{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T13:40:44Z","timestamp":1773063644888,"version":"3.50.1"},"reference-count":106,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T00:00:00Z","timestamp":1649376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T00:00:00Z","timestamp":1649376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s10664-021-10099-x","type":"journal-article","created":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T08:04:32Z","timestamp":1649405072000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Clones in deep learning code: what, where, and why?"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5191-9824","authenticated-orcid":false,"given":"Hadhemi","family":"Jebnoun","sequence":"first","affiliation":[]},{"given":"Md Saidur","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Foutse","family":"Khomh","sequence":"additional","affiliation":[]},{"given":"Biruk Asmare","family":"Muse","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,8]]},"reference":[{"issue":"1","key":"10099_CR1","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/TSE.2017.2658573","volume":"44","author":"J Al Dallal","year":"2017","unstructured":"Al Dallal J, Abdin A (2017) Empirical evaluation of the impact of object-oriented code refactoring on quality attributes: a systematic literature review. IEEE Trans Softw Eng 44(1):44\u201369","journal-title":"IEEE Trans Softw Eng"},{"key":"10099_CR2","doi-asserted-by":"crossref","unstructured":"Amershi S, Begel A, Bird C, DeLine R, Gall H, Kamar E, Nagappan N, Nushi B, Zimmermann T (2019) Software engineering for machine learning: a case study. In: 2019 IEEE\/ACM 41St international conference on software engineering: Software engineering in practice (ICSE-SEIP). IEEE, pp 291\u2013300","DOI":"10.1109\/ICSE-SEIP.2019.00042"},{"key":"10099_CR3","doi-asserted-by":"publisher","unstructured":"Anwar H, Pfahl D, Srirama SN (2019) Evaluating the impact of code smell refactoring on the energy consumption of android applications. In: 2019 45Th euromicro conference on software engineering and advanced applications (SEAA). https:\/\/doi.org\/10.1109\/SEAA.2019.00021, pp 82\u201386","DOI":"10.1109\/SEAA.2019.00021"},{"key":"10099_CR4","doi-asserted-by":"crossref","unstructured":"Aversano L, Cerulo L, Di Penta M (2007) How clones are maintained: an empirical study. In: 11Th european conference on software maintenance and reengineering (CSMR\u201907). IEEE, pp 81\u201390","DOI":"10.1109\/CSMR.2007.26"},{"issue":"4","key":"10099_CR5","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1007\/s11219-017-9375-5","volume":"26","author":"L Barbour","year":"2018","unstructured":"Barbour L, An L, Khomh F, Zou Y, Wang S (2018) An investigation of the fault-proneness of clone evolutionary patterns. Softw Qual J 26 (4):1187\u20131222","journal-title":"Softw Qual J"},{"key":"10099_CR6","doi-asserted-by":"crossref","unstructured":"Barbour L, Khomh F, Zou Y (2011) Late propagation in software clones. In: 2011 27Th IEEE international conference on software maintenance (ICSM). IEEE, pp 273\u2013282","DOI":"10.1109\/ICSM.2011.6080794"},{"key":"10099_CR7","doi-asserted-by":"publisher","first-page":"1139","DOI":"10.1002\/smr.1597","volume":"25","author":"L Barbour","year":"2013","unstructured":"Barbour L, Khomh F, Zou Y (2013) An empirical study of faults in late propagation clone genealogies. J Soft Evol Proc 25:1139\u20131165","journal-title":"J Soft Evol Proc"},{"issue":"1","key":"10099_CR8","first-page":"281","volume":"13","author":"J Bergstra","year":"2012","unstructured":"Bergstra J, Bengio Y (2012) Random search for hyper-parameter optimization. J Mach Learn Res 13(1):281\u2013305","journal-title":"J Mach Learn Res"},{"key":"10099_CR9","doi-asserted-by":"crossref","unstructured":"Bordes A, Chopra S, Weston J (2014) Question answering with subgraph embeddings. arXiv:1406.3676","DOI":"10.3115\/v1\/D14-1067"},{"key":"10099_CR10","unstructured":"Braiek HB, Khomh F (2019) Deepevolution: A search-based testing approach for deep neural networks. 