Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic literature review of clone evolution
Y Zhong, X Zhang, W Tao, Y Zhang - Proceedings of the 5th International …, 2022 - dl.acm.org
Code clones are identical or nearly similar code fragments often introduced into software
systems by programmers with software modification and maintenance. During the evolution …
systems by programmers with software modification and maintenance. During the evolution …
To share, or not to share: Exploring test-case reusability in fork ecosystems
Code is often reused to facilitate collaborative development, to create software variants, to
experiment with new ideas, or to develop new features in isolation. Social-coding platforms …
experiment with new ideas, or to develop new features in isolation. Social-coding platforms …
Comparing Robustness Against Adversarial Attacks in Code Generation: LLM-Generated vs. Human-Written
Thanks to the widespread adoption of Large Language Models (LLMs) in software
engineering research, the long-standing dream of automated code generation has become …
engineering research, the long-standing dream of automated code generation has become …
Quantifying and characterizing clones of self-admitted technical debt in build systems
Abstract Self-Admitted Technical Debt (SATD) annotates development decisions that
intentionally exchange long-term software artifact quality for short-term goals. Recent work …
intentionally exchange long-term software artifact quality for short-term goals. Recent work …
A large-scale study on human-cloned changes for automated program repair
Research in automatic program repair has shown that real bugs can be automatically fixed.
However, there are several challenges involved in such a task that are not yet fully …
However, there are several challenges involved in such a task that are not yet fully …
Utilizing source code syntax patterns to detect bug inducing commits using machine learning models
Abstract Detecting Bug Inducing Commit (BIC) or Just in Time (JIT) defect prediction using
Machine Learning (ML) based models requires tabulated feature values extracted from the …
Machine Learning (ML) based models requires tabulated feature values extracted from the …
Granularity-based comparison of the bug-proneness of code clones
Exactly or nearly similar code pieces residing in a software system's code-base are known
as code clones in the lit-erature. The existing studies have investigated the bug-proneness …
as code clones in the lit-erature. The existing studies have investigated the bug-proneness …
Revealing code change propagation channels by evolution history mining
Abstract Changes on source code may propagate to distant code entities through various
kinds of relationships, which may form up change propagation channels. It is however …
kinds of relationships, which may form up change propagation channels. It is however …
A fine-grained analysis on the inconsistent changes in code clones
Existing studies report that inconsistent changes in code clones can introduce bugs or
inconsistencies in a software system's code-base. However, inconsistent changes can often …
inconsistencies in a software system's code-base. However, inconsistent changes can often …
Investigating Adversarial Attacks in Software Analytics via Machine Learning Explainability
With the recent advancements in machine learning (ML), numerous ML-based approaches
have been extensively applied in software analytics tasks to streamline software …
have been extensively applied in software analytics tasks to streamline software …