A systematic literature review on the applications of recurrent neural networks in code clone research

FH Quradaa, S Shahzad, RS Almoqbily - Plos one, 2024 - journals.plos.org
Code clones, referring to code fragments that are either similar or identical and are copied
and pasted within software systems, have negative effects on both software quality and …

CCGIR: Information retrieval-based code comment generation method for smart contracts

G Yang, K Liu, X Chen, Y Zhou, C Yu, H Lin - Knowledge-Based Systems, 2022 - Elsevier
A smart contract is a computer program, which is intended to automatically execute, control
or document legally relevant events and actions according to the terms of a contract. About …

Efficient and secure multiple digital signature to prevent forgery based on ECC

S Tanwar, S Badotra, M Gupta, A Rana - International Journal of …, 2021 - gigvvy.com
Adversary can be able to perform selective forgery where valid signature on message are
created by someone else, with a significant probability and existential forgery, in which a …

Automated Detection of AI-Obfuscated Plagiarism in Modeling Assignments

T Sağlam, S Hahner, L Schmid, E Burger - Proceedings of the 46th …, 2024 - dl.acm.org
Plagiarism is a widespread problem in computer science education, exacerbated by the
impracticability of manual inspection in large courses. Even worse, tools based on large …

Token-based plagiarism detection for metamodels

T Sağlam, S Hahner, JW Wittler, T Kühn - Proceedings of the 25th …, 2022 - dl.acm.org
Plagiarism is a widespread problem in computer science education. Manual inspection is
impractical for large courses, and the risk of detection is thus low. Many plagiarism detectors …

A mocktail of source code representations

D Vagavolu, KC Swarna… - 2021 36th IEEE/ACM …, 2021 - ieeexplore.ieee.org
Efficient representation of source code is essential for various software engineering tasks
such as code classification and code clone detection. Most recent approaches for …

Explaining transformer-based code models: What do they learn? When they do not work?

AH Mohammadkhani… - 2023 IEEE 23rd …, 2023 - ieeexplore.ieee.org
In recent years, there has been a wide interest in designing deep neural network-based
models that automate downstream software engineering tasks on source code, such as …

A novel vulnerable code clone detector based on context enhancement and patch validation

J Guo, H Li, Z Wang, L Zhang… - … and Mobile Computing, 2022 - Wiley Online Library
With the rapid growth of open‐source software, code cloning has become increasingly
prevalent. If there are security vulnerabilities in a cloned code segment, those vulnerabilities …

Explainable AI for pre-trained code models: What do they learn? When they do not work?

AH Mohammadkhani, C Tantithamthavorn… - arXiv preprint arXiv …, 2022 - arxiv.org
In recent years, there has been a wide interest in designing deep neural network-based
models that automate downstream software engineering tasks on source code, such as …

SimClone: Detecting Tabular Data Clones using Value Similarity

X Yang, GK Rajbahadur, D Lin, S Wang… - ACM Transactions on …, 2024 - dl.acm.org
Data clones are defined as multiple copies of the same data among datasets. Presence of
data clones between datasets can cause issues such as difficulties in managing data assets …