A Token-based Illicit Copy Detection Method using Complexity for a Program Exercise

被引:1
|
作者
Iwamoto, Mai [1 ]
Oshima, Shunsuke [2 ]
Nakashima, Takuo [3 ]
机构
[1] Kumamoto Natl Coll Technol, Ctr Tech & Educ Support, 2,627 Hirayama Shinmachi, Yatsushiro, Kumamoto 8668501, Japan
[2] Kumamoto Natl Coll Technol, ICT Ctr Learning Support, Yatsushiro, Kumamoto 8668501, Japan
[3] Tokai Univ, Dept Electron Engn & Comp Sci, Kumamoto 862, Japan
关键词
copy detection; code clone; programming exercise; token-based; complexity;
D O I
10.1109/BWCCA.2013.100
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The conducts to copy using other person's source codes and submit as reports are regarded as a problem for program exercises of programming subjects in universities or colleges. An automatic detection algorithm to detect illicit copies is required in these educational organizations. In previous researches, these methods based on the detection standard of the token length have been proposed. These methods use the threshold simply using the character length. In these cases, miss detections occur in the case of the simple program such as the sequence of the print statement or the case that token sequences appear in the middle of a statement. This paper proposes the detection method using the program complexity and the complete token sequence. As the results of experiments, our method can improve the recall.. adopting the complexity as the detection standard and the precision.. adopting the complete token sequence for exercise programs submitted by students.
引用
收藏
页码:575 / 580
页数:6
相关论文
共 50 条
  • [1] Token-based Plagiarism Detection for Metamodels
    Saglam, Timur
    Hahner, Sebastian
    Wittler, Jan Willem
    Kuehn, Thomas
    ACM/IEEE 25TH INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, MODELS 2022 COMPANION, 2022, : 138 - 141
  • [2] Token-based Code Clone Detection Technique in a Student's Programming Exercise
    Iwamoto, Mai
    Oshima, Shunsuke
    Nakashima, Takuo
    2012 SEVENTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2012), 2012, : 650 - 655
  • [3] Analysis of Blockchain System With Token-Based Bookkeeping Method
    Cai, Tianqi
    Cai, H. J.
    Wang, Hao
    Cheng, Xiji
    Wang, Linfeng
    IEEE ACCESS, 2019, 7 : 50823 - 50832
  • [4] Toward a Token-Based Approach to Concern Detection in MATLAB Sources
    Monteiro, Miguel P.
    Marques, Nuno C.
    Silva, Bruno
    Palma, Bruno
    Cardoso, Joao
    PROGRESS IN ARTIFICIAL INTELLIGENCE (EPIA 2017), 2017, 10423 : 573 - 584
  • [5] Multi-threshold token-based code clone detection
    Golubev, Yaroslav
    Poletansky, Viktor
    Povarov, Nikita
    Bryksin, Timofey
    2021 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2021), 2021, : 496 - 500
  • [6] Method of evaluation of distributed and token-based mutual exclusion approaches
    Al-Mubaid, H
    Mistry, D
    Debnath, N
    INTELLIGENT AND ADAPTIVE SYSTEMS AND SOFTWARE ENGINEERING, 2004, : 257 - 262
  • [7] Token-Based Lightweight Image Cryptography Method for Internet of Things
    Lee, Shih-Hsiung
    Yang, Chu-Sing
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 207 - 211
  • [8] Enhancing Microservices Security with Token-Based Access Control Method
    Venckauskas, Algimantas
    Kukta, Donatas
    Grigaliunas, Sarunas
    Bruzgiene, Rasa
    SENSORS, 2023, 23 (06)
  • [9] Token-based atomic broadcast using unreliable failure detectors
    Ekwall, R
    Schiper, A
    Urbán, P
    23RD IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2004, : 52 - 65
  • [10] A token-based atomic broadcast protocol using deterministic merge
    Li, L.
    Wang, H. M.
    Liu, H.
    Shi, D. X.
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 1138 - 1143