{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:44:17Z","timestamp":1759092257139,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,22]],"date-time":"2018-11-22T00:00:00Z","timestamp":1542844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,22]]},"DOI":"10.1145\/3279720.3279740","type":"proceedings-article","created":{"date-parts":[[2018,11,21]],"date-time":"2018-11-21T18:19:27Z","timestamp":1542824367000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["An Application to Discover Cheating in Digital Exams"],"prefix":"10.1145","author":[{"given":"Julia","family":"Opgen-Rhein","sequence":"first","affiliation":[{"name":"IT Center, RWTH Aachen University, Germany"}]},{"given":"Bastian","family":"K\u00fcppers","sequence":"additional","affiliation":[{"name":"IT Center, LuFG i9, RWTH Aachen University, Germany"}]},{"given":"Ulrik","family":"Schroeder","sequence":"additional","affiliation":[{"name":"LuFG i9, RWTH Aachen University, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 29th Australasian Computer Science Conference -","volume":"48","author":"Arwin Christian","year":"2006","unstructured":"Christian Arwin and S. M. M. Tahaghoghi . 2006 . Plagiarism Detection Across Programming Languages . In Proceedings of the 29th Australasian Computer Science Conference - Volume 48 (ACSC '06). Australian Computer Society, Inc., Darlinghurst, Australia, Australia, 277--286. http:\/\/dl.acm.org\/citation.cfm?id=1151699.1151730 Christian Arwin and S. M. M. Tahaghoghi. 2006. Plagiarism Detection Across Programming Languages. In Proceedings of the 29th Australasian Computer Science Conference - Volume 48 (ACSC '06). Australian Computer Society, Inc., Darlinghurst, Australia, Australia, 277--286. http:\/\/dl.acm.org\/citation.cfm?id=1151699.1151730"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CERMA.2006.91"},{"key":"e_1_3_2_1_4_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Caliskan-Islam Aylin","year":"2015","unstructured":"Aylin Caliskan-Islam , Richard Harang , Andrew Liu , Arvind Narayanan , Clare Voss , Fabian Yamaguchi , and Rachel Greenstadt . 2015 . De-anonymizing Programmers via Code Stylometry . In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, Washington, D.C., 255--270. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/caliskan-islam Aylin Caliskan-Islam, Richard Harang, Andrew Liu, Arvind Narayanan, Clare Voss, Fabian Yamaguchi, and Rachel Greenstadt. 2015. De-anonymizing Programmers via Code Stylometry. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 255--270. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/caliskan-islam"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2012.09"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022627411411"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/782941.783000"},{"volume-title":"Cheating at Digital Exams. Master's thesis","author":"Heintz Aleksander","key":"e_1_3_2_1_8_1","unstructured":"Aleksander Heintz . 2017. Cheating at Digital Exams. Master's thesis . Norwegian University of Science and Technology , Norway . Aleksander Heintz. 2017. Cheating at Digital Exams. Master's thesis. Norwegian University of Science and Technology, Norway."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3141880.3141903"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"volume-title":"Advances in Digital Forensics X","author":"Stolerman Ariel","key":"e_1_3_2_1_11_1","unstructured":"Ariel Stolerman , Rebekah Overdorf , Sadia Afroz , and Rachel Greenstadt . 2014. Breaking the Closed-World Assumption in Stylometric Authorship Attribution . In Advances in Digital Forensics X , Gilbert Peterson and Sujeet Shenoi (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 185--205. Ariel Stolerman, Rebekah Overdorf, Sadia Afroz, and Rachel Greenstadt. 2014. Breaking the Closed-World Assumption in Stylometric Authorship Attribution. In Advances in Digital Forensics X, Gilbert Peterson and Sujeet Shenoi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 185--205."},{"volume-title":"2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 2362--2366","author":"Zheng J.","key":"e_1_3_2_1_12_1","unstructured":"J. Zheng , W. Yang , and X. Li . 2017. Training data reduction in deep neural networks with partial mutual information based feature selection and correlation matching based active learning . In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 2362--2366 . J. Zheng, W. Yang, and X. Li. 2017. Training data reduction in deep neural networks with partial mutual information based feature selection and correlation matching based active learning. In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 2362--2366."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Sixth Australasian Conference on Computing Education -","volume":"30","author":"Zobel Justin","year":"2004","unstructured":"Justin Zobel . 2004 . \" Uni Cheats Racket\": A Case Study in Plagiarism Investigation . In Proceedings of the Sixth Australasian Conference on Computing Education - Volume 30 (ACE '04). Australian Computer Society, Inc., Darlinghurst, Australia, Australia, 357--365. http:\/\/dl.acm.org\/citation.cfm?id=979968.980016 Justin Zobel. 2004. \"Uni Cheats Racket\": A Case Study in Plagiarism Investigation. In Proceedings of the Sixth Australasian Conference on Computing Education - Volume 30 (ACE '04). Australian Computer Society, Inc., Darlinghurst, Australia, Australia, 357--365. http:\/\/dl.acm.org\/citation.cfm?id=979968.980016"}],"event":{"name":"Koli Calling '18: 18th Koli Calling International Conference on Computing Education Research","acronym":"Koli Calling '18","location":"Koli Finland"},"container-title":["Proceedings of the 18th Koli Calling International Conference on Computing Education Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3279720.3279740","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3279720.3279740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:58:01Z","timestamp":1750208281000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3279720.3279740"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,22]]},"references-count":13,"alternative-id":["10.1145\/3279720.3279740","10.1145\/3279720"],"URL":"https:\/\/doi.org\/10.1145\/3279720.3279740","relation":{},"subject":[],"published":{"date-parts":[[2018,11,22]]},"assertion":[{"value":"2018-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}