{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:54:50Z","timestamp":1742914490696,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811619267"},{"type":"electronic","value":"9789811619274"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-1927-4_6","type":"book-chapter","created":{"date-parts":[[2021,8,3]],"date-time":"2021-08-03T05:02:40Z","timestamp":1627966960000},"page":"75-89","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CCLearner: Clone Detection via Deep Learning"],"prefix":"10.1007","author":[{"given":"Liuqing","family":"Li","sequence":"first","affiliation":[]},{"given":"He","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Na","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Barbara","family":"Ryder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,4]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"T.\u00a0Kamiya, S.\u00a0Kusumoto, K.\u00a0Inoue, CCFinder: a multilinguistic token-based code clone detection system for large scale source code, in TSE, pp. 654\u2013670 (2002)","DOI":"10.1109\/TSE.2002.1019480"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"L.\u00a0Jiang, G.\u00a0Misherghi, Z.\u00a0Su, S.\u00a0Glondu, DECKARD: scalable and accurate tree-based detection of code clones, in ICSE (2007), pp. 96\u2013105. http:\/\/dx.doi.org\/10.1109\/ICSE.2007.30","DOI":"10.1109\/ICSE.2007.30"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"C.K. Roy, J.R. Cordy, NICAD: accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization, in ICPC 2008. The 16th IEEE International Conference on Program Comprehension, 2008, vol.\u00a00. (Los Alamitos, CA, USA: IEEE, June 2008), pp. 172\u2013181. http:\/\/dx.doi.org\/10.1109\/icpc.2008.41","DOI":"10.1109\/ICPC.2008.41"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"N.\u00a0G\u00f6de, R.\u00a0Koschke, Incremental clone detection, in CSMR \u201909. 13th European Conference on Software Maintenance and Reengineering, 2009 (2009)","DOI":"10.1109\/CSMR.2009.20"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"H.\u00a0Sajnani, V.\u00a0Saini, J.\u00a0Svajlenko, C.K. Roy, C.V. Lopes, SourcererCC: scaling code clone detection to big code, in CoRR, vol. abs\/1512.06448 (2015)","DOI":"10.1145\/2884781.2884877"},{"key":"6_CR6","unstructured":"T.\u00a0Apiwattanapong, A.\u00a0Orso, M.J. Harrold, A differencing algorithm for object-oriented programs, in Proceedings of the 19th IEEE International Conference on Automated Software Engineering (2004)"},{"issue":"3","key":"6_CR7","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.scico.2006.04.002","volume":"61","author":"JR Cordy","year":"2006","unstructured":"J.R. Cordy, The txl source transformation language. Sci. Comput. Program. 61(3), 190\u2013210 (2006)","journal-title":"Sci. Comput. Program."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"L. Li, H. Feng, W. Zhuang, N. Meng, B. Ryder, Cclearner: A deep learning-based clone detection approach, in IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 249\u2013260 (2017)","DOI":"10.1109\/ICSME.2017.46"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"J.\u00a0Svajlenko, J.F. Islam, I.\u00a0Keivanloo, C.K. Roy, M.M. Mia, Towards a big data curated benchmark of inter-project code clones, in 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29\u2013October 3, 2014 (2014)","DOI":"10.1109\/ICSME.2014.77"},{"key":"6_CR10","unstructured":"B.\u00a0K\u00e9gl, The return of adaboost.mh: multi-class hamming trees, in CoRR, vol. abs\/1312.6086 (2013). http:\/\/arxiv.org\/abs\/1312.6086"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"J.R. Quinlan, Induction of decision trees. Mach. Learn. (1986)","DOI":"10.1007\/BF00116251"},{"key":"6_CR12","unstructured":"S.J. Russell, P.\u00a0Norvig, Artificial Intelligence: A Modern Approach, 2nd\u00a0ed.\u00a0(Pearson Education, 2003)"},{"key":"6_CR13","unstructured":"T.K. Ho, Random decision forests, in Proceedings of the Third International Conference on Document Analysis and Recognition (Volume 1)  (vol. 1) (1995)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"C. Cortes, V. Vapnik, Support-vector networks. Mach. Learn. (1995)","DOI":"10.1007\/BF00994018"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"K.\u00a0Fukushima, Neocognitron: a self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position, in Biological Cybernetics, vol.