A Novel Source Code Clone Detection Method Based on Dual-GCN and IVHFS

被引:0
|
作者
Yang, Haixin [1 ]
Li, Zhen [1 ]
Guo, Xinyu [1 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Baoding 071002, Peoples R China
关键词
source code clone detection; software engineering; graph convolutional network; interval-valued hesitant fuzzy set; abstract syntax tree; control flow graph;
D O I
10.3390/electronics12061315
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Source code clone detection, which can identify code fragments with similar functions, plays a significant role in software development and quality assurance. Existing methods either extract single syntactic or semantic information, or ignore the associated information between code statements in different structures. It is difficult for these methods to effectively detect clone pairs with similar functions. In this paper, we propose a new model based on a dual graph convolutional network (GCN) and interval-valued hesitant fuzzy set (IVHFS), which we named DG-IVHFS. Specifically, we simplified and grouped the abstract syntax tree (AST) of source code to obtain the group representations. The group representations of the AST, as well as the control flow graph (CFG) representations, were transformed into graph structures, and then we applied GCNs on them to learn dependencies between nodes. In addition, we introduced IVHFS into the model for a more comprehensive evaluation of similarity. Our experimental results demonstrated that the precision, recall, and F1-scores of DG-IVHFS on the BigCloneBench and GoogleCodeJam datasets reached 98, 97 and 97% and 98, 93 and 95%, respectively, exceeding current state-of-the-art models. Moreover, our model performed well in terms of time consumption.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Feature dependence graph based source code loophole detection method
    Yang H.
    Yang H.
    Zhang L.
    Cheng X.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (01): : 103 - 117
  • [22] Fast Code Clone Detection Based on Weighted Recursive Autoencoders
    Zeng, Jie
    Ben, Kerong
    Li, Xiaowei
    Zhang, Xian
    IEEE ACCESS, 2019, 7 : 125062 - 125078
  • [23] Semantic Clone Detection Based on Code Feature Fusion Learning
    Zhang, Qianjin
    Jin, Dahai
    Wang, Yawen
    Gong, Yunzhan
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2023, 33 (07) : 1039 - 1062
  • [24] Malicious code clone detection technology based on deep learning
    Shen Y.
    Yan H.
    Xia C.
    Han Z.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (02): : 282 - 290
  • [25] Code Clone Detection Based on Bytecode and Twin Neural Networks
    Li Z.
    Lei H.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [26] Case Study on Semantic Clone Detection Based On Code Behavior
    Priyambadha, Bayu
    Rochimah, Siti
    2014 International Conference on Data and Software Engineering (ICODSE), 2014,
  • [27] Code Clone Detection Based on Order and Content of Control Statements
    Sudhamani, M.
    Rangarajan, Lalitha
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 59 - 64
  • [28] Code Clone Detection based on Event Embedding and Event Dependency
    Huang, Cheng
    Zhou, Hui
    Ye, Chunyang
    Li, Bingzhuo
    13TH ASIA-PACIFIC SYMPOSIUM ON INTERNETWARE, INTERNETWARE 2022, 2022, : 65 - 74
  • [29] Automatic Patch Generation for IoT Based on Code Clone Detection
    Ohno, Kentaro
    Zhu, Wenqing
    Takada, Hiroaki
    Yoshida, Norihriro
    Computer Software, 2023, 40 (04): : 47 - 53
  • [30] Domain analysis of device drivers using code clone detection method
    Ma, Yu-Seung
    Woo, Duk-Kyun
    ETRI JOURNAL, 2008, 30 (03) : 394 - 402