


default search action
Proceedings of the ACM on Software Engineering, Volume 1
Volume 1, Number FSE, 2024
SIGSOFT FSE 2024
- Xiangping Chen
, Furen Xu
, Yuan Huang
, Neng Zhang
, Zibin Zheng
:
JIT-Smart: A Multi-task Learning Framework for Just-in-Time Defect Prediction and Localization. 1-23 - Guangba Yu
, Pengfei Chen
, Zilong He
, Qiuyu Yan
, Yu Luo
, Fangyuan Li
, Zibin Zheng
:
ChangeRCA: Finding Root Causes from Software Changes in Large Online Systems. 24-46 - Zirui Song
, Jiongyi Chen
, Kehuan Zhang
:
Bin2Summary: Beyond Function Name Prediction in Stripped Binaries with Functionality-Specific Code Embeddings. 47-69 - Keke Lian
, Lei Zhang
, Guangliang Yang
, Shuo Mao
, Xinjie Wang
, Yuan Zhang
, Min Yang
:
Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications. 70-91 - Mohayeminul Islam
, Ajay Kumar Jha
, Ildar Akhmetov
, Sarah Nadi
:
Characterizing Python Library Migrations. 92-114 - Yifan Zhang
, Jiliang Li
, Zachary Karas
, Aakash Bansal
, Toby Jia-Jun Li
, Collin McMillan
, Kevin Leach
, Yu Huang
:
EyeTrans: Merging Human and Machine Attention for Neural Code Summarization. 115-136 - Zhihan Jiang
, Jinyang Liu
, Zhuangbin Chen
, Yichen Li
, Junjie Huang
, Yintong Huo
, Pinjia He
, Jiazhen Gu
, Michael R. Lyu
:
LILAC: Log Parsing using LLMs with Adaptive Parsing Cache. 137-160 - Zexu Wang
, Jiachi Chen
, Yanlin Wang
, Yu Zhang
, Weizhe Zhang
, Zibin Zheng
:
Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts. 161-181 - Bolun Li
, Zhihong Sun
, Tao Huang
, Hongyu Zhang
, Yao Wan
, Ge Li
, Zhi Jin
, Chen Lyu
:
IRCoCo: Immediate Rewards-Guided Deep Reinforcement Learning for Code Completion. 182-203 - Liming Nie
, Yangyang Zhao
, Chenglin Li
, Xuqiong Luo
, Yang Liu
:
Shadows in the Interface: A Comprehensive Study on Dark Patterns. 204-225 - Yahui Song
, Xiang Gao
, Wenhua Li
, Wei-Ngan Chin
, Abhik Roychoudhury
:
ProveNFix: Temporal Property-Guided Program Repair. 226-248 - Zeqin Liao
, Yuhong Nan
, Henglong Liang
, Sicheng Hao
, Juan Zhai
, Jiajing Wu
, Zibin Zheng
:
SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis. 249-270 - Aashish Yadavally
, Yi Li
, Tien N. Nguyen
:
Predictive Program Slicing via Execution Knowledge-Guided Dynamic Dependence Learning. 271-292 - Yoel Kim
, Yunja Choi
:
PBE-Based Selective Abstraction and Refinement for Efficient Property Falsification of Embedded Software. 293-315 - Tae Eun Kim
, Jaeseung Choi
, Seongjae Im
, Kihong Heo
, Sang Kil Cha
:
Evaluating Directed Fuzzers: Are We Heading in the Right Direction? 316-337 - Islem Bouzenia
, Bajaj Piyush Krishan
, Michael Pradel
:
DyPyBench: A Benchmark of Executable Python Software. 338-358 - Jingzhi Gong
