A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Dynamic Thresholding Mechanisms for IR-Based Filtering in Efficient Source Code Plagiarism Detection
[article]
2018
arXiv
pre-print
To solve time inefficiency issue, only potential pairs are compared in string-matching-based source code plagiarism detection; wherein potentiality is defined through a fast-yet-order-insensitive similarity ...
This paper proposes two thresholding mechanisms---namely range-based and pair-count-based mechanism---that dynamically tune the threshold based on the distribution of resulted similarity degrees. ...
P CM (in) = in * total pairs (2) For our case study, both thresholding mechanisms will be applied on an efficiency-oriented hybrid source code plagiarism detection, which works in fourfold (see Fig. 1 ...
arXiv:1810.11903v1
fatcat:mp5gpra7ybc7hlqe7me5bcqnqm
Plagiarism Detection for Indonesian Texts
2013
Proceedings of International Conference on Information Integration and Web-based Applications & Services - IIWAS '13
I thank you for all my friends who were invloved in the crowd-sourcing, especially for Eddy Hadisaputro, Esti Wardhani, Tirta Wulandari, Ade Umar Said, Sri Rahayu, and Manila Kristin who worked more for ...
We plan to improve seed alignment by regarding the offsets of sentences in which the seeds occur. This is to address the drawback of the passage boundary detection. 3 . ...
During 1970s, Ottenstein developed an algorithm to detect code plagiarism for FORTRAN source code [115] , while a tool for detecting plagiarism in Pascal was developed some years later by Sam in 1981, ...
doi:10.1145/2539150.2539213
dblp:conf/iiwas/KrisnawatiS13
fatcat:r6p2h4oiq5fi3mhlazokatknrq
Explanation in Code Similarity Investigation
2021
IEEE Access
ACKNOWLEDGMENT The authors would like to thank Australia Awards Scholarship for financially supporting the first author and William Chivers from University of Newcastle, Australia, for his overall contribution ...
For efficiency, an attribute-counting-based technique can be used as a filter for a structure-based technique to reduce the number of program pairs requiring comprehensive comparison based on their structure ...
Structure-based techniques were introduced for greater effectiveness, but with an offset in efficiency [23] , as the similarity is based on code structure. ...
doi:10.1109/access.2021.3073703
fatcat:vfynxtjgqra5vhlzfo7xhqv2qe
Academic Plagiarism Detection
2019
ACM Computing Surveys
What are the major developments in the research on computational methods for plagiarism detection in academic documents since our last literature review in 2013? ...
The section Plagiarism Detection Systems discusses the application of detection methods in plagiarism detection systems. ...
Technologically, source code PD and PD for text are closely related, and many plagiarism detection methods for text can also be applied for source code PD [57] . Chowdhury et al. ...
doi:10.1145/3345317
fatcat:yk6f5xl2kvdxlhvsolem6zfdsu
Detection and analysis of near-miss software clones
2009
2009 IEEE International Conference on Software Maintenance
Second, in order to address the decade of vagueness in clone definition, we propose an editing taxonomy for clone creation that models developers' editing activities in the copy/pasted code in a top-down ...
framework that automatically and efficiently measures (and i compares) the recall and precision of clone detection tools for different fine-grained clone types of the proposed editing taxonomy. ...
Clone detection techniques can be used in the domain of plagiarism detection if extensive normalization is applied to the source code for comparison. ...
doi:10.1109/icsm.2009.5306301
dblp:conf/icsm/Roy09
fatcat:l5ou6ot6jnb2ncogmwejmjzxhq
Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis
[article]
2019
arXiv
pre-print
By contrast, the leading edge deobfuscation methods based on symbolic execution show less accuracy mostly due to the SMT solvers constraints and the lack of scalability of dynamic symbolic analyses. ...
Our approach underlines the efficiency of hybrid symbolic analysis and machine learning techniques for a static and generic deobfuscation methodology. ...
ACKNOWLEDGMENTS This work is supported by the French National Research Agency in the framework of the Investissements d'Avenir program (ANR-15-IDEX-02). ...
arXiv:1909.01640v1
fatcat:pjqjpl6jp5fo5menejpnarjlma
Analyzing Non-Textual Content Elements to Detect Academic Plagiarism
2021
Zenodo
To enable plagiarism checks of figures in academic documents, the thesis introduces an image-based detection process that adapts itself to the forms of image similarity typically found in academic work ...
The study presents the weaknesses of current detection approaches for identifying strongly disguised plagiarism. ...
Researchers successfully applied the original Greedy String Tiling (GST) algorithm for plagiarism detection in text documents [248] and source code [418] . ...
doi:10.5281/zenodo.4913344
fatcat:xmpaahvwuva53l5l5i2gaidvi4
Using structural information and citation evidence to detect significant plagiarism cases in scientific publications
2011
Journal of the American Society for Information Science and Technology
In both baselines, they use different comparison units with overlapping measures for plagiarism screening. ...
