International Core Journal of Engineering 2020-26 | Page 197
[24] Mccormick W P , Lyons N I , Hutcheson K. Distributional properties
of jaccard’s index of similarity[J]. Communications in Statistics,
1992, 21(1):18.
[25] YU T T, XU P N, JIANG Y, et al. Text Similarity Method Based on
the Improved Jaccard Coefficient[J]. Computer Systems &
Applications, 2017, 26(12):137-142.
[26] TIAN X, ZHENG J, ZHANG Z P.Jaccard Text Similarity Algorithm
Based on Word Embedding[J]. Computer Science, 2018, 45(07):186-
189.
[27] Ragkhitwetsagul C , Krinke J , Marnette B . A picture is worth a
thousand words: Code clone detection based on image similarity[C]//
IEEE International Workshop on Software Clones. IEEE Computer
Society, 2018.
[28] SONG B, JIANG W L, SUN T, et al. Image registration algorithm
based on fast feature extraction and perceptual hash. Computer
Engineering and Applications, 2018,54(07):206-212.
[29] LI D P, YANG C, JINAG Q, et al. A Client-Based Image Fuzzy
Deduplication Method Supporting Proof of Ownership[J]. Chinese
Journal of Computers, 2018, 41(06):1047-1063.
[30] Jacomy M, Venturini T, Bastian M, et al. ForceAtlas2, a Continuous
Graph Layout Algorithm for Handy Network Visualization Designed
for the Gephi Software[J]. PLOS ONE, 2014, 9(6): e98679.
[31] Hu Y F. Efficient and high quality force-directed graph drawing[J].
Mathematica Journal, 2006, 10: 37-71.
[32] Noack A. Energy Models for Graph Clustering[J]. Journal of Graph
Algorithms and Applications, 2007, 11(2):453-480.
[33] Frick A, Ludwig A, Mehldau H. A Fast Adaptive Layout Algorithm
for Undirected Graphs[C]// Proc DIMACS Int Work Graph Drawing.
Springer-Verlag, 1994:388-403.
[34] Svajlenko J , Roy C K . BigCloneEval: A Clone Detection Tool
Evaluation Framework with BigCloneBench[C]// 2016 IEEE
International Conference on Software Maintenance and Evolution
(ICSME). IEEE, 2016:131-140.
[35] Roy C K , Cordy J R. A Mutation/Injection-Based Automatic
Framework for Evaluating Code Clone Detection Tools[C]// C3S2E
Conference. ACM, 2008:157-166.
[36] Roy C K , Cordy J R. A Mutation/Injection-Based Automatic
Framework for Evaluating Code Clone Detection Tools[C]// C3S2E
Conference. ACM, 2008:157-166.
[37] SU X H, ZHANG F L. A Survey for Management-Oriented Code
Clone Research[J]. Chinese Journal of Computers, 2018, 41(03):628-
651.
[38] Svajlenko J , Roy C K. Evaluating Modern Clone Detection
Tools[C]// IEEE International Conference on Software Maintenance
& Evolution. IEEE, 2014:321-330.
[10] Lee S. SDD: High Performance Code Clone Detection System for
Large Scale Source Code[C]// Companion to the Acm Sigplan
Conference on Object-oriented Programming. ACM, 2005:140-141.
[11] Baker B S. On finding duplication and near-duplication in large
software systems[C]// Proceedings of the 2nd IEEE Working
Conference on Reverse Engineering, 1995. IEEE, 1995:86-95.
[12] Ducasse, Stéphane, Rieger M, Demeyer S. A Language Independent
Approach for Detecting Duplicated Code[C]// IEEE International
Conference on Software Maintenance. IEEE, 1999:109-118.
[13] Li Z, Lu S, Myagmar S, et al. CP-Miner: finding copy-paste and
related bugs in large-scale software code[J]. IEEE Transactions on
Software Engineering, 2006, 32(3):176-192.
[14] Li L, Feng H, Zhuang W, et al. CCLearner: A Deep Learning-Based
Clone Detection Approach[C]// 2017 IEEE International Conference
on Software Maintenance and Evolution (ICSME). IEEE Computer
Society, 2017:249-260.
[15] Yuan Y, Guo Y. Boreas: an accurate and scalable token-based
approach to code clone detection[C]// IEEE/ACM International
Conference on Automated Software Engineering. IEEE, 2012:286-
289.
[16] Jiang L, Misherghi G, Su Z, et al. DECKARD:Scalable and Accurate
Tree-Based Detection of Code Clones[C]// International Conference
on Software Engineering. IEEE Computer Society, 2007:96-105.
[17] Baxter I D , Yahin A , Moura L , et al. Clone detection using abstract
syntax trees[C]// Conference on Reverse Engineering. IEEE,
2006:253-262.
[18] Wei H H, Li M. Supervised Deep Features for Software Functional
Clone Detection by Exploiting Lexical and Syntactical Information in
Source Code[C]// International Joint Conferences on Artificial
Intelligence Organization. IJCAI, 2017:3034-3040.
[19] Krinke J. Identifying Similar Code with Program Dependence
Graphs[C]//Conference on Reverse Engineering. IEEE, 2001:301-
309.
[20] Hummel B, Juergens E, Heinemann L,et al. Index-based code clone
detection: incremental, distributed, scalable[C]//2010 IEEE
International Conference on Software Maintenance. IEEE Computer
Society, 2010:1-9.
[21] Komondoor R, Horwitz S. Using slicing to identify duplication in
source code[C]// 8th International Symposium on Static Analysis.
Springer-Verlag, 2001:40-56.
[22] Zhang Y L, Basit H A, Jarzabek S, et al. Query-based filtering and
graphical view generation for clone analysis[C]//2008 IEEE
International Conference on Software Maintenance. IEEE Computer
Society, 2008:376-385.
[23] ZHANG J J, WANG C H, ZHANG L P, et al. Clone code detection
based on Levenshtein distance of token[J]. Journal of Computer
Applications, 2015, 35(12):3536-3543.
175