Abstract is missing.
- A Scenario Model-driven Task Planning Method for Unmanned Aerial Vehicle SwarmYunwei Dong, Zeshan Li, Ruiheng Zhang, Rubing Huang, Tao Wang. [doi]
- Optimizing Search-Based Unit Test Generation with Large Language Models: An Empirical StudyDanni Xiao, Yimeng Guo, Yanhui Li, Lin Chen. [doi]
- CCAF: Learning Code Change via AdapterFusionWentao Zou, Zongwen Shen, JiDong Ge, Chuanyi Li, Bin Luo 0003. [doi]
- A Bayesian LSTM Based Active Anomaly Detection Service for Large Online SystemsChen Wang, Tao Huang, Min Li, Pengfei Chen, Zhiwen Chen. [doi]
- LIReDroid: LLM-Enhanced Test Case Generation for Static Sensitive Behavior ReplicationYin Wang, Ming Fan 0002, Xicheng Zhang, Jifei Shi, Zhaoyu Qiu, Haijun Wang, Ting Liu 0002. [doi]
- Synthesizing Controller for Unsynthesizable Specification Based on Criticality LevelsDong Yang, Hao Shi, Wei Dong, Yanqi Dong, Yong Zhang. [doi]
- A Service-oriented Scheduling Combination Strategy on Cloud Platforms Based on A Dual-Layer QoS Evaluation ModelXiaojun Xu, Chenghao Cai, Xiuqi Yang, Zhuofan Xu, Jingjing Hu, Jing Sun. [doi]
- MobileEdgeSim: A Tool for Simulating Microservice-Oriented Mobile Edge ComputingYuqi Zhao, Shiyu He, Qibo Li, Yuchen Pei, Yutao Ma. [doi]
- LateBA: Latent Backdoor Attack on Deep Bug Search via Infrequent Execution CodesXiaoyu Yi, Gaolei Li, Wenkai Huang, Xi Lin, Jianhua Li, Yuchen Liu. [doi]
- An Empirical Study on Code Search Pre-trained Models: Academic Progresses vs. Industry RequirementsKuo Chi, Chuanyi Li, JiDong Ge, Bin Luo 0003. [doi]
- CRABS-former: CRoss-Architecture Binary Code Similarity Detection based on TransformerYuhong Feng, Haoran Li, Yixuan Cao, Yufeng Wang, Haiyue Feng. [doi]
- A Lightweight Dynamic QoS Optimization Strategy for Satellite IoT NetworksDongchao Ma, Xiaohe Zhao, Sitian Huang, Yu Zhang, Ruiqi Wang. [doi]
- Detecting Optimizing Compiler Bugs via History-Driven Test Program MutationJunwei Zeng, Yixuan Tang, Jingxuan Zhang, Weiwei Li 0001, Zhiqiu Huang. [doi]
- Accelerating Static Null Pointer Dereference Detection with Parallel ComputingRulin Xu, Luohui Chen, Ruyi Zhang 0002, Yuanliang Zhang, Wei Xiao, Haifang Zhou, Xiaoguang Mao. [doi]
- Enhancing Deep Learning Vulnerability Detection through Imbalance Loss Functions: An Empirical StudyYanzhong He, Guancheng Lin, Xiaoxue Ma, Jacky Wai Keung, Cheng Tan, Wenhua Hu, Fuyang Li. [doi]
- DSL-MoLab: supporting model-based development of TDL-specific systems enabled by DSLJie Hu, Yaozhong Zhang, Xiujuan Qin, Lvlun Wei, Fangwe Chen, Shmuel S. Tyszberowicz, Mingyue Zhang, Bo Liu. [doi]
- VisRepo: A Visual Retrieval Tool for Large-Scale Open-Source ProjectsXiaoqi Yue, Chao Liu 0014, Neng Zhang 0001, Haibo Hu 0002, Xiaohong Zhang 0002. [doi]
- Global-State Aware Automatic NUMA BalancingJianguo Liu, Zhibin Yu. [doi]
