{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:13:50Z","timestamp":1759032830394,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T00:00:00Z","timestamp":1594598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,13]]},"DOI":"10.1145\/3387904.3389254","type":"proceedings-article","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T20:04:38Z","timestamp":1599941078000},"page":"172-183","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["How are Deep Learning Models Similar?"],"prefix":"10.1145","author":[{"given":"Xiongfei","family":"Wu","sequence":"first","affiliation":[{"name":"University of Science and Technology of China"}]},{"given":"Liangyu","family":"Qin","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China"}]},{"given":"Bing","family":"Yu","sequence":"additional","affiliation":[{"name":"Kyushu University"}]},{"given":"Xiaofei","family":"Xie","sequence":"additional","affiliation":[{"name":"Nanyang Technological University"}]},{"given":"Lei","family":"Ma","sequence":"additional","affiliation":[{"name":"Kyushu University"}]},{"given":"Yinxing","family":"Xue","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University"}]},{"given":"Jianjun","family":"Zhao","sequence":"additional","affiliation":[{"name":"Kyushu University"}]}],"member":"320","published-online":{"date-parts":[[2020,9,12]]},"reference":[{"volume-title":"Accessed","year":"2019","key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Deep Learning code and pretrained models for transfer learning, educational purpose, and more. https:\/\/modelzoo.co\/ . Accessed October , 2019 . [n.d.]. Deep Learning code and pretrained models for transfer learning, educational purpose, and more. https:\/\/modelzoo.co\/. Accessed October, 2019."},{"volume-title":"Transparent Machine Learning for Engineers. https:\/\/modeldepot.io. Accessed","year":"2019","key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. ModelDepot-Open , Transparent Machine Learning for Engineers. https:\/\/modeldepot.io. Accessed October , 2019 . [n.d.]. ModelDepot-Open, Transparent Machine Learning for Engineers. https:\/\/modeldepot.io. Accessed October, 2019."},{"volume-title":"Accessed","year":"2019","key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. A simple plagiarism detection tool for python code. https:\/\/github.com\/fyrestone\/pycode_similar . Accessed October , 2019 . [n.d.]. A simple plagiarism detection tool for python code. https:\/\/github.com\/fyrestone\/pycode_similar. Accessed October, 2019."},{"volume-title":"An Emperical Study on Clone Analysis of Deep Learning Software. https:\/\/sites.google.com\/view\/dl-model-similarity Last accessed","year":"2019","key":"e_1_3_2_1_4_1","unstructured":"2019. An Emperical Study on Clone Analysis of Deep Learning Software. https:\/\/sites.google.com\/view\/dl-model-similarity Last accessed 25 October 2019 . 2019. An Emperical Study on Clone Analysis of Deep Learning Software. https:\/\/sites.google.com\/view\/dl-model-similarity Last accessed 25 October 2019."},{"key":"e_1_3_2_1_5_1","unstructured":"Alex Aiken. 2017. MOSS A System for Detecting Software Plagiarism. https:\/\/theory.stanford.edu\/~aiken\/moss\/  Alex Aiken. 2017. MOSS A System for Detecting Software Plagiarism. https:\/\/theory.stanford.edu\/~aiken\/moss\/"},{"key":"e_1_3_2_1_6_1","volume-title":"Clone Detection Using Abstract Syntax Trees. In 1998 International Conference on Software Maintenance, ICSM 1998","author":"Baxter Ira D.","year":"1998","unstructured":"Ira D. Baxter , Andrew Yahin , Leonardo Mendon\u00e7a de Moura , Marcelo Sant'Anna , and Lorraine Bier . 1998 . Clone Detection Using Abstract Syntax Trees. In 1998 International Conference on Software Maintenance, ICSM 1998 , Bethesda, Maryland, USA , November 16-19, 1998. 368--377. Ira D. Baxter, Andrew Yahin, Leonardo Mendon\u00e7a de Moura, Marcelo Sant'Anna, and Lorraine Bier. 1998. Clone Detection Using Abstract Syntax Trees. In 1998 International Conference on Software Maintenance, ICSM 1998, Bethesda, Maryland, USA, November 16-19, 1998. 