Author:
Avetisyan Arutyun,Kurmangaleev Shamil,Sargsyan Sevak,Arutunian Mariam,Belevantsev Andrey
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search;2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P);2024-07-08
2. A systematic literature review on source code similarity measurement and clone detection: Techniques, applications, and challenges;Journal of Systems and Software;2023-10
3. AYAT: A Lightweight and Efficient Code Clone Detection Technique;2022 3rd Asia Conference on Computers and Communications (ACCC);2022-12
4. Binary Similarity Analysis for Vulnerability Detection;2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC);2020-07
5. JSidentify;Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering: Software Engineering in Practice;2020-06-27