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp 454\u2013458"},{"key":"10099_CR11","doi-asserted-by":"publisher","first-page":"110542","DOI":"10.1016\/j.jss.2020.110542","volume":"164","author":"HB Braiek","year":"2020","unstructured":"Braiek HB, Khomh F (2020) On testing machine learning programs. J Syst Softw 164:110542","journal-title":"J Syst Softw"},{"key":"10099_CR12","doi-asserted-by":"crossref","unstructured":"Braiek HB, Khomh F, Adams B (2018) The open-closed principle of modern machine learning frameworks. In: 2018 IEEE\/ACM 15Th international conference on mining software repositories (MSR). IEEE, pp 353\u2013363","DOI":"10.1145\/3196398.3196445"},{"key":"10099_CR13","doi-asserted-by":"crossref","unstructured":"Breck E, Cai S, Nielsen E, Salib M, Sculley D (2017) The ml test score: a rubric for ml production readiness and technical debt reduction. In: 2017 IEEE International conference on big data (big data). IEEE, pp 1123\u20131132","DOI":"10.1109\/BigData.2017.8258038"},{"key":"10099_CR14","doi-asserted-by":"crossref","unstructured":"Buckley FJ, Poston R (1984) Software quality assurance. IEEE Trans Softw Eng (1):36\u201341","DOI":"10.1109\/TSE.1984.5010196"},{"key":"10099_CR15","unstructured":"Chen B (2019) Berrynet deep learning gateway on raspberry pi and other edge devices. https:\/\/github.com\/DT42\/berrynet"},{"key":"10099_CR16","doi-asserted-by":"crossref","unstructured":"Chen Z, Cao Y, Liu Y, Wang H, Xie T, Liu X (2020) Understanding challenges in deploying deep learning based software: An empirical study. arXiv:2005.00760","DOI":"10.1145\/3368089.3409759"},{"key":"10099_CR17","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.infsof.2017.09.011","volume":"94","author":"Z Chen","year":"2018","unstructured":"Chen Z, Chen L, Ma W, Zhou X, Zhou Y, Xu B (2018) Understanding metric-based detectable smells in python software: a comparative study. Inf Softw Technol 94:14\u201329","journal-title":"Inf Softw Technol"},{"issue":"ARTICLE","key":"10099_CR18","first-page":"2493","volume":"12","author":"R Collobert","year":"2011","unstructured":"Collobert R, Weston J, Bottou L, Karlen M, Kavukcuoglu K, Kuksa P (2011) Natural language processing (almost) from scratch. J Mach Learn Res 12(ARTICLE):2493\u20132537","journal-title":"J Mach Learn Res"},{"key":"10099_CR19","doi-asserted-by":"crossref","unstructured":"Cordy JR, Roy CK (2011) The nicad clone detector. In: 2011 IEEE 19Th international conference on program comprehension. IEEE, pp 219\u2013220","DOI":"10.1109\/ICPC.2011.26"},{"key":"10099_CR20","unstructured":"Cordy JR, Roy CK (2019) NiCad clone detector. https:\/\/www.txl.ca\/txl-nicaddownload.html. [Online; accessed 20-February-2020]"},{"key":"10099_CR21","unstructured":"Ernst N (2019) Cliff\u2019s delta implementation. https:\/\/github.com\/neilernst\/cliffsDelta"},{"issue":"8","key":"10099_CR22","doi-asserted-by":"publisher","first-page":"1915","DOI":"10.1109\/TPAMI.2012.231","volume":"35","author":"C Farabet","year":"2012","unstructured":"Farabet C, Couprie C, Najman L, LeCun Y (2012) Learning hierarchical features for scene labeling. IEEE Trans Pattern Anal Mach Intell 35 (8):1915\u20131929","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10099_CR23","unstructured":"Fowler M, Beck K, Brant J, Opdyke W, Roberts D (1999) Refactoring: Improving the design of existing code. Addison-Wesley Professional. Berkeley"},{"key":"10099_CR24","doi-asserted-by":"crossref","unstructured":"Gode N, Harder J (2011) Clone stability. In: 