{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:49Z","timestamp":1750220749698,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T00:00:00Z","timestamp":1593216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,27]]},"DOI":"10.1145\/3377813.3381352","type":"proceedings-article","created":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T00:21:21Z","timestamp":1600474881000},"page":"211-220","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["JSidentify"],"prefix":"10.1145","author":[{"given":"Qun","family":"Xia","sequence":"first","affiliation":[{"name":"Tencent Inc., China"}]},{"given":"Zhongzhu","family":"Zhou","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Zhihao","family":"Li","sequence":"additional","affiliation":[{"name":"Tencent Inc., China"}]},{"given":"Bin","family":"Xu","sequence":"additional","affiliation":[{"name":"Tencent Inc., China"}]},{"given":"Wei","family":"Zou","sequence":"additional","affiliation":[{"name":"Tencent Inc., China"}]},{"given":"Zishun","family":"Chen","sequence":"additional","affiliation":[{"name":"Tencent Inc., China"}]},{"given":"Huafeng","family":"Ma","sequence":"additional","affiliation":[{"name":"Tencent Inc., China"}]},{"given":"Gangqiang","family":"Liang","sequence":"additional","affiliation":[{"name":"Tencent Inc., China"}]},{"given":"Haochuan","family":"Lu","sequence":"additional","affiliation":[{"name":"Fudan University, China"}]},{"given":"Shiyu","family":"Guo","sequence":"additional","affiliation":[{"name":"Tencent Inc., China"}]},{"given":"Ting","family":"Xiong","sequence":"additional","affiliation":[{"name":"Tencent Inc., China"}]},{"given":"Yuetang","family":"Deng","sequence":"additional","affiliation":[{"name":"Tencent Inc., China"}]},{"given":"Tao","family":"Xie","sequence":"additional","affiliation":[{"name":"Peking University, China"}]}],"member":"320","published-online":{"date-parts":[[2020,9,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Cocos2d game engine. http:\/\/www.cocos2d.org\/.  2020. Cocos2d game engine. http:\/\/www.cocos2d.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. Google Monkey. https:\/\/developer.android.com\/studio\/test\/monkey.  2020. Google Monkey. https:\/\/developer.android.com\/studio\/test\/monkey."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. Ignition compiler. https:\/\/v8.dev\/blog\/ignition-interpreter.  2020. Ignition compiler. https:\/\/v8.dev\/blog\/ignition-interpreter."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. JavaScript Obfuscator Tool. https:\/\/obfuscator.io\/.  2020. JavaScript Obfuscator Tool. https:\/\/obfuscator.io\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2020. jscpd. https:\/\/github.com\/kucherenko\/jscpd.  2020. jscpd. https:\/\/github.com\/kucherenko\/jscpd."},{"key":"e_1_3_2_1_6_1","unstructured":"2020. Jsinspect. https:\/\/github.com\/danielstjules\/jsinspect.  2020. Jsinspect. https:\/\/github.com\/danielstjules\/jsinspect."},{"key":"e_1_3_2_1_7_1","unstructured":"2020. LayaAir game engine. https:\/\/github.com\/layabox\/LayaAir.  2020. LayaAir game engine. https:\/\/github.com\/layabox\/LayaAir."},{"key":"e_1_3_2_1_8_1","unstructured":"2020. PMD's copy\/paste detector. http:\/\/pmd.sourceforge.net\/pmd-5.0.5\/cpd-usage.html.  2020. PMD's copy\/paste detector. http:\/\/pmd.sourceforge.net\/pmd-5.0.5\/cpd-usage.html."},{"key":"e_1_3_2_1_9_1","unstructured":"2020. Simian-similarity analyser. http:\/\/www.harukizaemon.com\/simian\/index.html.  2020. Simian-similarity analyser. http:\/\/www.harukizaemon.com\/simian\/index.html."},{"key":"e_1_3_2_1_10_1","unstructured":"2020. UglifyJS. https:\/\/github.com\/mishoo\/UglifyJS.  2020. UglifyJS. https:\/\/github.com\/mishoo\/UglifyJS."},{"key":"e_1_3_2_1_11_1","unstructured":"2020. V8 compiler. https:\/\/v8.dev\/.  2020. V8 compiler. https:\/\/v8.dev\/."},{"key":"e_1_3_2_1_12_1","volume-title":"Network Flows: Theory, Algorithms, and Applications. New Jersey: Pentice-Hall","author":"Ahujia RK","year":"1993","unstructured":"RK Ahujia , Thomas L Magnanti , and James B Orlin . 1993 . Network Flows: Theory, Algorithms, and Applications. New Jersey: Pentice-Hall (1993). RK Ahujia, Thomas L Magnanti, and James B Orlin. 1993. Network Flows: Theory, Algorithms, and Applications. New Jersey: Pentice-Hall (1993)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSITechnol.2015.7358259"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPIRE.2000.878178"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/827253.827745"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223685"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568286"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. USENIX Security Symposium (USENIX Security). 659--674","author":"Chen Kai","year":"2015","unstructured":"Kai Chen , Peng Wang , Yeonjoon Lee , XiaoFeng Wang , Nan Zhang , Heqing Huang , Wei Zou , and Peng Liu . 2015 . Finding unknown malice in 10 seconds: Mass vetting for new threats at the Google-Play scale . In Proc. USENIX Security Symposium (USENIX Security). 659--674 . Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, and Peng Liu. 2015. Finding unknown malice in 10 seconds: Mass vetting for new threats at the Google-Play scale. In Proc. USENIX Security Symposium (USENIX Security). 659--674."