{"id":"https://openalex.org/W7125196765","doi":"https://doi.org/10.48550/arxiv.2601.12505","title":"DoPE: Decoy Oriented Perturbation Encapsulation Human-Readable, AI-Hostile Documents for Academic Integrity","display_name":"DoPE: Decoy Oriented Perturbation Encapsulation Human-Readable, AI-Hostile Documents for Academic Integrity","publication_year":2026,"publication_date":"2026-01-18","ids":{"openalex":"https://openalex.org/W7125196765","doi":"https://doi.org/10.48550/arxiv.2601.12505"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.12505","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.12505","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.12505","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093982042","display_name":"Ashish Raj Shekhar","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shekhar, Ashish Raj","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123315754","display_name":"Shiven Agarwal","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Agarwal, Shiven","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064859050","display_name":"Priyanuj Bordoloi","orcid":"https://orcid.org/0000-0002-6583-7368"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bordoloi, Priyanuj","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070580485","display_name":"Yash Shah","orcid":"https://orcid.org/0000-0003-1551-7611"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shah, Yash","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123486426","display_name":"Tejas Anvekar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anvekar, Tejas","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5123525939","display_name":"Vivek Gupta","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gupta, Vivek","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5093982042"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11492","display_name":"Academic integrity and plagiarism","score":0.7307000160217285,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11492","display_name":"Academic integrity and plagiarism","score":0.7307000160217285,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.06279999762773514,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.042899999767541885,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/decoy","display_name":"Decoy","score":0.7594000101089478},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7378000020980835},{"id":"https://openalex.org/keywords/encapsulation","display_name":"Encapsulation (networking)","score":0.641700029373169},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.39879998564720154},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.38280001282691956},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.3239000141620636}],"concepts":[{"id":"https://openalex.org/C2779179475","wikidata":"https://www.wikidata.org/wiki/Q3545649","display_name":"Decoy","level":3,"score":0.7594000101089478},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7390999794006348},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7378000020980835},{"id":"https://openalex.org/C81147070","wikidata":"https://www.wikidata.org/wiki/Q1172449","display_name":"Encapsulation (networking)","level":2,"score":0.641700029373169},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.39879998564720154},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.38280001282691956},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3517000079154968},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.3239000141620636},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.3197999894618988},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30140000581741333},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29980000853538513},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.290800005197525},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2669999897480011},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.2596000134944916},{"id":"https://openalex.org/C177918212","wikidata":"https://www.wikidata.org/wiki/Q803623","display_name":"Perturbation (astronomy)","level":2,"score":0.2583000063896179},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.12505","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.12505","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.12505","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.12505","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.6213393211364746,"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Multimodal":[0],"Large":[1],"Language":[2],"Models":[3],"(MLLMs)":[4],"can":[5],"directly":[6],"consume":[7],"exam":[8],"documents,":[9],"threatening":[10],"conventional":[11,64],"assessments":[12,32],"and":[13,55,70,73,84,108,115,135,152],"academic":[14,163],"integrity.":[15,164],"We":[16,67,92,147],"present":[17],"DoPE":[18,46,117],"(Decoy-Oriented":[19],"Perturbation":[20],"Encapsulation),":[21],"a":[22,96,122],"document-layer":[23,160],"defense":[24],"framework":[25],"that":[26,79],"embeds":[27],"semantic":[28,82],"decoys":[29,83],"into":[30,89],"PDF/HTML":[31],"to":[33,86,155],"exploit":[34],"render-parse":[35],"discrepancies":[36],"in":[37,143],"MLLM":[38],"pipelines.":[39],"By":[40],"instrumenting":[41],"exams":[42,101],"at":[43,126],"authoring":[44],"time,":[45],"provides":[47],"model-agnostic":[48],"prevention":[49,69],"(stop":[50],"or":[51,139],"confound":[52],"automated":[53],"solving)":[54],"detection":[56,71,124],"(flag":[57],"blind":[58],"AI":[59],"reliance)":[60],"without":[61],"relying":[62],"on":[63,94],"one-shot":[65],"classifiers.":[66],"formalize":[68],"tasks,":[72],"introduce":[74],"FewSoRT-Q,":[75],"an":[76,127,132],"LLM-guided":[77],"pipeline":[78],"generates":[80],"question-level":[81],"FewSoRT-D":[85],"encapsulate":[87],"them":[88],"watermarked":[90],"documents.":[91],"evaluate":[93],"Integrity-Bench,":[95,149],"novel":[97],"benchmark":[98],"of":[99,145,159],"1826":[100],"(PDF+HTML)":[102],"derived":[103],"from":[104,113],"public":[105],"QA":[106],"datasets":[107],"OpenCourseWare.":[109],"Against":[110],"black-box":[111],"MLLMs":[112],"OpenAI":[114],"Anthropic,":[116],"yields":[118],"strong":[119],"empirical":[120],"gains:":[121],"91.4%":[123],"rate":[125,130],"8.7%":[128],"false-positive":[129],"using":[131],"LLM-as-Judge":[133],"verifier,":[134],"prevents":[136],"successful":[137],"completion":[138],"induces":[140],"decoy-aligned":[141],"failures":[142],"96.3%":[144],"attempts.":[146],"release":[148],"our":[150],"toolkit,":[151],"evaluation":[153],"code":[154],"enable":[156],"reproducible":[157],"study":[158],"defenses":[161],"for":[162]},"counts_by_year":[],"updated_date":"2026-01-22T23:33:04.759266","created_date":"2026-01-22T00:00:00"}