2011 15Th european conference on software maintenance and reengineering. IEEE, pp 65\u201374","DOI":"10.1109\/CSMR.2011.11"},{"key":"10099_CR25","doi-asserted-by":"crossref","unstructured":"G\u00f6de N., Koschke R (2011) Frequency and risks of changes to clones. In: Proceedings of the 33rd International Conference on Software Engineering, pp 311\u2013320","DOI":"10.1145\/1985793.1985836"},{"key":"10099_CR26","unstructured":"Goodfellow I, Bengio Y, Courville A (2016) Deep Learning. MIT Press. http:\/\/www.deeplearningbook.org"},{"key":"10099_CR27","unstructured":"Gottschalk M, Josefiok M, Jelschen J, Winter A (2012) Removing energy code smells with reengineering services. Informatik"},{"key":"10099_CR28","doi-asserted-by":"crossref","unstructured":"Gupta R, Pal S, Kanade A, Shevade S (2017) Deepfix: Fixing common c language errors by deep learning. In: Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, pp 1345\u20131351","DOI":"10.1609\/aaai.v31i1.10742"},{"key":"10099_CR29","unstructured":"Hadhemii (2019) DLCOdesmells. https:\/\/github.com\/hadhemii\/DLCodesmells\/blob\/master\/data\/dlrepos.csv"},{"key":"10099_CR30","doi-asserted-by":"publisher","first-page":"2019","DOI":"10.1016\/j.promfg.2015.07.249","volume":"3","author":"S Hamdan","year":"2015","unstructured":"Hamdan S, Alramouni S (2015) A quality framework for software continuous integration. Procedia Manuf 3:2019\u20132025","journal-title":"Procedia Manuf"},{"key":"10099_CR31","doi-asserted-by":"crossref","unstructured":"Han J, Shihab E, Wan Z, Deng S, Xia X (2020) What do programmers discuss about deep learning frameworks. Empirical Software Engineering","DOI":"10.1007\/s10664-020-09819-6"},{"issue":"1","key":"10099_CR32","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/asmb.2209","volume":"33","author":"JB Heaton","year":"2017","unstructured":"Heaton JB, Polson NG, Witte JH (2017) Deep learning for finance: deep portfolios. Appl Stoch Model Bus Ind 33(1):3\u201312","journal-title":"Appl Stoch Model Bus Ind"},{"issue":"6","key":"10099_CR33","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2012.2205597","volume":"29","author":"G Hinton","year":"2012","unstructured":"Hinton G, Deng L, Yu D, Dahl GE, Mohamed AR, Jaitly N, Senior A, Vanhoucke V, Nguyen P, Sainath TN et al (2012) Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal Process Mag 29(6):82\u201397","journal-title":"IEEE Signal Process Mag"},{"key":"10099_CR34","doi-asserted-by":"crossref","unstructured":"Hotta K, Sano Y, Higo Y, Kusumoto S (2010) Is duplicate code more frequently modified than non-duplicate code in software evolution? an empirical study on open source software. In: Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE), pp 73\u201382","DOI":"10.1145\/1862372.1862390"},{"key":"10099_CR35","doi-asserted-by":"crossref","unstructured":"Islam JF, Mondal M, Roy CK (2016) Bug replication in code clones: an empirical study. In: 2016 IEEE 23Rd international conference on software analysis, evolution, and reengineering (SANER), vol 1. IEEE, pp 68\u201378","DOI":"10.1109\/SANER.2016.78"},{"key":"10099_CR36","doi-asserted-by":"crossref","unstructured":"Islam JF, Mondal M, Roy CK, Schneider KA (2017) A comparative study of software bugs in clone and non-clone code. In: SEKE, pp 436\u2013443","DOI":"10.18293\/SEKE2017-056"},{"key":"10099_CR37","doi-asserted-by":"crossref","unstructured":"Islam MJ, Nguyen G, Pan R, Rajan H (2019) A comprehensive study on deep learning bug characteristics. arXiv:1906.01388","DOI":"10.1145\/3338906.3338955"},{"key":"10099_CR38","unstructured":"Jebnoun H (2020) 6dlreposdata. https:\/\/github.com\/hadhemii\/clonesinDLCode\/blob\/master\/data\/6DLReposdata.csv"},{"key":"10099_CR39","doi-asserted-by":"crossref","unstructured":"Jebnoun H (2020) Clones in deep