Abstract is missing.
- Software Supply Chain Security of Web3Martin Monperrus. 1-10 [doi]
- CSMS: Boosting Class Code Summarization via Transformer Refinement and Method Summary FusionFeiqiao Mao, Xingyang Du, Shaocheng Feng, Jiafeng Guo, Yifan Bai. 1-5 [doi]
- CAMUS: Context-Aware Neural Mutation SelectionMingda Chen, Bo Wang 0050, Youfang Lin, Jie M. Zhang. 11-22 [doi]
- ISA: Test Case Generation Based on Improved Simulated Annealing AlgorithmShunhui Ji, Yu Shi, Ji Deng, Pengcheng Zhang. 23-34 [doi]
- Understanding Commercial Low-code App BugsHadia Syed, Zhixing He, Ye Tang, Jiqing Liu, Shengjie Chen, Lixin Sun, Hao Zhong 0001. 35-46 [doi]
- AutoRCA: A Graph Sequence-based Automatic Root Cause Analysis Method for Microservice Systems through Multimodal DataYing Zhou, Yingying Shen, Bixin Li. 47-56 [doi]
- Trace: Test Repair via Agent-based Context Extraction with LLMsJingxiang Tu, Bo Lin 0011, Yihao Qin, Shangwen Wang, Liqian Chen, Xiaoguang Mao. 57-68 [doi]
- A Hierarchical Hybrid-Intelligence Architecture with Consensus, Debate, and Reflection for High-Fidelity NL-to-PPTL ConversionTianchi Zhang 0008, Jinhui Lyu, Yong Cai 0002. 69-80 [doi]
- A Systematic Mapping Study on Risks and Vulnerabilities in Software ContainersMaha Sroor, Teerath Das, Rahul Mohanani, Tommi Mikkonen. 81-92 [doi]
- Enhancing Commit Classification for Software Maintenance with Adversarial LearningXinrui Li, Xin Yin, Chao Ni 0001. 93-103 [doi]
- Reliable Code Generation with Test Case Prioritization and Cognitive ValidationLingyun Huang, Xin Yin, Xinrui Li, Chao Ni 0001. 104-114 [doi]
- SeedOrNot: A Classification-Based Framework for Efficient Seed Scheduling in Hybrid FuzzingQian Yan, Minhuan Huang, Huayang Cao. 115-126 [doi]
- An Empirical Study of Reinforcement Learning-based Class Integration Test Order GenerationJiayi Wang, Shuxiang Zheng, Miao Zhang, Yan Xiao, Peihong Chen, Xiaoxing Yang. 127-138 [doi]
- MAAP: A Self-Evolving Multi-Agent Automated Vulnerability Repair Framework for PythonJunfan Chen, Zhiyuan Fu, Ting Yang, Hongyu Sun, Ruidong Li, Yuqing Zhang. 139-148 [doi]
- MICRORACER: Detecting Concurrency Bugs for Cloud Service SystemsZhiling Deng, Juepeng Wang, Zhuangbin Chen. 149-160 [doi]
- BDafny: A Formal Execution and Verification Framework of BPMN 2.0 in DafnyZiqing Su, Sini Chen, Ran Li, Huibiao Zhu, Jiapeng Wang 0004. 161-172 [doi]
- PyReach: A Multi-Agent Framework for Vulnerability Reachability Analysis in PythonYueqin Wang, JingZheng Wu, Xiang Ling 0001, Tianyue Luo, Xu Wang. 173-183 [doi]
- MUATC: Multi-Agent Utilization to Augment Test CoverageTiecheng Ma, Sirui Liu, Wei Dong 0006, Jiaxin Liu, Yating Zhang. 184-195 [doi]
- IPSO: An Improved Particle Swarm Optimization-Based Method for Test Case GenerationPeng Wang, Shunhui Ji, Yikun Guo, Pengcheng Zhang. 196-207 [doi]
- MTL-CR: A Multitask Learning Approach for Code RepresentationDongxu Yu, Feiqiao Mao, Xingyang Du, Yifan Bai. 208-218 [doi]
- Testing Deep Learning Libraries with Semantic Equivalent API PatternsYan Song, Songqiang Chen, Haoyu Peng, Xiaoyuan Xie. 219-230 [doi]
