{"id":"https://openalex.org/W2028778612","doi":"https://doi.org/10.1145/2023607.2023678","title":"Obfuscating plagiarism detection","display_name":"Obfuscating plagiarism detection","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2028778612","doi":"https://doi.org/10.1145/2023607.2023678","mag":"2028778612"},"language":"en","primary_location":{"id":"doi:10.1145/2023607.2023678","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2023607.2023678","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Computer Systems and Technologies - CompSysTech '11","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058237783","display_name":"Tom\u00e1\u0161 Ku\u010de\u010dka","orcid":null},"institutions":[{"id":"https://openalex.org/I110757952","display_name":"Slovak University of Technology in Bratislava","ror":"https://ror.org/0561ghm58","country_code":"SK","type":"education","lineage":["https://openalex.org/I110757952"]}],"countries":["SK"],"is_corresponding":true,"raw_author_name":"Tom\u00e1\u0161 Ku\u010de\u010dka","raw_affiliation_strings":["Slovak University of Technology in Bratislava, Slovak Republic","Slovak University of Technology in Bratislava,Slovak Republic"],"affiliations":[{"raw_affiliation_string":"Slovak University of Technology in Bratislava, Slovak Republic","institution_ids":["https://openalex.org/I110757952"]},{"raw_affiliation_string":"Slovak University of Technology in Bratislava,Slovak Republic","institution_ids":["https://openalex.org/I110757952"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5058237783"],"corresponding_institution_ids":["https://openalex.org/I110757952"],"apc_list":null,"apc_paid":null,"fwci":1.0691,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.83524309,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"423","last_page":"423"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11492","display_name":"Academic integrity and plagiarism","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11492","display_name":"Academic integrity and plagiarism","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9793999791145325,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/plagiarism-detection","display_name":"Plagiarism detection","score":0.9700915217399597},{"id":"https://openalex.org/keywords/cheating","display_name":"Cheating","score":0.935463547706604},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8882846236228943},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8023334741592407},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5562479496002197},{"id":"https://openalex.org/keywords/test","display_name":"Test (biology)","score":0.4852614104747772},{"id":"https://openalex.org/keywords/term","display_name":"Term (time)","score":0.4232703745365143},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.4146377444267273},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3478434085845947},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3363891839981079},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2874184846878052},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2856108546257019},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.15176686644554138},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.07837381958961487}],"concepts":[{"id":"https://openalex.org/C2780907237","wikidata":"https://www.wikidata.org/wiki/Q2986238","display_name":"Plagiarism detection","level":2,"score":0.9700915217399597},{"id":"https://openalex.org/C2778024590","wikidata":"https://www.wikidata.org/wiki/Q2357432","display_name":"Cheating","level":2,"score":0.935463547706604},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8882846236228943},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8023334741592407},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5562479496002197},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.4852614104747772},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.4232703745365143},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.4146377444267273},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3478434085845947},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3363891839981079},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2874184846878052},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2856108546257019},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.15176686644554138},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.07837381958961487},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2023607.2023678","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2023607.2023678","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Computer Systems and Technologies - CompSysTech '11","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W86855850","https://openalex.org/W1544505227","https://openalex.org/W1985883651","https://openalex.org/W2042054636","https://openalex.org/W2098252805","https://openalex.org/W2101222922","https://openalex.org/W2108378253","https://openalex.org/W2118340421","https://openalex.org/W2138233214","https://openalex.org/W2147152072"],"related_works":["https://openalex.org/W2012288173","https://openalex.org/W1968538666","https://openalex.org/W2097662580","https://openalex.org/W3199302685","https://openalex.org/W2344072770","https://openalex.org/W2389163612","https://openalex.org/W2365256465","https://openalex.org/W2810872891","https://openalex.org/W2891769814","https://openalex.org/W2794792966"],"abstract_inverted_index":{"Plagiarism":[0],"among":[1],"student":[2],"term":[3],"papers":[4,27],"is":[5],"considered":[6],"as":[7],"a":[8,83],"major":[9],"problem":[10],"these":[11],"days.":[12],"To":[13],"successfully":[14],"identify":[15,88],"this":[16,41,52],"kind":[17],"of":[18],"cheating":[19],"we":[20,43,87],"have":[21],"to":[22,32,50],"perform":[23],"check":[24],"on":[25],"submitted":[26],"for":[28],"plagiarism.":[29],"This":[30],"has":[31],"be":[33],"done":[34],"with":[35],"appropriate":[36],"plagiarism":[37,63,84],"detection":[38,64,85],"software.":[39],"In":[40],"paper":[42],"describe":[44],"the":[45],"most":[46],"common":[47],"ways":[48],"how":[49],"deceive":[51],"software":[53],"by":[54],"introducing":[55],"four":[56],"obfuscation":[57],"categories.":[58],"We":[59],"take":[60],"several":[61],"existing":[62],"tools":[65],"and":[66,79],"test":[67],"their":[68],"resistance":[69],"against":[70],"simple":[71],"but":[72],"effective":[73],"obfuscations.":[74],"Proposing":[75],"our":[76],"own":[77],"method":[78],"implementing":[80],"it":[81],"into":[82],"system":[86],"obfuscated":[89],"documents.":[90]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
