This work is licensed under the Creative Commons Attribution 4.0 International License.
Shi, H., Wang, R., Fu, Y., Jiang, Y., & Sun, J. (2019). Vulnerable code clone detection for operating system through correlation induced learning. IEEE Transactions on Industrial Informatics, PP(99), 1-1.Search in Google Scholar
Chen, J., Xia, X., Lo, D., Grundy, J. C., Luo, X., & Chen, T. (2021). Defectchecker: automated smart contract defect detection by analyzing evm bytecode. IEEE Transactions on Software Engineering.Search in Google Scholar
Ragkhitwetsagul, C., Krinke, J., & Clark, D. (2018). A comparison of code similarity analysers. Empirical Software Engineering, 23(4), 2464-2519.Search in Google Scholar
Jnanamurthy, H. K.Jetley, RaoulHenskens, FransPaul, DavidWallis, MarkSudarsan, S. D. (2020). Multilevel analysis of iec 61131-3 languages to detect clones. International Journal of Computer Applications in Technology, 63(4).Search in Google Scholar
Reijers, N., & Shih, C. (2019). Improved ahead-of-time compilation of stack-based jvmbytecode on resource-constrained devices. ACM Transactions on Sensor Networks (TOSN).Search in Google Scholar
Zhang, Y., Shao, S., Liu, H., Qiu, J., & Zhangb, G. (2019). Refactoring java programs for customizable locks based on bytecode transformation. IEEE Access, PP(99), 1-1.Search in Google Scholar
Zhang, H., & Sakurai, K. (2021). A survey of software clone detection from security perspective. IEEE Access, PP(99), 1-1.Search in Google Scholar
Chau, N. T., & Jung, S. (2020). Enhancing notation-based code cloning method with an external-based identifier model. IEEE Access, PP(99), 1-1.Search in Google Scholar
Ragkhitwetsagul, C., & Krinke, J. (2019). Siamese: scalable and incremental code clone search via multiple code representations. Empirical Software Engineering, 24(4), 1-49.Search in Google Scholar
Svajlenko, J., & Roy, C. (2019). The mutation and injection framework: evaluating clone detection tools with mutation analysis. IEEE Transactions on Software Engineering, PP(99), 1-1.Search in Google Scholar
Li, G., Liu, H., Jiang, Y., & Jin, J. (2018). Test-based clone detection: an initial try on semantically equivalent methods. IEEE Access, 1-1.Search in Google Scholar
Kaur, M., & Rattan, D. (2023). A systematic literature review on the use of machine learning in code clone research. Computer science review.Search in Google Scholar
Li, Z., Chen, T. H. P., Yang, J., & Shang, W. (2021). Studying duplicate logging statements and their relationships with code clones. IEEE Transactions on Software Engineering, PP(99), 1-1.Search in Google Scholar
Ain, Q. U., Butt, W. H., Anwar, M. W., Azam, F., & Maqbool, B. (2019). Recent advancements in code clone detection – techniques and tools. IEEE Access, PP(99), 1-1.Search in Google Scholar
Liu, J., Wang, T., Feng, C., Wang, H., & Li, D. (2019). A large-gap clone detection approach using sequence alignment via dynamic parameter optimization. IEEE Access, PP(99), 1-1.Search in Google Scholar
Ozogur, G., Erturk, M. A., Aydin, Z. G., & Aydin, M. A. (2023). Android malware detection in bytecode level using tf-idf and xgboost. The computer journal(9), 66.Search in Google Scholar
Yu, D., Yang, J., Chen, X., & Chen, J. (2019). Detecting java code clones based on bytecode sequence alignment. IEEE Access, 1-1.Search in Google Scholar
Guo, C., Yang, H., Huang, D., Zhang, J., & Zhu, J. (2020). Review sharing via deep semi-supervised code clone detection. IEEE Access, PP(99), 1-1.Search in Google Scholar
Fang, Y., Huang, C., Liu, L., & Xue, M. (2018). Research on malicious javascript detection technology based on lstm. IEEE Access, 1-1.Search in Google Scholar
Wu, Q., Zhu, X., & Liu, B. (2021). A survey of android malware static detection technology based on machine learning. Mobile Information Systems.Search in Google Scholar
Fang, Y., Zhang, W., Li, B., Jing, F., & Zhang, L. (2019). Semi-supervised malware clustering based on the weight of bytecode and api. IEEE Access, PP(99), 1-1.Search in Google Scholar
Hu, Y., Xu, G., Zhang, B., Lai, K., & Zhang, M. (2020). Robust app clone detection based on similarity of ui structure. IEEE Access, PP(99), 1-1.Search in Google Scholar
Zeng, J., Ben, K., Li, X., & Zhang, X. (2019). Fast code clone detection based on weighted recursive autoencoders. IEEE Access.Search in Google Scholar
Ain, Q. U., Butt, W. H., Anwar, M. W., Azam, F., & Maqbool, B. (2019). A systematic review on code clone detection. IEEE Access, 7, 86121-86144.Search in Google Scholar
Santacroce, M., Koranek, D., & Jha, R. (2020). Detecting malware code as video with compressed, time-distributed neural networks. IEEE Access, PP(99), 1-1.Search in Google Scholar
Hua, W., Sui, Y., Wan, Y., Liu, G., & Xu, G. (2020). Fcca: hybrid code representation for functional clone detection using attention networks. IEEE Transactions on Reliability, PP(99), 1-15.Search in Google Scholar