- BEGA: A Binary Code Embedding Method Based on Gravity-Model Augmentation Graph Contrastive LearningZhenglin Li, Dongqi Wang 0001, Shuyue Zhang, Ruiguo Hu, Dongming Chen. 231-242 [doi]
- Conanj: Confidential Data Analysis for Confidential Computing of Java ProgramsXinyuan Miao, Yuting Chen 0001, Ziyi Lin. 243-254 [doi]
- Empirical assessment of the perception of graphical threat model acceptabilityNathan Daniel Schiele, Olga Gadyatskaya. 255-266 [doi]
- Recovering Variable Names in the Decompiled Code Based on Multi-Task LearningJiayi Li, Jingxuan Zhang, He Jiang 0001, Jingjing Gu, Weiqin Zou. 267-278 [doi]
- Software Defect Prediction Based on Temporal Hypergraph Neural NetworkPeng He, Shuai Hu, Ju Ma, Haoqing Yang, Yifan Wang. 279-289 [doi]
- FixConsult: Leveraging External Defect Knowledge Driven Natural Language Suggestions Generation for Software Vulnerability RepairGang Hu, Linhui Geng, Jiayao Jin, Xiaoshu Sun, Min Peng. 290-301 [doi]
- Seed-Adapted Cross-State Protocol FuzzingDingcheng Li, Shihao Zhu, Yan Cai 0001, Long Zhang. 302-313 [doi]
- Lightweight Attention-based Temporal Modeling of Key Facial Features for Driver Fatigue Detection in Intelligent Driver Monitoring SystemsBailing Song, Lanhao Qin, Wenhua Hu, Jianwen Xiang, Rui Hao. 314-324 [doi]
- caSPESC2Vyper: Conformant and Automatic Generation from DeFi SPESC Legal Contract to Vyper Smart ContractYue Yu, Jiahui Wang, Bo Meng, Dejun Wang. 325-336 [doi]
- Latent Search-Based Boundary Aware Fairness Testing for Deployed Deep ModelsQingyuan Sun, Wentian Zhao, Tian Song. 337-346 [doi]
- A First Look at Privacy Risks of Android Task-executable Voice Assistant ApplicationsShidong Pan, Yikai Ge, Xiaoyu Sun 0002. 347-358 [doi]
- GATUNER:Genetic Algorithm Applied to Floating-Point Precision TuningJianing Zhang, Jinchen Xu, Hongru Yang, Tao Zhang, Shuai Wang, Bei Zhou 0004. 359-370 [doi]
- Cobweb: Enhanced Generation Diversity for Black-box Fairness TestingYingqian Guo, Wentian Zhao, Tian Song. 371-382 [doi]
- What You See Is Not Always What You Get: Evaluating GPT's Comprehension of Source CodeJiawen Wen, Bangshuo Zhu, Huaming Chen. 383-394 [doi]
- Mock Clones in the Wild: An Empirical Investigation Across Six Open-Source ProjectsGengwu Zhao, Lu Xiao 0001, Hanbin Qin, Eman Abdullah AlOmar, Sunny Wong 0001. 395-406 [doi]
- Where Is Self-admitted Code Generated by Large Language Models on GitHub?Xiao Yu 0008, Lei Liu 0062, Xing Hu 0008, Jin Liu 0016, Xin Xia 0001. 407-418 [doi]
- TraceWalker: Synthesizing Interactive Debugging Progresses via Dataflow and Control-flow InferenceYunrui Pei, Yuk-Kwan Wong, Chenyang Zhang, Hongshu Wang, Wenjie Zhang, Yun Lin. 419-430 [doi]
- Multi-Stage Generation of Rust Unit Tests with LLMsYongqian Chen, Junwei Zhang, Xing Hu 0008, Xin Xia 0001. 431-442 [doi]
- An empirical comparison of data transformation techniques for clustering-based unsupervised software defect predictionZhengxiang Chen, Zhiqiang Li 0003, Hongyu Zhang 0002, Jie Ren 0007, Feng Tian 0005. 443-454 [doi]
- Dynamic Variance Reduction-Based Reusable Test Case Generation for Image ClassificationChangrong Huang, Shunhui Ji, Yu Shi, Pengcheng Zhang. 455-466 [doi]
