<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Trends in Gaming Indicators: On Failed Attempts at Deception and their Computerised Detection</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Cyril Labbe</string-name>
          <email>Cyril.Labbe@imag.fr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Univ. Grenoble Alpes</institution>
          ,
          <addr-line>CNRS, Grenoble INP, LIG, F-38000 Grenoble</addr-line>
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <fpage>6</fpage>
      <lpage>15</lpage>
      <abstract>
        <p>Counting articles and citations, analyzing citations and coauthors graphs have become ways to assess researchers and institutions performance. Fairly enough, these measures are becoming targets for institutions and individual researchers thus triggering new behaviors. As a matter of fact, scientometrics and informetrics systems of all kinds have to separate the grain from the cha . Among others, elds like information retrieval, network analysis and natural language processing may o er answers to deal with this kind of problems. Through several emblematic case studies (fake researcher, generated papers, paper mills), we show evidences of attempts to game indicators together with automatic ways to detect them (automatic detection of generated papers, errors detection).</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Several factors are substantially changing the way the scienti c community
shares its knowledge. On the one hand, technological developments have made
the writing, publication and dissemination of documents quicker and easier. On
the other hand, the pressure of individual and institutional evaluation is changing
the publication process. This combination of factors has led to a rapid increase in
scienti c document production. In a sense, one could say that the global
knowledge is growing ever faster than before. The presence of junk publications could
be interpreted as a side e ect of the `publish or perish' paradigm.</p>
      <p>Nevertheless, counting articles and citations, analyzing citations and
coauthors graphs have become ways to assess researchers and institutions
performance. Fairly enough, these measures are becoming targets for institutions
and individual researchers thus triggering new behaviors. Several emblematic
case studies (fake researcher, generated papers, paper mills) show evidences of
attempts to game indicators. As a matter of fact, scientometrics and
informetrics systems of all kinds have to sort out the publications that matters. Among
others, elds like information retrieval, network analysis and natural language
processing may o er answers to deal with this kind of problems.</p>
      <p>The section 2 describes individual and institutional behavior that can be
used to game metrics and ranking, some of them still in use. Section 3 exposes
automatic ways to detect some of them.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Gaming indicators</title>
      <p>Various kind of misconducts can be identi ed with regards to scienti c
publication. The interested reader may consult the Committee on Publication Ethics
(COPE) catalog1 which provides about 600 cases of such misconducts. Incentives
for such practices may arise from very various and personal reasons. The
following examples, intentionally leaving aside plagiarism, are chosen because they
may be seen as clear examples of behaviors that are driven towards indicator
manipulation.</p>
      <p>
        Gaming University Ranking. According to the US News and World Report, in
2014, the King Abdulaziz University (KAU) in Jeddah, Saudi Arabia, was ranked
7th in the top ten universities in the mathematics area. Regarding the ARWU
by subject eld, in mathematics, KAU was ranked 51-75 in 2012 and reached
the 6th position in 2015 (see gure 1). These results were achieved by literally
buying publications and citations [
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ]. This is done by recruiting massively
highly cited authors in a eld, hiring them as Distinguished Adjunct Professor
at KAU for them to list King Abdulaziz University as secondary a liation. Lior
Pastor reproduce2 an e-mail stating the terms and conditions for joining the
International A liation Program at KUA. These terms and conditions seem to
include, for example, a per month salary of $6 000 and a mandatory visit of
at least three weeks per year, KUA covering travel and living expenses for the
visits. This illustrates how university rankings can be manipulated.
Hacking peer-review process. So-called peer-review rings are used to bypass real
peer review and avoid rejection by gaining an easy and quick acceptation of
submitted papers [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Such peer-review rings have been brought to light by the
retractions of 64 articles in 10 Springer subscription journals3.
      </p>
      <p>
        Recently Retraction Watch reported a case where the peer review process
seems to have been used as a means to increase citations. Three papers were
retracted from a journal because the proportion of citations to these papers
were mostly from a single conference where an author of the retracted papers
was chairing the conference.
1 https://publicationethics.org/cases
2
https://liorpachter.wordpress.com/2014/10/31/to-some-a-citation-isworth-3-per-year
3
http://www.springer.com/gp/about-springer/media/statements/retractionof-articles-from-springer-journals/735218
Ike Antkare the shooting star [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Without any regular publications in any
conference proceedings, journal or other venue, for a few months, Ike Antkare4
was ranked at the top of the academic charts, featuring a better score than
Einstein and Turing. At this time, he was one of the most highly cited scientists
of the modern world having 100 publications each of which were citing all others
(including itself) together with an extra reference to another pseudo-document
(referenced as Ike Antkare's PhD [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]5) referencing only already indexed genuine
documents.
