Abstract is missing.
- Message from the ICSE 2022 General ChairMatthew B. Dwyer. [doi]
- Message from the ICSE 2022 Program ChairsDaniela E. Damian, Andreas Zeller. [doi]
- $\mu AFL$: Non-intrusive Feedback-driven Fuzzing for Microcontroller FirmwareWenqiang Li, Jiameng Shi, FengJun Li, Jingqiang Lin, Wei Wang 0314, Le Guan. 1-12 [doi]
- Diversity-Driven Automated Formal VerificationEmily First, Yuriy Brun. 1-13 [doi]
- SPT-Code: Sequence-to-Sequence Pre-Training for Learning Source Code RepresentationsChangan Niu, Chuanyi Li, Vincent Ng 0001, JiDong Ge, LiGuo Huang, Bin Luo 0003. 1-13 [doi]
- A Grounded Theory Based Approach to Characterize Software Attack SurfacesSara Moshtari, Ahmet Okutan, Mehdi Mirakhorli. 13-24 [doi]
- A Grounded Theory of Coordination in Remote-First and Hybrid Software TeamsRonnie Edson de Souza Santos, Paul Ralph. 25-35 [doi]
- A Scalable t-wise Coverage EstimatorEduard Baranov, Sourav Chakraborty 0001, Axel Legay, Kuldeep S. Meel, N. Variyam Vinodchandran. 36-47 [doi]
- A Universal Data Augmentation Approach for Fault LocalizationHuan Xie, Yan Lei, Meng Yan, Yue Yu 0001, Xin Xia 0001, Xiaoguang Mao. 48-60 [doi]
- Adaptive Performance Anomaly Detection for Online Service Systems via Pattern SketchingZhuangbin Chen, Jinyang Liu, Yuxin Su 0001, Hongyu Zhang 0002, Xiao Ling, Michael R. Lyu. 61-72 [doi]
- Adaptive Test Selection for Deep Neural NetworksXinyu Gao, Yang Feng, Yining Yin, Zixi Liu, Zhenyu Chen 0001, Baowen Xu. 73-85 [doi]
- An Exploratory Study of Deep learning Supply ChainXin Tan, Kai Gao, Minghui Zhou, Li Zhang. 86-98 [doi]
- An Exploratory Study of Productivity Perceptions in Software TeamsAnastasia Ruvimova, Alexander Lill, Jan Gugler, Lauren Howe, Elaine Huang, Gail C. Murphy, Thomas Fritz 0001. 99-111 [doi]
- Analyzing User Perspectives on Mobile App Privacy at ScalePreksha Nema, Pauline Anthonysamy, Nina Taft, Sai Teja Peddinti. 112-124 [doi]
- APER: Evolution-Aware Runtime Permission Misuse Detection for Android AppsSinan Wang, Yibo Wang, Xian Zhan, Ying Wang, Yepang Liu 0001, Xiapu Luo, Shing-Chi Cheung. 125-137 [doi]
- ARCLIN: Automated API Mention Resolution for Unformatted TextsYintong Huo, Yuxin Su 0001, Hongming Zhang, Michael R. Lyu. 138-149 [doi]
- AST-Trans: Code Summarization with Efficient Tree-Structured AttentionZe Tang, Xiaoyu Shen, Chuanyi Li, JiDong Ge, LiGuo Huang, Zheling Zhu, Bin Luo 0003. 150-162 [doi]
- Automated Assertion Generation via Information Retrieval and Its Integration with Deep learningHao Yu, Yiling Lou, Ke Sun, Dezhi Ran, Tao Xie 0001, Dan Hao 0001, Ying Li, Ge Li 0001, Qianxiang Wang. 163-174 [doi]
- Automated Detection of Password Leakage from Public GitHub RepositoriesRunhan Feng, Ziyang Yan, Shiyan Peng, Yuanyuan Zhang 0002. 175-186 [doi]
- Automated Handling of Anaphoric Ambiguity in Requirements: A Multi-solution StudySaad Ezzini, Sallam Abualhaija, Chetan Arora 0002, Mehrdad Sabetzadeh. 187-199 [doi]
- Automated Patching for Unreproducible BuildsZhilei Ren, Shiwei Sun, Jifeng Xuan, Xiaochen Li, Zhide Zhou, He Jiang 0001. 200-211 [doi]
- Automated Testing of Software that Uses Machine Learning APIsChengcheng Wan, Shicheng Liu, Sophie Xie, Yifan Liu, Henry Hoffmann, Michael Maire, Shan Lu 0001. 212-224 [doi]
- Automatic Detection of Performance Bugs in Database Systems using Equivalent QueriesXinyu Liu, Qi Zhou 0010, Joy Arulraj, Alessandro Orso. 225-236 [doi]
- AutoTransform: Automated Code Transformation to Support Modern Code Review ProcessPatanamon Thongtanunam, Chanathip Pornprasit, Chakkrit Tantithamthavorn. 237-248 [doi]
- BEDIVFUZZ: Integrating Behavioral Diversity into Generator-based FuzzingHoang Lam Nguyen, Lars Grunske. 249-261 [doi]
- Big Data = Big Insights? Operationalising Brooks' Law in a Massive GitHub Data SetChristoph Gote, Pavlin Mavrodiev, Frank Schweitzer, Ingo Scholtes. 262-273 [doi]
