Filters








181 Hits in 7.2 sec

Dynamic Thresholding Mechanisms for IR-Based Filtering in Efficient Source Code Plagiarism Detection [article]

Oscar Karnalim, Lisan Sulistiani
2018 arXiv   pre-print
To solve time inefficiency issue, only potential pairs are compared in string-matching-based source code plagiarism detection; wherein potentiality is defined through a fast-yet-order-insensitive similarity  ...  This paper proposes two thresholding mechanisms---namely range-based and pair-count-based mechanism---that dynamically tune the threshold based on the distribution of resulted similarity degrees.  ...  P CM (in) = in * total pairs (2) For our case study, both thresholding mechanisms will be applied on an efficiency-oriented hybrid source code plagiarism detection, which works in fourfold (see Fig. 1  ... 
arXiv:1810.11903v1 fatcat:mp5gpra7ybc7hlqe7me5bcqnqm

Plagiarism Detection for Indonesian Texts

Lucia D. Krisnawati, Klaus U. Schulz
2013 Proceedings of International Conference on Information Integration and Web-based Applications & Services - IIWAS '13  
I thank you for all my friends who were invloved in the crowd-sourcing, especially for Eddy Hadisaputro, Esti Wardhani, Tirta Wulandari, Ade Umar Said, Sri Rahayu, and Manila Kristin who worked more for  ...  We plan to improve seed alignment by regarding the offsets of sentences in which the seeds occur. This is to address the drawback of the passage boundary detection. 3 .  ...  During 1970s, Ottenstein developed an algorithm to detect code plagiarism for FORTRAN source code [115] , while a tool for detecting plagiarism in Pascal was developed some years later by Sam in 1981,  ... 
doi:10.1145/2539150.2539213 dblp:conf/iiwas/KrisnawatiS13 fatcat:r6p2h4oiq5fi3mhlazokatknrq

Explanation in Code Similarity Investigation

Oscar Karnalim, Simon
2021 IEEE Access  
ACKNOWLEDGMENT The authors would like to thank Australia Awards Scholarship for financially supporting the first author and William Chivers from University of Newcastle, Australia, for his overall contribution  ...  For efficiency, an attribute-counting-based technique can be used as a filter for a structure-based technique to reduce the number of program pairs requiring comprehensive comparison based on their structure  ...  Structure-based techniques were introduced for greater effectiveness, but with an offset in efficiency [23] , as the similarity is based on code structure.  ... 
doi:10.1109/access.2021.3073703 fatcat:vfynxtjgqra5vhlzfo7xhqv2qe

Academic Plagiarism Detection

Tomáš Foltýnek, Norman Meuschke, Bela Gipp
2019 ACM Computing Surveys  
What are the major developments in the research on computational methods for plagiarism detection in academic documents since our last literature review in 2013?  ...  The section Plagiarism Detection Systems discusses the application of detection methods in plagiarism detection systems.  ...  Technologically, source code PD and PD for text are closely related, and many plagiarism detection methods for text can also be applied for source code PD [57] . Chowdhury et al.  ... 
doi:10.1145/3345317 fatcat:yk6f5xl2kvdxlhvsolem6zfdsu

Detection and analysis of near-miss software clones

Chanchal K. Roy
2009 2009 IEEE International Conference on Software Maintenance  
Second, in order to address the decade of vagueness in clone definition, we propose an editing taxonomy for clone creation that models developers' editing activities in the copy/pasted code in a top-down  ...  framework that automatically and efficiently measures (and i compares) the recall and precision of clone detection tools for different fine-grained clone types of the proposed editing taxonomy.  ...  Clone detection techniques can be used in the domain of plagiarism detection if extensive normalization is applied to the source code for comparison.  ... 
doi:10.1109/icsm.2009.5306301 dblp:conf/icsm/Roy09 fatcat:l5ou6ot6jnb2ncogmwejmjzxhq

Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis [article]

Ramtine Tofighi-Shirazi, Philippe Elbaz-Vincent
2019 arXiv   pre-print
By contrast, the leading edge deobfuscation methods based on symbolic execution show less accuracy mostly due to the SMT solvers constraints and the lack of scalability of dynamic symbolic analyses.  ...  Our approach underlines the efficiency of hybrid symbolic analysis and machine learning techniques for a static and generic deobfuscation methodology.  ...  ACKNOWLEDGMENTS This work is supported by the French National Research Agency in the framework of the Investissements d'Avenir program (ANR-15-IDEX-02).  ... 
arXiv:1909.01640v1 fatcat:pjqjpl6jp5fo5menejpnarjlma

Analyzing Non-Textual Content Elements to Detect Academic Plagiarism

Norman Meuschke, Bela Gipp, Harald Reiterer, Michael L. Nelson
2021 Zenodo  
To enable plagiarism checks of figures in academic documents, the thesis introduces an image-based detection process that adapts itself to the forms of image similarity typically found in academic work  ...  The study presents the weaknesses of current detection approaches for identifying strongly disguised plagiarism.  ...  Researchers successfully applied the original Greedy String Tiling (GST) algorithm for plagiarism detection in text documents [248] and source code [418] .  ... 
doi:10.5281/zenodo.4913344 fatcat:xmpaahvwuva53l5l5i2gaidvi4

Using structural information and citation evidence to detect significant plagiarism cases in scientific publications

