{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:51:21Z","timestamp":1755802281469,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:00:00Z","timestamp":1710374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2111323,2313793"],"award-info":[{"award-number":["2111323,2313793"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3,14]]},"DOI":"10.1145\/3626253.3635519","type":"proceedings-article","created":{"date-parts":[[2024,3,15]],"date-time":"2024-03-15T12:22:56Z","timestamp":1710505376000},"page":"1624-1625","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Style Anomalies Can Suggest Cheating in CS1 Programs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-8335-4915","authenticated-orcid":false,"given":"Benjamin","family":"Denzler","sequence":"first","affiliation":[{"name":"Computer Science &amp; Engineering, University of California, Riverside, Riverside, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5416-0032","authenticated-orcid":false,"given":"Frank","family":"Vahid","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering, University of California, Riverside, Riverside, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5154-6810","authenticated-orcid":false,"given":"Ashley","family":"Pang","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, University of California, Riverside, Riverside, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,3,15]]},"reference":[{"volume-title":"Proceedings of the 2003 ACM SIGMOD international conference on Management of data (pp. 76--85)","author":"Schleimer S.","unstructured":"Schleimer, S., Wilkerson, D.S. and Aiken, A., 2003, June. Winnowing: local algorithms for document fingerprinting. In Proceedings of the 2003 ACM SIGMOD international conference on Management of data (pp. 76--85).","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/jplag.ipd.kit.edu\/, accessed","author":"Software","year":"2022","unstructured":"Software plagiarism detector, https:\/\/jplag.ipd.kit.edu\/, accessed 2022."},{"key":"e_1_3_2_1_3_1","volume-title":"Finding plagiarisms among a set of programs with JPlag. Journal UCS, 8(11)","author":"Prechelt L.","year":"2002","unstructured":"Prechelt, L., Malpohl, G. and Philippsen, M. Finding plagiarisms among a set of programs with JPlag. Journal UCS, 8(11), 2002."},{"key":"e_1_3_2_1_4_1","volume-title":"accessed","author":"GitHub","year":"2022","unstructured":"GitHub.com, accessed August 2022."},{"unstructured":"Sad CS Major. How UCLA Admins Could Stop The GitHub Cheating and Let Us Get Back To Learning CS https:\/\/medium.com\/@joe_bruined\/how-ucla-admins-could-stop-the-github-cheating-and-let-us-get-back-to-learning-cs-8f95e8bf6850","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","volume-title":"accessed","author":"Chegg","year":"2022","unstructured":"Chegg.com, accessed August 2022."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.54097\/fcis.v2i2.4465"},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/google.github.io\/styleguide\/cppguide.html, accessed","author":"Google's","year":"2022","unstructured":"Google's C++ style guide, https:\/\/google.github.io\/styleguide\/cppguide.html, accessed 2022."},{"volume-title":"https:\/\/github.com\/cpplint\/cpplint, accessed","year":"2022","unstructured":"cpplint style checker for C++, https:\/\/github.com\/cpplint\/cpplint, accessed 2022.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/peps.python.org\/pep-0008\/, accessed","author":"Python","year":"2022","unstructured":"PEP8 style guide for Python, https:\/\/peps.python.org\/pep-0008\/, accessed 2022."},{"volume-title":"Proceedings of the 17th conference on ACM Annual Computer Science Conference (pp. 320--326)","author":"Oman P.W.","unstructured":"Oman, P.W. and Cook, C.R., 1989, February. Programming style authorship analysis. In Proceedings of the 17th conference on ACM Annual Computer Science Conference (pp. 320--326).","key":"e_1_3_2_1_11_1"},{"volume-title":"Proceedings of 2012 International Conference on Interactive Mobile and Computer Aided Learning (IMCL) (pp. 180--186)","author":"Arabyarmohamady S.","unstructured":"Arabyarmohamady, S., Moradi, H. and Asadpour, M., 2012, November. A coding style-based plagiarism detection. In Proceedings of 2012 International Conference on Interactive Mobile and Computer Aided Learning (IMCL) (pp. 180--186). IEEE.","key":"e_1_3_2_1_12_1"},{"volume-title":"2017 IEEE 17th international conference on advanced learning technologies (ICALT) (pp. 296--297)","author":"Mirza O.M.","unstructured":"Mirza, O.M., Joy, M. and Cosma, G., 2017, July. Style analysis for source code plagiarism detection-an analysis of a dataset of student coursework. In 2017 IEEE 17th international conference on advanced learning technologies (ICALT) (pp. 296--297). IEEE.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.47839\/ijc.19.1.1690"}],"event":{"sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"acronym":"SIGCSE 2024","name":"SIGCSE 2024: The 55th ACM Technical Symposium on Computer Science Education","location":"Portland OR USA"},"container-title":["Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3626253.3635519","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3626253.3635519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T10:27:13Z","timestamp":1755772033000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3626253.3635519"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,14]]},"references-count":14,"alternative-id":["10.1145\/3626253.3635519","10.1145\/3626253"],"URL":"https:\/\/doi.org\/10.1145\/3626253.3635519","relation":{},"subject":[],"published":{"date-parts":[[2024,3,14]]},"assertion":[{"value":"2024-03-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}