共 50 条
- [1] A Comparative Analysis of Clone Detection Techniques on SemanticCloneBench Proceedings - 2022 IEEE 16th International Workshop on Software Clones, IWSC 2022, 2022, : 16 - 22
- [2] Comparative analysis for Edge Detection Techniques 2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 675 - 681
- [3] SemanticCloneBench: A Semantic Code Clone Benchmark using Crowd-Source Knowledge PROCEEDINGS OF THE 2020 IEEE 14TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES (IWSC '20), 2020, : 57 - 63
- [4] A Comparative Study of Clone Detection Approaches PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 1025 - 1027
- [5] Comparative Analysis of Android Malware Detection Techniques PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 2, 2017, 469 : 131 - 139
- [6] A Comparative Analysis of Phishing Detection and Prevention Techniques INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (08): : 371 - 384
- [9] Machine Learning Techniques for Intrusion Detection: A Comparative Analysis PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
- [10] A Comparative Analysis of Segmentation Techniques for Lung Cancer Detection Pattern Recognition and Image Analysis, 2019, 29 : 167 - 173