Salha Alzahrani, Vasile Palade, Naomie Salim, Ajith Abraham
2011 Journal of the American Society for Information Science and Technology  
In both baselines, they use different comparison units with overlapping measures for plagiarism screening.  ...  Results from structural-based candidate retrieval and plagiarism detection are evaluated statistically against the flat baselines using paired-t tests on 10-fold cross-validation runs, which demonstrate  ...  Acknowledgments The authors wish to express thanks to The Oxford e-Research Centre (OERC) for allowing us to use the Windows Cluster for running the experiments.  ... 
doi:10.1002/asi.21651 fatcat:ckuxo3z7kvgihf4cy6elte2lru

A Near-Duplicate Detection Algorithm to Facilitate Document Clustering

Lavanya Pamulaparty, Guru Rao C.V, Sreenivasa Rao M
2014 International Journal of Data Mining & Knowledge Management Process  
Detecting these pages has many potential applications for example may indicate plagiarism or copyright infringement.  ...  The presence of these web pages plays an important role in the performance degradation while integrating data from heterogeneous sources.  ...  The near duplicate and duplicate web page identification helps in Web mining applications for instance, community mining in a social network site [20] , plagiarism detection [24] , document clustering  ... 
doi:10.5121/ijdkp.2014.4604 fatcat:66jmy6xqhrbqdistbyawfrfo6u

Table of Contents

2018 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)  
11 Clustering Based Efficient Privacy Preserving Multi Keyword Search over Encrypted Data 12 Cloud Oriented Distributed and Encrypted File Storage (CODE-FS) 13 Context Recommendations in Document  ...  Approach for Improving Security and Availability of Cloud Storage 19 Trust Based Secure Friend Recommendation System for OSN using C4.5 20 Secure Route Selection Mechanism in the presence of Black  ... 
doi:10.1109/iccubea.2018.8697655 fatcat:jvjgmcrh3fhxtkf4kyydawnkiq

ORIGEN

Qian Feng, Aravind Prakash, Minghua Wang, Curtis Carmony, Heng Yin
2016 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16  
To this end, we first identify such Offset Revealing Instructions (ORI) in a given software and then leverage the code search techniques to label ORIs in an unknown version of the same software.  ...  The efficacy and efficiency of ORIGEN have been empirically verified by a number of softwares.  ...  Acknowledgment We would like to thank anonymous reviewers for their feedback.  ... 
doi:10.1145/2897845.2897850 dblp:conf/ccs/FengPWCY16 fatcat:swgipdngondhtmwpoc3w477vaq

Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection [article]

Shouguo Yang, Long Cheng, Yicheng Zeng, Zhe Lang, Hongsong Zhu, Zhiqiang Shi
2021 arXiv   pre-print
There is an increasing need to detect similar code for vulnerability search across architectures with the increase of critical vulnerabilities in IoT devices.  ...  Binary code similarity detection is a fundamental technique for many security applications such as vulnerability search, patch analysis, and malware detection.  ...  proposed to detect source code clone based on AST.  ... 
arXiv:2108.06082v1 fatcat:gmj4b76wzrdjzluqbnz5gacjvm

Spatio-textual similarity joins

Panagiotis Bouros, Shen Ge, Nikos Mamoulis
2012 Proceedings of the VLDB Endowment  
Despite the importance of this operation, there is very little previous work that studies its efficient evaluation and in fact under a different definition; only the best match for each object is identified  ...  In this paper, we combine ideas from state-of-the-art spatial distance join and set similarity join methods and propose efficient algorithms that take into account both spatial and textual constraints.  ...  The main application of set-similarity joins is near-duplicate object detection [14] (e.g., identify plagiarism, record linkage in data integration, duplicate data cleansing, etc.).  ... 
doi:10.14778/2428536.2428537 fatcat:qg2c5frgn5hsjcqreikb5ik73m

Finding and exploring memes in social media

Hohyon Ryu, Matthew Lease, Nicholas Woodward
2012 Proceedings of the 23rd ACM conference on Hypertext and social media - HT '12  
Our source code and Meme Browser are both available online.  ...  Once detected, these underlying memes are revealed to users via generated hypertext, allowing memes to be explored in context.  ...  We also use the standard IR method of stopwords to reduce vocabulary for further efficiency, though the set of stopwords is determined via a parameter p threshold, where the stoplist = {w| fw N < p threshold  ... 
doi:10.1145/2309996.2310044 dblp:conf/ht/RyuLW12 fatcat:3dairxhq3bbqnb3aeiuo3dldwi

Existing Trends of Digital Watermarking and its Significant Impact on Multimedia Streaming: A Survey

R. Radha Kumari, V. Vijaya, K.Rama Naidu
2019 International Journal of Advanced Computer Science and Applications  
However, before implementing digital watermarking techniques in practical applications, there are still many problems that need to be solved technically and efficiently.  ...  In recent years, digital watermarking technology has received extensive attention from users and researchers for content protection and digital data authentication.  ...  Copy-move Forgery detection (CFD) system. Doesn't need any threshold to make decisions, low detection error. Mohanty et al. [55] Watermarking mechanism, Comparative analysis with steganography.  ... 
doi:10.14569/ijacsa.2019.0100217 fatcat:kxl4t3tubzbvtmnsuip3xhkel4
« Previous Showing results 1 — 15 out of 181 results