{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T19:49:29Z","timestamp":1769629769587,"version":"3.49.0"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"National Grand Research and Development Plan","award":["2018YFB1004202"],"award-info":[{"award-number":["2018YFB1004202"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61432020"],"award-info":[{"award-number":["61432020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Laboratory of Software Engineering for Complex Systems"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2940710","type":"journal-article","created":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T19:58:36Z","timestamp":1568318316000},"page":"131270-131281","source":"Crossref","is-referenced-by-count":17,"title":["A Large-Gap Clone Detection Approach Using Sequence Alignment via Dynamic Parameter Optimization"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1757-8944","authenticated-orcid":false,"given":"Jinze","family":"Liu","sequence":"first","affiliation":[{"name":"Science and Technology on Parallel and Distributed Processing Laboratory, College of Computer, National University of Defense Technology, Changsha, China"}]},{"given":"Tao","family":"Wang","sequence":"additional","affiliation":[{"name":"Science and Technology on Parallel and Distributed Processing Laboratory, College of Computer, National University of Defense Technology, Changsha, China"}]},{"given":"Chenhui","family":"Feng","sequence":"additional","affiliation":[{"name":"Science and Technology on Parallel and Distributed Processing Laboratory, College of Computer, National University of Defense Technology, Changsha, China"}]},{"given":"Huaimin","family":"Wang","sequence":"additional","affiliation":[{"name":"Science and Technology on Parallel and Distributed Processing Laboratory, College of Computer, National University of Defense Technology, Changsha, China"}]},{"given":"Dongsheng","family":"Li","sequence":"additional","affiliation":[{"name":"Science and Technology on Parallel and Distributed Processing Laboratory, College of Computer, National University of Defense Technology, Changsha, China"}]}],"member":"263","reference":[{"key":"ref39","first-page":"439","article-title":"Program slicing","author":"weiser","year":"1981","journal-title":"5th Int Conf on Software Engineering"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref33","first-page":"32","article-title":"Visualizing textual redundancy in legacy source","author":"johnson","year":"1994","journal-title":"Proc Conf Centre Adv Studies Collaborative Res"},{"key":"ref32","first-page":"171","article-title":"Identifying redundancy in source code using fingerprints","author":"johnson","year":"1993","journal-title":"Proc Conf Centre Adv Studies Collaborative Res Softw Eng"},{"key":"ref31","author":"group","year":"2013","journal-title":"IJaDataset 2 0"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332459"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47764-0_3"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/997817.997857"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.28"},{"key":"ref34","first-page":"289","article-title":"CP-miner: A tool for finding copy-paste and related bugs in operating system code","volume":"4","author":"li","year":"2004","journal-title":"Proc OSDI"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3133908"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792593"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2009.20"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.41"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.26"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(81)90087-5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/322033.322044"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.37"},{"key":"ref27","first-page":"1","article-title":"The truth of the F-measure","volume":"1","author":"sasaki","year":"2007","journal-title":"Teach Tutor Mater"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.14"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.54"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.19"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.77"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1002\/smr.416","article-title":"Near-miss function clones in open source software: An empirical study","volume":"22","author":"roy","year":"2010","journal-title":"Journal of Software Maintenance and Evolution Research and Practice"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658071"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2002.1183002"},{"key":"ref1","first-page":"64","article-title":"A survey on software clone detection research","volume":"541","author":"roy","year":"2007","journal-title":"Queen's School of Computing"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613837"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016908896"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2898411"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ITC.2010.55"},{"key":"ref24","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions, and reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Sov Phys -Dokl"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1321"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180179"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"},{"key":"ref25","year":"2018","journal-title":"AIDanial Cloc"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08834785.pdf?arnumber=8834785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T05:48:59Z","timestamp":1695188939000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8834785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2940710","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}