Fig. 2From: Are our clone detectors good enough? An empirical study of code effects by obfuscationOverview of the evaluation workBack to article page