-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathreferences.bib
444 lines (423 loc) · 17.4 KB
/
references.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
@article{10.1145/3133908,
address = {New York, NY, USA},
articleno = {84},
author = {Lopes, Cristina V. and Maj, Petr and Martins, Pedro and Saini, Vaibhav and Yang, Di and Zitny, Jakub and Sajnani, Hitesh and Vitek, Jan},
doi = {10.1145/3133908},
issue_date = {October 2017},
journal = {Proc. ACM Program. Lang.},
keywords = {Source Code Analysis, Clone Detection},
month = {oct},
number = {OOPSLA},
numpages = {28},
publisher = {Association for Computing Machinery},
title = {D\'{e}J\`{a}Vu: A Map of Code Duplicates on GitHub},
url = {https://doi.org/10.1145/3133908},
volume = {1},
year = {2017}
}
@article{10.1145/3381307.3381310,
address = {New York, NY, USA},
author = {Walker, Andrew and Cerny, Tomas and Song, Eungee},
doi = {10.1145/3381307.3381310},
issn = {1559-6915},
issue_date = {December 2019},
journal = {SIGAPP Appl. Comput. Rev.},
keywords = {clone detection, mapping study, code clone, survey},
month = {jan},
number = {4},
numpages = {12},
pages = {28--39},
publisher = {Association for Computing Machinery},
title = {Open-Source Tools and Benchmarks for Code-Clone Detection: Past, Present, and Future Trends},
url = {https://doi.org/10.1145/3381307.3381310},
volume = {19},
year = {2020}
}
@inproceedings{6613854,
author = {Kamiya, Toshihiro},
booktitle = {2013 21\textsuperscript{st} International Conference on Program Comprehension (ICPC)},
doi = {10.1109/ICPC.2013.6613854},
number = {},
pages = {227-229},
title = {Agec: An execution-semantic clone detection tool},
volume = {},
year = {2013}
}
@inproceedings{6671332,
author = {Krutz, Daniel E. and Shihab, Emad},
booktitle = {2013 20\textsuperscript{th} Working Conference on Reverse Engineering (WCRE)},
doi = {10.1109/WCRE.2013.6671332},
number = {},
pages = {489-490},
title = {CCCD: Concolic code clone detection},
volume = {},
year = {2013}
}
@inproceedings{8668015,
author = {Saini, Vaibhav and Farmahinifarahani, Farima and Yang, Di and Sajnani, Hitesh and Lopes, Cristina V.},
booktitle = {2019 IEEE 26\textsuperscript{th} International Conference on Software Analysis, Evolution and Reengineering (SANER)},
doi = {10.1109/SANER.2019.8668015},
number = {},
pages = {84-94},
title = {On Precision of Code Clone Detection Tools},
volume = {},
year = {2019}
}
@article{ain2019systematic,
author = {Ain, Qurat Ul and Butt, Wasi Haider and Anwar, Muhammad Waseem and Azam, Farooque and Maqbool, Bilal},
journal = {IEEE access},
pages = {86121--86144},
publisher = {IEEE},
title = {A systematic review on code clone detection},
volume = {7},
year = {2019}
}
@inproceedings{al2016code,
author = {Al-Omari, Farouq and Roy, Chanchal K},
booktitle = {Proceedings of the 31\textsuperscript{st} Annual ACM Symposium on applied computing},
pages = {1512--1519},
title = {Is code cloning in games really different?},
year = {2016}
}
@phdthesis{al2021towards,
author = {Al-Omari, Farouq Ahmad},
school = {University of Saskatchewan},
title = {Towards Semantic Clone Detection, Benchmarking, and Evaluation},
year = {2021}
}
@article{baldi1993neural,
author = {Baldi, Pierre and Chauvin, Yves},
journal = {neural computation},
number = {3},
pages = {402--418},
publisher = {MIT Press},
title = {Neural networks for fingerprint recognition},
volume = {5},
year = {1993}
}
@inproceedings{budimac2012ssqsa,
author = {Budimac, Zoran and Raki{\'c}, Gordana and Savi{\'c}, Milo{\v{s}}},
booktitle = {Proceedings of the Fifth Balkan Conference in Informatics},
pages = {287--290},
title = {SSQSA architecture},
year = {2012}
}
@inproceedings{caldeira2020improving,
author = {Caldeira, Pedro M. and Sakamoto, Kazunori and Washizaki, Hironori and Fukazawa, Yoshiaki and Shimada, Takahisa},
booktitle = {2020 IEEE 14\textsuperscript{th} International Workshop on Software Clones (IWSC)},
organization = {IEEE},
pages = {8--14},
title = {Improving syntactical clone detection methods through the use of an intermediate representation},
