SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis
暂无分享,去创建一个
Hong Liang | Hai Jin | Feng Cheng | Deqing Zou | Yueming Wu | Shihan Dou | Siru Yang | Wei Yang | Hai Jin | Deqing Zou | Feng Cheng | Wei Yang | Shihan Dou | Sirui Yang | Yueming Wu | Hong Liang
[1] Yanzhao Wu,et al. CCAligner: A Token Based Large-Gap Clone Detector , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).
[2] Ming Li,et al. Supervised Deep Features for Software Functional Clone Detection by Exploiting Lexical and Syntactical Information in Source Code , 2017, IJCAI.
[3] Chanchal Kumar Roy,et al. Towards a Big Data Curated Benchmark of Inter-project Code Clones , 2014, 2014 IEEE International Conference on Software Maintenance and Evolution.
[4] Gary T. Leavens,et al. JSCTracker : A Semantic Clone Detection Tool for Java Code , 2012 .
[5] Nigel Coles,et al. It's Not What You Know-It's Who You Know that Counts. Analysing Serious Crime Groups as Social Networks , 2001 .
[6] A. Barabasi,et al. Lethality and centrality in protein networks , 2001, Nature.
[7] Leonard M. Freeman,et al. A set of measures of centrality based upon betweenness , 1977 .
[8] Hailong Sun,et al. A Novel Neural Source Code Representation Based on Abstract Syntax Tree , 2019, 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE).
[9] Toshihiro Kamiya,et al. Agec: An execution-semantic clone detection tool , 2013, 2013 21st International Conference on Program Comprehension (ICPC).
[10] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[11] Min Wang,et al. CCSharp: An Efficient Three-Phase Code Clone Detector Using Modified PDGs , 2017, 2017 24th Asia-Pacific Software Engineering Conference (APSEC).
[12] Ettore Merlo,et al. Experiment on the automatic detection of function clones in a software system using metrics , 1996, 1996 Proceedings of International Conference on Software Maintenance.
[13] Martin White,et al. Deep learning code fragments for code clone detection , 2016, 2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE).
[14] Lukasz Kaiser,et al. Attention is All you Need , 2017, NIPS.
[15] Peng Liu,et al. Achieving accuracy and scalability simultaneously in detecting application clones on Android markets , 2014, ICSE.
[16] Shinji Kusumoto,et al. Inter-Project Functional Clone Detection Toward Building Libraries - An Empirical Study on 13,000 Projects , 2012, 2012 19th Working Conference on Reverse Engineering.
[17] Chanchal Kumar Roy,et al. NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization , 2008, 2008 16th IEEE International Conference on Program Comprehension.
[18] J. Howard Johnson,et al. Substring matching for clone detection and change tracking , 1994, Proceedings 1994 International Conference on Software Maintenance.
[19] Leo Katz,et al. A new status index derived from sociometric analysis , 1953 .
[20] Wojciech Zaremba,et al. Learning to Execute , 2014, ArXiv.
[21] Daniel M. Germán,et al. Code siblings: Technical and legal implications of copying code between applications , 2009, 2009 6th IEEE International Working Conference on Mining Software Repositories.
[22] Tao Xie,et al. AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[23] Gang Zhao,et al. DeepSim: deep learning code functional similarity , 2018, ESEC/SIGSOFT FSE.
[24] Gabriele Bavota,et al. Deep Learning Similarities from Different Representations of Source Code , 2018, 2018 IEEE/ACM 15th International Conference on Mining Software Repositories (MSR).
[25] Cristina V. Lopes,et al. Oreo: detection of clones in the twilight zone , 2018, ESEC/SIGSOFT FSE.
[26] Giuliano Antoniol,et al. Comparison and Evaluation of Clone Detection Tools , 2007, IEEE Transactions on Software Engineering.
[27] Stéphane Ducasse,et al. A language independent approach for detecting duplicated code , 1999, Proceedings IEEE International Conference on Software Maintenance - 1999 (ICSM'99). 'Software Maintenance for Business Change' (Cat. No.99CB36360).
[28] Rainer Koschke,et al. Incremental Clone Detection , 2009, 2009 13th European Conference on Software Maintenance and Reengineering.
[29] Katherine Faust. Centrality in affiliation networks , 1997 .
[30] Jugal K. Kalita,et al. Semantic Clone Detection Using Machine Learning , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).
[31] Ting Liu,et al. Document Modeling with Gated Recurrent Neural Network for Sentiment Classification , 2015, EMNLP.
[32] Jeffrey Dean,et al. Efficient Estimation of Word Representations in Vector Space , 2013, ICLR.
[33] Jens Krinke,et al. Identifying similar code with program dependence graphs , 2001, Proceedings Eighth Working Conference on Reverse Engineering.
[34] Barbara G. Ryder,et al. CCLearner: A Deep Learning-Based Clone Detection Approach , 2017, 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME).
[35] Chanchal Kumar Roy,et al. SeByte: A semantic clone detection tool for intermediate languages , 2012, 2012 20th IEEE International Conference on Program Comprehension (ICPC).
[36] Shinji Kusumoto,et al. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code , 2002, IEEE Trans. Software Eng..
[37] Johan Bollen,et al. Co-authorship networks in the digital library research community , 2005, Inf. Process. Manag..
[38] Susan Horwitz,et al. Using Slicing to Identify Duplication in Source Code , 2001, SAS.
[39] Christopher D. Manning,et al. Improved Semantic Representations From Tree-Structured Long Short-Term Memory Networks , 2015, ACL.
[40] R. Guimerà,et al. The worldwide air transportation network: Anomalous centrality, community structure, and cities' global roles , 2003, Proceedings of the National Academy of Sciences of the United States of America.
[41] Cristina V. Lopes,et al. SourcererCC: Scaling Code Clone Detection to Big-Code , 2015, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).
[42] Pierre Baldi,et al. Neural Networks for Fingerprint Recognition , 1993, Neural Computation.
[43] Michel Dagenais,et al. Extending software quality assessment techniques to Java systems , 1999, Proceedings Seventh International Workshop on Program Comprehension.
[44] Rainer Koschke. Large-Scale Inter-System Clone Detection Using Suffix Trees , 2012, 2012 16th European Conference on Software Maintenance and Reengineering.
[45] Chanchal K. Roy,et al. A Survey on Software Clone Detection Research , 2007 .
[46] Hai Jin,et al. MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis , 2019, 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[47] Zhendong Su,et al. DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones , 2007, 29th International Conference on Software Engineering (ICSE'07).
[48] Zhendong Su,et al. Automatic mining of functionally equivalent code fragments via random testing , 2009, ISSTA.
[49] Magdalena Balazinska,et al. Measuring clone based reengineering opportunities , 1999, Proceedings Sixth International Software Metrics Symposium (Cat. No.PR00403).
[50] Iman Keivanloo,et al. Internet-scale Real-time Code Clone Search Via Multi-level Indexing , 2011, 2011 18th Working Conference on Reverse Engineering.
[51] Yoshua Bengio,et al. Neural Machine Translation by Jointly Learning to Align and Translate , 2014, ICLR.