2017
DOI: 10.1007/s10791-017-9313-y
|View full text |Cite
|
Sign up to set email alerts
|

Retrieving and classifying instances of source code plagiarism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
42
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(43 citation statements)
references
References 20 publications
0
42
0
Order By: Relevance
“…It has been argued that the source code token sequence may not be comprehensive enough for representing the code files, and hence more-advanced representations have been introduced. Other techniques which have been proposed include: the use of abstract syntax trees containing source code tokens in their syntactic structure (Fu et al, 2017;Ganguly et al, 2018); program dependency graphs which describe how each instruction relies on other instructions (Liu et al, 2006); and low-level token sequences extracted from the binary files of compiled source code (Karnalim, 2017(Karnalim, , 2019Rabbani & Karnalim, 2017).…”
Section: A Review Of Automated Source Code Plagiarism Detectionmentioning
confidence: 99%
“…It has been argued that the source code token sequence may not be comprehensive enough for representing the code files, and hence more-advanced representations have been introduced. Other techniques which have been proposed include: the use of abstract syntax trees containing source code tokens in their syntactic structure (Fu et al, 2017;Ganguly et al, 2018); program dependency graphs which describe how each instruction relies on other instructions (Liu et al, 2006); and low-level token sequences extracted from the binary files of compiled source code (Karnalim, 2017(Karnalim, , 2019Rabbani & Karnalim, 2017).…”
Section: A Review Of Automated Source Code Plagiarism Detectionmentioning
confidence: 99%
“…Source code token fragments can be compared by adopting techniques from other domains. Works in [11][12][13], for instances, rely on Information Retrieval techniques such as Latent Semantic Indexing [14]. Other examples are works in [15,16] that rely on a clustering technique (where the fragments act as vectors) and a work in [17] that relies on a technique from Information Theory.…”
Section: Related Workmentioning
confidence: 99%
“…Attribute-based tool considers two source codes as similar to each other when they share similar attributes (e.g., source code characteristics or fragments). The similarity can be measured either by standard occurrence counting [7], [8], Information Retrieval measurement [9]- [12], or clustering technique [13], [14].…”
Section: Literature Reviewmentioning
confidence: 99%