Filters








15 Hits in 9.4 sec

Citation pattern matching algorithms for citation-based plagiarism detection

Bela Gipp, Norman Meuschke
2011 Proceedings of the 11th ACM symposium on Document engineering - DocEng '11  
The algorithms are coined Greedy Citation Tiling, Citation Chunking and Longest Common Citation Sequence.  ...  This paper introduces three algorithms and discusses their suitability for the purpose of Citation-based Plagiarism Detection.  ...  Citation Pattern Matching Algorithms for Citation-based Plagiarism Detection: Greedy Citation Tiling, Citation Chunking and Longest Common Citation Sequence.  ... 
doi:10.1145/2034691.2034741 dblp:conf/doceng/GippM11 fatcat:lsrliasw55ditdlprqygi46lyu

Citation-based Plagiarism Detection [chapter]

Bela Gipp
2014 Citation-based Plagiarism Detection  
Text matching approaches continue to be suitable for detecting copy&paste plagiarism, even for short passages.  ...  In contrast to the existing approaches for Plagiarism Detection, Citation-based Plagiarism Detection compares the occurrences of citations in order to identify similarities.  ...  Greedy String/Citation Tiling aims to identify all matching substrings with individually longest possible size in two sequences.  ... 
doi:10.1007/978-3-658-06394-8_4 fatcat:mnoijds7o5gs7cxw3c3a2rgaqy

Demonstration of citation pattern analysis for plagiarism detection

Bela Gipp, Norman Meuschke, Corinna Breitinger, Mario Lipinski, Andreas Nürnberger
2013 Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval - SIGIR '13  
Figure 1: Screenshot of CbPD prototype (left plagiarized translation, right source document)  ...  Acknowledgements We wish to acknowledge André Gernandt, Leif Timm, Markus Bruns, Markus Föllmer and Rebecca Böttche for their contributions.  ...  Greedy Citation Tiling (GCT) and Longest Common Citation Sequence (LCCS).  ... 
doi:10.1145/2484028.2484214 dblp:conf/sigir/GippMBLN13 fatcat:5lckq6xcnfgfbf24xl7gl567ye

CitePlag: A Citation-based Plagiarism Detection System Prototype

Norman Meuschke, Bela Gipp, Corinna Breitinger
2012 Zenodo  
CitePlag uses three different detection algorithms that analyze the citation sequence of academic documents for similar patterns that may indicate unduly used foreign text or ideas.  ...  This paper presents an open-source prototype of a citation-based plagiarism detection system called CitePlag.  ...  Citation Pattern Analysis Algorithms In [14] , we proposed three pattern analysis algorithms for citation sequences termed Longest Common Citation Sequence, Citation Tiling and Citation Chunking.  ... 
doi:10.5281/zenodo.3483088 fatcat:yhca34lyn5eszajwkjcfi4dso4

Analyzing Non-Textual Content Elements to Detect Academic Plagiarism

Norman Meuschke, Bela Gipp, Harald Reiterer, Michael L. Nelson
2021 Zenodo  
Subsequently, the thesis summarizes work that initiated the research on analyzing non-textual content elements to detect academic plagiarism by studying citation patterns in academic documents.  ...  To demonstrate the benefit of combining non-textual and text-based detection methods, the thesis describes the first plagiarism detection system that integrates th [...]  ...  To identify citation patterns, we currently use well-established sequence-based pattern detection methods, such as the Longest Common Subsequence and Greedy Tiling algorithms.  ... 
doi:10.5281/zenodo.4913344 fatcat:xmpaahvwuva53l5l5i2gaidvi4

Citation-based plagiarism detection: Practicability on a large-scale scientific corpus

Bela Gipp, Norman Meuschke, Corinna Breitinger
2014 Journal of the Association for Information Science and Technology  
Our evaluation shows that the citation-based approach achieves superior ranking performance for heavily disguised plagiarism forms.  ...  A recently proposed language-independent approach to plagiarism detection, Citation-based Plagiarism Detection (CbPD), allows the detection of semantic similarity even in the absence of text overlap by  ...  Acknowledgments We acknowledge Mario Lipinski, André Gernandt, Leif Timm, Markus Bruns, Markus Föllmer, and Rebecca Böttche for their contributions to improving the CitePlag prototype.  ... 
doi:10.1002/asi.23228 fatcat:4dgqulgwobhkbeafedqeov26ai

Comparing and combining Content- and Citation-based approaches for plagiarism detection

Solange de L. Pertile, Viviane P. Moreira, Paolo Rosso
2015 Journal of the Association for Information Science and Technology  
Comparing and Combining Content-and Citation-based Approaches for Plagiarism Detection.  ...  In this context, the contributions of this paper are twofold: (i) we survey the existing approaches for plagiarism detection based on content, based on content and structure, and based on citations and  ...  Finally, we thank the voluntary annotators, for identifying the significant reuse cases.  ... 
doi:10.1002/asi.23593 fatcat:muxoetm4zvdnhc3q63enfvdamy

HyPlag

Norman Meuschke, Vincent Stange, Moritz Schubotz, Bela Gipp
2018 The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval - SIGIR '18  
To improve upon the detection capabilities for such concealed content reuse in academic publications, we make four contributions: i) We present the first plagiarism detection approach that combines the  ...  Current plagiarism detection systems reliably find instances of copied and moderately altered text, but often fail to detect strong paraphrases, translations, and the reuse of non-textual content and ideas  ...  Greedy Citation Tiling (GCT) identifies all individually longest matching substrings of citations in two documents ('citation tiles'), i.e., all blocks of consecutive shared citations in identical order  ... 
doi:10.1145/3209978.3210177 dblp:conf/sigir/MeuschkeSSG18 fatcat:2cxpupoftfcqvej3bttv2ctpyq

