Abstract is missing.
- Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility IssuesXiaoyu Sun, Xiao Chen, Yanjie Zhao, Pei Liu, John Grundy 0001, Li Li 0029. [doi]
- ecoCode: a SonarQube Plugin to Remove Energy Smells from Android ProjectsOlivier Le Goaër, Julien Hertout. [doi]
- XSA: eXplainable Self-AdaptationMatteo Camilli, Raffaela Mirandola, Patrizia Scandurra. [doi]
- Patching Weak Convolutional Neural Network Models through Modularization and CompositionBinhang Qi, Hailong Sun 0001, Xiang Gao, Hongyu Zhang 0002. [doi]
- Privacy Analysis of Period Tracking Mobile Apps in the Post-Roe v. Wade EraZikan Dong, Liu Wang 0002, Hao Xie, Guoai Xu, Haoyu Wang 0001. [doi]
- Detecting Inconsistencies in If-Condition-Raise StatementsIslem Bouzenia. [doi]
- Griffin : Grammar-Free DBMS FuzzingJingzhou Fu, Jie Liang, Zhiyong Wu, Mingzhe Wang, Yu Jiang. [doi]
- Towards Generating Labeled Property Graphs for Comprehending C#-based Software ProjectsDavid Heidrich, Andreas Schreiber 0001, Sebastian Oberdörfer. [doi]
- Prioritized Constraint-Aided Dynamic Partial-Order ReductionJie Su, Cong Tian, Zuchao Yang, Jiyu Yang, Bin Yu, Zhenhua Duan. [doi]
- Inline TestsYu Liu, Pengyu Nie 0001, Owolabi Legunsen, Milos Gligoric. [doi]
- Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant AppsFuman Xie, Yanjun Zhang, Chuan Yan, Suwan Li, Lei Bu, Kai Chen, Zi Huang, Guangdong Bai. [doi]
- How Readable is Model-generated Code? Examining Readability and Visual Inspection of GitHub CopilotNaser Al Madi. [doi]
- Execution Path Detection through Dynamic Analysis in Black-Box Testing EnvironmentsFrank Dixon Whitworth. [doi]
- End-to-End Rationale ReconstructionMouna Dhaouadi, Bentley James Oakes, Michalis Famelis. [doi]
- Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal MetricsNicholas M. Synovic, Matt Hyatt, Rohan Sethi, Sohini Thota, Shilpika, Allan J. Miller, Wenxin Jiang, Emmanuel S. Amobi, Austin Pinderski, Konstantin Läufer, Nicholas J. Hayward, Neil Klingensmith, James C. Davis 0001, George K. Thiruvathukal. [doi]
- A Novel Coverage-guided Greybox Fuzzing based on Power Schedule Optimization with Time ComplexityJinfu Chen 0001, Shengran Wang, Saihua Cai, Chi Zhang, Haibo Chen, Jingyi Chen, Jianming Zhang. [doi]
- Answer Summarization for Technical Queries: Benchmark and New ApproachChengran Yang, Bowen Xu, Ferdian Thung, Yucen Shi, Ting Zhang, Zhou Yang 0003, Xin Zhou, Jieke Shi, Junda He, DongGyun Han, David Lo 0001. [doi]
- AntiCopyPaster: Extracting Code Duplicates As Soon As They Are Introduced in the IDEEman Abdullah AlOmar, Anton Ivanov, Zarina Kurbatova, Yaroslav Golubev, Mohamed Wiem Mkaouer, Ali Ouni 0001, Timofey Bryksin, Le-Nguyen, Amit Kini, Aditya Thakur. [doi]
- AST-Probe: Recovering abstract syntax trees from hidden representations of pre-trained language modelsJosé Antonio Hernández López, Martin Weyssow, Jesús Sánchez Cuadrado, Houari A. Sahraoui. [doi]
- Extraction and Management of RationaleMouna Dhaouadi. [doi]
- Using Consensual Biterms from Text Structures of Requirements and Code to Improve IR-Based Traceability RecoveryHui Gao, Hongyu Kuang, Kexin Sun, Xiaoxing Ma, Alexander Egyed, Patrick Mäder, Guoping Rong, Dong Shao, He Zhang. [doi]
- Selectively Combining Multiple Coverage Goals in Search-Based Unit Test GenerationZhichao Zhou, Yuming Zhou, Chunrong Fang, Zhenyu Chen 0001, Yutian Tang. [doi]
- HTFuzz: Heap Operation Sequence Sensitive FuzzingYuanping Yu, Xiangkun Jia, Yuwei Liu, Yanhao Wang, Qian Sang, Chao Zhang, Purui Su. [doi]
- Do Regional Variations Affect the CAPTCHA User Experience? A Comparison of CAPTCHAs in China and the United StatesXinyao Ma, Zaiqiao Ye, Sameer Patil. [doi]
- Data Leakage in Notebooks: Static Detection and Better ProcessesChenyang Yang, Rachel A. Brower-Sinning, Grace A. Lewis, Christian Kästner. [doi]
- Automatically Fixing Breaking Changes of Data Science LibrariesHailie Mitchell. [doi]
- A Light Bug Triage Framework for Applying Large Pre-trained Language ModelJaehyung Lee 0002, Kisun Han, Hwanjo Yu. [doi]
