{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T13:32:37Z","timestamp":1773063157418,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416541","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:38:56Z","timestamp":1611790736000},"page":"931-942","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["CCGraph"],"prefix":"10.1145","author":[{"given":"Yue","family":"Zou","sequence":"first","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]},{"given":"Bihuan","family":"Ban","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]},{"given":"Yinxing","family":"Xue","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]},{"given":"Yun","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/FLOSS.2007.10"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-009-9108-x"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.56"},{"key":"e_1_3_2_1_4_1","volume-title":"Ernst","author":"Li Jingyue","year":"2012","unstructured":"Jingyue Li and Michael D. Ernst. 2012. CBCD: Cloned buggy code detector. In Proceedings of the 34th International Conference on Software Engineering. IEEE Press, 310--320."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(87)90043-5"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368132"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2017.16"},{"key":"e_1_3_2_1_10_1","volume-title":"Approximated Neighbours MinHash Graph Node Kernel. European Symposium on Artificial Neural Networks Computational Intelligence and Machine Learning, ESANN, 281--286","author":"Navarin","year":"2017","unstructured":"Navarin N, Sperduti A. 2017. Approximated Neighbours MinHash Graph Node Kernel. European Symposium on Artificial Neural Networks Computational Intelligence and Machine Learning, ESANN, 281--286."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078187"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001414500013"},{"key":"e_1_3_2_1_13_1","first-page":"20","article-title":"The network attack graph analysis based on graph kernel","volume":"37","author":"Jun Ya","year":"2016","unstructured":"Ya Jun, Liu Z S, Chang, Q. 2016. The network attack graph analysis based on graph kernel. Journal of Military Communications Technology, Vol.37: 20--25.","journal-title":"Journal of Military Communications Technology"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20844-7_12"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236026"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings Eighth Working Conference on Reverse Engineering. IEEE, 301--309","author":"Jens Krinke","year":"2001","unstructured":"Krinke Jens. 2001. Identifying similar code with program dependence graphs. In Proceedings Eighth Working Conference on Reverse Engineering. IEEE, 301--309."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180179"},{"key":"e_1_3_2_1_18_1","volume-title":"IIWeb","volume":"78","author":"Cohen William W","year":"2003","unstructured":"William W Cohen, Pradeep Ravikumar, and Stephen E Fienberg. 2003. A Comparison of String Distance Metrics for Name-Matching Tasks. IIWeb, Vol. 73--78."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.32614\/RJ-2014-011"},{"key":"e_1_3_2_1_20_1","volume-title":"JAROWINKLER: Stata module to calculate the Jaro-Winkler distance between strings.","author":"James Feigenbaum","year":"2016","unstructured":"Feigenbaum James. 2016. JAROWINKLER: Stata module to calculate the Jaro-Winkler distance between strings."},{"key":"e_1_3_2_1_21_1","volume-title":"Modern information retrieval","author":"Baeza-Yates Ricardo","unstructured":"Ricardo Baeza-Yates and Berthier Ribeiro-Neto. 1999. Modern information retrieval. ACM press New York, Vol. 463."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236068"},{"key":"e_1_3_2_1_23_1","volume-title":"Frama-c. In International Conference on Software Engineering and Formal Methods. Springer, 233--247","author":"Cuoq","unstructured":"Cuoq P., Kirchner F., Kosmatov N., Prevosto V., Signoles J. and Yakobowski B. 2012. Frama-c. In International Conference on Software Engineering and Formal Methods. Springer, 233--247."},{"key":"e_1_3_2_1_24_1","volume-title":"European Conference on Software Maintenance and Reengineering. IEEE, 75--84","author":"Yoshiki Higo","year":"2011","unstructured":"Higo Yoshiki, and Shinji Kusumoto. 2011. Code clone detection on specialized PDGs with heuristics. In European Conference on Software Maintenance and Reengineering. IEEE, 75--84."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405284"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568298"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 31st International Conference on Software Maintenance and Evolution (ICSME","author":"Svajlenko Jeffrey","year":"2015","unstructured":"Jeffrey Svajlenko and Chanchal K. Roy. 2015. Evaluating Clone Detection Tools with BigCloneBench. In Proceedings of the 31st International Conference on Software Maintenance and Evolution (ICSME 2015). IEEE, 131--140."},{"key":"e_1_3_2_1_28_1","volume-title":"IJaDataset 2.0","author":"Ambient Software Evoluton Group","year":"2013","unstructured":"Ambient Software Evoluton Group. (2013). IJaDataset 2.0. http:\/\/secold.org\/projects\/seclone."