Citation Pattern Matching Algorithms for Citation-based Plagiarism Detection: Greedy Citation Tiling, Citation Chunking and Longest Common Citation Sequence. Gipp, B. & Meuschke, N. In Proceedings of the 11th ACM Symposium on Document Engineering, pages 249–258, Mountain, View, CA, USA, September, 2011. ACM. Venue Rating: CORE BPaper doi abstract bibtex Plagiarism Detection Systems have been developed to locate instances of plagiarism e.g. within scientific papers. Studies have shown that the existing approaches deliver reasonable results in identifying copy&paste plagiarism, but fail to detect more sophisticated forms such as paraphrased plagiarism, translation plagiarism or idea plagiarism. The authors of this paper demonstrated in recent studies that the detection rate can be significantly improved by not only relying on text analysis, but by additionally analyzing the citations of a document. Citations are valuable language independent markers that are similar to a fingerprint. In fact, our examinations of real world cases have shown that the order of citations in a document often remains similar even if the text has been strongly paraphrased or translated in order to disguise plagiarism. This paper introduces three algorithms and discusses their suitability for the purpose of citation-based plagiarism detection. Due to the numerous ways in which plagiarism can occur, these algorithms need to be versatile. They must be capable of detecting transpositions, scaling and combinations in a local and global form. The algorithms are coined Greedy Citation Tiling, Citation Chunking and Longest Common Citation Sequence. The evaluation showed that if these algorithms are combined, common forms of plagiarism can be detected reliably.
@inproceedings{GippM11,
address = {Mountain, View, CA, USA},
title = {Citation {Pattern} {Matching} {Algorithms} for {Citation}-based {Plagiarism} {Detection}: {Greedy} {Citation} {Tiling}, {Citation} {Chunking} and {Longest} {Common} {Citation} {Sequence}},
isbn = {978-1-4503-0863-2},
url = {https://www.gipp.com/wp-content/papercite-data/pdf/gipp11c.pdf},
doi = {10.1145/2034691.2034741},
abstract = {Plagiarism Detection Systems have been developed to locate instances of plagiarism e.g. within scientific papers. Studies have shown that the existing approaches deliver reasonable results in identifying copy\&paste plagiarism, but fail to detect more sophisticated forms such as paraphrased plagiarism, translation plagiarism or idea plagiarism. The authors of this paper demonstrated in recent studies that the detection rate can be significantly improved by not only relying on text analysis, but by additionally analyzing the citations of a document. Citations are valuable language independent markers that are similar to a fingerprint. In fact, our examinations of real world cases have shown that the order of citations in a document often remains similar even if the text has been strongly paraphrased or translated in order to disguise plagiarism. This paper introduces three algorithms and discusses their suitability for the purpose of citation-based plagiarism detection. Due to the numerous ways in which plagiarism can occur, these algorithms need to be versatile. They must be capable of detecting transpositions, scaling and combinations in a local and global form. The algorithms are coined Greedy Citation Tiling, Citation Chunking and Longest Common Citation Sequence. The evaluation showed that if these algorithms are combined, common forms of plagiarism can be detected reliably.},
booktitle = {Proceedings of the 11th {ACM} {Symposium} on {Document} {Engineering}},
publisher = {ACM},
author = {Gipp, Bela and Meuschke, Norman},
month = sep,
year = {2011},
note = {Venue Rating: CORE B},
keywords = {Plagiarism Detection},
pages = {249--258},
}
Downloads: 0
{"_id":"mbXdNfSR6o2Cwhd2G","bibbaseid":"gipp-meuschke-citationpatternmatchingalgorithmsforcitationbasedplagiarismdetectiongreedycitationtilingcitationchunkingandlongestcommoncitationsequence-2011","authorIDs":["3aamy24wTzcQoTPGY","7Crs4B84W7BbduMmq","97o4RCsEFAoSxEQqt","9dzP7gNRTLKvc9aPR","GYqCNzAZv2xc9nhmD","KLLNwF6yrTvRfDhAP","LKQ5pS2Y8Pc7FTkr7","TuCkHmKovwKzF3y8Z","ZDet9tokdva7KFSEH","ZJvJiH6kd887XEnz3","gBWY7RvNrDhhspCGi","nLJ4c698vfAyWRWTr","pCb6WupcebiMmhw8Y","qNrPNpAwKg5fp598G","s7Z2R2uTWDHRHN2bE","tFwG3DWb6fYeXs3sL","yiM4TojQ7StGdi2iD"],"author_short":["Gipp, B.","Meuschke, N."