We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 6,892 results
  1. Unmasking academic cheating behavior in the artificial intelligence era: Evidence from Vietnamese undergraduates

    The proliferation of artificial intelligence (AI) technology has brought both innovative opportunities and unprecedented challenges to the education...

    Hung Manh Nguyen, Daisaku Goto in Education and Information Technologies
    Article Open access 05 February 2024
  2. Cheating Automatic Short Answer Grading with the Adversarial Usage of Adjectives and Adverbs

    Automatic grading models are valued for the time and effort saved during the instruction of large student bodies. Especially with the increasing...

    Anna Filighera, Sebastian Ochs, ... Thomas Tregel in International Journal of Artificial Intelligence in Education
    Article Open access 26 July 2023
  3. A systematic review of research on cheating in online exams from 2010 to 2021

    In recent years, online learning has received more attention than ever before. One of the most challenging aspects of online education is the...

    Fakhroddin Noorbehbahani, Azadeh Mohammadi, Mohammad Aminazadeh in Education and Information Technologies
    Article 07 March 2022
  4. Exam Cheating Detection Based on Action Recognition Using Vision Transformer

    Cheating is the use of prohibited actions to illegally gain in the process of taking tests and exams. These actions cause negative consequences,...
    Thuong-Cang Phan, Anh-Cang Phan, Ho-Dat Tran in Intelligent Systems and Data Science
    Conference paper 2024
  5. Smart Online Exam Proctoring Assist for Cheating Detection

    Online exams are the most preferred mode of exams in online learning environment. This mode of exam has been even more prevalent and a necessity in...
    Mohammad M. Masud, Kadhim Hayawi, ... Mai El Barachi in Advanced Data Mining and Applications
    Conference paper 2022
  6. Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing

    Cheating detectable secret sharing schemes (CDSS) detects changes in the secret that is caused by an adversary who modifies shares of an unauthorized...
    Sabyasachi Dutta, Shaoquan Jiang, Reihaneh Safavi-Naini in Cryptology and Network Security
    Conference paper 2023
  7. Statoodle: A Learning Analytics Tool to Analyze Moodle Studentsā€™ Actions and Prevent Cheating

    In higher education, Learning Management Systems (LMS) are widely used to enable a space where instructors can deliver the materials, propose and...
    Pedro Manuel Moreno-Marcos, Jorge Barredo, ... Carlos Delgado Kloos in Responsive and Sustainable Educational Futures
    Conference paper 2023
  8. Cheating identifiable polynomial based secret sharing scheme for audio and image

    Polynomial based secret sharing is the art of protecting information and a tool used in areas where a secret has to be distributed among multiple...

    Guttikonda Prashanti, Mundukur Nirupama Bhat in Multimedia Tools and Applications
    Article 17 May 2023
  9. Post-Quantum Cheating Detectable Private Information Retrieval

    Private Information Retrieval (PIR) allows a user to privately retrieve any item from a database such that the server(s) holding the database cannot...
    Lin Zhu, Changlu Lin, ... Liang Feng Zhang in ICT Systems Security and Privacy Protection
    Conference paper 2022
  10. Outsourced cheating detection for secret sharing

    In a secret sharing scheme, a dealer, D , distributes shares of a secret, S among a set of n participants, such that only authorised subsets of these...

    Louis Cianciullo, Hossein Ghodosi in International Journal of Information Security
    Article 25 January 2021
  11. A cheating immune (kn) visual cryptography scheme by using the rotation of shares

    Since Noar and Shamir introduced visual cryptography scheme (VCS), the cheating problem of VCS has absorbed much attention of scholars. The current...

    Yongkang Zhao, Fang-Wei Fu in Multimedia Tools and Applications
    Article 08 January 2022
  12. The Role of Values in Academic Cheating at University Online

    This study investigated the role of basic human values in explaining academic dishonesty among undergraduate students in Russia (Nā€‰=ā€‰471) during the...
    Anastasiia Vlasenko, Anna Shirokanova in Digital Transformation and Global Society
    Conference paper 2022
  13. Theory of Planned Behaviour in Higher Education: Exploring the Perceptions of Multicultural ESL Students About Cheating

    The theory of planned behaviour (TPB) is explored in relation to the different aspect of education. However, little work has been undertaken to...
    Ajrina Hysaj, Mark Freeman, Zeenath Reza Khan in Social Computing and Social Media
    Conference paper 2023
  14. A multi-criteria approach to time cheating in the divisible load scheduling

    The divisible load scheduling (DLS) can be considered as a special class of scheduling model in the area of distributed and parallel systems....

    Shamsollah Ghanbari, Mohamed Othman in Iran Journal of Computer Science
    Article 01 February 2021
  15. Leakage Resilient Cheating Detectable Secret Sharing Schemes

    A secret sharing scheme generates shares of a secret that will be distributed among a set of participants such that the shares of qualified subsets...
    Sabyasachi Dutta, Reihaneh Safavi-Naini in Information Security and Privacy
    Conference paper 2021
  16. Real-time cheating immune secret sharing for remote sensing images

    To observe the earth surface and its atmospheric interaction, various advanced optical and radar sensors are utilized. This observation returns a...

    Shivendra Shivani, Subhash Chandra Patel, ... Gautam Srivastava in Journal of Real-Time Image Processing
    Article 09 August 2020
  17. Cheating Sensitive Security Quantum Bit Commitment with Security Distance Function

    Quantum bit commitment (QBC) aims to provide a secure commitment between two mutually suspicious parties. This paper presents a new quantum bit...
    Weicong Huang, Qisheng Guang, ... Lijun Chen in Digital Forensics and Cyber Crime
    Conference paper 2022
  18. Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency

    A (k, L, n) ramp secret sharing scheme allows a dealer to share a secret vector with a lesser share size compared to threshold secret sharing...
    Jyotirmoy Pramanik, Sabyasachi Dutta, ... Avishek Adhikari in Information Systems Security
    Conference paper 2020
  19. Intelligent invigilator system based on target detection

    Affected by the COVID-19 epidemic, the final examinations at many universities and the recruitment interviews of enterprises were forced to be...

    **g Xue, Wen Wu, Qingkai Cheng in Multimedia Tools and Applications
    Article 29 April 2023
Did you find what you were looking for? Share feedback.