Abstract is missing.
- Online Data Drift Detection for Anomaly Detection Services based on Deep Learning towards Multivariate Time SeriesGou Tan, Pengfei Chen, Min Li. 1-11 [doi]
- Log-based Anomaly Detection of Enterprise Software: An Empirical StudyNadun Wijesinghe, Hadi Hemmati. 12-23 [doi]
- Anomaly Detectors for Self-Aware Edge and IoT DevicesTommaso Zoppi, Giovanni Merlino, Andrea Ceccarelli, Antonio Puliafito, Andrea Bondavalli. 24-35 [doi]
- LGLog: Semi-supervised Graph Representation Learning for Anomaly Detection based on System LogsJialong Liu, Yanni Tang, Jiamou Liu, Kaiqi Zhao 0001, Wu Chen. 36-47 [doi]
- LogContrast: A Weakly Supervised Anomaly Detection Method Leveraging Contrastive LearningTing Zhang, Xin Huang, Wen Zhao, Guozhao Mo, Shaohuang Bian. 48-59 [doi]
- A Framework based on Deep Neural Network for Ranking-oriented Software Defect PredictionJiapeng Dai, Xiaoxing Yang, Bingding Huang, Xiaofen Lu. 60-71 [doi]
- FINDGATE: Fine-grained Defect Prediction Based on a Heterogeneous Discrete Code Graph-guided Attention TransformerJiaxi Xu, Ping Chen, Banghu Yin, Zhichang Huang, Qiaochun Qiu. 72-82 [doi]
- SyntaxLineDP: a Line-level Software Defect Prediction Model based on Extended Syntax InformationJianzhong Zhu, Yuan Huang 0002, Xiangping Chen, Ruomei Wang, Zibin Zheng. 83-94 [doi]
- JITBoost: Boosting Just-In-Time Defect Prediction using Boolean Combination of ClassifiersMohammed A. Shehab, Abdelwahab Hamou-Lhadj, Venkata Sai Gunda. 95-104 [doi]
- A study on the impact of pre-trained model on Just-In-Time defect predictionYuxiang Guo, Xiaopeng Gao, Zhenyu Zhang 0004, Wing Kwong Chan, Bo Jiang 0001. 105-116 [doi]
- Toward Understanding Bugs in Swift Programming LanguageQianyue Wu, Sijie Yu, Ziyuan Wang, Nannan Wang, Yaping Feng. 117-127 [doi]
- Enhancing Fault Localization by incorporating Statement Frequency and Test Case ContributionArpita Dutta. 128-137 [doi]
- Understanding Bugs in Rust CompilersXinmeng Xia, Yang Feng, Qingkai Shi. 138-149 [doi]
- WASAIUP: A Demand-driven Concolic Fuzzer for EOSIO Smart ContractsMeng Wang, Ziheng Wang, Bin Yu, Kai Zhang. 150-161 [doi]
- Blockchain Network Platform for IoT Data Integrity and ScalabilityChung Yup Kim, Bryan C. K. Ng, Jyoti Sahni, Normalia Samian, Winston K. G. Seah. 162-171 [doi]
- Performance Optimization for Information Sharing Process of BlockIoV Based on Multi-Objective Particle SwarmXin Gu, Xingya Wang, Yu Ma, Zhenyu Chen 0001, Song Huang. 172-183 [doi]
- Integrating Extractive and Abstractive Models for Code Comment GenerationWeisong Sun, Yuling Hu, Yingfei Xu, Yuchen Chen, Chunrong Fang. 184-195 [doi]
- On ChatGPT: Perspectives from Software Engineering StudentsKhadija Hanifi, Orçun Çetin, Cemal Yilmaz. 196-205 [doi]
- LLM for Test Script Generation and Migration: Challenges, Capabilities, and OpportunitiesShengcheng Yu, Chunrong Fang, Yuchen Ling, Chentian Wu, Zhenyu Chen 0001. 206-217 [doi]
- Enhancing Code Completion with Implicit FeedbackHaonan Jin, Yu Zhou 0010, Yasir Hussain. 218-227 [doi]