Data Fraud Detection: A First General Perspective [chapter]

Hans -J. Lenz
2015 Lecture Notes in Business Information Processing  
We consider four main areas of data fraud: spy out, plagiarism, manipulation and fabrication of data. Of course, there is not only interest on data fraud itself but on its detection, too.  ...  It is a matter of fact that the interest and need of science, business and governmental authorities is increasing over time for improving tests of data fraud detection.  ...  longest citation patterns consisting entirely of matching citations in the exact same order -Longest Common Citation Sequence searches for the longest string of citations matching in both documents in  ... 
doi:10.1007/978-3-319-22348-3_2 fatcat:vkij6zywjjahbbagb35thnsypa

Plagiarism Detection for Indonesian Texts

Lucia D. Krisnawati, Klaus U. Schulz
2013 Proceedings of International Conference on Information Integration and Web-based Applications & Services - IIWAS '13  
This is to address the drawback of the passage boundary detection. 3 .  ...  Titien Saraswati for her generosity for consenting her articles to be included in our evaluation corpus. I also thank my mother, brothers and sister for their moral and spiritual support.  ...  These algorithms are Longest Common Citation Sequence, Greedy Citation Tiling, and Citation Chunking which consider whether the seed order is preserved or ignored and whether the match is done locally  ... 
doi:10.1145/2539150.2539213 dblp:conf/iiwas/KrisnawatiS13 fatcat:r6p2h4oiq5fi3mhlazokatknrq

Citation-based Plagiarism Detection - applying citation pattern analysis to identify currently non-machine-detectible disguised plagiarism in scientific publications [article]

Béla Gipp, Universitäts- Und Landesbibliothek Sachsen-Anhalt, Martin-Luther Universität, Andreas Nürnberger
2018
Acknowledgements 1 Refer to Section 2.1.1, page 10, for a definition of plagiarism.  ...  To enable effective and efficient detection of the different plagiarism forms, we designed and implemented three classes of detection algorithms: Longest Common Citation Sequence, Greedy Citation Tiling  ...  To cover the different forms of plagiarism and the resulting citation pattern characteristics, three classes of CbPD algorithms were introduced: Longest Common Citation Sequence, Greedy Citation Tiling  ... 
doi:10.25673/4083 fatcat:zkeonqwdpvgxpnab2wzxnbym7m

A First Step Towards Content Protecting Plagiarism Detection [article]

Cornelius Ihle, Moritz Schubotz, Norman Meuschke, Bela Gipp
2020 pre-print
Plagiarism detection systems are essential tools for safeguarding academic and educational integrity.  ...  Specifically, we employ Private Set Intersection to devise a content-protecting variant of the citation-based similarity measure Bibliographic Coupling implemented in our plagiarism detection system HyPlag  ...  In this initial study, we focused entirely on Bibliographic Coupling and excluded more sophisticated citation-based plagiarism detection methods like Greedy Citation Tiling and Longest Common Citation  ... 
doi:10.1145/3383583.3398620 arXiv:2005.11504v1 fatcat:vna6jk7mv5clvotor6nkqemua4

Number 2 in Bratislava on

P Kapec, J Sedláèková, L Holík, M Bieliková, P Návrat, F Burda, R Èapla, Mária Bieliková, Johann, Viliam Geffert, Tomáš Hruška, Robert Lorencz (+9 others)
2011 unpublished
To allow filtering we have developed a query mechanism in which queries are hypergraph patterns and results are also hy-pergraphs.  ...  ACM Slovakia offers a forum for rapid dissemination of research results in the area of computing/informatics and more broadly of information and communication sciences and technologies.  ...  VG1/0675/11, and it is the partial result of the Research & Development Operational Programme for the project Research of methods for acquisition, analysis and personalized conveying of information and  ... 
fatcat:tffudrv5wvbtlm5niabbp6wcbe

The public domain: enclosing the commons of the mind

2009 ChoiceReviews  
If I take the words of Shakespeare or Dickens and pass them off as my own, I am committing plagiarism but certainly not copyright infringement, for even under today's rules those works have long since  ...  Plagiarism is the moral, academic, or professional sin of taking ideas, facts or expression and passing them off as your own.  ...  The formulae, algorithms, and scientific discoveries on which the patented invention was based remained in the public domain for all to use.  ... 
doi:10.5860/choice.46-6473 fatcat:xnktaofvfvb3fhdngfjgq2ph74

Time-dependent recommender systems for the prediction of appropriate learning objects

Christopher Krauß, Technische Universität Berlin, Technische Universität Berlin, Manfred Hauswirth
2018
The special conditions of this paradigm are first investigated and then taken into account for the realization of new algorithms.  ...  Thereby, Recommender Systems play a key role in supporting the user's decision process for items of interest. This works very well for e-commerce and Video on Demand services.  ...  Of course, a self-citation also helps to avoid redundant writings about topics that are already published and indirectly, avoids self-plagiarism, as well. [195] . c mmb Institut GmbH 2016 B.3.  ... 
doi:10.14279/depositonce-7119 fatcat:dfgn47my2vcsli45f3nxmlgpry