Author of the publication

Towards Understanding the Capability of Large Language Models on Code Clone Detection: A Survey.

, , , , , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic 3D point cloud registration algorithm based on triangle similarity ratio consistency., , , , and . IET Image Process., 14 (14): 3314-3323 (2020)An Empirical Study on Android Malware Characterization by Social Network Analysis., , , and . IEEE Trans. Reliab., 73 (1): 757-770 (March 2024)Gamification narrative design as a predictor for mobile fitness app user persistent usage intentions: a goal priming perspective., , , and . Enterp. Inf. Syst., 15 (10): 1501-1545 (2021)FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection., , , , , , and . USENIX Security Symposium, USENIX Association, (2024)TGMM: Combining Parse Tree with GPU for Scalable Multilingual and Multi-Granularity Code Clone Detection., , , , and . CoRR, (2024)Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?, , , , , , and . ISSTA, page 1407-1419. ACM, (2023)SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis., , , , , , , and . ASE, page 821-833. IEEE, (2020)MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis., , , , , and . ASE, page 139-150. IEEE, (2019)A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments., , , , , and . ICSE, page 12:1-12:13. ACM, (2024)Gitor: Scalable Code Clone Detection by Building Global Sample Graph., , , , and . ESEC/SIGSOFT FSE, page 784-795. ACM, (2023)