- NEST: Node with Statistics Tree for IoT Data Persistence and Real-time QueriesJiahua Huang, Chun Cao, Jun Ma 0010, Xiaoxing Ma. [doi]
- DFEPT: Data Flow Embedding for Enhancing Pre-Trained Model Based Vulnerability DetectionZhonghao Jiang, Weifeng Sun, Xiaoyan Gu, Jiaxin Wu, Tao Wen, Haibo Hu 0002, Meng Yan 0001. [doi]
- ERD-CQC : Enhanced Rule and Dependency Code Quality Check for JavaYi Hou, Wuxia Jin, Zhijun Wang, Liuming Wang, Shuguang Chen, Yihan Wang, Lei Sang, Haijun Wang, Ting Liu. [doi]
- Mono2MS: Deep Fusion of Multi-Source Features for Partitioning Monolith into MicroservicesGeng Chen, Chenlin Li, Shmuel S. Tyszberowicz, Zhiming Liu 0001, Bo Liu. [doi]
- MatsVD: Boosting Statement-Level Vulnerability Detection via Dependency-Based AttentionCheng Weng, Yihao Qin, Bo Lin, Pei Liu, Liqian Chen. [doi]
- T-RAP: A Template-guided Retrieval-Augmented Vulnerability Patch Generation ApproachPei Liu, Bo Lin, Yihao Qin, Cheng Weng, Liqian Chen. [doi]
- HGNN4Perf: Detecting Performance Optimization Opportunities via Hypergraph Neural NetworkMing Quan Fu, Minjie Wei, Minglang Qiao, Peng Ji, Zhihao Deng, Di Cui, Yutong Zhao. [doi]
- ObjTest: Object-Level Mutation for Testing Object Detection SystemsZixi Liu, Yang Feng 0003, Jiali Xu, Baowen Xu. [doi]
- WACP: A Performance Profiling Tool for WebAssembly-Python InteroperabilityYudan Long, Yuxin Su 0001, Zigui Jiang. [doi]
- RM2EIS: A Tool for Auto-Generation of EIS from Requirements ModelYihui Jian, Yilong Yang, Shaohong Zhu, Zhi Li, Li Zhang. [doi]
- Structure-Sensitive Pointer Analysis for Multi-structure ObjectsXun An, Xiaoqi Jia, Haichao Du, Yamin Xie. [doi]
- CIDF: Combined Intrusion Detection Framework in Industrial Control Systems based on Packet Signature and Enhanced FSFDPJianwen Xiang, Xuemin Zhang, Qianrong Zheng, Longmin Deng, Dongdong Zhao 0001, Junwei Zhou. [doi]
- Towards Life-long Software Self-validation in ProductionDaohan Qu, Chaoyi Zhao, Yanyan Jiang 0001, Chang Xu. [doi]
- Inside Bug Report Templates: An Empirical Study on Bug Report Templates in Open-Source SoftwareJunwei Zhang, Zhongxin Liu, Lingfeng Bao, Zhenchang Xing, Xing Hu, Xin Xia. [doi]
- Path Exploration Strategy for Symbolic Execution based on Multi-strategy Active LearningLianying He, Dalin Zhang 0003, Dongqing Zhu, Junwen Zhang, Rui Wang, Jiqiang Liu. [doi]
- Efficient Deadlock Detection in MPI Programs with Path Compression and Focus MatchingJiale Hao, Meng Wang 0001, Hong Zhang. [doi]
- Parer: Boosting EROFS Image Creation With Parallelism and ReproducibilityYifan Zhao, Tong Xin, Mingkai Dong. [doi]
- laTAPE: Location-Aware Programming and Executing Trigger-Action RulesBei Deng, Bingkun Sun, Liwei Shen. [doi]
- RepoMinCoder: Improving Repository-Level Code Generation Based on Information Loss ScreeningYifan Li, Ensheng Shi, Dewu Zheng, Kefeng Duan, Jiachi Chen, Yanlin Wang. [doi]
