A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Citation pattern matching algorithms for citation-based plagiarism detection
2011
Proceedings of the 11th ACM symposium on Document engineering - DocEng '11
The algorithms are coined Greedy Citation Tiling, Citation Chunking and Longest Common Citation Sequence. ...
This paper introduces three algorithms and discusses their suitability for the purpose of Citation-based Plagiarism Detection. ...
Citation Pattern Matching Algorithms for Citation-based Plagiarism Detection: Greedy Citation Tiling, Citation Chunking and Longest Common Citation Sequence. ...
doi:10.1145/2034691.2034741
dblp:conf/doceng/GippM11
fatcat:lsrliasw55ditdlprqygi46lyu
Citation-based Plagiarism Detection
[chapter]
2014
Citation-based Plagiarism Detection
Text matching approaches continue to be suitable for detecting copy&paste plagiarism, even for short passages. ...
In contrast to the existing approaches for Plagiarism Detection, Citation-based Plagiarism Detection compares the occurrences of citations in order to identify similarities. ...
Greedy String/Citation Tiling aims to identify all matching substrings with individually longest possible size in two sequences. ...
doi:10.1007/978-3-658-06394-8_4
fatcat:mnoijds7o5gs7cxw3c3a2rgaqy
Demonstration of citation pattern analysis for plagiarism detection
2013
Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval - SIGIR '13
Figure 1: Screenshot of CbPD prototype (left plagiarized translation, right source document) ...
Acknowledgements We wish to acknowledge André Gernandt, Leif Timm, Markus Bruns, Markus Föllmer and Rebecca Böttche for their contributions. ...
Greedy Citation Tiling (GCT) and Longest Common Citation Sequence (LCCS). ...
doi:10.1145/2484028.2484214
dblp:conf/sigir/GippMBLN13
fatcat:5lckq6xcnfgfbf24xl7gl567ye
CitePlag: A Citation-based Plagiarism Detection System Prototype
2012
Zenodo
CitePlag uses three different detection algorithms that analyze the citation sequence of academic documents for similar patterns that may indicate unduly used foreign text or ideas. ...
This paper presents an open-source prototype of a citation-based plagiarism detection system called CitePlag. ...
Citation Pattern Analysis Algorithms In [14] , we proposed three pattern analysis algorithms for citation sequences termed Longest Common Citation Sequence, Citation Tiling and Citation Chunking. ...
doi:10.5281/zenodo.3483088
fatcat:yhca34lyn5eszajwkjcfi4dso4
Analyzing Non-Textual Content Elements to Detect Academic Plagiarism
2021
Zenodo
Subsequently, the thesis summarizes work that initiated the research on analyzing non-textual content elements to detect academic plagiarism by studying citation patterns in academic documents. ...
To demonstrate the benefit of combining non-textual and text-based detection methods, the thesis describes the first plagiarism detection system that integrates th [...] ...
To identify citation patterns, we currently use well-established sequence-based pattern detection methods, such as the Longest Common Subsequence and Greedy Tiling algorithms. ...
doi:10.5281/zenodo.4913344
fatcat:xmpaahvwuva53l5l5i2gaidvi4
Citation-based plagiarism detection: Practicability on a large-scale scientific corpus
2014
Journal of the Association for Information Science and Technology
Our evaluation shows that the citation-based approach achieves superior ranking performance for heavily disguised plagiarism forms. ...
A recently proposed language-independent approach to plagiarism detection, Citation-based Plagiarism Detection (CbPD), allows the detection of semantic similarity even in the absence of text overlap by ...
Acknowledgments We acknowledge Mario Lipinski, André Gernandt, Leif Timm, Markus Bruns, Markus Föllmer, and Rebecca Böttche for their contributions to improving the CitePlag prototype. ...
doi:10.1002/asi.23228
fatcat:4dgqulgwobhkbeafedqeov26ai
Comparing and combining Content- and Citation-based approaches for plagiarism detection
2015
Journal of the Association for Information Science and Technology
Comparing and Combining Content-and Citation-based Approaches for Plagiarism Detection. ...
In this context, the contributions of this paper are twofold: (i) we survey the existing approaches for plagiarism detection based on content, based on content and structure, and based on citations and ...
Finally, we thank the voluntary annotators, for identifying the significant reuse cases. ...
doi:10.1002/asi.23593
fatcat:muxoetm4zvdnhc3q63enfvdamy
HyPlag
2018
The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval - SIGIR '18
To improve upon the detection capabilities for such concealed content reuse in academic publications, we make four contributions: i) We present the first plagiarism detection approach that combines the ...
Current plagiarism detection systems reliably find instances of copied and moderately altered text, but often fail to detect strong paraphrases, translations, and the reuse of non-textual content and ideas ...
