2018
DOI: 10.1002/cae.22066
|View full text |Cite
|
Sign up to set email alerts
|

ES‐Plag: Efficient and sensitive source code plagiarism detection tool for academic environment

Abstract: Source code plagiarism detection using Running‐Karp‐Rabin Greedy‐String‐Tiling (RKRGST) is a common practice in academic environment. However, such approach is time‐inefficient (due to RKRGST's cubic time complexity) and insensitive (toward token subsequence rearrangement). This paper proposes ES‐Plag, a plagiarism detection tool featured with cosine‐based filtering and penalty mechanism to handle aforementioned issues. Cosine‐based filtering mitigates time‐inefficiency by excluding non‐potential pairs from RK… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0
4

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 30 publications
(38 citation statements)
references
References 49 publications
0
34
0
4
Order By: Relevance
“…The first research question was addressed by comparing the proposed technique (with internal IDF indexes on board, referred as idfw ) to common techniques in academia [49] based on the similarity degree of the suspected pairs and MAP. These common techniques in academia were slightly modified to deal with cross-language source code plagiarism and collusion.…”
Section: Evaluation Methodologymentioning
confidence: 99%
See 3 more Smart Citations
“…The first research question was addressed by comparing the proposed technique (with internal IDF indexes on board, referred as idfw ) to common techniques in academia [49] based on the similarity degree of the suspected pairs and MAP. These common techniques in academia were slightly modified to deal with cross-language source code plagiarism and collusion.…”
Section: Evaluation Methodologymentioning
confidence: 99%
“…Source code plagiarism and collusion occur when a person steals another person's source code and claims it as theirs [11,19,47]. Several automated detection techniques have been proposed to capture such a misbehavior [49]. They commonly compare the source code files in a pairwise manner in which pairs with high similarity degrees are considered to be suspicious.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…This could lead to several problems, especially those which are related to authorship and creative works. Hence, several automated plagiarism detection tools dedicated to code domain (e.g., JPlag [2], ES-Plag [3], and IC-Plag [4]) have been proposed. Using those tools, such an illegal behaviour can be detected with limited human effort.…”
Section: Introductionmentioning
confidence: 99%