[1] 陈秋远, 李善平, 鄢萌, 等.代码克隆检测研究进展[J].软件学报, 2019, 30(4):962-980. CHEN Q Y, LI S P, YAN M, et al.Code clone detection:a literature review[J].Journal of Software, 2019, 30(4):962-980.(in Chinese) [2] ROY C K, CORDY J R.A survey on software clone detection research:TR 2007-541[R].Kingston, Canada:Queen's University, 2007:64-68. [3] LI L Q, FENG H, ZHUANG W J, et al.CCLearner:a deep learning-based clone detection approach[C]//Proceedings of 2017 IEEE International Conference on Software Maintenance and Evolution.Washington D.C., USA:IEEE Press, 2017:249-260. [4] ROY C K, CORDY J R.An empirical study of function clones in open source software[C]//Proceedings of the 15th Working Conference on Reverse Engineering.Washington D.C., USA:IEEE Press, 2008:81-90. [5] KIM M, SAZAWAL V, NOTKIN D, et al.An empirical study of code clone genealogies[J].ACM SIGSOFT Software Engineering Notes, 2005, 30(5):187-196. [6] KAMIYA T, KUSUMOTO S, INOUE K.CCFinder:a multilinguistic token-based code clone detection system for large scale source code[J].IEEE Transactions on Software Engineering, 2002, 28(7):654-670. [7] JUERGENS E, DEISSENBOECK F, HUMMEL B, et al.Do code clones matter?[C]//Proceedings of the 31st International Conference on Software Engineering.Washington D.C., USA:IEEE Press, 2009:485-495. [8] MONDAL M, RAHMAN M S, ROY C K, et al.Is cloned code really stable?[J].Empirical Software Engineering, 2018, 23(2):693-770. [9] BELLON S, KOSCHKE R, ANTONIOL G, et al.Comparison and evaluation of clone detection tools[J].IEEE Transactions on Software Engineering, 2007, 33(9):577-591. [10] MOSTAEEN G, SVAJLENKO J, ROY B, et al.CloneCognition:machine learning based code clone validation tool[C]//Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering.New York, USA:ACM Press, 2019:1105-1109. [11] KRINKE J.Identifying similar code with program dependence graphs[C]//Proceedings of the 8th Working Conference on Reverse Engineering.Washington D.C., USA:IEEE Press, 2001:301-309. [12] BROMLEY J, BENTZ J W, BOTTOU L, et al.Signature verification using a "Siamese" time delay neural network[J].International Journal of Pattern Recognition and Artificial Intelligence, 1993, 7(4):669-688. [13] CHOPRA S, HADSELL R, LECUN Y.Learning a similarity metric discriminatively, with application to face verification[C]//Proceedings of 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.Washington D.C., USA:IEEE Press, 2005:539-546. [14] ROY C K, CORDY J R.NICAD:accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization[C]//Proceedings of the 16th IEEE International Conference on Program Comprehension.Washington D.C., USA:IEEE Press, 2008:172-181. [15] LEE S, JEONG I.SDD:high performance code clone detection system for large scale source code[C]//Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications.New York, USA:ACM Press, 2005:140-141. [16] WANG P C, SVAJLENKO J, WU Y Z, et al.CCAligner:a token based large-gap clone detector[C]//Proceedings of the 40th International Conference on Software Engineering.Washington D.C., USA:IEEE Press, 2018:1066-1077. [17] SEMURA Y, YOSHIDA N, CHOI E, et al.CCFinderSW:clone detection tool with flexible multilingual tokenization[C]//Proceedings of the 24th Asia-Pacific Software Engineering Conference.Washington D.C., USA:IEEE Press, 2017:654-659. [18] WEI H H, LI M.Supervised deep features for software functional clone detection by exploiting lexical and syntactical information in source code[C]//Proceedings of the 26th International Joint Conference on Artificial Intelligence.Washington D.C., USA:IEEE Press, 2017:3034-3040. [19] WHITE M, TUFANO M, VENDOME C, et al.Deep learning code fragments for code clone detection[C]//Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering.Washington D.C., USA:IEEE Press, 2016:87-98. [20] SAJNANI H, SAINI V, SVAJLENKO J, et al.SourcererCC:scaling code clone detection to big-code[C]//Proceedings of the 38th International Conference on Software Engineering.Washington D.C., USA:IEEE Press, 2016:1157-1168. [21] WANG M, WANG P C, XU Y.CCSharp:an efficient three-phase code clone detector using modified PDGs[C]//Proceedings of the 24th Asia-Pacific Software Engineering Conference.Washington D.C., USA:IEEE Press, 2017:100-109. [22] HOCHREITER S, SCHMIDHUBER J.Long short-term memory[J].Neural Computation, 1997, 9(8):1735-1780. [23] MNIH V, HEESS N, GRAVES A, et al.Recurrent models of visual attention[C]//Proceedings of the 27th International Conference on Neural Information Processing Systems.New York, USA:ACM Press, 2014:2204-2212. [24] YANG Z C, YANG D Y, DYER C, et al.Hierarchical attention networks for document classification[EB/OL].[2020-06-11].https://arxiv.org/abs/1707.00896. [25] WANG Y Q, HUANG M L, ZHU X Y, et al.Attention-based LSTM for aspect-level sentiment classification[C]//Proceedings of 2016 Conference on Empirical Methods in Natural Language Processing.Philadelphia, USA:Association for Computational Linguistics, 2016:606-615. [26] MIKOLOV T, CHEN K, CORRADO G, et al.Efficient estimation of word representations in vector space[EB/OL].[2020-06-11].https://arxiv.org/pdf/1301.3781.pdf. [27] 路永和, 王鸿滨.文本分类中受词性影响的特征权重计算方法[J].现代图书情报技术, 2015(4):18-25. LU Y H, WANG H B.Feature weighting method affected by part of speech in text classification[J].New Technology of Library and Information Service, 2015(4):18-25.(in Chinese) [28] WANG Y F, LIU D S, HOU M.Clone code detection based on image similarity[J].Journal of Computer Applications, 2019, 39(7):2074-2080.(in Chinese)王亚芳, 刘东升, 侯敏.基于图像相似度检测代码克隆[J].计算机应用, 2019, 39(7):2074-2080. |