{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:05:50Z","timestamp":1760709950070,"version":"3.44.0"},"reference-count":27,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"funder":[{"DOI":"10.13039\/501100012325","name":"National Office for Philosophy and Social Sciences","doi-asserted-by":"publisher","award":["18BYY125"],"award-info":[{"award-number":["18BYY125"]}],"id":[{"id":"10.13039\/501100012325","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772177","61806075"],"award-info":[{"award-number":["61772177","61806075"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2018YFC0830700"],"award-info":[{"award-number":["2018YFC0830700"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1016\/j.ins.2019.07.015","type":"journal-article","created":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T19:35:15Z","timestamp":1562268915000},"page":"336-350","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["Source Retrieval Model Focused on Aggregation for plagiarism detection"],"prefix":"10.1016","volume":"503","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4636-3507","authenticated-orcid":false,"given":"Lei-lei","family":"Kong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8960-9872","authenticated-orcid":false,"given":"Zhong-yuan","family":"Han","sequence":"additional","affiliation":[]},{"given":"Hao-liang","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Mu-yun","family":"Yang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2019.07.015_bib0001","series-title":"Proceedings of CLEF 2010 Evaluation Labs and Workshop","first-page":"1","article-title":"Fuzzy semantic-based string similarity for extrinsic plagiarism detection","author":"Alzahrani","year":"2010"},{"key":"10.1016\/j.ins.2019.07.015_bib0002","series-title":"International Conference on Intelligent Text Processing and Computational Linguistics","first-page":"687","article-title":"Word length n-grams for text re-use detection","author":"Barr\u00f3n-Cede\u00f1o","year":"2010"},{"key":"10.1016\/j.ins.2019.07.015_bib0003","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.knosys.2013.06.018","article-title":"Methods for cross-language plagiarism detection","volume":"50","author":"Barr\u00f3n-Cede\u00f1o","year":"2013","journal-title":"Knowl. Based. Syst."},{"key":"10.1016\/j.ins.2019.07.015_bib0004","series-title":"Proceedings of the 12th International Conference on Hybrid Intelligent Systems,","first-page":"366","article-title":"Plagiarism detection in text using vector space model","author":"Ekbal","year":"2012"},{"key":"10.1016\/j.ins.2019.07.015_bib0005","series-title":"Proceedings of CLEF 2013 Evaluation Labs and Workshop","first-page":"1","article-title":"Using statistic and semantic analysis to detect plagiarism","author":"Elizalde","year":"2013"},{"key":"10.1016\/j.ins.2019.07.015_bib0006","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.knosys.2016.08.004","article-title":"Cross-language plagiarism detection over continuous-space-and knowledge graph-based representations of language","volume":"111","author":"Franco-Salvador","year":"2016","journal-title":"Knowl. Based. Syst."},{"key":"10.1016\/j.ins.2019.07.015_bib0007","series-title":"European Conference on Information Retrieval","first-page":"710","article-title":"Cross-language plagiarism detection using a multilingual semantic network","author":"Franco-Salvador","year":"2013"},{"issue":"4","key":"10.1016\/j.ins.2019.07.015_bib0008","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1016\/j.ipm.2015.12.004","article-title":"A systematic study of knowledge graph analysis for cross-language plagiarism detection","volume":"52","author":"Franco-Salvador","year":"2016","journal-title":"Inf. Process. Manag."},{"issue":"2018","key":"10.1016\/j.ins.2019.07.015_bib0009","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.knosys.2017.11.041","article-title":"A resource-light method for cross-lingual semantic textual similarity","volume":"143","author":"Glavas","year":"2018","journal-title":"Knowl. Based. Syst."},{"key":"10.1016\/j.ins.2019.07.015_bib0010","series-title":"Proceedings of the 2017 ACM on Conference on Information and Knowledge Management","first-page":"2091","article-title":"Source retrieval for web-scale text reuse detection","author":"Hagen","year":"2017"},{"key":"10.1016\/j.ins.2019.07.015_bib0011","series-title":"Proceedings of CLEF 2013 Evaluation Labs and Workshop","first-page":"1","article-title":"Plagiarism candidate retrieval using selective query formulation and discriminative query scoring","author":"Haggag","year":"2013"},{"key":"10.1016\/j.ins.2019.07.015_bib0012","series-title":"Proceedings of CLEF 2012 Evaluation Labs and Workshop","first-page":"1","article-title":"Approaches for candidate document retrieval and detailed comparison of plagiarism