2023
DOI: 10.1109/tr.2022.3176922
|View full text |Cite
|
Sign up to set email alerts
|

Java Code Clone Detection by Exploiting Semantic and Syntax Information From Intermediate Code-Based Graph

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 59 publications
0
5
0
Order By: Relevance
“…Due to the above advantages, more and more LLMs are proposed for various software engineering tasks [1], [13], [18]. Similar to LLMs for natural languages, these models are first pretrained on massive software engineering data, e.g., source code collected from GitHub, then further fine-tuned for specific downstream tasks, like code search [19], clone code detection [20], code summarization [21], code optimization [22], and program repair [23]. Due to the powerful representation learning ability of LLMs, they achieve state-of-the-art results on these tasks.…”
Section: Large Language Modelmentioning
confidence: 99%
“…Due to the above advantages, more and more LLMs are proposed for various software engineering tasks [1], [13], [18]. Similar to LLMs for natural languages, these models are first pretrained on massive software engineering data, e.g., source code collected from GitHub, then further fine-tuned for specific downstream tasks, like code search [19], clone code detection [20], code summarization [21], code optimization [22], and program repair [23]. Due to the powerful representation learning ability of LLMs, they achieve state-of-the-art results on these tasks.…”
Section: Large Language Modelmentioning
confidence: 99%
“…There are four main categories of code clones, type 1 to type 4, based on their resemblance. When there is a bug in the original code, its duplicate code is expected to contain a similar bug, causing the bugs to spread all over the software system, the same as an infection (3) . Even though fixing the original bug is feasible, the fixing process generally finds it difficult to treat all the code fragments cloned from the original code.…”
Section: Code Clone Detectionmentioning
confidence: 99%
“…To deal with issues, code clone detection-based bug detection techniques have been broadly considered and have yielded high-quality results. Therefore, code clone detection is very important as an underlying analysis technique to maintain the quality of software (1)(2)(3) .…”
Section: Code Clone Detectionmentioning
confidence: 99%
See 2 more Smart Citations