- Fastbot2: Reusable Automated Model-based GUI Testing for Android Enhanced by Reinforcement LearningZhengwei Lv, Chao Peng, Zhao Zhang, Ting Su, Kai Liu, Ping Yang. [doi]
- Accelerating OCR-Based Widget Localization for Test Automation of GUI ApplicationsJu Qian, Yingwei Ma, Chenghao Lin, Lin Chen. [doi]
- Too Much Accessibility is Harmful! Automated Detection and Analysis of Overly Accessible Elements in Mobile AppsForough Mehralian, Navid Salehnamadi, Syed Fatiul Huq, Sam Malek. [doi]
- Enhancing the security of gaming transactions using blockchain technologyCiprian Paduraru, Rares Cristea, Alin Stefanescu. [doi]
- A Review of AI-augmented End-to-End Test Automation ToolsPhuoc Pham, Vu Nguyen, Tien Nguyen. [doi]
- A Transferable Time Series Forecasting Service Using Deep Transformer Model for Online SystemsTao Huang, Pengfei Chen, Jingrun Zhang, Ruipeng Li, Rui Wang. [doi]
- Xscope: Hunting for Cross-Chain Bridge AttacksJiashuo Zhang, Jianbo Gao, Yue Li, Ziming Chen, Zhi Guan, Zhong Chen. [doi]
- A First Look at CI/CD Adoptions in Open-Source Android AppsPei Liu, Xiaoyu Sun, Yanjie Zhao, Yonghui Liu, John Grundy 0001, Li Li 0029. [doi]
- RoboSimVer: A Tool for RoboSim Modeling and AnalysisDehui Du, Ana Cavalcanti 0001, Jihui Nie. [doi]
- Detecting Semantic Code Clones by Building AST-based Markov Chains ModelYueming Wu, Siyue Feng, Deqing Zou, Hai Jin 0001. [doi]
- BuildSonic: Detecting and Repairing Performance-Related Configuration Smells for Continuous Integration BuildsChen Zhang, Bihuan Chen 0001, Junhao Hu, Xin Peng 0001, Wenyun Zhao. [doi]
- Research on Test Flakiness: from Unit to System TestingKiet Ngo, Vu Nguyen, Tien Nguyen. [doi]
- CBMC-SSM: Bounded Model Checking of C Programs with Symbolic Shadow MemoryBernd Fischer 0002, Salvatore La Torre, Gennaro Parlato, Peter Schrammel. [doi]
- Graph based Incident Extraction and Diagnosis in Large-Scale Online SystemsZilong He, Pengfei Chen, Yu Luo, Qiuyu Yan, Hongyang Chen, Guangba Yu, Fangyuan Li. [doi]
- Low-Resources Project-Specific Code SummarizationRui Xie 0003, Tianxiang Hu, Wei Ye, Shikun Zhang. [doi]
- Tseitin or not Tseitin? The Impact of CNF Transformations on Feature-Model AnalysesElias Kuiter, Sebastian Krieter, Chico Sundermann, Thomas Thüm, Gunter Saake. [doi]
- The Metamorphosis: Automatic Detection of Scaling Issues for Mobile AppsYuhui Su, Chunyang Chen, Junjie Wang, Zhe Liu, Dandan Wang, Shoubin Li, Qing Wang. [doi]
- Namesake: A Checker of Lexical Similarity in Identifier NamesNaser Al Madi. [doi]
- Leveraging Artificial Intelligence on Binary Code ComprehensionYifan Zhang. [doi]
- Morest: Industry Practice of Automatic RESTful API TestingYi Liu, Yuekang Li, Yang Liu, Ruiyuan Wan, Runchao Wu, Qingkun Liu. [doi]
- Automated Feedback Generation for Competition-Level CodeJialu Zhang 0002, De-li, John Charles Kolesar, Hanyuan Shi, Ruzica Piskac. [doi]
- Enriching Compiler Testing with Real Program from Bug ReportHao Zhong. [doi]
- Exploiting Epochs and Symmetries in Analysing MPI ProgramsRishabh Ranjan, Ishita Agrawal, Subodh Sharma 0001. [doi]
- GLITCH: Automated Polyglot Security Smell Detection in Infrastructure as CodeNuno Saavedra, João F. Ferreira 0001. [doi]
- Studying and Understanding the Tradeoffs Between Generality and Reduction in Software DebloatingQi Xin, Qirun Zhang, Alessandro Orso. [doi]
- Prompt-tuned Code Language Model as a Neural Knowledge Base for Type Inference in Statically-Typed Partial CodeQing Huang, Zhiqiang Yuan, Zhenchang Xing, Xiwei Xu, Liming Zhu 0001, Qinghua Lu 0001. [doi]
- LiveRef: a Tool for Live Refactoring Java CodeSara Fernandes, Ademar Aguiar, André Restivo. [doi]
- SA4U: Practical Static Analysis for Unit Type Error DetectionMax Taylor, Johnathon Aurand, Feng Qin, Xiaorui Wang, Brandon Henry, Xiangyu Zhang. [doi]
- Answering Software Deployment Questions via Neural Machine Reading at ScaleGuanjie Qiu, Diwei Chen, Shuai Zhang, Yitian Chai, Xiaodong Gu 0002, Beijun Shen. [doi]
