[1] 牟永敏, 杨志嘉. 基于函数调用路径的软件实现与设计一致性验证[J]. 中国科学:信息科学,2014,44(10):1290-1304.(MU Y M,YANG Z J. Verify consistency of software implementation and design based on function call path[J]. SCIENTIA SINICA Informationis,2014,44(10):1290-1304.) [2] RIEDL-EHRENLEITNER M,DEMUTH A,EGYED A. Towards model-and-code consistency checking[C]//Proceedings of the IEEE 38th Annual Computer Software and Applications Conference. Piscataway:IEEE,2014:85-90. [3] 曾一, 李函逾, 刘慧君, 等. UML模型和Java代码之间的一致性检测方法[J]. 计算机科学,2015,42(4):151-155.(ZENG Y, LI H Y,LIU H J,et al. Consistency detection method between UML model and Java source code[J]. Computer Science,2015,42(4):151-155.) [4] 余双双, 曾一, 刘慧君, 等. 基于UML模型的多态性与Java接口代码信息一致性检测的方法[J]. 计算机应用与软件,2017,34(2):8-13,47. (YU S S,ZENG Y,LIU H J,et al. The consistency detection method of polymorphism and Java interface code information based on UML model[J]. Computer Applications and Software,2017,34(2):8-13,47.) [5] ZHENG Y,MU Y,ZHANG Z. Research on the static function call path generating automatically[C]//Proceedings of the 2nd IEEE International Conference on Information Management and Engineering. Piscataway:IEEE,2010:405-409. [6] 张海藩, 牟永敏. 软件工程导论[M]. 6版. 北京:清华大学出版社,2013:94-100. (ZHANG H F,MU Y M. Introduction to Software Engineering[M]. 6th ed. Beijing:Tsinghua University Press,2013:94-100.) [7] 徐参语. 基于静态检测的克隆代码检测工具的设计与实现[D]. 成都:电子科技大学,2019:1-82. (XU C Y. Design and implementation of clone code detecting tool based on static detecting[D]. Chengdu:University of Electronic Science and Technology of China,2019:1-82.) [8] 李锁, 吴毅坚, 赵文耘. 基于代码克隆检测的代码来源分析方法[J]. 计算机应用与软件,2020,37(2):8-14.(LI S,WU Y J, ZHAO W Y. Code provenance analysis based on code clone detection[J]. Computer Applications and Software,2020,37(2):8-14.) [9] WEI H,LI M. Supervised deep features for software functional clone detection by exploiting lexical and syntactical information in source code[C]//Proceedings of the 26th International Joint Conferences on Artificial Intelligence. Palo Alto, CA:AAAI Press,2017:3034-3040. [10] KAMALPRIYA C M,SINGH P. Enhancing program dependency graph based clone detection using approximate subgraph matching[C]//Proceedings of the IEEE 11th International Workshop on Software Clones. Piscataway:IEEE,2017:1-7. [11] SUDHAMANI M,RANGARAJAN L. Code similarity detection through control statement and program features[J]. Expert Systems with Applications,2019,132:63-75. [12] 陈秋远, 李善平, 鄢萌, 等. 代码克隆检测研究进展[J]. 软件学报,2019,30(4):962-980.(CHEN Q Y,LI S P,YAN M,et al. Code clone detection:a literature review[J]. Journal of Software, 2019,30(4):962-980.) [13] 吕云翔, 杨颖, 朱涛, 等. 软件测试实用教程[M]. 北京:清华大学出版社,2014:1-427.(LYU Y X,YANG Y,ZHU T,et al. Practical Tutorial on Software Testing[M]. Beijing:Tsinghua University Press,2014:1-427.) [14] AHO A V,LAN M S,SETHI R,et al. 编译原理[M]. 2版. 赵建华, 郑滔, 戴新宇, 译. 北京:机械工业出版社,2009:1-524. (AHO A V,LAN M S,SETHI R,et al. Compilers:Principles, Techniques and Tools[M]. 2nd ed. ZHAO J H,ZHENG T,DAI X Y,translated. Beijing:China Machine Press,2009:1-524.) [15] 张晔, 陆余良. PLC程序控制流分析方法[J]. 计算机应用, 2017,37(12):3581-3585.(ZHANG Y,LU Y L. Control flow analysis method of PLC program[J]. Journal of Computer Applications,2017,37(12):3581-3585.) [16] FOGGIA P,PERCANNELLA G,VENTO M. Graph matching and learning in pattern recognition in the last 10 years[J]. International Journal of Pattern Recognition and Artificial Intelligence,2014,28(1):No. 1450001. [17] 徐周波, 张鵾, 宁黎华, 等. 图编辑距离概述[J]. 计算机科学, 2018,45(4):11-18.(XU Z B,ZHANG K,NING L H,et al. Summary of graph edit distance[J]. Computer Science,2018,45(4):11-18.) [18] 江志雄. 基于函数调用图比对的恶意代码相似性分析技术研究与实现[D]. 长沙:国防科学技术大学,2015:1-76.(JIANG Z X. Research and implementation of malware similarity analysis technology based on function-call graph comparison[D]. Changsha:National University of Defense Technology, 2015:1-76.) [19] 刘星, 唐勇. 恶意代码的函数调用图相似性分析[J]. 计算机工程与科学,2014,36(3):481-486. (LIU X,TANG Y. Similarity analysis of malware's function-call graphs[J]. Computer Engineering and Science,2014,363):481-486. [20] MURAKAMI H,HOTTA K,HIGO Y,et al. Folding repeated instructions for improving token-based code clone detection[C]//Proceedings of the IEEE 12th International Working Conference on Source Code Analysis and Manipulation. Piscataway:IEEE, 2012:64-73. [21] WANG P,SVAJLENKO J,WU Y,et al. CCAligner:a token based large-gap clone detector[C]//Proceedings of the 2018 IEEE/ACM International Conference on Software Engineering. Piscataway:IEEE,2018:1066-1077. [22] DING Y,ZHU S. Malware detection based on deep learning algorithm[J]. Neural Computing and Applications,2019,31(2):461-472. [23] BEHARA K N S,BHASKARA A,CHUNGB E. A novel approach for the structural comparison of origin-destination matrices:Levenshtein distance[J]. Transportation Research Part C:Emerging Technologies,2020,111:513-530. |