Tritor: Detecting Semantic Code Clones by Building Social Network-Based Triads Model

被引:1
作者
Zou, Deqing [1 ,2 ]
Feng, Siyue [1 ,2 ]
Wu, Yueming [3 ]
Suo, Wenqi [1 ,2 ]
Jin, Hai [1 ,4 ]
机构
[1] Huazhong Univ Sci & Technol, Hubei Key Lab Distributed Syst Secur, Cluster & Grid Comp Lab,Hubei Engn Res Ctr Big Da, Natl Engn Res Ctr Big Data Technol & Syst Serv Co, Wuhan, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
[3] Nanyang Technol Univ, Singapore, Singapore
[4] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
来源
PROCEEDINGS OF THE 31ST ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2023 | 2023年
基金
美国国家科学基金会;
关键词
Semantic Clones; Abstract Syntax Tree; Social Network; Triads;
D O I
10.1145/3611643.3616354
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Code clone detection refers to finding the functional similarities between two code fragments, which is becoming increasingly important with the evolution of software engineering. Numbers of code clone detection methods have been proposed, including tree-based methods that are capable of detecting semantic code clones. However, since tree structure is complex, these methods are difficult to apply to large-scale clone detection. In this paper, we propose a scalable semantic code clone detector based on semantically enhanced abstract syntax tree. Specifically, we add the control flow and data flow details into the original tree and regard the enhanced tree as a social network. Thenwe build a social network-based triads model to collect the similarity features between the two methods by analyzing different types of triads within the network. After obtaining all features, we use them to train a machine learning-based code clone detector (i.e., Tritor). Our comparative experimental results show that Tritor is superior to SourcererCC, RtvNN, Deckard, ASTNN, TBCNN, CDLH, and SCDetector, are equally good with DeepSim and FCCA. As for scalability, Tritor is about 39 times faster than another current state-of-the-art tree-based code clone detector ASTNN.
引用
收藏
页码:771 / 783
页数:13
相关论文
共 50 条
  • [21] Qualitative assessment of social network-based recommender systems based on essential properties
    Cabacas, Regin
    Wang, Yufeng
    Ra, In-Ho
    Advances in Intelligent Systems and Computing, 2014, 268 : 1 - 11
  • [22] A user-based topic model with topical word embeddings for semantic modelling in social network
    Jin, Xin
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 43 (01) : 1467 - 1480
  • [23] Multiple Similarity-based Features Blending for Detecting Code Clones using Consensus-Driven Classification
    Sheneamer, Abdullah M.
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 183
  • [24] Semantic web-based social network access control
    Carminati, Barbara
    Ferrari, Elena
    Heatherly, Raymond
    Kantarcioglu, Murat
    Thuraisingham, Bhavani
    COMPUTERS & SECURITY, 2011, 30 (2-3) : 108 - 115
  • [25] Constructing and mining a semantic-based academic social network
    Duong, Trong Hai
    Nguyen, Ngoc Thanh
    Jo, Geun Sik
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2010, 21 (03) : 197 - 207
  • [26] Social Network-Based Interventions to Promote Condom Use: A Systematic Review
    Wang, Kaidi
    Brown, Katherine
    Shen, Song-Ying
    Tucker, Joseph
    AIDS AND BEHAVIOR, 2011, 15 (07) : 1298 - 1308
  • [27] Social Network-Based Digital Stroke Prevention: Opportunities, Results and Prospects
    Demkina, A. E.
    Bezzubtseva, M., V
    Ryabinina, M. N.
    Kotlyar, Ya A.
    Keln, O. L.
    Sarapulova, A., V
    Zhetishev, R. R.
    Kuvaev, V. S.
    Maksimova, M. Y.
    Pogosova, N., V
    Zhetisheva, I. S.
    RATIONAL PHARMACOTHERAPY IN CARDIOLOGY, 2021, 17 (05) : 696 - 701
  • [28] Social Network-Based Interventions to Promote Condom Use: A Systematic Review
    Kaidi Wang
    Katherine Brown
    Song-Ying Shen
    Joseph Tucker
    AIDS and Behavior, 2011, 15
  • [29] Towards a Dynamic Social Network-Based Approach for Service Composition in the IoT
    Xu, Wen
    Hu, Zheng
    Gong, Tao
    Zhao, Zhengzheng
    FOURTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2011): COMPUTER VISION AND IMAGE ANALYSIS: PATTERN RECOGNITION AND BASIC TECHNOLOGIES, 2012, 8350
  • [30] Detecting Spammers on Social Networks Based on a Hybrid Model
    Xu, Guangxia
    Qi, Jin
    Huang, Deling
    Daneshmand, Mahmoud
    2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 3062 - 3068