References
- S. Narayanan and S. Simi, "Source code plagiarism detection and performance analysis using fingerprint based distance measure method," 2012 7th International Conference on Computer Science & Education (ICCSE). IEEE, 2012.
- A. Caliskan-Islam, R. Harang, A. Liu, A. Narayanan, C. Voss, F. Yamaguchi, and R. Greenstadt, "De-anonymizing programmers via code stylometry," 24th USENIX Security Symposium (USENIX Security), Washington, DC. 2015.
- T. Joachims, "A Probabilistic Analysis of the Rocchio Algorithm with TFIDF for Text Categorization," No. CMUCS-96-118. Carnegie-mellon univ pittsburgh pa dept of Computer Science, 1996.
- T. Mikolov, K. Chen, G. Corrado, and J. Dean, "Efficient estimation of word repre-sentations in vector space," arXiv preprint arXiv:1301.3781, 2013.
- Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, "Gradientbased learning applied to document recognition," Proceedings of the IEEE, Vol.86, No.11, pp.2278-2324, 1998. https://doi.org/10.1109/5.726791
- L. Mou, G. Li, L. Zhang, T. Wang, and Z. Jin, "Convolutional Neural Networks over Tree Structures for Programming Language Processing," In Thirtieth AAAI Conference on Artificial Intelligence(AAAI), Vol.2, No.3, 2016.
- W. S. Choi and S. B. Kim, "N-gram Feature Selection for Text Classification Based on Symmetrical Conditional Probability and TF-IDF," Journal of Korean Institute of Industrial Engineers, Vol.41, No.4, pp.381-388, 2015. https://doi.org/10.7232/JKIIE.2015.41.4.381
- G. Frantzeskou, E. Stamatatos, S. Gritzalis, and S. Katsikas, "Source code author identification based on n-gram author profiles." In IFIP International Conference on Artificial Intelligence Applications and Innovations, Springer, Boston, MA. pp.508-515, 2006.
- L. Breiman, "Random forests," Machine Learning, Vol.45, No.1, pp.5-32, 2001. https://doi.org/10.1023/A:1010933404324
- I. Krsul and E. H. Spafford, "Authorship analysis: Identifying the author of a program," Computers & Security, Vol.16, No.3, pp.233-257, 1997. https://doi.org/10.1016/S0167-4048(97)00005-9
- X. Yang, G. Xu, Q. Li, Y. Guo, and M. Zhang, "Authorship attribution of source code by using back propagation neural network based on particle swarm optimization," PloS one, Vol.12, No.11, pp.e0187204, 2017. https://doi.org/10.1371/journal.pone.0187204
- Y. Kim, "Convolutional neural networks for sentence classification," arXiv preprint arXiv:1408.5882, 2014.
- L. Breiman, "Bagging predictors," Machine Learning, Vol.24, No.2, pp.123-140, 1996. https://doi.org/10.1007/BF00058655
- T. Mikolov, K. Chen, G. Corrado, and J. Dean, "Efficient estimation of word repre-sentations in vector space," arXiv preprint arXiv:1301.3781, 2013.
- T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, "Distributed representations of words and phrases and their compositionality," Advances in Neural Information Processing Systems, 2013.
- A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification with deep convolutional neural networks," Advances in Neural Information Processing Systems, 2012.