- On the Heterophily of Program Graphs: A Case Study of Graph-based Type InferenceSenrong Xu, Jiamei Shen, Yunfan Li, Yuan Yao, Ping Yu 0004, Feng Xu 0007, Xiaoxing Ma. [doi]
- Mining Fix Patterns for System Interaction BugsDi Liu, Yanyan Yan, Hongcheng Fan, Yang Feng 0003. [doi]
- An Exploratory Study on God Header Files in Open-Source C ProjectsYue Wang, Wenhui Chang, Yanzhen Zou, Bing Xie. [doi]
- Murphi2Chisel: A Protocol Compiler from Murphi to ChiselZhenghai Cai, Yongjian Li, Yongxin Zhao. [doi]
- Intelligent Interference Information Fusion for Security of UAV Forest Remote Sensing Image DetectionXiaodong Wang, Long Wen, Jijing Cai, Kai Fang. [doi]
- Decoding Web3: In-depth Analysis of the Third-Party Package Supply ChainKai Ma, Zhuo Wang, Yanjie Zhao, Haoyu Wang. [doi]
- LLM-Enhanced Theorem Proving with Term Explanation and Tactic Parameter Repairā±Xingpeng Liu, Hengzhu Liu, Xiaodong Yi 0002, Ji Wang. [doi]
- Energy-Aware Satellite-Ground Co-Inference via Layer-Wise Processing Schedule OptimizationYijie Chen, Qiyang Zhang, Ruolin Xing, Yuanzhe Li, Xiao Ma 0009, Chaoxin Yu, Yiran Zhang, Ao Zhou 0001, Shangguang Wang. [doi]
- LSTD-MTS: Anomaly Detection with Capturing Long-Term Spatio-Temporal Dependence for Multi-dimensional Time SeriesHaoyang Zeng, Ningjiang Chen, Tao Deng. [doi]
- An Exploratory Evaluation of Large Language Models Using Empirical Software Engineering TasksWenjun Liang, Guanping Xiao. [doi]
- Repairing Obsolete GUI Test Scripts for Android Applications with Exploration and BacktrackingRuihua Ji, Zhengxuan Qian, Zhong Li, Xiaoqing Zhu, Yu Pei 0001, Minxue Pan, Tian Zhang 0001. [doi]
- ExceRef: Automatically Refactoring for Exception HandlingYang Zhang, Yuan Xue. [doi]
- IOGuard: Software-Based I/O Page Fault Handling with One CPU CoreYiyuan Dong, Zeyu Mi. [doi]
- The Dark Side of NFTs: A Large-Scale Empirical Study of Wash TradingShijian Chen, Jiachi Chen, Jiangshan Yu, Xiapu Luo, Yanlin Wang. [doi]
- Reduce Detection Latency of YOLOv5 to Prevent Real-Time Tracking Failures for Lightweight RobotsJianxin Xue, Husheng Chen, Yaohua Hu, Minyu Chen, Ling-I Wu, Xi Chang. [doi]
- CLUE: Customizing clustering techniques using machine learning for software modularizationFanyi Meng, Ying Wang, Chun Yong Chong, Hai Yu 0001, Zhiliang Zhu 0001. [doi]
- Resource-Aware Task Allocation on Mixed-Criticality Systems: a Task-Splitting ApproachRuoxian Su, Hanzhi Xu, Jieyu Jiang, Shuai Zhao. [doi]
- CTuner: Automatic NoSQL Database Tuning with Causal Reinforcement LearningGenting Mai, Zilong He, Guangba Yu, Zhiming Chen, Pengfei Chen 0002. [doi]
- Developing Burr-XII NHPP-based software reliability growth model using Expectation Conditional Maximization AlgorithmSheng Han, Qiang Han, Yixin Qiao, Kehan Xue, ZhiChao Shi. [doi]