{"id":"https://openalex.org/W3121165942","doi":"https://doi.org/10.1142/s0218194020400252","title":"Plagiarism Detection of Multi-threaded Programs Using Frequent Behavioral Pattern Mining","display_name":"Plagiarism Detection of Multi-threaded Programs Using Frequent Behavioral Pattern Mining","publication_year":2020,"publication_date":"2020-11-01","ids":{"openalex":"https://openalex.org/W3121165942","doi":"https://doi.org/10.1142/s0218194020400252","mag":"3121165942"},"language":"en","primary_location":{"id":"doi:10.1142/s0218194020400252","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218194020400252","pdf_url":null,"source":{"id":"https://openalex.org/S131442419","display_name":"International Journal of Software Engineering and Knowledge Engineering","issn_l":"0218-1940","issn":["0218-1940","1793-6403"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Software Engineering and Knowledge Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049436913","display_name":"Zhenzhou Tian","orcid":"https://orcid.org/0000-0001-7608-8908"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhenzhou Tian","raw_affiliation_strings":["School of Computer Science and Technology, Xi\u2019an University of Posts and Telecommunications, P.\u00a0R.\u00a0China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi\u2019an University of Posts and Telecommunications, P.\u00a0R.\u00a0China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100434872","display_name":"Qing Wang","orcid":"https://orcid.org/0000-0002-9645-7106"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qing Wang","raw_affiliation_strings":["School of Computer Science and Technology, Xi\u2019an University of Posts and Telecommunications, P.\u00a0R.\u00a0China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi\u2019an University of Posts and Telecommunications, P.\u00a0R.\u00a0China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Cong Gao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cong Gao","raw_affiliation_strings":["Shaanxi Key Laboratory of Network, Data Analysis and Intelligent Processing, Xi\u2019an, Shaanxi 710121, P.\u00a0R.\u00a0China"],"affiliations":[{"raw_affiliation_string":"Shaanxi Key Laboratory of Network, Data Analysis and Intelligent Processing, Xi\u2019an, Shaanxi 710121, P.\u00a0R.\u00a0China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017524689","display_name":"Lingwei Chen","orcid":"https://orcid.org/0000-0003-1550-6170"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lingwei Chen","raw_affiliation_strings":["College of Information Sciences and Technology, The Pennsylvania State University, University Park, PA 16802, USA"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, The Pennsylvania State University, University Park, PA 16802, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008435786","display_name":"Dinghao Wu","orcid":"https://orcid.org/0000-0002-0741-5511"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dinghao Wu","raw_affiliation_strings":["College of Information Sciences and Technology, The Pennsylvania State University, University Park, PA 16802, USA"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, The Pennsylvania State University, University Park, PA 16802, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5049436913"],"corresponding_institution_ids":["https://openalex.org/I4210136859"],"apc_list":null,"apc_paid":null,"fwci":0.4565,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.6381759,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"30","issue":"11n12","first_page":"1667","last_page":"1688"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8248258829116821},{"id":"https://openalex.org/keywords/birthmark","display_name":"Birthmark","score":0.6737369298934937},{"id":"https://openalex.org/keywords/thread","display_name":"Thread (computing)","score":0.5417755842208862},{"id":"https://openalex.org/keywords/dynamic-program-analysis","display_name":"Dynamic program analysis","score":0.5377843976020813},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4826972484588623},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.31107234954833984}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8248258829116821},{"id":"https://openalex.org/C2776826570","wikidata":"https://www.wikidata.org/wiki/Q3513591","display_name":"Birthmark","level":2,"score":0.6737369298934937},{"id":"https://openalex.org/C138101251","wikidata":"https://www.wikidata.org/wiki/Q213092","display_name":"Thread (computing)","level":2,"score":0.5417755842208862},{"id":"https://openalex.org/C140006998","wikidata":"https://www.wikidata.org/wiki/Q2499307","display_name":"Dynamic program analysis","level":3,"score":0.5377843976020813},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4826972484588623},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.31107234954833984},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218194020400252","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218194020400252","pdf_url":null,"source":{"id":"https://openalex.org/S131442419","display_name":"International Journal of Software Engineering and Knowledge Engineering","issn_l":"0218-1940","issn":["0218-1940","1793-6403"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Software Engineering and Knowledge Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1661369303","https://openalex.org/W1863385414","https://openalex.org/W1985951985","https://openalex.org/W1998517692","https://openalex.org/W2021673689","https://openalex.org/W2038159719","https://openalex.org/W2067982285","https://openalex.org/W2071779312","https://openalex.org/W2107697055","https://openalex.org/W2109553965","https://openalex.org/W2110893883","https://openalex.org/W2120724609","https://openalex.org/W2121412398","https://openalex.org/W2136833842","https://openalex.org/W2146659255","https://openalex.org/W2162444146","https://openalex.org/W2194609298","https://openalex.org/W2412361571","https://openalex.org/W2579698096","https://openalex.org/W2597697275"],"related_works":["https://openalex.org/W48592050","https://openalex.org/W290572513","https://openalex.org/W1613205739","https://openalex.org/W174499865","https://openalex.org/W4286507871","https://openalex.org/W1971806647","https://openalex.org/W1976122927","https://openalex.org/W2111922062","https://openalex.org/W2403933199","https://openalex.org/W3121165942"],"abstract_inverted_index":{"Software":[0],"dynamic":[1,43,66,79,112,184],"birthmark":[2,68,170,185],"techniques":[3],"construct":[4],"birthmarks":[5],"using":[6],"the":[7,13,20,32,52,102,119,126,135,164,183],"captured":[8],"execution":[9,84,131],"traces":[10,85,132],"from":[11,51],"running":[12],"programs,":[14,41],"which":[15,114],"serve":[16],"as":[17],"one":[18],"of":[19,204],"most":[21],"promising":[22],"methods":[23],"for":[24,46,91],"obfuscation-resilient":[25],"software":[26,158],"plagiarism":[27,57,74,148,159,176],"detection.":[28,58,75],"However,":[29],"due":[30],"to":[31,70,81,88,105,109,202],"perturbation":[33],"caused":[34,133],"by":[35,134],"non-deterministic":[36],"thread":[37,136],"scheduling":[38,137],"in":[39,54,138],"multi-threaded":[40,55,72,93,139,146,175],"such":[42],"approaches":[44],"optimized":[45],"sequential":[47],"programs":[48],"may":[49],"suffer":[50],"randomness":[53],"program":[56,73,94,147],"In":[59],"this":[60],"paper,":[61],"we":[62,143],"propose":[63],"a":[64,96,145,156],"new":[65],"thread-aware":[67],"FPBirth":[69,171,192],"facilitate":[71],"We":[76],"first":[77],"explore":[78],"monitoring":[80],"capture":[82],"multiple":[83],"with":[86,174,200],"respect":[87,201],"system":[89,166],"calls":[90],"each":[92],"under":[95],"specified":[97],"input,":[98],"and":[99,128,196,206,210],"then":[100],"leverage":[101],"Apriori":[103],"algorithm":[104],"mine":[106],"frequent":[107],"patterns":[108],"formulate":[110],"our":[111,168],"birthmark,":[113],"can":[115],"not":[116],"only":[117],"depict":[118],"program\u2019s":[120],"behavioral":[121],"semantics,":[122],"but":[123],"also":[124],"resist":[125],"changes":[127],"perturbations":[129],"over":[130],"programs.":[140],"Using":[141],"FPBirth,":[142],"design":[144],"detection":[149,177],"system.":[150],"The":[151],"experimental":[152],"results":[153],"based":[154],"on":[155],"public":[157],"sample":[160],"set":[161],"demonstrate":[162],"that":[163],"developed":[165],"integrating":[167],"proposed":[169],"copes":[172],"better":[173],"than":[178],"alternative":[179],"approaches.":[180],"Compared":[181],"against":[182],"System":[186],"Call":[187],"Short":[188],"Sequence":[189],"Birthmark":[190],"(SCSSB),":[191],"achieves":[193],"12.4%,":[194],"4.1%":[195],"7.9%":[197],"performance":[198],"improvements":[199],"union":[203],"resilience":[205],"credibility":[207],"(URC),":[208],"F-Measure":[209],"matthews":[211],"correlation":[212],"coefficient":[213],"(MCC)":[214],"metric,":[215],"respectively.":[216]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
