{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T04:24:31Z","timestamp":1727065471173},"reference-count":38,"publisher":"World Scientific Pub Co Pte Lt","issue":"06","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62002177"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Science and Technology Planning Project of Tianjin, China","award":["20YDTPJC01810"]},{"DOI":"10.13039\/501100006606","name":"Tianjin Natural Science Foundation","doi-asserted-by":"crossref","award":["19JCQNJC00300"],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Soft. Eng. Knowl. Eng."],"published-print":{"date-parts":[[2021,6]]},"abstract":" Code clone serves as a typical programming manner that reuses the existing code to solve similar programming problems, which greatly facilitates software development but recurs program bugs and maintenance costs. Recently, deep learning-based detection approaches gradually present their effectiveness on feature representation and detection performance. Among them, deep learning approaches based on abstract syntax tree (AST) construct models relying on the node embedding technique. In AST, the semantic of nodes is obviously hierarchical, and the importance of nodes is quite different to determine whether the two code fragments are cloned or not. However, some approaches do not fully consider the hierarchical structure information of source code. Some approaches ignore the different importance of nodes when generating the features of source code. Thirdly, when the tree is very large and deep, many approaches are vulnerable to the gradient vanishing problem during training. In order to properly address these challenges, we propose a hierarchical attentive graph neural network embedding model-HAG for the code clone detection. Firstly, the attention mechanism is applied on nodes in AST to distinguish the importance of different nodes during the model training. In addition, the HAG adopts graph convolutional network (GCN) to propagate the code message on AST graph and then exploits a hierarchical differential pooling GCN to sufficiently capture the code semantics at different structure level. <\/jats:p> To evaluate the effectiveness of HAG, we conducted extensive experiments on public clone dataset and compared it with seven state-of-the-art clone detection models. The experimental results demonstrate that the HAG achieves superior detection performance compared with baseline models. Especially, in the detection of moderately Type-3 or Type-4 clones, the HAG particularly outperforms baselines, indicating the strong detection capability of HAG for semantic clones. Apart from that, the impacts of the hierarchical pooling, attention mechanism and critical model parameters are systematically discussed. <\/jats:p>","DOI":"10.1142\/s021819402150025x","type":"journal-article","created":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T03:43:23Z","timestamp":1624333403000},"page":"837-861","source":"Crossref","is-referenced-by-count":10,"title":["Code Clone Detection with Hierarchical Attentive Graph Embedding"],"prefix":"10.1142","volume":"31","author":[{"given":"Xiujuan","family":"Ji","sequence":"first","affiliation":[{"name":"Department of Computer Science, Binhai College, Nankai University, Tianjin, P. R. China"}]},{"given":"Lei","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Artificial Intelligence, Nankai University, Tianjin, P.\u00a0R.\u00a0China"}]},{"given":"Jingwen","family":"Zhu","sequence":"additional","affiliation":[{"name":"College of Software, Nankai University, Tianjin, P.\u00a0R.\u00a0China"}]}],"member":"219","published-online":{"date-parts":[[2021,6,21]]},"reference":[{"key":"S021819402150025XBIB001","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"S021819402150025XBIB002","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405284"},{"key":"S021819402150025XBIB003","first-page":"171","volume-title":"Proc.1993 Conf. Centre for Advanced Studies on Collaborative Research: Software Engineering","volume":"1","author":"Johnson J. H.","year":"1993"},{"key":"S021819402150025XBIB004","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2007.906776"},{"key":"S021819402150025XBIB005","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.26"},{"key":"S021819402150025XBIB006","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"S021819402150025XBIB007","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"S021819402150025XBIB008","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"S021819402150025XBIB009","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"S021819402150025XBIB010","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.46"},{"key":"S021819402150025XBIB011","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.77"},{"key":"S021819402150025XBIB012","volume-title":"Deep Learning for Image Processing Applications","author":"Hemanth D. J.","year":"2017"},{"key":"S021819402150025XBIB013","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"S021819402150025XBIB014","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.213"},{"key":"S021819402150025XBIB015","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970326"},{"key":"S021819402150025XBIB016","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668037"},{"key":"S021819402150025XBIB017","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2966532"},{"key":"S021819402150025XBIB018","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"S021819402150025XBIB019","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"S021819402150025XBIB020","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.573"},{"key":"S021819402150025XBIB021","volume-title":"Thirty-Second AAAI Conf. Artificial Intelligence","author":"Yan S.","year":"2018"},{"key":"S021819402150025XBIB023","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219890"},{"key":"S021819402150025XBIB026","first-page":"3111","volume-title":"Advances in Neural Information Processing Systems","author":"Mikolov T.","year":"2013"},{"key":"S021819402150025XBIB028","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"key":"S021819402150025XBIB029","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/423"},{"key":"S021819402150025XBIB030","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00086"},{"key":"S021819402150025XBIB031","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2938825"},{"key":"S021819402150025XBIB032","first-page":"261","volume-title":"2020 IEEE 27th Int. Conf. Software Analysis, Evolution and Reengineering","author":"Wang W.","year":"2020"},{"key":"S021819402150025XBIB033","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332459"},{"key":"S021819402150025XBIB034","first-page":"140","volume-title":"Proc. Companion to the 20th Annual ACM SIGPLAN Conf. on Object-oriented Programming, Systems, Languages, and Applications","author":"Lee I. J.","year":"2005"},{"key":"S021819402150025XBIB035","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613857"},{"key":"S021819402150025XBIB036","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2011.12"},{"key":"S021819402150025XBIB037","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2010.5563834"},{"key":"S021819402150025XBIB038","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"S021819402150025XBIB039","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196431"},{"key":"S021819402150025XBIB040","first-page":"4","volume-title":"AAAI","volume":"2","author":"Mou L. Z. T. W. L.","year":"2016"},{"key":"S021819402150025XBIB042","first-page":"4800","volume-title":"Advances in Neural Information Processing Systems","author":"Ying Z.","year":"2018"},{"key":"S021819402150025XBIB044","first-page":"151","volume-title":"Proc. 2011 Conf. Empirical Methods in Natural Language Processing","author":"Socher R.","year":"2011"}],"container-title":["International Journal of Software Engineering and Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S021819402150025X","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T03:44:08Z","timestamp":1624333448000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S021819402150025X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":38,"journal-issue":{"issue":"06","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10.1142\/S021819402150025X"],"URL":"https:\/\/doi.org\/10.1142\/s021819402150025x","relation":{},"ISSN":["0218-1940","1793-6403"],"issn-type":[{"value":"0218-1940","type":"print"},{"value":"1793-6403","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6]]}}}