- Bots for Pull Requests: The Good, the Bad, and the PromisingMairieli Santos Wessel, Ahmad Abdellatif, Igor Wiese, Tayana Conte, Emad Shihab, Marco Aurélio Gerosa, Igor Steinmacher. 274-286 [doi]
- Bridging Pre-trained Models and Downstream Tasks for Source Code UnderstandingDeze Wang, Zhouyang Jia, Shanshan Li, Yue Yu, Yun Xiong, Wei Dong 0006, Xiangke Liao. 287-298 [doi]
- BugListener: Identifying and Synthesizing Bug Reports from Collaborative Live ChatsLin Shi, Fangwen Mu, Yumin Zhang, Ye Yang, Junjie Chen, Xiao Chen, Hanzhi Jiang, Ziyou Jiang, Qing Wang 0001. 299-311 [doi]
- Buildsheriff: Change-Aware Test Failure Triage for Continuous Integration BuildsChen Zhang, Bihuan Chen 0001, Xin Peng 0001, Wenyun Zhao. 312-324 [doi]
- Causality in Configurable Software SystemsClemens Dubslaff, Kallistos Weis, Christel Baier, Sven Apel. 325-337 [doi]
- Causality-Based Neural Network RepairBing Sun, Jun Sun 0001, Long H. Pham, Tie Shi. 338-349 [doi]
- Change Is the Only Constant: Dynamic Updates for WorkflowsDaniel Sokolowski, Pascal Weisenburger, Guido Salvaneschi. 350-362 [doi]
- Characterizing and Detecting Bugs in WeChat Mini-ProgramsTao Wang, Qingxin Xu, Xiaoning Chang, Wensheng Dou, Jiaxin Zhu, Jinhui Xie, Yuetang Deng, Jianbo Yang, Jiaheng Yang, Jun Wei, Tao Huang. 363-375 [doi]
- CLEAR: Contrastive Learning for API RecommendationMoshi Wei, Nima Shiri Harzevili, Yuchao Huang, Junjie Wang 0001, Song Wang 0009. 376-387 [doi]
- Code Search based on Context-aware Code TranslationWeisong Sun, Chunrong Fang, Yuchen Chen, Guanhong Tao, Tingxu Han, Quanjun Zhang. 388-400 [doi]
- CodeFill: Multi-token Code Completion by Jointly learning from Structure and Naming SequencesMaliheh Izadi, Roberta Gismondi, Georgios Gousios. 401-412 [doi]
- Collaboration Challenges in Building ML-Enabled Systems: Communication, Documentation, Engineering, and ProcessNadia Nahar, Shurui Zhou, Grace A. Lewis, Christian Kästner. 413-425 [doi]
- Combinatorial Testing of RESTful APIsHuayao Wu, Lixin Xu, Xintao Niu, Changhai Nie. 426-437 [doi]
- CONFETTI: Amplifying Concolic Guidance for FuzzersJames Kukucka, Luís Pina, Paul Ammann, Jonathan Bell 0001. 438-450 [doi]
- Conflict-aware Inference of Python Compatible Runtime Environments with Domain Knowledge GraphWei Cheng, Xiangrong Zhu, Wei Hu. 451-461 [doi]
- Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided SearchRuidong Han, Chao Yang, Siqi Ma, JiangFeng Ma, Cong Sun 0001, Juanru Li, Elisa Bertino. 462-473 [doi]
- Controlled Concurrency Testing via Periodical SchedulingCheng Wen, Mengda He, Bohao Wu, Zhiwu Xu 0001, Shengchao Qin. 474-486 [doi]
- Cross-Domain Deep Code Search with Meta LearningYitian Chai, Hongyu Zhang, Beijun Shen, Xiaodong Gu. 487-498 [doi]
- Data-Driven Loop Bound Learning for Termination AnalysisRongchen Xu, Jianhui Chen, Fei He0001. 499-510 [doi]
- DEAR: A Novel Deep Learning-based Approach for Automated Program RepairYi Li, Shaohua Wang 0002, Tien N. Nguyen. 511-523 [doi]
- Decomposing Convolutional Neural Networks into Reusable and Replaceable ModulesRangeet Pan, Hridesh Rajan. 524-535 [doi]
- Decomposing Software Verification into Off-the-Shelf Components: An Application to CEGARDirk Beyer 0001, Thomas Lemberger 0002, Jan Haltermann, Heike Wehrheim. 536-548 [doi]
- DeepAnalyze: Learning to Localize Crashes at ScaleManish Shetty, Chetan Bansal, Suman Nath, Sean Bowles, Henry Wang, Ozgur Arman, Siamak Ahari. 549-560 [doi]
- DeepDiagnosis: Automatically Diagnosing Faults and Recommending Actionable Fixes in Deep Learning ProgramsMohammad Wardat, Breno Dantas Cruz, Wei Le, Hridesh Rajan. 561-572 [doi]
- DeepFD: Automated Fault Diagnosis and Localization for Deep Learning ProgramsJialun Cao, Meiziniu Li, Xiao Chen, Ming Wen 0001, Yongqiang Tian, Bo Wu, Shing-Chi Cheung. 573-585 [doi]
