Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On the relationship between similar requirements and similar software: A case study in the railway domain
Recommender systems for requirements are typically built on the assumption that similar
requirements can be used as proxies to retrieve similar software. When a stakeholder …
requirements can be used as proxies to retrieve similar software. When a stakeholder …
ModX: binary level partially imported third-party library detection via program modularization and semantic matching
With the rapid growth of software, using third-party libraries (TPLs) has become increasingly
popular. The prosperity of the library usage has provided the software engineers with a …
popular. The prosperity of the library usage has provided the software engineers with a …
CENTRIS: A precise and scalable approach for identifying modified open-source software reuse
Open-source software (OSS) is widely reused as it provides convenience and efficiency in
software development. Despite evident benefits, unmanaged OSS components can …
software development. Despite evident benefits, unmanaged OSS components can …
{V1SCAN}: Discovering 1-day Vulnerabilities in Reused {C/C++} Open-source Software Components Using Code Classification Techniques
We present V1SCAN, an effective approach for discovering 1-day vulnerabilities in reused
C/C++ open-source software (OSS) components. Reusing third-party OSS has many …
C/C++ open-source software (OSS) components. Reusing third-party OSS has many …
Open-source tools and benchmarks for code-clone detection: past, present, and future trends
A fragment of source code that is identical or similar to another is a code-clone. Code-clones
make it difficult to maintain applications as they create multiple points within the code that …
make it difficult to maintain applications as they create multiple points within the code that …
ARCTURUS: Full Coverage Binary Similarity Analysis with Reachability-guided Emulation
Binary code similarity analysis is extremely useful, since it provides rich information about an
unknown binary, such as revealing its functionality and identifying reused libraries. Robust …
unknown binary, such as revealing its functionality and identifying reused libraries. Robust …
Osldetector: Identifying open-source libraries through binary analysis
Using open-source libraries can provide rich functions and reduce development cost.
However, some critical issues have also been caused such as license conflicts and …
However, some critical issues have also been caused such as license conflicts and …
PromeTrans: Bootstrap binary functionality classification with knowledge transferred from pre-trained models
Pre-trained models have witnessed significant progress in nature language (including
source code) and binary code comprehension. However, none of them are suitable for …
source code) and binary code comprehension. However, none of them are suitable for …
[HTML][HTML] CrossCode2Vec: A unified representation across source and binary functions for code similarity detection
G Yu, J An, J Lyu, W Huang, W Fan, Y Cheng, A Sui - Neurocomputing, 2025 - Elsevier
Code similarity detection identifies code by analyzing similarities in syntax, semantics, and
structure, which includes types of tasks: source-to-source, binary-to-binary, and source-to …
structure, which includes types of tasks: source-to-source, binary-to-binary, and source-to …
BBDetector: A precise and scalable third-party library detection in binary executables with fine-grained function-level features
X Zhu, J Wang, Z Fang, X Yin, S Liu - Applied Sciences, 2022 - mdpi.com
Third-party library (TPL) reuse may introduce vulnerable or malicious code and expose the
software, which exposes them to potential risks. Thus, it is essential to identify third-party …
software, which exposes them to potential risks. Thus, it is essential to identify third-party …