[1] VERENA K, WAGNER S, KOSCHKE R. Are there functionally similar code clones in practice?[C]//Proceedings of the 12th International Workshop on Software Clones. Washington, DC:IEEE Computer Society, 2018:2-8.
[2] ROY C K. Large scale clone detection, analysis, and benchmarking:An evolutionary perspective (Keynote)[C]//Proceedings of the 12th International Workshop on Software Clones. Washington, DC:IEEE Computer Society, 2018:1.
[3] ABDULLAH S, JUGAL K. A survey of software clone detection techniques[J]. International Journal of Computer Applications, 2016, 137(10):1-21.
[4] ROY C K, CORDY J R, KOSCHKE R. Comparison and evaluation of code clone detection techniques and tools:a qualitative approach[J]. Science of Computer Programming, 2009, 74(7):470-495.
[5] BELLON S, KOSCHKE R, ANTONIOL G, et al. Comparison and evaluation of clone detection tools[J]. IEEE Transactions on Software Engineering, 2007, 33(9):577-591.
[6] ROY C K, CORDY J R. NICAD:accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization[C]//Proceedings of the 16th IEEE International Conference on Program Comprehension. Piscataway, NJ:IEEE, 2008:172-181.
[7] LEE S. SDD:high performance code clone detection system for large scale source code[C]//Proceedings of the 20th ACM SIGPLAN Conference on Object-Oriented Programming. New York:ACM, 2005:140-141.
[8] KAMIYA T, KUSUMOTO S, INOUE K. CCFinder:a multilinguistic token-based code clone detection system for large scale source code[J]. IEEE Transactions on Software Engineering, 2002, 28(7):654-670.
[9] LI Z, LU S, MYAGMAR S, et al. CP-Miner:finding copy-paste and related bugs in large-scale software code[J]. IEEE Transactions on Software Engineering, 2006, 32(3):176-192.
[10] JIANG L, MISHERGHI G, SU Z, et al. DECKARD:scalable and accurate tree-based detection of code clones[C]//Proceedings of the 29th International Conference on Software Engineering. Washington, DC:IEEE Computer Society, 2007:96-105.
[11] BAXTER I D, YAHIN A, MOURA L, et al. Clone detection using abstract syntax trees[C]//Proceedings of the 1998 IEEE International Conference on Software Maintenance. Piscataway, NJ:IEEE, 1998:368.
[12] KRINKE J. Identifying similar code with program dependence graphs[C]//Proceedings of the 8th Working Conference on Reverse Engineering. Piscataway, NJ:IEEE, 2001:301-309.
[13] HUMMEL B, JUERGENS E, HEINEMANN L, et al. Index-based code clone detection:incremental, distributed, scalable[C]//Proceedings of the 2010 IEEE International Conference on Software Maintenance. Washington, DC:IEEE Computer Society, 2010:1-9.
[14] DUCASSE S, RIEGER M, DEMEYER S. A language independent approach for detecting duplicated code[C]//Proceedings of the 1999 International Conference on Software Maintenance. Piscataway, NJ:IEEE, 1999:109-118.
[15] BAKER B S. On finding duplication and near-duplication in large software systems[C]//Proceedings of the 2nd Working Conference on Reverse Engineering. Piscataway, NJ:IEEE, 1995:86-95.
[16] YUAN Y, GUO Y. Boreas:an accurate and scalable token-based approach to code clone detection[C]//Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering. Piscataway, NJ:IEEE, 2012:286-289.
[17] LI L, FENG H, ZHUANG W, et al. CCLearner:a deep learning-based clone detection approach[C]//Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution. Washington, DC:IEEE Computer Society, 2017:249-260.
[18] WEI H H, LI M. Supervised deep features for software functional clone detection by exploiting lexical and syntactical information in source code[C]//Proceedings of the 26th International Joint Conferences on Artificial Intelligence Organization. Piscataway, NJ:IEEE, 2017:303-309.
