A Token-based Illicit Copy Detection Method using Complexity for a Program Exercise

被引:1
|
作者
Iwamoto, Mai [1 ]
Oshima, Shunsuke [2 ]
Nakashima, Takuo [3 ]
机构
[1] Kumamoto Natl Coll Technol, Ctr Tech & Educ Support, 2,627 Hirayama Shinmachi, Yatsushiro, Kumamoto 8668501, Japan
[2] Kumamoto Natl Coll Technol, ICT Ctr Learning Support, Yatsushiro, Kumamoto 8668501, Japan
[3] Tokai Univ, Dept Electron Engn & Comp Sci, Kumamoto 862, Japan
关键词
copy detection; code clone; programming exercise; token-based; complexity;
D O I
10.1109/BWCCA.2013.100
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The conducts to copy using other person's source codes and submit as reports are regarded as a problem for program exercises of programming subjects in universities or colleges. An automatic detection algorithm to detect illicit copies is required in these educational organizations. In previous researches, these methods based on the detection standard of the token length have been proposed. These methods use the threshold simply using the character length. In these cases, miss detections occur in the case of the simple program such as the sequence of the print statement or the case that token sequences appear in the middle of a statement. This paper proposes the detection method using the program complexity and the complete token sequence. As the results of experiments, our method can improve the recall.. adopting the complexity as the detection standard and the precision.. adopting the complete token sequence for exercise programs submitted by students.
引用
收藏
页码:575 / 580
页数:6
相关论文
共 50 条
  • [31] Efficient GPU Utilization in Heterogeneous Big Data Cluster Using Token-Based Scheduler
    Abdelhafez, Hazem A.
    Rehan, Mohamed M.
    Fahmy, Hossam A. H.
    2017 IEEE 30TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2017,
  • [32] Facilitating the comprehension of business process models for unexperienced modelers using token-based animations
    Maslov, Ilia
    Poelmans, Stephan
    INFORMATION & MANAGEMENT, 2024, 61 (05)
  • [33] Agents for intelligent information extraction by using domain knowledge and token-based morphological patterns
    Yang, J
    Choi, J
    INTELLIGENT AGENTS AND MULTI-AGENT SYSTEMS, 2003, 2891 : 74 - 85
  • [34] Abdomen CT multi-organ segmentation using token-based MLP-Mixer
    Pan, Shaoyan
    Chang, Chih-Wei
    Wang, Tonghe
    Wynne, Jacob
    Hu, Mingzhe
    Lei, Yang
    Liu, Tian
    Patel, Pretesh
    Roper, Justin
    Yang, Xiaofeng
    MEDICAL PHYSICS, 2023, 50 (05) : 3027 - 3038
  • [35] A token-based software license protection framework using one-way hash functions
    Wang, LZ
    Bauer, M
    Perry, M
    EEE '05: Proceedings of the 2005 International Conference on E-Business, Enterprise Information Systems, E-Government, and Outsourcing, 2005, : 134 - 139
  • [36] A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography
    Jeong, Yoon-Su
    Kim, Yong-Tae
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (03): : 137 - 142
  • [37] Patient-Centric Token-Based Healthcare Blockchain Implementation Using Secure Internet of Medical Things
    Dewangan, Narendra K.
    Chandrakar, Preeti
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (06) : 3109 - 3119
  • [38] Cybersecure and scalable, token-based renewable energy certificate framework using blockchain-enabled trading platform
    Umit Cali
    Murat Kuzlu
    D. Jonathan Sebastian-Cardenas
    Onur Elma
    Manisa Pipattanasomporn
    Ramesh Reddi
    Electrical Engineering, 2024, 106 : 1841 - 1852
  • [39] Recognition and Evaluation of Clinical Section Headings in Clinical Documents Using Token-Based Formulation with Conditional Random Fields
    Dai, Hong-Jie
    Syed-Abdul, Shabbir
    Chen, Chih-Wei
    Wu, Chieh-Chen
    BIOMED RESEARCH INTERNATIONAL, 2015, 2015
  • [40] Document copy detection based on kernel method
    Jun-Peng, B
    Jun-Yi, S
    Xiao-Dong, L
    Hai-Yan, L
    Xiao-Di, Z
    2003 INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING AND KNOWLEDGE ENGINEERING, PROCEEDINGS, 2003, : 250 - 256