2022
DOI: 10.1109/tse.2021.3105556
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Functional Similarity in Source Code With Graph-Based Siamese Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(7 citation statements)
references
References 68 publications
0
6
0
Order By: Relevance
“…Mehrotra et al. [6] use the Soot optimization framework [77] to build program dependence graphs for Java code, followed by the Cytron's method [78] to compute control dependence. Reaching definition [79] and upward exposed analysis [80] are both used for computing data dependence graphs.…”
Section: Main Attributes Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Mehrotra et al. [6] use the Soot optimization framework [77] to build program dependence graphs for Java code, followed by the Cytron's method [78] to compute control dependence. Reaching definition [79] and upward exposed analysis [80] are both used for computing data dependence graphs.…”
Section: Main Attributes Analysismentioning
confidence: 99%
“…For example, Ben-Nun et al [48] convert Java code to statements in an Intermediate Representation (IR) using the LLVM Compiler Infrastructure [76], which is then processed to contextual flow graphs. Mehrotra et al [6] use the Soot optimization framework [77] to build program dependence graphs for Java code, followed by the Cytron's method [78] to compute control dependence. Reaching definition [79] and upward exposed analysis [80] are both used for computing data dependence graphs.…”
Section: Code Representation For Different Programming Languagesmentioning
confidence: 99%
See 1 more Smart Citation
“…Machine Learning for Program Analysis. Machine learning has been shown to be extremely promising in analyzing both source code and executables [3,24,62,74] in tasks like type inference [36,38,56,61,64,70,94], code completion [10,17,44], program synthesis and generation [79,89], program repair and fix [2,26,42,80,90,99], code summarization [14,21,75,84], general code representation [13,40,50,52,91], bug/vulnerability detection [23,47,63,73,87], code clone detection and search [14,32,33,43,54,66], code translation [72], comment suggestion [41,51], and reverse engineering tasks [7,9,…”
Section: Related Workmentioning
confidence: 99%
“…ASTs are typically characterised by multi-node, multi-level and multi-nested structures. Previous source code representations [31,32] have demonstrated that GNNs can better encode the local structure of ASTs [33]. However, it is difficult for GNNs to effectively model the long-range dependencies (i.e., global relationships) between nodes of a deep AST.…”
Section: Introductionmentioning
confidence: 99%