368--377."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPIRE.2000.878178"},{"key":"e_1_3_2_1_9_1","volume-title":"Clone Detection and Elimination for Haskell (PEPM '10)","author":"Brown Christopher","year":"2010","unstructured":"Christopher Brown and Simon Thompson . 2010 . Clone Detection and Elimination for Haskell (PEPM '10) . ACM, New York, NY, USA, 111--120. https:\/\/doi.org\/10.1145\/1706356.1706378 10.1145\/1706356.1706378 Christopher Brown and Simon Thompson. 2010. Clone Detection and Elimination for Haskell (PEPM '10). ACM, New York, NY, USA, 111--120. https:\/\/doi.org\/10.1145\/1706356.1706378"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1228662.1228664"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950350"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568286"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2752489.2752498"},{"key":"e_1_3_2_1_15_1","volume-title":"The NiCad Clone Detector. In 2011 IEEE 19th International Conference on Program Comprehension. 219--220","author":"Cordy J. R.","year":"2011","unstructured":"J. R. Cordy and C. K. Roy . 2011 . The NiCad Clone Detector. In 2011 IEEE 19th International Conference on Program Comprehension. 219--220 . https:\/\/doi.org\/10.1109\/ICPC. 2011 .26 10.1109\/ICPC.2011.26 J. R. Cordy and C. K. Roy. 2011. The NiCad Clone Detector. In 2011 IEEE 19th International Conference on Program Comprehension. 219--220. https:\/\/doi.org\/10.1109\/ICPC.2011.26"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Jonathan Crussell Clint Gibler and Hao Chen. 2012. Attack of the Clones: Detecting Cloned Applications on Android Markets. In ESORICS.  Jonathan Crussell Clint Gibler and Hao Chen. 2012. Attack of the Clones: Detecting Cloned Applications on Android Markets. In ESORICS.","DOI":"10.1007\/978-3-642-33167-1_3"},{"volume-title":"Clone Detection in Automotive Model-Based Development (ICSE '08)","author":"Deissenboeck Florian","key":"e_1_3_2_1_17_1","unstructured":"Florian Deissenboeck , Benjamin Hummel , Elmar J\u00fcrgens , Bernhard Sch\u00e4tz , Stefan Wagner , Jean-Fran\u00e7ois Girard , and Stefan Teuchert . 2008. Clone Detection in Automotive Model-Based Development (ICSE '08) . Association for Computing Machinery , New York, NY, USA , 603--612. https:\/\/doi.org\/10.1145\/1368088.1368172 10.1145\/1368088.1368172 Florian Deissenboeck, Benjamin Hummel, Elmar J\u00fcrgens, Bernhard Sch\u00e4tz, Stefan Wagner, Jean-Fran\u00e7ois Girard, and Stefan Teuchert. 2008. Clone Detection in Automotive Model-Based Development (ICSE '08). Association for Computing Machinery, New York, NY, USA, 603--612. https:\/\/doi.org\/10.1145\/1368088.1368172"},{"key":"e_1_3_2_1_18_1","volume-title":"Sposato","author":"Donaldson John L.","year":"1981","unstructured":"John L. Donaldson , Ann-Marie Lancaster , and Paula H . Sposato . 1981 . A Plagiarism Detection System (SIGCSE '81). ACM, New York, NY, USA , 21--25. https:\/\/doi.org\/10.1145\/800037.800955 10.1145\/800037.800955 John L. Donaldson, Ann-Marie Lancaster, and Paula H. Sposato. 1981. A Plagiarism Detection System (SIGCSE '81). ACM, New York, NY, USA, 21--25. https:\/\/doi.org\/10.1145\/800037.800955"},{"volume-title":"The 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering.","author":"Du Xiaomng","key":"e_1_3_2_1_19_1","unstructured":"Xiaomng Du , Xiaofei Xie , Yi Li , Lei Ma , Yang Liu , and Jianjun Zhao . 2019. Deep-Stellar: Model-Based Quantitative Analysis of Stateful Deep Learning Systems . In The 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. Xiaomng Du, Xiaofei Xie, Yi Li, Lei Ma, Yang Liu, and Jianjun Zhao. 2019. Deep-Stellar: Model-Based Quantitative Analysis of Stateful Deep Learning Systems. In The 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9073-9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368132"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/299649.299783"},{"key":"e_1_3_2_1_23_1","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016. Deep residual learning for image recognition. In CVPR. 770--778.  Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016. Deep residual learning for image recognition. In CVPR. 770--778."},{"volume-title":"On the Naturalness of Software (ICSE '12)","author":"Hindle Abram","key":"e_1_3_2_1_24_1","unstructured":"Abram Hindle , Earl T. Barr , Zhendong Su , Mark Gabel , and Premkumar Devanbu . 2012. On the Naturalness of Software (ICSE '12) . IEEE Press , Piscataway, NJ, USA , 837--847. http:\/\/dl.acrn.org\/citation.cfm?id=2337223.2337322 Abram Hindle, Earl T. Barr, Zhendong Su, Mark Gabel, and Premkumar Devanbu. 2012. On the Naturalness of Software (ICSE '12). IEEE Press, Piscataway, NJ, USA, 837--847. http:\/\/dl.acrn.org\/citation.cfm?id=2337223.2337322"},{"key":"e_1_3_2_1_25_1","volume-title":"NIPS Deep Learning and Representation Learning Workshop. http:\/\/arxiv.org\/abs\/1503","author":"Hinton Geoffrey","year":"2015","unstructured":"Geoffrey Hinton , Oriol Vinyals , and Jeffrey Dean . 2015 . Distilling the Knowledge in a Neural Network . In NIPS Deep Learning and Representation Learning Workshop. http:\/\/arxiv.org\/abs\/1503 .02531 Geoffrey Hinton, Oriol Vinyals, and Jeffrey Dean. 2015. Distilling the Knowledge in a Neural Network. In NIPS Deep Learning and Representation Learning Workshop. http:\/\/arxiv.org\/abs\/1503.02531"},{"key":"e_1_3_2_1_26_1","unstructured":"Geoffrey Hinton Oriol Vinyals and Jeff Dean. 2015. Distilling the Knowledge in a Neural Network. arXiv:stat.ML\/1503.02531  Geoffrey Hinton Oriol Vinyals and Jeff Dean. 2015. Distilling the Knowledge in a Neural Network. arXiv:stat.ML\/1503.02531"},{"volume-title":"2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 1158--1161","author":"Hu Q.","key":"e_1_3_2_1_27_1","unstructured":"Q. Hu , L. Ma , X. Xie , B. Yu , Y. Liu , and J. Zhao . 2019. DeepMutation++: A Mutation Testing Framework for Deep Learning Systems . In 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 1158--1161 . Q. Hu, L. Ma, X. Xie, B. Yu, Y. Liu, and J. Zhao. 2019. DeepMutation++: A Mutation Testing Framework for Deep Learning Systems. In 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 1158--1161."},{"volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"Huang Gao","key":"e_1_3_2_1_28_1","unstructured":"Gao Huang , Zhuang Liu , Laurens van der Maaten, and Kilian Q Weinberger. 2017. Densely connected convolutional networks . In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. Gao Huang, Zhuang Liu, Laurens van der Maaten, and Kilian Q Weinberger. 2017. Densely connected convolutional networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition."},{"key":"e_1_3_2_1_29_1","volume-title":"DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones. In 29th International Conference on Software Engineering (ICSE 2007","author":"Jiang Lingxiao","year":"2007","unstructured":"Lingxiao Jiang , Ghassan Misherghi , Zhendong Su , and St\u00e9phane Glondu . 2007 . DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones. In 29th International Conference on Software Engineering (ICSE 2007 ), Minneapolis, MN, USA , May 20-26, 2007. 96--105. Lingxiao Jiang, Ghassan Misherghi, Zhendong Su, and St\u00e9phane Glondu. 2007. DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones. In 29th International Conference on Software Engineering (ICSE 2007), Minneapolis, MN, USA, May 20-26, 2007. 96--105."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572283"},{"key":"e_1_3_2_1_31_1","volume-title":"Context-based Detection of Clone-related Bugs (ESEC-FSE '07)","author":"Jiang Lingxiao","year":"2007","unstructured":"Lingxiao Jiang , Zhendong Su , and Edwin Chiu . 