
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Software clone detection: A systematic review
Dhavleesh Rattan, Rajesh Bhatia, Maninder Singh
Information and Software Technology (2013) Vol. 55, Iss. 7, pp. 1165-1199
Closed Access | Times Cited: 374
Dhavleesh Rattan, Rajesh Bhatia, Maninder Singh
Information and Software Technology (2013) Vol. 55, Iss. 7, pp. 1165-1199
Closed Access | Times Cited: 374
Showing 1-25 of 374 citing articles:
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection
Zhen Li, Deqing Zou, Shouhuai Xu, et al.
(2018)
Open Access | Times Cited: 776
Zhen Li, Deqing Zou, Shouhuai Xu, et al.
(2018)
Open Access | Times Cited: 776
SourcererCC
Hitesh Sajnani, Vaibhav Saini, Jeffrey Svajlenko, et al.
Proceedings of the 44th International Conference on Software Engineering (2016)
Open Access | Times Cited: 348
Hitesh Sajnani, Vaibhav Saini, Jeffrey Svajlenko, et al.
Proceedings of the 44th International Conference on Software Engineering (2016)
Open Access | Times Cited: 348
SourcererCC: scaling code clone detection to big-code
Hitesh Sajnani, Vaibhav Saini, Jeffrey Svajlenko, et al.
arXiv (Cornell University) (2016), pp. 1157-1168
Open Access | Times Cited: 304
Hitesh Sajnani, Vaibhav Saini, Jeffrey Svajlenko, et al.
arXiv (Cornell University) (2016), pp. 1157-1168
Open Access | Times Cited: 304
VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery
Seulbae Kim, Seunghoon Woo, Heejo Lee, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2017)
Closed Access | Times Cited: 287
Seulbae Kim, Seunghoon Woo, Heejo Lee, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2017)
Closed Access | Times Cited: 287
Intelligent personal assistants: A systematic literature review
Allan de Barcelos Silva, Márcio Miguel Gomes, Cristiano André da Costa, et al.
Expert Systems with Applications (2020) Vol. 147, pp. 113193-113193
Closed Access | Times Cited: 190
Allan de Barcelos Silva, Márcio Miguel Gomes, Cristiano André da Costa, et al.
Expert Systems with Applications (2020) Vol. 147, pp. 113193-113193
Closed Access | Times Cited: 190
Code smells and refactoring: A tertiary systematic review of challenges and observations
Guilherme Lacerda, Fábio Petrillo, Marcelo Soares Pimenta, et al.
Journal of Systems and Software (2020) Vol. 167, pp. 110610-110610
Open Access | Times Cited: 176
Guilherme Lacerda, Fábio Petrillo, Marcelo Soares Pimenta, et al.
Journal of Systems and Software (2020) Vol. 167, pp. 110610-110610
Open Access | Times Cited: 176
Evaluating clone detection tools with BigCloneBench
Jeffrey Svajlenko, Chanchal K. Roy
(2015), pp. 131-140
Closed Access | Times Cited: 150
Jeffrey Svajlenko, Chanchal K. Roy
(2015), pp. 131-140
Closed Access | Times Cited: 150
A Systematic Review on Code Clone Detection
Qurat Ul Ain, Wasi Haider Butt, Muhammad Waseem Anwar, et al.
IEEE Access (2019) Vol. 7, pp. 86121-86144
Open Access | Times Cited: 123
Qurat Ul Ain, Wasi Haider Butt, Muhammad Waseem Anwar, et al.
IEEE Access (2019) Vol. 7, pp. 86121-86144
Open Access | Times Cited: 123
Evaluating Modern Clone Detection Tools
Jeffrey Svajlenko, Chanchal K. Roy
(2014), pp. 321-330
Closed Access | Times Cited: 114
Jeffrey Svajlenko, Chanchal K. Roy
(2014), pp. 321-330
Closed Access | Times Cited: 114
CCAligner
Pengcheng Wang, Jeffrey Svajlenko, Yanzhao Wu, et al.
Proceedings of the 44th International Conference on Software Engineering (2018), pp. 1066-1077
Closed Access | Times Cited: 106
Pengcheng Wang, Jeffrey Svajlenko, Yanzhao Wu, et al.
Proceedings of the 44th International Conference on Software Engineering (2018), pp. 1066-1077
Closed Access | Times Cited: 106
The vision of software clone management: Past, present, and future (Keynote paper)
Chanchal K. Roy, Minhaz F. Zibran, Rainer Koschke
(2014)
Open Access | Times Cited: 102
Chanchal K. Roy, Minhaz F. Zibran, Rainer Koschke
(2014)
Open Access | Times Cited: 102
A Systematic Literature Review on Bad Smells–5 W's: Which, When, What, Who, Where
Elder Vicente de Paulo Sobrinho, Andrea De Lucia, Marcelo de Almeida Maia
IEEE Transactions on Software Engineering (2018) Vol. 47, Iss. 1, pp. 17-66
Closed Access | Times Cited: 100
Elder Vicente de Paulo Sobrinho, Andrea De Lucia, Marcelo de Almeida Maia
IEEE Transactions on Software Engineering (2018) Vol. 47, Iss. 1, pp. 17-66
Closed Access | Times Cited: 100
Deep Learning Approach for Software Maintainability Metrics Prediction
Sudan Jha, Raghvendra Kumar, Lê Hoàng Sơn, et al.
