{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:58:49Z","timestamp":1761976729544,"version":"build-2065373602"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T00:00:00Z","timestamp":1752624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T00:00:00Z","timestamp":1752624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004030","name":"Jiangsu Normal University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004030","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,16]]},"DOI":"10.1109\/qrs-c65679.2025.00056","type":"proceedings-article","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:10:04Z","timestamp":1761930604000},"page":"390-399","source":"Crossref","is-referenced-by-count":0,"title":["SACCD: Semantic Alignment-based Cross-language Code Clone Detection"],"prefix":"10.1109","author":[{"given":"You","family":"Zeng","sequence":"first","affiliation":[{"name":"Jiangsu Normal University,Xuzhou,China"}]},{"given":"Chunli","family":"Xie","sequence":"additional","affiliation":[{"name":"Jiangsu Normal University,Xuzhou,China"}]},{"given":"Yuanfa","family":"Hu","sequence":"additional","affiliation":[{"name":"Jiangsu Normal University,Xuzhou,China"}]},{"given":"Yuqi","family":"Wang","sequence":"additional","affiliation":[{"name":"Jiangsu Normal University,Xuzhou,China"}]}],"member":"263","reference":[{"article-title":"A Survey on Software Clone Detection Research","year":"2007","author":"Roy","key":"ref1"},{"key":"ref2","first-page":"87","article-title":"Deep learning code fragments for code clone detection","volume-title":"2016 31st IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"White"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/s40411-017-0035-z"},{"article-title":"Cross-language Clone Detection","volume-title":"International Conference on Software Engineering and Knowledge Engineering","author":"Kraft","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2017.7880507"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00099"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3506696"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00078"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3311796"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3524610.3527911"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330250"},{"volume-title":"Extendable and adaptable framework for input language independent static analysis","year":"2015","author":"Raki\u0107","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2016EDP7334"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM54844.2022.00050"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.499"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-acl.308"},{"article-title":"GraphCodeBERT: Pre-training Code Representations with Data Flow","year":"2020","author":"Guo","key":"ref18"},{"article-title":"LongCoder: A Long-Range Pre-trained Language Model for Code Completion","volume-title":"International Conference on Machine Learning","author":"Guo","key":"ref19"},{"article-title":"CodeGen: An Open Large Language Model for Code with Multi-Turn Program Synthesis","volume-title":"International Conference on Learning Representations","author":"Nijkamp","key":"ref20"},{"article-title":"CodeSearchNet Challenge: Evaluating the State of Semantic Code Search","year":"2019","author":"Husain","key":"ref21"},{"article-title":"Unsupervised Translation of Programming Languages","year":"2020","author":"Lachaux","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892280"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00210"},{"article-title":"A Simple Framework for Contrastive Learning of Visual Representations","year":"2020","author":"Chen","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236068"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/394"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236026"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1202"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1039\/9781788016841-00228"},{"article-title":"Distilling the Knowledge in a Neural Network","year":"2015","author":"Hinton","key":"ref32"},{"article-title":"Efficient Estimation of Word Representations in Vector Space","volume-title":"International Conference on Learning Representations","author":"Mikolov","key":"ref33"},{"article-title":"Semi-Supervised Classification with Graph Convolutional Networks","year":"2016","author":"Kipf","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207148"},{"article-title":"Learning Transferable Visual Models From Natural Language Supervision","volume-title":"International Conference on Machine Learning","author":"Radford","key":"ref36"},{"key":"ref37","article-title":"Contrastive Learning of Medical Visual Representations from Paired Images and Text","author":"Zhang","year":"2020","journal-title":"Machine Learning in Health Care"}],"event":{"name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","start":{"date-parts":[[2025,7,16]]},"location":"Hangzhou, China","end":{"date-parts":[[2025,7,20]]}},"container-title":["2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11216429\/11216154\/11216581.pdf?arnumber=11216581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:55:04Z","timestamp":1761976504000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11216581\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,16]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/qrs-c65679.2025.00056","relation":{},"subject":[],"published":{"date-parts":[[2025,7,16]]}}}