A new clone detection approach in RFID-enabled supply chains

Author(s):  
Cong-cong Xing Cong-cong Xing ◽  
Jun Huang Jun Huang ◽  
Kun Hua Kun Hua ◽  
Song Guo Song Guo
Author(s):  
Yan-Ya Zhang ◽  
Ming Li

Code clone is common in software development, which usually leads to software defects or copyright infringement. Researchers have paid significant attention to code clone detection, and many methods have been proposed. However, the patterns for generating the code clones do not always remain the same. In order to fool the clone detection systems, the plagiarists, known as the clone creator, usually conduct a series of tricky modifications on the code fragments to make the clone difficult to detect. The existing clone detection approaches, which neglects the dynamics of the “contest” between the plagiarist and the detectors, is doomed to be not robust to adversarial revision of the code. In this paper, we propose a novel clone detection approach, namely ACD, to mimic the adversarial process between the plagiarist and the detector, which enables us to not only build strong a clone detector but also model the behavior of the plagiarists. Such a plagiarist model may in turn help to understand the vulnerability of the current software clone detection tools. Experiments show that the learned policy of plagiarist can help us build stronger clone detector, which outperforms the existing clone detection methods.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 131270-131281
Author(s):  
Jinze Liu ◽  
Tao Wang ◽  
Chenhui Feng ◽  
Huaimin Wang ◽  
Dongsheng Li

2017 ◽  
Vol 5 (1) ◽  
pp. 134-140 ◽  
Author(s):  
Jun Huang ◽  
Xiang Li ◽  
Cong-Cong Xing ◽  
Wei Wang ◽  
Kun Hua ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document