{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:46:28Z","timestamp":1772909188755,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T00:00:00Z","timestamp":1720137600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the Natural Science Foundation of China","award":["U2336206"],"award-info":[{"award-number":["U2336206"]}]},{"name":"the Natural Science Foundation of China","award":["62372423"],"award-info":[{"award-number":["62372423"]}]},{"name":"the Natural Science Foundation of China","award":["62102386"],"award-info":[{"award-number":["62102386"]}]},{"name":"the Natural Science Foundation of China","award":["62072421"],"award-info":[{"award-number":["62072421"]}]},{"name":"the Natural Science Foundation of China","award":["62121002"],"award-info":[{"award-number":["62121002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,5]]},"DOI":"10.1145\/3674399.3674447","type":"proceedings-article","created":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T22:26:48Z","timestamp":1722378408000},"page":"120-125","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["CodeWMBench: An Automated Benchmark for Code Watermarking Evaluation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-4441-173X","authenticated-orcid":false,"given":"BenLong","family":"Wu","sequence":"first","affiliation":[{"name":"University of Science and Technology of China, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9868-3414","authenticated-orcid":false,"given":"Kejiang","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9546-5043","authenticated-orcid":false,"given":"Yanru","family":"He","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0651-6617","authenticated-orcid":false,"given":"Guoqiang","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5576-6108","authenticated-orcid":false,"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4417-9316","authenticated-orcid":false,"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[1] n.d.https:\/\/www.zerogpt.com"},{"key":"e_1_3_2_1_2_1","volume-title":"A Method for Watermarking Java Programs via Opaque Predicates. Electronic Commerce Research","author":"Arboit Genevi\u00e8ve","year":"2002","unstructured":"Genevi\u00e8ve Arboit. 2002. A Method for Watermarking Java Programs via Opaque Predicates. Electronic Commerce Research (2002)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2012.46"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377816.3381720"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64861-3_81"},{"key":"e_1_3_2_1_6_1","volume-title":"International Workshop on Information Hiding. 192\u2013207","author":"Collberg Christian","year":"2005","unstructured":"Christian Collberg, Andrew Huntwork, Edward Carter, and Gregg Townsend. 2005. Graph theoretic software watermarks: Implementation, analysis, and attacks. In International Workshop on Information Hiding. 192\u2013207."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292569"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/982962.964016"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2017.02.005"},{"key":"e_1_3_2_1_10_1","volume-title":"Software Watermarking: Progress and Challenges. INAE Letters 4","author":"Dey Ayan","year":"2018","unstructured":"Ayan Dey, Sukriti Bhattacharya, and Nabendu Chaki. 2018. Software Watermarking: Progress and Challenges. INAE Letters 4 (2018)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/WorldCIS17046.2011.5749891"},{"key":"e_1_3_2_1_12_1","volume-title":"A watermark for large language models. ArXiv preprint abs\/2301.10226","author":"Kirchenbauer John","year":"2023","unstructured":"John Kirchenbauer, Jonas Geiping, Yuxin Wen, Jonathan Katz, Ian Miers, and Tom Goldstein. 2023. A watermark for large language models. ArXiv preprint abs\/2301.10226 (2023)."},{"key":"e_1_3_2_1_13_1","volume-title":"Who wrote this code? watermarking for code generation. ArXiv preprint abs\/2305.15060","author":"Lee Taehyun","year":"2023","unstructured":"Taehyun Lee, Seokhee Hong, Jaewoo Ahn, Ilgee Hong, Hwaran Lee, Sangdoo Yun, Jamin Shin, and Gunhee Kim. 2023. Who wrote this code? watermarking for code generation. ArXiv preprint abs\/2305.15060 (2023)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3182979"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2908071"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-006-6955-z"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898885"},{"key":"e_1_3_2_1_18_1","volume-title":"CodeBLEU: a Method for Automatic Evaluation of Code Synthesis. ArXiv preprint abs\/2009.10297","author":"Ren Shuo","year":"2020","unstructured":"Shuo Ren, Daya Guo, Shuai Lu, Long Zhou, Shujie Liu, Duyu Tang, Neel Sundaresan, Ming Zhou, Ambrosio Blanco, and Shuai Ma. 2020. CodeBLEU: a Method for Automatic Evaluation of Code Synthesis. ArXiv preprint abs\/2009.10297 (2020)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616297"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512225"},{"key":"e_1_3_2_1_21_1","unstructured":"Edward Tian and Alexander Cui. 2023. GPTZero: Towards detection of AI-generated text using zero-shot and supervised methods."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.13"},{"key":"e_1_3_2_1_23_1","volume-title":"A survey on llm-gernerated text detection: Necessity, methods, and future directions. ArXiv preprint abs\/2310.14724","author":"Wu Junchao","year":"2023","unstructured":"Junchao Wu, Shu Yang, Runzhe Zhan, Yulin Yuan, Derek\u00a0F Wong, and Lidia\u00a0S Chao. 2023. A survey on llm-gernerated text detection: Necessity, methods, and future directions. ArXiv preprint abs\/2310.14724 (2023)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450034"},{"key":"e_1_3_2_1_25_1","volume-title":"IEEE Symposium on Security and Privacy (SP). 97\u201397","author":"Yang Borui","year":"2024","unstructured":"Borui Yang, Wei Li, Liyao Xiang, and Bo Li. 2024. SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations. In IEEE Symposium on Security and Privacy (SP). 97\u201397."},{"key":"e_1_3_2_1_26_1","volume-title":"Codebertscore: Evaluating code generation with pretrained models of code. arXiv preprint arXiv:2302.05527","author":"Zhou Shuyan","year":"2023","unstructured":"Shuyan Zhou, Uri Alon, Sumit Agarwal, and Graham Neubig. 2023. Codebertscore: Evaluating code generation with pretrained models of code. arXiv preprint arXiv:2302.05527 (2023)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/11427995_42"}],"event":{"name":"ACM-TURC '24: ACM Turing Award Celebration Conference 2024","location":"Changsha China","acronym":"ACM-TURC '24"},"container-title":["ACM Turing Award Celebration Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674399.3674447","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3674399.3674447","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:03Z","timestamp":1750291563000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674399.3674447"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,5]]},"references-count":27,"alternative-id":["10.1145\/3674399.3674447","10.1145\/3674399"],"URL":"https:\/\/doi.org\/10.1145\/3674399.3674447","relation":{},"subject":[],"published":{"date-parts":[[2024,7,5]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}