A systematic literature review of clone evolution

Y Zhong, X Zhang, W Tao, Y Zhang - Proceedings of the 5th International …, 2022 - dl.acm.org
Code clones are identical or nearly similar code fragments often introduced into software
systems by programmers with software modification and maintenance. During the evolution …

To share, or not to share: Exploring test-case reusability in fork ecosystems

M Mukelabai, C Derks, J Krüger… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
Code is often reused to facilitate collaborative development, to create software variants, to
experiment with new ideas, or to develop new features in isolation. Social-coding platforms …

Comparing Robustness Against Adversarial Attacks in Code Generation: LLM-Generated vs. Human-Written

MA Awal, M Rochan, CK Roy - arxiv preprint arxiv:2411.10565, 2024 - arxiv.org
Thanks to the widespread adoption of Large Language Models (LLMs) in software
engineering research, the long-standing dream of automated code generation has become …

Quantifying and characterizing clones of self-admitted technical debt in build systems

T **ao, Z Zeng, D Wang, H Hata, S McIntosh… - Empirical Software …, 2024 - Springer
Abstract Self-Admitted Technical Debt (SATD) annotates development decisions that
intentionally exchange long-term software artifact quality for short-term goals. Recent work …

A large-scale study on human-cloned changes for automated program repair

F Madeiral, T Durieux - 2021 IEEE/ACM 18th International …, 2021 - ieeexplore.ieee.org
Research in automatic program repair has shown that real bugs can be automatically fixed.
However, there are several challenges involved in such a task that are not yet fully …

Utilizing source code syntax patterns to detect bug inducing commits using machine learning models

M Nadim, B Roy - Software Quality Journal, 2023 - Springer
Abstract Detecting Bug Inducing Commit (BIC) or Just in Time (JIT) defect prediction using
Machine Learning (ML) based models requires tabulated feature values extracted from the …

Granularity-based comparison of the bug-proneness of code clones

S Mondal, M Mondal, R Debnath - 2023 IEEE 17th …, 2023 - ieeexplore.ieee.org
Exactly or nearly similar code pieces residing in a software system's code-base are known
as code clones in the lit-erature. The existing studies have investigated the bug-proneness …

Revealing code change propagation channels by evolution history mining

D Zhou, Y Wu, X Peng, J Zhang, Z Li - Journal of Systems and Software, 2024 - Elsevier
Abstract Changes on source code may propagate to distant code entities through various
kinds of relationships, which may form up change propagation channels. It is however …

A fine-grained analysis on the inconsistent changes in code clones

M Mondal, CK Roy… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Existing studies report that inconsistent changes in code clones can introduce bugs or
inconsistencies in a software system's code-base. However, inconsistent changes can often …

Investigating Adversarial Attacks in Software Analytics via Machine Learning Explainability

MD Awal, M Rochan, CK Roy - arxiv preprint arxiv:2408.04124, 2024 - arxiv.org
With the recent advancements in machine learning (ML), numerous ML-based approaches
have been extensively applied in software analytics tasks to streamline software …