A blockchain-based code copyright management system

[1]  Dafang Zhang,et al.  Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection , 2021, IEEE Transactions on Emerging Topics in Computing.

[2]  Sanjay Jha,et al.  B-FERL: Blockchain based Framework for Securing Smart Vehicles , 2020, Inf. Process. Manag..

[3]  Christian Esposito,et al.  Blockchain-based authentication and authorization for smart city applications , 2021, Inf. Process. Manag..

[4]  Günther Pernul,et al.  EtherTwin: Blockchain-based Secure Digital Twin Information Management , 2021, Inf. Process. Manag..

[5]  Attila Kertesz,et al.  PF-BTS: A Privacy-Aware Fog-enhanced Blockchain-assisted task scheduling , 2021, Inf. Process. Manag..

[6]  Yaser Jararweh,et al.  A Survey on Blockchain for Information Systems Management and Security , 2021, Inf. Process. Manag..

[7]  Thar Baker,et al.  Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems , 2020, Inf. Process. Manag..

[8]  Lalit M. Patnaik,et al.  ISCG: An Intelligent Sensing and Caption Generation System for Object Detection and Captioning Using Deep Learning , 2020, Int. J. Intell. Inf. Technol..

[9]  Moayad Aloqaily,et al.  An incentive-aware blockchain-based solution for internet of fake media things , 2020, Inf. Process. Manag..

[10]  Said Ouatik El Alaoui,et al.  Deep Neural Models and Retrofitting for Arabic Text Categorization , 2020, Int. J. Intell. Inf. Technol..

[11]  Zhini Cai,et al.  Usage of Deep Learning and Blockchain in Compilation and Copyright Protection of Digital Music , 2020, IEEE Access.

[12]  Weidong Xiao,et al.  A Blockchain-Based Traceable IP Copyright Protection Algorithm , 2020, IEEE Access.

[13]  Rishabh Saxena,et al.  A Comparative Study on Adversarial Noise Generation for Single Image Classification , 2020, Int. J. Intell. Inf. Technol..

[14]  Hong Li,et al.  Blockchain for Large-Scale Internet of Things Data Storage and Protection , 2019, IEEE Transactions on Services Computing.

[15]  Qassim Nasir,et al.  Performance Analysis of Hyperledger Fabric Platforms , 2018, Secur. Commun. Networks.

[16]  Athanasios V. Vasilakos,et al.  BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 , 2018, J. Netw. Comput. Appl..

[17]  Hirotsugu Kinoshita,et al.  Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).

[18]  Amir Herzberg,et al.  Blockchain Access Privacy: Challenges and Directions , 2018, IEEE Security & Privacy.

[19]  Pin Lv,et al.  BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation , 2018, IEEE Access.

[20]  Ke Xiao,et al.  A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications , 2018, IEEE Access.

[21]  Alexander Ivanovitch Savelyev,et al.  Copyright in the Blockchain Era: Promises and Challenges , 2017, Comput. Law Secur. Rev..

[22]  Sencun Zhu,et al.  Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection , 2017, IEEE Transactions on Software Engineering.

[23]  Omri Ross,et al.  KYC Optimization Using Distributed Ledger Technology , 2017, WI 2017.

[24]  Kieron O'Hara,et al.  Smart Contracts - Dumb Idea , 2017, IEEE Internet Comput..

[25]  Haoran Yu,et al.  WASTK: A Weighted Abstract Syntax Tree Kernel Method for Source Code Plagiarism Detection , 2017, Sci. Program..

[26]  Wei Jiang,et al.  Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.

[27]  Fangfang Zhang,et al.  Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection , 2016, IEEE Transactions on Reliability.

[28]  Sunju Park,et al.  Credible, resilient, and scalable detection of software plagiarism using authority histograms , 2016, Knowl. Based Syst..

[29]  Qinghua Zheng,et al.  Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences , 2015, IEEE Transactions on Software Engineering.

[30]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[31]  M. Sahin,et al.  Trust but verify: the introduction of plagiarism detection software. , 2014, Pediatric neurology.

[32]  Cui Baojiang,et al.  Improved Plagiarism Detection Algorithm Based on Abstract Syntax Tree , 2013, EIDWT.

[33]  Siu-Ming Yiu,et al.  Heap Graph Based Software Theft Detection , 2013, IEEE Transactions on Information Forensics and Security.

[34]  Georgina Cosma,et al.  An Approach to Source-Code Plagiarism Detection and Investigation Using Latent Semantic Analysis , 2012, IEEE Transactions on Computers.

[35]  Alberto Barrón-Cedeño,et al.  Towards the Detection of Cross-Language Source Code Reuse , 2011, NLDB.

[36]  Lucienne Blessing,et al.  DRM, a Design Research Methodology , 2009 .

[37]  Philip S. Yu,et al.  GPLAG: detection of software plagiarism by program dependence graph analysis , 2006, KDD '06.

[38]  Seong-Bae Park,et al.  Program Plagiarism Detection Using Parse Tree Kernels , 2006, PRICAI.

[39]  Armand Navabi,et al.  The evaluation of two software watermarking algorithms , 2005, Softw. Pract. Exp..

[40]  Patrick Cousot,et al.  An abstract interpretation-based framework for software watermarking , 2004, POPL.

[41]  Shinji Kusumoto,et al.  CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code , 2002, IEEE Trans. Software Eng..

[42]  Jean-Jacques Quisquater,et al.  Robust Object Watermarking: Application to Code , 1999, Information Hiding.

[43]  Michael J. Wise,et al.  Plagiarism à la Mode: A Comparison of Automated Systems for Detecting Suspected Plagiarism , 1996, Comput. J..

[44]  Russell W. Quong,et al.  ANTLR: A predicated‐LL(k) parser generator , 1995, Softw. Pract. Exp..

[45]  Moni Naor,et al.  Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.

[46]  Geoff Whale Software metrics and plagiarism detection , 1990, J. Syst. Softw..

[47]  Vijay V. Raghavan,et al.  A critical investigation of recall and precision as measures of retrieval system performance , 1989, TOIS.

[48]  S. K. Robinson,et al.  An empirical approach for detecting program similarity and plagiarism within a university programming environment , 1987 .