共 50 条
- [1] Detecting Java']Java Code Clones Based on Bytecode Sequence Alignment [J]. IEEE ACCESS, 2019, 7 : 22421 - 22433
- [2] Finding Source Code Clones in Intermediate Representations of Java']Java Bytecode [J]. 2023 IEEE 17TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES, IWSC 2023, 2023, : 37 - 43
- [3] AUTOMATIC DETECTING AND REMOVING CLONES IN JAVA']JAVA SOURCE CODE [J]. SOFTWARE DEVELOPMENT 2011, 2011, : 10 - 18
- [4] Mobile code security by Java']Java bytecode instrumentation [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 27 - 40
- [5] Mobile code security by Java']Java bytecode dependence analysis [J]. IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2: SMART INFO-MEDIA SYSTEMS, 2004, : 923 - 926
- [7] Target code generation using the code expansion technique for Java']Java Bytecode [J]. PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 752 - 755
- [8] Checking secure information flow in Java']Java bytecode by code transformation and standard bytecode verification [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2004, 34 (13): : 1225 - 1255
- [9] Negative Effects of Bytecode Instrumentation on Java']Java Source Code Coverage [J]. 2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 1, 2016, : 225 - 235
- [10] A novel code representation for detecting Java']Java code clones using high-level and abstract compiled code representations [J]. PLOS ONE, 2024, 19 (05):