- DeepStability: A Study of Unstable Numerical Methods and Their Solutions in Deep LearningEliska Kloberdanz, Kyle G. Kloberdanz, Wei Le. 586-597 [doi]
- DeepState: Selecting Test Suites to Enhance the Robustness of Recurrent Neural NetworksZixi Liu, Yang Feng, Yining Yin, Zhenyu Chen 0001. 598-609 [doi]
- DeepSTL - From English Requirements to Signal Temporal LogicJie He, Ezio Bartocci, Dejan Nickovic, Haris Isakovic, Radu Grosu. 610-622 [doi]
- DeepTraLog: Trace-Log Combined Microservice Anomaly Detection through Graph-based Deep LearningChenxi Zhang, Xin Peng 0001, Chaofeng Sha, Ke Zhang, Zhenqing Fu, Xiya Wu, Qingwei Lin, Dongmei Zhang 0001. 623-634 [doi]
- Default: Mutual Information-based Crash Triage for Massive CrashesXing Zhang, Jiongyi Chen, Chao Feng, Ruilin Li, Wenrui Diao, Kehuan Zhang, Jing Lei 0001, Chaojing Tang. 635-646 [doi]
- Demystifying Android Non-SDK APls: Measurement and UnderstandingShishuai Yang, Rui Li, Jiongyi Chen, Wenrui Diao, Shanqing Guo. 647-658 [doi]
- Demystifying the Dependency Challenge in Kernel FuzzingYu Hao, Hang Zhang, Guoren Li, Xingyun Du, Zhiyun Qian, Ardalan Amiri Sani. 659-671 [doi]
- Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM EcosystemChengwei Liu, Sen Chen, Lingling Fan, Bihuan Chen 0001, Yang Liu 0003, Xin Peng 0001. 672-684 [doi]
- DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile AppsShao Yang, Yuehan Wang, Yuan Yao 0001, Haoyu Wang 0001, Yanfang Fanny Ye, Xusheng Xiao. 685-697 [doi]
- Detecting False Alarms from Automatic Static Analysis Tools: How Far are We?Hong Jin Kang, Khai Loong Aw, David Lo 0001. 698-709 [doi]
- "Did You Miss My Comment or What?" Understanding Toxicity in Open Source DiscussionsCourtney Miller, Sophie Cohen, Daniel Klug, Bogdan Vasilescu, Christian Kästner. 710-722 [doi]
- Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android AppsJordan Samhi, Li Li 0029, Tegawendé F. Bissyandé, Jacques Klein. 723-735 [doi]
- Discovering Repetitive Code Changes in Python ML SystemsMalinda Dilhara, Ameya Ketkar, Nikhith Sannidhi, Danny Dig. 736-748 [doi]
- Domain-Specific Analysis of Mobile App Reviews Using Keyword-Assisted Topic ModelsMiroslav Tushev, Fahimeh Ebrahimi, Anas Mahmoud. 762-773 [doi]
- DrAsync: Identifying and Visualizing Anti-Patterns in Asynchronous JavaScriptAlexi Turcotte, Michael D. Shah, Mark W. Aldrich, Frank Tip. 774-785 [doi]
- Dynamic Update for Synthesized GR(1) ControllersGal Amram, Shahar Maoz, Itai Segall, Matan Yossef. 786-797 [doi]
- EAGLE: Creating Equivalent Graphs to Test Deep Learning LibrariesJiannan Wang, Thibaud Lutellier, Shangshu Qian, Hung Viet Pham, Lin Tan 0001. 798-810 [doi]
- Efficient Online Testing for DNN-Enabled Systems using Surrogate-Assisted and Many-Objective OptimizationFitash Ul Haq, Donghwan Shin 0001, Lionel C. Briand. 811-822 [doi]
- Eflect: Porting Energy-Aware Applications to Shared EnvironmentsTimur Babakol, Anthony Canino, Yu David Liu. 823-834 [doi]
- EREBA: Black-box Energy Testing of Adaptive Neural NetworksMirazul Haque, Yaswanth Yadlapalli, Wei Yang 0013, Cong Liu. 835-846 [doi]
- Evaluating and Improving Neural Program-Smoothing-based FuzzingMingyuan Wu, Ling Jiang, Jiahong Xiang, Yuqun Zhang, Guowei Yang 0001, Huixin Ma, Sen Nie, Shi Wu, Heming Cui, Lingming Zhang. 847-858 [doi]
- ExAIS: Executable AI SemanticsRichard Schumi, Jun Sun 0001. 859-870 [doi]
- Explanation-Guided Fairness Testing through Genetic AlgorithmMing Fan 0002, Wenying Wei, Wuxia Jin, Zijiang Yang, Ting Liu 0002. 871-882 [doi]
- Exploiting Input Sanitization for Regex Denial of ServiceEfe Barlas, Xin Du, James C. Davis. 883-895 [doi]
- FADATest: Fast and Adaptive Performance Regression Testing of Dynamic Binary Translation SystemsJin Wu, Jian Dong, Ruili Fang, Wen Zhang, Wenwen Wang, Decheng Zuo. 896-908 [doi]
- Fairness-aware Configuration of Machine Learning LibrariesSaeid Tizpaz Niari, Ashish Kumar, Gang Tan, Ashutosh Trivedi 0001. 909-920 [doi]
