Software clone detection: A systematic review

D Rattan, R Bhatia, M Singh - Information and Software Technology, 2013 - Elsevier
CONTEXT: Reusing software by means of copy and paste is a frequent activity in software
development. The duplicated code is known as a software clone and the activity is known as …

CCAligner: a token based large-gap clone detector

P Wang, J Svajlenko, Y Wu, Y Xu, CK Roy - Proceedings of the 40th …, 2018 - dl.acm.org
Copying code and then pasting with large number of edits is a common activity in software
development, and the pasted code is a kind of complicated Type-3 clone. Due to large …

Definition, approaches, and analysis of code duplication detection (2006–2020): a critical review

CF Chen, AM Zain, KQ Zhou - Neural Computing and Applications, 2022 - Springer
Code duplication detection is the act of finding similar code in software development. It is
important for software engineer to address the issues of code duplication detection. In this …

[PDF][PDF] A survey of software clone detection techniques

A Sheneamer, J Kalita - International Journal of Computer …, 2016 - scholar.archive.org
If two fragments of source code are identical or similar to each other, they are called code
clones. Code clones introduce difficulties in software maintenance and cause bug …

Open-source tools and benchmarks for code-clone detection: past, present, and future trends

A Walker, T Cerny, E Song - ACM SIGAPP Applied Computing Review, 2020 - dl.acm.org
A fragment of source code that is identical or similar to another is a code-clone. Code-clones
make it difficult to maintain applications as they create multiple points within the code that …

Semantic clone detection using machine learning

A Sheneamer, J Kalita - 2016 15th IEEE international …, 2016 - ieeexplore.ieee.org
If two fragments of source code are identical to each other, they are called code clones.
Code clones introduce difficulties in software maintenance and cause bug propagation. In …

A detection framework for semantic code clones and obfuscated code

A Sheneamer, S Roy, J Kalita - Expert Systems with Applications, 2018 - Elsevier
Code obfuscation is a staple tool in malware creation where code fragments are altered
substantially to make them appear different from the original, while keeping the semantics …

A metrics-based data mining approach for software clone detection

SK Abd-El-Hafiz - 2012 IEEE 36th Annual Computer Software …, 2012 - ieeexplore.ieee.org
The detection of function clones in software systems is valuable for the code adaptation and
error checking maintenance activities. This paper presents an efficient metrics-based data …

An effective semantic code clone detection framework using pairwise feature fusion

A Sheneamer, S Roy, J Kalita - IEEE Access, 2021 - ieeexplore.ieee.org
Code clones. In this work, we propose a novel detection framework using machine learning
for automated detection of all four type of clones. The features extracted from a pair of code …

A large-gap clone detection approach using sequence alignment via dynamic parameter optimization

J Liu, T Wang, C Feng, H Wang, D Li - IEEE Access, 2019 - ieeexplore.ieee.org
Large-gap clones, a kind of clones that reuses code with many edits, are very common in
software development practice and widespread in software systems. The detection of such …