{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:IZ4A6AI5HEFENUV2ZRZ35BABSZ","short_pith_number":"pith:IZ4A6AI5","schema_version":"1.0","canonical_sha256":"46780f011d390a46d2bacc73be84019662c80aa837c53260c651087d84bacca1","source":{"kind":"arxiv","id":"1904.08783","version":1},"attestation_state":"computed","paper":{"title":"Evaluating the Underlying Gender Bias in Contextualized Word Embeddings","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LG"],"primary_cat":"cs.CL","authors_text":"Christine Basta, Marta R. Costa-juss\\`a, Noe Casas","submitted_at":"2019-04-18T13:47:00Z","abstract_excerpt":"Gender bias is highly impacting natural language processing applications. Word embeddings have clearly been proven both to keep and amplify gender biases that are present in current data sources. Recently, contextualized word embeddings have enhanced previous word embedding techniques by computing word vector representations dependent on the sentence they appear in.\n  In this paper, we study the impact of this conceptual change in the word embedding computation in relation with gender bias. Our analysis includes different measures previously applied in the literature to standard word embedding"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1904.08783","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CL","submitted_at":"2019-04-18T13:47:00Z","cross_cats_sorted":["cs.LG"],"title_canon_sha256":"81b7d7592e72f4cc86042141485cb063dc98b17701e7ee7b2bae9058c64807d8","abstract_canon_sha256":"80bc5b720148556e9c98bd772c82ad30b7b63ac77664369f6482460435bfd1a2"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:48:12.943803Z","signature_b64":"QJIMPCKpbjln6VMIjg/5Vq6RThpP3REnKgm30kPar/sm1Ao5meAkcAqvBSgXD8Bd+qAt5b2D9bNRR8sZMltEDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"46780f011d390a46d2bacc73be84019662c80aa837c53260c651087d84bacca1","last_reissued_at":"2026-05-17T23:48:12.943126Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:48:12.943126Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Evaluating the Underlying Gender Bias in Contextualized Word Embeddings","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LG"],"primary_cat":"cs.CL","authors_text":"Christine Basta, Marta R. Costa-juss\\`a, Noe Casas","submitted_at":"2019-04-18T13:47:00Z","abstract_excerpt":"Gender bias is highly impacting natural language processing applications. Word embeddings have clearly been proven both to keep and amplify gender biases that are present in current data sources. Recently, contextualized word embeddings have enhanced previous word embedding techniques by computing word vector representations dependent on the sentence they appear in.\n  In this paper, we study the impact of this conceptual change in the word embedding computation in relation with gender bias. Our analysis includes different measures previously applied in the literature to standard word embedding"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1904.08783","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1904.08783","created_at":"2026-05-17T23:48:12.943228+00:00"},{"alias_kind":"arxiv_version","alias_value":"1904.08783v1","created_at":"2026-05-17T23:48:12.943228+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1904.08783","created_at":"2026-05-17T23:48:12.943228+00:00"},{"alias_kind":"pith_short_12","alias_value":"IZ4A6AI5HEFE","created_at":"2026-05-18T12:33:18.533446+00:00"},{"alias_kind":"pith_short_16","alias_value":"IZ4A6AI5HEFENUV2","created_at":"2026-05-18T12:33:18.533446+00:00"},{"alias_kind":"pith_short_8","alias_value":"IZ4A6AI5","created_at":"2026-05-18T12:33:18.533446+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":2,"internal_anchor_count":0,"sample":[{"citing_arxiv_id":"2209.07858","citing_title":"Red Teaming Language Models to Reduce Harms: Methods, Scaling Behaviors, and Lessons Learned","ref_index":7,"is_internal_anchor":false},{"citing_arxiv_id":"2605.04127","citing_title":"Position: the Stochastic Parrot in the Coal Mine. Model Collapse is a Threat to Low-Resource Communities","ref_index":1,"is_internal_anchor":false}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/IZ4A6AI5HEFENUV2ZRZ35BABSZ","json":"https://pith.science/pith/IZ4A6AI5HEFENUV2ZRZ35BABSZ.json","graph_json":"https://pith.science/api/pith-number/IZ4A6AI5HEFENUV2ZRZ35BABSZ/graph.json","events_json":"https://pith.science/api/pith-number/IZ4A6AI5HEFENUV2ZRZ35BABSZ/events.json","paper":"https://pith.science/paper/IZ4A6AI5"},"agent_actions":{"view_html":"https://pith.science/pith/IZ4A6AI5HEFENUV2ZRZ35BABSZ","download_json":"https://pith.science/pith/IZ4A6AI5HEFENUV2ZRZ35BABSZ.json","view_paper":"https://pith.science/paper/IZ4A6AI5","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1904.08783&json=true","fetch_graph":"https://pith.science/api/pith-number/IZ4A6AI5HEFENUV2ZRZ35BABSZ/graph.json","fetch_events":"https://pith.science/api/pith-number/IZ4A6AI5HEFENUV2ZRZ35BABSZ/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/IZ4A6AI5HEFENUV2ZRZ35BABSZ/action/timestamp_anchor","attest_storage":"https://pith.science/pith/IZ4A6AI5HEFENUV2ZRZ35BABSZ/action/storage_attestation","attest_author":"https://pith.science/pith/IZ4A6AI5HEFENUV2ZRZ35BABSZ/action/author_attestation","sign_citation":"https://pith.science/pith/IZ4A6AI5HEFENUV2ZRZ35BABSZ/action/citation_signature","submit_replication":"https://pith.science/pith/IZ4A6AI5HEFENUV2ZRZ35BABSZ/action/replication_record"}},"created_at":"2026-05-17T23:48:12.943228+00:00","updated_at":"2026-05-17T23:48:12.943228+00:00"}