      </p>
      <p>Like a shooting star, Ike Antkare, was ranked directly in the 21st position of
the most highly cited scientists (dixit scholarometer). In 2010, this score was less
than Freud (1st position with a h-index of 183) but better than Einstein (36th
position). Ike Antkare was at the top of the charts in rather good company
getting well along with the Nobel price Paul Krugman, the inspiring Karl Marx
and other famous names of his own eld. Best of all, with regards to the hm-index
(which takes into account co-authorships to reward single-authored papers) Ike
Antkare was in sixth position outclassing all scientists in his eld (computer
science).</p>
      <p>
        Academic search engine optimization. A team of Spanish researchers
LopezCozar et al. reproduced a similar experiment [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] by making Google Scholar
indexing fake citations to their own publications. This study shows the impact
of such manipulation on their own h-index. They also show that the impact
factor computed by Google Scholar increases signi cantly for the venues
concerned by the injected fake citations. Logically it can be inferred that this is also
true for labs and universities hosting these researchers. Genuine, border-line and
un-recommended ways to increase the visibility of a particular work in Google
Scholar have been studied by Beel et al. in [
        <xref ref-type="bibr" rid="ref7 ref8">7,8</xref>
        ]. This so-called Academic search
engine optimization includes strategies ranging from making sure that the text
can be properly extracted from PDF les and gures to the insertion of hidden
references (white text over white background).
      </p>
      <p>
        Fake papers make it through peer review. Automatically/generated fake
scienti c papers were spotted in several venues where they should not have been
published, given the stringent process of selection they were supposed to have
gone through. More than 100 SCIgen papers have purely and simply vanished
from IEEE databases once they were exposed by Labbe and Labbe [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and
publicise by Van Noorden [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. These papers were accepted in peer-reviewed
conferences that sometimes claim an acceptance rate as strict as 28%. An example
is the SSME conference once indexed by the Web of knowledge and Scopus.
It was held in 2009 with 150 published papers. Among these 150 papers there
were four SCIgen papers and one duplicate: two papers having exactly the same
text but a di erent title. You have to think that these papers have been formally
4 to be interpreted as I can't care
5 This reference is not referencing any "real" scienti c publication, but the document
itself exists online. Details may be found in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]
reviewed... presented to the conference audience of roughly 150 people... and
discussed face to face, at least by a polite chair(wo)man. An investigation carried
out by the journalist Shuyang Chen6 shows that these papers were published
mainly to ful ll the quantitative goals assigned to academics by the Chinese
administration.
      </p>
      <p>
        The most recent example of such a paper is shown in gure 2. This paper [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]
is itself a very interesting paper because it is a mix of SCIgen text intermingled
with non-SCIgen text. It is also very interesting because authors are not from
China which is the place where this kind of paper usually comes from. This
paper remained unnoticed { and sold { for almost two years: the conference date
is August 2014 and it was retracted in March 2016.
      </p>
      <p>
        Paper mills and errors spreading. The use of paper mills and the possibility
that \assisted" manuscripts may be produced on a large scale seems to be more
and more evident [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Moreover, in growing cases the quality of the published
6 http://www.time-weekly.com/uploadfile/2014/0410/280.pdf english translation
available at http://membres-lig.imag.fr/labbe/TimeWeekly.pdf
results seems to be questionable. As example, IEEE is used to remove
conferences from IEEE Xplore. An online form7 can be used by authors of papers
published in removed conferences if they wish a con rmation of their copyright
ownership. According to the conferences impacted listed in this form more than
100 conferences are concerned.
      </p>
      <p>
        As another evidence [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] reports preliminary evidence that
education/biotechnology companies may be providing content pertaining to gene knockdown
experiments in human cancer cell lines to researchers based in China, who then
publish these results without disclosing their origin. This led to several
retractions of published papers [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>Conclusion. As the pressure to publish increases, scienti c information systems
{ going from social networks to peer reviewed venues { are getting increasingly
exposed to forged papers and papers containing errors. As a matter of fact, one
can nd them almost in every place where genuine scienti c papers can be found.