[19] WAHLER V, SEIPEL D, WOLFF J, et al. Clone detection in source code by frequent itemset techniques[C]//Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation. Piscataway, NJ:IEEE, 2004:128-135.
[20] KOMONDOOR R, HORWITZ S. Using slicing to identify duplication in source code[C]//Proceedings of the 8th International Symposium on Static Analysis. Berlin:Springer, 2001:40-56.
[21] 史庆庆,张丽萍,尹丽丽,等.基于后缀数组的克隆检测[J].计算机工程,2013,39(9):123-127.(SHI Q Q, ZHANG L P, YIN L L, et al. Clone detection based on suffix array[J]. Computer Engineering, 2013, 39(9):123-127.)
[22] 张久杰,王春晖,张丽萍,等.基于Token编辑距离检测克隆代码[J].计算机应用,2015,35(12):3536-3543.(ZHANG J J, WANG C H, ZHANG L P, et al. Clone code detection based on Levenshtein distance of token[J]. Journal of Computer Applications, 2015, 35(12):3536-3543.)
[23] RAGKHITWETSAGUL C, KRINKE J, MARNETTE B. A picture is worth a thousand words:Code clone detection based on image similarity[C]//Proceedings of the 12th International Workshop on Software Clones. Washington, DC:IEEE Computer Society, 2018:44-50.
[24] MCCORMICK W P, LYONS N I, HUTCHESON K. Distributional properties of Jaccard's index of similarity[J]. Communications in Statistics, 1992, 21(1):51-68.
[25] 俞婷婷,徐彭娜,江育娥,等.基于改进的Jaccard系数文档相似度计算方法[J].计算机系统应用,2017,26(12):137-142.(YU T T, XU P N, JIANG Y E, et al. Text similarity method based on the improved Jaccard coefficient[J]. Computer Systems and Applications, 2017, 26(12):137-142.)
[26] 田星,郑瑾,张祖平.基于词向量的Jaccard相似度算法[J].计算机科学,2018,45(7):186-189.(TIAN X, ZHENG J, ZHANG Z P. Jaccard text similarity algorithm based on word embedding[J]. Computer Science, 2018, 45(7):186-189.)
[27] 宋博,姜万里,孙涛,等.快速特征提取与感知哈希结合的图像配准算法[J].计算机工程与应用,2018,54(7):206-212.(SONG B, JIANG W L, SUN T, et al. Image registration algorithm based on fast feature extraction and perceptual hash[J]. Computer Engineering and Applications, 2018, 54(7):206-212.)
[28] 李丹平,杨超,姜奇,等.一种支持所有权认证的客户端图像模糊去重方法[J].计算机学报,2018,41(6):1047-1063.(LI D P, YANG C, JINAG Q, et al. A client-based image fuzzy deduplication method supporting proof of ownership[J]. Chinese Journal of Computers, 2018, 41(6):1047-1063.)
[29] SVAJLENKO J, ROY C K. BigCloneEval:a clone detection tool evaluation framework with BigCloneBench[C]//Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution. Piscataway, NJ:IEEE, 2016:131-140.
[30] ROY C K, CORDY J R. A mutation/injection-based automatic framework for evaluating code clone detection tools[C]//Proceedings of the 2009 IEEE International Conference on Software Testing Verification and Validation Workshop. New York:ACM, 2009:157-166.
[31] 苏小红,张凡龙.面向管理的克隆代码研究综述[J].计算机学报,2018,41(3):628-651.(SU X H, ZHANG F L. A survey for management-oriented code clone research[J]. Chinese Journal of Computers, 2018, 41(3):628-651.)
[32] SVAJLENKO J, ROY C K. Evaluating modern clone detection tools[C]//Proceedings of the 2014 IEEE International Conference on Software Maintenance and Evolution. Piscataway, NJ:IEEE, 2014:321-330. |