2022
DOI: 10.1007/978-981-16-8515-6_31
|View full text |Cite
|
Sign up to set email alerts
|

Source Code Plagiarism Detection Using Siamese BLSTM Network and Embedding Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…The detection process typically involves transforming the code into a highdimensional feature representation followed by measurement of code similarity. Aside from traditionally used features extracted based on structural or syntactic properties of programs (Ji et al, 2007;Lange and Mancoridis, 2007), NLP-based approaches such as n-grams (Ohmann and Rahal, 2015), topic modeling (Ullah et al, 2021), character and word embeddings (Manahi, 2021), and character-level language models (Katta, 2018) are increasingly being used for robust code representations. Similarly for downstream similarity modeling or classification, unsupervised (Acampora and Cosma, 2015) and supervised (Bandara and Wijayarathna, 2011;Manahi, 2021) machine learning and deep learning algorithms are popularly used.…”
Section: Performance Assessment and Monitoringmentioning
confidence: 99%
“…The detection process typically involves transforming the code into a highdimensional feature representation followed by measurement of code similarity. Aside from traditionally used features extracted based on structural or syntactic properties of programs (Ji et al, 2007;Lange and Mancoridis, 2007), NLP-based approaches such as n-grams (Ohmann and Rahal, 2015), topic modeling (Ullah et al, 2021), character and word embeddings (Manahi, 2021), and character-level language models (Katta, 2018) are increasingly being used for robust code representations. Similarly for downstream similarity modeling or classification, unsupervised (Acampora and Cosma, 2015) and supervised (Bandara and Wijayarathna, 2011;Manahi, 2021) machine learning and deep learning algorithms are popularly used.…”
Section: Performance Assessment and Monitoringmentioning
confidence: 99%
“…Manahi et al used a combination of Siamese networks, Bidirectional Long Short-Term Memory (BLSTM), and character embeddings on a dataset including 16,800 introductory course C assignments (Manahi et al, 2022). Siamese networks are multiple similar neural networks with the same configurations and weights.…”
Section: Related Workmentioning
confidence: 99%