Results from structural-based candidate retrieval and plagiarism detection are evaluated statistically against the flat baselines using paired-t tests on 10-fold cross-validation runs, which demonstrate ...
Acknowledgments The authors wish to express thanks to The Oxford e-Research Centre (OERC) for allowing us to use the Windows Cluster for running the experiments. ...
doi:10.1002/asi.21651
fatcat:ckuxo3z7kvgihf4cy6elte2lru
A Near-Duplicate Detection Algorithm to Facilitate Document Clustering
2014
International Journal of Data Mining & Knowledge Management Process
Detecting these pages has many potential applications for example may indicate plagiarism or copyright infringement. ...
The presence of these web pages plays an important role in the performance degradation while integrating data from heterogeneous sources. ...
The near duplicate and duplicate web page identification helps in Web mining applications for instance, community mining in a social network site [20] , plagiarism detection [24] , document clustering ...
doi:10.5121/ijdkp.2014.4604
fatcat:66jmy6xqhrbqdistbyawfrfo6u
Table of Contents
2018
2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)
11
Clustering Based Efficient Privacy Preserving Multi Keyword Search over Encrypted Data
12
Cloud Oriented Distributed and Encrypted File Storage (CODE-FS)
13
Context Recommendations in Document ...
Approach for Improving Security and Availability of Cloud Storage
19
Trust Based Secure Friend Recommendation System for OSN using C4.5
20
Secure Route Selection Mechanism in the presence of Black ...
doi:10.1109/iccubea.2018.8697655
fatcat:jvjgmcrh3fhxtkf4kyydawnkiq
ORIGEN
2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16
To this end, we first identify such Offset Revealing Instructions (ORI) in a given software and then leverage the code search techniques to label ORIs in an unknown version of the same software. ...
The efficacy and efficiency of ORIGEN have been empirically verified by a number of softwares. ...
Acknowledgment We would like to thank anonymous reviewers for their feedback. ...
doi:10.1145/2897845.2897850
dblp:conf/ccs/FengPWCY16
fatcat:swgipdngondhtmwpoc3w477vaq
Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection
[article]
2021
arXiv
pre-print
There is an increasing need to detect similar code for vulnerability search across architectures with the increase of critical vulnerabilities in IoT devices. ...
Binary code similarity detection is a fundamental technique for many security applications such as vulnerability search, patch analysis, and malware detection. ...
proposed to detect source code clone based on AST. ...
arXiv:2108.06082v1
fatcat:gmj4b76wzrdjzluqbnz5gacjvm
Spatio-textual similarity joins
2012
Proceedings of the VLDB Endowment
Despite the importance of this operation, there is very little previous work that studies its efficient evaluation and in fact under a different definition; only the best match for each object is identified ...
In this paper, we combine ideas from state-of-the-art spatial distance join and set similarity join methods and propose efficient algorithms that take into account both spatial and textual constraints. ...
The main application of set-similarity joins is near-duplicate object detection [14] (e.g., identify plagiarism, record linkage in data integration, duplicate data cleansing, etc.). ...
doi:10.14778/2428536.2428537
fatcat:qg2c5frgn5hsjcqreikb5ik73m
Finding and exploring memes in social media
2012
Proceedings of the 23rd ACM conference on Hypertext and social media - HT '12
Our source code and Meme Browser are both available online. ...
Once detected, these underlying memes are revealed to users via generated hypertext, allowing memes to be explored in context. ...
We also use the standard IR method of stopwords to reduce vocabulary for further efficiency, though the set of stopwords is determined via a parameter p threshold, where the stoplist = {w| fw N < p threshold ...
doi:10.1145/2309996.2310044
dblp:conf/ht/RyuLW12
fatcat:3dairxhq3bbqnb3aeiuo3dldwi
Existing Trends of Digital Watermarking and its Significant Impact on Multimedia Streaming: A Survey
2019
International Journal of Advanced Computer Science and Applications
However, before implementing digital watermarking techniques in practical applications, there are still many problems that need to be solved technically and efficiently. ...
In recent years, digital watermarking technology has received extensive attention from users and researchers for content protection and digital data authentication. ...
Copy-move Forgery detection (CFD) system. Doesn't need any threshold to make decisions, low detection error. Mohanty et al. [55] Watermarking mechanism, Comparative analysis with steganography. ...
doi:10.14569/ijacsa.2019.0100217
fatcat:kxl4t3tubzbvtmnsuip3xhkel4
« Previous
Showing results 1 — 15 out of 181 results