Fig. 4From: Are our clone detectors good enough? An empirical study of code effects by obfuscationAn example of false clone pair misjudged after obfuscationBack to article page