In this context automatic detection of such problematic publications becomes
mandatory to ensure systems credit and renown.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Automatic detection of dubious behavior</title>
      <p>Spotting dubious publications, dubious scienti c results, non-relevant
publications, citations or behavior is important to insure trust in science. The followings
are examples of attempts to automatically detect some of these behaviors.
Fake paper detection Several methods have been developed to automatically
identify SCIgen papers. For all of them, the rst step is to extract the text from
PDF les and then try to determine if this text is generated or not.</p>
      <p>
        For example, Xiong and Huang [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] detect SCIgen paper by checking whether
references, in the references section, are valid references. A reference is valid if
it already exists in a trusted database. Following this approach, a paper with
a large proportion of unidenti ed references will be suspected to be a SCIgen
paper.
      </p>
      <p>
        Lavoie and Krishnamoorthy in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] an ad-hoc similarity measure between
papers is de ned aiming at extracting particular features of generated texts.
In this measure the reference section plays a major role along with title and
keywords. This is why this method failed to detect papers generated for the Ike
Antkare experiment because of their very special references sections.
      </p>
      <p>
        Dalkilic et al. [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] method is based on observed compression factor and a
classi er. The goal in this study is more general than only detecting SCIgen
papers. The idea is based on the fact that randomly generated texts (called
inauthentic texts) do not have the same compression factor than non-random
texts.
7 https://www.ieee.org/conferences_events/conferences/publishing/author_
form.html
      </p>
      <p>
        Amancio [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] proposes a comparison of topological properties between
natural and generated texts, and Williams and Giles in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] studies the e ectiveness
of di erent measures to detect fake scienti c papers.
      </p>
      <p>
        Scienti c information systems are so exposed to SCIgen threat, that even a
premier open repository like ArXiv includes automated tests in order to detect
possible fake papers. Ginsparg [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] method relies on characterizing the statistical
distribution of a set of prede ned stop-words. It seems that the method is quite
e ective and operative, as not a single SCigen paper was ever reported being
"accepted" in ArXiv. This suggests that a well-managed open and non-peer
reviewed system contains less gibberish than an expensive fee-based service.
      </p>
      <p>
        Labbe's method [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] is based on inter-textual distance. For a text under
consideration, the distances between the text and some previously known SCIgen
are computed. When the SCIgen nearest neighbor is too close to the text under
consideration then this latter is classi ed as a SCIgen text. A demonstration
website for this method was set up and it soon started to be used quite heavily
by publishers to make sure they will not accept SCIgen paper. Springer
Nature funded the development of SciDetect an open-source software aiming at
detecting all kind of known generators8[
        <xref ref-type="bibr" rid="ref21 ref22">21,22</xref>
        ].
      </p>
      <p>
        Citations Analysis. Citation analysis is also a means to detect attempts to
manipulate indicators. For example, Bartneck and Servaas [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] investigates the
possibility to detect h-index manipulation through the analysis of self-citations.
On a similar topic, Herteliu et al. [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] shows that sometimes editors misbehavior
may be detectable trough quantitative citation analysis. Fister et al. [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] also
suggests that the analysis of Citation Cartels in citation networks could be of
some help. Such kind of technics could, for sure, be used to detect a complete
graph of citations such as the one used for the Ike Antkare experiments.
Errors detection. Errors within scienti c publications contribute to research
irreproducibility. To highlight errors or dubious publications, one can employ
automatic approaches to check the statistical validity of presented values as done
by Nuijten et al. [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
      </p>
      <p>
        Another approach is proposed by Labbe and Byrne [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] with the Seek &amp;
Blastn tools. This tool is a semi-automated tool that checks the claimed use of
nucleotide sequence reagents with indisputable facts from homology searches.
Figure 3 illustrates the kind of errors that can be detected. From a given
publication, Seek &amp; Blastn automatically extracts gene identi ers and nucleotide
sequences using named entity recognition techniques. The sentence containing
each sequence is automatically analyzed to assign a claimed status (targeting
or non-targeting) that is compared with the most likely status according to a
standard homology search.