- Fairneuron: Improving Deep Neural Network Fairness with Adversary Games on Selective NeuronsXuanqi Gao, Juan Zhai, ShiQing Ma, Chao Shen, Yufei Chen, Qian Wang. 921-933 [doi]
- Fast and Precise Application Code Analysis using a Partial LibraryAkshay Utture, Jens Palsberg. 934-945 [doi]
- Fast Changeset-based Bug Localization with BERTAgnieszka Ciborowska, Kostadin Damevski. 946-957 [doi]
- Fault Localization via Efficient Probabilistic Modeling of Program SemanticsMuhan Zeng, Yiqian Wu, Zhentao Ye, Yingfei Xiong 0001, Xin Zhang, Lu Zhang 0023. 958-969 [doi]
- FIRA: Fine-Grained Graph-Based Code Change Representation for Automated Commit Message GenerationJinhao Dong, Yiling Lou, Qihao Zhu, Zeyu Sun 0004, Zhilin Li, Wenjie Zhang, Dan Hao 0001. 970-981 [doi]
- FlakiMe: Laboratory-Controlled Test Flakiness Impact AssessmentMaxime Cordy, Renaud Rwemalika, Adriano Franci, Mike Papadakis, Mark Harman. 982-994 [doi]
- Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open SourceAnjiang Wei, Yinlin Deng, Chenyuan Yang, Lingming Zhang. 995-1007 [doi]
- Fuzzing Class SpecificationsFacundo Molina, Marcelo d'Amorim, Nazareno Aguirre. 1008-1020 [doi]
- Garbage Collection Makes Rust Easier to Use: A Randomized Controlled Trial of the Bronze Garbage CollectorMichael Coblenz, Michelle L. Mazurek, Michael Hicks 0001. 1021-1032 [doi]
- Generating and Visualizing Trace Link ExplanationsYalin Liu, Jinfeng Lin, Oghenemaro Anuyah, Ronald A. Metoyer, Jane Cleland-Huang. 1033-1044 [doi]
- GIFdroid: Automated Replay of Visual Bug Reports for Android AppsSidong Feng, Chunyang Chen. 1045-1057 [doi]
- GitHub Sponsors: Exploring a New Way to Contribute to Open SourceNaomichi Shimada, Tao Xiao, Hideaki Hata, Christoph Treude, Kenichi Matsumoto. 1058-1069 [doi]
- GraphFuzz: Library API Fuzzing with Lifetime-aware Dataflow GraphsHarrison Green, Thanassis Avgerinos. 1070-1081 [doi]
- Green AI: Do Deep Learning Frameworks Have Different Costs?Stefanos Georgiou, Maria Kechagia, Tushar Sharma 0001, Federica Sarro, Ying Zou 0001. 1082-1094 [doi]
- Guidelines for Assessing the Accuracy of Log Message Template Identification TechniquesZanis Ali Khan, Donghwan Shin 0001, Domenico Bianculli, Lionel C. Briand. 1095-1106 [doi]
- Hashing It Out: A Survey of Programmers' Cannabis Usage, Perception, and MotivationMadeline Endres, Kevin Boehnke, Westley Weimer. 1107-1119 [doi]
- Hiding Critical Program Components via Ambiguous TranslationChijung Jung, Doowon Kim, An Chen, Weihang Wang 0001, Yunhui Zheng, Kyu Hyung Lee, Yonghwi Kwon 0001. 1120-1132 [doi]
- History-Driven Test Program Synthesis for JVM TestingYingquan Zhao, Zan Wang, Junjie Chen, Mengdi Liu, Mingyuan Wu, Yuqun Zhang, Lingming Zhang. 1133-1144 [doi]
- If a Human Can See It, So Should Your System: Reliability Requirements for Machine Vision ComponentsBoyue Caroline Hu, Lina Marsso, Krzysztof Czarnecki, Rick Salay, Huakun Shen, Marsha Chechik. 1145-1156 [doi]
- Imperative versus Declarative Collection Processing: An RCT on the Understandability of Traditional Loops versus the Stream API in JavaNils Mehlhorn, Stefan Hanenberg. 1157-1168 [doi]
- Improving Fault Localization and Program Repair with Deep Semantic Features and Transferred KnowledgeXiangxin Meng, Xu Wang, Hongyu Zhang 0002, Hailong Sun 0001, Xudong Liu 0001. 1169-1180 [doi]
- Improving Machine Translation Systems via Isotopic ReplacementZeyu Sun 0004, Jie M. Zhang, Yingfei Xiong 0001, Mark Harman, Mike Papadakis, Lu Zhang 0023. 1181-1192 [doi]
- Inference and Test Generation Using Program Invariants in Chemical Reaction NetworksMichael C. Gerten, Alexis L. Marsh, James I. Lathrop, Myra B. Cohen, Andrew S. Miner, Titus H. Klinge. 1193-1205 [doi]
- Inferring and Applying Type ChangesAmeya Ketkar, Oleg Smirnov, Nikolaos Tsantalis, Danny Dig, Timofey Bryksin. 1206-1218 [doi]
