{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:35:27Z","timestamp":1771518927810,"version":"3.50.1"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1936211"],"award-info":[{"award-number":["U1936211"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hubei Key Project","award":["2023BAA024"],"award-info":[{"award-number":["2023BAA024"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1109\/tr.2023.3312294","type":"journal-article","created":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T17:35:50Z","timestamp":1694799350000},"page":"1310-1324","source":"Crossref","is-referenced-by-count":6,"title":["Goner: Building Tree-Based N-Gram-Like Model for Semantic Code Clone Detection"],"prefix":"10.1109","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1515-3558","authenticated-orcid":false,"given":"Yueming","family":"Wu","sequence":"first","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6694-9126","authenticated-orcid":false,"given":"Siyue","family":"Feng","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9984-8348","authenticated-orcid":false,"given":"Wenqi","family":"Suo","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8534-5048","authenticated-orcid":false,"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3934-7605","authenticated-orcid":false,"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47764-0_3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2017.16"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236068"},{"key":"ref7","first-page":"931","article-title":"CCGraph: A PDG-based code clone detector with approximate graph matching","volume-title":"Proc. 35th Int. Conf. Automated Softw. Eng.","author":"Zou","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/423"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00086"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534099"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/app11146613"},{"key":"ref13","article-title":"BigCloneBench","year":"2023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.77"},{"key":"ref15","article-title":"Google Code, Google Code Jam","year":"2017"},{"key":"ref16","first-page":"87","article-title":"Deep learning code fragments for code clone detection","volume-title":"Proc. 31st Int. Conf. Automated Softw. Eng.","author":"White","year":"2016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10139"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560426"},{"key":"ref19","first-page":"821","article-title":"SCdetector: Software functional clone detection based on semantic tokens analysis","volume-title":"Proc. IEEE\/ACM 35th Int. Conf. Automated Softw. Eng.","author":"Wu","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3001918"},{"issue":"115","key":"ref21","first-page":"64","article-title":"A survey on software clone detection research","volume":"541","author":"Roy","year":"2007","journal-title":"Sch. Comput. TR"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"ref23","article-title":"A pure python library for working with java source code, provides a lexer and parser targeting Java 8","year":"2023"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref30","article-title":"An open source machine learning library that supports supervised and unsupervised learning","year":"2023"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0185"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556927"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1994.336783"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792593"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.41"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2017.7880502"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.007"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813733"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2017.104"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.62"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2009.20"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.46"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180179"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SANER50967.2021.00053"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC50091.2020.9047636"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2707539"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/EMES.2015.7158423"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P15-1150"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.1999.809750"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1999.777743"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236026"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2018.8327318"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SAPIENCE.2016.7684149"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I.2016.7917935"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.3"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.65"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/10547161\/10252161.pdf?arnumber=10252161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T01:00:19Z","timestamp":1733878819000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10252161\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":57,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2023.3312294","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}