learning code. https:\/\/github.com\/Hadhemii\/ClonesInDLCode","DOI":"10.1145\/3379597.3387479"},{"key":"10099_CR40","doi-asserted-by":"crossref","unstructured":"Jebnoun H, Ben Braiek H, Rahman MM, Khomh F (2020) The scent of deep learning code: an empirical study. In: Proceedings of the 17th International Conference on Mining Software Repositories, pp 1\u201311","DOI":"10.1145\/3379597.3387479"},{"key":"10099_CR41","doi-asserted-by":"crossref","unstructured":"Jiang L, Su Z, Chiu E (2007) Context-based detection of clone-related bugs. In: Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, pp 55\u201364","DOI":"10.1145\/1287624.1287634"},{"key":"10099_CR42","doi-asserted-by":"crossref","unstructured":"Juergens E, Deissenboeck F, Hummel B, Wagner S (2009) Do code clones matter?. In: 2009 IEEE 31St international conference on software engineering. IEEE, pp 485\u2013495","DOI":"10.1109\/ICSE.2009.5070547"},{"key":"10099_CR43","first-page":"107","volume":"16","author":"C Kapser","year":"2003","unstructured":"Kapser C, Godfrey MW (2003) Toward a taxonomy of clones in source code: a case study. Evol Large Scale Indust Softw Architect 16:107\u2013113","journal-title":"Evol Large Scale Indust Softw Architect"},{"issue":"6","key":"10099_CR44","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/s10664-008-9076-6","volume":"13","author":"CJ Kapser","year":"2008","unstructured":"Kapser CJ, Godfrey MW (2008) \u201ccloning considered harmful\u201d considered harmful: patterns of cloning in software. Empir Softw Eng 13(6):645","journal-title":"Empir Softw Eng"},{"key":"10099_CR45","doi-asserted-by":"crossref","unstructured":"Kery MB, Radensky M, Arya M, John BE, Myers BA (2018) The story in the notebook: Exploratory data science using a literate programming tool. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp 1\u201311","DOI":"10.1145\/3173574.3173748"},{"key":"10099_CR46","doi-asserted-by":"crossref","unstructured":"Kim M, Sazawal V, Notkin D, Murphy G (2005) An empirical study of code clone genealogies. In: Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering, pp 187\u2013196","DOI":"10.1145\/1081706.1081737"},{"key":"10099_CR47","doi-asserted-by":"crossref","unstructured":"Kim S, Whitehead Jr EJ (2006) How long did it take to fix bugs?. In: Proceedings of the 2006 international workshop on Mining software repositories, pp 173\u2013174","DOI":"10.1145\/1137983.1138027"},{"key":"10099_CR48","doi-asserted-by":"crossref","unstructured":"Koenzen A, Ernst N, Storey MA (2020) Code duplication and reuse in jupyter notebooks. arXiv:2005.13709","DOI":"10.1109\/VL\/HCC50065.2020.9127202"},{"key":"10099_CR49","unstructured":"Koschke R (2007) Survey of research on software clones. In: Dagstuhl seminar proceedings. Schloss dagstuhl-leibniz-zentrum f\u00fcr informatik"},{"key":"10099_CR50","doi-asserted-by":"crossref","unstructured":"Krinke J (2011) Is cloned code older than non-cloned code?. In: Proceedings of the 5th International Workshop on Software Clones, pp 28\u201333","DOI":"10.1145\/1985404.1985410"},{"key":"10099_CR51","doi-asserted-by":"crossref","unstructured":"Kumlander D (2010) Towards a new paradigm of software development: an ambassador driven process in distributed software companies. In: Advanced techniques in computing sciences and software engineering. Springer, pp 487\u2013490","DOI":"10.1007\/978-90-481-3660-5_84"},{"key":"10099_CR52","unstructured":"LeCun Y, Boser BE, Denker JS, Henderson D, Howard RE, Hubbard WE, Jackel LD (1990) Handwritten digit recognition with a back-propagation network. In: Advances in neural information processing systems, pp 396\u2013404"},{"issue":"11","key":"10099_CR53","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278\u20132324","journal-title":"Proc