期刊文献+

一种基于指纹融合的跨语言剽窃检测技术 被引量:5

Cross-language plagiarism detection technology based on fingerprint fusion
下载PDF
导出
摘要 跨语言剽窃一直是学术不端现象发生的重灾区,也是极难发现的一种剽窃行为。跨语言剽窃的检测和识别技术是目前最亟待发展的技术,也是反剽窃抄袭领域的最大技术难点。在总结和分析了单语剽窃检测和跨语言剽窃检测国内外研究现状的基础上,针对跨语言剽窃检测存在的问题,提出了一种基于指纹融合的跨语言剽窃检测技术,并将所提出的技术在人工构建的剽窃集上进行实验验证,对实验结果进行详细分析和对比分析,验证了该技术的有效性。 Cross-language plagiarism has always been the hardest hit for academic misbehavior. It is also a behavior that is extremely difficult to spot. Cross-language plagiarism detection and identification technology is the most urgent technology that needed to be developed. It is also the biggest technical difficulty in the field of plagiarism. Based on the summary and analysis of current researches on the monolingual plagiarism detection and cross-language plagiarism detection,aiming at the existing problem of cross-language plagiarism detection,this paper proposed a cross-language plagiarism detection technology based on fingerprint fusion. This paper also carried out experimental verification on the plagiarism set of artificial building. Through analyzing and comparing the result of experiments,it can be concluded that the method is indeed effective.
作者 刘刚 左权 杨倩茹 Liu Gang;Zuo Quan;Yang Qianru(College of Computer Science & Technology,Harbin Engineering University,Harbin 150001,China)
出处 《计算机应用研究》 CSCD 北大核心 2019年第1期168-174,共7页 Application Research of Computers
基金 中央高校基本科研业务费专项资金资助项目(HEUCF180604) 黑龙江省博士后科研启动金资助项目(LBH-Q15031) 黑龙江省教育科学规划课题(GJC1215107)
关键词 中间指纹 指纹融合 语义消歧 跨语言剽窃检测 intermediate fingerprint fingerprint fusion semantic disambiguation cross-language plagiarism detection
  • 相关文献

参考文献2

二级参考文献44

  • 1董振东,董强.面向信息处理的词汇语义研究中的若干问题[J].语言文字应用,2001(3):27-32. 被引量:35
  • 2[1]DONALD L M C. CAI research [EB/OL]. http:∥www.academicintegrity.org/cairesearch.asp., 2004-07-01.
  • 3[2]OTTENSTEIN K J. An algorithmic approach to the detection and prevention of plagiarism [J]. ACM SIGCSE Bull, 1976,8(4): 30-41.
  • 4[3]CLOUGH P. Plagiarism in natural and programming languages: An overview of current tools and technologies [A]. Research Memoranda: CS-00-05 [R]. Sheffield: Department of Computer Science, University of Sheffield, 2000. 1-31.
  • 5[5]BRODER A Z. On the resemblance and containment of documents [A]. Proceedings of Compression and Complexity of SEQUENCES [C]. Salerno: IEEE Computer Society, 1998. 21-29.
  • 6[6]MANDER U. Finding similar files in a large file system [A]. Proceedings of the USENIX Winter 1994 Technical Conference [C]. San Francisco: The Advanced Computing Systems Association, 1994. 1-10.
  • 7[7]MANDER U, BAKER B S. Deducing similarities in Java sources from bytecode [A]. USENIX 1998 Annual Technical Conference [C]. New Orleans: The Advanced Computing Systems Association, 1998. 179-190.
  • 8[8]BRIN S, DAVIS J, GARCIA-MOLINA H. Copy detection mechanisms for digital documents [A]. Proceedings of the ACM SIGMOD Annual Conference [C]. San Francisco: ACM Press, 1995. 398-409.
  • 9[9]SHIVAKUMAR N, GARCIA-MOLINA H. SCAM: a copy detection mechanism for digital documents [A]. Proceedings of the 2nd International Conference in Theory and Practice of Digital Libraries [C]. Austin: Texas A & M University, 1995. 201-210.
  • 10[10]SHIVAKUMAR N, GARCIA-MOLINA H. Building a scalable and accurate copy detection mechanism [A]. Proceedings of the 1st ACM Conference on Digital Libraries [C]. Bethesda: ACM Press, 1996. 160-168.

共引文献36

同被引文献47

引证文献5

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部