detection","author":"Kong","year":"2012"},{"issue":"1","key":"10.1016\/j.ins.2019.07.015_bib0013","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1587\/transinf.2016EDL8090","article-title":"A ranking approach to source retrieval of plagiarism detection","volume":"100","author":"Kong","year":"2017","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"4","key":"10.1016\/j.ins.2019.07.015_bib0014","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1109\/TCBB.2016.2542803","article-title":"An ir-based approach utilizing query expansion for plagiarism detection in medline","volume":"14","author":"Nawab","year":"2017","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinform. (TCBB)"},{"key":"10.1016\/j.ins.2019.07.015_bib0015","series-title":"Proceedings of CLEF 2014 Evaluation Labs and Workshop","first-page":"845","article-title":"Overview of the 6th international competition on plagiarism detection","author":"Potthast","year":"2014"},{"key":"10.1016\/j.ins.2019.07.015_bib0016","series-title":"Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, ACM","first-page":"1212","article-title":"Crowdsourcing interaction logs to understand text reuse from the web","author":"Potthast","year":"2013"},{"key":"10.1016\/j.ins.2019.07.015_bib0017","series-title":"Proceedings of CLEF 2013 Evaluation Labs and Workshop","first-page":"301","article-title":"Overview of the 5th international competition on plagiarism detection","author":"Potthast","year":"2013"},{"key":"10.1016\/j.ins.2019.07.015_bib0018","series-title":"Proceedings of CLEF 2012 Evaluation Labs and Workshop","first-page":"101","article-title":"Overview of the 4th international competition on plagiarism detection","author":"Potthast","year":"2012"},{"key":"10.1016\/j.ins.2019.07.015_bib0019","series-title":"Exploration of Fuzzy c Means Clustering Algorithm in External Plagiarism Detection System, Intelligent Systems Technologies and Applications","first-page":"127","author":"Ravi","year":"2016"},{"issue":"5","key":"10.1016\/j.ins.2019.07.015_bib0020","doi-asserted-by":"crossref","first-page":"1804","DOI":"10.1016\/j.eswa.2012.09.021","article-title":"Determining and characterizing the reused text for plagiarism detection","volume":"40","author":"S\u00e1nchez-Vega","year":"2013","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"10.1016\/j.ins.2019.07.015_bib0021","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/584091.584093","article-title":"A mathematical theory of communication","volume":"5","author":"Shannon","year":"2001","journal-title":"ACM SIGMOBILE Mob. Comput. Commun. Rev."},{"key":"10.1016\/j.ins.2019.07.015_bib0022","series-title":"Proceedings of CLEF 2015 Evaluation Labs and Workshop","first-page":"101","article-title":"Improving synoptic querying for source retrieval","author":"Suchomel","year":"2015"},{"key":"10.1016\/j.ins.2019.07.015_bib0023","series-title":"IEEE International Conference on Contemporary Computing and Informatics (IC3I)","first-page":"1268","article-title":"Using k-means cluster based techniques in external plagiarism detection","author":"Vani","year":"2014"},{"key":"10.1016\/j.ins.2019.07.015_bib0024","series-title":"Proceedings of the 2014 ACM Symposium on Document Engineering, ACM","first-page":"97","article-title":"Classifying and ranking search engine results as potential sources of plagiarism","author":"Williams","year":"2014"},{"key":"10.1016\/j.ins.2019.07.015_bib0025","series-title":"Proceedings of CLEF 2014 Evaluation Labs and Workshop","first-page":"1021","article-title":"Supervised ranking for plagiarism source retrieval","author":"Williams","year":"2014"},{"key":"10.1016\/j.ins.2019.07.015_bib0026","series-title":"Proceedings of CLEF 2013 Evaluation Labs and Workshop","first-page":"1","article-title":"Unsupervised ranking for plagiarism source retrieval","author":"Williams","year":"2013"},{"key":"10.1016\/j.ins.2019.07.015_bib0027","series-title":"Proceedings of CLEF 2014 Evaluation Labs and Workshop","first-page":"1027","article-title":"Using sentence similarity measure for plagiarism source retrieval","author":"Zubarev","year":"2014"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025519306206?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025519306206?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T04:52:59Z","timestamp":1758084779000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025519306206"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":27,"alternative-id":["S0020025519306206"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2019.07.015","relation":{},"ISSN":["0020-0255"],"issn-type":[{"type":"print","value":"0020-0255"}],"subject":[],"published":{"date-parts":[[2019,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Source Retrieval Model Focused on Aggregation for plagiarism detection","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2019.07.015","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Published by Elsevier Inc.","name":"copyright","label":"Copyright"}]}}