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","address":"Mountain, View, CA, USA","title":"Citation Pattern Matching Algorithms for Citation-based Plagiarism Detection: Greedy Citation Tiling, Citation Chunking and Longest Common Citation Sequence","isbn":"978-1-4503-0863-2","url":"https://www.gipp.com/wp-content/papercite-data/pdf/gipp11c.pdf","doi":"10.1145/2034691.2034741","abstract":"Plagiarism Detection Systems have been developed to locate instances of plagiarism e.g. within scientific papers. Studies have shown that the existing approaches deliver reasonable results in identifying copy&paste plagiarism, but fail to detect more sophisticated forms such as paraphrased plagiarism, translation plagiarism or idea plagiarism. The authors of this paper demonstrated in recent studies that the detection rate can be significantly improved by not only relying on text analysis, but by additionally analyzing the citations of a document. Citations are valuable language independent markers that are similar to a fingerprint. In fact, our examinations of real world cases have shown that the order of citations in a document often remains similar even if the text has been strongly paraphrased or translated in order to disguise plagiarism. This paper introduces three algorithms and discusses their suitability for the purpose of citation-based plagiarism detection. Due to the numerous ways in which plagiarism can occur, these algorithms need to be versatile. They must be capable of detecting transpositions, scaling and combinations in a local and global form. The algorithms are coined Greedy Citation Tiling, Citation Chunking and Longest Common Citation Sequence. The evaluation showed that if these algorithms are combined, common forms of plagiarism can be detected reliably.","booktitle":"Proceedings of the 11th ACM Symposium on Document Engineering","publisher":"ACM","author":[{"propositions":[],"lastnames":["Gipp"],"firstnames":["Bela"],"suffixes":[]},{"propositions":[],"lastnames":["Meuschke"],"firstnames":["Norman"],"suffixes":[]}],"month":"September","year":"2011","note":"Venue Rating: CORE B","keywords":"Plagiarism Detection","pages":"249–258","bibtex":"@inproceedings{GippM11,\n\taddress = {Mountain, View, CA, USA},\n\ttitle = {Citation {Pattern} {Matching} {Algorithms} for {Citation}-based {Plagiarism} {Detection}: {Greedy} {Citation} {Tiling}, {Citation} {Chunking} and {Longest} {Common} {Citation} {Sequence}},\n\tisbn = {978-1-4503-0863-2},\n\turl = {https://www.gipp.com/wp-content/papercite-data/pdf/gipp11c.pdf},\n\tdoi = {10.1145/2034691.2034741},\n\tabstract = {Plagiarism Detection Systems have been developed to locate instances of plagiarism e.g. within scientific papers. Studies have shown that the existing approaches deliver reasonable results in identifying copy\\&paste plagiarism, but fail to detect more sophisticated forms such as paraphrased plagiarism, translation plagiarism or idea plagiarism. The authors of this paper demonstrated in recent studies that the detection rate can be significantly improved by not only relying on text analysis, but by additionally analyzing the citations of a document. Citations are valuable language independent markers that are similar to a fingerprint. In fact, our examinations of real world cases have shown that the order of citations in a document often remains similar even if the text has been strongly paraphrased or translated in order to disguise plagiarism. This paper introduces three algorithms and discusses their suitability for the purpose of citation-based plagiarism detection. Due to the numerous ways in which plagiarism can occur, these algorithms need to be versatile. They must be capable of detecting transpositions, scaling and combinations in a local and global form. The algorithms are coined Greedy Citation Tiling, Citation Chunking and Longest Common Citation Sequence. The evaluation showed that if these algorithms are combined, common forms of plagiarism can be detected reliably.},\n\tbooktitle = {Proceedings of the 11th {ACM} {Symposium} on {Document} {Engineering}},\n\tpublisher = {ACM},\n\tauthor = {Gipp, Bela and Meuschke, Norman},\n\tmonth = sep,\n\tyear = {2011},\n\tnote = {Venue Rating: CORE B},\n\tkeywords = {Plagiarism Detection},\n\tpages = {249--258},\n}\n\n","author_short":["Gipp, B.","Meuschke, N."],"key":"GippM11","id":"GippM11","bibbaseid":"gipp-meuschke-citationpatternmatchingalgorithmsforcitationbasedplagiarismdetectiongreedycitationtilingcitationchunkingandlongestcommoncitationsequence-2011","role":"author","urls":{"Paper":"https://www.gipp.com/wp-content/papercite-data/pdf/gipp11c.pdf"},"keyword":["Plagiarism Detection"],"metadata":{"authorlinks":{"meuschke, n":"https://bibbase.org/show?bib=https%3A%2F%2Fapi.zotero.org%2Fgroups%2F2532143%2Fitems%3Fkey%3DDOjJ33bOgISaFjBIBr7jCV5S%26format%3Dbibtex%26limit%3D100"}},"downloads":0},"bibtype":"inproceedings","biburl":"https://api.zotero.org/groups/2532143/items?key=DOjJ33bOgISaFjBIBr7jCV5S&format=bibtex&limit=100","creationDate":"2020-04-15T13:02:33.559Z","downloads":0,"keywords":["plagiarism detection"],"search_terms":["citation","pattern","matching","algorithms","citation","based","plagiarism","detection","greedy","citation","tiling","citation","chunking","longest","common","citation","sequence","gipp","meuschke"],"title":"Citation Pattern Matching Algorithms for Citation-based Plagiarism Detection: Greedy Citation Tiling, Citation Chunking and Longest Common Citation Sequence","year":2011,"dataSources":["aEHCfX6B2taJt8dfa","9qTaLWxMN5hLpMP8m","xteq4cdC6ATE2G6Fg","JNgeyAG2vQ8k88oYh","FPjHiAkAja6XvmScK","RTGAqwGfLTSqYQMsS","Y7kZGjoN5Erk3Lo2J","yM7MefT3mRkY9m7i4","jnWJCpbQCoWvxj9kz","F32umBkhFrpeJbp7A","BWzEyLkMvdMGpHpr6","e3AdWzdxYmb85Fn5D","MtqPmSRuq4X8FJqNT","YCwvFifyPbazBYMQD","6oZMeYhGKA2Mp8xhF","gYMS6DBXsNosXKcRC","bQwdfx3o8Q3vnsqfH","SzFkcrpurPzNHEyqX","6KJgnNtYZiwwFkcGq","dHLtmS5G7GmooD755","EvZZTzAZvA3EsuMjm"]}