{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T20:02:25Z","timestamp":1772568145406,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CCF-1319060"],"award-info":[{"award-number":["CCF-1319060"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3304221.3319789","type":"proceedings-article","created":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T17:44:24Z","timestamp":1563558264000},"page":"555-561","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Syntax-based Improvements to Plagiarism Detectors and their Evaluations"],"prefix":"10.1145","author":[{"given":"Lawton","family":"Nichols","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Kyle","family":"Dewey","sequence":"additional","affiliation":[{"name":"California State University Northridge, Northridge, CA, USA"}]},{"given":"Mehmet","family":"Emre","sequence":"additional","affiliation":[{"name":"University of California,Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Sitao","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Ben","family":"Hardekopf","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090050"},{"key":"e_1_3_2_1_2_1","volume-title":"Scientific Programming","volume":"2017","author":"Fu Deqiang","year":"2017","unstructured":"Deqiang Fu , Yanyan Xu , Haoran Yu , and Boyang Yang . 2017 . Wastk: A weighted abstract syntax tree kernel method for source code plagiarism detection . Scientific Programming , Vol. 2017 (2017). Deqiang Fu, Yanyan Xu, Haoran Yu, and Boyang Yang. 2017. Wastk: A weighted abstract syntax tree kernel method for source code plagiarism detection. Scientific Programming, Vol. 2017 (2017)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/384266.299783"},{"key":"e_1_3_2_1_4_1","volume-title":"OASIcs-OpenAccess Series in Informatics","volume":"38","author":"Martins V'itor T","year":"2014","unstructured":"V'itor T Martins , Daniela Fonte , Pedro Rangel Henriques , and Daniela da Cruz . 2014 . Plagiarism detection: A tool survey and comparison . In OASIcs-OpenAccess Series in Informatics , Vol. 38 . Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. V'itor T Martins, Daniela Fonte, Pedro Rangel Henriques, and Daniela da Cruz. 2014. Plagiarism detection: A tool survey and comparison. In OASIcs-OpenAccess Series in Informatics, Vol. 38. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxh119"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2012.6295247"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380250705"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2013.6615411"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Bruno Prado Kalil A Bispo and Raul Andrade. 2018. X9: An Obfuscation Resilient Approach for Source Code Plagiarism Detection in Virtual Learning Environments.. In ICEIS (1). 517--524.  Bruno Prado Kalil A Bispo and Raul Andrade. 2018. X9: An Obfuscation Resilient Approach for Source Code Plagiarism Detection in Virtual Learning Environments.. In ICEIS (1). 517--524.","DOI":"10.5220\/0006668705170524"},{"key":"e_1_3_2_1_10_1","unstructured":"Lutz Prechelt Guido Malpohl and Michael Phlippsen. 2000. JPlag: Finding plagiarisms among a set of programs. (2000).  Lutz Prechelt Guido Malpohl and Michael Phlippsen. 2000. JPlag: Finding plagiarisms among a set of programs. (2000)."},{"key":"e_1_3_2_1_11_1","volume-title":"mbox","author":"Yutaka Sasaki","year":"2007","unstructured":"Yutaka Sasaki et al mbox . 2007 . The truth of the F-measure . (2007). Yutaka Sasaki et almbox. 2007. The truth of the F-measure. (2007)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(81)90087-5"},{"key":"e_1_3_2_1_14_1","volume-title":"Program Plagiarism Detection Using Parse Tree Kernels. In PRICAI 2006: Trends in Artificial Intelligence, Qiang Yang and Geoff Webb (Eds.). Springer Berlin Heidelberg","author":"Son Jeong-Woo","year":"2006","unstructured":"Jeong-Woo Son , Seong-Bae Park , and Se-Young Park . 2006 . Program Plagiarism Detection Using Parse Tree Kernels. In PRICAI 2006: Trends in Artificial Intelligence, Qiang Yang and Geoff Webb (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 1000--1004. Jeong-Woo Son, Seong-Bae Park, and Se-Young Park. 2006. Program Plagiarism Detection Using Parse Tree Kernels. In PRICAI 2006: Trends in Artificial Intelligence, Qiang Yang and Geoff Webb (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1000--1004."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/cae.22066"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230977.3231006"}],"event":{"name":"ITiCSE '19: Innovation and Technology in Computer Science Education","location":"Aberdeen Scotland Uk","acronym":"ITiCSE '19","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3304221.3319789","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3304221.3319789","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3304221.3319789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:35Z","timestamp":1750206335000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3304221.3319789"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":16,"alternative-id":["10.1145\/3304221.3319789","10.1145\/3304221"],"URL":"https:\/\/doi.org\/10.1145\/3304221.3319789","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}