{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:09:28Z","timestamp":1771657768989,"version":"3.50.1"},"reference-count":30,"publisher":"Zhejiang University Press","issue":"10","license":[{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61370170"],"award-info":[{"award-number":["61370170"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the National Social Science Foundation of China","award":["14CTQ032"],"award-info":[{"award-number":["14CTQ032"]}]}],"content-domain":{"domain":["springerlink.com","jzus.zju.edu.cn"],"crossmark-restriction":true},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1631\/fitee.1601344","type":"journal-article","created":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T03:02:27Z","timestamp":1513220547000},"page":"1556-1572","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A machine learning approach to query generation in plagiarism source retrieval"],"prefix":"10.1631","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4636-3507","authenticated-orcid":false,"given":"Lei-lei","family":"Kong","sequence":"first","affiliation":[]},{"given":"Zhi-mao","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Hao-liang","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Zhong-yuan","family":"Han","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2017,12,15]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tsmcc.2011.2134847"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1162\/coli_a_00153"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148205"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1023\/a:1022627411411"},{"key":"ref5","article-title":"Using statistic and semantic analysis to detect plagiarism-notebook for PAN at CLEF 2013","volume-title":"Proc. CLEF Evaluation Labs and Workshop, Working Notes Papers","author":"Elizalde","year":"2013"},{"key":"ref6","article-title":"Guess again and see if they line up: surrey\u2019s runs at plagiarism detection-notebook for PAN at CLEF 2013","volume-title":"Proc. CLEF Evaluation Labs and Workshop, Working Notes Papers","author":"Gillam","year":"2013"},{"key":"ref7","article-title":"Source retrieval for plagiarism detection from large web corpora: recent approaches","volume-title":"Proc. CLEF Evaluation Labs and Workshop, Working Notes Papers","author":"Hagen","year":"2015"},{"key":"ref8","article-title":"Plagiarism candida-te retrieval using selective query formulation and discriminative query scoring-notebook for PAN at CLEF 2013","volume-title":"Proc. CLEF Evaluation Labs and Workshop, Working Notes Papers","author":"Haggag","year":"2013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21606-5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1113.003.0010"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1995.1011"},{"key":"ref12","article-title":"Similarity overlap metric and greedy string tiling at PAN 2012: plagiarism detection-notebook for PAN at CLEF 2012","volume-title":"Proc. CLEF Evaluation Labs and Workshop, Working Notes Papers","author":"Jayapal","year":"2012"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775067"},{"key":"ref14","article-title":"Approaches for candidate document retrieval and detailed comparison of plagiarism detection-notebook for PAN at CLEF 2012","volume-title":"Proc. CLEF Evaluation Labs and Workshop, Working Notes Papers","author":"Kong","year":"2012"},{"key":"ref15","article-title":"CopyCaptor: plagiarized source retrieval system using global word frequency and local feedback-notebook for PAN at CLEF 2013","volume-title":"Proc. CLEF Evaluation Labs and Workshop, Working Notes Papers","author":"Lee","year":"2013"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1008992.1009006"},{"key":"ref17","article-title":"Overview of the 4th International Competition on Plagiarism Detection","volume-title":"Proc. CLEF Evaluation Labs and Workshop, Working Notes Papers","author":"Potthast","year":"2012a"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348429"},{"key":"ref19","article-title":"Overview of the 5th International Competition on Plagiarism Detection","volume-title":"Proc. CLEF Evaluation Labs and Workshop, Working Notes Papers","author":"Potthast","year":"2013a"},{"key":"ref20","first-page":"1212","article-title":"Crowdsourcing interaction logs to understand text reuse from the web","volume-title":"Proc. 51 st ACM Annual Meeting of the Association of Computational Linguistics","author":"Potthast","year":"2013b"},{"key":"ref21","article-title":"Overview of the 6th International Competition on Plagiarism Detection","volume-title":"Proc. CLEF Evaluation Labs and Workshop, Working Notes Papers","author":"Potthast","year":"2014"},{"key":"ref22","article-title":"Experiments on document chunking and query formation for plagiarism source re-trieval-notebook for PAN at CLEF 2014","volume-title":"Proc. CLEF Evaluation Labs and Workshop, Working Notes Papers","author":"Prakash","year":"2014"},{"key":"ref23","article-title":"Source retrieval plagiarism detection based on noun phrase and keyword phrase extraction-notebook for PAN at CLEF 2015","volume-title":"Proc. CLEF Evaluation Labs and Workshop, Working Notes Papers","author":"Rafiei","year":"2015"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1108\/eum0000000007186"},{"key":"ref25","article-title":"Improving synoptic que-rying for source retrieval-notebook for PAN at CLEF 2015","volume-title":"Proc. CLEF Evaluation Labs and Workshop, Working Notes Papers","author":"Suchomel","year":"2015"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3115\/1073445.1073478"},{"key":"ref27","article-title":"Un-supervised ranking for plagiarism source retrieval-notebook for PAN at CLEF 2013","volume-title":"Proc. CLEF Evaluation Labs and Workshop, Working Notes Papers","author":"Williams","year":"2013"},{"key":"ref28","article-title":"Supervised ranking for plagiarism source retrieval-notebook for PAN at CLEF 2014","volume-title":"Proc. CLEF Evaluation Labs and Workshop, Working Notes Papers","author":"Williams","year":"2014a"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2644866.2644879"},{"key":"ref30","article-title":"Using sentence similarity measure for plagiarism source retrieval-notebook for PAN at CLEF 2014","volume-title":"Proc. CLEF Evaluation Labs and Workshop, Working Notes Papers","author":"Zubarev","year":"2014"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1601344\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1601344.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1601344.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:34:31Z","timestamp":1771655671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1601344"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":30,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["1158"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1601344","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10]]},"assertion":[{"value":"http:\/\/orcid.org\/0000-0002-4636-3507","URL":"http","order":0,"name":"name","label":"Lei-lei KONG","group":{"name":"orcid","label":"ORCID"}},{"value":"2016-06-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-12-12","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-11-01","order":2,"name":"crosschecked","label":"Crosschecked","group":{"name":"publication_history","label":"Publication History"}},{"value":"Article","order":0,"name":"content_type","group":{"name":"content_type","label":"Content Type"}},{"value":"\u00a9 Zhejiang University and Springer-Verlag GmbH Germany 2017","order":0,"name":"copyright","group":{"name":"copyright","label":"Copyright"}}]}}