year = {2020}
}
@mastersthesis{ComparingProgrammingLanguages2017,
author = {Back, Alexandra and Westmann, Emma},
school = {Chalmers University of Technology / Department of Computer Science and Engineering (Chalmers)},
title = {Comparing Programming Languages in Google Code Jam},
type = {Master Thesis },
year = {2017}
}
@inproceedings{cordy2004practical,
author = {Cordy, James R. and Dean, Thomas R. and Synytskyy, Nikita},
booktitle = {Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research},
organization = {Citeseer},
pages = {1--12},
title = {Practical language-independent detection of near-miss clones},
year = {2004}
}
@article{cordy2006txl,
author = {Cordy, James R.},
journal = {Science of Computer Programming},
number = {3},
pages = {190--210},
publisher = {Elsevier},
title = {The TXL source transformation language},
volume = {61},
year = {2006}
}
@inproceedings{cordy2011nicad,
author = {Cordy, James R. and Roy, Chanchal K.},
booktitle = {2011 IEEE 19\textsuperscript{th} International Conference on Program Comprehension},
organization = {IEEE},
pages = {219--220},
title = {The NiCad clone detector},
year = {2011}
}
@inproceedings{Deckard,
author = {Jiang, Lingxiao and Misherghi, Ghassan and Su, Zhendong and Glondu, Stephane},
booktitle = {29\textsuperscript{th} International Conference on Software Engineering (ICSE'07)},
doi = {10.1109/ICSE.2007.30},
number = {},
pages = {96-105},
title = {DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones},
volume = {},
year = {2007}
}
@inproceedings{gautam2016various,
author = {Gautam, Pratiksha and Saini, Hemraj},
booktitle = {International Conference on Smart Trends for Information Technology and Computer Communications},
organization = {Springer},
pages = {655--667},
title = {Various code clone detection techniques and tools: a comprehensive survey},
year = {2016}
}
@article{gorg2017deriving,
author = {G{\"o}rg, Torsten},
journal = {Softwaretechnik-Trends: Vol. 37, No. 2},
publisher = {Gesellschaft f{\"u}r Informatik eV, Fachgruppe PARS},
title = {Deriving categories of semantic clones from a coding contest},
year = {2017}
}
@misc{ijadataset,
author = {Ambient software evolution group},
title = {IJaDataset 2.0},
url = {https://sites.google.com/site/asegsecold/projects/seclone},
urldate = {2022-01-08}
}
@inproceedings{juergens2009code,
author = {Juergens, Elmar and Deissenboeck, Florian and Hummel, Benjamin and Wagner, Stefan},
booktitle = {2009 IEEE 31\textsuperscript{st} International Conference on Software Engineering},
organization = {IEEE},
pages = {485--495},
title = {Do code clones matter?},
year = {2009}
}
@article{kamiya2002ccfinder,
author = {Kamiya, Toshihiro and Kusumoto, Shinji and Inoue, Katsuro},
journal = {IEEE transactions on software engineering},
number = {7},
pages = {654--670},
publisher = {IEEE},
title = {CCFinder: A multilinguistic token-based code clone detection system for large scale source code},
volume = {28},
year = {2002}
}
@article{kapser2008cloning,
author = {Kapser, Cory J. and Godfrey, Michael W.},
journal = {Empirical Software Engineering},
number = {6},
pages = {645--692},
publisher = {Springer},
title = {\enquote{Cloning considered harmful}: patterns of cloning in software},
volume = {13},
year = {2008}
}
@inproceedings{kim2005empirical,
author = {Kim, Miryung and Sazawal, Vibha and Notkin, David and Murphy, Gail},
booktitle = {Proceedings of the 10\textsuperscript{th} European software engineering conference held jointly with 13\textsuperscript{th} ACM SIGSOFT international symposium on Foundations of software engineering},
pages = {187--196},
title = {An empirical study of code clone genealogies},
year = {2005}
}
@inproceedings{kondrak2005n,
author = {Kondrak, Grzegorz},
booktitle = {International symposium on string processing and information retrieval},
organization = {Springer},
pages = {115--126},
title = {N-gram similarity and distance},
year = {2005}
}
@book{krutz2013code,
author = {Krutz, Daniel Edward},
