{"id":"https://openalex.org/W4399652845","doi":"https://doi.org/10.3389/fcomp.2024.1393723","title":"A Support Vector Machine based approach for plagiarism detection in Python code submissions in undergraduate settings","display_name":"A Support Vector Machine based approach for plagiarism detection in Python code submissions in undergraduate settings","publication_year":2024,"publication_date":"2024-06-13","ids":{"openalex":"https://openalex.org/W4399652845","doi":"https://doi.org/10.3389/fcomp.2024.1393723"},"language":"en","primary_location":{"id":"doi:10.3389/fcomp.2024.1393723","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2024.1393723","pdf_url":"https://www.frontiersin.org/articles/10.3389/fcomp.2024.1393723/pdf?isPublishedV2=False","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.frontiersin.org/articles/10.3389/fcomp.2024.1393723/pdf?isPublishedV2=False","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113250934","display_name":"N. Mohan Das Gandhi","orcid":null},"institutions":[{"id":"https://openalex.org/I2802865875","display_name":"Flame University","ror":"https://ror.org/0252mqn49","country_code":"IN","type":"education","lineage":["https://openalex.org/I2802865875"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nandini Gandhi","raw_affiliation_strings":["School of Computing and Data Sciences, FLAME University, Pune, Maharashtra, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computing and Data Sciences, FLAME University, Pune, Maharashtra, India","institution_ids":["https://openalex.org/I2802865875"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008477924","display_name":"Kaushik Gopalan","orcid":"https://orcid.org/0000-0002-7980-6183"},"institutions":[{"id":"https://openalex.org/I2802865875","display_name":"Flame University","ror":"https://ror.org/0252mqn49","country_code":"IN","type":"education","lineage":["https://openalex.org/I2802865875"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Kaushik Gopalan","raw_affiliation_strings":["School of Computing and Data Sciences, FLAME University, Pune, Maharashtra, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computing and Data Sciences, FLAME University, Pune, Maharashtra, India","institution_ids":["https://openalex.org/I2802865875"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064565348","display_name":"Prajish Prasad","orcid":"https://orcid.org/0000-0001-7986-6277"},"institutions":[{"id":"https://openalex.org/I2802865875","display_name":"Flame University","ror":"https://ror.org/0252mqn49","country_code":"IN","type":"education","lineage":["https://openalex.org/I2802865875"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Prajish Prasad","raw_affiliation_strings":["School of Computing and Data Sciences, FLAME University, Pune, Maharashtra, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computing and Data Sciences, FLAME University, Pune, Maharashtra, India","institution_ids":["https://openalex.org/I2802865875"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008477924"],"corresponding_institution_ids":["https://openalex.org/I2802865875"],"apc_list":{"value":1150,"currency":"USD","value_usd":1150},"apc_paid":{"value":1150,"currency":"USD","value_usd":1150},"fwci":1.4587,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.84444606,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"6","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11492","display_name":"Academic integrity and plagiarism","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11492","display_name":"Academic integrity and plagiarism","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9258000254631042,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9204999804496765,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/plagiarism-detection","display_name":"Plagiarism detection","score":0.8773201704025269},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8025528192520142},{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.7542281150817871},{"id":"https://openalex.org/keywords/flagging","display_name":"Flagging","score":0.7187131643295288},{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.7016366124153137},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.6368404626846313},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5437889695167542},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45042288303375244},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.42518913745880127},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33626019954681396},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.29674381017684937}],"concepts":[{"id":"https://openalex.org/C2780907237","wikidata":"https://www.wikidata.org/wiki/Q2986238","display_name":"Plagiarism