- ESAVE: Estimating Server and Virtual Machine EnergyPriyavanshi Pathania, Rohit Mehra, Vibhu Saujanya Sharma, Vikrant Kaulgud, Sanjay Podder, Adam P. Burden. [doi]
- HyperAST: Enabling Efficient Analysis of Software Histories at ScaleQuentin Le Dilavrec, Djamel Eddine Khelladi, Arnaud Blouin, Jean-Marc Jézéquel. [doi]
- Call Graph Evolution Analytics over a Version Series of an Evolving Software SystemAnimesh Chaturvedi. [doi]
- Accelerating Build Dependency Error Detection via Virtual BuildRongxin Wu, Minglei Chen, Chengpeng Wang, Gang Fan, Jiguang Qiu, Charles Zhang. [doi]
- Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser ExtensionsYuxi Ling, Kailong Wang, Guangdong Bai, Haoyu Wang 0001, Jin Song Dong. [doi]
- On the Naturalness of Bytecode InstructionsYoon Ho Choi, Jaechang Nam. [doi]
- QVIP: An ILP-based Formal Verification Approach for Quantized Neural NetworksYedi Zhang, Zhe Zhao, Guangke Chen, Fu Song, Min Zhang, Taolue Chen, Jun Sun. [doi]
- Learning to Synthesize Relational InvariantsJingbo Wang, Chao Wang. [doi]
- A Comprehensive Evaluation of Android ICC Resolution TechniquesJiwei Yan, Shixin Zhang, Yepang Liu 0001, Xi Deng, Jun Yan, Jian Zhang 0001. [doi]
- Safety and Performance, Why not Both? Bi-Objective Optimized Model Compression toward AI Software DeploymentJie Zhu, Leye Wang, Xiao Han 0001. [doi]
- Quacky: Quantitative Access Control Permissiveness Analyzer✱William Eiers, Ganesh Sankaran, Albert Li, Emily O'Mahony, Benjamin Prince, Tevfik Bultan. [doi]
- Shibboleth: Hybrid Patch Correctness Assessment in Automated Program RepairAli-Ghanbari, Andrian Marcus. [doi]
- Fuzzle: Making a Puzzle for FuzzersHaeun Lee, Soomin Kim 0002, Sang Kil Cha. [doi]
- Multi-objective Optimization-based Bug-fixing Template Mining for Automated Program RepairMisoo Kim, YoungKyoung Kim, Kicheol Kim, Eunseok Lee. [doi]
- reformulator: Automated Refactoring of the N+1 Problem in Database-Backed ApplicationsAlexi Turcotte, Mark W. Aldrich, Frank Tip. [doi]
- An Empirical Study on Numerical Bugs in Deep Learning ProgramsGan Wang, Zan Wang, Junjie Chen, Xiang Chen, Ming Yan. [doi]
- Outcome-Preserving Input Reduction for Scientific Data Analysis WorkflowsAnh Duc Vu 0001, Timo Kehrer, Christos Tsigkanos. [doi]
- Automatic Software Timing Attack Evaluation & Mitigation on Clear Hardware AssumptionPrabuddha Chakraborty. [doi]
- Towards Understanding the Faults of JavaScript-Based Deep Learning SystemsLili Quan, Qianyu Guo, Xiaofei Xie, Sen Chen, Xiaohong Li, Yang Liu. [doi]
- Generating Critical Test Scenarios for Autonomous Driving Systems via Influential Behavior PatternsHaoxiang Tian, Guoquan Wu, Jiren Yan, Yan Jiang, Jun Wei 0001, Wei Chen 0018, Shuo Li, Dan Ye. [doi]
- Neuroevolution-Based Generation of Tests and Oracles for GamesPatric Feldmeier, Gordon Fraser 0001. [doi]
- Design-Space Exploration for Decision-Support SoftwareAte Penders, Ana Lucia Varbanescu, Gregor Pavlin, Henk J. Sips. [doi]
- Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?Cedric Richter, Jan Haltermann, Marie-Christine Jakobs, Felix Pauck, Stefan Schott, Heike Wehrheim. [doi]
- MV-HAN: A Hybrid Attentive Networks based Multi-View Learning Model for Large-scale Contents RecommendationGe Fan, Chaoyun Zhang, Kai Wang, Junyang Chen. [doi]
- Has My Release Disobeyed Semantic Versioning? Static Detection Based on Semantic DifferencingLyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen, Lingling Fan, Bihuan Chen 0001, Yang Liu 0003. [doi]
- A fault injection platform for learning AIOps modelsFrank Bagehorn, Jesus Rios, Saurabh Jha, Robert Filepp, Larisa Shwartz, Naoki Abe, Xi Yang. [doi]
- Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural NetworksZhaodi Zhang, Yiting Wu, Si Liu, Jing Liu, Min Zhang. [doi]
- Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase ApproachZhuo Zhang 0007, Yan Lei, Meng Yan, Yue Yu 0001, Jiachi Chen, Shangwen Wang, Xiaoguang Mao. [doi]
- An Empirical Study of Automation in Software Security Patch ManagementNesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, Muhammad Ali Babar. [doi]
