2017 IEEE International Conference on Software Maintenance and Evolution (ICSME) 2017
DOI: 10.1109/icsme.2017.46
|View full text |Cite
|
Sign up to set email alerts
|

CCLearner: A Deep Learning-Based Clone Detection Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
98
0
3

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 157 publications
(101 citation statements)
references
References 29 publications
0
98
0
3
Order By: Relevance
“…The embedding vectors are concatenated and then used to compute a prediction score for the patch. Different from existing deep learning techniques working on the source code [16], [17], [24], [36], [44], [66], [68], our hierarchical deep learning-based architecture takes into account the structure of code changes (i.e., files, hunks, lines) and the sequential nature of source code (by considering each line of code as a sequence of words) to predict stable patches in the Linux kernel.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The embedding vectors are concatenated and then used to compute a prediction score for the patch. Different from existing deep learning techniques working on the source code [16], [17], [24], [36], [44], [66], [68], our hierarchical deep learning-based architecture takes into account the structure of code changes (i.e., files, hunks, lines) and the sequential nature of source code (by considering each line of code as a sequence of words) to predict stable patches in the Linux kernel.…”
Section: Resultsmentioning
confidence: 99%
“…Learning code representation. CCLearner [44] learns a deep neural network classifier from clone pairs and non clone pairs to detect clones. To represent code, it extracts features based on different categories (reserved words, operators, etc.)…”
Section: Related Workmentioning
confidence: 99%
“…However, it lacks the analysis of the syntax and semantics of the code, and the detection effect of type-3 and type-4 cloning is not ideal. At present, the Token-based code clone detection method mainly include CCFinder [4], CP-Miner [21], CCAligner [22], and CCLearner [23].…”
Section: Research On Token-based Detection Methodsmentioning
confidence: 99%
“…The benchmark contains 2.9 million files with 8 million manually validated clone pairs of Type-1 up to Type-4. The BigCloneBench data set was used for clone evaluation and scalability test in several large-scale clone detection and clone search studies Li et al, 2017;Sajnani et al, 2016;Svajlenko and Roy, 2015). Lastly, for the evaluation of Siamese's incremental update, we relied on a set of publicly available 130,719 GitHub Java projects.…”
Section: Data Setsmentioning
confidence: 99%