publisher = {Nova Southeastern University},
title = {Code Clone Discovery Based on Concolic Analysis},
year = {2013}
}
@article{lei2022deep,
author = {Lei, Maggie and Li, Hao and Li, Ji and Aundhkar, Namrata and Kim, Dae-Kyoo},
journal = {Journal of Systems and Software},
pages = {111141},
publisher = {Elsevier},
title = {Deep learning application on code clone detection: A review of current knowledge},
volume = {184},
year = {2022}
}
@inproceedings{levenshtein1966binary,
author = {Levenshtein, Vladimir I. and others},
booktitle = {Soviet physics doklady},
number = {8},
organization = {Soviet Union},
pages = {707--710},
title = {Binary codes capable of correcting deletions, insertions, and reversals},
volume = {10},
year = {1966}
}
@article{pate2013clone,
author = {Pate, Jeremy R and Tairas, Robert and Kraft, Nicholas A},
journal = {Journal of software: Evolution and Process},
number = {3},
pages = {261--283},
publisher = {Wiley Online Library},
title = {Clone evolution: a systematic review},
volume = {25},
year = {2013}
}
@article{rattan2013software,
author = {Rattan, Dhavleesh and Bhatia, Rajesh and Singh, Maninder},
journal = {Information and Software Technology},
number = {7},
pages = {1165--1199},
publisher = {Elsevier},
title = {Software clone detection: A systematic review},
volume = {55},
year = {2013}
}
@inproceedings{roy2008empirical,
author = {Roy, Chanchal K. and Cordy, James R.},
booktitle = {2008 15\textsuperscript{th} Working Conference on Reverse Engineering},
organization = {IEEE},
pages = {81--90},
title = {An empirical study of function clones in open source software},
year = {2008}
}
@article{roy2009comparison,
author = {Roy, Chanchal K. and Cordy, James R. and Koschke, Rainer},
journal = {Science of computer programming},
number = {7},
pages = {470--495},
publisher = {Elsevier},
title = {Comparison and evaluation of code clone detection techniques and tools: A qualitative approach},
volume = {74},
year = {2009}
}
@inproceedings{saini2018oreo,
author = {Saini, Vaibhav and Farmahinifarahani, Farima and Lu, Yadong and Baldi, Pierre and Lopes, Cristina V},
booktitle = {Proceedings of the 2018 26\textsuperscript{th} ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering},
pages = {354--365},
title = {Oreo: Detection of clones in the twilight zone},
year = {2018}
}
@article{schulze2010code,
author = {Schulze, Sandro and Apel, Sven and K{\"a}stner, Christian},
journal = {ACM SIGPLAN Notices},
number = {2},
pages = {103--112},
publisher = {ACM New York, NY, USA},
title = {Code clones in feature-oriented software product lines},
volume = {46},
year = {2010}
}
@article{SHENEAMER2018405,
author = {Abdullah Sheneamer and Swarup Roy and Jugal Kalita},
doi = {https://doi.org/10.1016/j.eswa.2017.12.040},
issn = {0957-4174},
journal = {Expert Systems with Applications},
keywords = {Code obfuscation, Semantic code clones, Machine learning, Bytecode dependency graph, Program dependency graph},
pages = {405-420},
title = {A detection framework for semantic code clones and obfuscated code},
url = {https://www.sciencedirect.com/science/article/pii/S0957417417308631},
volume = {97},
year = {2018}
}
@article{shobha2021code,
author = {Shobha, G. and Rana, Ajay and Kansal, Vineet and Tanwar, Sarvesh},
journal = {Emerging Technologies in Data Mining and Information Security},
pages = {645--655},
publisher = {Springer},
title = {Code clone detection—a systematic review},
year = {2021}
}
@inproceedings{SourcererCC,
address = {New York, NY, USA},
author = {Sajnani, Hitesh and Saini, Vaibhav and Svajlenko, Jeffrey and Roy, Chanchal K. and Lopes, Cristina V.},
booktitle = {Proceedings of the 38\textsuperscript{th} International Conference on Software Engineering},
doi = {10.1145/2884781.2884877},
isbn = {9781450339001},
location = {Austin, Texas},
numpages = {12},
pages = {1157--1168},
publisher = {Association for Computing Machinery},
series = {ICSE '16},
title = {SourcererCC: Scaling Code Clone Detection to Big-Code},
url = {https://doi.org/10.1145/2884781.2884877},