- Test-Driven Multi-Task Learning with Functionally Equivalent Code Transformation for Neural Code GenerationXin Wang, Xiao Liu, Pingyi Zhou, Qixia Liu, Jin Liu, Hao Wu, Xiaohui Cui. [doi]
- Consistent Scene Graph Generation by Constraint OptimizationBoqi Chen, Kristóf Marussy, Sebastian Pilarski, Oszkár Semeráth, Dániel Varró. [doi]
- B-AIS: An Automated Process for Black-box Evaluation of Visual Perception in AI-enabled Software against Domain SemanticsHamed Barzamini, Mona Rahimi. [doi]
- A Study of User Privacy in Android Mobile AR AppsXiaoyi Yang, Xueling Zhang. [doi]
- Towards Using Data-Influence Methods to Detect Noisy Samples in Source Code CorporaAnh T. V. Dau, Nghi D. Q. Bui, Thang Nguyen-Duc, Hoang Thanh-Tung. [doi]
- E-MANAFA: Energy Monitoring and ANAlysis tool For AndroidRui Rua, João Saraiva. [doi]
- Learning Contract Invariants Using Reinforcement LearningJunrui Liu, Yanju Chen, Bryan Tan, Isil Dillig, Yu Feng 0001. [doi]
- Unveiling Hidden DNN Defects with Decision-Based Metamorphic TestingYuanyuan Yuan, Qi Pang, Shuai Wang. [doi]
- ICEBAR: Feedback-Driven Iterative Repair of Alloy SpecificationsSimón Gutiérrez Brida, Germán Regis, Guolong Zheng, Hamid Bagheri, ThanhVu Nguyen, Nazareno Aguirre, Marcelo F. Frias. [doi]
- Verifying Game Logic in Unreal Engine 5 Blueprint Visual Scripting System Using Model CheckingKazuki Wayama, Tomoyuki Yokogawa, Sousuke Amasaki, Hirohisa Aman, Kazutami Arimoto. [doi]
- Identification and Mitigation of Toxic Communications Among Open Source Software DevelopersJaydeb Sarker. [doi]
- Dancing, not Wrestling: Moving from Compliance to Concordance for Secure Software DevelopmentDebi Ashenden, Gail Ollis, Iain Reid. [doi]
- Automatic Generation of Visualizations for Machine Learning PipelinesLei Liu, Wei-Peng Chen, Mehdi Bahrami, Mukul Prasad. [doi]
- SelfAPR: Self-supervised Program Repair with Test Execution DiagnosticsHe Ye, Matias Martinez, Xiapu Luo, Tao Zhang 0001, Martin Monperrus. [doi]
- Software Evolution Management with Differential FactsXiuheng Wu. [doi]
- Towards a Live Environment for Code RefactoringSara Fernandes. [doi]
- DeepPerform: An Efficient Approach for Performance Testing of Resource-Constrained Neural NetworksSimin Chen, Mirazul Haque, Cong Liu, Wei Yang 0013. [doi]
- Towards Improving Code Review Effectiveness Through Task AutomationAsif Kamal Turzo. [doi]
- Robust Learning of Deep Predictive Models from Noisy and Imbalanced Software Engineering DatasetsZhong Li, Minxue Pan, Yu Pei 0001, Tian Zhang 0001, Linzhang Wang, Xuandong Li. [doi]
- Horntinuum: Autonomous Testing using Constrained Horn ClausesIlia Zlatkin, Grigory Fedyukovich. [doi]
- TransplantFix: Graph Differencing-based Code Transplantation for Automated Program RepairDeheng Yang, Xiaoguang Mao, Liqian Chen, Xuezheng Xu, Yan Lei, David Lo 0001, Jiayu He. [doi]
- Towards Understanding the Runtime Performance of RustYuchen Zhang, Yunhang Zhang, Georgios Portokalidis, Jun Xu. [doi]
- Detecting Blocking Errors in Go Programs using Localized Abstract InterpretationOskar Haarklou Veileborg, Georgian-Vlad Saioc, Anders Møller. [doi]
- TransRepair: Context-aware Program Repair for Compilation ErrorsXueyang Li, Shangqing Liu, Ruitao Feng, Guozhu Meng, Xiaofei Xie, Kai Chen, Yang Liu. [doi]
- 'Who built this crap?' Developing a Software Engineering Domain Specific Toxicity DetectorJaydeb Sarker. [doi]
- A Hybrid Approach for Inference between Behavioral Exception API Documentation and Implementations, and Its ApplicationsHoan Anh Nguyen, Hung Dang Phan, Syeda Khairunnesa Samantha, Son Nguyen, Aashish Yadavally, Shaohua Wang, Hridesh Rajan, Tien N. Nguyen. [doi]
- How Useful is Code Change Information for Fault Localization in Continuous Integration?An Ran Chen, Tse-Hsun (Peter) Chen, Junjie Chen. [doi]
- Call Me Maybe: Using NLP to Automatically Generate Unit Test Cases Respecting Temporal ConstraintsArianna Blasi, Alessandra Gorla, Michael D. Ernst, Mauro Pezzè. [doi]
