{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:09:28Z","timestamp":1773414568952,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:00:00Z","timestamp":1605744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,19]]},"DOI":"10.1145\/3428029.3428064","type":"proceedings-article","created":{"date-parts":[[2020,11,22]],"date-time":"2020-11-22T20:32:05Z","timestamp":1606077125000},"page":"1-5","source":"Crossref","is-referenced-by-count":11,"title":["Disguising Code to Help Students Understand Code Similarity"],"prefix":"10.1145","author":[{"given":"Oscar","family":"Karnalim","sequence":"first","affiliation":[{"name":"University of Newcastle, Australia"}]},{"family":"Simon","sequence":"additional","affiliation":[{"name":"University of Newcastle, Australia"}]}],"member":"320","published-online":{"date-parts":[[2020,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1080\/14703297.2014.993418"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3926\/jotse.638"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372356.3372369"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS47205.2019.9040853"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2014.01"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/EWME.2016.7496465"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/13.762946"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","first-page":"27","DOI":"10.47839\/ijc.19.1.1690","article-title":"Programming style on source code plagiarism and collusion detection","volume":"19","author":"Karnalim Oscar","year":"2020","journal-title":"International Journal of Computing"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TALE48000.2019.9225953"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSA.2017.29"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/LaTiCE.2013.37"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462476.2462505"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1151869.1151888"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICALT.2017.117"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3304221.3319789"},{"key":"e_1_3_2_1_16_1","unstructured":"Terence Parr. 2013. The Definitive ANTLR 4 Reference. Pragmatic Bookshelf.  Terence Parr. 2013. The Definitive ANTLR 4 Reference. Pragmatic Bookshelf."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON.2018.8363346"},{"key":"e_1_3_2_1_18_1","first-page":"1016","article-title":"Finding plagiarisms among a set of programs with JPlag","volume":"8","author":"Prechelt Lutz","year":"2002","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2662708.2662722"},{"key":"e_1_3_2_1_21_1","unstructured":"Robert Sedgewick and Kevin Wayne. 2011. Algorithms (4thed.). Pearson.  Robert Sedgewick and Kevin Wayne. 2011. Algorithms (4thed.). Pearson."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3059009.3059064"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159547"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3024906.3024910"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/236462.236525"},{"key":"e_1_3_2_1_26_1","volume-title":"Beyond plagiarism: an active learning method to analyze causes behind code-similarity. Computers & Education 70 (Jan","author":"Yang Feng-Pu","year":"2014"}],"event":{"name":"Koli Calling '20: 20th Koli Calling International Conference on Computing Education Research","location":"Koli Finland","acronym":"Koli Calling '20"},"container-title":["Koli Calling '20: Proceedings of the 20th Koli Calling International Conference on Computing Education Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428029.3428064","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3428029.3428064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:23Z","timestamp":1750195463000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428029.3428064"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,19]]},"references-count":26,"alternative-id":["10.1145\/3428029.3428064","10.1145\/3428029"],"URL":"https:\/\/doi.org\/10.1145\/3428029.3428064","relation":{},"subject":[],"published":{"date-parts":[[2020,11,19]]}}}