{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T05:15:27Z","timestamp":1734153327469,"version":"3.30.2"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"publisher","award":["62176026"],"award-info":[{"award-number":["62176026"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007225","name":"Project of \u201cImage Inspection Basic Data and Platform Construction\u201d, Department of Science and Technology Supervision and Integrity Building, Ministry of Science and Technology","doi-asserted-by":"publisher","award":["GXCZ-D-21070106"],"award-info":[{"award-number":["GXCZ-D-21070106"]}],"id":[{"id":"10.13039\/100007225","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002766","name":"Beijing University of Posts and Telecommunications \u201cGreat Challenge\u201d Project","doi-asserted-by":"publisher","award":["2023DTZ07"],"award-info":[{"award-number":["2023DTZ07"]}],"id":[{"id":"10.13039\/501100002766","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,16]]},"DOI":"10.1109\/besc64747.2024.10780700","type":"proceedings-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T19:07:29Z","timestamp":1734030449000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Cross-Language Multimodal Detection: A Novel Model for Identifying Duplicate Publications in Scientific Papers"],"prefix":"10.1109","author":[{"given":"Jiayu","family":"Huang","sequence":"first","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications,Beijing,China"}]},{"given":"Haihong","family":"E","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications,Beijing,China"}]},{"given":"Jianhua","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Wanfang Data Co., Ltd.,Beijing,China"}]},{"given":"Tianyi","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications,Beijing,China"}]},{"given":"Xiaodong","family":"Qiao","sequence":"additional","affiliation":[{"name":"Beijing Wanfang Data Co., Ltd.,Beijing,China"}]},{"given":"Junpeng","family":"Ding","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications,Beijing,China"}]},{"given":"Xinyang","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications,Beijing,China"}]}],"member":"263","reference":[{"issue":"4","key":"ref1","first-page":"58","article-title":"Academic publishing specification-definition of academic misconduct for journals","volume":"29","author":"Press","year":"2019","journal-title":"Powder Metal-lurgy Industry"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.365"},{"key":"ref3","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","volume-title":"International Conference on Learning Representations","author":"Dosovitskiy","year":"2021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s23052381"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCBDA.2019.8725674"},{"key":"ref6","first-page":"1242","article-title":"Online near-duplicate detection of news articles","volume-title":"LREC 2020","author":"Rodier"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SEQUEN.1997.666900"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-009-9114-z"},{"key":"ref9","article-title":"Crosslang: the system of cross-lingual plagiarism detection","author":"Bakhteev","year":"2019","journal-title":"NeurIPS 2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5120\/11638-7118"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1310.4546"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36973-5_66"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106744"},{"journal-title":"A survey of large language models for healthcare: from data, technology, and applications to accountability and ethics","year":"2023","author":"He","key":"ref14"},{"journal-title":"Llama: Open and efficient foundation language models","year":"2023","author":"Touvron","key":"ref15"},{"journal-title":"Llama-e: Empowering e-commerce authoring with multi-aspect instruction following","year":"2023","author":"Shi","key":"ref16"},{"key":"ref17","first-page":"28","article-title":"Mitigation of rotational constraints in image based plagiarism detection using perceptual hash","volume":"2","author":"Aghav","year":"2014","journal-title":"Int J Comput Sci Trends Technol"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.12.014"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-08209-6"},{"key":"ref20","article-title":"Imagenet-21k pretraining for the masses","author":"Ridnik","year":"2021","journal-title":"NeurIPS 2021 Datasets and Benchmarks Track(Round 1)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00721"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-demos.12"},{"journal-title":"Efficient and effective text encoding for chinese llama and alpaca","year":"2023","author":"Cui","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.emnlp-main.621"},{"issue":"140","key":"ref25","first-page":"1","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume":"21","author":"Raffel","year":"2020","journal-title":"Journal of machine learning research"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01548"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/S17-2001"}],"event":{"name":"2024 11th International Conference on Behavioural and Social Computing (BESC)","start":{"date-parts":[[2024,8,16]]},"location":"Harbin, China","end":{"date-parts":[[2024,8,18]]}},"container-title":["2024 11th International Conference on Behavioural and Social Computing (BESC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10779601\/10780446\/10780700.pdf?arnumber=10780700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T06:29:37Z","timestamp":1734071377000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10780700\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,16]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/besc64747.2024.10780700","relation":{},"subject":[],"published":{"date-parts":[[2024,8,16]]}}}