Author:
Ossher Joel,Sajnani Hitesh,Lopes Cristina
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Large Scale Study of Orphan Vulnerabilities in the Software Supply Chain;Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering;2023-12-08
2. Applying the Universal Version History Concept to Help De-Risk Copy-Based Code Reuse;2023 IEEE 23rd International Working Conference on Source Code Analysis and Manipulation (SCAM);2023-10-02
3. Code2Img: Tree-Based Image Transformation for Scalable Code Clone Detection;IEEE Transactions on Software Engineering;2023-09-01
4. Using the uniqueness of global identifiers to determine the provenance of Python software source code;Empirical Software Engineering;2023-07-20
5. Comparison and Evaluation of Clone Detection Techniques with Different Code Representations;2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE);2023-05