OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Software clone detection: A systematic review
Dhavleesh Rattan, Rajesh Bhatia, Maninder Singh
Information and Software Technology (2013) Vol. 55, Iss. 7, pp. 1165-1199
Closed Access | Times Cited: 374

Showing 1-25 of 374 citing articles:

VulDeePecker: A Deep Learning-Based System for Vulnerability Detection
Zhen Li, Deqing Zou, Shouhuai Xu, et al.
(2018)
Open Access | Times Cited: 776

SourcererCC
Hitesh Sajnani, Vaibhav Saini, Jeffrey Svajlenko, et al.
Proceedings of the 44th International Conference on Software Engineering (2016)
Open Access | Times Cited: 348

SourcererCC: scaling code clone detection to big-code
Hitesh Sajnani, Vaibhav Saini, Jeffrey Svajlenko, et al.
arXiv (Cornell University) (2016), pp. 1157-1168
Open Access | Times Cited: 304

VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery
Seulbae Kim, Seunghoon Woo, Heejo Lee, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2017)
Closed Access | Times Cited: 287

Intelligent personal assistants: A systematic literature review
Allan de Barcelos Silva, Márcio Miguel Gomes, Cristiano André da Costa, et al.
Expert Systems with Applications (2020) Vol. 147, pp. 113193-113193
Closed Access | Times Cited: 190

VulPecker
Zhen Li, Deqing Zou, Shouhuai Xu, et al.
(2016)
Closed Access | Times Cited: 188

Code smells and refactoring: A tertiary systematic review of challenges and observations
Guilherme Lacerda, Fábio Petrillo, Marcelo Soares Pimenta, et al.
Journal of Systems and Software (2020) Vol. 167, pp. 110610-110610
Open Access | Times Cited: 176

Evaluating clone detection tools with BigCloneBench
Jeffrey Svajlenko, Chanchal K. Roy
(2015), pp. 131-140
Closed Access | Times Cited: 150

A Systematic Review on Code Clone Detection
Qurat Ul Ain, Wasi Haider Butt, Muhammad Waseem Anwar, et al.
IEEE Access (2019) Vol. 7, pp. 86121-86144
Open Access | Times Cited: 123

Evaluating Modern Clone Detection Tools
Jeffrey Svajlenko, Chanchal K. Roy
(2014), pp. 321-330
Closed Access | Times Cited: 114

CCAligner
Pengcheng Wang, Jeffrey Svajlenko, Yanzhao Wu, et al.
Proceedings of the 44th International Conference on Software Engineering (2018), pp. 1066-1077
Closed Access | Times Cited: 106

The vision of software clone management: Past, present, and future (Keynote paper)
Chanchal K. Roy, Minhaz F. Zibran, Rainer Koschke
(2014)
Open Access | Times Cited: 102

A Systematic Literature Review on Bad Smells–5 W's: Which, When, What, Who, Where
Elder Vicente de Paulo Sobrinho, Andrea De Lucia, Marcelo de Almeida Maia
IEEE Transactions on Software Engineering (2018) Vol. 47, Iss. 1, pp. 17-66
Closed Access | Times Cited: 100

Deep Learning Approach for Software Maintainability Metrics Prediction
Sudan Jha, Raghvendra Kumar, Lê Hoàng Sơn, et al.
IEEE Access (2019) Vol. 7, pp. 61840-61855
Open Access | Times Cited: 100

Functional code clone detection with syntax and semantics fusion learning
Chunrong Fang, Zixi Liu, Yangyang Shi, et al.
(2020)
Closed Access | Times Cited: 98

Towards a scalable resource-driven approach for detecting repackaged Android applications
Yuru Shao, Xiapu Luo, Chenxiong Qian, et al.
(2014)
Closed Access | Times Cited: 96

Towards a prioritization of code debt: A code smell Intensity Index
Francesca Arcelli Fontana, Vincenzo Ferme, Marco Zanoni, et al.
(2015), pp. 16-24
Closed Access | Times Cited: 93

Malicious application detection in android — A systematic literature review
Tejpal Sharma, Dhavleesh Rattan
Computer Science Review (2021) Vol. 40, pp. 100373-100373
Closed Access | Times Cited: 70

Microservice Architecture Reconstruction and Visualization Techniques: A Review
Tomáš Černý, Amr S. Abdelfattah, Vincent Bushong, et al.
(2022), pp. 39-48
Open Access | Times Cited: 45

A Survey of Software Clone Detection Techniques
Abdullah Sheneamer, Jugal Kalita
International Journal of Computer Applications (2016) Vol. 137, Iss. 10, pp. 1-21
Open Access | Times Cited: 85

Some from Here, Some from There: Cross-Project Code Reuse in GitHub
Mohammad Gharehyazie, Baishakhi Ray, Vladimir Filkov
(2017), pp. 291-301
Closed Access | Times Cited: 85

A survey of Web crawlers for information retrieval
Manish Kumar, Rajesh Bhatia, Dhavleesh Rattan
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2017) Vol. 7, Iss. 6
Closed Access | Times Cited: 79

BigCloneEval: A Clone Detection Tool Evaluation Framework with BigCloneBench
Jeffrey Svajlenko, Chanchal K. Roy
(2016), pp. 596-600
Closed Access | Times Cited: 73

Software Design Smell Detection: a systematic mapping study
Khalid Alkharabsheh, Yania Crespo, Esperanza Manso, et al.
Software Quality Journal (2018) Vol. 27, Iss. 3, pp. 1069-1148
Closed Access | Times Cited: 67

AutoVAS: An automated vulnerability analysis system with a deep learning approach
Sanghoon Jeon, Huy Kang Kim
Computers & Security (2021) Vol. 106, pp. 102308-102308
Closed Access | Times Cited: 41

Page 1 - Next Page

Scroll to top