A systematic literature review on the applications of recurrent neural networks in code clone research
FH Quradaa, S Shahzad, RS Almoqbily - Plos one, 2024 - journals.plos.org
Code clones, referring to code fragments that are either similar or identical and are copied
and pasted within software systems, have negative effects on both software quality and …
and pasted within software systems, have negative effects on both software quality and …
CCGIR: Information retrieval-based code comment generation method for smart contracts
A smart contract is a computer program, which is intended to automatically execute, control
or document legally relevant events and actions according to the terms of a contract. About …
or document legally relevant events and actions according to the terms of a contract. About …
Efficient and secure multiple digital signature to prevent forgery based on ECC
Adversary can be able to perform selective forgery where valid signature on message are
created by someone else, with a significant probability and existential forgery, in which a …
created by someone else, with a significant probability and existential forgery, in which a …
Automated Detection of AI-Obfuscated Plagiarism in Modeling Assignments
Plagiarism is a widespread problem in computer science education, exacerbated by the
impracticability of manual inspection in large courses. Even worse, tools based on large …
impracticability of manual inspection in large courses. Even worse, tools based on large …
SimClone: Detecting Tabular Data Clones using Value Similarity
Data clones are defined as multiple copies of the same data among datasets. The presence
of data clones between datasets can cause issues such as difficulties in managing data …
of data clones between datasets can cause issues such as difficulties in managing data …
Token-based plagiarism detection for metamodels
Plagiarism is a widespread problem in computer science education. Manual inspection is
impractical for large courses, and the risk of detection is thus low. Many plagiarism detectors …
impractical for large courses, and the risk of detection is thus low. Many plagiarism detectors …
A mocktail of source code representations
Efficient representation of source code is essential for various software engineering tasks
such as code classification and code clone detection. Most recent approaches for …
such as code classification and code clone detection. Most recent approaches for …
Explaining transformer-based code models: What do they learn? When they do not work?
AH Mohammadkhani… - 2023 IEEE 23rd …, 2023 - ieeexplore.ieee.org
In recent years, there has been a wide interest in designing deep neural network-based
models that automate downstream software engineering tasks on source code, such as …
models that automate downstream software engineering tasks on source code, such as …
{SymBisect}: Accurate Bisection for {Fuzzer-Exposed} Vulnerabilities
The popularity of fuzzing has led to its tight integration into the software development
process as a routine part of the build and test, ie, continuous fuzzing. This has resulted in a …
process as a routine part of the build and test, ie, continuous fuzzing. This has resulted in a …
A novel vulnerable code clone detector based on context enhancement and patch validation
J Guo, H Li, Z Wang, L Zhang… - … and Mobile Computing, 2022 - Wiley Online Library
With the rapid growth of open‐source software, code cloning has become increasingly
prevalent. If there are security vulnerabilities in a cloned code segment, those vulnerabilities …
prevalent. If there are security vulnerabilities in a cloned code segment, those vulnerabilities …