2007 . Context-based Detection of Clone-related Bugs (ESEC-FSE '07) . ACM, New York, NY, USA, 55--64. https:\/\/doi.org\/10.1145\/1287624.1287634 10.1145\/1287624.1287634 Lingxiao Jiang, Zhendong Su, and Edwin Chiu. 2007. Context-based Detection of Clone-related Bugs (ESEC-FSE '07). ACM, New York, NY, USA, 55--64. https:\/\/doi.org\/10.1145\/1287624.1287634"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070566"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"e_1_3_2_1_34_1","unstructured":"Heejung Kim Yungbum Jung Sunghun Kim and Kwankeun Yi. 2011. MeCC: memory comparison-based clone detector (ICSE '11). 301--310.  Heejung Kim Yungbum Jung Sunghun Kim and Kwankeun Yi. 2011. MeCC: memory comparison-based clone detector (ICSE '11). 301--310."},{"key":"e_1_3_2_1_35_1","volume-title":"Guiding Deep Learning System Testing Using Surprise Adequacy. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). 1039--1049","author":"Kim J.","year":"2019","unstructured":"J. Kim , R. Feldt , and S. Yoo . 2019 . Guiding Deep Learning System Testing Using Surprise Adequacy. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). 1039--1049 . https:\/\/doi.org\/10.1109\/ICSE. 2019 .00108 10.1109\/ICSE.2019.00108 J. Kim, R. Feldt, and S. Yoo. 2019. Guiding Deep Learning System Testing Using Surprise Adequacy. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). 1039--1049. https:\/\/doi.org\/10.1109\/ICSE.2019.00108"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"e_1_3_2_1_38_1","unstructured":"Nair Krizhevsky Hinton Vinod Christopher Geoffrey Mike Papadakis and Anthony Ventresque. 2014. The cifar-10 dataset. http:\/\/www.cs.toronto.edu\/kriz\/cifar.html.  Nair Krizhevsky Hinton Vinod Christopher Geoffrey Mike Papadakis and Anthony Ventresque. 2014. The cifar-10 dataset. http:\/\/www.cs.toronto.edu\/kriz\/cifar.html."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_40_1","unstructured":"Yann LeCun and Corrina Cortes. 1998. The MNIST database of handwritten digits.  Yann LeCun and Corrina Cortes. 1998. The MNIST database of handwritten digits."},{"volume-title":"Clone Detection and Removal for Erlang\/OTP Within a Refactoring Environment (PEPM '09)","author":"Li Huiqing","key":"e_1_3_2_1_41_1","unstructured":"Huiqing Li and Simon Thompson . 2009. Clone Detection and Removal for Erlang\/OTP Within a Refactoring Environment (PEPM '09) . ACM , New York, NY, USA , 169--178. https:\/\/doi.org\/10.1145\/1480945.1480971 10.1145\/1480945.1480971 Huiqing Li and Simon Thompson. 2009. Clone Detection and Removal for Erlang\/OTP Within a Refactoring Environment (PEPM '09). ACM, New York, NY, USA, 169--178. https:\/\/doi.org\/10.1145\/1480945.1480971"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.31193\/ssap.isbn.9787520100649"},{"key":"e_1_3_2_1_43_1","volume-title":"CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. In 6th Symposium on Operating System Design and Implementation (OSDI 2004","author":"Li Zhenmin","year":"2004","unstructured":"Zhenmin Li , Shan Lu , Suvda Myagmar , and Yuanyuan Zhou . 2004 . CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. In 6th Symposium on Operating System Design and Implementation (OSDI 2004 ), San Francisco, California, USA , December 6-8, 2004. 289--302. Zhenmin Li, Shan Lu, Suvda Myagmar, and Yuanyuan Zhou. 2004. CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. In 6th Symposium on Operating System Design and Implementation (OSDI 2004), San Francisco, California, USA, December 6-8, 2004. 289--302."},{"key":"e_1_3_2_1_44_1","volume-title":"Yu","author":"Liu Chao","year":"2006","unstructured":"Chao Liu , Chen Chen , Jiawei Han , and Philip S . Yu . 2006 . GPLAG: detection of software plagiarism by program dependence graph analysis. In KDD. Chao Liu, Chen Chen, Jiawei Han, and Philip S. Yu. 2006. GPLAG: detection of software plagiarism by program dependence graph analysis. In KDD."},{"key":"e_1_3_2_1_45_1","volume-title":"DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems. In 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 614--618","author":"Ma Lei","year":"2019","unstructured":"Lei Ma , Felix Juefei-Xu , Minhui Xue , Bo Li , Li Li , Yang Liu , and Jianjun Zhao . 