{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T20:48:34Z","timestamp":1775767714955,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1109\/tc.2026.3662446","type":"journal-article","created":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T21:04:24Z","timestamp":1770671064000},"page":"1782-1795","source":"Crossref","is-referenced-by-count":0,"title":["Masking-Watermarking Cooperative: An End-to-End Adversarial Protection Framework for Secure Text Distribution and Sharing"],"prefix":"10.1109","volume":"75","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-4702-266X","authenticated-orcid":false,"given":"Guiyao","family":"Tie","sequence":"first","affiliation":[{"name":"School of Computer Science, China University of Geosciences (CUG), Wuhan, P.R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1322-2588","authenticated-orcid":false,"given":"Devki Nandan","family":"Jha","sequence":"additional","affiliation":[{"name":"School of Computing, University of Newcastle, Newcastle upon Tyne, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9146-2459","authenticated-orcid":false,"given":"Mutaz","family":"Barika","sequence":"additional","affiliation":[{"name":"Crown Institute of Higher Education, North Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3820-7632","authenticated-orcid":false,"given":"Jun","family":"Song","sequence":"additional","affiliation":[{"name":"School of Computer Science, China University of Geosciences (CUG), Wuhan, P.R. China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"276","article-title":"A zero-watermarking scheme for prose writings","volume-title":"Proc. IEEE\/CyberC 20171","author":"Meng","year":"2017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2018.089214"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161397"},{"key":"ref4","first-page":"1194","article-title":"Practical linguistic steganography using contextual synonym substitution and vertex colour coding","volume-title":"Proc. Conf. Empirical Methods Nat. Lang. Process. (EMNLP)","author":"Chang","year":"2010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1178766.1178777"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08084-0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5373-7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958095"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10028-y"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17120-8_47"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10983-6_53"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.wassa-1.32"},{"key":"ref13","first-page":"649","article-title":"Character-level convolutional networks for text classification","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","author":"Zhang","year":"2015"},{"key":"ref14","article-title":"Turning poachers into gamekeepers: Detecting machine-generated text in academia using large language models","author":"Sivesind","year":"2023"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3116203"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.lchange-1.19"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001422500136"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4018\/IJAMC.2016040101"},{"key":"ref19","first-page":"3055","article-title":"Loki: Hardening code obfuscation against automated attacks","volume-title":"Proc. 31st USENIX Secur. Symp","author":"Schloegel","year":"2022"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866063"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2021.015915"},{"key":"ref22","article-title":"FastFormer: Additive attention can be all you need","author":"Wu","year":"2021"},{"key":"ref23","article-title":"ReCAB-VAE: Gumbel-Softmax variational inference based on analytic divergence","author":"Oh","year":"2022"},{"key":"ref24","article-title":"GELU activation function in deep learning: A comprehensive mathematical analysis and performance","author":"Lee","year":"2023"},{"key":"ref25","article-title":"RoBERTa: A robustly optimized BERT pretraining approach","author":"Yinhan Liu","year":"2019"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s00180-021-01136-w"},{"key":"ref27","first-page":"525","article-title":"Multi-task learning as multi-objective optimization","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Sener","year":"2018"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01270-0_17"},{"key":"ref29","article-title":"Deep learning-based approaches for automatic detection of shell nouns and evaluation on WikiText-2","author":"Yao","year":"2022"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-3017"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00083"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i10.21415"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CEC45853.2021.9504761"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v14i4.3956"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2320500"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/S0016-0032(96)00063-4"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11330"},{"key":"ref38","first-page":"1634","article-title":"Text processing like humans do: Visually attacking and shielding NLP systems","volume-title":"Proc. Conf. North Amer. Chapter Assoc. Comput. Ling. (NAACL-HLT)","author":"Eger","year":"2019"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1215"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258486"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127421502199"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97909-0_43"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3060317"},{"key":"ref44","article-title":"A different level text protection mechanism with differential privacy","author":"Fu","year":"2024"},{"issue":"12","key":"ref45","first-page":"148","article-title":"Big data plain text watermarking based on orthogonal coding","volume":"46","author":"Li","year":"2019","journal-title":"Comput. Sci."}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/12\/11477952\/11373927.pdf?arnumber=11373927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:44:49Z","timestamp":1775763889000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11373927\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":45,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tc.2026.3662446","relation":{},"ISSN":["0018-9340","1557-9956","2326-3814"],"issn-type":[{"value":"0018-9340","type":"print"},{"value":"1557-9956","type":"electronic"},{"value":"2326-3814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,5]]}}}