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9368-6"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242590"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.20"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2007.906776"},{"key":"e_1_3_2_1_24_1","volume-title":"International Journal of Applied Software Technology (IJAST)","author":"Davey Neil","year":"1995","unstructured":"Neil Davey , Paul Barson , Simon Field , Ray Frank , and D Tansley . 1995. The development of a software clone detector . International Journal of Applied Software Technology (IJAST) ( 1995 ). Neil Davey, Paul Barson, Simon Field, Ray Frank, and D Tansley. 1995. The development of a software clone detector. International Journal of Applied Software Technology (IJAST) (1995)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792593"},{"volume-title":"Just-In-Time manufacturing: A practical approach","author":"Hernandez Arnaldo","key":"e_1_3_2_1_26_1","unstructured":"Arnaldo Hernandez and Arnoldo Hernandez . 1989. Just-In-Time manufacturing: A practical approach . Prentice Hall Englewood Cliffs , NJ. Arnaldo Hernandez and Arnoldo Hernandez. 1989. Just-In-Time manufacturing: A practical approach. Prentice Hall Englewood Cliffs, NJ."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2004.1342740"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2007.09.008"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985899"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210713.3210724"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. Conference of the Center for Advanced Studies on Collaborative Research (CASCON). 70--80","author":"Karademir Saruhan","year":"2013","unstructured":"Saruhan Karademir , Thomas Dean , and Sylvain Leblanc . 2013 . Using clone detection to find malware in Acrobat files . In Proc. Conference of the Center for Advanced Studies on Collaborative Research (CASCON). 70--80 . Saruhan Karademir, Thomas Dean, and Sylvain Leblanc. 2013. Using clone detection to find malware in Acrobat files. In Proc. Conference of the Center for Advanced Studies on Collaborative Research (CASCON). 70--80."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597716.2597723"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081737"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1002\/nav.3800020109"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227183"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"},{"key":"e_1_3_2_1_41_1","volume-title":"Software clone detection: A systematic review. Information and Software Technology (1ST) 55, 7","author":"Rattan Dhavleesh","year":"2013","unstructured":"Dhavleesh Rattan , Rajesh Bhatia , and Maninder Singh . 2013. Software clone detection: A systematic review. Information and Software Technology (1ST) 55, 7 ( 2013 ), 1165--1199. Dhavleesh Rattan, Rajesh Bhatia, and Maninder Singh. 2013. Software clone detection: A systematic review. Information and Software Technology (1ST) 55, 7 (2013), 1165--1199."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2009.18"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"e_1_3_2_1_45_1","first-page":"1","article-title":"Analysis of JavaScript programs: Challenges and research trends","volume":"50","author":"Ryu Sukyoung","year":"2017","unstructured":"Sukyoung Ryu and Sukyoung Ryu . 2017 . Analysis of JavaScript programs: Challenges and research trends . ACM Computing Surveys (CSUR) 50 , 4 (2017), 1 -- 34 . Sukyoung Ryu and Sukyoung Ryu. 2017. Analysis of JavaScript programs: Challenges and research trends. ACM Computing Surveys (CSUR) 50, 4 (2017), 1--34.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.12.040"},{"key":"e_1_3_2_1_49_1","volume-title":"Alexandre Bergel, Nicolas Anquetil, and Anne Etien.","author":"Silva Leonardo Humberto","year":"2016","unstructured":"Leonardo Humberto Silva , Daniel Hovadick , Marco Tulio Valente , Alexandre Bergel, Nicolas Anquetil, and Anne Etien. 2016 . JSClassFinder: A tool to detect class-like structures in JavaScript . arXiv preprint arXiv:1602.05891 (2016). Leonardo Humberto Silva, Daniel Hovadick, Marco Tulio Valente, Alexandre Bergel, Nicolas Anquetil, and Anne Etien. 2016. JSClassFinder: A tool to detect class-like structures in JavaScript. arXiv preprint arXiv:1602.05891 (2016)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180179"}],"event":{"name":"ICSE '20: 42nd International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","KIISE Korean Institute of Information Scientists and Engineers","IEEE CS"],"location":"Seoul South Korea","acronym":"ICSE '20"},"container-title":["Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering: Software Engineering in Practice"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377813.3381352","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377813.3381352","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:51Z","timestamp":1750199931000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377813.3381352"}},"subtitle":["a hybrid framework for detecting plagiarism among JavaScript code in online mini games"],"short-title":[],"issued":{"date-parts":[[2020,6,27]]},"references-count":49,"alternative-id":["10.1145\/3377813.3381352","10.1145\/3377813"],"URL":"https:\/\/doi.org\/10.1145\/3377813.3381352","relation":{},"subject":[],"published":{"date-parts":[[2020,6,27]]},"assertion":[{"value":"2020-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}