{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:58:48Z","timestamp":1776095928822,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T00:00:00Z","timestamp":1623110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,8]]},"DOI":"10.1145\/3430895.3460982","type":"proceedings-article","created":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T01:27:20Z","timestamp":1623029240000},"page":"335-338","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["JackMarker with GitDown: A Framework to Counter Plagiarism at Scale"],"prefix":"10.1145","author":[{"given":"Akshay","family":"Dahiya","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Rocko","family":"Graziano","sequence":"additional","affiliation":[{"name":"University of Maine at Augusta, Augusta, ME, USA"}]},{"given":"India","family":"Irish","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Thad","family":"Starner","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,8]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Security, Steganography, and Watermarking of Multimedia Contents VI","author":"Alattar Adnan M","unstructured":"Adnan M Alattar and Osama Mohammed Alattar . 2004. Watermarking electronic text documents containing justified paragraphs and irregular line spacing . In Security, Steganography, and Watermarking of Multimedia Contents VI , Vol. 5306 . International Society for Optics and Photonics , 685--695. Adnan M Alattar and Osama Mohammed Alattar. 2004. Watermarking electronic text documents containing justified paragraphs and irregular line spacing. In Security, Steganography, and Watermarking of Multimedia Contents VI, Vol. 5306. International Society for Optics and Photonics, 685--695."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_36"},{"key":"e_1_3_2_2_3_1","volume-title":"version 3.0","author":"Unicode Consortium","unstructured":"Unicode Consortium . 2000. The Unicode standard , version 3.0 . Addison-Wesley Professional . Unicode Consortium. 2000.The Unicode standard, version 3.0. Addison-Wesley Professional."},{"key":"e_1_3_2_2_4_1","unstructured":"C Daly and JM Horgan. 2001. Automatic plagiarism detection. In APPLIED INFORMATICS-PROCEEDINGS-. 355--359.  C Daly and JM Horgan. 2001. Automatic plagiarism detection. In APPLIED INFORMATICS-PROCEEDINGS-. 355--359."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Charlie Daly and Jane Horgan. 2005. A technique for detecting plagiarism in computer code.Comput. J.48 6(2005) 662--666.  Charlie Daly and Jane Horgan. 2005. A technique for detecting plagiarism in computer code.Comput. J.48 6(2005) 662--666.","DOI":"10.1093\/comjnl\/bxh139"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/782941.783000"},{"key":"e_1_3_2_2_7_1","unstructured":"Github. 2021. Search API. (2021).  Github. 2021. Search API. (2021)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/15391523.2013.10782604"},{"key":"e_1_3_2_2_9_1","unstructured":"Paul Irish. 2020. Github-Email: Retrieve a GitHubuser's email even if it's not public. (2020).  Paul Irish. 2020. Github-Email: Retrieve a GitHubuser's email even if it's not public. (2020)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMT.2009.11"},{"key":"e_1_3_2_2_11_1","unstructured":"Frank M LoSchiavo and Mark A Shatz. 2011. The impact of an honor code on cheating in online courses.MERLOT Journal of online Learning and Teaching 7 2(2011).  Frank M LoSchiavo and Mark A Shatz. 2011. The impact of an honor code on cheating in online courses.MERLOT Journal of online Learning and Teaching 7 2(2011)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287443"},{"key":"e_1_3_2_2_13_1","volume-title":"Examining on line college cyber cheating methods and prevention measures. Electronic Journal of E-learning11, 2","author":"Jr James Moten","year":"2013","unstructured":"James Moten Jr , Alex Fitterer , Elise Brazier , Jonathan Leonard , and Avis Brown . 2013. Examining on line college cyber cheating methods and prevention measures. Electronic Journal of E-learning11, 2 ( 2013 ), 139--146. James Moten Jr, Alex Fitterer, Elise Brazier, Jonathan Leonard, and Avis Brown. 2013. Examining on line college cyber cheating methods and prevention measures. Electronic Journal of E-learning11, 2 (2013), 139--146."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017680.3017797"},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of the 2003 ACM SIGMOD international conference on Management of data. 76--85","author":"Schleimer Saul","unstructured":"Saul Schleimer , Daniel S Wilkerson , and Alex Aiken .2003. Winnowing : local algorithms for document fingerprinting . In Proceedings of the 2003 ACM SIGMOD international conference on Management of data. 76--85 . Saul Schleimer, Daniel S Wilkerson, and Alex Aiken.2003. Winnowing: local algorithms for document fingerprinting. In Proceedings of the 2003 ACM SIGMOD international conference on Management of data. 76--85."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3051457.3051466"},{"key":"e_1_3_2_2_17_1","unstructured":"Wikipedia. 2021. Whitespace Characters. (2021).  Wikipedia. 2021. Whitespace Characters. (2021)."}],"event":{"name":"L@S '21: Eighth (2021) ACM Conference on Learning @ Scale","location":"Virtual Event Germany","acronym":"L@S '21"},"container-title":["Proceedings of the Eighth ACM Conference on Learning @ Scale"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3430895.3460982","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3430895.3460982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:41Z","timestamp":1750195481000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3430895.3460982"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,8]]},"references-count":17,"alternative-id":["10.1145\/3430895.3460982","10.1145\/3430895"],"URL":"https:\/\/doi.org\/10.1145\/3430895.3460982","relation":{},"subject":[],"published":{"date-parts":[[2021,6,8]]},"assertion":[{"value":"2021-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}