A systematic review on code clone detection

QU Ain, WH Butt, MW Anwar, F Azam… - IEEE access, 2019 - ieeexplore.ieee.org
Code cloning refers to the duplication of source code. It is the most common way of reusing
source code in software development. If a bug is identified in one segment of code, all the …

A systematic literature review on source code similarity measurement and clone detection: Techniques, applications, and challenges

M Zakeri-Nasrabadi, S Parsa, M Ramezani… - Journal of Systems and …, 2023 - Elsevier
Measuring and evaluating source code similarity is a fundamental software engineering
activity that embraces a broad range of applications, including but not limited to code …

Detecting LLM-generated text in computing education: Comparative study for ChatGPT cases

MS Orenstrakh, O Karnalim… - 2024 IEEE 48th …, 2024 - ieeexplore.ieee.org
Due to the recent improvements and wide availability of Large Language Models (LLMs),
they have posed a serious threat to academic integrity in education. Modern LLM-generated …

Toxic code snippets on stack overflow

C Ragkhitwetsagul, J Krinke, M Paixao… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Online code clones are code fragments that are copied from software projects or online
sources to Stack Overflow as examples. Due to an absence of a checking mechanism after …

ModelDiff: Testing-based DNN similarity comparison for model reuse detection

Y Li, Z Zhang, B Liu, Z Yang, Y Liu - Proceedings of the 30th ACM …, 2021 - dl.acm.org
The knowledge of a deep learning model may be transferred to a student model, leading to
intellectual property infringement or vulnerability propagation. Detecting such knowledge …

Academic source code plagiarism detection by measuring program behavioral similarity

H Cheers, Y Lin, SP Smith - IEEE Access, 2021 - ieeexplore.ieee.org
Source code plagiarism is a long-standing issue in tertiary computer science education.
Many source code plagiarism detection tools have been proposed to aid in the detection of …

On the relationship between similar requirements and similar software: A case study in the railway domain

M Abbas, A Ferrari, A Shatnawi, E Enoiu… - Requirements …, 2023 - Springer
Recommender systems for requirements are typically built on the assumption that similar
requirements can be used as proxies to retrieve similar software. When a stakeholder …

Siamese: scalable and incremental code clone search via multiple code representations

C Ragkhitwetsagul, J Krinke - Empirical Software Engineering, 2019 - Springer
This paper presents a novel code clone search technique that is accurate, incremental, and
scalable to hundreds of million lines of code. Our technique incorporates multiple code …

On the assessment of software defect prediction models via ROC curves

S Morasca, L Lavazza - Empirical Software Engineering, 2020 - Springer
Software defect prediction models are classifiers often built by setting a threshold t on a
defect proneness model, ie, a scoring function. For instance, they classify a software module …

Challenging machine learning-based clone detectors via semantic-preserving code transformations

W Zhang, S Guo, H Zhang, Y Sui… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Software clone detection identifies similar or identical code snippets. It has been an active
research topic that attracts extensive attention over the last two decades. In recent years …