{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:47:15Z","timestamp":1762624035507,"version":"3.37.3"},"reference-count":38,"publisher":"Oxford University Press (OUP)","issue":"8","license":[{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"crossref","award":["2016QY06X1205","2016YFB0800605"],"award-info":[{"award-number":["2016QY06X1205","2016YFB0800605"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91338107"],"award-info":[{"award-number":["91338107"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Technology Research and Development Program of Sichuan, China","award":["17ZDYF2583"],"award-info":[{"award-number":["17ZDYF2583"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8,1]]},"DOI":"10.1093\/comjnl\/bxy055","type":"journal-article","created":{"date-parts":[[2018,5,30]],"date-time":"2018-05-30T19:11:19Z","timestamp":1527707479000},"page":"1202-1215","source":"Crossref","is-referenced-by-count":6,"title":["A New Software Birthmark based on Weight Sequences of Dynamic Control Flow Graph for Plagiarism Detection"],"prefix":"10.1093","volume":"61","author":[{"given":"Baoguo","family":"Yuan","sequence":"first","affiliation":[{"name":"College of Computer Science, Sichuan University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1699-2270","authenticated-orcid":false,"given":"Junfeng","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Aeronautics and Astronautics and College of Computer Science, Sichuan University, Chengdu, China"}]},{"given":"Zhiyang","family":"Fang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan University, Chengdu, China"}]},{"given":"Li","family":"Qi","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"286","published-online":{"date-parts":[[2018,6,1]]},"reference":[{"author":"BSA","key":"key\n\t\t\t\t20180724122912_bxy055C1"},{"year":"2017","author":"Revulytics","key":"key\n\t\t\t\t20180724122912_bxy055C2"},{"key":"key\n\t\t\t\t20180724122912_bxy055C3","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/08993400412331363843","article-title":"A comparison of source code plagiarism detection engines","volume":"14","author":"Lancaster","year":"2004","journal-title":"Comput. Sci. Educ."},{"year":"2009","author":"Ceccato","key":"key\n\t\t\t\t20180724122912_bxy055C4"},{"year":"1999","author":"Collberg","key":"key\n\t\t\t\t20180724122912_bxy055C5"},{"key":"key\n\t\t\t\t20180724122912_bxy055C6","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/996893.996856","article-title":"Dynamic path-based software watermarking","volume":"39","author":"Collberg","year":"2004","journal-title":"ACM Sigplan Not."},{"volume-title":"Detecting the Theft of Programs Using Birthmarks","year":"2003","author":"NAIST-IS-TR2003014","key":"key\n\t\t\t\t20180724122912_bxy055C7"},{"year":"2013","author":"Kim","key":"key\n\t\t\t\t20180724122912_bxy055C8"},{"key":"key\n\t\t\t\t20180724122912_bxy055C9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2522968.2522972","article-title":"Binary-code obfuscations in prevalent packer tools","volume":"46","author":"Roundy","year":"2013","journal-title":"Acm Comput. Surv."},{"year":"2012","author":"Ugarte-Pedrero","key":"key\n\t\t\t\t20180724122912_bxy055C10"},{"year":"2008","author":"Bai","key":"key\n\t\t\t\t20180724122912_bxy055C11"},{"key":"key\n\t\t\t\t20180724122912_bxy055C12","doi-asserted-by":"crossref","first-page":"47","DOI":"10.4236\/SEA.2012.12009","article-title":"Software protection method based on shell technology","volume":"01","author":"Yuanpeng","year":"2012","journal-title":"Softw. Eng. Appl."},{"year":"2013","author":"Tian","key":"key\n\t\t\t\t20180724122912_bxy055C13"},{"year":"2005","author":"Augsten","key":"key\n\t\t\t\t20180724122912_bxy055C14"},{"key":"key\n\t\t\t\t20180724122912_bxy055C15","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/953049.800954","article-title":"A tool that detects plagiarism in Pascal programs","volume":"13","author":"Grier","year":"1981","journal-title":"ACM SIGCSE Bull."