Abstract is missing.
- Tensfa: Detecting and Repairing Tensor Shape Faults in Deep Learning SystemsDangwei Wu, Beijun Shen, Yuting Chen, He Jiang 0001, Lei Qiao. 11-21 [doi]
- Expanding Fix Patterns to Enable Automatic Program RepairVesna Nowack, David Bowes, Steve Counsell, Tracy Hall, Saemundur Haraldsson, Emily Winter 0001, John R. Woodward. 12-23 [doi]
- Lessons Learned from the Development of a Mechanical Ventilator for COVID-19Andrea Bombarda, Silvia Bonfanti, Cristiano Galbiati, Angelo Gargantini, Patrizio Pelliccione, Elvinia Riccobene, Masayuki Wada. 24-35 [doi]
- How Long Will it Take to Mitigate this Incident for Online Service Systems?Weijing Wang, Junjie Chen, Lin Yang, Hongyu Zhang, Pu Zhao, Bo Qiao, Yu Kang, Qingwei Lin, Saravanakumar Rajmohan, Feng Gao, Zhangwei Xu, Yingnong Dang, Dongmei Zhang. 36-46 [doi]
- BEIRUT: Repository Mining for Defect PredictionAmir Elmishali, Bruno Sotto-Mayor, Inbal Roshanski, Amit Sultan, Meir Kalech. 47-56 [doi]
- Multi-source Cross Project Defect Prediction with Joint Wasserstein Distance and Ensemble LearningQuanyi Zou, Lu Lu, Zhanyu Yang, Hao Xu. 57-68 [doi]
- GCN2defect : Graph Convolutional Networks for SMOTETomek-based Software Defect PredictionCheng Zeng, Chun Ying Zhou, Shengkai Lv, Peng He, Jie Huang. 69-79 [doi]
- LogFlash: Real-time Streaming Anomaly Detection and Diagnosis from System Logs for Large-scale Software SystemsTong Jia, Yifan Wu, Chuanjia Hou, Ying Li. 80-90 [doi]
- Identifying Root-Cause Metrics for Incident Diagnosis in Online Service SystemsCanhua Wu, Nengwen Zhao, Lixin Wang, Xiaoqin Yang, ShiNing Li, Ming Zhang, Xing Jin, Xidao Wen, Xiaohui Nie, Wenchi Zhang, Kaixin Sui, Dan Pei. 91-102 [doi]
- Robust KPI Anomaly Detection for Large-Scale Software Services with Partial LabelsShenglin Zhang, Chenyu Zhao, Yicheng Sui, Ya Su, Yongqian Sun, Yuzhi Zhang, Dan Pei, Yizhe Wang. 103-114 [doi]
- Contextual-Semantic-Aware Linkable Knowledge Prediction in Stack Overflow via Self-AttentionZhaolin Luo, Ling Xu, Zhou Xu 0003, Meng Yan, Yan Lei, Can Li. 115-126 [doi]
- Optimizing Selective Protection for CNN ResilienceAbdulrahman Mahmoud, Siva Kumar Sastry Hari, Christopher W. Fletcher, Sarita V. Adve, Charbel Sakr, Naresh R. Shanbhag, Pavlo Molchanov, Michael B. Sullivan 0001, Timothy Tsai 0002, Stephen W. Keckler. 127-138 [doi]
- Dependency-aware Form UnderstandingShaokun Zhang, Yuanchun Li, Weixiang Yan, Yao Guo 0001, Xiangqun Chen. 139-149 [doi]
- Out-of-Distribution Detection through Relative Activation-Deactivation AbstractionsZhen Zhang, Peng Wu, Yuhang Chen, Jing Su. 150-161 [doi]
- ReFixar: Multi-version Reasoning for Automated Repair of Regression ErrorsXuan-Bach D. Le, Quang Loc Le. 162-172 [doi]
- Usability and Aesthetics: Better Together for Automated Repair of Web PagesThanh Le-Cong, Xuan-Bach D. Le, Huynh Quyet Thang, Phi-Le Nguyen. 173-183 [doi]
