{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T17:17:21Z","timestamp":1772558241158,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T00:00:00Z","timestamp":1530057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["GI 1259\/1"],"award-info":[{"award-number":["GI 1259\/1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,27]]},"DOI":"10.1145\/3209978.3210177","type":"proceedings-article","created":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T12:12:40Z","timestamp":1530533560000},"page":"1321-1324","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["HyPlag"],"prefix":"10.1145","author":[{"given":"Norman","family":"Meuschke","sequence":"first","affiliation":[{"name":"University of Konstanz, Konstanz, Germany"}]},{"given":"Vincent","family":"Stange","sequence":"additional","affiliation":[{"name":"University of Konstanz, Konstanz, Germany"}]},{"given":"Moritz","family":"Schubotz","sequence":"additional","affiliation":[{"name":"University of Konstanz, Konstanz, Germany"}]},{"given":"Bela","family":"Gipp","sequence":"additional","affiliation":[{"name":"University of Konstanz, Konstanz, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,6,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21651"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2134847"},{"key":"e_1_3_2_1_3_1","volume-title":"Asia Pacific Conf. on Educational Integrity.","author":"Fishman Teddy","year":"2009"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2012.6314927"},{"key":"e_1_3_2_1_5_1","volume-title":"Citation-based Plagiarism Detection - Detecting Disguised and Cross-language Plagiarism using Citation Pattern Analysis","author":"Gipp Bela"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034691.2034741"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5220\/0004985406770683"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. 3rd PAN WS. Uncovering Plagiarism, Authorship and Social Software Misuse.","author":"Grozea Christian","year":"2009"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Cheating among College and University Students: A North American Perspective","volume":"1","author":"McCabe Donald L.","year":"2005","journal-title":"Int.J. for Academic Integrity"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.21913\/IJEI.v9i1.847"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2740769.2740802"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3197026.3197042"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3133144"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127526.3127535"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23593"},{"key":"e_1_3_2_1_16_1","volume-title":"VMEXT: A Visualization Tool for Mathematical Expression Trees Proc. Int. Conf. on Intelligent Computer Mathematics CICM.","author":"Schubotz Moritz","year":"2017"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277928"},{"key":"e_1_3_2_1_18_1","article-title":"Study on Extrinsic Text Plagiarism Detection Techniques and Tools","volume":"9","author":"Vani K.","year":"2016","journal-title":"J. Engin. Sc. & Techn. Review"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2600141"},{"key":"e_1_3_2_1_20_1","volume-title":"RETRACTED ARTICLE: Cascade controller design and stability analysis in FES-aided upper arm stroke rehabilitation robotic system. Nonlinear Dynamics","author":"Xu Wenkang","year":"2015"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Qun Zhang and Abdou Youssef. 2014. An Approach to Math-Similarity Search. In Intelligent Computer Mathematics.  Qun Zhang and Abdou Youssef. 2014. An Approach to Math-Similarity Search. In Intelligent Computer Mathematics.","DOI":"10.1007\/978-3-319-08434-3_29"}],"event":{"name":"SIGIR '18: The 41st International ACM SIGIR conference on research and development in Information Retrieval","location":"Ann Arbor MI USA","acronym":"SIGIR '18","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["The 41st International ACM SIGIR Conference on Research &amp; Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209978.3210177","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3209978.3210177","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:37Z","timestamp":1750210777000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209978.3210177"}},"subtitle":["A Hybrid Approach to Academic Plagiarism Detection"],"short-title":[],"issued":{"date-parts":[[2018,6,27]]},"references-count":21,"alternative-id":["10.1145\/3209978.3210177","10.1145\/3209978"],"URL":"https:\/\/doi.org\/10.1145\/3209978.3210177","relation":{},"subject":[],"published":{"date-parts":[[2018,6,27]]},"assertion":[{"value":"2018-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}