{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T20:02:23Z","timestamp":1772568143077,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,12]],"date-time":"2020-01-12T00:00:00Z","timestamp":1578787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,12]]},"DOI":"10.1145\/3378936.3378960","type":"proceedings-article","created":{"date-parts":[[2020,3,7]],"date-time":"2020-03-07T12:09:51Z","timestamp":1583582991000},"page":"115-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["A Novel Graph-Based Program Representation for Java Code Plagiarism Detection"],"prefix":"10.1145","author":[{"given":"Hayden","family":"Cheers","sequence":"first","affiliation":[{"name":"The University of Newcastle, Callaghan, Newcastle, Australia"}]},{"given":"Yuqing","family":"Lin","sequence":"additional","affiliation":[{"name":"The University of Newcastle, Callaghan, Newcastle, Australia"}]}],"member":"320","published-online":{"date-parts":[[2020,3,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education (SIGCSE '17)","author":"Pierce J.","unstructured":"Pierce , J. and Zilles , C . 2017. Investigating Student Plagiarism Patterns and Correlations to Grades . In Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education (SIGCSE '17) . ACM, New York, NY, USA, 471--476. Pierce, J. and Zilles, C. 2017. Investigating Student Plagiarism Patterns and Correlations to Grades. In Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education (SIGCSE '17). ACM, New York, NY, USA, 471--476."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/07294360701310813"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the ITI 2009 31st International Conference on Information Technology Interfaces, IEEE, 461--466","author":"Sraka D.","unstructured":"Sraka , D. and Kaucic , B . 2009. Source code plagiarism . In Proceedings of the ITI 2009 31st International Conference on Information Technology Interfaces, IEEE, 461--466 . Sraka, D. and Kaucic, B. 2009. Source code plagiarism. In Proceedings of the ITI 2009 31st International Conference on Information Technology Interfaces, IEEE, 461--466."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/13.762946"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/13.28038"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2007.906776"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0360-1315(87)90042-X"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 10th IEEE International Conference on Software Engineering and Service Science (ICSESS","author":"Cheers H.","year":"2019","unstructured":"Cheers , H. , Lin , Y. , and Smith , S.P . 2019. SPPlagiarise: A Tool for Generating Simulated Semantics-Preserving Plagiarism of Java Source Code . In Proceedings of the 10th IEEE International Conference on Software Engineering and Service Science (ICSESS 2019 ), IEEE, in press. Cheers, H., Lin, Y., and Smith, S.P. 2019. SPPlagiarise: A Tool for Generating Simulated Semantics-Preserving Plagiarism of Java Source Code. In Proceedings of the 10th IEEE International Conference on Software Engineering and Service Science (ICSESS 2019), IEEE, in press."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 2003 ACM SIGMOD international conference on Management of data (SIGMOD '03)","author":"Schleimer S.","unstructured":"Schleimer , S. , Wilkerson , D.S. , and Aiken , A . 2003. Winnowing: local algorithms for document fingerprinting . In Proceedings of the 2003 ACM SIGMOD international conference on Management of data (SIGMOD '03) . ACM, New York, NY, USA, 76--85. Schleimer, S., Wilkerson, D.S., and Aiken, A. 2003. Winnowing: local algorithms for document fingerprinting. In Proceedings of the 2003 ACM SIGMOD international conference on Management of data (SIGMOD '03). ACM, New York, NY, USA, 76--85."