- An Empirical Study on Common Bugs in Deep Learning CompilersXiaoting Du, Zheng Zheng 0001, Lei Ma, Jianjun Zhao. 184-195 [doi]
- A Comparative Study of Automatic Program Repair Techniques for Security VulnerabilitiesEduard Pinconschi, Rui Abreu, Pedro Adão. 196-207 [doi]
- More Reliable Test Suites for Dynamic APR by using CounterexamplesAmirfarhad Nilizadeh, Marlon Calvo, Gary T. Leavens, Xuan-Bach D. Le. 208-219 [doi]
- Evaluating Natural Language Inference Models: A Metamorphic Testing ApproachMingyue Jiang, Houzhen Bao, Kaiyi Tu, Xiao-Yi Zhang, Zuohua Ding. 220-230 [doi]
- Black-Box and White-Box Test Case Generation for RESTful APIs: Enemies or Allies?Alberto Martin-Lopez, Andrea Arcuri, Sergio Segura, Antonio Ruiz Cortés. 231-241 [doi]
- An Efficient Approximation for Quantitative Analysis of Dynamic Fault TreesLuyao Ye, Erqing Li, Dongdong Zhao 0001, Shengwu Xiong, Siwei Zhou, Jianwen Xiang. 242-252 [doi]
- Ahead of Time Mutation Based Fault Localisation using Statistical InferenceJinhan Kim, Gabin An, Robert Feldt, Shin Yoo. 253-263 [doi]
- What to Blame? On the Granularity of Fault Localization for Deep Neural NetworksMatias Duran, Xiao-Yi Zhang, Paolo Arcaini, Fuyuki Ishikawa. 264-275 [doi]
- A Novel Automatic Query Expansion with Word Embedding for IR-based Bug LocalizationMisoo Kim, YoungKyoung Kim, Eunseok Lee. 276-287 [doi]
- Vall-nut: Principled Anti-Grey box - FuzzingYuekang Li, Guozhu Meng, Jun Xu, Cen Zhang, Hongxu Chen, Xiaofei Xie, Haijun Wang, Yang Liu. 288-299 [doi]
- Fuzz Testing the Compiled Code in R PackagesAkhila Chowdary Kolla, Alex Groce, Toby Dylan Hocking. 300-308 [doi]
- Black-Box Testing of Deep Neural NetworksTaejoon Byun, Sanjai Rayadurgam, Mats P. E. Heimdahl. 309-320 [doi]
- EVIL: Exploiting Software via Natural LanguagePietro Liguori, Erfan Al-Hossami, Vittorio Orbinato, Roberto Natella, Samira Shaikh, Domenico Cotroneo, Bojan Cukic. 321-332 [doi]
- Automatically Identifying Bug Reports with Tactical Vulnerabilities by Deep Feature LearningWei Zheng, Manqing Zhang, Hui Tang, Yuanfang Cai, Xiang Chen, Xiaoxue Wu, Abubakar Omari Abdallah Semasaba. 333-344 [doi]
- Eager Falsification for Accelerating Robustness Verification of Deep Neural NetworksXingwu Guo, Wenjie Wan, Zhaodi Zhang, Min Zhang, Fu Song, Xuejun Wen. 345-356 [doi]
- PyMTDEvaluator: A Tool for Time-Based Moving Target Defense Evaluation: Tool description paperMatheus Torquato 0001, Paulo Maciel, Marco Vieira. 357-366 [doi]
- CloudPin: A Root Cause Localization Framework of Shared Bandwidth Package Traffic Anomalies in Public Cloud NetworksShize Zhang, Yunfeng Zhao, Jianyuan Lu, Biao Lyu, Shunmin Zhu, Zhiliang Wang, Jiahai Yang, Lin He, Jianping Wu. 367-377 [doi]