year = {2016}
}
@inproceedings{su2016code,
author = {Su, Fang-Hsiang and Bell, Jonathan and Harvey, Kenneth and Sethumadhavan, Simha and Kaiser, Gail and Jebara, Tony},
booktitle = {Proceedings of the 2016 24\textsuperscript{th} acm sigsoft international symposium on foundations of software engineering},
pages = {702--714},
title = {Code relatives: detecting similarly behaving software},
year = {2016}
}
@inproceedings{svajlenko2014towards,
author = {Svajlenko, Jeffrey and Islam, Judith F. and Keivanloo, Iman and Roy, Chanchal K. and Mia, Mohammad Mamun},
booktitle = {2014 IEEE International Conference on Software Maintenance and Evolution},
organization = {IEEE},
pages = {476--480},
title = {Towards a big data curated benchmark of inter-project code clones},
year = {2014}
}
@inproceedings{svajlenko2016bigcloneeval,
author = {Svajlenko, Jeffrey and Roy, Chanchal K.},
booktitle = {2016 IEEE International Conference on Software Maintenance and Evolution (ICSME)},
organization = {IEEE},
pages = {596--600},
title = {Bigcloneeval: A clone detection tool evaluation framework with bigclonebench},
year = {2016}
}
@incollection{svajlenko2021bigclonebench,
author = {Svajlenko, Jeffrey and Roy, Chanchal K.},
booktitle = {Code Clone Analysis},
pages = {93--105},
publisher = {Springer},
title = {Bigclonebench},
year = {2021}
}
@inproceedings{vislavski2018licca,
author = {Vislavski, Tijana and Raki{\'c}, Gordana and Cardozo, Nicol{\'a}s and Budimac, Zoran},
booktitle = {2018 IEEE 25\textsuperscript{th} International Conference on Software Analysis, Evolution and Reengineering (SANER)},
organization = {IEEE},
pages = {512--516},
title = {LICCA: A tool for cross-language clone detection},
year = {2018}
}
@article{wagner2013software,
author = {Wagner, Stefan},
publisher = {Springer},
title = {Software product quality control},
year = {2013}
}
@article{wagner2014detection,
author = {Wagner, Stefan and Abdulkhaleq, Asim and Bogicevic, Ivan and Ostberg, Jan-Peter and Ramadani, Jasmin},
journal = {Zenodo},
title = {Detection of functionally similar code clones: data, analysis software, benchmark},
year = {2014}
}
@article{wagner2016functionally,
author = {Wagner, Stefan and Abdulkhaleq, Asim and Bogicevic, Ivan and Ostberg, Jan-Peter and Ramadani, Jasmin},
journal = {PeerJ Computer Science},
publisher = {PeerJ Inc.},
title = {How are functionally similar code clones syntactically different? An empirical study and a benchmark},
volume = {2},
year = {2016}
}
@inproceedings{wang2013searching,
author = {Wang, Tiantian and Harman, Mark and Jia, Yue and Krinke, Jens},
booktitle = {Proceedings of the 2013 9\textsuperscript{th} Joint Meeting on Foundations of Software Engineering},
pages = {455--465},
title = {Searching for better configurations: a rigorous approach to clone evaluation},
year = {2013}
}
@inproceedings{wang2020detecting,
author = {Wang, Wenhan and Li, Ge and Ma, Bo and Xia, Xin and Jin, Zhi},
booktitle = {2020 IEEE 27\textsuperscript{th} International Conference on Software Analysis, Evolution and Reengineering (SANER)},
organization = {IEEE},
pages = {261--271},
title = {Detecting code clones with graph neural network and flow-augmented abstract syntax tree},
year = {2020}
}
@inproceedings{wu2020scdetector,
author = {Wu, Yueming and Zou, Deqing and Dou, Shihan and Yang, Siru and Yang, Wei and Cheng, Feng and Liang, Hong and Jin, Hai},
booktitle = {Proceedings of the 35\textsuperscript{th} IEEE/ACM International Conference on Automated Software Engineering},
pages = {821--833},
title = {SCDetector: software functional clone detection based on semantic tokens analysis},
year = {2020}
}
@inproceedings{li2017performance,
title={Performance overhead comparison between hypervisor and container based virtualization},
author={Li, Zheng and Kihl, Maria and Lu, Qinghua and Andersson, Jens A},
booktitle={2017 IEEE 31st International Conference on advanced information networking and applications (AINA)},
pages={955--962},
year={2017},
organization={IEEE}
}