},{"key":"e_1_3_2_1_10_1","first-page":"11","article-title":"Finding Plagiarisms among a Set of Programs with JPlag","volume":"8","author":"Prechelt L.","year":"2002","unstructured":"Prechelt , L. , Malpohl , G. , and Philippsen , M. 2002 . Finding Plagiarisms among a Set of Programs with JPlag . Journal of Universal Computer Science 8 , 11 (March 2003) 1016--1038. Prechelt, L., Malpohl, G., and Philippsen, M. 2002. Finding Plagiarisms among a Set of Programs with JPlag. Journal of Universal Computer Science 8, 11 (March 2003) 1016--1038.","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_2_1_11_1","volume-title":"Retrieved","author":"Pike R.","year":"2019","unstructured":"Pike , R. and Loki . [n.d.]. The Sherlock plagiarism detector . Retrieved June 26, 2019 from https:\/\/github.com\/diogocabral\/Sherlock. Pike, R. and Loki. [n.d.]. The Sherlock plagiarism detector. Retrieved June 26, 2019 from https:\/\/github.com\/diogocabral\/Sherlock."},{"key":"e_1_3_2_1_12_1","volume-title":"Retrieved","author":"Grune D.","year":"2019","unstructured":"Grune , D. [n.d.]. The software and text similarity tester SIM . Retrieved September 30, 2019 from https:\/\/dickgrune.com\/Programs\/similarity_tester\/. Grune, D. [n.d.]. The software and text similarity tester SIM. Retrieved September 30, 2019 from https:\/\/dickgrune.com\/Programs\/similarity_tester\/."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Twenty-Second Australasian Computing Education Conference (ACE2020)","author":"Cheers H.","unstructured":"Cheers , H. , Lin , Y. , and Smith , S.P . 2020. Detecting Pervasive Source Code Plagiarism through Dynamic Program Behaviors . In Proceedings of the Twenty-Second Australasian Computing Education Conference (ACE2020) , ACM, in press. Cheers, H., Lin, Y., and Smith, S.P. 2020. Detecting Pervasive Source Code Plagiarism through Dynamic Program Behaviors. In Proceedings of the Twenty-Second Australasian Computing Education Conference (ACE2020), ACM, in press."},{"key":"e_1_3_2_1_14_1","unstructured":"Roy C.K. and Cordy J.R. 2007. A Survey on Software Clone Detection Research. Queen's Technical Report:541 115 pp.  Roy C.K. and Cordy J.R. 2007. A Survey on Software Clone Detection Research. Queen's Technical Report:541 115 pp."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Ragkhitwetsagul C. Krinke J. and Clark D. 2018. A comparison of code similarity analysers. Empir Software Eng 23 2464 2464--2519.  Ragkhitwetsagul C. Krinke J. and Clark D. 2018. A comparison of code similarity analysers. Empir Software Eng 23 2464 2464--2519.","DOI":"10.1007\/s10664-017-9564-7"},{"key":"e_1_3_2_1_17_1","volume-title":"Retrieved","author":"Cheers H.","year":"2019","unstructured":"Cheers , H. 2019 . Data Set 2 - How to Detect Advanced Source Code Plagiarism . Retrieved October 10, 2019 from https:\/\/github.com\/hjc851\/Dataset2- HowToDetectAdvancedSourceCodePlagiarism. Cheers, H. 2019. Data Set 2 - How to Detect Advanced Source Code Plagiarism. Retrieved October 10, 2019 from https:\/\/github.com\/hjc851\/Dataset2- HowToDetectAdvancedSourceCodePlagiarism."},{"key":"e_1_3_2_1_18_1","volume-title":"Retrieved","author":"Cheers H.","year":"2019","unstructured":"Cheers , H. 2019 . JCInterpret . Retrieved November 14, 2019 from https:\/\/github.com\/hjc851\/JCInterpret. Cheers, H. 2019. JCInterpret. Retrieved November 14, 2019 from https:\/\/github.com\/hjc851\/JCInterpret."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD06)","author":"Liu C.","unstructured":"Liu , C. , Chen , C. , Han , J. , and Yu , P.S . GPLAG: Detection of Soft- ware Plagiarism by Program Dependence Graph Analysis. 2006 . In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD06) , ACM, 872--881. Liu, C., Chen, C., Han, J., and Yu, P.S. GPLAG: Detection of Soft- ware Plagiarism by Program Dependence Graph Analysis. 2006. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD06), ACM, 872--881."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings Eighth Working Conference on Reverse Engineering, IEEE.","author":"Krinke J.","unstructured":"Krinke , J. Identifying Similar Code with Program Dependence Graphs. 