{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T14:37:41Z","timestamp":1759847861360,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:00:00Z","timestamp":1726185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"JSPS KAKENHI","award":["JP20H05706"],"award-info":[{"award-number":["JP20H05706"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,13]]},"DOI":"10.1145\/3698062.3698087","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T07:24:57Z","timestamp":1733729097000},"page":"169-176","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Comparison of Similarity Functions for n-gram Software Birthmarks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-0310-5881","authenticated-orcid":false,"given":"Nikolay","family":"Fedorov","sequence":"first","affiliation":[{"name":"Graduate School of Environmental, Life, Natural Science and Technology, Okayama University, Okayama, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1838-9184","authenticated-orcid":false,"given":"Haruaki","family":"Tamada","sequence":"additional","affiliation":[{"name":"Faculty of Information Science and Engineering, Kyoto Sangyo University, Kyoto, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3355-8804","authenticated-orcid":false,"given":"Hiroki","family":"Inayoshi","sequence":"additional","affiliation":[{"name":"Faculty of Environmental, Life, Natural Science and Technology, Okayama University, Okayama, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4295-207X","authenticated-orcid":false,"given":"Akito","family":"Monden","sequence":"additional","affiliation":[{"name":"Faculty of Environmental, Life, Natural Science and Technology, Okayama University, Okayama, Japan"}]}],"member":"320","published-online":{"date-parts":[[2024,12,8]]},"reference":[{"key":"e_1_3_3_2_1_2","doi-asserted-by":"publisher","DOI":"10.1093\/ietisy\/e88-d.9.2148"},{"key":"e_1_3_3_2_2_2","first-page":"575","volume-title":"Proc. IASTED International Conference on Software Engineering (IASTED SE 2004","author":"Tamada Haruaki","year":"2004","unstructured":"Haruaki Tamada, Masahide Nakamura, Akito Monden and Ken-ichi Matsumoto. Design and evaluation of birthmarks for detecting theft of Java programs. Proc. IASTED International Conference on Software Engineering (IASTED SE 2004), pp.569\u2013575, Innsbruck, Austria, 2004."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066753"},{"issue":"1","key":"e_1_3_3_2_4_2","first-page":"165","article-title":"Towards the auto extraction for the dynamic software birthmarks with the inputs from the plaintiff software","volume":"22","author":"Alejandro Cerme\u00f1o","year":"2023","unstructured":"Cerme\u00f1o Alejandro, Haruaki Tamada and Yuichiro Kanzaki. Towards the auto extraction for the dynamic software birthmarks with the inputs from the plaintiff software. J-Global, vol.22, no.1, pp.165-168, 2023.","journal-title":"J-Global"},{"key":"e_1_3_3_2_5_2","first-page":"415","volume-title":"Detecting software theft via whole program path birthmarks. Information security","author":"Myles Ginger","year":"2004","unstructured":"Ginger Myles and Christian Collberg. Detecting software theft via whole program path birthmarks. Information security, pp.404\u2013415, Springer, 2004."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015EDP7379"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.04.011"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2454508"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-019-03718-9"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292569"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2000.884716"},{"key":"e_1_3_3_2_12_2","first-page":"458","volume-title":"Clark Thomborson and Fei-Yue Wang. A survey of software watermarking. Intelligence and Security Informatics","author":"Zhu William","year":"2005","unstructured":"William Zhu, Clark Thomborson and Fei-Yue Wang. A survey of software watermarking. Intelligence and Security Informatics, pp.454\u2013458, Springer, 2005."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(97)00005-9"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90055-A"},{"issue":"11","key":"e_1_3_3_2_15_2","first-page":"1016","article-title":"Finding plagiarisms among a set of programs with JPlag","volume":"8","author":"Prechelt Lutz","year":"2002","unstructured":"Lutz Prechelt, Guido Malpohl, and Michael Philippsen; Finding plagiarisms among a set of programs with JPlag, Journal of Universal Computer Science, vol.8, No.11, pp.1016\u20131038, 2002.","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_3_2_16_2","first-page":"134","volume-title":"Proc. 27 SIGCSE technical symposium on Computer science education","author":"Wise Michael J.","year":"1996","unstructured":"Michael J. Wise, YAP3: Improved detection of similarities in computer program and other texts, Proc. 27 SIGCSE technical symposium on Computer science education, pp.130\u2013134, 1996."},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2507848"},{"key":"e_1_3_3_2_19_2","volume-title":"GitHub","author":"Tamada Haruaki","year":"2024","unstructured":"Haruaki Tamada. Pochi. Detecting the software theft, the birthmark toolkit for the JVM platform. GitHub, 2024. https:\/\/tamada.github.io\/pochi\/examples\/"},{"key":"e_1_3_3_2_20_2","unstructured":"Haruaki Tamada. Pochi Threshold.java. GitHub 2024. https:\/\/github.com\/tamada\/pochi\/blob\/main\/pochi-api\/src\/main\/java\/jp\/cafebabe\/birthmarks\/comparators\/Threshold.java"}],"event":{"name":"WSSE 2024: 2024 The 6th World Symposium on Software Engineering (WSSE)","acronym":"WSSE 2024","location":"Kyoto Japan"},"container-title":["Proceedings of the 2024 The 6th World Symposium on Software Engineering (WSSE)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3698062.3698087","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3698062.3698087","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:27Z","timestamp":1750295427000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3698062.3698087"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,13]]},"references-count":20,"alternative-id":["10.1145\/3698062.3698087","10.1145\/3698062"],"URL":"https:\/\/doi.org\/10.1145\/3698062.3698087","relation":{},"subject":[],"published":{"date-parts":[[2024,9,13]]},"assertion":[{"value":"2024-12-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}