IEEE"},{"key":"10099_CR54","doi-asserted-by":"crossref","unstructured":"Li J, Ernst MD (2012) CBCD: Cloned Buggy code detector. In: Proceedings of ICSE, pp 310\u2013320","DOI":"10.1109\/ICSE.2012.6227183"},{"key":"10099_CR55","unstructured":"Li X, Jiang H, Ren Z, Li G, Zhang J (2018) Deep learning in software engineering. arXiv:1805.04825"},{"key":"10099_CR56","first-page":"176","volume":"32","author":"Z Li","year":"2006","unstructured":"Li Z, Lu S, Myagmar S, Zhou Y (2006) CP-Miner: Finding copy-paste and related bugs in large-scale software code. IEEE TSE 32:176\u2013192","journal-title":"IEEE TSE"},{"key":"10099_CR57","unstructured":"Liu J, Huang Q, Xia X, Shihab E, Lo D, Li S (2020) Is using deep learning frameworks free? characterizing technical debt in deep learning frameworks. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering: Software Engineering in Society, pp 1\u201310"},{"key":"10099_CR58","doi-asserted-by":"crossref","unstructured":"Lozano A, Wermelinger M (2008) Assessing the effect of clones on changeability. In: Proceedings of ICSM, pp 227\u2013236","DOI":"10.1109\/ICSM.2008.4658071"},{"key":"10099_CR59","doi-asserted-by":"crossref","unstructured":"Lozano A, Wermelinger M (2010) Tracking clones\u2019 imprint. In: Proceedings of the 4th International Workshop on Software Clones, pp 65\u201372","DOI":"10.1145\/1808901.1808910"},{"issue":"2","key":"10099_CR60","doi-asserted-by":"publisher","first-page":"545","DOI":"10.11144\/Javeriana.upsy10-2.cdcp","volume":"10","author":"G Macbeth","year":"2011","unstructured":"Macbeth G, Razumiejczyk E, Ledesma RD (2011) Cliff\u2019s delta calculator: a non-parametric effect size program for two groups of observations. Univ Psychol 10(2):545\u2013555","journal-title":"Univ Psychol"},{"issue":"6","key":"10099_CR61","doi-asserted-by":"publisher","first-page":"1236","DOI":"10.1093\/bib\/bbx044","volume":"19","author":"R Miotto","year":"2018","unstructured":"Miotto R, Wang F, Wang S, Jiang X, Dudley JT (2018) Deep learning for healthcare: review, opportunities and challenges. Brief Bioinf 19(6):1236\u20131246","journal-title":"Brief Bioinf"},{"issue":"2","key":"10099_CR62","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1007\/s10664-017-9528-y","volume":"23","author":"M Mondal","year":"2018","unstructured":"Mondal M, Rahman MS, Roy CK, Schneider KA (2018) Is cloned code really stable?. Empir Softw Engg 23(2):693\u2013770","journal-title":"Empir Softw Engg"},{"key":"10099_CR63","doi-asserted-by":"crossref","unstructured":"Mondal M, Roy B, Roy CK, Schneider KA (2019) Investigating context adaptation bugs in code clones. In: 2019 IEEE International conference on software maintenance and evolution (ICSME), pp 157\u2013168","DOI":"10.1109\/ICSME.2019.00026"},{"key":"10099_CR64","doi-asserted-by":"crossref","unstructured":"Mondal M, Roy CK, Rahman MS, Saha RK, Krinke J, Schneider KA (2012) Comparative stability of cloned and non-cloned code: an empirical study. In: Proceedings of ACM SAC, pp 1227\u20131234","DOI":"10.1145\/2245276.2231969"},{"key":"10099_CR65","doi-asserted-by":"crossref","unstructured":"Mondal M, Roy CK, Schneider KA (2015) A comparative study on the bug-proneness of different types of code clones. In: 2015 IEEE International conference on software maintenance and evolution (ICSME), pp 91\u2013100","DOI":"10.1109\/ICSM.2015.7332455"},{"key":"10099_CR66","doi-asserted-by":"crossref","unstructured":"Mondal M, Roy CK, Schneider KA (2017) Does cloned code increase maintenance effort?. In: 2017 IEEE 11Th international workshop on software clones (IWSC). IEEE, pp 1\u20137","DOI":"10.1109\/IWSC.2017.7880507"},{"key":"10099_CR67","doi-asserted-by":"crossref","unstructured":"Munappy A, Bosch J, Olsson HH, Arpteg A, Brinne B (2019) Data management challenges for deep learning. In: 