detection","level":2,"score":0.8773201704025269},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8025528192520142},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.7542281150817871},{"id":"https://openalex.org/C2777548347","wikidata":"https://www.wikidata.org/wiki/Q5456937","display_name":"Flagging","level":2,"score":0.7187131643295288},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.7016366124153137},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.6368404626846313},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5437889695167542},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45042288303375244},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42518913745880127},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33626019954681396},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.29674381017684937},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3389/fcomp.2024.1393723","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2024.1393723","pdf_url":"https://www.frontiersin.org/articles/10.3389/fcomp.2024.1393723/pdf?isPublishedV2=False","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:76c1711e224940df90b954705cb62d11","is_oa":true,"landing_page_url":"https://doaj.org/article/76c1711e224940df90b954705cb62d11","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Frontiers in Computer Science, Vol 6 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3389/fcomp.2024.1393723","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2024.1393723","pdf_url":"https://www.frontiersin.org/articles/10.3389/fcomp.2024.1393723/pdf?isPublishedV2=False","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4399652845.pdf"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1547886489","https://openalex.org/W1971182128","https://openalex.org/W1985086575","https://openalex.org/W2001085802","https://openalex.org/W2013787771","https://openalex.org/W2074805222","https://openalex.org/W2087852996","https://openalex.org/W2096753332","https://openalex.org/W2145009222","https://openalex.org/W2163840964","https://openalex.org/W2189573232","https://openalex.org/W2596203261","https://openalex.org/W2788897902","https://openalex.org/W2886060554","https://openalex.org/W2890485822","https://openalex.org/W2906891466","https://openalex.org/W2945111072","https://openalex.org/W2989011483","https://openalex.org/W2990714382","https://openalex.org/W3045537857","https://openalex.org/W3081983887","https://openalex.org/W3125937743","https://openalex.org/W4211263275","https://openalex.org/W4213445264","https://openalex.org/W4213457133","https://openalex.org/W4238647662","https://openalex.org/W4240246683","https://openalex.org/W4245503666","https://openalex.org/W6672326631","https://openalex.org/W6696903443"],"related_works":["https://openalex.org/W3127553152","https://openalex.org/W3002459461","https://openalex.org/W3173165160","https://openalex.org/W3127649977","https://openalex.org/W4287331153","https://openalex.org/W2155491649","https://openalex.org/W4224015079","https://openalex.org/W2100097978","https://openalex.org/W3091649732","https://openalex.org/W1985086575"],"abstract_inverted_index":{"Mechanisms":[0],"for":[1,24,114,120],"plagiarism":[2,32,40],"detection":[3,33],"play":[4],"a":[5,21,30,54,79,151],"crucial":[6],"role":[7],"in":[8,41,150,156,165],"maintaining":[9],"academic":[10],"integrity,":[11],"acting":[12],"both":[13],"to":[14,36,59,126,159],"penalize":[15],"wrongdoing":[16],"while":[17,98,161],"also":[18],"serving":[19],"as":[20],"preemptive":[22],"deterrent":[23],"bad":[25],"behavior.":[26],"This":[27],"manuscript":[28],"proposes":[29],"customized":[31],"algorithm":[34,73],"tailored":[35],"detect":[37],"source":[38],"code":[39,82],"the":[42,68,99,110,117,122,131,134,146],"Python":[43],"programming":[44],"language.":[45],"Our":[46],"approach":[47],"combines":[48],"textual":[49],"and":[50,66,76,116,142],"syntactic":[51],"techniques,":[52],"employing":[53],"support":[55],"vector":[56],"machine":[57],"(SVM)":[58],"effectively":[60],"combine":[61],"various":[62],"indicators":[63],"of":[64,81,84,93,107,109,133],"similarity":[65,70],"calculate":[67],"resulting":[69],"scores.":[71],"The":[72,105],"was":[74,112],"trained":[75],"tested":[77],"using":[78],"sample":[80],"submissions":[83,97,106],"4":[85],"coding":[86],"problems":[87],"each":[88],"from":[89],"45":[90],"volunteers;":[91],"15":[92],"these":[94],"were":[95,102],"original":[96],"other":[100,118],"30":[101],"plagiarized":[103,167],"samples.":[104,168],"two":[108,119,138],"questions":[111],"used":[113,140],"training":[115],"testing-using":[121],"leave-p-out":[123],"cross-validation":[124],"strategy":[125],"avoid":[127],"overfitting.":[128],"We":[129],"compare":[130],"performance":[132],"proposed":[135,147],"method":[136,148],"with":[137],"widely":[139],"tools-MOSS":[141],"JPlag\u2014and":[143],"find":[144],"that":[145],"results":[149],"small":[152],"but":[153],"significant":[154],"improvement":[155],"accuracy":[157],"compared":[158],"JPlag,":[160],"significantly":[162],"outperforming":[163],"MOSS":[164],"flagging":[166]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