      </p>
      <p>
        Preliminary use of Seek &amp; Blastn suggests that the incorrect use of nucleotide
sequence reagents may be frequently undetected and represents an
underestimated source of error in life science publications [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. Following this, J. Byrne
8 https://www.springer.com/gp/about-springer/media/press-releases/
corporate/scidetect/54166
Mismatch between affirmation in a paper and computed evidence
      </p>
      <p>PMID : 25262828
Materials and methods
.... A scrambled shRNA that shared
no homology with the mammalian
genome
(5’-CTAGCCCGGCCAAGGAAGTGCAATTGCATACTCGAGTATGCAATTGCACTTCCTTGGTTTTTTGTTAAT-3’)
was used as control.</p>
      <p>Blastn results
Query= CTAGCCCGGCCAAGGAAGTGCAATTGCATACTCGAG
TATGCAATTGCACTTCCTTGGTTTTTTGTTAAT
Length=68
Sequences producing significant alignments:
... ... ... ...
&gt; .... Homo sapiens NIN1/PSMD8 binding
protein 1 homolog (NOB1)...</p>
      <p>Length=1775
...</p>
      <p>Query 9</p>
      <p>GCCAAGGAAGTGCAATTGCATA 30
||||||||||||||||||||||
Sbjct 1505 GCCAAGGAAGTGCAATTGCATA 1526
....</p>
      <p>Query 37 TATGCAATTGCACTTCCTTGG 57</p>
      <p>||||||||||||||||||||||
Sbjct 1526 TATGCAATTGCACTTCCTTGG 1506
was named by nature as one of the 2017 Nature'10: 10 peoples who mattered in
science that year9.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>Through several emblematic case studies, we showed evidences of attempts to
game indicators. The presented automatic ways to detect these attempts may
be seen has using on the one hand bibliometrics techniques (citation analysis)
and/or information retrieval techniques on the other hand. This may not be too
surprising as one of the seminal goal of scientometrics is to be able to detect and
retrieve the most pertinent documents for a given set of users. The eld is based
on citations analysis stating, as predicate, that citations are the means by which
the most pertinent documents can be identi ed. Often, for information retrieval
the main material is the content of documents and it is assumed that this content
should be used to identi ed relevant documents. Having a similar goal, it can be
thus expected a mutual enrichment of these two families of techniques.</p>
      <p>As a matter of fact, such approaches are very e cient in identifying generated
papers, duplicated publications, plagiarism and other kind of misconduct. But
signi cant progress is still to be made to provide valuable support to allow peers
to identify and ag scienti c errors in both published and forthcoming scienti c
literature. This could be done by means of joint analysis of citation and text.
9 https://www.nature.com/immersive/d41586-017-07763-y/index.html#
jennifer-byrne
The developed technics would also be helpful to identifying literature that brings
new knowledge and expose breakthrough technologies.</p>
      <p>But the use of such tools is a `quick and dirty' response to misconduct
problems. The situation is like if a kind of spamming war started at the heart of
science. The phenomenon is taking place precisely at the very heart of science,
because knowledge di usion is at the heart of science too. It is a spamming war,
because exerting high pressure on scientists mechanically leads to too proli c
and less meaningful publications even if they are not non-sense.</p>
      <p>One can invoke the Goodhart's law or state that the act of measuring a
system results in that very system being disturbed. This adage is true in physics,
but also in computer science and, perhaps in scientometrics and bibliometrics: by
aiming at measuring science, these approaches are perturbing scienti c processes,
particularly when used for management purpose. The measurement of these
perturbations is also a future research track that needs deeper investigation and
may be within reach of bibliometrics and information retrieval technics.
Acknowledgement. The author would like to thank G. Cabanac for useful
comments, supports and intellectual stimulation.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bhattacharjee</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Saudi universities o er cash in exchange for academic prestige</article-title>
          .
          <source>Science</source>
          <volume>334</volume>
          (
          <issue>6061</issue>
          ) (
          <year>2011</year>
          )
          <volume>1344</volume>
          {
          <fpage>1345</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Bornmann</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bauer</surname>
          </string-name>
          , J.:
          <article-title>Which of the world's institutions employ the most highly cited researchers? an analysis of the data from highlycited.com</article-title>
          .
          <source>Journal of the Association for Information Science and Technology</source>
          <volume>66</volume>
          (
          <issue>10</issue>
          ) (
          <year>2015</year>
          )
          <volume>2146</volume>
          {
          <fpage>2148</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Ferguson</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marcus</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oransky</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Publishing: The peer-review scam</article-title>
          .
          <source>Nature</source>
          <volume>515</volume>
          (
          <issue>7528</issue>
          ) (
          <year>2014</year>
          )
          <volume>480</volume>
          {
          <fpage>482</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Labbe</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Ike antkare, one of the great stars in the scienti c rmament</article-title>
          .
