Software clone detection: A systematic review

D Rattan, R Bhatia, M Singh - Information and Software Technology, 2013 - Elsevier
CONTEXT: Reusing software by means of copy and paste is a frequent activity in software
development. The duplicated code is known as a software clone and the activity is known as …

Comparison and evaluation of code clone detection techniques and tools: A qualitative approach

CK Roy, JR Cordy, R Koschke - Science of computer programming, 2009 - Elsevier
Over the last decade many techniques and tools for software clone detection have been
proposed. In this paper, we provide a qualitative comparison and evaluation of the current …

[PDF][PDF] A survey on software clone detection research

CK Roy, JR Cordy - Queen's School of computing TR, 2007 - research.cs.queensu.ca
Code duplication or copying a code fragment and then reuse by pasting with or without any
modifications is a well known code smell in software maintenance. Several studies show …

Wukong: A scalable and accurate two-phase approach to android app clone detection

H Wang, Y Guo, Z Ma, X Chen - … of the 2015 international symposium on …, 2015 - dl.acm.org
Repackaged Android applications (app clones) have been found in many third-party
markets, which not only compromise the copyright of original authors, but also pose threats …

The vision of software clone management: Past, present, and future (keynote paper)

CK Roy, MF Zibran, R Koschke - 2014 Software Evolution …, 2014 - ieeexplore.ieee.org
Duplicated code or code clones are a kind of code smell that have both positive and
negative impacts on the development and maintenance of software systems. Software clone …

[PDF][PDF] A survey of software clone detection techniques

A Sheneamer, J Kalita - International Journal of Computer …, 2016 - scholar.archive.org
If two fragments of source code are identical or similar to each other, they are called code
clones. Code clones introduce difficulties in software maintenance and cause bug …

Characterizing code clones in the ethereum smart contract ecosystem

N He, L Wu, H Wang, Y Guo, X Jiang - Financial Cryptography and Data …, 2020 - Springer
In this paper, we present the first large-scale and systematic study to characterize the code
reuse practice in the Ethereum smart contract ecosystem. We first performed a detailed …

Finding patterns in static analysis alerts: improving actionable alert ranking

Q Hanam, L Tan, R Holmes, P Lam - … of the 11th working conference on …, 2014 - dl.acm.org
Static analysis (SA) tools that find bugs by inferring programmer beliefs (eg, FindBugs) are
commonplace in today's software industry. While they find a large number of actual defects …

Detection and analysis of near-miss software clones

CK Roy - 2009 IEEE International Conference on Software …, 2009 - ieeexplore.ieee.org
Software clones are considered harmful in software maintenance and evolution. However,
despite a decade of active research, there is a marked lack of work in the detection and …

Federated Learning for Software Engineering: A Case Study of Code Clone Detection and Defect Prediction

Y Yang, X Hu, Z Gao, J Chen, C Ni… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In various research domains, artificial intelligence (AI) has gained significant prominence,
leading to the development of numerous learning-based models in research laboratories …