- Jigsaw: Large Language Models meet Program SynthesisNaman Jain, Skanda Vaidyanath, Arun Shankar Iyer, Nagarajan Natarajan, Suresh Parthasarathy, Sriram K. Rajamani, Rahul Sharma 0001. 1219-1231 [doi]
- JuCify: A Step Towards Android Code Unification for Enhanced Static AnalysisJordan Samhi, Jun Gao 0001, Nadia Daoudi, Pierre Graux, Henri Hoyez, Xiaoyu Sun, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein. 1232-1244 [doi]
- Knowledge-Based Environment Dependency Inference for Python ProgramsHongjie Ye, Wei Chen 0018, Wensheng Dou, Guoquan Wu, Jun Wei 0001. 1245-1256 [doi]
- Large-scale Security Measurements on the Android Firmware EcosystemQinsheng Hou, Wenrui Diao, Yanhao Wang, Xiaofeng Liu, Song Liu, Lingyun Ying, Shanqing Guo, Yuanzhi Li, Meining Nie, Haixin Duan. 1257-1268 [doi]
- Learning and Programming Challenges of Rust: A Mixed-Methods StudyShuofei Zhu, Ziyi Zhang, Boqin Qin, Aiping Xiong, Linhai Song. 1269-1281 [doi]
- Learning Probabilistic Models for Static Analysis AlarmsHyunsu Kim, Mukund Raghothaman, Kihong Heo. 1282-1293 [doi]
- Learning to Recommend Method Names with Global ContextFang Liu, Ge Li, Zhiyi Fu, Shuai Lu, Yiyang Hao, Zhi Jin. 1294-1306 [doi]
- Learning to Reduce False Positives in Analytic Bug DetectorsAnant Kharkar, Roshanak Zilouchian Moghaddam, Matthew Jin, Xiaoyu Liu, Xin Shi, Colin B. Clement, Neel Sundaresan. 1307-1316 [doi]
- Less is More: Supporting Developers in Vulnerability Detection during Code ReviewLarissa Braz, Christian Aeberhard, Gül Çalikli, Alberto Bacchelli. 1317-1329 [doi]
- Lessons from Eight Years of Operational Data from a Continuous Integration Service: An Exploratory Case Study of CircleCIKeheliya Gallaba, Maxime Lamothe, Shane McIntosh. 1330-1342 [doi]
- Linear-time Temporal Logic guided Greybox FuzzingRuijie Meng, Zhen Dong, Jialin Li, Ivan Beschastnikh, Abhik Roychoudhury. 1343-1355 [doi]
- Log-based Anomaly Detection with Deep Learning: How Far Are We?Van-Hoang Le, Hongyu Zhang. 1356-1367 [doi]
- Manas: Mining Software Repositories to Assist AutoMLGiang Nguyen, Md Johirul Islam, Rangeet Pan, Hridesh Rajan. 1368-1380 [doi]
- Modeling Review History for Reviewer Recommendation: A Hypergraph ApproachGuoping Rong, Yifan Zhang, Lanxin Yang, Fuli Zhang, Hongyu Kuang, He Zhang. 1381-1392 [doi]
- ModX: Binary Level Partially Imported Third-Party Library Detection via Program Modularization and Semantic MatchingCan Yang, Zhengzi Xu, Hongxu Chen, Yang Liu, Xiaorui Gong, Baoxu Liu. 1393-1405 [doi]
- Morest: Model-based RESTful API Testing with Execution FeedbackYi Liu, Yuekang Li, Gelei Deng, Yang Liu, Ruiyuan Wan, Runchao Wu, Dandan Ji, Shiheng Xu, Minli Bao. 1406-1417 [doi]
- Muffin: Testing Deep Learning Libraries via Neural Architecture FuzzingJiazhen Gu, Xuchuan Luo, Yangfan Zhou, Xin Wang 0002. 1418-1430 [doi]
- Multi-Intention-Aware Configuration Selection for Performance TuningHaochen He, Zhouyang Jia, Shanshan Li, Yue Yu, Chenglong Zhou, Qing Liao 0001, Ji Wang, Xiangke Liao. 1431-1442 [doi]
- Multilingual training for Software EngineeringToufique Ahmed, Premkumar T. Devanbu. 1443-1455 [doi]
- MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural NetworksSicong Cao, Xiaobing Sun, Lili Bo, Rongxin Wu, Bin Li, Chuanqi Tao. 1456-1468 [doi]
- Nalin: learning from Runtime Behavior to Find Name-Value Inconsistencies in Jupyter NotebooksJibesh Patra, Michael Pradel. 1469-1481 [doi]
- Natural Attack for Pre-trained Models of CodeZhou Yang, Jieke Shi, Junda He, David Lo 0001. 1482-1493 [doi]
- Nessie: Automatically Testing JavaScript APIs with Asynchronous CallbacksEllen Arteca, Sebastian Harner, Michael Pradel, Frank Tip. 1494-1505 [doi]
- Neural Program Repair with Execution-based BackpropagationHe Ye, Matias Martinez, Martin Monperrus. 1506-1518 [doi]
- NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron IdentificationHaibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang 0005, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu 0001, Jinyin Chen. 1519-1531 [doi]
- NPEX: Repairing Java Null Pointer Exceptions without TestsJunhee Lee, Seongjoon Hong, Hakjoo Oh. 1532-1544 [doi]
- Nufix: Escape From NuGet Dependency MazeZhenming Li, Ying Wang, Zeqi Lin, Shing-Chi Cheung, Jian-Guang Lou. 1545-1557 [doi]
- OJXPERF: Featherlight Object Replica Detection for Java ProgramsBolun Li, Hao Xu, Qidong Zhao, Pengfei Su 0001, Milind Chabbi, Shuyin Jiao, Xu Liu 0001. 1558-1570 [doi]
- On Debugging the Performance of Configurable Software Systems: Developer Needs and Tailored Tool SupportMiguel Velez, Pooyan Jamshidi, Norbert Siegmund, Sven Apel, Christian Kästner. 1571-1583 [doi]
- On the Benefits and Limits of Incremental Build of Software Configurations: An Exploratory StudyGeorges Aaron Randrianaina, Xhevahire Tërnava, Djamel Eddine Khelladi, Mathieu Acher. 1584-1596 [doi]
- On the Evaluation of Neural Code SummarizationEnsheng Shi, Yanlin Wang, Lun Du, Junjie Chen 0003, Shi Han, Hongyu Zhang 0002, Dongmei Zhang 0001, Hongbin Sun. 1597-1608 [doi]
- On the Importance of Building High-quality Training Datasets for Neural Code SearchZhensu Sun, Li Li, Yan Liu, Xiaoning Du 0001, Li Li 0029. 1609-1620 [doi]
- On the Reliability of Coverage-Based Fuzzer BenchmarkingMarcel Böhme, László Szekeres, Jonathan Metzman. 1621-1633 [doi]
- One Fuzzing Strategy to Rule Them AllMingyuan Wu, Ling Jiang, Jiahong Xiang, Yanwei Huang, Heming Cui, Lingming Zhang, Yuqun Zhang. 1634-1645 [doi]
- Online Summarizing Alerts through Semantic and Behavior InformationJia Chen, Peng Wang, Wei Wang. 1646-1657 [doi]
- Path Transitions Tell More: Optimizing Fuzzing Schedules via Runtime Program StatesKunpeng Zhang, Xi Xiao, Xiaogang Zhu, Ruoxi Sun, Minhui Xue, Sheng Wen. 1658-1668 [doi]
- PerfSig: Extracting Performance Bug Signatures via Multi-modality Causal AnalysisJingzhu He, Yuhang Lin, Xiaohui Gu, Chin-Chia Michael Yeh, Zhongfang Zhuang. 1669-1680 [doi]
- Practical Automated Detection of Malicious npm PackagesAdriana Sejfia, Max Schäfer. 1681-1692 [doi]
- Practitioners' Expectations on Automated Code Comment GenerationXing Hu, Xin Xia, David Lo 0001, Zhiyuan Wan, Qiuyuan Chen, Thomas Zimmermann 0001. 1693-1705 [doi]
- PREACH: A Heuristic for Probabilistic Reachability to Identify Hard to Reach StatementsSeemanta Saha, Mara Downing, Tegan Brennan, Tevfik Bultan. 1706-1717 [doi]
- Precise Divide-By-Zero Detection with Affirmative EvidenceYiyuan Guo, Jinguo Zhou, Peisen Yao, Qingkai Shi, Charles Zhang. 1718-1729 [doi]
- Preempting Flaky Tests via Non-Idempotent-Outcome TestsAnjiang Wei, Pu Yi, ZhengXi Li, Tao Xie 0001, Darko Marinov, Wing Lam. 1730-1742 [doi]
- Prioritizing Mutants to Guide Mutation TestingSamuel J. Kaufman, Ryan Featherman, Justin Alvin, Bob Kurtz, Paul Ammann, René Just. 1743-1754 [doi]
- PROMAL: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine LearningChanglin Liu, Hanlin Wang, Tianming Liu, Diandian Gu, Yun Ma 0003, Haoyu Wang, Xusheng Xiao. 1755-1767 [doi]
- PROPR: Property-Based Automatic Program RepairMatthías Páll Gissurarson, Leonhard Applis, Annibale Panichella, Arie van Deursen, David Sands. 1768-1780 [doi]
- PUS: A Fast and Highly Efficient Solver for Inclusion-based Pointer AnalysisPeiming Liu, Yanze Li, Bradley Swain, Jeff Huang 0001. 1781-1792 [doi]
- Push-Button Synthesis of Watch Companions for Android AppsCong Li, Yanyan Jiang 0001, Chang Xu 0001. 1793-1804 [doi]
- Quantifying Permissiveness of Access Control PoliciesWilliam Eiers, Ganesh Sankaran, Albert Li, Emily O'Mahony, Benjamin Prince, Tevfik Bultan. 1805-1817 [doi]
- R2Z2: Detecting Rendering Regressions in Web Browsers through Differential Fuzz TestingSuhwan Song, Jaewon Hur, Sunwoo Kim, Philip Rogers, Byoungyoung Lee. 1818-1829 [doi]
