0 | -- | 0 | Shenghao Lin, Fansong Chen, Laile Xi, Gaosheng Wang, Rongrong Xi, Yuyan Sun, Hongsong Zhu. TM-fuzzer: fuzzing autonomous driving systems through traffic management |
0 | -- | 0 | Chia-Yi Su, Aakash Bansal, Collin McMillan. Revisiting file context for source code summarization |
0 | -- | 0 | Kim Tuyen Le, Artur Andrzejak 0001. Rethinking AI code generation: a one-shot correction approach based on user feedback |
0 | -- | 0 | Willian Marques Freire, Cláudia Tupan Rosa, Aline Maria Malachini Miotto Amaral, Thelma Elita Colanzi. Interactive search-based Product Line Architecture design |
0 | -- | 0 | Jiachi Chen, Jiang Hu, Xin Xia 0001, David Lo 0001, John C. Grundy, Zhipeng Gao, Ting Chen 0002. Angels or demons: investigating and detecting decentralized financial traps on ethereum smart contracts |
0 | -- | 0 | Hassan Sartaj, Asmar Muqeet, Muhammad Zohaib Iqbal, Muhammad Uzair Khan. Automated system-level testing of unmanned aerial systems |
0 | -- | 0 | Anis Zarrad, Rami Bahsoon, Priya Manimaran. Optimizing regression testing with AHP-TOPSIS metric system for effective technical debt evaluation |
37 | -- | 0 | Shayan Hashemi, Mika Mäntylä. OneLog: towards end-to-end software log anomaly detection |
37 | -- | 0 | Shayan Hashemi, Mika Mäntylä. OneLog: towards end-to-end software log anomaly detection |
38 | -- | 0 | Zilong Ren, Xiaolin Ju, Xiang Chen 0005, Hao Shen. ProRLearn: boosting prompt tuning-based vulnerability detection by reinforcement learning |
38 | -- | 0 | Zilong Ren, Xiaolin Ju, Xiang Chen 0005, Hao Shen. ProRLearn: boosting prompt tuning-based vulnerability detection by reinforcement learning |
39 | -- | 0 | Youcong Ni, Xin Du, Yuan Yuan, Ruliang Xiao, Gaolin Chen. Tsoa: a two-stage optimization approach for GCC compilation options to minimize execution time |
39 | -- | 0 | Youcong Ni, Xin Du, Yuan Yuan, Ruliang Xiao, Gaolin Chen. Tsoa: a two-stage optimization approach for GCC compilation options to minimize execution time |
40 | -- | 0 | Cho Xuan Do, Nguyen Trong Luu, Phuong Thi Lan Nguyen. Optimizing software vulnerability detection using RoBERTa and machine learning |
41 | -- | 0 | Evgenii V. Stepanov, Alexey A. Mitsyuk. Extracting high-level activities from low-level program execution logs |
42 | -- | 0 | Somayeh Kalhor, Mohammad Reza Keyvanpour, Afshin Salajegheh. A systematic review of refactoring opportunities by software antipattern detection |
43 | -- | 0 | Haochen Zou, Yongli Wang. A novel automated framework for fine-grained sentiment analysis of application reviews using deep neural networks |
44 | -- | 0 | Fatma Ahsan, Faisal Anwer. A systematic literature review on software security testing using metaheuristics |
45 | -- | 0 | Atefeh Nirumand, Bahman Zamani, Behrouz Tork Ladani. A comprehensive framework for inter-app ICC security analysis of Android apps |
46 | -- | 0 | He Kong, Tong Li 0012, Jingguo Ge, Lei Zhang, Liangxiong Li. Enhancing fault localization in microservices systems through span-level using graph convolutional networks |
47 | -- | 0 | Andreea Vescan, Radu Dan Gaceanu, Camelia Serban. Exploring the impact of data preprocessing techniques on composite classifier algorithms in cross-project defect prediction |
48 | -- | 0 | Tarik Houichime, Younès El Amrani. Optimized design refactoring (ODR): a generic framework for automated search-based refactoring to optimize object-oriented software architectures |
49 | -- | 0 | Alexander Elenga Gärtner, Dietmar Göhlich. Automated requirement contradiction detection through formal logic and LLMs |
50 | -- | 0 | Di Wu, Hongyu Zhang, Yang Feng, Zhenjiang Dong, Ying Sun. The future of API analytics |
51 | -- | 0 | Zaineb Sakhrawi, Taher Labidi. Test case selection and prioritization approach for automated regression testing using ontology and COSMIC measurement |
52 | -- | 0 | Lam Nguyen Tung, Nguyen Vu Binh Duong, Khoi Nguyen Le, Pham Ngoc Hung. Automated test data generation and stubbing method for C/C++ embedded projects |
53 | -- | 0 | Miltiadis G. Siavvas, Dimitrios Tsoukalas, Charalambos Marantos, Lazaros Papadopoulos, Christos P. Lamprakos, Oliviu Matei, Christos Strydis, Muhammad Ali Siddiqi, Philippe Chrobocinski, Katarzyna Filus, Joanna Domanska, Paris Avgeriou, Apostolos Ampatzoglou, Dimitrios Soudris, Alexander Chatzigeorgiou, Erol Gelenbe, Dionisis D. Kehagias, Dimitrios Tzovaras. SDK4ED: a platform for building energy efficient, dependable, and maintainable embedded software |
54 | -- | 0 | Pierre-Olivier Côté, Amin Nikanjam, Nafisa Ahmed, Dmytro Humeniuk, Foutse Khomh. Data cleaning and machine learning: a systematic literature review |
55 | -- | 0 | Yishu Li, Jacky Keung, Zhen Yang, Xiaoxue Ma, Jingyu Zhang, Shuo Liu. SimAC: simulating agile collaboration to generate acceptance criteria in user story elaboration |
56 | -- | 0 | Zhiqiang Li, Qiannan Du, Hongyu Zhang, Xiao-Yuan Jing, Fei Wu. An empirical study of data sampling techniques for just-in-time software defect prediction |
57 | -- | 0 | Maryam Nooraei Abadeh. Knowledge-enhanced software refinement: leveraging reinforcement learning for search-based quality engineering |
65 | -- | 0 | Yubin Qu, Song Huang, Yongming Yao. A survey on robustness attacks for deep code models |
66 | -- | 0 | Lizhuang Tan, Amjad Aldweesh, Ning Chen, Jian Wang 0010, Jianyong Zhang, Yi Zhang, Konstantin Kostromitin Igorevich, Peiying Zhang. Energy efficient resource allocation based on virtual network embedding for IoT data generation |
67 | -- | 0 | Pravali Manchala, Manjubala Bisi. A study on cross-project fault prediction through resampling and feature reduction along with source projects selection |
68 | -- | 0 | Jian Hu. Semantic context based coincidental correct test cases detection for fault localization |
69 | -- | 0 | Eman Fatima, Hira Kanwal, Javed Ali Khan, Nek Dil Khan. An exploratory and automated study of sarcasm detection and classification in app stores using fine-tuned deep learning classifiers |
70 | -- | 0 | S. Kaliraj, Velisetti Geetha Pavan Sahasranth, V. Sivakumar. A holistic approach to software fault prediction with dynamic classification |
71 | -- | 0 | Junyi Lu, Zhangyi Li, Chenjie Shen, Li Yang, Chun Zuo. Exploring the impact of code review factors on the code review comment generation |