- Differentially Testing Database Transactions for Fun and ProfitZiyu Cui, Wensheng Dou, Qianwang Dai, Jiansen Song, Wei Wang 0049, Jun Wei 0001, Dan Ye. [doi]
- FlexType: A Plug-and-Play Framework for Type Inference ModelsSivani Voruganti, Kevin Jesse, Premkumar T. Devanbu. [doi]
- Toward Improving the Robustness of Deep Learning Models via Model TransformationYingyi Zhang, Zan Wang, Jiajun Jiang, Hanmo You, Junjie Chen. [doi]
- Efficient Greybox Fuzzing to Detect Memory ErrorsJinsheng Ba, Gregory J. Duck, Abhik Roychoudhury. [doi]
- CoditT5: Pretraining for Source Code and Natural Language EditingJiyang Zhang, Sheena Panthaplackel, Pengyu Nie 0001, Junyi Jessy Li, Milos Gligoric. [doi]
- SAFA: A Tool for Supporting Safety Analysis in Evolving Software SystemsAlberto D. Rodriguez, Timothy Newman, Katherine R. Dearstyne, Jane Cleland-Huang. [doi]
- Precise (Un)Affected Version Analysis for Web VulnerabilitiesYoukun Shi, Yuan Zhang 0009, Tianhan Luo, Xiangyu Mao, Min Yang. [doi]
- A Role Based Model Template for Specifying Virtual Reality SoftwareSai Anirudh Karre, Vivek Pareek, Raghav Mittal, Raghu Reddy. [doi]
- A Scenario Distribution Model for Effective and Efficient Testing of Autonomous Driving SystemsQunying Song, Per Runeson, Stefan Persson. [doi]
- Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided FuzzingJianzhong Su, Hong-Ning Dai, Lingjun Zhao, Zibin Zheng, Xiapu Luo. [doi]
- PRCBERT: Prompt Learning for Requirement Classification using BERT-based Pretrained Language ModelsXianchang Luo, Yinxing Xue, Zhenchang Xing, Jiamou Sun. [doi]
- V-Achilles: An Interactive Visualization of Transitive Security VulnerabilitiesVipawan Jarukitpipat, Klinton Chhun, Wachirayana Wanprasert, Chaiyong Ragkhitwetsagul, Morakot Choetkiertikul, Thanwadee Sunetnanta, Raula Gaikovina Kula, Bodin Chinthanet, Takashi Ishio, Kenichi Matsumoto. [doi]
- Taming Multi-Output Recommenders for Software EngineeringChristoph Treude. [doi]
- ThirdEye: Attention Maps for Safe Autonomous Driving SystemsAndrea Stocco 0001, Paulo J. Nunes, Marcelo d'Amorim, Paolo Tonella. [doi]
- Building recommenders for modelling languages with DroidLissette Almonte, Esther Guerra, Iván Cantador, Juan de Lara. [doi]
- How students choose names: A replication studyQing Mi, Xiaoke Wang, Bingnuo Chen. [doi]
- InvCon: A Dynamic Invariant Detector for Ethereum Smart ContractsYe Liu, Yi Li. [doi]
- Right to Know, Right to Refuse: Towards UI Perception-Based Automated Fine-Grained Permission Controls for Android AppsVikas Kumar Malviya, Chee Wei Leow, Ashok Kasthuri, Yan Naing Tun, Lwin Khin Shar, Lingxiao Jiang. [doi]
- Towards Improving the Adoption and Usage of National Digital Identity SystemsMalyun Muhudin Hilowle, William Yeoh, Marthie Grobler, Graeme Pye, Frank Jiang. [doi]
- Constructing a System Knowledge Graph of User Tasks and Failures from Bug Reports to Support Soap Opera TestingYanqi Su, Zheming Han, Zhenchang Xing, Xin Xia 0001, Xiwei Xu, Liming Zhu 0001, Qinghua Lu 0001. [doi]
- Maktub: Lightweight Robot System Test Creation and AutomationAmr Moussa, John-Paul Ore. [doi]
- Transfer learning of cars behaviors from reality to simulation applicationsCiprian Paduraru, Miruna Gabriela Paduraru, Andrei Blahovici. [doi]
- A transformer-based IDE plugin for vulnerability detectionCláudia Mamede, Eduard Pinconschi, Rui Abreu 0001. [doi]
- TreeCen: Building Tree Graph for Scalable Semantic Code Clone DetectionYutao Hu, Deqing Zou, Junru Peng, Yueming Wu, Junjie Shan, Hai Jin 0001. [doi]
- Principled Composition of Function Variants for Dynamic Software Diversity and Program ProtectionGiacomo Priamo, Daniele Cono D'Elia, Leonardo Querzoni. [doi]
- Next Syntactic-Unit Code Completion and ApplicationsAnh Tuan Nguyen 0001, Aashish Yadavally, Tien N. Nguyen. [doi]
- ASTOR: An Approach to Identify Security Code ReviewsRajshakhar Paul. [doi]
- VITAS : Guided Model-based VUI Testing of VPA AppsSuwan Li, Lei Bu, Guangdong Bai, Zhixiu Guo, Kai Chen, Hanlin Wei. [doi]
