Similarity of Source Code in the Presence of Pervasive Modifications [SCAM'16]
Searching for Configurations in Clone Evaluation: A Replication Study [SSBSE'16]
Using Compilation/Decompilation to Enhance Clone Detection