2019 . DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems. In 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 614--618 . Lei Ma, Felix Juefei-Xu, Minhui Xue, Bo Li, Li Li, Yang Liu, and Jianjun Zhao. 2019. DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems. In 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 614--618."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"volume-title":"DeepMutation: Mutation Testing of Deep Learning Systems. In 2018 IEEE 29th International Symposium on Software Reliability Engineering (ISSRE). 100--111","author":"Ma L.","key":"e_1_3_2_1_47_1","unstructured":"L. Ma , F. Zhang , J. Sun , M. Xue , B. Li , F. Juefei-Xu , C. Xie , L. Li , Y. Liu , J. Zhao , and Y. Wang . 2018 . DeepMutation: Mutation Testing of Deep Learning Systems. In 2018 IEEE 29th International Symposium on Software Reliability Engineering (ISSRE). 100--111 . L. Ma, F. Zhang, J. Sun, M. Xue, B. Li, F. Juefei-Xu, C. Xie, L. Li, Y. Liu, J. Zhao, and Y. Wang. 2018. DeepMutation: Mutation Testing of Deep Learning Systems. In 2018 IEEE 29th International Symposium on Software Reliability Engineering (ISSRE). 100--111."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning (Proceedings of Machine Learning Research), Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.)","volume":"97","author":"Odena Augustus","year":"2019","unstructured":"Augustus Odena , Catherine Olsson , David Andersen , and Ian Goodfellow . 2019 . TensorFuzz: Debugging Neural Networks with Coverage-Guided Fuzzing . In Proceedings of the 36th International Conference on Machine Learning (Proceedings of Machine Learning Research), Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.) , Vol. 97 . PMLR, Long Beach, California, USA, 4901--4911. Augustus Odena, Catherine Olsson, David Andersen, and Ian Goodfellow. 2019. TensorFuzz: Debugging Neural Networks with Coverage-Guided Fuzzing. In Proceedings of the 36th International Conference on Machine Learning (Proceedings of Machine Learning Research), Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.), Vol. 97. PMLR, Long Beach, California, USA, 4901--4911."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/382222.382462"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"volume-title":"31st International Conference on Softy\/are Engineering, ICSE 2009, May 16-24, 2009, Vancouver, Canada, Proceedings. 276--286","author":"Pham Nam H.","key":"e_1_3_2_1_51_1","unstructured":"Nam H. Pham , Hoan Anh Nguyen , Tung Thanh Nguyen , Jafar M. Al-Kofahi , and Tien N. Nguyen . 2009. Complete and accurate clone detection in graph-based models . In 31st International Conference on Softy\/are Engineering, ICSE 2009, May 16-24, 2009, Vancouver, Canada, Proceedings. 276--286 . Nam H. Pham, Hoan Anh Nguyen, Tung Thanh Nguyen, Jafar M. Al-Kofahi, and Tien N. Nguyen. 2009. Complete and accurate clone detection in graph-based models. In 31st International Conference on Softy\/are Engineering, ICSE 2009, May 16-24, 2009, Vancouver, Canada, Proceedings. 276--286."},{"key":"e_1_3_2_1_52_1","first-page":"1016","article-title":"Finding Plagiarisms among a Set of Programs with JPlag","volume":"8","author":"Prechelt Lutz","year":"2002","unstructured":"Lutz Prechelt , Guido Malpohl , and Michael Philippsen . 2002 . Finding Plagiarisms among a Set of Programs with JPlag . J. UCS 8 (2002), 1016 -. Lutz Prechelt, Guido Malpohl, and Michael Philippsen. 2002. Finding Plagiarisms among a Set of Programs with JPlag. J. UCS 8 (2002), 1016-.","journal-title":"J. UCS"},{"key":"e_1_3_2_1_53_1","volume-title":"Cordy","author":"Roy Chanchal Kumar","year":"2007","unstructured":"Chanchal Kumar Roy and James R . Cordy . 2007 . A Survey on Software Clone Detection Research. School of Computing TR 2007-541, Queen's University 115 (2007). Chanchal Kumar Roy and James R. Cordy. 