- Repairing Failure-inducing Inputs with Input ReflectionYan Xiao, Yun Lin 00001, Ivan Beschastnikh, Changsheng Sun, David S. Rosenblum, Jin Song Dong. [doi]
- Property-Based Automated Repair of DeFi ProtocolsPalina Tolmach, Yi Li 0008, Shang-Wei Lin 0001. [doi]
- Coverage-based Greybox Fuzzing with Pointer Monitoring for C ProgramsHaibo Chen 0005, Jinfu Chen 0001. [doi]
- Learning to Construct Better Mutation FaultsZhao Tian, Junjie Chen, Qihao Zhu, Junjie Yang, Lingming Zhang. [doi]
- Towards Agent-Based Testing of 3D Games using Reinforcement LearningRaihana Ferdous, Fitsum Meshesha Kifetew, Davide Prandi, Angelo Susi. [doi]
- MCDA Framework for Edge-Aware Multi-Cloud Hybrid Architecture RecommendationManish Ahuja, Sukhavasi Narendranath, Swapnajeet Gon Choudhury, Kaushik Amar Das, Kapil Singi, Kuntal Dey, Vikrant Kaulgud. [doi]
- Insight: Exploring Cross-Ecosystem Vulnerability ImpactsMeiqiu Xu, Ying Wang, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu 0001. [doi]
- SmOOD: Smoothness-based Out-of-Distribution Detection Approach for Surrogate Neural Networks in Aircraft DesignHoussem Ben Braiek, Ali Tfaily, Foutse Khomh, Thomas Reid, Ciro Guida. [doi]
- Empirical Study of System Resources Abused by IoT AttackersZijing Yin, Yiwen Xu, Chijin Zhou, Yu Jiang 0001. [doi]
- Prototyping Deep Learning Applications with Non-Experts: An Assistant PropositionGustavo Rodrigues dos Reis, Adrian Mos, Mario Cortes Cornax, Cyril Labbé. [doi]
- A Framework for Testing Chemical Reaction NetworksMichael C. Gerten. [doi]
- Finding and Understanding Incompleteness Bugs in SMT SolversMauro Bringolf, Dominik Winterer, Zhendong Su 0001. [doi]
- Global Decision Making Over Deep Variability in Feedback-Driven Software DevelopmentJörg Kienzle, Benoît Combemale, Gunter Mussbacher, Omar Alam, Francis Bordeleau, Lola Burgueño, Gregor Engels, Jessie Galasso, Jean-Marc Jézéquel, Bettina Kemme, Sébastien Mosser 0001, Houari A. Sahraoui, Maximilian Schiedermeier, Eugene Syriani. [doi]
- Towards Effective Static Analysis Approaches for Security Vulnerabilities in Smart ContractsAsem Ghaleb. [doi]
- So Many Fuzzers, So Little Time✱: Experience from Evaluating Fuzzers on the Contiki-NG Network (Hay)StackClement Poncelet, Konstantinos Sagonas, Nicolas Tsiftes. [doi]
- A model for automatic generating reusable code from multiple GUIsCícero A. G. Araújo. [doi]
- ElecDaug: Electromagnetic Data Augmentation for Model Repair based on Metamorphic RelationJiawei He, Zhida Bao, Quanjun Zhang, Weisong Sun, Jiawei Liu, Chunrong Fang, Yun Lin 0005. [doi]
- Cornucopia : A Framework for Feedback Guided Generation of BinariesVidush Singhal, Akul Abhilash Pillai, Charitha Saumya, Milind Kulkarni 0001, Aravind Machiry. [doi]
- Which Exception Shall We Throw?Hao Zhong. [doi]
- ADEPT: A Testing Platform for Simulated Autonomous DrivingSen Wang, Zhuheng Sheng, Jingwei Xu 0001, Taolue Chen, Junjun Zhu, Shuhui Zhang, Yuan Yao 0001, Xiaoxing Ma. [doi]
- QATest: A Uniform Fuzzing Framework for Question Answering SystemsZixi Liu, Yang Feng, Yining Yin, Jingyu Sun, Zhenyu Chen 0001, Baowen Xu. [doi]
- Identification and Mitigation of Gender Biases to Promote Diversity and Inclusion among Open Source CommunitiesSayma Sultana. [doi]
- Scaling Arbitrary Android App AnalysesFelix Pauck. [doi]
- Automatically Tagging the "AAA" Pattern in Unit Test Cases Using Machine Learning ModelsChenhao Wei, Lu Xiao 0001, Tingting Yu, Xinyu Chen, Xiao Wang, Sunny Wong, Abigail Clune. [doi]
- Identifying Solidity Smart Contract API Documentation ErrorsChenguang Zhu 0002, Ye Liu, Xiuheng Wu, Yi Li. [doi]
- Generalizability of Code Clone Detection on CodeBERTTim Sonnekalb, Bernd Gruner, Clemens-Alexander Brust, Patrick Mäder. [doi]
- Augur: Dynamic Taint Analysis for Asynchronous JavaScriptMark W. Aldrich, Alexi Turcotte, Matthew Blanco, Frank Tip. [doi]
- Trimmer: Context-Specific Code ReductionAatira Anum Ahmad, Mubashir Anwar, Hashim Sharif, Ashish Gehani, Fareed Zaffar. [doi]
