![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
IEEE Transactions on Software Engineering, Volume 50
Volume 50, Number 1, January 2024
- Zicong Gao, Hao Xiong, Weiyu Dong, Rui Chang, Rui Yang, Yajin Zhou, Liehui Jiang:
FA-Fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing. 1-15 - Sven Peldszus
, Jens Bürger
, Jan Jürjens
:
UMLsecRT: Reactive Security Monitoring of Java Applications With Round-Trip Engineering. 16-47 - Aren A. Babikian
, Oszkár Semeráth
, Dániel Varró
:
Concretization of Abstract Traffic Scene Specifications Using Metaheuristic Search. 48-68 - Yuchen Shen
, Travis D. Breaux
:
Stakeholder Preference Extraction From Scenarios. 69-84 - Max Schäfer
, Sarah Nadi
, Aryaz Eghbali
, Frank Tip
:
An Empirical Evaluation of Using Large Language Models for Automated Unit Test Generation. 85-105 - Shanquan Gao
, Liyuan Zhang
, Huaxiao Liu
, Yihui Wang
:
Which Animation API Should I Use Next? A Multimodal Real-Time Animation API Recommendation Model for Android Apps. 106-122 - Mateusz Dolata
, Kevin Crowston
:
Making Sense of AI Systems Development. 123-140 - Christiaan Verwijs
, Daniel Russo
:
The Double-Edged Sword of Diversity: How Diversity, Conflict, and Psychological Safety Impact Software Teams. 141-157 - Yang Wang
, Peng Zhang
, Maolin Sun
, Zeyu Lu
, Yibiao Yang
, Yutian Tang
, Junyan Qian
, Zhi Li
, Yuming Zhou
:
Corrections to "Uncovering Bugs in Code Coverage Profilers via Control Flow Constraint Solving". 158
Volume 50, Number 2, February 2024
- Deeksha M. Arya
, Jin L. C. Guo
, Martin P. Robillard
:
Properties and Styles of Software Technology Tutorials. 159-172 - Mengxi Zhang
, Huaxiao Liu
, Chunyang Chen
, Guangyong Gao
, Han Li
, Jian Zhao
:
AccessFixer: Enhancing GUI Accessibility for Low Vision Users With R-GCN Model. 173-189 - Shunkai Zhu
, Jingyi Wang
, Jun Sun
, Jie Yang
, Xingwei Lin
, Tian Wang, Liyi Zhang
, Peng Cheng:
Better Pay Attention Whilst Fuzzing. 190-208 - Daniel Long
, Scott Drylie
, Jonathan D. Ritschel
, Clay Koschnick:
An Assessment of Rules of Thumb for Software Phase Management, and the Relationship Between Phase Effort and Schedule Success. 209-219 - Anjan Karmakar
, Romain Robbes
:
INSPECT: Intrinsic and Systematic Probing Evaluation for Code Transformers. 220-238 - Federico Formica
, Tony Fan
, Akshay Rajhans
, Vera Pantelic
, Mark Lawford
, Claudio Menghi
:
Simulation-Based Testing of Simulink Models With Test Sequence and Test Assessment Blocks. 239-257 - Wei Cheng
, Wei Hu
, Xiaoxing Ma
:
Revisiting Knowledge-Based Inference of Python Runtime Environments: A Realistic and Adaptive Approach. 258-279 - Qing Huang
, Zishuai Li
, Zhenchang Xing
, Zhengkang Zuo
, Xin Peng
, Xiwei Xu
, Qinghua Lu
:
Answering Uncertain, Under-Specified API Queries Assisted by Knowledge-Aware Human-AI Dialogue. 280-295 - Yanming Yang
, Xing Hu
, Zhipeng Gao
, Jinfu Chen
, Chao Ni
, Xin Xia
, David Lo
:
Federated Learning for Software Engineering: A Case Study of Code Clone Detection and Defect Prediction. 296-321 - Riccardo Coppola
, Tommaso Fulcini
, Luca Ardito
, Marco Torchiano
, Emil Alégroth
:
On Effectiveness and Efficiency of Gamified Exploratory GUI Testing. 322-337 - Rosalia Tufano
, Ozren Dabic
, Antonio Mastropaolo
, Matteo Ciniselli
, Gabriele Bavota
:
Code Review Automation: Strengths and Weaknesses of the State of the Art. 338-353
Volume 50, Number 3, March 2024
- Sebastián Uchitel
:
Distinguished Reviewers 2023. 359 - Xin-Cheng Wen
, Cuiyun Gao
, Jiaxin Ye
, Yichen Li
, Zhihong Tian
, Yan Jia, Xuan Wang
:
Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection. 360-375 - Jie Zhu
, Leye Wang
, Xiao Han
, Anmin Liu
, Tao Xie
:
Safety and Performance, Why Not Both? Bi-Objective Optimized Model Compression Against Heterogeneous Attacks Toward AI Software Deployment. 376-390 - Wei Zheng
, Lidan Lin
, Xiaoxue Wu
, Xiang Chen
:
An Empirical Study on Correlations Between Deep Neural Network Fairness and Neuron Coverage Criteria. 391-412 - Xueqi Dang