2007. A Survey on Software Clone Detection Research. School of Computing TR 2007-541, Queen's University 115 (2007)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_3_2_1_55_1","volume-title":"Deep learning in neural networks: An overview. Neural Networks 61 (Jan","author":"Schmidhuber J\u00fcrgen","year":"2015","unstructured":"J\u00fcrgen Schmidhuber . 2015. Deep learning in neural networks: An overview. Neural Networks 61 (Jan 2015 ), 85--117. https:\/\/doi.Org\/10.1016\/j.neunet.2014.09.003 J\u00fcrgen Schmidhuber. 2015. Deep learning in neural networks: An overview. Neural Networks 61 (Jan 2015), 85--117. https:\/\/doi.Org\/10.1016\/j.neunet.2014.09.003"},{"key":"e_1_3_2_1_56_1","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv:cs.CV\/1409.1556  Karen Simonyan and Andrew Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv:cs.CV\/1409.1556"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"e_1_3_2_1_58_1","first-page":"2","article-title":"Identification of Program Similarity in Large","volume":"33","author":"Whale G.","year":"1990","unstructured":"G. Whale . 1990 . Identification of Program Similarity in Large Populations. Comput. J. 33 , 2 (April 1990), 140--146. https:\/\/doi.org\/10.1093\/comjnl\/33.2.140 10.1093\/comjnl G. Whale. 1990. Identification of Program Similarity in Large Populations. Comput. J. 33, 2 (April 1990), 140--146. https:\/\/doi.org\/10.1093\/comjnl\/33.2.140","journal-title":"Populations. Comput. J."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970326"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/236462.236525"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/800"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336767"},{"key":"e_1_3_2_1_64_1","volume-title":"Generating Adversarial Examples for Holding Robustness of Source Code Processing Models. In The 34th AAAI Conference on Artificial Intelligence (AAAI","author":"Zhang Huangzhao","year":"2020","unstructured":"Huangzhao Zhang , Zhuo Li , Ge Li , Lei Ma , Yang Liu , and Zhi Jin . 2020 . Generating Adversarial Examples for Holding Robustness of Source Code Processing Models. In The 34th AAAI Conference on Artificial Intelligence (AAAI 2020). Huangzhao Zhang, Zhuo Li, Ge Li, Lei Ma, Yang Liu, and Zhi Jin. 2020. Generating Adversarial Examples for Holding Robustness of Source Code Processing Models. In The 34th AAAI Conference on Artificial Intelligence (AAAI 2020)."},{"key":"e_1_3_2_1_65_1","volume-title":"Machine learning testing: Survey, landscapes and horizons","author":"Zhang Jie M","year":"2020","unstructured":"Jie M Zhang , Mark Harman , Lei Ma , and Yang Liu . 2020. Machine learning testing: Survey, landscapes and horizons . IEEE Transactions on Software Engineering ( 2020 ). Jie M Zhang, Mark Harman, Lei Ma, and Yang Liu. 2020. Machine learning testing: Survey, landscapes and horizons. IEEE Transactions on Software Engineering (2020)."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2019.00020"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380368"}],"event":{"name":"ICPC '20: 28th International Conference on Program Comprehension","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Seoul Republic of Korea","acronym":"ICPC '20"},"container-title":["Proceedings of the 28th International Conference on Program Comprehension"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387904.3389254","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387904.3389254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:37Z","timestamp":1750200097000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387904.3389254"}},"subtitle":["An Empirical Study on Clone Analysis of Deep Learning Software"],"short-title":[],"issued":{"date-parts":[[2020,7,13]]},"references-count":66,"alternative-id":["10.1145\/3387904.3389254","10.1145\/3387904"],"URL":"https:\/\/doi.org\/10.1145\/3387904.3389254","relation":{},"subject":[],"published":{"date-parts":[[2020,7,13]]},"assertion":[{"value":"2020-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}