Please use this identifier to cite or link to this item: http://studentrepo.iium.edu.my/handle/123456789/10996
Title: A deep learning framework for the defection of source code plagiarism using Siamese network and embedding models
Authors: Manahi, Mohammed S.M.
Supervisor: Suriani Sulaiman, Ph.D
Normi Sham Awang Abu Bakar, Ph.D
Subject: Deep learning (Machine learning)
Neural networks (Computer science)
Year: 2021
Publisher: Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2021
Abstract in English: Source code plagiarism represents an ongoing problem that threatens academic integrity and intellectual rights. Various research works on detection approaches have been proposed to overcome prolonged manual inspection as it requires laborious efforts and consumes time. These detection approaches can be categorised into four major domains; software engineering, knowledge discovery, shallow parsing and machine learning. Review of the literature revealed that most of the detection approaches had been evaluated based on the commonly referenced and established six-level classification of source code transformations known as the Faidhi and Robinson spectrum, except for the approaches in the machine learning domain. Thus, this research sought to fill the gap in the absence of a machine learning approach that uses embedding models to detect source code plagiarism and evaluated based on the six-level classification. The objectives of this research are threefold; to extract various embedding sequences as similarity features from source codes using embedding models, to train a Siamese network that learns similarity representations from source code embedding sequences, and to develop a deep learning framework that leverages embedding sequences and Siamese network to identify the most accurate detection based on the standard six-level classification of plagiarism activities defined by Faidhi and Robinson. A deep learning framework that utilised a Siamese network and embedding models is proposed to detect deliberate plagiarism in source codes. The proposed framework split source codes into character-based, word-based and token-based sequences to obtain embedding sequences through Word2Vec and fastText models. These embedding sequences were then used as inputs to the Siamese BLSTM network for learning similarity representations. The experimental results showed that the character-based embedding sequences with Word2Vec, Skip Gram and Negative Sampling (W2V-SGNS) approach and the token-based embedding sequences with FastText, Skip Gram and Hierarchical Softmax (FT-SGHS) approach outperformed the other approaches. The detection results were also found to be able to detect up to level five (i.e., semantic equivalents) of the standard classification. However, future experiments will require a larger dataset and fine-tuning of the Siamese network to reduce overfitting and to improve the generalisation of the trained models on plagiarism attacks.
Call Number: t Q 325.73 M266D 2021
Kullliyah: Kulliyyah of Information and Communication Technology
Programme: Master of Computing (Computer Science and Information Technology)
URI: http://studentrepo.iium.edu.my/handle/123456789/10996
Appears in Collections:KICT Thesis

Files in This Item:
File Description SizeFormat 
t11100437189MohammedS.M.Manahi_24.pdf24 pages file351.92 kBAdobe PDFView/Open
t11100437189MohammedS.M.Manahi_SEC.pdf
  Restricted Access
Full text secured file4.19 MBAdobe PDFView/Open    Request a copy
Show full item record

Google ScholarTM

Check


Items in this repository are protected by copyright, with all rights reserved, unless otherwise indicated. Please give due acknowledgement and credits to the original authors and IIUM where applicable. No items shall be used for commercialization purposes except with written consent from the author.