, Yinghua Li
, Mike Papadakis
, Jacques Klein
, Tegawendé F. Bissyandé
, Yves Le Traon
:
Test Input Prioritization for Machine Learning Classifiers. 413-442 - Junxiao Han
, Jiahao Zhang
, David Lo
, Xin Xia
, Shuiguang Deng
, Minghui Wu
:
Understanding Newcomers' Onboarding Process in Deep Learning Projects. 443-460 - Ruidong Han
, Siqi Ma
, Juanru Li
, Surya Nepal
, David Lo
, Zhuo Ma
, Jianfeng Ma
:
Range Specification Bug Detection in Flight Control System Through Fuzzing. 461-473 - Quanjun Zhang
, Chunrong Fang
, Weisong Sun
, Yan Liu
, Tieke He
, Xiaodong Hao
, Zhenyu Chen
:
APPT: Boosting Automated Patch Correctness Prediction via Fine-Tuning Pre-Trained Models. 474-494 - Yong Wang
, Wenzhong Cui
, Gai-Ge Wang
, Jian Wang
, Dunwei Gong
:
Improving Test Data Generation for MPI Program Path Coverage With FERPSO-IMPR and Surrogate-Assisted Models. 495-511 - Haoran Yang
, Yu Nong
, Shaowei Wang
, Haipeng Cai
:
Multi-Language Software Development: Issues, Challenges, and Solutions. 512-533 - Junjie Li
, Jinqiu Yang
:
Tracking the Evolution of Static Code Warnings: The State-of-the-Art and a Better Approach. 534-550 - Changqing Wei
, Xiangjuan Yao
, Dunwei Gong
, Huai Liu
:
Test Data Generation for Mutation Testing Based on Markov Chain Usage Model and Estimation of Distribution Algorithm. 551-573 - Uraz Cengiz Türker
, Robert M. Hierons
, Khaled El-Fakih
, Mohammad Reza Mousavi
, Ivan Yu. Tyukin
:
Accelerating Finite State Machine-Based Testing Using Reinforcement Learning. 574-597 - Zhengkang Xu
, Shikai Guo
, Yumiao Wang
, Rong Chen
, Hui Li
, Xiaochen Li
, He Jiang
:
Code Comment Inconsistency Detection Based on Confidence Learning. 598-617 - Yuan-An Xiao
, Chenyang Yang
, Bo Wang
, Yingfei Xiong
:
Accelerating Patch Validation for Program Repair With Interception-Based Execution Scheduling. 618-635 - Zifeng Niu
, Giuliano Casale
:
Neural Density Estimation of Response Times in Layered Software Systems. 636-650 - Luiz Carvalho, Thelma Elita Colanzi
, Wesley K. G. Assunção
, Alessandro F. Garcia
, Juliana Alves Pereira
, Marcos Kalinowski
, Rafael Maiani de Mello
, Maria Julia de Lima
, Carlos Lucena
:
On the Usefulness of Automatically Generated Microservice Architectures. 651-667
Volume 50, Number 4, April 2024
- Eman Abdullah AlOmar
, Mohamed Wiem Mkaouer
, Ali Ouni
:
Behind the Intent of Extract Method Refactoring: A Systematic Literature Review. 668-694 - Alvaro Veizaga
, Seung Yeob Shin
, Lionel C. Briand
:
Automated Smell Detection and Recommendation in Natural Language Requirements. 695-720 - Zhou Yang
, Bowen Xu
, Jie M. Zhang
, Hong Jin Kang
, Jieke Shi
, Junda He
, David Lo
:
Stealthy Backdoor Attack for Code Models. 721-741 - Anna Barzolevskaia, Enrico Branca
, Natalia Stakhanova
:
Measuring and Characterizing (Mis)compliance of the Android Permission System. 742-764 - Dimitri Prestat
, Naouel Moha
, Roger Villemaire
, Florent Avellaneda
:
DynAMICS: A Tool-Based Method for the Specification and Dynamic Detection of Android Behavioral Code Smells. 765-784 - Jean Baptiste Minani
, Fatima Sabir
, Naouel Moha
, Yann-Gaël Guéhéneuc
:
A Systematic Review of IoT Systems Testing: Objectives, Approaches, Tools, and Challenges. 785-815 - Yuxia Zhang
, Zhiqing Qiu
, Klaas-Jan Stol
, Wenhui Zhu
, Jiaxin Zhu
, Yingchen Tian
, Hui Liu
:
Automatic Commit Message Generation: A Critical Review and Directions for Future Work. 816-835 - Diego Clerissi
, Giovanni Denaro
, Marco Mobilio
, Leonardo Mariani
:
Guess the State: Exploiting Determinism to Improve GUI Exploration Efficiency. 836-853 - Zhichao Zhou
, Yuming Zhou
, Chunrong Fang
, Zhenyu Chen
, Xiapu Luo
, Jingzhu He
, Yutian Tang
:
Coverage Goal Selector for Combining Multiple Criteria in Search-Based Unit Test Generation. 854-883 - Fahimeh Hajari
, Samaneh Malmir
, Ehsan Mirsaeedi
, Peter C. Rigby
:
Factoring Expertise, Workload, and Turnover Into Code Review Recommendation. 884-899 - Juraj Doncevic