},{"year":"1994","author":"Aiken","key":"key\n\t\t\t\t20180724122912_bxy055C16"},{"key":"key\n\t\t\t\t20180724122912_bxy055C17","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1145\/236462.236525","article-title":"Yap3: improved detection of similarities in computer program and other texts","volume":"28","author":"Wise","year":"1996","journal-title":"ACM SIGCSE Bull."},{"key":"key\n\t\t\t\t20180724122912_bxy055C18","first-page":"1016","article-title":"Finding plagiarisms among a set of programs with jplag","volume":"8","author":"Prechelt","year":"2002","journal-title":"J. UCS"},{"year":"2012","author":"Flores","key":"key\n\t\t\t\t20180724122912_bxy055C19"},{"key":"key\n\t\t\t\t20180724122912_bxy055C20","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1002\/cae.21608","article-title":"Uncovering source code reuse in large-scale academic environments","volume":"23","author":"Flores","year":"2015","journal-title":"Comput. Appl. Eng. Educ."},{"key":"key\n\t\t\t\t20180724122912_bxy055C21","first-page":"1708","article-title":"Cross-language source code re-use detection using latent semantic analysis","volume":"21","author":"Flores","year":"2015","journal-title":"J. Universal Comput. Sci."},{"year":"2014","author":"Flores","key":"key\n\t\t\t\t20180724122912_bxy055C22"},{"year":"2015","author":"Flores","key":"key\n\t\t\t\t20180724122912_bxy055C23"},{"year":"2004","author":"Tamada","key":"key\n\t\t\t\t20180724122912_bxy055C24"},{"year":"2005","author":"Myles","key":"key\n\t\t\t\t20180724122912_bxy055C25"},{"key":"key\n\t\t\t\t20180724122912_bxy055C26","doi-asserted-by":"crossref","first-page":"1338","DOI":"10.1016\/j.infsof.2009.04.011","article-title":"A method for detecting the theft of java programs through analysis of the control flow information","volume":"51","author":"Lim","year":"2009","journal-title":"Inf. Softw. Technol."},{"year":"2014","author":"Luo","key":"key\n\t\t\t\t20180724122912_bxy055C27"},{"year":"2004","author":"Myles","key":"key\n\t\t\t\t20180724122912_bxy055C28"},{"year":"2009","author":"Wang","key":"key\n\t\t\t\t20180724122912_bxy055C29"},{"year":"2011","author":"Chan","key":"key\n\t\t\t\t20180724122912_bxy055C30"},{"year":"2004","author":"Tamada","key":"key\n\t\t\t\t20180724122912_bxy055C31"},{"year":"2015","author":"Chae","key":"key\n\t\t\t\t20180724122912_bxy055C32"},{"year":"2009","author":"Wang","key":"key\n\t\t\t\t20180724122912_bxy055C33"},{"year":"2011","author":"Jhi","key":"key\n\t\t\t\t20180724122912_bxy055C34"},{"year":"2014","author":"Zhang","key":"key\n\t\t\t\t20180724122912_bxy055C35"},{"key":"key\n\t\t\t\t20180724122912_bxy055C36","first-page":"571","article-title":"An efficient categorization of the instructions based on binary executables for dynamic software birthmark","volume":"5","author":"Lee","year":"2015","journal-title":"Int. J. Inf. Educ. Technol."},{"year":"2014","author":"Tian","key":"key\n\t\t\t\t20180724122912_bxy055C37"},{"key":"key\n\t\t\t\t20180724122912_bxy055C38","doi-asserted-by":"crossref","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","article-title":"Learning from imbalanced data","volume":"21","author":"He","year":"2009","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/8\/1202\/25209197\/bxy055.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T16:09:40Z","timestamp":1589904580000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/8\/1202\/5026598"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,1]]},"references-count":38,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2018,6,1]]},"published-print":{"date-parts":[[2018,8,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy055","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2018,8]]},"published":{"date-parts":[[2018,6,1]]}}}