2019 45Th euromicro conference on software engineering and advanced applications (SEAA). IEEE, pp 140\u2013147","DOI":"10.1109\/SEAA.2019.00030"},{"key":"10099_CR68","doi-asserted-by":"publisher","unstructured":"Neuh\u00e4user M (2011) Wilcoxon\u2013Mann\u2013Whitney Test. Springer, Berlin, pp 1656\u20131658. https:\/\/doi.org\/10.1007\/978-3-642-04898-2_615","DOI":"10.1007\/978-3-642-04898-2_615"},{"issue":"9","key":"10099_CR69","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1049\/iet-its.2018.0064","volume":"12","author":"H Nguyen","year":"2018","unstructured":"Nguyen H, Kieu LM, Wen T, Cai C (2018) Deep learning methods in transportation domain: a review. IET Intell Transp Syst 12(9):998\u20131004","journal-title":"IET Intell Transp Syst"},{"key":"10099_CR70","unstructured":"Pasumarthi RK, Bruch S, Wang X, Li C, Bendersky M, Najork M, Pfeifer J, Golbandi N, Anil R, Wolf S (2019) Tensorflow ranking. https:\/\/github.com\/tensorflow\/ranking"},{"key":"10099_CR71","doi-asserted-by":"crossref","unstructured":"Pimentel JF, Murta L, Braganholo V, Freire J (2019) A large-scale study about quality and reproducibility of jupyter notebooks. In: 2019 IEEE\/ACM 16Th international conference on mining software repositories (MSR). IEEE, pp 507\u2013517","DOI":"10.1109\/MSR.2019.00077"},{"key":"10099_CR72","unstructured":"Psallidas F, Zhu Y, Karlas B, Interlandi M, Floratou A, Karanasos K, Wu W, Zhang C, Krishnan S, Curino C et al (2019) Data science through the looking glass and what we found there. arXiv:1912.09536"},{"issue":"4-5","key":"10099_CR73","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s10664-011-9195-3","volume":"17","author":"F Rahman","year":"2012","unstructured":"Rahman F, Bird C, Devanbu P (2012) Clones: What is that smell? Empir Softw Eng 17(4-5):503\u2013530","journal-title":"Empir Softw Eng"},{"key":"10099_CR74","doi-asserted-by":"crossref","unstructured":"Rahman MS, Roy CK (2014) A change-type based empirical study on the stability of cloned code. In: Proceedings of SCAM, pp 31\u201340","DOI":"10.1109\/SCAM.2014.13"},{"key":"10099_CR75","doi-asserted-by":"crossref","unstructured":"Rahman MS, Roy CK (2017) On the relationships between stability and bug-proneness of code clones: an empirical study. In: Proceedings of SCAM, pp 131\u2013140","DOI":"10.1109\/SCAM.2017.26"},{"issue":"1","key":"10099_CR76","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.cels.2016.01.009","volume":"2","author":"L Rampasek","year":"2016","unstructured":"Rampasek L, Goldenberg A (2016) Tensorflow: Biology\u2019s gateway to deep learning? Cell Syst 2(1):12\u201314","journal-title":"Cell Syst"},{"key":"10099_CR77","doi-asserted-by":"crossref","unstructured":"Redmon J, Divvala S, Girshick R, Farhadi A (2016) You only look once: Unified, real-time object detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 779\u2013788","DOI":"10.1109\/CVPR.2016.91"},{"issue":"6","key":"10099_CR78","first-page":"197","volume":"9","author":"S Rochimah","year":"2015","unstructured":"Rochimah S, Arifiani S, Insanittaqwa VF (2015) Non-source code refactoring: a systematic literature review. Int J Softw Eng Appl 9(6):197\u2013214","journal-title":"Int J Softw Eng Appl"},{"key":"10099_CR79","doi-asserted-by":"crossref","unstructured":"Rosen C, Grawi B, Shihab E (2015) Commit guru: analytics and risk prediction of software commits. In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering. ACM, pp 966\u2013969","DOI":"10.1145\/2786805.2803183"},{"issue":"115","key":"10099_CR80","first-page":"64","volume":"541","author":"CK Roy","year":"2007","unstructured":"Roy CK, Cordy JR (2007) A survey on software clone detection research. Queen\u2019s School Comput TR 541(115):64\u201368","journal-title":"Queen\u2019s School Comput