Comparison of texts streams in the presence of mild adversaries
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
Efficient plagiarism detection for large code repositories
Software—Practice & Experience
Plagiarism Detection Using the Levenshtein Distance and Smith-Waterman Algorithm
ICICIC '08 Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control
Turnitin is not the primary weapon in the campaign against plagiarism
Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing on International Conference on Computer Systems and Technologies
An evaluation framework for plagiarism detection
COLING '10 Proceedings of the 23rd International Conference on Computational Linguistics: Posters
The Issue of (Software) Plagiarism: A Student View
IEEE Transactions on Education
Hi-index | 0.00 |
Plagiarism among student term papers is considered as a major problem these days. To successfully identify this kind of cheating we have to perform check on submitted papers for plagiarism. This has to be done with appropriate plagiarism detection software. In this paper we describe the most common ways how to deceive this software by introducing four obfuscation categories. We take several existing plagiarism detection tools and test their resistance against simple but effective obfuscations. Proposing our own method and implementing it into a plagiarism detection system we identify obfuscated documents.