Evaluating the Performance of Clone Detection Tools in Detecting Cloned Co-change Candidates [PDF]
Co-change candidates are the group of code fragments that require a change if any of these fragments experience a modification in a commit operation during software evolution. The cloned co-change candidates are a subset of the co-change candidates, and the members in this subset are clones of one another.
arxiv +1 more source
Evaluation of Contrastive Learning with Various Code Representations for Code Clone Detection [PDF]
Code clones are pairs of code snippets that implement similar functionality. Clone detection is a fundamental branch of automatic source code comprehension, having many applications in refactoring recommendation, plagiarism detection, and code ...
Maksim Zubkov+3 more
semanticscholar +1 more source
Behavioral Analysis for Detecting Code Clones [PDF]
The activities of copy and paste fragments of code from a source code into the other source code is often done by software developers because it's easier than generate code manually. This behavior leads to the increase of effort to maintain the code. One of the detection methods of semantic cloning is based on the behavior of the code.
Bayu Priyambadha, Siti Rochimah
openaire +2 more sources
Operation System Vulnerabilities Analysis Based on Code Clone Detection
Software vulnerability detection based on code clone detection technology is an important direction in the static analysis of software vulnerability. At present, the existing software vulnerability detection tools have deficie-ncies in the vulnerability ...
WANG Zhe, REN Yi, ZHOU Kai, GUAN Jianbo, TAN Yusong
doaj +1 more source
C4: Contrastive Cross-Language Code Clone Detection
During software development, developers introduce code clones by reusing existing code to improve programming productivity. Considering the detrimental effects on software maintenance and evolution, many techniques are proposed to detect code clones ...
Chenning Tao, Qi Zhan, Xing Hu, Xin Xia
semanticscholar +1 more source
Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone [PDF]
It is quite common for reusing code in soft development, which may lead to the wide spread of the vulnerability, soautomatic detection of vulnerable code clone is becoming more and more important.
Yuan He+3 more
doaj +1 more source
CLCD-I: Cross-Language Clone Detection by Using Deep Learning with InferCode
Source code clones are common in software development as part of reuse practice. However, they are also often a source of errors compromising software maintainability.
Mohammad A. Yahya, Dae-Kyoo Kim
doaj +1 more source
Investigating the Efficacy of Large Language Models for Code Clone Detection [PDF]
Large Language Models (LLMs) have demonstrated remarkable success in various natural language processing and software engineering tasks, such as code generation.
Mohamad Khajezade+4 more
semanticscholar +1 more source
Overview of Deep Learning-Based Code Representation and Its Applications [PDF]
The analysis and inference of program play an important role in software development, maintenance and migration. How to efficiently obtain high quality information from program code has become a hot research topic.
ZHANG Xiangping, LIU Jianxun
doaj +1 more source
A Picture Is Worth a Thousand Words: Code Clone Detection Based on Image Similarity [PDF]
This paper introduces a new code clone detection technique based on image similarity. The technique captures visual perception of code seen by humans in an IDE by applying syntax highlighting and images conversion on raw source code text. We compared
Krinke, J+2 more
core +1 more source