- ChatNRC: A Non-functional Requirement Classification Framework Based on a Generative and Discriminative MechanismYuman Qin, Rong Peng. 467-478 [doi]
- Dialogue Framework for Bug Issue Types Classification in Deep Learning-oriented Projects Based on Large Language ModelYu Zhao, Zixuan Zeng, Zhiqiu Huang, Lina Gong. 479-490 [doi]
- Understanding Industrial Log Analysis: A Multi-Dataset Evaluation of Parsing and Anomaly DetectionYicheng Sun, Jacky Keung, Yihan Liao, Hi Kuen Yu. 491-502 [doi]
- SVPrompt-MR: An LLM-Based Metamorphic Relation Identification Method with Self-Verification MechanismJun Huang, Meng Li, Xiaohua Yang, Jie Liu, ShiYu Yan. 503-514 [doi]
- Exploring Developer Departure in Open-Source Software Projects: Prevalence, Reason Taxonomy, and Influencing FactorsYangyang Zhao, Bingzheng Zhao, Zanxiang He, Liming Nie. 515-526 [doi]
- Smart Contract Vulnerability Detection Based on Residual Dilated Convolution with Multi-Head AttentionRuoxin Bai, Meng Wang, Wanqing Liu, Liang Wang. 527-538 [doi]
- Breaking the Curse of High-Dimensionality: A Transformer-Based Approach to Software Configuration Performance PredictionZhengYue Pan, Mingjie Tu, Shijie Li, Dandan Wang, Jie Chen. 539-550 [doi]
- LLMs are All You Need? Improving Fuzz Testing for MOJO with Large Language ModelsLinghan Huang, Peizhou Zhao, Huaming Chen. 551-562 [doi]
- LLM-Based Semantic Modeling and Cooperative Evolutionary Fuzzing for Traffic Violation Scenario GenerationYangyang Liu, Xinyu Li, Yan Xiao, Miao Zhang, Pengcheng Zhang. 563-574 [doi]
- Chart2Code-MoLA: Efficient Multi-Modal Code Generation via Adaptive Expert RoutingYifei Wang, Jacky Keung, Zhenyu Mao, Jingyu Zhang, Yuchen Cao 0006. 575-586 [doi]
- Optimizing Type Duplication in WebAssembly Module SplittingXifan Xu, Jun Ma, Chun Cao. 587-598 [doi]
- A Multi-Model Hybrid Framework Leveraging Query Expansion without Fine-Tuning for Zero-Shot Cross-Domain Code SearchGang Hu, Jiayao Jin, Fan Su, Linhui Geng, Fei Yang, Min Peng. 599-610 [doi]
- Multi-Agent Assisted Automatic Test Generation for Java JSON LibrariesSinan Wang, Zhiyuan Zhong, Shaojin Wen, Yepang Liu 0001. 611-622 [doi]
- Practical Lossless Recompression of JPEG Images Using Transform Domain PredictionLong Chen, Wenhua Hu, Rui Hao, Junwei Zhou 0002, Jianwen Xiang. 623-633 [doi]
- AgentTCP: A Collaborative Multi-Agent Framework for Change-Aware Test Case PrioritizationJunyu Chen, Xiuhua Li, Jinping Wang, Huan Xie 0002, Chunyan Liu, Zhenyu Wu, Yan Lei. 634-645 [doi]
- How Do Developers Use ChatGPT for Software Test Generation? Usage Patterns, Satisfaction, and Code Adoption AnalysisSicheng He, Wanwei Zhan, Jijun Wang, Junjie Dai, Haoxuan Chen, Cheng Tan, Fuyang Li. 646-657 [doi]
- SMTPRT: Performance Regression Testing and Localization for SMT Solvers Across Multiple LogicsZiyang Wang, Xiaohong Li 0001, Lili Quan, Zhiping Zhou, Yao Zhang 0019, Ruitao Feng. 658-667 [doi]
- Edge4RE: A Novel Edge-Cloud Collaborative Framework for Privacy-Preserving Automated Requirements DocumentationBen Cheng, Yi Wang 0119, Oscar Wu, Thuong N. Hoang, Xiao Liu 0004, Chetan Arora 0002. 668-677 [doi]
