Fig. 1From: Are our clone detectors good enough? An empirical study of code effects by obfuscationThe comparison between the evaluation manner of our study and previous studiesBack to article page