\u00a036, no.\u00a04 (1980), pp. 193\u2013202. http:\/\/dx.doi.org\/10.1007\/BF00344251","DOI":"10.1007\/BF00344251"},{"key":"6_CR16","unstructured":"\u201cIntroduction to deep neural networks,\u201d https:\/\/deeplearning4j.org\/neuralnet-overview. Accessed 15 Feb 2017"},{"key":"6_CR17","unstructured":"\u201cANTLR\u201d http:\/\/www.antlr.org\/. Accessed 03 Dec 2020"},{"key":"6_CR18","unstructured":"\u201cUse JDT ASTParser to Parse Single .java files. http:\/\/www.programcreek.com\/2011\/11\/use-jdt-astparser-to-parse-java-file\/. Accessed 03 Dec 2020"},{"key":"6_CR19","unstructured":"Deeplearning4j. http:\/\/deeplearning4j.org\/. Accessed 03 Dec 2020"},{"key":"6_CR20","unstructured":"Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management. (Wiley Publishing, 2011)"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"S. Bellon, R. Koschke, G. Antoniol, J. Krinke, E. Merlo, Comparison and evaluation of clone detection tools. IEEE Trans. Softw. Eng. 33(9), 577\u2013591 (2007)","DOI":"10.1109\/TSE.2007.70725"},{"key":"6_CR22","unstructured":"BigCloneBench. https:\/\/github.com\/clonebench\/BigCloneBench#era-updated. Accessed 03 Dec 2020"},{"key":"6_CR23","unstructured":"M.\u00a0Herlihy, N.\u00a0Shavit, The Art of Multiprocessor Programming.\u00a0(Morgan Kaufmann Publishers Inc., 2008)"},{"key":"6_CR24","unstructured":"Weka 3\u2014data mining with open source machine learning software in java. https:\/\/www.cs.waikato.ac.nz\/ml\/weka\/. Accessed 03 Dec 2020"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"M.\u00a0White, M.\u00a0Tufano, C.\u00a0Vendome, D.\u00a0Poshyvanyk, Deep learning code fragments for code clone detection, in Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering (2016)","DOI":"10.1145\/2970276.2970326"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"G.\u00a0Zhao, J.\u00a0Huang, Deepsim: deep learning code functional similarity, in Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ser. ESEC\/FSE 2018.\u00a0\u00a0\u00a0New York, NY, USA: Association for Computing Machinery (2018), pp. 141\u2013151. https:\/\/doi.org\/10.1145\/3236024.3236068","DOI":"10.1145\/3236024.3236068"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"L.\u00a0B\u00fcch, A.\u00a0Andrzejak, Learning-based recursive aggregation of abstract syntax trees for code clone detection, in 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER) (2019), pp. 95\u2013104","DOI":"10.1109\/SANER.2019.8668039"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"H.\u00a0Yu, W.\u00a0Lam, L.\u00a0Chen, G.\u00a0Li, T.\u00a0Xie, Q.\u00a0Wang, Neural detection of semantic code clones via tree-based convolution, in 2019 IEEE\/ACM 27th International Conference on Program Comprehension (ICPC) (2019), pp. 70\u201380","DOI":"10.1109\/ICPC.2019.00021"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Z. Gao, V. Jayasundara, L. Jiang, X. Xia, D. Lo, J. Grundy, Smartembed: A tool for clone and bug detection in smart contracts through structural code embedding, in IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 394\u2013397 (2019)","DOI":"10.1109\/ICSME.2019.00067"},{"key":"6_CR30","volume-title":"Recurrent Neural Networks: Design and Applications","author":"LC Jain","year":"1999","unstructured":"L.C. Jain, L.R. Medsker, Recurrent Neural Networks: Design and Applications, 1st edn. (CRC Press Inc, USA, 1999)","edition":"1"},{"key":"6_CR31","unstructured":"C.\u00a0Goller, A.\u00a0Kuchler, Learning task-dependent distributed representations by backpropagation through structure, in Proceedings of International Conference on Neural Networks (ICNN\u201996), vol.\u00a01 (1996), pp. 347\u2013352"},{"key":"6_CR32","unstructured":"K.\u00a0O\u2019Shea, R.\u00a0Nash, An introduction to convolutional neural networks, in CoRR, vol. abs\/1511.08458 (2015). http:\/\/arxiv.org\/abs\/1511.08458"}],"container-title":["Code Clone Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-1927-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T04:57:20Z","timestamp":1633928240000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-1927-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811619267","9789811619274"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-1927-4_6","relation":{},"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"4 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}