TR"},{"key":"10099_CR81","doi-asserted-by":"crossref","unstructured":"Roy CK, Cordy JR (2008) Nicad: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In: 2008 16Th iEEE international conference on program comprehension. IEEE, pp 172\u2013181","DOI":"10.1109\/ICPC.2008.41"},{"key":"10099_CR82","doi-asserted-by":"crossref","unstructured":"Roy CK, Cordy JR (2009) A mutation\/injection-based automatic framework for evaluating code clone detection tools. In: 2009 International conference on software testing, verification, and validation workshops. IEEE, pp 157\u2013166","DOI":"10.1109\/ICSTW.2009.18"},{"issue":"3","key":"10099_CR83","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1002\/smr.416","volume":"22","author":"CK Roy","year":"2010","unstructured":"Roy CK, Cordy JR (2010) Near-miss function clones in open source software: an empirical study. J Softw Mainten Evol Res Practice 22(3):165\u2013189","journal-title":"J Softw Mainten Evol Res Practice"},{"key":"10099_CR84","doi-asserted-by":"crossref","unstructured":"Roy CK, Zibran MF, Koschke R (2014) The vision of software clone management: past, present, and future (keynote paper). In: Proceedings of CSMR-WCRE, pp 18\u201333","DOI":"10.1109\/CSMR-WCRE.2014.6747168"},{"key":"10099_CR85","doi-asserted-by":"crossref","unstructured":"Sainath TN, Mohamed AR, Kingsbury B, Ramabhadran B (2013) Deep convolutional neural networks for lvcsr. In: 2013 IEEE International conference on acoustics, speech and signal processing. IEEE, pp 8614\u20138618","DOI":"10.1109\/ICASSP.2013.6639347"},{"issue":"4","key":"10099_CR86","doi-asserted-by":"publisher","first-page":"2232","DOI":"10.1007\/s10664-017-9572-7","volume":"23","author":"V Saini","year":"2018","unstructured":"Saini V, Sajnani H, Lopes C (2018) Cloned and non-cloned java methods: A comparative study. Empir Softw Engg 23(4):2232\u20132278. https:\/\/doi.org\/10.1007\/s10664-017-9572-7","journal-title":"Empir Softw Engg"},{"key":"10099_CR87","doi-asserted-by":"crossref","unstructured":"Sajnani H, Saini V, Lopes CV (2014) A comparative study of bug patterns in java cloned and non-cloned code. In: 2014 IEEE 14Th international working conference on source code analysis and manipulation. IEEE, pp 21\u201330","DOI":"10.1109\/SCAM.2014.12"},{"key":"10099_CR88","unstructured":"Samek W, Wiegand T, M\u00fcller KR (2017) Explainable artificial intelligence: Understanding, visualizing and interpreting deep learning models. arXiv:1708.08296"},{"key":"10099_CR89","unstructured":"Sculley D, Holt G, Golovin D, Davydov E, Phillips T, Ebner D, Chaudhary V, Young M, Crespo JF, Dennison D (2015) Hidden technical debt in machine learning systems. In: Cortes C, Lawrence ND, Lee DD, Sugiyama M, Garnett R (eds) Advances in Neural Information Processing Systems. http:\/\/papers.nips.cc\/paper\/5656-hidden-technical-debt-in-machine-learning-systems.pdf, vol 28. Curran Associates, Inc., pp 2503\u20132511"},{"key":"10099_CR90","doi-asserted-by":"crossref","unstructured":"Selim GM, Barbour L, Shang W, Adams B, Hassan AE, Zou Y (2010) Studying the impact of clones on software defects. In: 2010 17Th working conference on reverse engineering. IEEE, pp 13\u201321","DOI":"10.1109\/WCRE.2010.11"},{"issue":"7525","key":"10099_CR91","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1038\/515151a","volume":"515","author":"H Shen","year":"2014","unstructured":"Shen H (2014) Interactive notebooks: Sharing the code. Nature 515 (7525):151\u2013152","journal-title":"Nature"},{"key":"10099_CR92","doi-asserted-by":"publisher","unstructured":"Spadini D, Aniche M, Bacchelli A (2018) PyDriller: Python Framework for Mining Software Repositories. https:\/\/doi.org\/10.1145\/3236024.3264598","DOI":"10.1145\/3236024.3264598"},{"key":"10099_CR93","doi-asserted-by":"crossref","unstructured":"Suryanarayana