, Tao Chen
:
Predicting Configuration Performance in Multiple Environments with Sequential Meta-Learning. 359-382 - Haeun Eom
, Dohee Kim
, Sori Lim
, Hyungjoon Koo
, Sungjae Hwang
:
R2I: A Relative Readability Metric for Decompiled Code. 383-405 - Daoguang Zan
, Ailun Yu
, Bo Shen
, Bei Chen
, Wei Li
, Yongshun Gong
, Xiaolin Chen
, Yafen Yao
, Weihua Luo
, Bei Guan
, Yan Liu
, Yongji Wang
, Qianxiang Wang
, Lizhen Cui
:
DiffCoder: Enhancing Large Language Model on API Invocation via Analogical Code Exercises. 406-426 - Necip Fazil Yildiran
, Jeho Oh
, Julia Lawall
, Paul Gazzillo
:
Maximizing Patch Coverage for Testing of Highly-Configurable Software without Exploding Build Times. 427-449 - Agustín Nolasco
, Facundo Molina
, Renzo Degiovanni
, Alessandra Gorla
, Diego Garbervetsky
, Mike Papadakis
, Sebastián Uchitel
, Nazareno Aguirre
, Marcelo F. Frias
:
Abstraction-Aware Inference of Metamorphic Relations. 450-472 - Haiyu Huang
, Xiaoyu Zhang
, Pengfei Chen
, Zilong He
, Zhiming Chen
, Guangba Yu
, Hongyang Chen
, Chen Sun
:
TraStrainer: Adaptive Sampling for Distributed Traces with System Runtime State. 473-493 - Xiao Cheng
, Jiawei Ren
, Yulei Sui
:
Fast Graph Simplification for Path-Sensitive Typestate Analysis through Tempo-Spatial Multi-Point Slicing. 494-516 - Anderson Oliveira
, João Lucas Correia
, Wesley K. G. Assunção
, Juliana Alves Pereira
, Rafael Maiani de Mello
, Daniel Coutinho
, Caio Barbosa
, Paulo Vítor C. F. Libório
, Alessandro Garcia
:
Understanding Developers' Discussions and Perceptions on Non-functional Requirements: The Case of the Spring Ecosystem. 517-538 - Tao Chen
, Miqing Li
:
Adapting Multi-objectivized Software Configuration Tuning. 539-561 - Zian Su
, Xiangzhe Xu
, Ziyang Huang
, Zhuo Zhang
, Yapeng Ye
, Jianjun Huang
, Xiangyu Zhang
:
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking. 562-585 - Yan Wang
, Xiaoning Li
, Tien N. Nguyen
, Shaohua Wang
, Chao Ni
, Ling Ding
:
Natural Is the Best: Model-Agnostic Code Simplification for Pre-trained Large Language Models. 586-608 - Yichen Li
, Yintong Huo
, Renyi Zhong
, Zhihan Jiang
, Jinyang Liu
, Junjie Huang
, Jiazhen Gu
, Pinjia He
, Michael R. Lyu
:
Go Static: Contextualized Logging Statement Generation. 609-630 - Malinda Dilhara
, Abhiram Bellur
, Timofey Bryksin
, Danny Dig
:
Unprecedented Code Change Automation: The Fusion of LLMs and Transformation by Example. 631-653 - Sourav Deb
, Kush Jain
, Rijnard van Tonder
, Claire Le Goues
, Alex Groce
:
Syntax Is All You Need: A Universal-Language Approach to Mutant Generation. 654-674 - Ramakrishna Bairi
, Atharv Sonwane
, Aditya Kanade
, Vageesh D. C.