          <source>International Society for Scientometrics and Informetrics Newsletter</source>
          <volume>6</volume>
          (
          <issue>2</issue>
          ) (
          <year>June 2010</year>
          )
          <volume>48</volume>
          {
          <fpage>52</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Antkare</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Architecting E-Business Using Psychoacoustic Modalities</article-title>
          .
          <source>PhD thesis</source>
          , United Saints of Earth (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Lopez-Cozar</surname>
            ,
            <given-names>E.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Robinson-Garcia</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torres-Salinas</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>The Google Scholar experiment: How to index false papers and manipulate bibliometric indicators</article-title>
          .
          <source>Journal of the Association for Information Science and Technology</source>
          <volume>65</volume>
          (
          <issue>3</issue>
          ) (
          <year>2013</year>
          )
          <volume>446</volume>
          {
          <fpage>454</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Beel</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gipp</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Academic search engine spam and Google Scholar's resilience against it</article-title>
          .
          <source>Journal of Electronic Publishing</source>
          <volume>13</volume>
          (
          <issue>3</issue>
          ) (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Beel</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gipp</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wilde</surname>
          </string-name>
          , E.:
          <article-title>Academic search engine optimization (ASEO)</article-title>
          .
          <source>Journal of scholarly publishing 41(2)</source>
          (
          <year>2010</year>
          )
          <volume>176</volume>
          {
          <fpage>190</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Labbe</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Labbe</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Duplicate and fake publications in the scienti c literature: how many SCIgen papers in computer science</article-title>
          ?
          <source>Scientometrics</source>
          <volume>94</volume>
          (
          <issue>1</issue>
          ) (
          <year>2013</year>
          )
          <volume>379</volume>
          {
          <fpage>396</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Noorden</surname>
            ,
            <given-names>R.V.</given-names>
          </string-name>
          :
          <article-title>Publishers withdraw more than 120 gibberish papers</article-title>
          .
          <source>Nature (February</source>
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Analyzing</surname>
          </string-name>
          e
          <article-title>-commerce process</article-title>
          .
          <source>Volume 2014 International Conference on Advances in Communication and Computing Technologies (ICACACT)</source>
          .,
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>August 2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Hvistendahl</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>China's publication bazaar</article-title>
          .
          <source>Science</source>
          <volume>342</volume>
          (
          <issue>6162</issue>
          ) (
          <year>2013</year>
          )
          <volume>1035</volume>
          {
          <fpage>1039</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Byrne</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Labbe</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Striking similarities between publications from China describing single gene knockdown experiments in human cancer cell lines</article-title>
          .
          <source>Scientometrics</source>
          <volume>110</volume>
          (
          <issue>3</issue>
          ) (
          <year>Mar 2017</year>
          )
          <volume>1471</volume>
          {
          <fpage>1493</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ning</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Retracted: siRNA mediated silencing of NIN1/RPN12 binding protein 1 homolog inhibits proliferation and growth of breast cancer cells</article-title>
          .
          <source>Asian Pac J Cancer</source>
          <volume>18</volume>
          (
          <issue>10</issue>
          ) (Oct 27
          <year>2017</year>
          )
          <volume>2891</volume>
          {
          <fpage>2891</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Xiong</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>An e ective method to identify machine automatically generated paper</article-title>
          .
          <source>In: Paci c-Asia Conference on Knowledge Engineering and Software Engineering</source>
          ,
          <year>2009</year>
          . KESE '
          <fpage>09</fpage>
          . (
          <year>2009</year>
          )
          <volume>101</volume>
          {
          <fpage>102</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Lavoie</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krishnamoorthy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Algorithmic Detection of Computer Generated Text</article-title>
          . ArXiv e-prints (
          <year>August 2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Dalkilic</surname>
            ,
            <given-names>M.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Clark</surname>
          </string-name>
          , W.T.,
          <string-name>
            <surname>Costello</surname>
            ,
            <given-names>J.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Radivojac</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Using compression to identify classes of inauthentic texts</article-title>
          .
          <source>In: Proceedings of the 2006 SIAM Conference on Data Mining</source>
          . (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Amancio</surname>
            ,
            <given-names>D.R.</given-names>
          </string-name>
          :
          <article-title>Comparing the topological properties of real and arti cially generated scienti c manuscripts</article-title>
          .
          <source>Scientometrics</source>
          <volume>105</volume>
          (
          <issue>3</issue>
          ) (
          <year>December 2015</year>
          )
          <volume>1763</volume>
          {
          <fpage>1779</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Williams</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giles</surname>
            ,
            <given-names>C.L.</given-names>
          </string-name>
          :
          <article-title>On the use of similarity search to detect fake scienti c papers</article-title>
          .