- HGTRTracer: Advancing Requirements-Code Traceability with LLM-Augmented Attribution Reasoning and Heterogeneous Graph TransformerHuan Jin, Yingkai Yuan, Bangchao Wang, Hongyan Wan, Zhiyuan Zou. 678-689 [doi]
- A Soft Prompt-Enhanced Device Knowledge Extraction Method for Embedded System Requirements ElicitationShengXin Zhao, Chunhui Wang, Zhiguo Liu, Tong Li, Ye Zhai. 690-701 [doi]
- Enhancing Diffusion-Driven Test Input Generation using Large Language ModelJoonwoo Lee, Seungho Kim, Scott Uk-Jin Lee. 702-713 [doi]
- MSPM: A Multi-Strategy Prompting Method for Goal-Oriented Modeling from User StoriesYi Wang, Chunhui Wang, Ye Zhai, Tong Li, Zhiguo Liu. 714-724 [doi]
- A Packing-Insensitive Detection Method for Android Malware Based on Image RepresentationSiyuan Ma, Shihao Zhu, Long Zhang, Yan Cai 0001. 725-736 [doi]
- PerProb: Indirectly Evaluating Memorization in Large Language ModelsYihan Liao, Jacky Keung, Xiaoxue Ma, Jingyu Zhang, Yicheng Sun. 737-748 [doi]
- Exposing and Defending Membership Leakage in Vulnerability Prediction ModelsYihan Liao, Jacky Keung, Xiaoxue Ma, Jingyu Zhang, Yicheng Sun. 749-760 [doi]
- A Comparative Study Towards Designing a Hybrid Architecture of Microservices and LLM-based Multi-Agent SystemsPeyman Yazdanian, Yan Liu, Zheng Li. 761-772 [doi]
- Chain of Command: Context-Aware Android Malware Detection via Permission-to-API Call Chains and Graph Representation LearningZhiChao Shi, Qiang Han, Zihao Zhang. 773-784 [doi]
- Towards Lightweight LLM Software Solutions for InsurTech: A Framework for Scalable Question Answering SystemsHi Kuen Yu, Jacky Keung, Yicheng Sun, Yihan Liao, Richard Suen. 785-795 [doi]
- Human Ants are Beneficial for Team PerformanceIflaah Salman, Alvaro Francisco Gil, Juan Garbajosa, Peter A. Gloor. 796-807 [doi]
- Developing a Japanese-Localization Code Generation Benchmark for LLMsHaruka Tsuchida, Yuha Nishigata, Miyu Sato, Waka Ito, Kimio Kuramitsu. 808-809 [doi]
- Compressing Cell Execution Logs Embedded within Jupyter Notebook FilesTomoki Nakamaru. 810-811 [doi]
- Enhancing Requirement-to-Code Traceability via Chain-of-Thought Prompting in Large Language ModelsWenqing Wang, Ye Wang 0012, Liping Zhao 0001, Qiao Huang, Bo Jiang 0009. 812-816 [doi]
- An Empirical Analysis of ESLint Information Components and Their Interactions in LLM-based Program RepairShinHyuck Kang, Jinseok Heo, Eunseok Lee. 817-821 [doi]
- RAG4Test: Retrieving GUI States for Multilingual Bug Report and Test Case Generation via LLMsZhiyao Wang, Xiujing Guo, Tatsuhiro Tsuchiya. 822-826 [doi]
- MAJD: Intent-Aware Multi-Agent Framework for Jailbreak DefenseJigang Xie, Zhengfan Wang, Junchao He, Wenjing Jiao, Pengfei Dang, Yadong Zhou, Wei Zhang, Ming Fan. 827-831 [doi]
- How Far Have LLMs Come Toward Automated SATD Taxonomy Construction?Sota Nakashima, Yuta Ishimoto, Masanari Kondo, Tao Xiao 0001, Yasutaka Kamei. 832-836 [doi]
- Towards Function-Level Correctness Assessment of System Software with LLMs: A Case StudyMing Zhong, Xin Sun. 837-841 [doi]
- Explainable Software Engineering: From State of the Practice to State of the ArtZheng Li 0001, Maria Angela Ferrario, Ben Crossey, Austen Rainer. 842-846 [doi]
