif Intell 334:104175","journal-title":"Artif Intell"},{"key":"2616_CR44","unstructured":"Zellers R, Holtzman A, Rashkin H et\u00a0al (2019) Defending against neural fake news. Adv Neural Inform Process Syst 32"},{"key":"2616_CR45","doi-asserted-by":"crossref","unstructured":"Zeng G, Peng H, Li A et\u00a0al (2024) Scalable semi-supervised clustering via structural entropy with different constraints. IEEE Trans Knowl Data Eng","DOI":"10.1137\/1.9781611978032.24"},{"key":"2616_CR46","doi-asserted-by":"crossref","unstructured":"Zeng X, Peng H, Li A (2023) Effective and stable role-based multi-agent collaboration by structural information principles. In: Proceedings of the AAAI conference on artificial intelligence, pp. 11772\u201311780","DOI":"10.1609\/aaai.v37i10.26390"},{"key":"2616_CR47","doi-asserted-by":"crossref","unstructured":"Zeng X, Peng H, Li A et\u00a0al. (2023) Hierarchical state abstraction based on structural information principles. arXiv preprint arXiv:2304.12000","DOI":"10.24963\/ijcai.2023\/506"},{"key":"2616_CR48","doi-asserted-by":"crossref","unstructured":"Zeng X, Peng H, Li A (2024) Adversarial socialbots modeling based on structural information principles. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 392\u2013400","DOI":"10.1609\/aaai.v38i1.27793"},{"key":"2616_CR49","unstructured":"Zeng X, Peng H, Su D et\u00a0al. (2024) Effective reinforcement learning based on structural information principles. arXiv preprint arXiv:2404.09760"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02616-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-025-02616-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02616-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T01:04:02Z","timestamp":1757466242000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-025-02616-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,23]]},"references-count":49,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2616"],"URL":"https:\/\/doi.org\/10.1007\/s13042-025-02616-x","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-4910736\/v1","asserted-by":"object"}]},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,23]]},"assertion":[{"value":"14 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}