Search
Search Results
-
Unmasking academic cheating behavior in the artificial intelligence era: Evidence from Vietnamese undergraduates
The proliferation of artificial intelligence (AI) technology has brought both innovative opportunities and unprecedented challenges to the education...
-
Cheating Automatic Short Answer Grading with the Adversarial Usage of Adjectives and Adverbs
Automatic grading models are valued for the time and effort saved during the instruction of large student bodies. Especially with the increasing...
-
A systematic review of research on cheating in online exams from 2010 to 2021
In recent years, online learning has received more attention than ever before. One of the most challenging aspects of online education is the...
-
-
Exam Cheating Detection Based on Action Recognition Using Vision Transformer
Cheating is the use of prohibited actions to illegally gain in the process of taking tests and exams. These actions cause negative consequences,... -
Smart Online Exam Proctoring Assist for Cheating Detection
Online exams are the most preferred mode of exams in online learning environment. This mode of exam has been even more prevalent and a necessity in... -
Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing
Cheating detectable secret sharing schemes (CDSS) detects changes in the secret that is caused by an adversary who modifies shares of an unauthorized... -
Statoodle: A Learning Analytics Tool to Analyze Moodle Studentsā Actions and Prevent Cheating
In higher education, Learning Management Systems (LMS) are widely used to enable a space where instructors can deliver the materials, propose and... -
Cheating identifiable polynomial based secret sharing scheme for audio and image
Polynomial based secret sharing is the art of protecting information and a tool used in areas where a secret has to be distributed among multiple...
-
Post-Quantum Cheating Detectable Private Information Retrieval
Private Information Retrieval (PIR) allows a user to privately retrieve any item from a database such that the server(s) holding the database cannot... -
Outsourced cheating detection for secret sharing
In a secret sharing scheme, a dealer, D , distributes shares of a secret, S among a set of n participants, such that only authorised subsets of these...
-
A cheating immune (k, n) visual cryptography scheme by using the rotation of shares
Since Noar and Shamir introduced visual cryptography scheme (VCS), the cheating problem of VCS has absorbed much attention of scholars. The current...
-
The Role of Values in Academic Cheating at University Online
This study investigated the role of basic human values in explaining academic dishonesty among undergraduate students in Russia (Nā=ā471) during the... -
Theory of Planned Behaviour in Higher Education: Exploring the Perceptions of Multicultural ESL Students About Cheating
The theory of planned behaviour (TPB) is explored in relation to the different aspect of education. However, little work has been undertaken to... -
A multi-criteria approach to time cheating in the divisible load scheduling
The divisible load scheduling (DLS) can be considered as a special class of scheduling model in the area of distributed and parallel systems....
-
Leakage Resilient Cheating Detectable Secret Sharing Schemes
A secret sharing scheme generates shares of a secret that will be distributed among a set of participants such that the shares of qualified subsets... -
Real-time cheating immune secret sharing for remote sensing images
To observe the earth surface and its atmospheric interaction, various advanced optical and radar sensors are utilized. This observation returns a...
-
Cheating Sensitive Security Quantum Bit Commitment with Security Distance Function
Quantum bit commitment (QBC) aims to provide a secure commitment between two mutually suspicious parties. This paper presents a new quantum bit... -
Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency
A (k, L, n) ramp secret sharing scheme allows a dealer to share a secret vector with a lesser share size compared to threshold secret sharing... -
Intelligent invigilator system based on target detection
Affected by the COVID-19 epidemic, the final examinations at many universities and the recruitment interviews of enterprises were forced to be...