- Recommending Good First Issues in GitHub OSS ProjectsWenxin Xiao, Hao He, Weiwei Xu, Xin Tan, Jinhao Dong, Migahui Zhou. 1830-1842 [doi]
- REFTY: Refinement Types for Valid Deep Learning ModelsYanjie Gao, Zhengxian Li, Haoxiang Lin, Hongyu Zhang, Ming Wu, Mao Yang. 1843-1855 [doi]
- ReMoS: Reducing Defect Inheritance in Transfer Learning via Relevant Model SlicingZiqi Zhang, Yuanchun Li, Jindong Wang, Bingyan Liu, Ding Li, Yao Guo 0001, Xiangqun Chen, Yunxin Liu. 1856-1868 [doi]
- Repairing Brain-Computer Interfaces with Fault-Based Data AcquisitionCailin Winston, Caleb Winston, Chloe N. Winston, Claris Winston, Cleah Winston, Rajesh P. N. Rao, René Just. 1869-1880 [doi]
- Repairing Order-Dependent Flaky Tests via Test GenerationChengpeng Li, Chenguang Zhu 0002, Wenxi Wang, August Shi. 1881-1892 [doi]
- Retrieving Data Constraint Implementations Using Fine-Grained Code PatternsJuan Manuel Florez, Jonathan Perry, Shiyi Wei, Andrian Marcus. 1893-1905 [doi]
- RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style TransformationZhen Li, Qian (Guenevere) Chen, Chen Chen, Yayi Zou, Shouhuai Xu. 1906-1918 [doi]
- Rotten Apples Spoil the Bunch: An Anatomy of Google Play MalwareMichael Cao, Khaled Ahmed 0004, Julia Rubin. 1919-1931 [doi]
- SAPIENTML: Synthesizing Machine Learning Pipelines by Learning from Human-Written SolutionsRipon K. Saha, Akira Ura, Sonal Mahajan, Chenguang Zhu 0002, Linyi Li, Yang Hu, Hiroaki Yoshida, Sarfraz Khurshid, Mukul R. Prasad. 1932-1944 [doi]
- Search-based Diverse Sampling from Real-world Software Product LinesYi Xiang, Han Huang 0002, Yuren Zhou, Sizhe Li, Chuan Luo, Qingwei Lin, Miqing Li, Xiaowei Yang. 1945-1957 [doi]
- Semantic Image Fuzzing of AI Perception SystemsTrey Woodlief, Sebastian G. Elbaum, Kevin Sullivan. 1958-1969 [doi]
- ShellFusion: Answer Generation for Shell Programming Tasks via Knowledge FusionNeng Zhang, Chao Liu, Xin Xia 0001, Christoph Treude, Ying Zou 0001, David Lo 0001, Zibin Zheng. 1970-1981 [doi]
- SnR: Constraint-Based Type Inference for Incomplete Java Code SnippetsYiwen Dong, Tianxiao Gu, Yongqiang Tian, Chengnian Sun. 1982-1993 [doi]
- Social Science Theories in Software Engineering ResearchTobias Lorey, Paul Ralph, Michael Felderer. 1994-2005 [doi]
- Static Inference Meets Deep learning: A Hybrid Type Inference Approach for PythonYun Peng, Cuiyun Gao, Zongjie Li, Bowei Gao, David Lo 0001, Qirun Zhang, Michael R. Lyu. 2019-2030 [doi]
- Static Stack-Preserving Intra-Procedural Slicing of WebAssembly BinariesQuentin Stiévenart, David W. Binkley, Coen De Roover. 2031-2042 [doi]
- Striking a Balance: Pruning False-Positives from Static Call GraphsAkshay Utture, Shuyang Liu, Christian Gram Kalhauge, Jens Palsberg. 2043-2055 [doi]
- SugarC: Scalable Desugaring of Real-World Preprocessor Usage into Pure CZach Patterson, Zenong Zhang, Brent Pappas, Shiyi Wei, Paul Gazzillo. 2056-2067 [doi]
- SYMTUNER: Maximizing the Power of Symbolic Execution by Adaptively Tuning External ParametersSooyoung Cha, Myungho Lee, Seokhyun Lee, Hakjoo Oh. 2068-2079 [doi]
- Testing Time Limits in Screener Questions for Online Surveys with ProgrammersAnastasia Danilova, Stefan Horstmann, Matthew Smith 0001, Alena Naiakshina. 2080-2090 [doi]
- The Art and Practice of Data Science Pipelines: A Comprehensive Study of Data Science Pipelines In Theory, In-The-Small, and In-The-LargeSumon Biswas, Mohammad Wardat, Hridesh Rajan. 2091-2103 [doi]
- The Extent of Orphan Vulnerabilities from Code Reuse in Open Source SoftwareDavid Reid, Mahmoud Jahanshahi, Audris Mockus. 2104-2115 [doi]
- "This Is Damn Slick!" Estimating the Impact of Tweets on Open Source Project Popularity and New ContributorsHongbo Fang, Hemank Lamba, James D. Herbsleb, Bogdan Vasilescu. 2116-2129 [doi]
- TOGA: A Neural Method for Test Oracle GenerationElizabeth Dinella, Gabriel Ryan, Todd Mytkowicz, Shuvendu K. Lahiri. 2130-2141 [doi]
