A systematic review on code clone detection
Code cloning refers to the duplication of source code. It is the most common way of reusing
source code in software development. If a bug is identified in one segment of code, all the …
source code in software development. If a bug is identified in one segment of code, all the …
A systematic literature review on source code similarity measurement and clone detection: Techniques, applications, and challenges
Measuring and evaluating source code similarity is a fundamental software engineering
activity that embraces a broad range of applications, including but not limited to code …
activity that embraces a broad range of applications, including but not limited to code …
Detecting LLM-generated text in computing education: Comparative study for ChatGPT cases
MS Orenstrakh, O Karnalim… - 2024 IEEE 48th …, 2024 - ieeexplore.ieee.org
Due to the recent improvements and wide availability of Large Language Models (LLMs),
they have posed a serious threat to academic integrity in education. Modern LLM-generated …
they have posed a serious threat to academic integrity in education. Modern LLM-generated …
Toxic code snippets on stack overflow
Online code clones are code fragments that are copied from software projects or online
sources to Stack Overflow as examples. Due to an absence of a checking mechanism after …
sources to Stack Overflow as examples. Due to an absence of a checking mechanism after …
ModelDiff: Testing-based DNN similarity comparison for model reuse detection
The knowledge of a deep learning model may be transferred to a student model, leading to
intellectual property infringement or vulnerability propagation. Detecting such knowledge …
intellectual property infringement or vulnerability propagation. Detecting such knowledge …
Academic source code plagiarism detection by measuring program behavioral similarity
Source code plagiarism is a long-standing issue in tertiary computer science education.
Many source code plagiarism detection tools have been proposed to aid in the detection of …
Many source code plagiarism detection tools have been proposed to aid in the detection of …
On the relationship between similar requirements and similar software: A case study in the railway domain
Recommender systems for requirements are typically built on the assumption that similar
requirements can be used as proxies to retrieve similar software. When a stakeholder …
requirements can be used as proxies to retrieve similar software. When a stakeholder …
Siamese: scalable and incremental code clone search via multiple code representations
This paper presents a novel code clone search technique that is accurate, incremental, and
scalable to hundreds of million lines of code. Our technique incorporates multiple code …
scalable to hundreds of million lines of code. Our technique incorporates multiple code …
On the assessment of software defect prediction models via ROC curves
Software defect prediction models are classifiers often built by setting a threshold t on a
defect proneness model, ie, a scoring function. For instance, they classify a software module …
defect proneness model, ie, a scoring function. For instance, they classify a software module …
Challenging machine learning-based clone detectors via semantic-preserving code transformations
Software clone detection identifies similar or identical code snippets. It has been an active
research topic that attracts extensive attention over the last two decades. In recent years …
research topic that attracts extensive attention over the last two decades. In recent years …