- Peculiar: Smart Contract Vulnerability Detection Based on Crucial Data Flow Graph and Pre-training TechniquesHongjun Wu, Zhuo Zhang 0007, Shangwen Wang, Yan Lei, Bo Lin, Yihao Qin, Haoyu Zhang, Xiaoguang Mao. 378-389 [doi]
- Static Bound Analysis of Dynamically Allocated Resources for C ProgramsGuangsheng Fan, Taoqing Chen, Banghu Yin, Liqian Chen, Tengbin Wang, Ji Wang. 390-400 [doi]
- Simplify Array Processing Loops for Efficient Program VerificationXiang Du, Liangze Yin, Wei Dong. 401-411 [doi]
- The Behavioral Diversity of Java JSON LibrariesNicolas Harrand, Thomas Durieux, David Broman, Benoit Baudry. 412-422 [doi]
- Static Type Inference for Foreign Functions of PythonMingzhe Hu, Yu Zhang, Wenchao Huang, Yan Xiong. 423-433 [doi]
- Suraksha: A Framework to Analyze the Safety Implications of Perception Design Choices in AVsHengyu Zhao, Siva Kumar Sastry Hari, Timothy Tsai 0002, Michael B. Sullivan 0001, Stephen W. Keckler, Jishen Zhao. 434-445 [doi]
- Secure and Efficient White-box Encryption Scheme for Data Protection against Shared Cache Attacks in Cloud ComputingYang Shi 0002, Mianhong Li, Wujing Wei, Yangyang Liu, Xiapu Luo. 446-456 [doi]
- Vu1SPG: Vulnerability detection based on slice property graph representation learningWeining Zheng, Yuan Jiang, Xiaohong Su. 457-467 [doi]
- PyGuard: Finding and Understanding Vulnerabilities in Python Virtual MachinesChengman Jiang, Baojian Hua, Wanrong Ouyang, Qiliang Fan, Zhizhong Pan. 468-475 [doi]
- iReview: an Intelligent Code Review Evaluation Tool using BiofeedbackHaytham Hijazi, José Cruz, João Castelhano, Ricardo Couceiro, Miguel Castelo-Branco, Paulo de Carvalho, Henrique Madeira. 476-485 [doi]
- Improving Code Summarization Through Automated Quality AssuranceYuxing Hu, Meng Yan, Zhongxin Liu, Qiuyuan Chen, Bei Wang. 486-497 [doi]
- Characterizing Sensor Leaks in Android AppsXiaoyu Sun, Xiao Chen, Kui Liu, Sheng Wen, Li Li, John Grundy 0001. 498-509 [doi]
- A Characteristic Study of Deadlocks in Database-Backed Web ApplicationsZhengyi Qiu, Shudi Shao, Qi Zhao 0003, Guoliang Jin. 510-521 [doi]
- One Step Further: Investigating Problematic Files of Architecture Anti-patternsJingwen Liu, Wuxia Jin, Qiong Feng, Xinyu Zhang, Yitong Dai. 522-533 [doi]
- Characterizing and Understanding Software Developer Networks in Security DevelopmentSong Wang 0009, Nachiappan Nagappan. 534-545 [doi]
- Fast Change-Based Alarm Reporting for Evolving Software SystemsAnushri Jana, Ankita Khadsare, Bharti Chimdyalwar, Shrawan Kumar, Vaidehi Ghime, R. Venkatesh 0001. 546-556 [doi]
- Nondeterministic Impact of CPU Multithreading on Training Deep Learning SystemsGuanping Xiao, Jun Liu, Zheng Zheng, Yulei Sui. 557-568 [doi]
- HawkEye: User-Guided Enumeration of ScenariosAllison Sullivan. 569-578 [doi]
- Peeking into the Gray Area of Mobile World: An Empirical Study of Unlabeled Android AppsSen Chen, Lingling Fan, Cuiyun Gao, Fu Song, Yang Liu. 579-590 [doi]