Cited By
View all- Cao ZFan ZChen BCheng ZXu SLi X(2024)Improved Message Mechanism-Based Cross-Domain Security Control Model in Mobile TerminalsInternational Journal of Information Security and Privacy10.4018/IJISP.34798718:1(1-27)Online publication date: 17-Sep-2024
- Dou SWu YJia HZhou YLiu YLiu Y(2024)CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone DetectionProceedings of the ACM on Software Engineering10.1145/36607771:FSE(1564-1584)Online publication date: 12-Jul-2024
- Jhaveri SKrone-Martins ALopes CStorm THirschfeld R(2023)Cloning and Beyond: A Quantum Solution to Duplicate CodeProceedings of the 2023 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software10.1145/3622758.3622889(32-49)Online publication date: 18-Oct-2023
- Show More Cited By