Articles with "clone detection" as a keyword



Photo by lucabravo from unsplash

Fast Code Clone Detection Based on Weighted Recursive Autoencoders

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2938825

Abstract: Code cloning considerably facilitates software development but also leads to recurring bugs and other software quality problems. In this paper, we propose a fast code clone detection method based on weighted recursive autoencoders (RAE) to… read more here.

Keywords: clone detection; syntax; code clone; code ... See more keywords
Photo by lucabravo from unsplash

A Survey of Software Clone Detection From Security Perspective

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3065872

Abstract: For software engineering, if two code fragments are closely similar with minor modifications or even identical due to a copy-paste behavior, that is called software/code clone. Code clones can cause trouble in software maintenance and… read more here.

Keywords: clone detection; software; code clone; code ... See more keywords
Photo from wikipedia

DTD: A Novel Double-Track Approach to Clone Detection for RFID-Enabled Supply Chains

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Emerging Topics in Computing"

DOI: 10.1109/tetc.2015.2389532

Abstract: Toward improving the traditional clone detection technique whose performance may be affected by dynamic changes of supply chains and misread, we present a novel and effective clone detection approach, termed double-track detection, for radio frequency… read more here.

Keywords: detection; double track; clone detection; supply chains ... See more keywords
Photo by yapics from unsplash

MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2018.2805291

Abstract: Cloning is a very serious threat in the Internet of Things (IoT), owing to the simplicity for an attacker to gather configuration and authentication credentials from a non-tamper-proof node, and replicate it in the network.… read more here.

Keywords: detection; clone detection; internet things; mdsclone ... See more keywords
Photo from wikipedia

Clone detection for business process models

Sign Up to like & get
recommendations!
Published in 2022 at "PeerJ Computer Science"

DOI: 10.7717/peerj-cs.1046

Abstract: Models are key in software engineering, especially with the rise of model-driven software engineering. One such use of modeling is in business process modeling, where models are used to represent processes in enterprises. As the… read more here.

Keywords: process models; detection; model; business process ... See more keywords