, Kresimir Fertalj
, Mario Brcic
, Mihael Kovac
:
Mask-Mediator-Wrapper Architecture as a Data Mesh Driver. 900-910 - Junjie Wang
, Yuchao Huang
, Chunyang Chen
, Zhe Liu
, Song Wang
, Qing Wang
:
Software Testing With Large Language Models: Survey, Landscape, and Vision. 911-936 - He Jiang
, Zun Wang
, Zhide Zhou
, Xiaochen Li, Shikai Guo
, Weifeng Sun
, Tao Zhang
:
A Testing Program and Pragma Combination Selection Based Framework for High-Level Synthesis Tool Pragma-Related Bug Detection. 937-955 - Jesús Morán
, Antonia Bertolino
, Claudio de la Riva
, Javier Tuya
:
Automatic Debugging of Design Faults in MapReduce Applications. 956-978 - Sungjae Hwang
, Sungho Lee
, Sukyoung Ryu
:
An Empirical Study of JVMs' Behaviors on Erroneous JNI Interoperations. 979-994 - Andrea Bombarda
, Silvia Bonfanti
, Martina De Sanctis
, Angelo Gargantini
, Patrizio Pelliccione
, Elvinia Riccobene
, Patrizia Scandurra
:
Evaluation Framework for Autonomous Systems: The Case of Programmable Electronic Medical Systems. 995-1014
Volume 50, Number 5, May 2024
- Stephen John Warnett
, Uwe Zdun
:
On the Understandability of MLOps System Architectures. 1015-1039 - Yuanyuan Yuan
, Qi Pang
, Shuai Wang
:
Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing. 1040-1064 - Micha Prudjinski
, Irit Hadar
, Gil Luria
:
Exploring the Role of Team Security Climate in the Implementation of Security by Design: A Case Study in the Defense Sector. 1065-1079 - Qiang Hu
, Yuejun Guo
, Xiaofei Xie
, Maxime Cordy
, Lei Ma
, Mike Papadakis
, Yves Le Traon
:
Active Code Learning: Benchmarking Sample-Efficient Training of Code Models. 1080-1095 - Alison Fernandez-Blanco
, Araceli Queirolo Córdova
, Alexandre Bergel
, Juan Pablo Sandoval Alcocer
:
Asking and Answering Questions During Memory Profiling. 1096-1117 - Miles Frantz
, Ya Xiao
, Tanmoy Sarkar Pias
, Na Meng, Danfeng Yao
:
Methods and Benchmark for Detecting Cryptographic API Misuses in Python. 1118-1129 - Ana Belén Sánchez
, José Antonio Parejo
, Sergio Segura
, Amador Durán Toro
, Mike Papadakis
:
Mutation Testing in Practice: Insights From Open-Source Software Developers. 1130-1143 - Haofeng Li, Tian Tan, Yue Li, Jie Lu
, Haining Meng, Liqing Cao, Yongheng Huang, Lian Li, Lin Gao, Peng Di, Liang Lin, ChenXi Cui:
Generic Sensitivity: Generics-Guided Context Sensitivity for Pointer Analysis. 1144-1162 - Jiaqi Liu
, Fengming Zhang
, Xin Zhang
, Zhiwen Yu
, Liang Wang
, Yao Zhang
, Bin Guo
:
hmCodeTrans: Human-Machine Interactive Code Translation. 1163-1181 - Rubing Huang
, Chenhui Cui
, Junlong Lian
, Dave Towey
, Weifeng Sun
, Haibo Chen
:
Toward Cost-Effective Adaptive Random Testing: An Approximate Nearest Neighbor Approach. 1182-1214 - David Nader-Palacio
, Alejandro Velasco
, Nathan Cooper
, Alvaro Rodriguez
, Kevin Moran
, Denys Poshyvanyk
:
Toward a Theory of Causation for Interpreting Neural Code Models. 1215-1243 - Zhijun Ding
, Yuehao Xu
, Binbin Feng
, Changjun Jiang
:
Microservice Extraction Based on a Comprehensive Evaluation of Logical Independence and Performance. 1244-1263 - Carolin E. Brandt
, Ali Khatami
, Mairieli Wessel
, Andy Zaidman
:
Shaken, Not Stirred: How Developers Like Their Amplified Tests. 1264-1280 - Haonan Tong
, Dalin Zhang
, Jiqiang Liu
, Weiwei Xing
, Lingyun Lu, Wei Lu
, Yumei Wu
:
MASTER: Multi-Source Transfer Weighted Ensemble Learning for Multiple Sources Cross-Project Defect Prediction. 1281-1305
Volume 50, Number 6, June 2024
- Boqin Qin
, Yilun Chen, Haopeng Liu
, Hua Zhang
, Qiaoyan Wen
, Linhai Song
, Yiying Zhang
:
Understanding and Detecting Real-World Safety Issues in Rust. 1306-1324 - Xin-Cheng Wen
, Cuiyun Gao
, Feng Luo, Haoyu Wang
, Ge Li
, Qing Liao
:
LIVABLE: Exploring Long-Tailed Classification of Software Vulnerability Types. 1325-1339 - Yutian Tang
, Zhijie Liu
, Zhichao Zhou
, Xiapu Luo
:
ChatGPT vs SBST: A Comparative Assessment of Unit Test Suite Generation. 1340-1359 - Zibin Zheng
, Jianzhong Su
, Jiachi Chen
, David Lo
, Zhijie Zhong
, Mingxi Ye
:
DAppSCAN: Building Large-Scale Datasets for Smart Contract Weaknesses in DApp Projects. 1360-1373 - Radu Calinescu
, Calum Imrie
, Ravi Mangal
, Genaína Nunes Rodrigues
, Corina S. Pasareanu
, Misael Alpizar Santana
, Gricel Vázquez
:
Controller Synthesis for Autonomous Systems With Deep-Learning Perception Components. 1374-1395 - Yinghua Li
, Xueqi Dang
, Weiguo Pian
, Andrew Habib
, Jacques Klein
, Tegawendé F. Bissyandé
:
Test Input Prioritization for Graph Neural Networks. 1396-1424 - Chenxing Zhong
, Shanshan Li
, Huang Huang
, Xiaodong Liu
, Zhikun Chen
, Yi Zhang
, He Zhang
:
Domain-Driven Design for Microservices: An Evidence-Based Investigation. 1425-1449 - Nimmi Rashinika Weeraddana
, Mahmoud Alfadel
, Shane McIntosh
:
Characterizing Timeout Builds in Continuous Integration. 1450-1463 - Qinghua Xu
, Tao Yue
, Shaukat Ali
, Maite Arratibel
:
Pretrain, Prompt, and Transfer: Evolving Digital Twins for Time-to-Event Analysis in Cyber-Physical Systems. 1464-1477 - Pengzhou Chen
, Tao Chen
, Miqing Li
:
MMO: Meta Multi-Objectivization for Software Configuration Tuning. 1478-1504 - Yalan Lin
, Chengcheng Wan
, Shuwen Bai
, Xiaodong Gu
:
VarGAN: Adversarial Learning of Variable Semantic Representations. 1505-1517 - Shuangxiang Kan
, Yuhao Gao
, Zexin Zhong
, Yulei Sui
:
Cross-Language Taint Analysis: Generating Caller-Sensitive Native Code Specification for Java. 1518-1533 - Zewei Lin
, Jiachi Chen
, Jiajing Wu
, Weizhe Zhang
, Yongjuan Wang
, Zibin Zheng
:
CRPWarner: Warning the Risk of Contract-Related Rug Pull in DeFi Smart Contracts. 1534-1547 - Zhijie Liu
, Yutian Tang
, Xiapu Luo
, Yuming Zhou
, Liang Feng Zhang
:
No Need to Lift a Finger Anymore? Assessing the Quality of Code Generation by ChatGPT. 1548-1584 - Daniel Sokolowski
, David Spielmann
, Guido Salvaneschi
:
Automated Infrastructure as Code Program Testing. 1585-1599 - Zixiang Xian
, Rubing Huang
, Dave Towey
, Chunrong Fang
, Zhenyu Chen
:
TransformCode: A Contrastive Learning Framework for Code Embedding via Subtree Transformation. 1600-1619 - Bo Li
, Haowei Quan
, Jiawei Wang
, Pei Liu
, Haipeng Cai
, Yuan Miao
, Yun Yang
, Li Li
:
Neural Library Recommendation by Embedding Project-Library Knowledge Graph. 1620-1638 - Negar Ghorbani
, Tarandeep Singh
, Joshua Garcia
, Sam Malek
:
Darcy: Automatic Architectural Inconsistency Resolution in Java. 1639-1657
Volume 50, Number 7, July 2024
- Guoping Rong, Yongda Yu, Yifan Zhang, He Zhang, Haifeng Shen, Dong Shao
, Hongyu Kuang, Min Wang, Zhao Wei, Yong Xu, Juhong Wang:
Distilling Quality Enhancing Comments From Code Reviews to Underpin Reviewer Recommendation. 1658-1674 - Changshu Liu
, Pelin Çetin
, Yogesh Patodia
, Baishakhi Ray
, Saikat Chakraborty
, Yangruibo Ding
:
Automated Code Editing With Search-Generate-Modify. 1675-1686 - Christoph Laaber
, Tao Yue
, Shaukat Ali
:
Evaluating Search-Based Software Microbenchmark Prioritization. 1687-1703 - Yutong Zhao
, Lu Xiao
, Sunny Wong
:
A Platform-Agnostic Framework for Automatically Identifying Performance Issue Reports With Heuristic Linguistic Patterns. 1704-1725 - Hao Bu
, Meng Sun
:
Clopper-Pearson Algorithms for Efficient Statistical Model Checking Estimation. 1726-1746 - Haoxin Tu
, Lingxiao Jiang
, Jiaqi Hong
, Xuhua Ding
, He Jiang
:
Concretely Mapped Symbolic Memory Locations for Memory Error Detection. 1747-1767 - Haoxin Tu
, Zhide Zhou
, He Jiang
, Imam Nur Bani Yusuf
, Yuxian Li
, Lingxiao Jiang
:
Isolating Compiler Bugs by Generating Effective Witness Programs With Large Language Models. 1768-1788 - Xite Wang
, Senping Tian
, Wei Cui
:
ContractCheck: Checking Ethereum Smart Contracts in Fine-Grained Level. 1789-1806 - Bing Zhang
, Rong Ren, Jia Liu, Mingcai Jiang, Jiadong Ren
, Jingyue Li
:
SQLPsdem: A Proxy-Based Mechanism Towards Detecting, Locating and Preventing Second-Order SQL Injections. 1807-1826 - Jia Li