, Arun Iyer
, Suresh Parthasarathy
, Sriram K. Rajamani
, Balasubramanyan Ashok
, Shashank Shet
:
CodePlan: Repository-Level Coding using LLMs and Planning. 675-698 - Wei Wang
, Huilong Ning
, Gaowei Zhang
, Libo Liu
, Yi Wang
:
Rocks Coding, Not Development: A Human-Centric, Experimental Evaluation of LLM-Supported SE Tasks. 699-721 - Huaien Zhang
, Yu Pei
, Shuyun Liang
, Shin Hwei Tan
:
Understanding and Detecting Annotation-Induced Faults of Static Analyzers. 722-744 - Jiawei Li
, David Faragó
, Christian Petrov
, Iftekhar Ahmed
:
Only diff Is Not Enough: Generating Commit Messages Leveraging Reasoning and Action of Large Language Model. 745-766 - Sabaat Haroon
, Chris Brown
, Muhammad Ali Gulzar
:
DeSQL: Interactive Debugging of SQL in Data-Intensive Scalable Computing. 767-788 - Nalin Wadhwa
, Jui Pradhan
, Atharv Sonwane
, Surya Prakash Sahu
, Nagarajan Natarajan
, Aditya Kanade
, Suresh Parthasarathy
, Sriram K. Rajamani
:
CORE: Resolving Code Quality Issues using LLMs. 789-811 - Md Rakib Hossain Misu
, Cristina V. Lopes
, Iris Ma
, James Noble
:
Towards AI-Assisted Synthesis of Verified Dafny Methods. 812-835 - Mehdi Keshani
, Tudor-Gabriel Velican
, Gideon Bot
, Sebastian Proksch
:
AROMA: Automatic Reproduction of Maven Artifacts. 836-858 - Hai Duong
, Dong Xu
, ThanhVu Nguyen
, Matthew B. Dwyer
:
Harnessing Neuron Stability to Improve DNN Verification. 859-881 - Nathan Wintersgill
, Trevor Stalnaker
, Laura A. Heymann
, Oscar Chaparro
, Denys Poshyvanyk
:
"The Law Doesn't Work Like a Computer": Exploring Software Licensing Issues Faced by Legal Practitioners. 882-905 - Weipeng Jiang
, Juan Zhai
, Shiqing Ma
, Xiaoyu Zhang
, Chao Shen
:
COSTELLO: Contrastive Testing for Embedding-Based Large Language Model as a Service Embeddings. 906-928 - Christian Birchler
, Tanzil Kombarabettu Mohammed
, Pooja Rani
, Teodora Nechita
, Timo Kehrer
, Sebastiano Panichella
:
How Does Simulation-Based Testing for Self-Driving Cars Match Human Perception? 929-950 - Gabriel Ryan
, Siddhartha Jain
, Mingyue Shang
, Shiqi Wang
, Xiaofei Ma
, Murali Krishna Ramanathan
, Baishakhi Ray
:
Code-Aware Prompting: A Study of Coverage-Guided Test Generation in Regression Setting using LLM. 951-971 - Yanfu Yan
, Nathan Cooper
, Kevin Moran
, Gabriele Bavota
, Denys Poshyvanyk
, Steve Rich
:
Enhancing Code Understanding for Impact Analysis by Combining Transformers and Program Dependence Graphs. 972-995 - Gengyi Sun
, Sarra Habchi
, Shane McIntosh
:
RavenBuild: Context, Relevance, and Dependency Aware Build Outcome Prediction. 996-1018 - Luwei Cai
, Fu Song
, Taolue Chen
:
Towards Efficient Verification of Constant-Time Cryptographic Implementations. 1019-1042 - Tao Xiao
, Hideaki Hata
, Christoph Treude
, Kenichi Matsumoto
:
Generative AI for Pull Request Descriptions: Adoption, Impact, and Developer Interventions. 1043-1065 - Vijayaraghavan Murali
, Chandra Shekhar Maddila, Imad Ahmad
, Michael Bolin
, Daniel Cheng
, Negar Ghorbani
, Renuka Fernandez
