Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243738
|View full text |Cite
|
Sign up to set email alerts
|

Large-Scale and Language-Oblivious Code Authorship Identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
98
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 71 publications
(98 citation statements)
references
References 26 publications
0
98
0
Order By: Relevance
“…We select models from recent work or use well-known models. For code comment generation and code authorship identification, we use recent work by Hu et al [20] and Abuhamad et al [21] respectively. For code clone detection, we use the well-documented baseline model, SourcererCC [22].…”
Section: Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations
“…We select models from recent work or use well-known models. For code comment generation and code authorship identification, we use recent work by Hu et al [20] and Abuhamad et al [21] respectively. For code clone detection, we use the well-documented baseline model, SourcererCC [22].…”
Section: Preliminariesmentioning
confidence: 99%
“…Techniques used in this task leverage features that express the programming style of programmers, such as layout and lexical features [42]. Previous works have found that the use of machine learning using TF-IDF features covering unigrams, bigrams and trigrams can be used to identify programmers at high accuracy [21].…”
Section: B Code Authorship Identificationmentioning
confidence: 99%
See 2 more Smart Citations
“…In the dataset, a user's public data are the rating scores the user gave to mobile apps on Google Play, while the attribute is the city a user lives/lived political view, etc. Author identification attacks [11][12][13][14][15][16] Text document, program Author identity Website fingerprinting attacks [17][18][19][20][21] Network traffic Website…”
Section: Introductionmentioning
confidence: 99%