{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:11:14Z","timestamp":1773414674603,"version":"3.50.1"},"reference-count":11,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["2016JX06"],"award-info":[{"award-number":["2016JX06"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["61472369"],"award-info":[{"award-number":["61472369"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2016JX06"],"award-info":[{"award-number":["2016JX06"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472369"],"award-info":[{"award-number":["61472369"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Judao Youda Network Technology Co. Ltd.","award":["2016JX06"],"award-info":[{"award-number":["2016JX06"]}]},{"name":"Beijing Judao Youda Network Technology Co. Ltd.","award":["61472369"],"award-info":[{"award-number":["61472369"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Scientific Programming"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>In this paper, we introduce a source code plagiarism detection method, named WASTK (Weighted Abstract Syntax Tree Kernel), for computer science education. Different from other plagiarism detection methods, WASTK takes some aspects other than the similarity between programs into account. WASTK firstly transfers the source code of a program to an abstract syntax tree and then gets the similarity by calculating the tree kernel of two abstract syntax trees. To avoid misjudgment caused by trivial code snippets or frameworks given by instructors, an idea similar to TF-IDF (Term Frequency-Inverse Document Frequency) in the field of information retrieval is applied. Each node in an abstract syntax tree is assigned a weight by TF-IDF. WASTK is evaluated on different datasets and, as a result, performs much better than other popular methods like Sim and JPlag.<\/jats:p>","DOI":"10.1155\/2017\/7809047","type":"journal-article","created":{"date-parts":[[2017,2,13]],"date-time":"2017-02-13T21:02:13Z","timestamp":1487019733000},"page":"1-8","source":"Crossref","is-referenced-by-count":23,"title":["WASTK: A Weighted Abstract Syntax Tree Kernel Method for Source Code Plagiarism Detection"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2960-3337","authenticated-orcid":true,"given":"Deqiang","family":"Fu","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Beijing Forestry University, No. 35 Qinghuadong Road, Haidian District, Beijing 100083, China"},{"name":"Jisuan Institute of Technology, Beijing Judao Youda Network Technology Co. Ltd., No. 18 Suzhoujie St., Room 1204, Haidian District, Beijing 100080, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7174-6588","authenticated-orcid":true,"given":"Yanyan","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Beijing Forestry University, No. 35 Qinghuadong Road, Haidian District, Beijing 100083, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Haoran","family":"Yu","sequence":"additional","affiliation":[{"name":"Jisuan Institute of Technology, Beijing Judao Youda Network Technology Co. Ltd., No. 18 Suzhoujie St., Room 1204, Haidian District, Beijing 100080, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9270-730X","authenticated-orcid":true,"given":"Boyang","family":"Yang","sequence":"additional","affiliation":[{"name":"Jisuan Institute of Technology, Beijing Judao Youda Network Technology Co. Ltd., No. 18 Suzhoujie St., Room 1204, Haidian District, Beijing 100080, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2016.06"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1080\/02602938.2014.880776"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/429807"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1108\/eb026526"},{"issue":"1","key":"9","doi-asserted-by":"crossref","first-page":"97","DOI":"10.15388\/infedu.2006.08","volume":"5","year":"2006","journal-title":"Informatics in Education"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2011.223"},{"key":"12","year":"1988"},{"issue":"1","key":"13","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1145\/236462.236525","volume":"28","year":"1996","journal-title":"ACM SIGCSE Bulletin"},{"key":"17","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1145\/384266.299783","volume":"31","year":"1999","journal-title":"ACM SIGCSE Bulletin"},{"issue":"1","key":"19","first-page":"3747","volume":"3","year":"2016","journal-title":"Journal of Multidisciplinary Engineering Science and Technology"},{"key":"20","year":"2010"}],"container-title":["Scientific Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2017\/7809047.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2017\/7809047.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2017\/7809047.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T06:14:59Z","timestamp":1692684899000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/sp\/2017\/7809047\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":11,"alternative-id":["7809047","7809047"],"URL":"https:\/\/doi.org\/10.1155\/2017\/7809047","relation":{},"ISSN":["1058-9244","1875-919X"],"issn-type":[{"value":"1058-9244","type":"print"},{"value":"1875-919X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}