期刊文献+

一种基于BP神经网络的代码相似性检测方法 被引量:11

Code Similarity Detection Approach Based on Back-propagation Neural Network
下载PDF
导出
摘要 如何有效地检测程序设计课程作业中的抄袭现象是一个重要的问题。传统的抄袭检测方法主要利用代码的属性或结构信息来度量代码之间的相似性。给出了一种基于误差反向传播(BP算法)多层前向神经网络的代码抄袭检测方法。提取程序之间的7种比较特征作为神经网络的输入,经过网络计算后得出程序的相似值,并将该值与抄袭决策阈值相比较以判定存在抄袭现象的程序集。实验结果表明,本方法具有很好的检测效果。 It is very important to find plagiarized programs in the field of computer science education. Traditional methods for program similarity use attribute counting or structure information to detect plagiarism. This paper presented a program similarity detection approach based on back propagation (BP algorithm) multi-layer feed-forward neural net works. We extracted seven compared features of the code as the input of the neural network, and obtained the program similarity through the network calculation. Comparing the result with the threshold value, we can find all groups of simlar programs. Experimental results show that our method is effective.
出处 《计算机科学》 CSCD 北大核心 2010年第3期159-164,共6页 Computer Science
基金 863国家重点基金项目(2007AA010302 2008AA012114) 国家自然科学基金(60703057 60573084)资助
关键词 抄袭 相似性检测 BP神经网络 比较特征 Plagiarism, Similarity detection, BP neural network, Compared feature
  • 相关文献

参考文献20

  • 1McCabe D. Levels of Cheating and Plagiarism Remain High[C/ OL]. Center for Academic Integrity, Duke University, 2005. http://academicintegrity. org/.
  • 2Bull J,Collins C,Coughlin E, et al. Technical Review of Plagiarism Detection Software Report [C/OL]. http://www. jisc. ac. uk/pub01/luton. pdf,July 2002.
  • 3Sheard J, Dick M, Markham S, et al. Cheating and plagiarism: perceptions and practices of first year IT students[C]//The 7th Annual Joint Conference on Innovation and Technology in Computer Science Education. Aarhus, Denmark, 2002 : 183-187.
  • 4Parker A, Hamblem J O. Computer algorithms for plagiarism detection[J]. IEEE Transactions on Education, 1989,32 (2) :94- 99.
  • 5Faidhi J A W,Robinson S K. An Empirical Approach for Detection Program Similarity and Plagiarism within a University Programming Environment[J]. Computers and Education, 1987,11 (1):11-19.
  • 6Jones E L. Metrics based plagiarism monitoring[C] // The 6th Annual CSSC Northeastern Conference. Middlebury, VT, 2001.
  • 7Verco K L, Wise M J. Software for detecting suspected plagiarism:comparing structure and attribute-counting systems[C]// Proceedings of the 1st Australian Conference on Computer Science Education. 1996:3- 5.
  • 8WISE M J. YAP3 : Improved Detection of similarities in computer program and other Texts[C]//ACM SIGCSE. 1996:130-134.
  • 9Schleimer S, Wilkerson D, Aiken A. Winnowing: Local Algorithms for Document Fingerprinting[C]//Proceedings of the ACM SIGMOD International Conference on Management of Data. June 2003 : 76-85.
  • 10Prechett L, Malpohl G, Philippsen M. Finding plagiarisms among a set of programs with JPlag [J]. Journal of Universal Computer Science, 2002,8 (11) : 1016-1038.

二级参考文献17

  • 1谢晶,贾克斌.一种基于二维直方图的H.264/AVC快速帧内预测判决算法[J].电子与信息学报,2005,27(7):1053-1057. 被引量:20
  • 2倪伟,郭宝龙,杨镠.一种适用于H.264/AVC的自适应空域帧内预测算法[J].计算机学报,2005,28(11):1853-1860. 被引量:8
  • 3ISO/IEC FDIS 14496-10.Information technology-coding of audio-visual objects part 10:advanced video coding[S]
  • 4Ravasi M,Mattavelli M,Clerc C A.Computational complexity comparison of MPEG4 and JVT codecs[C]// Joint Video Team (JVT) of ISO/IEC MPEG & ITU-T VCEG Meeting.Klagenfurt,Austria:[s.n.],2002
  • 5ITU-T.Draft ITU-T recommendation H.263 version 2:video coding for low bit rate communication[S]
  • 6ISO/IEC 14496-2.Committee draft,information technology coding of audio visual objects:visual[S]
  • 7Pan Feng,Lin Xiao,Susanto R,et al.Fast mode decision for Intra prediction[C]// JVT Meeting.Pattaya,Thailand:[s.n.],2003
  • 8Kim Changsung,Shih H H,Kuo C J.Multistage mode decision for Intra prediction in H.264 codec[J].Proc of Visual Communications and Image Processing,2004,5308 (18):355-363
  • 9Prechelt L, Malpohl G, Philippsen M. Finding plagiarisms among a set of programs with JPlag [ J]. Journal of Universal Computer Science,2002,8( 11 ) :1016 - 1038
  • 10Emetic K, Moritz K. JPlag: a system that finds similarities among multiple sets of source code files [ EB/OL ]. 2005 [ 2008-04-05 ]. http ://www. ipd. uni-karlsruhe, de/jplag/

共引文献39

同被引文献135

  • 1曹羽中,金茂忠,刘超.克隆代码检测技术综述[J].计算机工程与科学,2006,28(z2):9-13. 被引量:6
  • 2孙佰清,邢爱国,张积宾,潘启树.可拓神经网络模型的设计与实现[J].哈尔滨工业大学学报,2006,38(7):1156-1159. 被引量:17
  • 3杨治明,王晓蓉,彭军,陈应祖.BP人工神经网络在图像分割中的应用[J].计算机科学,2007,34(3):234-236. 被引量:46
  • 4邓爱萍,徐国梁,肖奔.基于串匹配方法的源代码复制检测技术研究[J].科学技术与工程,2007,7(10):2251-2254. 被引量:9
  • 5Bilenko M,Mooney R J.Adaptive duplicate detection using learnable string similarity measure[C] ∥Proceeding of ninth ACM SIGKDD international conference on Knowledge disco-very and data mining.2003:39-48,.
  • 6Baker B S.On finding duplication and near duplication in large software systems[C] ∥Proceedings of 2nd Working Conference on Reverse Engineering.1995:86-95.
  • 7Mayrand J,Leblanc C,Merlo E M.Automatic detection of function clones in a software system using metrics[C] ∥Proceeding of International Conference on Software Maintenance (ICSM).1996.
  • 8Rieger M.Effective clone detection without language barriers[D].Bern University,Switzerland,2005.
  • 9Georgina C,Mike J.Source-code plagiarism:A UK academic perspective[R].RR-422.Department of computer Science,University of Warwick,2006.
  • 10Sheard J,Dick M,Markham S,et al.Cheating and plagiarism:perceptions and practices of first year it students[C] ∥Procee-dings of the 7th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education.2002:183-187.

引证文献11

二级引证文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部