, Nachiappan Nagappan
, Peter C. Rigby
:
AI-Assisted Code Authoring at Scale: Fine-Tuning, Deploying, and Mixed Methods Evaluation. 1066-1085 - Oussama Ben Sghaier
, Houari A. Sahraoui
:
Improving the Learning of Code Review Successive Tasks with Cross-Task Knowledge Distillation. 1086-1106 - Zejun Zhang
, Zhenchang Xing
, Xiaoxue Ren
, Qinghua Lu
, Xiwei Xu
:
Refactoring to Pythonic Idioms: A Hybrid Knowledge-Driven Approach Leveraging Large Language Models. 1107-1128 - Zhiqiang Zang
, Fu-Yao Yu
, Aditya Thimmaiah
, August Shi
, Milos Gligoric
:
Java JIT Testing with Template Extraction. 1129-1151 - Hsin-Wei Hung
, Ardalan Amiri Sani
:
BRF: Fuzzing the eBPF Runtime. 1152-1171 - Hongyi Lu
, Zhibo Liu
, Shuai Wang
, Fengwei Zhang
:
DTD: Comprehensive and Scalable Testing for Debuggers. 1172-1193 - Simin Chen
, Xiaoning Feng
, Xiaohong Han
, Cong Liu
, Wei Yang
:
PPM: Automated Generation of Diverse Programming Problems for Benchmarking Code Generation Models. 1194-1215 - Yichen Li
, Dongwei Xiao
, Zhibo Liu
, Qi Pang
, Shuai Wang
:
Metamorphic Testing of Secure Multi-party Computation (MPC) Compilers. 1216-1237 - Dhanushka Jayasuriya
, Valerio Terragni
, Jens Dietrich
, Kelly Blincoe
:
Understanding the Impact of APIs Behavioral Breaking Changes on Client Applications. 1238-1261 - Anita Sarma
, Nina Chen
:
Effective Teaching through Code Reviews: Patterns and Anti-patterns. 1262-1283 - Shaokang Jiang
, Michael Coblenz
:
An Analysis of the Costs and Benefits of Autocomplete in IDEs. 1284-1306 - Dirk Beyer
, Matthias Kettl
, Thomas Lemberger
:
Decomposing Software Verification using Distributed Summary Synthesis. 1307-1329 - Jenny T. Liang
, Carmen Badea
, Christian Bird
, Robert DeLine
, Denae Ford
, Nicole Forsgren
, Thomas Zimmermann
:
Can GPT-4 Replicate Empirical Software Engineering Research? 1330-1353 - Max Landauer
, Florian Skopik
, Markus Wurzenberger
:
A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-Based Anomaly Detection Techniques. 1354-1375 - Xin Jin
, Zhiqiang Lin
:
SimLLM: Calculating Semantic Similarity in Code Summaries using a Large Language Model-Based Approach. 1376-1399 - Jesse Chen
, Dharun Anandayuvaraj
, James C. Davis
, Sazzadur Rahaman
:
On the Contents and Utility of IoT Cybersecurity Guidelines. 1400-1423 - Sungmin Kang
, Gabin An
, Shin Yoo
:
A Quantitative and Qualitative Evaluation of LLM-Based Explainable Fault Localization. 1424-1446 - Kaixuan Li
, Yue Xue
, Sen Chen
, Han Liu
, Kairan Sun
, Ming Hu
, Haijun Wang
, Yang Liu
, Yixiang Chen
:
Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We? 1447-1470 - Soneya Binta Hossain
, Nan Jiang
, Qiang Zhou
, Xiaopeng Li
, Wen-Hao Chiang
, Yingjun Lyu
, Hoan Anh Nguyen
, Omer Tripp
:
A Deep Dive into Large Language Models for Automated Bug Localization and Repair. 1471-1493 - Jun Lyu
, Shanshan Li
, He Zhang
, Lanxin Yang
, Bohan Liu
, Manuel Rigger
:
Towards Efficient Build Ordering for Incremental Builds with Multiple Configurations. 1494-1517 - Ophir M. Carmel
