[1] Al-Ekram R, Kapser C, Holt R, et al. Cloning by
accident: an empirical study of source code
cloning across software systems[C]//2005
International Symposium on Empirical Software
Engineering, 2005. IEEE, 2005: 10 pp.<br/>
[2] Roy C K, Cordy J R. A survey on software clone
detection research[J]. Queen’s School of
computing TR, 2007, 541(115): 64-68.<br/>
[3] Roy C K, Cordy J R, Koschke R. Comparison
and evaluation of code clone detection techniques
and tools: A qualitative approach[J]. Science of
computer programming, 2009, 74(7): 470-495.<br/>
[4] Mondal M, Rahman M S, Saha R K, et al. An
empirical study of the impacts of clones in
software maintenance[C]//2011 IEEE 19th
International Conference on Program
Comprehension. IEEE, 2011: 242-245.<br/>
[5] 苏小红,张凡龙.面向管理的克隆代码研究综述
[J].计算机学报,2018,41(03):628-651.
ZHANG X H, ZHANG F L. A Survey for
Management-Oriented Code Clone Research[J].
Chinese Journal of Computers, 2018, 41(03):
628-651.<br/>
[6] 刘春玲,戚旭衍,唐永鹤,等.基于词汇的源代码克
隆 检 测 技 术 综 述 [J]. 计 算 机 科
学,2024,51(06):12-22.
LIU C L, QI X Y, TANG Y H, et al. Summary of
Token-based Source Code Clone Detection
Techniques[J]. Computer Science, 2024, 51(06):
12-22.<br/>
[7] Cordy J R, Roy C K. The NiCad clone
detector[C]//2011 IEEE 19th international
conference on program comprehension. IEEE,
2011: 219-220.
[8] Sajnani H, Saini V, Svajlenko J, et al. Sourcerercc:
Scaling code clone detection to
big-code[C]//Proceedings of the
38th
international conference on software engineering
2016: 1157-1168.<br/>
[9] Nakagawa T, Higo Y, Kusumoto S. Nil:
large-scale detection of large-variance
clones[C]//Proceedings of the 29th ACM Joint
Meeting on European Software Engineering
Conference and Symposium on the Foundations
of Software Engineering. 2021: 830-841.<br/>
[10]
Zhu W, Yoshida N, Kamiya T, et al. MSCCD:
grammar pluggable clone detection based on
ANTLR parser generation[C]//Proceedings of the
30th IEEE/ACM International Conference on
Program Comprehension. 2022: 460-470.<br/>
[11]
Zhao J, Xia K, Fu Y, et al. An AST-based
code plagiarism detection algorithm[C]//2015
10th International conference on broadband and
wireless computing, communication and
applications (BWCCA). IEEE, 2015: 178-182.<br/>
[12]
Zou Y, Ban B, Xue Y, et al. CCGraph: a
PDG-based code clone detector with approximate
graph matching[C]//Proceedings of the 35th
IEEE/ACM international conference on
automated software engineering. 2020: 931-942.<br/>
[13]
Terence Parr. ANTLR. [EB/OL].
[2024-12-03]. https://www.antlr.org/.<br/>
[14]
ANTLR. grammars-v4. [EB/OL].
[2024-12-03].
https://github.com/antlr/grammars-v4.<br/>
[15]
Hunt J W, Szymanski T G. A fast algorithm
for computing longest common subsequences[J].
Communications of the ACM, 1977, 20(5):
350-353.<br/>
[16]
Wang Y, Ye Y, Wu Y, et al. Comparison and
evaluation of clone detection techniques with
different code representations[C]//2023
IEEE/ACM 45th International Conference on
Software Engineering (ICSE). IEEE, 2023:
332-344.<br/>
[17]
Semura Y, Yoshida N, Choi E, et al.
Ccfindersw: Clone detection tool with flexible
multilingual tokenization[C]//2017 24th
Asia-Pacific Software Engineering Conference
(APSEC). IEEE, 2017: 654-659.<br/>
[18]
Queen's University at Kingston. The Txl
Programming Language. [EB/OL]. [2024-12-31].
https://www.txl.ca/txl-index.html.<br/>
[19]
Jiang L, Misherghi G, Su Z, et al. Deckard:
Scalable and accurate tree-based detection of
code clones[C]//29th International Conference on
Software Engineering (ICSE'07). IEEE, 2007:
96-105.<br/>
[20]
Amme W, Heinze T S, Schäfer A. You look
so different: Finding structural clones and
subclones in java source code[C]//2021 IEEE
International Conference on Software
Maintenance and Evolution (ICSME). IEEE,
2021: 70-80.<br/>
[21]
Lei M, Li H, Li J, et al. Deep learning
application on code clone detection: A review of
current knowledge[J]. Journal of Systems and
Software, 2022, 184: 111141.<br/>
[22]
张冬梅, 陈永乐, 杨玉丽. 基于分层特征
的代码克隆检测方法[J]. 计算机工程, 2021,
47(10): 125-131.
