{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T08:23:52Z","timestamp":1774167832611,"version":"3.50.1"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Science and Technology Development Fund of Macau","award":["0047\/2020\/A1"],"award-info":[{"award-number":["0047\/2020\/A1"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2017M621247"],"award-info":[{"award-number":["2017M621247"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005046","name":"Natural Science Foundation of Heilongjiang Province","doi-asserted-by":"publisher","award":["LH2019F008"],"award-info":[{"award-number":["LH2019F008"]}],"id":[{"id":"10.13039\/501100005046","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hong Kong RGC Project","award":["PolyU15222320"],"award-info":[{"award-number":["PolyU15222320"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1109\/tr.2022.3176922","type":"journal-article","created":{"date-parts":[[2022,6,9]],"date-time":"2022-06-09T20:26:56Z","timestamp":1654806416000},"page":"511-526","source":"Crossref","is-referenced-by-count":19,"title":["Java Code Clone Detection by Exploiting Semantic and Syntax Information From Intermediate Code-Based Graph"],"prefix":"10.1109","volume":"72","author":[{"given":"Dawei","family":"Yuan","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Macau University of Science and Technology, Macao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9918-7180","authenticated-orcid":false,"given":"Sen","family":"Fang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Macau University of Science and Technology, Macao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6272-4069","authenticated-orcid":false,"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Macau University of Science and Technology, Macao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0119-927X","authenticated-orcid":false,"given":"Zhou","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Big Data and Software Engineering, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2017.8284313"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2912962"},{"key":"ref12","first-page":"75","article-title":"Software refactorability through software clones","volume":"2","author":"sahithi","year":"2016","journal-title":"S S International Journal of Multidisciplinary Research"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCCE.2017.49"},{"key":"ref15","first-page":"1","article-title":"Word2vec, node2vec, graph2vec, x2vec: Towards a theory of vector embeddings of structured data","author":"martin","year":"0","journal-title":"Proc 39th ACM SIGMOD-SIGACT-SIGAI Symp Princ Database Syst"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/1176617.1176671"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3290353"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.2307\/2005923"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.170"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/321921.321925"},{"key":"ref55","first-page":"531","article-title":"Mutual information neural estimation","author":"belghazi","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2017.16"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1080\/00220670209598786"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.509"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/s40411-014-0012-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572283"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.26"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236068"},{"key":"ref46","first-page":"5","article-title":"LLVM and clang: Next generation compiler technology","author":"lattner","year":"0","journal-title":"Proc BSD Conf"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332459"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624183"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-8461-5_15"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5477"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2006.61"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2776912"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2008.15"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/423"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00086"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090050"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227183"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180179"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083143"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368132"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/N15-1016"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00581"},{"key":"ref34","first-page":"170","article-title":"State-of-health estimation and end of life prediction for the lithium-ion battery by correlatable feature-based machine learning approach","volume":"17","author":"bhattacharyya","year":"2021","journal-title":"Int J Performability Eng"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2017.7880511"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2754499"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2807452"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2015.7280578"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.03.022"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIT.2018.8686548"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/195470.195557"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/567532.567555"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2764967.2764974"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2659787.2659805"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/2970276.2970326","article-title":"Deep Learning Code Fragments for Code Clone Detection","author":"martin white","year":"2016","journal-title":"IEEE\/ACM Int Conference on Automated Software Engineering (ASE)"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.12.040"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1814","DOI":"10.23940\/ijpe.20.11.p13.18141825","article-title":"Software fault detection for sequencing constraint defects","volume":"16","author":"cheng","year":"2020","journal-title":"Int J Performability Eng"},{"key":"ref21","first-page":"129","article-title":"Detecting self-mutating malware using control-flow graph matching","author":"bruschi","year":"0","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46681-1_65"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/360018.360025"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2013.6522302"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00060-2"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47764-0_3"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00078"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/10142050\/09792461.pdf?arnumber=9792461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T17:57:49Z","timestamp":1687197469000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9792461\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":65,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2022.3176922","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6]]}}}