          <source>In: Similarity Search and Applications - 8th International Conference</source>
          , SISAP. (
          <year>2015</year>
          )
          <volume>332</volume>
          {
          <fpage>338</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Ginsparg</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          : Automated screening:
          <article-title>ArXiv screens spot fake papers</article-title>
          .
          <source>Nature</source>
          <volume>508</volume>
          (
          <issue>7494</issue>
          ) (
          <year>04 2014</year>
          )
          <volume>44</volume>
          {
          <fpage>44</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Nguyen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Labbe</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Engineering a tool to detect automatically generated papers</article-title>
          .
          <source>In: Proceedings of the Third Workshop on Bibliometric-enhanced Information Retrieval co-located with the 38th European Conference on Information Retrieval (ECIR</source>
          <year>2016</year>
          ), Padova, Italy, March
          <volume>20</volume>
          ,
          <year>2016</year>
          . (
          <year>2016</year>
          )
          <volume>54</volume>
          {
          <fpage>62</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Nguyen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Labbe</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Detecting automatically generated sentences with grammatical structure similarity</article-title>
          .
          <source>In: Proceedings of the Fifth Workshop on Bibliometricenhanced Information Retrieval (BIR) co-located with the 39th European Conference on Information Retrieval (ECIR</source>
          <year>2017</year>
          ), Aberdeen, UK,
          <year>April 9th</year>
          ,
          <year>2017</year>
          . (
          <year>2017</year>
          )
          <volume>73</volume>
          {
          <fpage>84</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Bartneck</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Servaas</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Detecting</surname>
          </string-name>
          h
          <article-title>-index manipulation through self-citation analysis</article-title>
          .
          <source>Scientometrics</source>
          <volume>87</volume>
          (
          <issue>1</issue>
          ) (
          <year>2011</year>
          )
          <volume>85</volume>
          {
          <fpage>98</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Herteliu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ausloos</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ileanu</surname>
            ,
            <given-names>B.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rotundo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Andrei</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Quantitative and qualitative analysis of editor behavior through potentially coercive citations</article-title>
          .
          <source>Publications</source>
          <volume>5</volume>
          (
          <issue>2</issue>
          ) (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Fister</surname>
          </string-name>
          jr, I.,
          <string-name>
            <surname>Fister</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Perc</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Toward the discovery of citation cartels in citation networks</article-title>
          .
          <volume>4</volume>
          (
          <issue>12</issue>
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Nuijten</surname>
            ,
            <given-names>M.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hartgerink</surname>
            ,
            <given-names>C.H.J.</given-names>
          </string-name>
          , van Assen,
          <string-name>
            <given-names>M.A.L.M.</given-names>
            ,
            <surname>Epskamp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Wicherts</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.M.:</surname>
          </string-name>
          <article-title>The prevalence of statistical reporting errors in psychology (</article-title>
          <year>1985</year>
          {
          <year>2013</year>
          ).
          <source>Behavior Research Methods</source>
          <volume>48</volume>
          (
          <issue>4</issue>
          ) (
          <year>Dec 2016</year>
          )
          <volume>1205</volume>
          {
          <fpage>1226</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Byrne</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Labbe</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Fact checking nucleotide sequences in life science publications: The seek &amp; blastn tool</article-title>
          . In:
          <article-title>International Congress on Peer Review and Scienti c Publication, Enhancing the quality and credibility of science</article-title>
          , Chicago (
          <year>September 2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Altschul</surname>
            ,
            <given-names>S.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gish</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Myers</surname>
            ,
            <given-names>E.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lipman</surname>
            ,
            <given-names>D.J.:</given-names>
          </string-name>
          <article-title>Basic local alignment search tool</article-title>
          .
          <source>Journal of Molecular Biology</source>
          <volume>215</volume>
          (
          <issue>3</issue>
          ) (
          <year>1990</year>
          )
          <volume>403</volume>
          {
          <fpage>410</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Phillips</surname>
          </string-name>
          , N.:
          <article-title>Online software spots genetic errors in cancer papers</article-title>
          .
          <source>Nature</source>
          <volume>551</volume>
          (
          <issue>7681</issue>
          ) (
          <year>2017</year>
          )
          <volume>422</volume>
          {
          <fpage>423</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>