- Function-level Optimization Automatic Tuner for Numerical ProgramsXinni Liu, Xinpeng Li, Guangping Yu, Hengbiao Yu, Xin Yi 0002, Chun Huang 0006. 847-851 [doi]
- Resilient Auto-Scaling of Microservice Architectures with Efficient Resource ManagementHussain Ahmad, Christoph Treude, Markus Wagner 0007, Claudia Szabo. 852-856 [doi]
- MDT-TM: Multi-Dimensional Metamorphic Testing of Terminology in Machine TranslationZhifang Tan, Chuanqi Tao. 857-861 [doi]
- Natural Language Explanation in Code Clone Detection using LLM-based Post Hoc ExplainerTeeradaj Racharak, Chaiyong Ragkhitwetsagul, Chayanee Junplong, Akara Supratak. 862-866 [doi]
- Feature-based Transfer Learning in Cross-Project Defect Prediction: A Systematic ReviewYunpeng Wang, Dongcheng Li 0001, Man Zhao, W. Eric Wong. 867-871 [doi]
- KG-Code: A Knowledge Graph Guided Pre-Training Approach for Code RepresentationHanyu Zhang, Tomoji Kishi. 872-876 [doi]
- Practices and Challenges of Using DeepSeek in SE: An Empirical StudyChao Zhang. 877-881 [doi]
- Cross-Project Defect Prediction Based on Feature Fusion and Local Domain AdaptationXianglu Zhou, Xiaoyan Zhu 0003, Yu Wang 0069, Jiayin Wang 0002, Xin Lai 0003. 882-886 [doi]
- MSWT: Multi-Scale Wavelet Transformer for Dynamic Feature-Based Student Program Error IdentificationLingzhong Yu, Qing Zhou, Subo Zhao, Siyuan Wang. 887-891 [doi]
- QEC-LLM: Training Query-focused Extractive Compression Model with LLM-guiding for Open Domain QASijia Wang, Jy Duan, Xin Li, Haoguang Wen, Yizhuo Zhang, Chunming Liu, Zibo Yi. 892-896 [doi]
- Towards Engineering Multi-Agent LLMs: A Protocol-Driven ApproachZhenyu Mao, Jacky Keung, Fengji Zhang, Shuo Liu 0020, Yifei Wang, Jialong Li. 897-901 [doi]
- Automating Requirements Modelling with LLMs: An Iterative Contrastive Optimisation ApproachChenxi Lv, Shmuel S. Tyszberowicz, Zhiming Liu 0001, Bo Liu 0033. 902-906 [doi]
- A Software Architecture Resilience Assessment Method via Dynamic Bayesian NetworksHao Chen 0109, Bixin Li, Chunguang Zhang, Zixuan Liu. 907-911 [doi]
- BlockAlign: Fair Performance Testing for Blockchains based on Configuration AlignmentJing Shi, Chenglin Xie, Jianbo Gao, Peilun Li, Guoli Yang, Xiaoying Bai. 912-916 [doi]
- TriGraSum: A Tri-level Graph-based Architecture for Source Code SummarizationRuiguo Hu, Dongqi Wang 0001, Mingzhao Xie, Zhenglin Li, Dongming Chen. 917-921 [doi]
- Retrieval-Augmented Code Generation of Low-Resource Programming LanguagesJianbo Lin, Yuan Zhang, Chuanyi Li, Wentao Zou, JiDong Ge, Bin Luo 0003. 927-931 [doi]
- Unified Modelling and Consistency Verification of UML Multi-View Models Using AlloyYihui Guo, Shmuel S. Tyszberowicz, Zhiming Liu 0001, Bo Liu 0033. 932-936 [doi]
- LogExpertSolver: A Multi-Agent Framework for Domain-Specialized Log ParsingChenxi Mao, Yuxin Su 0001, Dan Li 0016. 937-946 [doi]
- It Only Gets Worse: Revisiting DL-Based Vulnerability Detectors from a Practical PerspectiveYunqian Wang, Xiaohong Li 0001, Ruitao Feng, Yao Zhang 0019, Yuekang Li, Zhiping Zhou. 947-956 [doi]
