{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T04:48:41Z","timestamp":1772599721627,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T00:00:00Z","timestamp":1653436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,25]]},"DOI":"10.1145\/3543895.3543928","type":"proceedings-article","created":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T21:03:32Z","timestamp":1674767012000},"page":"19-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Authorship Verification for Hired Plagiarism Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1903-6615","authenticated-orcid":false,"given":"Daniel","family":"Enriquez","sequence":"first","affiliation":[{"name":"Department of Computer Science &amp; Engineering, University of Nevada Reno, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5502-7513","authenticated-orcid":false,"given":"Gage","family":"Christensen","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Engineering, University of Nevada Reno, USA"}]},{"given":"Hayden","family":"Donovan","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Engineering, University of Nevada Reno, USA"}]},{"given":"Jared","family":"Lam","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Engineering, University of Nevada Reno, USA"}]},{"given":"Noah","family":"Wong","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Engineering, University of Nevada Reno, USA"}]},{"given":"Sergiu","family":"Dascalu","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Engineering, University of Nevada Reno, USA"}]},{"given":"David","family":"Feil-Seifer","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Engineering, University of Nevada Reno, USA"}]},{"given":"Emily","family":"Hand","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Engineering, University of Nevada Reno, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,1,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09823-4_4"},{"key":"e_1_3_2_1_2_1","volume-title":"Advances in Knowledge Discovery and Data Mining, Jian Pei, Vincent\u00a0S. Tseng","author":"Campello Ricardo J.","unstructured":"Ricardo J. G.\u00a0B. Campello , Davoud Moulavi , and Joerg Sander . 2013. Density-Based Clustering Based on Hierarchical Density Estimates . In Advances in Knowledge Discovery and Data Mining, Jian Pei, Vincent\u00a0S. Tseng , Longbing Cao, Hiroshi Motoda, and Guandong Xu (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 160\u2013172. Ricardo J. G.\u00a0B. Campello, Davoud Moulavi, and Joerg Sander. 2013. Density-Based Clustering Based on Hierarchical Density Estimates. In Advances in Knowledge Discovery and Data Mining, Jian Pei, Vincent\u00a0S. Tseng, Longbing Cao, Hiroshi Motoda, and Guandong Xu (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 160\u2013172."},{"key":"e_1_3_2_1_3_1","unstructured":"Simon Coghlan Tim Miller and Jeannie Paterson. 2020. Good proctor or\u201d Big Brother\u201d? AI Ethics and Online Exam Supervision Technologies. arXiv preprint arXiv:2011.07647(2020).  Simon Coghlan Tim Miller and Jeannie Paterson. 2020. Good proctor or\u201d Big Brother\u201d? AI Ethics and Online Exam Supervision Technologies. arXiv preprint arXiv:2011.07647(2020)."},{"key":"e_1_3_2_1_4_1","unstructured":"Coventry University. 2022 [Online]. British Academic Written English Corpus (BAWE). https:\/\/www.coventry.ac.uk\/bawe\/  Coventry University. 2022 [Online]. British Academic Written English Corpus (BAWE). https:\/\/www.coventry.ac.uk\/bawe\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/02602938.2019.1662884"},{"key":"e_1_3_2_1_6_1","unstructured":"Gage Christensen and Daniel Enriquez and Hayden Donovan and Noah Wong and Jared Lam. 2022 [Online]. Authorship Verification for Hired Plagiarism Detection. https:\/\/github.com\/grchristensen\/avpd  Gage Christensen and Daniel Enriquez and Hayden Donovan and Noah Wong and Jared Lam. 2022 [Online]. Authorship Verification for Hired Plagiarism Detection. https:\/\/github.com\/grchristensen\/avpd"},{"key":"e_1_3_2_1_7_1","unstructured":"GrammarlyInc. 2022 [Online]. Grammarly Free Online Writing Service. https:\/\/www.gramarly.com  GrammarlyInc. 2022 [Online]. Grammarly Free Online Writing Service. https:\/\/www.gramarly.com"},{"key":"e_1_3_2_1_8_1","volume-title":"Principal component analysis: methods, applications and technology","author":"Gray Virginia","unstructured":"Virginia Gray . 2017. Principal component analysis: methods, applications and technology . Nova Science Publishers, Inc orporated. Virginia Gray. 2017. Principal component analysis: methods, applications and technology. Nova Science Publishers, Incorporated."},{"key":"e_1_3_2_1_9_1","unstructured":"Alexander Hamilton James Madison and James Jay. 1788. The Federalist Papers.  Alexander Hamilton James Madison and James Jay. 1788. The Federalist Papers."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1500879.1500935"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(94)90029-9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015448"},{"key":"e_1_3_2_1_13_1","unstructured":"James O\u2019Shea. 2022 [Online]. Function word lists | Semantic Similarity. https:\/\/semanticsimilarity.wordpress.com\/function-word-lists\/  James O\u2019Shea. 2022 [Online]. Function word lists | Semantic Similarity. https:\/\/semanticsimilarity.wordpress.com\/function-word-lists\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Proctorio. 2022 [Online]. Proctorio: Securing the integrity of your online assessments. | Proctorio. https:\/\/proctorio.com\/  Proctorio. 2022 [Online]. Proctorio: Securing the integrity of your online assessments. | Proctorio. https:\/\/proctorio.com\/"},{"key":"e_1_3_2_1_15_1","unstructured":"PSAL. 2022 [Online]. JStylo-Anonymouth - Authorship Attribution and Authorship Anonymization Framework. https:\/\/github.com\/psal\/jstylo  PSAL. 2022 [Online]. JStylo-Anonymouth - Authorship Attribution and Authorship Anonymization Framework. https:\/\/github.com\/psal\/jstylo"},{"key":"e_1_3_2_1_16_1","unstructured":"Quetext. 2022 [Online]. Original Writing Made Easy | Quetext. https:\/\/www.quetext.com\/  Quetext. 2022 [Online]. Original Writing Made Easy | Quetext. https:\/\/www.quetext.com\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21001"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.53761\/1.2.3.10"},{"key":"e_1_3_2_1_19_1","unstructured":"TurnitinLLC. 2022 [Online]. Contract Cheating | Turnitin. https:\/\/www.turnitin.com\/products\/originality\/contract-cheating  TurnitinLLC. 2022 [Online]. Contract Cheating | Turnitin. https:\/\/www.turnitin.com\/products\/originality\/contract-cheating"},{"key":"e_1_3_2_1_20_1","unstructured":"TurnitinLLC. 2022 [Online]. Empower students to do their best original work. https:\/\/www.turnitin.com  TurnitinLLC. 2022 [Online]. Empower students to do their best original work. https:\/\/www.turnitin.com"}],"event":{"name":"ACIT 2022: The 9th International Conference on Applied Computing & Information Technology","location":"Virtual Event USA","acronym":"ACIT 2022"},"container-title":["Proceedings of the 9th International Conference on Applied Computing &amp; Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543895.3543928","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543895.3543928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:18Z","timestamp":1750178778000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543895.3543928"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,25]]},"references-count":20,"alternative-id":["10.1145\/3543895.3543928","10.1145\/3543895"],"URL":"https:\/\/doi.org\/10.1145\/3543895.3543928","relation":{},"subject":[],"published":{"date-parts":[[2022,5,25]]},"assertion":[{"value":"2023-01-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}