Software clone detection: A systematic review

D Rattan, R Bhatia, M Singh - Information and Software Technology, 2013 - Elsevier
CONTEXT: Reusing software by means of copy and paste is a frequent activity in software
development. The duplicated code is known as a software clone and the activity is known as …

A systematic literature review on bad smells–5 w's: which, when, what, who, where

EV de Paulo Sobrinho, A De Lucia… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Bad smells are sub-optimal code structures that may represent problems needing attention.
We conduct an extensive literature review on bad smells relying on a large body of …

Deep learning code fragments for code clone detection

M White, M Tufano, C Vendome… - Proceedings of the 31st …, 2016 - dl.acm.org
Code clone detection is an important problem for software maintenance and evolution. Many
approaches consider either structure or identifiers, but none of the existing detection …

Aroma: Code recommendation via structural code search

S Luan, D Yang, C Barnaby, K Sen… - Proceedings of the ACM …, 2019 - dl.acm.org
Programmers often write code that has similarity to existing code written somewhere. A tool
that could help programmers to search such similar code would be immensely useful. Such …

Neural detection of semantic code clones via tree-based convolution

H Yu, W Lam, L Chen, G Li, T Xie… - 2019 IEEE/ACM 27th …, 2019 - ieeexplore.ieee.org
Code clones are similar code fragments that share the same semantics but may differ
syntactically to various degrees. Detecting code clones helps reduce the cost of software …

Wukong: A scalable and accurate two-phase approach to android app clone detection

H Wang, Y Guo, Z Ma, X Chen - … of the 2015 international symposium on …, 2015 - dl.acm.org
Repackaged Android applications (app clones) have been found in many third-party
markets, which not only compromise the copyright of original authors, but also pose threats …

CCAligner: a token based large-gap clone detector

P Wang, J Svajlenko, Y Wu, Y Xu, CK Roy - Proceedings of the 40th …, 2018 - dl.acm.org
Copying code and then pasting with large number of edits is a common activity in software
development, and the pasted code is a kind of complicated Type-3 clone. Due to large …

FaCoY: a code-to-code search engine

K Kim, D Kim, TF Bissyandé, E Choi, L Li… - Proceedings of the 40th …, 2018 - dl.acm.org
Code search is an unavoidable activity in software development. Various approaches and
techniques have been explored in the literature to support code search tasks. Most of these …

Learning to spot and refactor inconsistent method names

K Liu, D Kim, TF Bissyandé, T Kim… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
To ensure code readability and facilitate software maintenance, program methods must be
named properly. In particular, method names must be consistent with the corresponding …

Juxtapp: A scalable system for detecting code reuse among android applications

S Hanna, L Huang, E Wu, S Li, C Chen… - Detection of Intrusions and …, 2013 - Springer
Mobile application markets such as the Android Marketplace provide a centralized
showcase of applications that end users can purchase or download for free onto their mobile …