- Constructing and Evaluating Domain-Specific Synthetic QA Datasets for Airborne Software Engineering: An LLM-Based Framework in PracticeXiyue Ruan, Zheng Xu, Yifan Xu, Yunduo Wang, Lindong Wang, Minzhe Li, Ning Ge. 957-966 [doi]
- Virtualization-based Penetration Testing Study for Detecting Accessibility Abuse Vulnerabilities in Banking Apps in East and Southeast AsiaWei Minn, Phong Phan, Vikas Kumar Malviya, Benjamin Adolphi, Yan Naing Tun, Henning Benzon Treichl, Albert Ching, Lwin Khin Shar, David Lo 0001. 967-972 [doi]
- A Catalog of Participatory Reuse Challenges, Solutions, and Lessons LearnedXingru Chen, Muhammad Usman 0002, Deepika Badampudi. 973-982 [doi]
- Towards Data-Driven Real-Time Performance Monitoring of Platform EcosystemsShady Hegazy, Muhammad Ammar, Christoph Elsner, Jan Bosch, Helena Holmström Olsson. 983-992 [doi]
- Galene: A Toolkit for Encapsulating Software Engineering Practices in Marine Science AI ApplicationsShijia Li, Gaowei Zhang, Yi Wang. 993-996 [doi]
- OrchestML: Continuous Integration Tool for Automated Machine Learning Service CompositionsArogya Kharel, Xiangchi Song, In-Young Ko. 997-1000 [doi]
- XRepair - Unifying Retrieval, Repair, and Evaluation for Explainable LLM-Based Vulnerability FixesAlfred Asare Amoah, Yan Liu. 1001-1004 [doi]
- PromptOps: Automated Tool for Testing Trustworthiness of LLMsChommakorn Sontesadisai, Chalisa Sae-Ngow, Jirateep Rudeerudchanawong, Lapatrada Dangsungnoen, Chaiyong Ragkhitwetsagul, Teeradaj Racharak, Thanwadee Sunetnanta. 1005-1008 [doi]
- A Block-Based Educational Tool for Novice Understanding of State Machine RepresentationNichika Takasu, Shinpei Ogata, Kozo Okano, Erina Makihara. 1009-1012 [doi]
- Multi-view Leaderboard: Towards Evaluating the Code Intelligence of LLMs From Multiple ViewsMengyuan Liu, Zexun Zhan, Cuiyun Gao 0001, Yujia Chen, Guoai Xu, Chun Yong Chong, Shan Gao 0009, Xin Xia 0001. 1013-1016 [doi]
- BiFuzz: A Two-Stage Fuzzing Tool for Open-World Video GamesYusaku Kato, Norihiro Yoshida, Erina Makihara, Katsuro Inoue. 1017-1020 [doi]
- AILinkPreviewer: Enhancing Code Reviews with LLM-Powered Link PreviewsPanya Trakoolgerntong, Tao Xiao 0001, Masanari Kondo, Chaiyong Ragkhitwetsagul, Morakot Choetkiertikul, Pattaraporn Sangaroonsilp, Yasutaka Kamei. 1021-1024 [doi]
- PATCHOULI: Fine-grained Security Patch Detection EngineBinchang Li, Qingyuan Li, Cuiyun Gao 0001, Qing Liao 0001. 1025-1028 [doi]
- SQLWizard: A Tool for Robust Text-to-SQL via Intelligent Selection and Fine-Grained RefinementKeyu Liang, Chao Xiang, Zhifan Ye, Zhongxin Liu 0002, Haoye Wang, Hao Guo, Youju Chen. 1029-1032 [doi]
- Software Trustworthiness Assessment Based on Causal Evidence GraphWeina Zhang, Dalin Zhang 0003, Zhenguo Ding. 1033-1035 [doi]
- CIMAS: A Multilingual Semantic-Driven Model for Code Idiom Mining, Abstraction and SynthesisWenxin Yao. 1036-1038 [doi]
- Reasoning Design and Code from Mockup Diagrams Using Vision-LMsNanami Moribe. 1039-1041 [doi]
- ModelVirtualizer: A Light-weight Virtualization Framework for On-Device Deep Learning ModelsJunhua Zhu. 1042-1044 [doi]
- Detecting Data Contamination in Code Generation Benchmarks via DiffMIAKarin Yamashita. 1045-1046 [doi]