, Guy Katz
:
On Reducing Undesirable Behavior in Deep-Reinforcement-Learning-Based Software. 1518-1539 - Shengcheng Yu
, Chunrong Fang
, Quanjun Zhang
, Mingzhe Du
, Jia Liu
, Zhenyu Chen
:
Semi-supervised Crowdsourced Test Report Clustering via Screenshot-Text Binding Rules. 1540-1563 - Shihan Dou
, Yueming Wu
, Haoxiang Jia
, Yuhao Zhou
, Yan Liu
, Yang Liu
:
CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection. 1564-1584 - Zhen Yang
, Fang Liu
, Zhongxing Yu
, Jacky Wai Keung
, Jia Li
, Shuo Liu
, Yifan Hong
, Xiaoxue Ma
, Zhi Jin
, Ge Li
:
Exploring and Unleashing the Power of Large Language Models in Automated Code Translation. 1585-1608 - Changwei Zou
, Dongjie He
, Yulei Sui
, Jingling Xue
:
TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers. 1609-1631 - Md Shamimur Rahman
, Zadia Codabux
, Chanchal K. Roy
:
Do Words Have Power? Understanding and Fostering Civility in Code Review Discussion. 1632-1655 - Weigang He
, Peng Di
, Mengli Ming
, Chengyu Zhang
, Ting Su
, Shijie Li, Yulei Sui
:
Finding and Understanding Defects in Static Analyzers by Constructing Automated Oracles. 1656-1678 - Xiaoling Zhang
, Zhengzi Xu
, Shouguo Yang
, Zhi Li
, Zhiqiang Shi
, Limin Sun
:
Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-task Learning. 1679-1702 - Zhiqiang Yuan
, Mingwei Liu
, Shiji Ding
, Kaixin Wang
, Yixuan Chen
, Xin Peng
, Yiling Lou
:
Evaluating and Improving ChatGPT for Unit Test Generation. 1703-1726 - Xin Tan
, Yan Gong
, Geyu Huang
, Haohua Wu
, Li Zhang
:
How to Gain Commit Rights in Modern Top Open Source Communities? 1727-1749 - Yibo He
, Jiaming Huang
, Hao Yu
, Tao Xie
:
An Empirical Study on Focal Methods in Deep-Learning-Based Approaches for Assertion Generation. 1750-1771 - Zhiyang Chen
, Ye Liu
, Sidi Mohamed Beillahi
, Yi Li
, Fan Long
:
Demystifying Invariant Effectiveness for Securing Smart Contracts. 1772-1795 - Haoran Liu
, Zhouyang Jia
, Shanshan Li
, Yan Lei
, Yue Yu
, Yu Jiang
, Xiaoguang Mao
, Xiangke Liao
:
Cut to the Chase: An Error-Oriented Approach to Detect Error-Handling Bugs. 1796-1818 - Ranim Khojah
, Mazen Mohamad
, Philipp Leitner
, Francisco Gomes de Oliveira Neto
:
Beyond Code Generation: An Observational Study of ChatGPT Usage in Software Engineering Practice. 1819-1840 - Yi Qin
, Yanxiang Tong
, Yifei Xu
, Chun Cao
, Xiaoxing Ma
:
Active Monitoring Mechanism for Control-Based Self-Adaptive Systems. 1841-1864 - Md. Mahadi Hassan
, John Salvador
, Shubhra Kanti Karmaker Santu
, Akond Rahman
:
State Reconciliation Defects in Infrastructure as Code. 1865-1888 - Madeline Endres
, Sarah Fakhoury
, Saikat Chakraborty
, Shuvendu K. Lahiri
:
Can Large Language Models Transform Natural Language Intent into Formal Method Postconditions? 1889-1912 - Yuntianyi Chen
, Yuqi Huai
, Shilong Li
, Changnam Hong
, Joshua Garcia
:
Misconfiguration Software Testing for Failure Emergence in Autonomous Driving Systems. 1913-1936 - Md Nakhla Rafi
, Dong Jae Kim
, An Ran Chen
, Tse-Hsun (Peter) Chen
, Shaowei Wang
