Hi, Anand (et al.), If you have a case concerning potential plagiarism that involves work published in IEEE Xplore (either the original work or the alleged plagiarized work), I encourage you to review the instructions available at the IEEE Intellectual Property Rights Office:
http://www.ieee.org/publications_standards/publications/rights/index.html They provide a FAQ on how best to resolve cases of alleged plagiarism. It is not appropriate to use this forum for such allegations. Joe Touch IEEE ComSoc Director of Conference Operations On 1/13/2013 10:51 PM, Al-Sakib Khan Pathan wrote: > Dear Colleagues, > > Though, this could be an off-topic and may violate the norms of posting to > TCCC, I feel it is necessary to write a few lines as this is one of the > most active groups. No reply is expected to avoid unnecessary flooding, but > this is sent to a wide range of editors and researchers to be aware of such > submissions. > > It may be okay if someone takes other person's idea partially and improves > or uses it elsewhere giving proper credits or citations. However, the case > of plagiarism, often with exact copy or slightly modified version has > increased in recent days. From my given roles, I have encountered several > such matters in various events, many of which have come out from especially > South India and China. Just to understand the matter, I have mentioned the > names of the exact places and it should not be taken as a statement against > anybody but what is evident among the submissions caught. Often, such > individuals (claimed authors) are bold enough to post their documents in > public. > > Let us see someone who claims to be, "Academician, Researcher, Scholar, > Author, Innovator, Hacker" (http://www.anandnayyar.com/home.aspx) > > Here's a blatant plagiarism case. From Editor's position, often it is not > possible to verify such cases, hence the burden lies on the reviewers who > commented on it and of course on the person who submitted. It can happen in > apparently good journals as well. Sometimes these matters are not solved (I > have communicated many for several times) and we could at best do our part > by warning the person (which may not work). > > *OUR ORIGINAL paper:* > http://networking.khu.ac.kr/publications/data/Security%20in%20Wireless%20Sensor%20Networks%20Issues%20and%20Challenges.pdf > http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1625756&tag=1 > * > Plagiarized Paper > ----------------------------* > Security Issues & Challenges in Wireless Sensor Networks > Author: Anand Nayyar Assistant Professor Department of Computer > Applications & IT KCL Institute of Management and Technology, Jalandhar, > India > [email protected] > > http://www.gpublication.com/jcer/ > http://www.gpublication.com/jcer/?wicket:interface=:5:::: > DIRECT LINK: > http://www.gpublication.com/jcer/?wicket:interface=:5:issuelist:5:fulltext::ILinkListener > :: > > Again posted in: > http://www.anandnayyar.com/pdf/2011/Security_Issues__Challenges_in_Wireless_Sensor_Networks.pdf > > Searchable in Google. > > Regards, > Sakib > _______________________________________________ IEEE Communications Society Tech. Committee on Computer Communications (TCCC) - for discussions on computer networking and communication. [email protected] https://lists.cs.columbia.edu/cucslists/listinfo/tccc