Greedy Citation Tiling (GCT) identifies all individually longest matching substrings of citations in two documents ('citation tiles'), i.e., all blocks of consecutive shared citations in identical order ...
doi:10.1145/3209978.3210177
dblp:conf/sigir/MeuschkeSSG18
fatcat:2cxpupoftfcqvej3bttv2ctpyq
Data Fraud Detection: A First General Perspective
[chapter]
2015
Lecture Notes in Business Information Processing
We consider four main areas of data fraud: spy out, plagiarism, manipulation and fabrication of data. Of course, there is not only interest on data fraud itself but on its detection, too. ...
It is a matter of fact that the interest and need of science, business and governmental authorities is increasing over time for improving tests of data fraud detection. ...
longest citation patterns consisting entirely of matching citations in the exact same order -Longest Common Citation Sequence searches for the longest string of citations matching in both documents in ...
doi:10.1007/978-3-319-22348-3_2
fatcat:vkij6zywjjahbbagb35thnsypa
Plagiarism Detection for Indonesian Texts
2013
Proceedings of International Conference on Information Integration and Web-based Applications & Services - IIWAS '13
This is to address the drawback of the passage boundary detection. 3 . ...
Titien Saraswati for her generosity for consenting her articles to be included in our evaluation corpus. I also thank my mother, brothers and sister for their moral and spiritual support. ...
These algorithms are Longest Common Citation Sequence, Greedy Citation Tiling, and Citation Chunking which consider whether the seed order is preserved or ignored and whether the match is done locally ...
doi:10.1145/2539150.2539213
dblp:conf/iiwas/KrisnawatiS13
fatcat:r6p2h4oiq5fi3mhlazokatknrq
Citation-based Plagiarism Detection - applying citation pattern analysis to identify currently non-machine-detectible disguised plagiarism in scientific publications
[article]
2018
Acknowledgements 1 Refer to Section 2.1.1, page 10, for a definition of plagiarism. ...
To enable effective and efficient detection of the different plagiarism forms, we designed and implemented three classes of detection algorithms: Longest Common Citation Sequence, Greedy Citation Tiling ...
To cover the different forms of plagiarism and the resulting citation pattern characteristics, three classes of CbPD algorithms were introduced: Longest Common Citation Sequence, Greedy Citation Tiling ...
doi:10.25673/4083
fatcat:zkeonqwdpvgxpnab2wzxnbym7m
A First Step Towards Content Protecting Plagiarism Detection
[article]
2020
pre-print
Plagiarism detection systems are essential tools for safeguarding academic and educational integrity. ...
Specifically, we employ Private Set Intersection to devise a content-protecting variant of the citation-based similarity measure Bibliographic Coupling implemented in our plagiarism detection system HyPlag ...
In this initial study, we focused entirely on Bibliographic Coupling and excluded more sophisticated citation-based plagiarism detection methods like Greedy Citation Tiling and Longest Common Citation ...
doi:10.1145/3383583.3398620
arXiv:2005.11504v1
fatcat:vna6jk7mv5clvotor6nkqemua4
Number 2 in Bratislava on
2011
unpublished
To allow filtering we have developed a query mechanism in which queries are hypergraph patterns and results are also hy-pergraphs. ...
ACM Slovakia offers a forum for rapid dissemination of research results in the area of computing/informatics and more broadly of information and communication sciences and technologies. ...
VG1/0675/11, and it is the partial result of the Research & Development Operational Programme for the project Research of methods for acquisition, analysis and personalized conveying of information and ...
fatcat:tffudrv5wvbtlm5niabbp6wcbe
The public domain: enclosing the commons of the mind
2009
ChoiceReviews
If I take the words of Shakespeare or Dickens and pass them off as my own, I am committing plagiarism but certainly not copyright infringement, for even under today's rules those works have long since ...
Plagiarism is the moral, academic, or professional sin of taking ideas, facts or expression and passing them off as your own. ...
The formulae, algorithms, and scientific discoveries on which the patented invention was based remained in the public domain for all to use. ...
doi:10.5860/choice.46-6473
fatcat:xnktaofvfvb3fhdngfjgq2ph74
Time-dependent recommender systems for the prediction of appropriate learning objects
2018
The special conditions of this paradigm are first investigated and then taken into account for the realization of new algorithms. ...
Thereby, Recommender Systems play a key role in supporting the user's decision process for items of interest. This works very well for e-commerce and Video on Demand services. ...
Of course, a self-citation also helps to avoid redundant writings about topics that are already published and indirectly, avoids self-plagiarism, as well. [195] . c mmb Institut GmbH 2016
B.3. ...
doi:10.14279/depositonce-7119
fatcat:dfgn47my2vcsli45f3nxmlgpry