- Towards Automatically Repairing Compatibility Issues in Published Android AppsYanjie Zhao, Li Li 0029, Kui Liu, John C. Grundy. 2142-2153 [doi]
- Towards Bidirectional Live Programming for Incomplete ProgramsXing Zhang, Zhenjiang Hu. 2154-2164 [doi]
- Towards Boosting Patch Execution On-the-FlySamuel Benton, Yuntong Xie, Lan Lu, Mengshi Zhang, Xia Li, Lingming Zhang. 2165-2176 [doi]
- Towards language-independent Brown Build DetectionDoriane Olewicki, Mathieu Nayrolles, Bram Adams. 2177-2188 [doi]
- Towards Practical Robustness Analysis for DNNs based on PAC-Model LearningRenjue Li, Pengfei Yang, Cheng-Chao Huang, Youcheng Sun, Bai Xue 0001, Lijun Zhang. 2189-2201 [doi]
- Towards Training Reproducible Deep Learning ModelsBoyuan Chen, Mingzhi Wen, Yong Shi, Dayi Lin, Gopi Krishnan Rajbahadur, Zhen Ming Jiang. 2202-2214 [doi]
- Training Data Debugging for the Fairness of Machine Learning SoftwareYanhui Li, Linghan Meng, Lin Chen, Li Yu 0008, Di Wu, Yuming Zhou, Baowen Xu. 2215-2227 [doi]
- Trust Enhancement Issues in Program RepairYannic Noller, Ridwan Shariffdeen, Xiang Gao 0012, Abhik Roychoudhury. 2228-2240 [doi]
- Type4Py: Practical Deep Similarity Learning-Based Type Inference for PythonAmir M. Mir, Evaldas Latoskinas, Sebastian Proksch, Georgios Gousios. 2241-2252 [doi]
- Unleashing the Power of Compiler Intermediate Representation to Enhance Neural Program EmbeddingsZongjie Li, Pingchuan Ma 0004, Huaijin Wang, Shuai Wang, Qiyi Tang 0003, Sen Nie, Shi Wu. 2253-2265 [doi]
- Use of Test Doubles in Android Testing: An In-Depth InvestigationMattia Fazzini, Chase Choi, Juan Manuel Copia, Gabriel Lee, Yoshiki Kakehi, Alessandra Gorla, Alessandro Orso. 2266-2278 [doi]
- Using Deep Learning to Generate Complete Log StatementsAntonio Mastropaolo, Luca Pascarella, Gabriele Bavota. 2279-2290 [doi]
- Using Pre-Trained Models to Boost Code Review AutomationRosalia Tufano, Simone Masiero, Antonio Mastropaolo, Luca Pascarella, Denys Poshyvanyk, Gabriele Bavota. 2291-2302 [doi]
- Using Reinforcement Learning for Load Testing of Video GamesRosalia Tufano, Simone Scalabrino, Luca Pascarella, Emad Aghajani, Rocco Oliveto, Gabriele Bavota. 2303-2314 [doi]
- Utilizing Parallelism in Smart Contracts on Decentralized Blockchains by Taming Application-Inherent ConflictsPéter Garamvölgyi, Yuxi Liu, Dong Zhou, Fan Long, Ming Wu. 2315-2326 [doi]
- VarCLR: Variable Semantic Representation Pre-training via Contrastive LearningQibin Chen, Jeremy Lacomis, Edward J. Schwartz, Graham Neubig, Bogdan Vasilescu, Claire Le Goues. 2327-2339 [doi]
- Verification of ORM-based Controllers by Summary InferenceGeetam Chawla, Navneet Aman, Raghavan Komondoor, Ashish Bokil, Nilesh Kharat. 2340-2351 [doi]
- V-SZZ: Automatic Identification of Version Ranges Affected by CVE VulnerabilitiesLingfeng Bao, Xin Xia 0001, Ahmed E. Hassan, Xiaohu Yang. 2352-2364 [doi]
- VulCNN: An Image-inspired Scalable Vulnerability Detection SystemYueming Wu, Deqing Zou, Shihan Dou, Wei Yang 0013, Duo Xu, Hai Jin 0001. 2365-2376 [doi]
- What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source CodeYao Wan, Wei Zhao, Hongyu Zhang 0002, Yulei Sui, Guandong Xu, Hai Jin 0001. 2377-2388 [doi]
- What Makes a Good Commit Message?Yingchen Tian, Yuxia Zhang, Klaas-Jan Stol, Lin Jiang, Hui Liu. 2389-2401 [doi]
- What Makes Effective Leadership in Agile Software Development Teams?Lucas Gren, Paul Ralph. 2402-2414 [doi]
- What the Fork? Finding Hidden Code Clones in npmElizabeth Wyss, Lorenzo De Carli, Drew Davidson. 2415-2426 [doi]
- Where is Your App Frustrating Users?Yawen Wang, Junjie Wang, Hongyu Zhang, Xuran Ming, Lin Shi, Qing Wang. 2427-2439 [doi]
- Windranger: A Directed Greybox Fuzzer driven by Deviation Basic BlocksZhengjie Du, Yuekang Li, Yang Liu, Bing Mao. 2440-2451 [doi]