{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T23:07:50Z","timestamp":1770505670764,"version":"3.49.0"},"reference-count":21,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2015,5,17]],"date-time":"2015-05-17T00:00:00Z","timestamp":1431820800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,5,24]]},"abstract":"<jats:p>Paraphrase plagiarism identification represents a very complex task given that plagiarized texts are intentionally modified through several rewording techniques. Accordingly, this paper introduces two new measures for evaluating the relatedness of two given texts: a semantically-informed similarity measure and a semantically-informed edit distance. Both measures are able to extract semantic information from either an external resource or a distributed representation of words, resulting in informative features for training a supervised classifier for detecting paraphrase plagiarism. Obtained results indicate that the proposed metrics are consistently good in detecting different types of paraphrase plagiarism. In addition, results are very competitive against state-of-the art methods having the advantage of representing a much more simple but equally effective solution.<\/jats:p>","DOI":"10.3233\/jifs-169483","type":"journal-article","created":{"date-parts":[[2018,5,18]],"date-time":"2018-05-18T10:38:27Z","timestamp":1526639907000},"page":"2983-2990","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":10,"title":["Semantically-informed distance and similarity measures for paraphrase plagiarism identification"],"prefix":"10.1177","volume":"34","author":[{"given":"Miguel A.","family":"\u00c1lvarez-Carmona","sequence":"first","affiliation":[{"name":"Department of Computer Science, Instituto Nacional de Astrof\u00edsica, \u00d3ptica y Electr\u00f3nica (INAOE), Mexico"}]},{"given":"Marc","family":"Franco-Salvador","sequence":"additional","affiliation":[{"name":"Symanto Research, Nuremberg, Germany"}]},{"given":"Esa\u00fa","family":"Villatoro-Tello","sequence":"additional","affiliation":[{"name":"Department of Information Technologies, Language and Reasoning Research Group, Universidad Aut\u00f3noma Metropolitana, Unidad Cuajimalpa (UAM-C), Mexico"}]},{"given":"Manuel","family":"Montes-y-G\u00f3mez","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Instituto Nacional de Astrof\u00edsica, \u00d3ptica y Electr\u00f3nica (INAOE), Mexico"}]},{"given":"Paolo","family":"Rosso","sequence":"additional","affiliation":[{"name":"PRHLT Research Center, Universitat Polit\u00e8cnica de Val\u00e8ncia, Spain"}]},{"given":"Luis","family":"Villase\u00f1or-Pineda","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Instituto Nacional de Astrof\u00edsica, \u00d3ptica y Electr\u00f3nica (INAOE), Mexico"}]}],"member":"179","published-online":{"date-parts":[[2015,5,17]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.048"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1162\/COLI_a_00153"},{"key":"e_1_3_3_4_2","first-page":"655","volume-title":"University of shefield: Two approaches to semantic text similarity","author":"Biggins S.","year":"2012","unstructured":"BigginsS., MohammedS. and OakleyS., University of shefield: Two approaches to semantic text similarity, In First Joint Conference on Lexical and Computational Semantics (SEM at NAACL 2012), Montreal, Canada, 2012, pp. 655\u2013661."},{"key":"e_1_3_3_5_2","first-page":"4","article-title":"Plagiarism detection using word2vec model. p","author":"Brlek A.","year":"2016","unstructured":"BrlekA., FranjicP. and UzelacN., Plagiarism detection using word2vec model. p, Text Analysis and Retrieval 2016 Course Project Reports (2016), p. 4.","journal-title":"Text Analysis and Retrieval 2016 Course Project Reports"},{"key":"e_1_3_3_6_2","article-title":"Edit distance for pushdown automata","author":"Chatterjee K.","year":"2015","unstructured":"ChatterjeeK., HenzingerT.A., Ibsen-JensenR. and OtopJ., Edit distance for pushdown automata. arXiv preprint arXiv:1504.08259, 2015.","journal-title":"arXiv preprint arXiv:1504.08259"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1177"},{"key":"e_1_3_3_8_2","first-page":"13","volume-title":"Measuring the semantic similarity of texts","author":"Courtney C.","year":"2005","unstructured":"CourtneyC. and MihalceaR., Measuring the semantic similarity of texts, In Proceedings of the ACL Workshop on Empirical Modeling of Semantic Equivalence and Entailment (EMSEE at NAALC 2005), 2005, pp. 13\u201318."},{"key":"e_1_3_3_9_2","volume-title":"Automatically constructing a corpus of sentential paraphrases","author":"Dolan W.B.","year":"2005","unstructured":"DolanW.B. and BrockettC., Automatically constructing a corpus of sentential paraphrases, In Proc of IWP, 2005."},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.5120\/11638-7118"},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10170"},{"key":"e_1_3_3_12_2","unstructured":"KimS. WilburW.J. and LuZ. Bridging the gap:Asemantic similarity measure between queries and documents. arXiv preprint arXiv:1608.01972 2016."},{"key":"e_1_3_3_13_2","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions, and reversals","volume":"10","author":"Levenshtein V.I.","year":"1966","unstructured":"LevenshteinV.I., Binary codes capable of correcting deletions, insertions, and reversals, In Soviet Physics Doklady, volume 10, 1966, pp. 707\u2013710.","journal-title":"In Soviet Physics Doklady"},{"key":"e_1_3_3_14_2","first-page":"40","volume-title":"Computerbased plagiarism detection methods and tools: An overview","author":"Lukashenko R.","year":"2007","unstructured":"LukashenkoR., GraudinaV. and GrundspenkisJ., Computerbased plagiarism detection methods and tools: An overview, In Proceedings of the 2007 International Conference on Computer Systems and Technologies, 2007, p. 40ACM."},{"key":"e_1_3_3_15_2","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","author":"Mikolov T.","year":"2013","unstructured":"MikolovT., SutskeverI., ChenK., CorradoG.S., and DeanJ., Distributed representations of words and phrases and their compositionality, In Advances in Neural Information Processing Systems (2013), pp. 3111\u20133119.","journal-title":"In Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"e_1_3_3_17_2","article-title":"Using wordnet-based semantic similarity measurement in external plagiarism detection","author":"Palkovskii Y.","year":"2011","unstructured":"PalkovskiiY., BelovA. and MuzykaI., Using wordnet-based semantic similarity measurement in external plagiarism detection, In Notebook for PAN at CLEF\u201911, 2011.","journal-title":"In Notebook for PAN at CLEF\u201911"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ETTLIS.2015.7048213"},{"key":"e_1_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21630"},{"key":"e_1_3_3_20_2","unstructured":"S\u00e1nchez-VegaJ.F. Identificaci\u00f3n de plagio parafraseado incorporando estructura sentido y estilo de los textos. PhD thesis Instituto Nacional de Astrof\u00edsica Optica y Electr\u00f3nica 2016."},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.3115\/981732.981751"},{"key":"e_1_3_3_22_2","first-page":"47","volume-title":"External and intrinsic plagiarism detection using vector space models","volume":"502","author":"Zechner M.","year":"2009","unstructured":"ZechnerM., MuhrM., KernR. and GranitzerM., External and intrinsic plagiarism detection using vector space models, In CEUR Workshop Proceedings, vol. 502, 2009, pp. 47\u201355."}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169483","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169483","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T21:54:18Z","timestamp":1770414858000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169483"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,17]]},"references-count":21,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,5,24]]}},"alternative-id":["10.3233\/JIFS-169483"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169483","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,17]]}}}