},{"key":"e_1_3_2_1_29_1","volume-title":"2016 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 596--600","author":"Jeffrey Svajlenko","unstructured":"Svajlenko Jeffrey and Chanchal K. Roy. 2016. Bigcloneeval: A clone detection tool evaluation framework with bigclonebench. In 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 596--600."},{"key":"e_1_3_2_1_30_1","volume-title":"Software clone detection: A systematic review. Information and Software Technology 55.7","author":"Dhavleesh Rattan","year":"2013","unstructured":"Rattan Dhavleesh, Rajesh Bhatia, and Maninder Singh. 2013. Software clone detection: A systematic review. Information and Software Technology 55.7 (2013), 1165--1199."},{"key":"e_1_3_2_1_31_1","series-title":"SIAM Journal on Computing 26.5","volume-title":"Parameterized duplication in strings: Algorithms and an application to software maintenance","author":"Baker Brenda S.","year":"1997","unstructured":"Baker Brenda S. 1997. Parameterized duplication in strings: Algorithms and an application to software maintenance. SIAM Journal on Computing 26.5 (1997), 1343--1362."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"e_1_3_2_1_33_1","volume-title":"2011 IEEE 19th International Conference on Program Comprehension. IEEE, 219--220","author":"Roy Cordy","year":"2011","unstructured":"Cordy James R. and Chanchal K Roy. 2011. The NiCad clone detector. In 2011 IEEE 19th International Conference on Program Comprehension. IEEE, 219--220."},{"key":"e_1_3_2_1_34_1","first-page":"120","article-title":"Substring Matching for Clone Detection and Change Tracking","volume":"94","author":"Howard Johnson J","year":"1994","unstructured":"Johnson J Howard. 1994. Substring Matching for Clone Detection and Change Tracking. ICSM. Vol. 94, 120--126.","journal-title":"ICSM."},{"key":"e_1_3_2_1_35_1","volume-title":"CCFinder: a multilinguistic token-based code clone detection system for large scale source code","author":"Toshihiro Kamiya","year":"2002","unstructured":"Kamiya Toshihiro, Shinji Kusumoto, and Katsuro Inoue. 2002. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering 28.7 (2002), 654--670."},{"issue":"19","key":"e_1_3_2_1_36_1","first-page":"289","article-title":"CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code.","volume":"4","author":"Li Zhenmin","year":"2004","unstructured":"Zhenmin Li, Shan Lu, Suvda Myagmar and Yuanyuan Zhou. 2004. CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code.OSdi. Vol. 4. No. 19, 289--302.","journal-title":"OSdi."},{"key":"e_1_3_2_1_37_1","volume-title":"2009 13th European Conference on Software Maintenance and Reengineering. IEEE, 219--228","author":"Nils G\u00f6de","year":"2009","unstructured":"G\u00f6de Nils and Rainer Koschke. 2009. Incremental clone detection. In 2009 13th European Conference on Software Maintenance and Reengineering. IEEE, 219--228."},{"key":"e_1_3_2_1_38_1","volume-title":"2016 IEEE\/ACM 38th International Conference on Software Engineering (ICSE). IEEE, 1157--1168","author":"Sajnani Hitesh","unstructured":"Hitesh Sajnani, Vaibhav Saini, Jeffrey Svajlenko, Chanchal K. Roy and Cristina V Lopes. 2016. Sourcerercc: Scaling code clone detection to big-code. In 2016 IEEE\/ACM 38th International Conference on Software Engineering (ICSE). IEEE, 1157--1168."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/850947.853341"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/832308.837142"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/647170.718283"},{"key":"e_1_3_2_1_43_1","volume-title":"Belevantsev A and Avetisyan A","author":"Kurmangaleev","year":"2016","unstructured":"Sargsyan, Sevak, Kurmangaleev S, Belevantsev A and Avetisyan A. 2016. Scalable and accurate detection of code clones. Programming and Computer Software 42.1 (2016), 27--33."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/520033.858251"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.1999.809750"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332455"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/423"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970326"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the 33rd International on Software Engineering. ACM, 301--310","author":"Kim Heejung","year":"2011","unstructured":"Heejung Kim, Yungbum Jung, Sunghun Kim, and Kwankeun Yi. 2011. MeCC:memory comparison-based clone detector. In Proceedings of the 33rd International on Software Engineering. ACM, 301--310."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00021"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416541","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:37Z","timestamp":1750197697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416541"}},"subtitle":["a PDG-based code clone detector with approximate graph matching"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":50,"alternative-id":["10.1145\/3324884.3416541","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416541","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}