, Behrad Moeini
, Shiva Nejati
, Mehrdad Sabetzadeh
, Michael McCallen:
A Lean Simulation Framework for Stress Testing IoT Cloud Systems. 1827-1851 - Shangwen Wang
, Mingyang Geng
, Bo Lin
, Zhensu Sun
, Ming Wen
, Yepang Liu
, Li Li
, Tegawendé F. Bissyandé
, Xiaoguang Mao
:
Fusing Code Searchers. 1852-1866 - Lina Gong
, Haoxiang Zhang
:
MR${}^{2}$ 2-KG: A Multi-Relation Multi-Rationale Knowledge Graph for Modeling Software Engineering Knowledge on Stack Overflow. 1867-1887 - Jon Ayerdi
, Valerio Terragni
, Gunel Jahangirova
, Aitor Arrieta
, Paolo Tonella
:
GenMorph: Automatically Generating Metamorphic Relations via Genetic Programming. 1888-1900 - Shuotong Bai
, Huaxiao Liu
, Enyan Dai
, Lei Liu
:
Improving Issue-PR Link Prediction via Knowledge-Aware Heterogeneous Graph Learning. 1901-1920 - Da Song
, Xuan Xie
, Jiayang Song
, Derui Zhu
, Yuheng Huang
, Felix Juefei-Xu
, Lei Ma
:
LUNA: A Model-Based Universal Analysis Framework for Large Language Models. 1921-1948 - Shengcheng Yu
, Chunrong Fang
, Mingzhe Du
, Zimin Ding
, Zhenyu Chen
, Zhendong Su
:
Practical, Automated Scenario-Based Mobile App Testing. 1949-1966
Volume 50, Number 8, August 2024
- Yuanjie Xia
, Lizhi Liao
, Jinfu Chen
, Heng Li
, Weiyi Shang
:
Reducing the Length of Field-Replay Based Load Testing. 1967-1983 - Hanouf Al Ghanmi
, Rami Bahsoon
:
ExplanaSC: A Framework for Determining Information Requirements for Explainable Blockchain Smart Contracts. 1984-2004 - Roman Haas
, Raphael Nömmer
, Elmar Juergens
, Sven Apel
:
Optimization of Automated and Manual Software Tests in Industrial Practice: A Survey and Historical Analysis. 2005-2020 - Eduard Baranov
, Sourav Chakraborty
, Axel Legay
, Kuldeep S. Meel
, N. Variyam Vinodchandran
:
A Scalable $t$t-Wise Coverage Estimator: Algorithms and Applications. 2021-2039 - Matteo Biagiola
, Paolo Tonella
:
Boundary State Generation for Testing and Improvement of Autonomous Driving Systems. 2040-2053 - Minghao Yang
, Shunkun Yang
, W. Eric Wong
:
Multi-Objective Software Defect Prediction via Multi-Source Uncertain Information Fusion and Multi-Task Multi-View Learning. 2054-2076 - Chunrong Fang
, Weisong Sun
, Yuchen Chen
, Xiao Chen
, Zhao Wei
, Quanjun Zhang
, Yudu You
, Bin Luo
, Yang Liu
, Zhenyu Chen
:
Esale: Enhancing Code-Summary Alignment Learning for Source Code Summarization. 2077-2095 - Farshad Kazemi
, Maxime Lamothe
, Shane McIntosh
:
Characterizing the Prevalence, Distribution, and Duration of Stale Reviewer Recommendations. 2096-2109 - Dimitrios Tsoukalas
, Nikolaos Mittas, Elvira-Maria Arvanitou
, Apostolos Ampatzoglou
, Alexander Chatzigeorgiou
, Dionysios D. Kehagias
:
Local and Global Explainability for Technical Debt Identification. 2110-2123 - Márton Elekes
, Vince Molnár
, Zoltán Micskei
:
To Do or Not to Do: Semantics and Patterns for Do Activities in UML PSSM State Machines. 2124-2141 - Lei Cui
, Junnan Yin
, Jiancong Cui
, Yuede Ji
, Peng Liu
, Zhiyu Hao
, Xiaochun Yun
:
API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification. 2142-2162 - Partha Chakraborty
, Krishna Kanth Arumugam
, Mahmoud Alfadel
, Meiyappan Nagappan
, Shane McIntosh
:
Revisiting the Performance of Deep Learning-Based Vulnerability Detection on Realistic Datasets. 2163-2177 - Fangcheng Qiu
, Zhongxin Liu
, Xing Hu
, Xin Xia
, Gang Chen
, Xinyu Wang
:
Vulnerability Detection via Multiple-Graph-Based Code Representation. 2178-2199 - Maryam Masoudian
, Heqing Huang
, Morteza Amini
, Charles Zhang
:
Mole: Efficient Crash Reproduction in Android Applications With Enforcing Necessary UI Events. 2200-2218
Volume 50, Number 9, September 2024
- Yunbo Lyu
, Hong Jin Kang
, Ratnadira Widyasari
, Julia Lawall
, David Lo
:
Evaluating SZZ Implementations: An Empirical Study on the Linux Kernel. 2219-2239 - Mona Nashaat
, James Miller
:
Towards Efficient Fine-Tuning of Language Models With Organizational Data for Automated Software Review. 2240-2253 - Sarah Fakhoury
, Aaditya Naik
, Georgios Sakkas
, Saikat Chakraborty
, Shuvendu K. Lahiri
:
LLM-Based Test-Driven Interactive Code Generation: User Study and Empirical Evaluation. 2254-2268 - Ana Cristina Marcén
, Antonio Iglesias
, Raúl Lapeña
, Francisca Pérez
, Carlos Cetina
:
A Systematic Literature Review of Model-Driven Engineering Using Machine Learning. 2269-2293 - Zhe Yu
, Joymallya Chakraborty
, Tim Menzies
:
FairBalance: How to Achieve Equalized Odds With Data Pre-Processing. 2294-2312 - Qi Mo
, Jianeng Wang
, Zhongwen Xie
, Cong Liu
, Fei Dai
:
Enforcing Correctness of Collaborative Business Processes Using Plans. 2313-2336 - Jiho Shin
, Hadi Hemmati
, Moshi Wei
, Song Wang
:
Assessing Evaluation Metrics for Neural Test Oracle Generation. 2337-2349 - Xiaoyan Xu
, Filipe Roseiro Côgo
, Shane McIntosh
:
Mitigating the Uncertainty and Imprecision of Log-Based Code Coverage Without Requiring Additional Logging Statements. 2350-2362 - Zheng Li
, Nicolás Saldías-Vallejos
, Diego Seco
, María Andrea Rodríguez Tastets
, Rajiv Ranjan
:
Long Live the Image: On Enabling Resilient Production Database Containers for Microservice Applications. 2363-2378 - Chenghang Shi
, Haofeng Li
, Yulei Sui
, Jie Lu
, Lian Li
, Jingling Xue
:
Pearl: A Multi-Derivation Approach to Efficient CFL-Reachability Solving. 2379-2397 - Aniruddhan Murali
, Mahmoud Alfadel
, Meiyappan Nagappan
, Meng Xu
, Chengnian Sun
:
AddressWatcher: Sanitizer-Based Localization of Memory Leak Fixes. 2398-2411 - Diego Clerissi
, Giovanni Denaro
, Marco Mobilio
, Leonardo Mariani
:
DBInputs: Exploiting Persistent Data to Improve Automated GUI Testing. 2412-2436 - Guang Yang
, Yu Zhou
, Xiang Chen
, Xiangyu Zhang
, Terry Yue Zhuo
, Taolue Chen
:
Chain-of-Thought in Neural Code Generation: From and for Lightweight Language Models. 2437-2457 - Georgios Kourtis
, Clare Dixon
, Michael Fisher
:
Parameterized Verification of Leader/Follower Systems via Arithmetic Constraints. 2458-2471 - Mohan Cui
, Hui Xu
, Hongliang Tian
, Yangfan Zhou
:
rCanary: Detecting Memory Leaks Across Semi-Automated Memory Management Boundary in Rust. 2472-2484
Volume 50, Number 10, October 2024
- Shuai Jiang, Cai Fu, Shuai He
, Jianqiang Lv
, Lansheng Han
, Hong Hu
:
BinCola: Diversity-Sensitive Contrastive Learning for Binary Code Similarity Detection. 2485-2497 - Anda Liang
, Emerson R. Murphy-Hill
, Westley Weimer
, Yu Huang
:
A Controlled Experiment in Age and Gender Bias When Reading Technical Articles in Software Engineering. 2498-2511 - Ziyi Zhou
, Mingchen Li
, Huiqun Yu
, Guisheng Fan
, Penghui Yang
, Zijie Huang
:
Learning to Generate Structured Code Summaries From Hybrid Code Context. 2512-2528 - SayedHassan Khatoonabadi
, Ahmad Abdellatif
, Diego Elias Costa
, Emad Shihab
:
Predicting the First Response Latency of Maintainers and Contributors in Pull Requests. 2529-2543 - Ricardo Caldas
, Juan Antonio Piñera García
, Matei Schiopu
, Patrizio Pelliccione
, Genaína Nunes Rodrigues
, Thorsten Berger
:
Runtime Verification and Field-Based Testing for ROS-Based Robotic Systems. 2544-2567 - Matteo Paltenghi
, Rahul Pandita
, Austin Z. Henley
, Albert Ziegler
:
Follow-Up Attention: An Empirical Study of Developer and Neural Model Code Exploration. 2568-2582 - Xiangbo Tian
, Shi Ying
, Tiangang Li
, Mengting Yuan
, Ruijin Wang
, Yishi Zhao
, Jianga Shang
:
iTCRL: Causal-Intervention-Based Trace Contrastive Representation Learning for Microservice Systems. 2583-2601 - Vikram Nitin
, Anne Mulhern
, Sanjay Arora
, Baishakhi Ray
:
Yuga: Automatically Detecting Lifetime Annotation Bugs in the Rust Language. 2602-2613 - Chengjie Lu
, Shaukat Ali
, Tao Yue
:
EpiTESTER: Testing Autonomous Vehicles With Epigenetic Algorithm and Attention Mechanism. 2614-2632 - Jingwen Liu
, Wuxia Jin
, Junhui Zhou
, Qiong Feng
, Ming Fan
, Haijun Wang
, Ting Liu
:
3Erefactor: Effective, Efficient and Executable Refactoring Recommendation for Software Architectural Consistency. 2633-2655 - Weifeng Sun
, Zhenting Guo
, Meng Yan
, Zhongxin Liu
, Yan Lei
, Hongyu Zhang
:
Method-Level Test-to-Code Traceability Link Construction by Semantic Correlation Learning. 2656-2676 - Sungmin Kang
, Juyeon Yoon
, Nargiz Askarbekkyzy
, Shin Yoo
:
Evaluating Diverse Large Language Models for Automatic and General Bug Reproduction. 2677-2694 - Partha Chakraborty
, Mahmoud Alfadel
, Meiyappan Nagappan
:
RLocator: Reinforcement Learning for Bug Localization. 2695-2708
Volume 50, Number 11, November 2024
- Sebastián Uchitel
, Marsha Chechik, Massimiliano Di Penta
, Bram Adams, Nazareno Aguirre, Gabriele Bavota
, Domenico Bianculli
, Kelly Blincoe, Ana Cavalcanti, Yvonne Dittrich
, Filomena Ferrucci, Rashina Hoda
, LiGuo Huang, David Lo, Michael R. Lyu, Lei Ma
, Jonathan I. Maletic, Leonardo Mariani, Collin McMillan, Tim Menzies
, Martin Monperrus
, Ana Moreno, Nachiappan Nagappan, Liliana Pasquale
, Patrizio Pelliccione
, Michael Pradel, Rahul Purandare
, Sukyoung Ryu
, Mehrdad Sabetzadeh
, Alexander Serebrenik
, Jun Sun, Chakkrit Kla Tantithamthavorn
, Christoph Treude, Manuel Wimmer
, Yingfei Xiong
, Tao Yue
, Andy Zaidman, Tao Zhang
, Hao Zhong
:
Scoping Software Engineering for AI: The TSE Perspective. 2709-2711 - Tanghaoran Zhang
, Yao Lu
, Yue Yu
, Xinjun Mao
, Yang Zhang
, Yuxin Zhao
:
How Do Developers Adapt Code Snippets to Their Contexts? An Empirical Study of Context-Based Code Snippet Adaptations. 2712-2731 - Haoye Wang
, Zhipeng Gao
, Xing Hu
, David Lo
, John Grundy
, Xinyu Wang
:
Just-In-Time TODO-Missed Commits Detection. 2732-2752 - Wardah Mahmood
, Gül Çalikli
, Daniel Strüber
, Ralf Lämmel
, Mukelabai Mukelabai
, Thorsten Berger
:
Virtual Platform: Effective and Seamless Variability Management for Software Systems. 2753-2785 - Muhui Jiang
, Xiaoye Zheng
, Rui Chang
, Yajin Zhou
, Xiapu Luo
:
Examiner-Pro: Testing Arm Emulators Across Different Privileges. 2786-2806 - Hanzhi Jiang
, Lin Shi
, Meiru Che
, Yuxia Zhang
, Qing Wang
:
Bringing Open Source Communication and Development Together: A Cross-Platform Study on Gitter and GitHub. 2807-2826 - Zejun Zhang
, Zhenchang Xing
, Dehai Zhao
, Xiwei Xu
, Liming Zhu
, Qinghua Lu
:
Automated Refactoring of Non-Idiomatic Python Code With Pythonic Idioms. 2827-2848 - Zimin Chen
, Sen Fang
, Martin Monperrus
:
Supersonic: Learning to Generate Source Code Optimizations in C/C++. 2849-2864 - Xin Zhou
, Bowen Xu
, Kisub Kim
, DongGyun Han
, Hung Huu Nguyen
, Thanh Le-Cong
, Junda He
, Bach Le
, David Lo
:
Leveraging Large Language Model for Automatic Patch Correctness Assessment. 2865-2883 - Xin Chen
, Tian Sun
, Dongling Zhuang
, Dongjin Yu
, He Jiang
, Zhide Zhou
, Sicheng Li
:
HetFL: Heterogeneous Graph-Based Software Fault Localization. 2884-2905 - Fangyuan Zhang
, Lingling Fan
, Sen Chen
, Miaoying Cai
, Sihan Xu
, Lida Zhao
:
Does the Vulnerability Threaten Our Projects? Automated Vulnerable API Detection for Third-Party Libraries. 2906-2920 - Deepika Tiwari
, Martin Monperrus
, Benoit Baudry
:
Mimicking Production Behavior With Generated Mocks. 2921-2946 - Asmar Muqeet
, Tao Yue
, Shaukat Ali
, Paolo Arcaini
:
Mitigating Noise in Quantum Software Testing Using Machine Learning. 2947-2961 - Xiaoyuan Xie
, Xingpeng Li
, Songqiang Chen
:
Metamorphic Testing of Image Captioning Systems via Image-Level Reduction. 2962-2982 - Pengcheng Zhang
, Ben Wang
, Xiapu Luo
, Hai Dong
:
SCAnoGenerator: Automatic Anomaly Injection for Ethereum Smart Contracts. 2983-3006 - Danniell Hu, Priscila Santiesteban
, Madeline Endres
, Westley Weimer
:
Towards a Cognitive Model of Dynamic Debugging: Does Identifier Construction Matter? 3007-3021 - Yi Sun
, Chengpeng Wang
, Gang Fan
, Qingkai Shi
, Xiangyu Zhang
:
Fast and Precise Static Null Exception Analysis With Synergistic Preprocessing. 3022-3036 - Lingxiao Tang