ZHANG D M, CHEN Y L, YANG Y L. Code
Clone Detection Method Based on Hierarchical
Feature[J]. Computer Engineering, 2021, 47(10):
125-131.<br/>
[23]
吕泉润, 谢春丽, 万泽轩, 等. 基于对比学
习的跨语言代码克隆检测方法 [J]. 计算机应
用研究, 2024, 41 (7): 2147-2152.
LYU Q R, XIE C L, WAN Z X, et al. Contrastive
learning based cross-language code clone
detection [J]. Application Research of Computers,
2024, 41 (7): 2147-2152.<br/>
[24]
Sun W. Using GPU to accelerate suffix array
construction[C]//2014 7th International
Conference on Biomedical Engineering and
Informatics. IEEE, 2014: 677-682.<br/>
[25]
Svajlenko J, Islam J F, Keivanloo I, et al.
Towards a big data curated benchmark of
inter-project code clones[C]//2014 IEEE
International Conference on Software
Maintenance and Evolution. IEEE, 2014:
476-480.<br/>
[26]
Ambient software evolution group.
IJaDataset 2.0. [EB/OL]. (2023-01) [2024-12-31].
https://1drv.ms/u/s!AhXbM6MKt_yLj_tk29GJnc
9BKoIvCg?e=oVTVJm.<br/>
[27]
Wang P, Svajlenko J, Wu Y, et al. CCAligner:
a token based large-gap clone
detector[C]//Proceedings of the 40th International
Conference on Software Engineering. 2018:
1066-1077.<br/>
[28]
Kamiya T. Ccfinderx: An interactive code
clone analysis environment[J]. Code Clone
Analysis: Research, Tools, and Practices, 2021:
31-44.<br/>
[29]
Göde N, Koschke R. Incremental clone
detection[C]//2009 13th European conference on
software maintenance and reengineering. IEEE,
2009: 219-228.<br/>
[30]
Svajlenko, Jeffrey, Chanchal K. Roy, and
James R. Cordy. "A mutation analysis based
benchmarking framework for clone detectors."
2013 7th international workshop on software
clones (iwsc). IEEE, 2013.<br/>
[31]
Krutz, Daniel E., and Wei Le. "A code clone
oracle." Proceedings of the 11th working
conference on mining software repositories.
2014.<br/>
[32]
Pierre Carbonnelle. PYPL. [EB/OL].
[2024-12-31]. https://pypl.github.io/PYPL.html.<br/>
[33]
Rosetta Code contributors. Rosetta Code.
[EB/OL].
(2024-08-06)
[2025-01-03].
https://rosettacode.org/wiki/Rosetta_Code.<br/>
[34]
Li L, Feng H, Zhuang W, et al. Cclearner: A
deep learning-based clone
detection
approach[C]//2017 IEEE international conference
on software maintenance and evolution (ICSME).
IEEE, 2017: 249-260.<br/>
[35]
Zhang J, Wang X, Zhang H, et al. A novel
neural source code representation based on
abstract syntax tree[C]//2019 IEEE/ACM 41st
International Conference on Software
Engineering (ICSE). IEEE, 2019: 783-794.<br/>
[36]
Choi E, Fuke N, Fujiwara Y, et al.
Investigating the generalizability of deep
learning-based clone detectors[C]//2023
IEEE/ACM 31st International Conference on
Program Comprehension (ICPC). IEEE, 2023:
181-185.<br/>
[37]
Liu C, Lin Z, Lou J G, et al. Can neural
clone detection generalize to unseen
functionalitiesƒ[C]//2021 36th IEEE/ACM
International Conference on Automated Software
Engineering (ASE). IEEE, 2021: 617-629.<br/>
[38]
Google Code Jam dataset. Google Code Jam
dataset. [EB/OL]. [2024-12-31].
https://www.kaggle.com/datasets/jur1cek/gcj-data
set.<br/>
[39]
White M, Tufano M, Vendome C, et al.
Deep learning code fragments for code clone
detection[C]//Proceedings of the 31st IEEE/ACM
international conference on automated software
engineering. 2016: 87-98.<br/>
[40]
Feng S, Suo W, Wu Y, et al. Machine
Learning is All You Need: A Simple Token-based
Approach for Effective Code Clone
Detection[C]//Proceedings of the IEEE/ACM
46th International Conference on Software
Engineering. 2024: 1-13.<br/>
|