IEEE Access (2019) Vol. 7, pp. 61840-61855
Open Access | Times Cited: 100
Sudan Jha, Raghvendra Kumar, Lê Hoàng Sơn, et al.
IEEE Access (2019) Vol. 7, pp. 61840-61855
Open Access | Times Cited: 100
Functional code clone detection with syntax and semantics fusion learning
Chunrong Fang, Zixi Liu, Yangyang Shi, et al.
(2020)
Closed Access | Times Cited: 98
Chunrong Fang, Zixi Liu, Yangyang Shi, et al.
(2020)
Closed Access | Times Cited: 98
Towards a scalable resource-driven approach for detecting repackaged Android applications
Yuru Shao, Xiapu Luo, Chenxiong Qian, et al.
(2014)
Closed Access | Times Cited: 96
Yuru Shao, Xiapu Luo, Chenxiong Qian, et al.
(2014)
Closed Access | Times Cited: 96
Towards a prioritization of code debt: A code smell Intensity Index
Francesca Arcelli Fontana, Vincenzo Ferme, Marco Zanoni, et al.
(2015), pp. 16-24
Closed Access | Times Cited: 93
Francesca Arcelli Fontana, Vincenzo Ferme, Marco Zanoni, et al.
(2015), pp. 16-24
Closed Access | Times Cited: 93
Malicious application detection in android — A systematic literature review
Tejpal Sharma, Dhavleesh Rattan
Computer Science Review (2021) Vol. 40, pp. 100373-100373
Closed Access | Times Cited: 70
Tejpal Sharma, Dhavleesh Rattan
Computer Science Review (2021) Vol. 40, pp. 100373-100373
Closed Access | Times Cited: 70
Microservice Architecture Reconstruction and Visualization Techniques: A Review
Tomáš Černý, Amr S. Abdelfattah, Vincent Bushong, et al.
(2022), pp. 39-48
Open Access | Times Cited: 45
Tomáš Černý, Amr S. Abdelfattah, Vincent Bushong, et al.
(2022), pp. 39-48
Open Access | Times Cited: 45
A Survey of Software Clone Detection Techniques
Abdullah Sheneamer, Jugal Kalita
International Journal of Computer Applications (2016) Vol. 137, Iss. 10, pp. 1-21
Open Access | Times Cited: 85
Abdullah Sheneamer, Jugal Kalita
International Journal of Computer Applications (2016) Vol. 137, Iss. 10, pp. 1-21
Open Access | Times Cited: 85
Some from Here, Some from There: Cross-Project Code Reuse in GitHub
Mohammad Gharehyazie, Baishakhi Ray, Vladimir Filkov
(2017), pp. 291-301
Closed Access | Times Cited: 85
Mohammad Gharehyazie, Baishakhi Ray, Vladimir Filkov
(2017), pp. 291-301
Closed Access | Times Cited: 85
A survey of Web crawlers for information retrieval
Manish Kumar, Rajesh Bhatia, Dhavleesh Rattan
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2017) Vol. 7, Iss. 6
Closed Access | Times Cited: 79
Manish Kumar, Rajesh Bhatia, Dhavleesh Rattan
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2017) Vol. 7, Iss. 6
Closed Access | Times Cited: 79
BigCloneEval: A Clone Detection Tool Evaluation Framework with BigCloneBench
Jeffrey Svajlenko, Chanchal K. Roy
(2016), pp. 596-600
Closed Access | Times Cited: 73
Jeffrey Svajlenko, Chanchal K. Roy
(2016), pp. 596-600
Closed Access | Times Cited: 73
Software Design Smell Detection: a systematic mapping study
Khalid Alkharabsheh, Yania Crespo, Esperanza Manso, et al.
Software Quality Journal (2018) Vol. 27, Iss. 3, pp. 1069-1148
Closed Access | Times Cited: 67
Khalid Alkharabsheh, Yania Crespo, Esperanza Manso, et al.
Software Quality Journal (2018) Vol. 27, Iss. 3, pp. 1069-1148
Closed Access | Times Cited: 67
AutoVAS: An automated vulnerability analysis system with a deep learning approach
Sanghoon Jeon, Huy Kang Kim
Computers & Security (2021) Vol. 106, pp. 102308-102308
Closed Access | Times Cited: 41
Sanghoon Jeon, Huy Kang Kim
Computers & Security (2021) Vol. 106, pp. 102308-102308
Closed Access | Times Cited: 41