- StandUp4NPR: Standardizing SetUp for Empirically Comparing Neural Program Repair SystemsWenkang Zhong, Hongliang Ge, Hongfei Ai, Chuanyi Li, Kui Liu, JiDong Ge, Bin Luo 0003. [doi]
- Towards Understanding Third-party Library Dependency in C/C++ EcosystemWei Tang, Zhengzi Xu, Chengwei Liu, Jiahui Wu, Shouguo Yang, Yi Li, Ping Luo, Yang Liu. [doi]
- Auto Off-Target: Enabling Thorough and Scalable Testing for Complex Software SystemsTomasz Kuchta, Bartosz Zator. [doi]
- Static Type Recommendation for PythonKe Sun, Yifan Zhao, Dan Hao 0001, Lu Zhang. [doi]
- Boosting Spectrum-Based Fault Localization for Spreadsheets with Product Metrics in a Learning ApproachAdil Mukhtar, Birgit Hofer, Dietmar Jannach, Franz Wotawa, Konstantin Schekotihin. [doi]
- Boosting the Revealing of Detected Violations in Deep Learning Testing: A Diversity-Guided MethodXiaoyuan Xie, Pengbo Yin, Songqiang Chen. [doi]
- A Unified Specification Mining Framework for Smart ContractsYe Liu. [doi]
- Data Augmentation for Improving Emotion Recognition in Software Engineering CommunicationMia Mohammad Imran, Yashasvi Jain, Preetha Chatterjee, Kostadin Damevski. [doi]
- PredART: Towards Automatic Oracle Prediction of Object Placements in Augmented Reality TestingTahmid Rafi, Xueling Zhang, Xiaoyin Wang. [doi]
- Compiler Testing using Template Java ProgramsZhiqiang Zang, Nathan Wiatrek, Milos Gligoric, August Shi. [doi]
- RESTCluster: Automated Crash Clustering for RESTful APIYi Liu. [doi]
- FuzzerAid: Grouping Fuzzed Crashes Based On Fault SignaturesAshwin Kallingal Joshy, Wei Le. [doi]
- Identifying Sexism and Misogyny in Pull Request CommentsSayma Sultana. [doi]
- Finding Property Violations through Network Falsification: Challenges, Adaptations and Lessons Learned from OpenPilotMeriel von Stein, Sebastian G. Elbaum. [doi]
- Intelligent Code Review Assignment for Large Scale Open Source Software StacksIshan Aryendu, Ying Wang, Farah Elkourdi, Eman Abdullah AlOmar. [doi]
- Leveraging Practitioners' Feedback to Improve a Security LinterSofia Reis, Rui Abreu 0001, Marcelo d'Amorim, Daniel Fortunato. [doi]
- Automated Identification of Security-Relevant Configuration Settings Using NLPPatrick Stöckle, Theresa Wasserer, Bernd Grobauer, Alexander Pretschner. [doi]
- LISSA: Lazy Initialization with Specialized Solver AidJuan Manuel Copia, Pablo Ponzio, Nazareno Aguirre, Alessandra Gorla, Marcelo F. Frias. [doi]
- Towards the Integration of Human Factors in Collaborative Decision Making for Secure Architecture DesignJason Jaskolka, Brahim Hamid. [doi]
- Application of Natural Language Processing Towards Autonomous Software TestingKhang Pham, Vu Nguyen, Tien Nguyen. [doi]
- AUSERA: Automated Security Vulnerability Detection for Android AppsSen Chen, Yuxin Zhang, Lingling Fan, Jiaming Li, Yang Liu. [doi]
- Few-shot training LLMs for project-specific code-summarizationToufique Ahmed, Premkumar T. Devanbu. [doi]
- Is this Change the Answer to that Problem?: Correlating Descriptions of Bug and Code Changes for Evaluating Patch CorrectnessHaoye Tian, Xunzhu Tang, Andrew Habib, Shangwen Wang, Kui Liu 0001, Xin Xia, Jacques Klein, Tegawendé F. Bissyandé. [doi]
- Explaining the Behaviour of Game Agents Using Differential ComparisonEzequiel Castellano, Xiao-Yi Zhang, Paolo Arcaini, Toru Takisaka, Fuyuki Ishikawa, Nozomu Ikehata, Kosuke Iwakura. [doi]
- Keeping Secrets: Multi-objective Genetic Improvement for Detecting and Reducing Information LeakageIbrahim Mesecan, Daniel Blackwell, David Clark 0001, Myra B. Cohen, Justyna Petke. [doi]
- Checking LTL Satisfiability via End-to-end LearningWeilin Luo, Hai Wan, Delong Zhang, Jianfeng Du, Hengdi Su. [doi]
- LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous VehiclesYang Sun 0008, Christopher M. Poskitt, Jun Sun 0001, Yuqi Chen 0001, Zijiang Yang. [doi]
- A real-world case study for automated ticket team assignment using natural language processing and explainable modelsLucas Marcondes Pavelski, Rodrigo de Souza Braga. [doi]
- Jasmine: A Static Analysis Framework for Spring Core TechnologiesMiao Chen, Tengfei Tu, Hua Zhang, Qiaoyan Wen, Weihang Wang 0001. [doi]