:
Towards Better Graph Neural Network-Based Fault Localization through Enhanced Code Representation. 1937-1959 - Giovanni Denaro
, Noura El Moussa
, Rahim Heydarov
, Francesco Lomio
, Mauro Pezzè
, Ketai Qiu
:
Predicting Failures of Autoscaling Distributed Applications. 1960-1981 - Tarek Alakmeh
, David R. Reich
, Lena A. Jäger
, Thomas Fritz
:
Predicting Code Comprehension: A Novel Approach to Align Human Gaze with Code using Deep Neural Networks. 1982-2004 - Jinyin Chen
, Chengyu Jia
, Yunjie Yan
, Jie Ge
, Haibin Zheng
, Yao Cheng
:
A Miss Is as Good as A Mile: Metamorphic Testing for Deep Learning Operators. 2005-2027 - Dirk Beyer
, Po-Chun Chien
, Marek Jankola
, Nian-Ze Lee
:
A Transferability Study of Interpolation-Based Hardware Model Checking for Software Verification. 2028-2050 - David Broneske
, Sebastian Kittan
, Jacob Krüger
:
Sharing Software-Evolution Datasets: Practices, Challenges, and Recommendations. 2051-2074 - Yuxi Li
, Yi Liu
, Gelei Deng
, Ying Zhang
, Wenjia Song
, Ling Shi
, Kailong Wang
, Yuekang Li
, Yang Liu
, Haoyu Wang
:
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection. 2075-2097 - Yongzheng Xie
, Hongyu Zhang
, Muhammad Ali Babar
:
LogSD: Detecting Anomalies from System Logs through Self-Supervised Learning and Frequency-Based Masking. 2098-2120 - Ying Xiao
, Jie M. Zhang
, Yepang Liu
, Mohammad Reza Mousavi
, Sicen Liu
, Dingyuan Xue
:
MirrorFair: Fixing Fairness Bugs in Machine Learning Software via Counterfactual Predictions. 2121-2143 - Matteo Paltenghi
, Michael Pradel
:
Analyzing Quantum Programs with LintQ: A Static Analysis Framework for Qiskit. 2144-2166 - Shuqing Li
, Cuiyun Gao
, Jianping Zhang
, Yujia Zhang
, Yepang Liu
, Jiazhen Gu
, Yun Peng
, Michael R. Lyu
:
Less Cybersickness, Please: Demystifying and Detecting Stereoscopic Visual Inconsistencies in Virtual Reality Apps. 2167-2189 - Haoran Yang
, Yu Nong
, Tao Zhang
, Xiapu Luo
, Haipeng Cai
:
Learning to Detect and Localize Multilingual Bugs. 2190-2213 - Luan Pham
, Huong Ha
, Hongyu Zhang
:
BARO: Robust Root Cause Analysis for Microservices via Multivariate Bayesian Online Change Point Detection. 2214-2237 - Doriane Olewicki
, Sarra Habchi
, Bram Adams
:
An Empirical Study on Code Review Activity Prediction and Its Impact in Practice. 2238-2260 - Bonan Kou
, Shengmai Chen
, Zhijie Wang
, Lei Ma
, Tianyi Zhang
:
Do Large Language Models Pay Similar Attention Like Human Programmers When Generating Code? 2261-2284 - Shasha Zhou
, Mingyu Huang
, Yanan Sun
, Ke Li
:
Evolutionary Multi-objective Optimization for Contextual Adversarial Example Generation. 2285-2308 - Khouloud Oueslati
, Gabriel Laberge
, Maxime Lamothe
, Foutse Khomh
:
Mining Action Rules for Defect Reduction Planning. 2309-2331 - Fangwen Mu
, Lin Shi
, Song Wang
, Zhuohao Yu
, Binquan Zhang
, Chenxue Wang
, Shichao Liu
, Qing Wang
:
ClarifyGPT: A Framework for Enhancing LLM-Based Code Generation via Requirements Clarification. 2332-2354 - Yubo Mai
, Zhipeng Gao
