{"id":"https://openalex.org/W7118739815","doi":"https://doi.org/10.48550/arxiv.2601.00429","title":"On Plagiarism and Software Plagiarism","display_name":"On Plagiarism and Software Plagiarism","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7118739815","doi":"https://doi.org/10.48550/arxiv.2601.00429"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.00429","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00429","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.00429","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006566554","display_name":"Rares Folea","orcid":"https://orcid.org/0000-0002-4936-9082"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Folea, Rares","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5067423738","display_name":"Emil Slusanschi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Slusanschi, Emil","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5006566554"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.19699999690055847,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.19699999690055847,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.1858000010251999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":0.17630000412464142,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/plagiarism-detection","display_name":"Plagiarism detection","score":0.6654000282287598},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.6136999726295471},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.5691999793052673},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.558899998664856},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.4611000120639801},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4180999994277954},{"id":"https://openalex.org/keywords/software-peer-review","display_name":"Software peer review","score":0.38600000739097595},{"id":"https://openalex.org/keywords/software-technical-review","display_name":"Software technical review","score":0.36000001430511475}],"concepts":[{"id":"https://openalex.org/C2780907237","wikidata":"https://www.wikidata.org/wiki/Q2986238","display_name":"Plagiarism detection","level":2,"score":0.6654000282287598},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6305999755859375},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.6136999726295471},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.5691999793052673},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.558899998664856},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5522000193595886},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.4611000120639801},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4180999994277954},{"id":"https://openalex.org/C74579156","wikidata":"https://www.wikidata.org/wiki/Q7554342","display_name":"Software peer review","level":5,"score":0.38600000739097595},{"id":"https://openalex.org/C6586637","wikidata":"https://www.wikidata.org/wiki/Q7554372","display_name":"Software technical review","level":5,"score":0.36000001430511475},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.352400004863739},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.3521000146865845},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.3334999978542328},{"id":"https://openalex.org/C46110900","wikidata":"https://www.wikidata.org/wiki/Q11702993","display_name":"Software walkthrough","level":5,"score":0.3327000141143799},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.3310999870300293},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.30309998989105225},{"id":"https://openalex.org/C10272871","wikidata":"https://www.wikidata.org/wiki/Q929972","display_name":"Software inspection","level":5,"score":0.301800012588501},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2867000102996826},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.2777999937534332},{"id":"https://openalex.org/C2776240099","wikidata":"https://www.wikidata.org/wiki/Q327018","display_name":"Interrogation","level":2,"score":0.2669000029563904},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.26570001244544983}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.00429","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00429","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.00429","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00429","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.7887911796569824,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0,32],"paper":[1],"explores":[2],"the":[3,14,37,47,61,73,80,89,94,117],"complexities":[4],"of":[5,8,17,36,63,75,88,111,119],"automatic":[6],"detection":[7,76],"software":[9,26,42,64,101],"similarities,":[10],"in":[11,67,93,116],"relation":[12],"to":[13,40],"unique":[15],"challenges":[16,77],"digital":[18],"artifacts,":[19,82],"and":[20,49,55,83,106],"introduces":[21],"Project":[22,120],"Martial,":[23],"an":[24],"open-source":[25],"solution":[27],"for":[28],"detecting":[29],"code":[30,104],"similarity.":[31],"research":[33],"enumerates":[34],"some":[35],"existing":[38],"approaches":[39],"counter":[41],"plagiarism":[43],"by":[44],"examining":[45],"both":[46],"academia":[48],"legal":[50],"landscape,":[51],"including":[52,96],"notable":[53],"lawsuits":[54],"court":[56],"rulings":[57],"that":[58],"have":[59],"shaped":[60],"understanding":[62],"copyright":[65],"infringements":[66],"commercial":[68],"applications.":[69],"Furthermore,":[70],"we":[71,84],"categorize":[72],"classes":[74],"based":[78,98],"on":[79,99],"available":[81],"provide":[85],"a":[86,109],"survey":[87],"previously":[90],"studied":[91],"techniques":[92],"literature,":[95],"solutions":[97],"fingerprinting,":[100],"birthmarks,":[102],"or":[103],"embeddings,":[105],"exemplify":[107],"how":[108],"subset":[110],"them":[112],"can":[113],"be":[114],"applied":[115],"context":[118],"Martial.":[121]},"counts_by_year":[],"updated_date":"2026-01-08T20:10:11.968330","created_date":"2026-01-08T00:00:00"}
