About
2
Publications
4,129
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
24
Citations
Introduction
Current institution
Publications
Publications (2)
With the advancement of technology, the smartphone has become a reliable source to store private details, personal photos, credentials, and confidential information. However, smartphones are easily stolen and it has become a suitable target for attackers. Usually, smartphones require only initial explicit authentication, once the initial login is p...
Plagiarism in programming assignments has been increasing these days which affects the evaluation of students. Thispaper proposes a machine learning approach for plagiarism detection of programming assignments. Different features related to source code are computed based on similarity score of n-grams, code style similarity and dead codes. Then, xg...