G, Samarthyam G, Sharma T (2014) Refactoring for software design smells: managing technical debt. Morgan Kaufmann","DOI":"10.1016\/B978-0-12-801397-7.00001-1"},{"key":"10099_CR94","doi-asserted-by":"crossref","unstructured":"Svajlenko J, Roy CK (2014) Evaluating modern clone detection tools. In: 2014 IEEE International conference on software maintenance and evolution. IEEE, pp 321\u2013330","DOI":"10.1109\/ICSME.2014.54"},{"key":"10099_CR95","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2818\u20132826","DOI":"10.1109\/CVPR.2016.308"},{"key":"10099_CR96","unstructured":"Tompson JJ, Jain A, LeCun Y, Bregler C (2014) Joint training of a convolutional network and a graphical model for human pose estimation. In: Advances in neural information processing systems, pp 1799\u20131807"},{"key":"10099_CR97","unstructured":"Vetro A, Ardito L, Morisio M (2013) Definition implementation and validation of energy code smells: an exploratory study on an embedded system"},{"key":"10099_CR98","doi-asserted-by":"crossref","unstructured":"Wagner S, Abdulkhaleq A, Kaya K, Paar A (2016) On the relationship of inconsistent software clones and faults: an empirical study. In: Proceedings of SANER, pp 79\u201389","DOI":"10.1109\/SANER.2016.94"},{"key":"10099_CR99","doi-asserted-by":"crossref","unstructured":"Wan Z, Xia X, Lo D, Murphy GC (2019) How does machine learning change software development practices? IEEE Transactions on Software Engineering","DOI":"10.1109\/TSE.2019.2937083"},{"key":"10099_CR100","doi-asserted-by":"crossref","unstructured":"Wang T, Harman M, Jia Y, Krinke J (2013) Searching for better configurations: a rigorous approach to clone evaluation. In: Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, pp 455\u2013465","DOI":"10.1145\/2491411.2491420"},{"key":"10099_CR101","unstructured":"Weill C, Gonzalvo J, Kuznetsov V, Yang S, Yak S, Mazzawi H, Hotaj E, Jerfel G, Macko V, Adlam B, Mohri M, Cortes C (2019) Adanet. https:\/\/github.com\/tensorflow\/adanet"},{"key":"10099_CR102","unstructured":"Wheeler DA (2004) SLOCCount. https:\/\/dwheeler.com\/sloccount\/. [Online; accessed 19-May-2020]"},{"key":"10099_CR103","doi-asserted-by":"crossref","unstructured":"White M, Tufano M, Vendome C, Poshyvanyk D (2016) Deep learning code fragments for code clone detection. In: 2016 31St IEEE\/ACM international conference on automated software engineering (ASE). IEEE, pp 87\u201398","DOI":"10.1145\/2970276.2970326"},{"key":"10099_CR104","unstructured":"Zhang JM, Harman M, Ma L, Liu Y (2020) Machine learning testing: survey, landscapes and horizons. IEEE Transactions on Software Engineering"},{"key":"10099_CR105","unstructured":"Zhang X, Yang Y, Feng Y, Chen Z (2019) Software engineering practice in the development of deep learning applications. arXiv:1910.03156"},{"key":"10099_CR106","doi-asserted-by":"crossref","unstructured":"Zhang Y, Chen Y, Cheung SC, Xiong Y, Zhang L (2018) An empirical study on tensorflow program bugs. In: Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM, pp 129\u2013140","DOI":"10.1145\/3213846.3213866"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-10099-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-021-10099-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-10099-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T20:13:42Z","timestamp":1700424822000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-021-10099-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,8]]},"references-count":106,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["10099"],"URL":"https:\/\/doi.org\/10.1007\/s10664-021-10099-x","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,8]]},"assertion":[{"value":"1 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}],"article-number":"84"}}