2001 . In Proceedings Eighth Working Conference on Reverse Engineering, IEEE. Krinke, J. Identifying Similar Code with Program Dependence Graphs. 2001. In Proceedings Eighth Working Conference on Reverse Engineering, IEEE."},{"key":"e_1_3_2_1_21_1","volume-title":"The Source Code Plagiarism Detection Using AST. In Int. Symposium on Intelligence Information Processing and Trusted Comp, IEEE, 406--408","author":"Li X.","unstructured":"Li , X. and Zhong , X.J . 2010 . The Source Code Plagiarism Detection Using AST. In Int. Symposium on Intelligence Information Processing and Trusted Comp, IEEE, 406--408 . Li, X. and Zhong, X.J. 2010. The Source Code Plagiarism Detection Using AST. In Int. Symposium on Intelligence Information Processing and Trusted Comp, IEEE, 406--408."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), IEEE, 178--182","author":"Zhao J.","unstructured":"Zhao , J. , Xia , K. , Fu , Y. , and Cui , B . 2015. An AST-based Code Plagiarism Detection Algorithm . In Proceedings of the 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), IEEE, 178--182 . Zhao, J., Xia, K., Fu, Y., and Cui, B. 2015. An AST-based Code Plagiarism Detection Algorithm. In Proceedings of the 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), IEEE, 178--182."},{"key":"e_1_3_2_1_23_1","volume-title":"Program Logic Based Software Plagiarism Detection. 25th Int. Symposium on Software Reliability Engineering, IEEE, 66--77","author":"Zhang F.","unstructured":"Zhang , F. , Wu , D. , Liu , P. , and Zhu , S . 2014 . Program Logic Based Software Plagiarism Detection. 25th Int. Symposium on Software Reliability Engineering, IEEE, 66--77 . Zhang, F., Wu, D., Liu, P., and Zhu, S. 2014. Program Logic Based Software Plagiarism Detection. 25th Int. Symposium on Software Reliability Engineering, IEEE, 66--77."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 33rd International Conference on Software Engineering (ICSE), IEEE, 756--765","author":"Jhi Y.","unstructured":"Jhi , Y. , Wang , X. , Jia , X. , Zhu , S. , Liu , P. , and Wu , D . 2011. Value-based program characterization and its application to software plagiarism detection . In Proceedings of the 33rd International Conference on Software Engineering (ICSE), IEEE, 756--765 . Jhi, Y., Wang, X., Jia, X., Zhu, S., Liu, P., and Wu, D. 2011. Value-based program characterization and its application to software plagiarism detection. In Proceedings of the 33rd International Conference on Software Engineering (ICSE), IEEE, 756--765."},{"key":"e_1_3_2_1_25_1","volume-title":"Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection","author":"Luo L.","year":"2017","unstructured":"Luo , L. , Ming , J. , Wu , D. , Liu , P. , and Zhu , S . Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection . IEEE Transactions on Software Engineering 43, 12 ( Dec 2017 ), 1157--1177 Luo, L., Ming, J., Wu, D., Liu, P., and Zhu, S. Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection. IEEE Transactions on Software Engineering 43, 12 (Dec 2017), 1157--1177"}],"event":{"name":"ICSIM '20: The 3rd International Conference on Software Engineering and Information Management","location":"Sydney NSW Australia","acronym":"ICSIM '20","sponsor":["University of Science and Technology of China University of Science and Technology of China"]},"container-title":["Proceedings of the 3rd International Conference on Software Engineering and Information Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378936.3378960","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3378936.3378960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:47Z","timestamp":1750203887000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378936.3378960"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,12]]},"references-count":25,"alternative-id":["10.1145\/3378936.3378960","10.1145\/3378936"],"URL":"https:\/\/doi.org\/10.1145\/3378936.3378960","relation":{},"subject":[],"published":{"date-parts":[[2020,1,12]]},"assertion":[{"value":"2020-03-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}