, Chao Ni
, Qiao Huang
, Lingfeng Bao
:
Enhancing Bug-Inducing Commit Identification: A Fine-Grained Semantic Analysis Approach. 3037-3052 - Rongqi Pan
, Taher Ahmed Ghaleb
, Lionel C. Briand
:
LTM: Scalable and Black-Box Similarity-Based Test Suite Minimization Based on Language Models. 3053-3070 - Xin Yin
, Chao Ni
, Shaohua Wang
:
Multitask-Based Evaluation of Open-Source LLM on Software Vulnerability. 3071-3087
Volume 50, Number 12, December 2024
- Zhuo Su
, Zehong Yu
, Dongyan Wang
, Yixiao Yang
, Rui Wang
, Wanli Chang
, Aiguo Cui
, Yu Jiang
:
HSTCG: State-Aware Simulink Model Test Case Generation With Heuristic Strategy. 3088-3103 - Denini Silva
, Martin Gruber
, Satyajit Gokhale
, Ellen Arteca
, Alexi Turcotte
, Marcelo d'Amorim
, Wing Lam
, Stefan Winter
, Jonathan Bell
:
The Effects of Computational Resources on Flaky Tests. 3104-3121 - Paula Muñoz
, Manuel Wimmer
, Javier Troya
, Antonio Vallecillo
:
Measuring the Fidelity of a Physical and a Digital Twin Using Trace Alignments. 3122-3145 - Sakina Fatima
, Hadi Hemmati
, Lionel C. Briand
:
FlakyFix: Using Large Language Models for Predicting Flaky Test Fix Categories and Test Code Repair. 3146-3171 - Jorge Melegati
, Kieran Conboy
, Daniel Graziotin
:
Qualitative Surveys in Software Engineering Research: Definition, Critical Review, and Guidelines. 3172-3187 - Yichen Li
, Yintong Huo
, Zhihan Jiang
, Renyi Zhong
, Pinjia He
, Yuxin Su
, Lionel C. Briand
, Michael R. Lyu
:
Exploring the Effectiveness of LLMs in Automated Logging Statement Generation: An Empirical Study. 3188-3207 - Pengyu Xue, Linhao Wu, Zhongxing Yu, Zhi Jin, Zhen Yang, Xinyi Li, Zhenyu Yang, Yue Tan:
Automated Commit Message Generation With Large Language Models: An Empirical Study and Beyond. 3208-3224 - Yin Wang
, Ming Fan
, Junfeng Liu
, Junjie Tao
, Wuxia Jin
, Haijun Wang
, Qi Xiong
, Ting Liu
:
Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App. 3225-3248 - Xinyi Wang
, Shaukat Ali
, Tao Yue
, Paolo Arcaini
:
Quantum Approximate Optimization Algorithm for Test Case Optimization. 3249-3264 - Huan Xie
, Yan Lei
, Meng Yan
, Shanshan Li
, Xiaoguang Mao
, Yue Yu
, David Lo
:
Towards More Precise Coincidental Correctness Detection With Deep Semantic Learning. 3265-3289 - Zhou Yang
, Zhipeng Zhao
, Chenyu Wang
, Jieke Shi
, Dongsun Kim
, DongGyun Han
, David Lo
:
Gotcha! This Model Uses My Code! Evaluating Membership Leakage Risks in Code Models. 3290-3306 - Amin Abbasishahkoo
, Mahboubeh Dadkhah
, Lionel C. Briand
, Dayi Lin
:
TEASMA: A Practical Methodology for Test Adequacy Assessment of Deep Neural Networks. 3307-3329 - Mohammed Tayeeb Hasan
, Nikolaos Tsantalis
, Pouria Alikhanifard
:
Refactoring-Aware Block Tracking in Commit History. 3330-3350 - Mengxi Zhang
, Huaxiao Liu
, Yuheng Zhou
, Chunyang Chen
, Pei Huang
, Jian Zhao
:
Don't Confuse! Redrawing GUI Navigation Flow in Mobile Apps for Visually Impaired Users. 3351-3368 - Dianshu Liao
, Shidong Pan
, Xiaoyu Sun
, Xiaoxue Ren
, Qing Huang
, Zhenchang Xing
, Huan Jin
, Qinying Li
:
$\mathbf{A^{3}}$A3-CodGen: A Repository-Level Code Generation Framework for Code Reuse With Local-Aware, Global-Aware, and Third-Party-Library-Aware. 3369-3384 - Jingyun Zhu
, Kaixuan Li
, Sen Chen
, Lingling Fan
, Junjie Wang
, Xiaofei Xie
:
A Comprehensive Study on Static Application Security Testing (SAST) Tools for Android. 3385-3402 - Nazanin Bayati Chaleshtari
, Yoann Marquer
, Fabrizio Pastore
, Lionel C. Briand
:
AIM: Automated Input Set Minimization for Metamorphic Security Testing. 3403-3434 - Xiao Yu
, Lei Liu
, Xing Hu
, Jacky Wai Keung
, Jin Liu
, Xin Xia
:
Fight Fire With Fire: How Much Can We Trust ChatGPT on Source Code-Related Tasks? 3435-3453 - Yuan Jiang, Yujian Zhang, Xiaohong Su, Christoph Treude, Tiantian Wang:
StagedVulBERT: Multigranular Vulnerability Detection With a Novel Pretrained Code Model. 3454-3471
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.