, Xing Hu
, Lingfeng Bao
, Yu Liu
, Jianling Sun
:
Are Human Rules Necessary? Generating Reusable APIs with CoT Reasoning and In-Context Learning. 2355-2377 - Farbod Farhour
, Ahmad Abdellatif
, Essam Mansour
, Emad Shihab
:
A Weak Supervision-Based Approach to Improve Chatbots for Code Repositories. 2378-2401 - Cleidson R. B. de Souza
, Emilie Ma
, Jesse Wong
, Dongwook Yoon
, Ivan Beschastnikh
:
Revealing Software Development Work Patterns with PR-Issue Graph Topologies. 2402-2423 - Simin Chen
, Zexin Li
, Wei Yang
, Cong Liu
:
DeciX: Explain Deep Learning Based Code Generation Applications. 2424-2446 - Jaehan Yoon
, Sooyoung Cha
:
FeatMaker: Automated Feature Engineering for Search Strategy of Symbolic Execution. 2447-2468 - Chengpeng Wang
, Jipeng Zhang
, Rongxin Wu
, Charles Zhang
:
DAInfer: Inferring API Aliasing Specifications from Library Documentation via Neurosymbolic Optimization. 2469-2492 - Ziqi Shuai
, Zhenbang Chen
, Kelin Ma
, Kunlin Liu
, Yufeng Zhang
, Jun Sun
, Ji Wang
:
Partial Solution Based Constraint Solving Cache in Symbolic Execution. 2493-2514 - Yizhan Huang
, Yichen Li
, Weibin Wu
, Jianping Zhang
, Michael R. Lyu
:
Your Code Secret Belongs to Me: Neural Code Completion Tools Can Memorize Hard-Coded Credentials. 2515-2537 - Neil Walkinshaw
, Michael Foster
, José Miguel Rojas
, Robert M. Hierons
:
Bounding Random Test Set Size with Computational Learning Theory. 2538-2560 - Xiaoyan Zhu
, Mingyue Jiang
, Xiao-Yi Zhang
, Liming Nie
, Zuohua Ding
:
MTAS: A Reference-Free Approach for Evaluating Abstractive Summarization Systems. 2561-2583 - Georgios-Petros Drosos
, Thodoris Sotiropoulos
, Diomidis Spinellis
, Dimitris Mitropoulos
:
Bloat beneath Python's Scales: A Fine-Grained Inter-Project Dependency Analysis. 2584-2607 - Kai Gao
, Weiwei Xu
, Wenhao Yang
, Minghui Zhou
:
PyRadar: Towards Automatically Retrieving and Validating Source Code Repository Information for PyPI Packages. 2608-2631 - Nimmi Rashinika Weeraddana
, Mahmoud Alfadel
, Shane McIntosh
:
Dependency-Induced Waste in Continuous Integration: An Empirical Study of Unused Dependencies in the npm Ecosystem. 2632-2655 - Zhaoxu Zhang
, Fazle Mohammed Tawsif
, Komei Ryu
, Tingting Yu
, William G. J. Halfond
:
Mobile Bug Report Reproduction via Global Search on the App UI Model. 2656-2676 - Yaoxuan Wu
, Ahmad Humayun
, Muhammad Ali Gulzar
, Miryung Kim
:
Natural Symbolic Execution-Based Testing for Big Data Analytics. 2677-2700 - Chuan Yan
, Mark Huasong Meng
, Fuman Xie
, Guangdong Bai
:
Investigating Documented Privacy Changes in Android OS. 2701-2724 - Qilin Zhou
, Zhengyuan Wei
, Haipeng Wang
, Bo Jiang
, Wing-Kwong Chan
:
CrossCert: A Cross-Checking Detection Approach to Patch Robustness Certification for Deep Learning Models. 2725-2746 - Qi Xin
, Haojun Wu
, Jinran Tang
, Xinyu Liu
, Steven P. Reiss
, Jifeng Xuan
:
Detecting, Creating, Repairing, and Understanding Indivisible Multi-Hunk Bugs. 2747-2770

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.