- Sorry, I don't Understand: Improving Voice User Interface TestingEmanuela Guglielmi, Giovanni Rosa, Simone Scalabrino, Gabriele Bavota, Rocco Oliveto. [doi]
- Reflecting on Recurring Failures in IoT DevelopmentDharun Anandayuvaraj, James C. Davis 0001. [doi]
- CrystalBLEU: Precisely and Efficiently Measuring the Similarity of CodeAryaz Eghbali, Michael Pradel. [doi]
- Groundhog: An Automated Accessibility Crawler for Mobile AppsNavid Salehnamadi, Forough Mehralian, Sam Malek. [doi]
- Scalable Sampling of Highly-Configurable Systems: Generating Random Instances of the Linux KernelDavid Fernández-Amorós, Ruben Heradio, Christoph Mayr-Dorn, Alexander Egyed. [doi]
- Code Understanding Linter to Detect Variable MisuseYeonhee Ryou, Sangwoo Joh, Joonmo Yang, Sujin Kim, Youil Kim. [doi]
- A Drift Handling Approach for Self-Adaptive ML Software in Scalable Industrial ProcessesFiras Bayram, Bestoun S. Ahmed, Erik Hallin, Anton Engman. [doi]
- WebMonitor: Verification of Web User InterfacesEnnio Visconti, Christos Tsigkanos, Laura Nenzi. [doi]
- Detecting Build Conflicts in Software Merge for Java Programs via Static AnalysisSheikh Shadab Towqir, Bowen Shen, Muhammad Ali Gulzar, Na Meng 0001. [doi]
- SymFusion: Hybrid Instrumentation for Concolic ExecutionEmilio Coppa, Heng Yin, Camil Demetrescu. [doi]
- CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices ArchitectureVikram Nitin, Shubhi Asthana, Baishakhi Ray, Rahul Krishna. [doi]
- Automatic Code Documentation Generation Using GPT-3Junaed Younus Khan, Gias Uddin 0001. [doi]
- Towards Robust Models of Code via Energy-Based Learning on Auxiliary DatasetsNghi D. Q. Bui, Yijun Yu. [doi]
- SML4ADS: An Open DSML for Autonomous Driving Scenario Representation and GenerationBo Li, Dehui Du, Sicong Chen, Minjun Wei, Chenghang Zheng, Xinyuan Zhang. [doi]
- Unsupervised Summarization of Privacy Concerns in Mobile Application ReviewsFahimeh Ebrahimi, Anas Mahmoud. [doi]
- Not All Dependencies are Equal: An Empirical Study on Production Dependencies in NPMJasmine Latendresse, Suhaib Mujahid, Diego Elias Costa, Emad Shihab. [doi]
- Assessment of Automated (Intelligent) ToolchainsAurora Papotti. [doi]
- Simulating cyber security management: A gamified approach to executive decision makingAdam Tonkin, William Kosasih, Marthie Grobler, Mehwish Nasim. [doi]
- Understanding and Predicting Docker Build Duration: An Empirical Study of Containerized Workflow of OSS ProjectsYiwen Wu, Yang Zhang, Kele Xu, Tao Wang, Huaimin Wang. [doi]
- DyTRec: A Dynamic Testing Recommendation tool for Unity-based Virtual Reality SoftwareXue-qin, Foyzul Hassan. [doi]
- Towards Gradual Multiparty Session TypingSung-Shik Jongmans. [doi]
- MalWhiteout: Reducing Label Errors in Android Malware DetectionLiu Wang 0002, Haoyu Wang 0001, Xiapu Luo, Yulei Sui. [doi]
- Efficient Synthesis of Method Call Sequences for Test Generation and Bounded VerificationYunfan Zhang, Ruidong Zhu, Yingfei Xiong, Tao Xie. [doi]
- Rank Learning-Based Code Readability Assessment with Siamese Neural NetworksQing Mi. [doi]
- Natural Test Generation for Precise Testing of Question Answering SoftwareQingchao Shen, Junjie Chen 0003, Jie M. Zhang, Haoyu Wang, Shuang Liu 0007, Menghan Tian. [doi]
- Compressing Pre-trained Models of Code into 3 MBJieke Shi, Zhou Yang 0003, Bowen Xu, Hong Jin Kang, David Lo 0001. [doi]
- smartPip: A Smart Approach to Resolving Python Dependency Conflict IssuesChao Wang, Rongxin Wu, Haohao Song, Jiwu Shu, Guoqing Li. [doi]
- Evolving Ranking-Based Failure Proximities for Better Clustering in Fault IsolationYi Song, Xiaoyuan Xie, Xihao Zhang, Quanming Liu, Ruizhi Gao. [doi]
- Automatically Detecting Visual Bugs in HTML5 Canvas GamesFinlay Macklon, Mohammad Reza Taesiri, Markos Viggiato, Stefan Antoszko, Natalia Romanova, Dale Paas, Cor-Paul Bezemer. [doi]
- Automatic Comment Generation via Multi-Pass DeliberationFangwen Mu, Xiao Chen, Lin Shi 0006, Song Wang, Qing Wang. [doi]