- Git Merge Conflict Resolution Leveraging Strategy Classification and LLMChaochao Shen, Wenhua Yang 0001, Minxue Pan, Yu Zhou 0010. 228-239 [doi]
- The Causal Reasoning Ability of Open Large Language Model: A Comprehensive and Exemplary Functional TestingShunhang Li, Gang Zhou, Zhibo Li, Ji-cang Lu, Ningbo Huang. 240-249 [doi]
- Quality Evaluation of Summarization Models for Patent DocumentsJunhua Ding, Haihua Chen 0002, Sai Kolapudi, Lavanya Pobbathi, Huyen Nguyen. 250-259 [doi]
- Using Data Abstraction for Clustering in the Context of Test Case GenerationNour Chetouane, Franz Wotawa. 260-271 [doi]
- Test Case Generation for Autonomous Driving Based on Improved Genetic AlgorithmLele Sun, Song Huang, Changyou Zheng, Tongtong Bai, Zhe Hu. 272-278 [doi]
- Investigating Execution Trace Embedding for Test Case PrioritizationEmad Jabbar, Hadi Hemmati, Robert Feldt. 279-290 [doi]
- Efficient fuzz testing of web servicesMatús Ferech, Pavel Tvrdík. 291-300 [doi]
- StructureTester: Automatic Machine Translation Testing Based on Variation Feature VectorWei Luo, Yemao Luo, Yao Li, Tao Zhang 0001. 301-312 [doi]
- BDGSE: A Symbolic Execution Technique for High MC/DCHuangli Cai, Zhiyi Zhang 0004, Yifan Jian, Dan Li, Zhiqiu Huang. 313-324 [doi]
- DyFuzz: Skeleton-based Fuzzing for Python LibrariesXinmeng Xia, Yang Feng. 325-336 [doi]
- An Industrial Study on the Challenges and Effects of Diversity-Based Testing in Continuous IntegrationAzeem Ahmad, Francisco Gomes de Oliveira Neto, Eduard Paul Enoiu, Kristian Sandahl, Ola Leifler. 337-347 [doi]
- Mobile Test Script Generation from Natural Language DescriptionsChun Li, Yifan Xiong, Zhong Li, Wenhua Yang 0001, Minxue Pan. 348-359 [doi]
- Scope-based Compiler Differential TestingRong Qu, Jiangang Huang, Long Zhang, Tianlu Qiao, Jian Zhang 0001. 360-369 [doi]
- Aster: Encoding Data Augmentation Relations into Seed Test Suites for Robustness Assessment and Fuzzing of Data-Augmented Deep Learning ModelsHaipeng Wang 0005, Zhengyuan Wei, Qilin Zhou, Bo Jiang, Wing Kwong Chan. 370-381 [doi]
- A Case Study on the "Jungle" Search for Industry-Relevant Regression TestingMaria Laura Brzezinski Meyer, Hélène Waeselynck, Fernand Cuesta. 382-393 [doi]
- Leveraging Conditional Statement to Generate Acceptance Tests Automatically via Traceable Sequence GenerationGuoliang Zhao, Gexiang Fang, Dongdong Du, Qing Gao, Minghui Zhang. 394-405 [doi]
- AndrAS: Automated Attack Surface Extraction for Android ApplicationsAnh Duy Tran, Koen Yskout, Wouter Joosen. 406-417 [doi]
- Towards the Adoption and Adaptation of the AndroidX Library: An Empirical StudyJiacheng Li, Kerui Huang, Sinan Wang, Yepang Liu 0001. 418-427 [doi]
- An Empirical Study to Identify Software Aging Indicators for Android OSYulei Chen, Yuge Nie, Beibei Yin, Zheng Zheng, Huayao Wu. 428-439 [doi]
- Human-Machine Collaborative Testing for Android ApplicationsYuying Li 0005, Yang Feng 0003, Rui Hao, Zhenyu Chen 0001. 440-451 [doi]
- Enhancing Code Prediction Transformer with AST Structural MatrixYongyue Yang, Liting Huang, Chunyang Ye, Fenghang Li, Hui Zhou. 452-463 [doi]
- Abstract Syntax Tree for Method Name Prediction: How Far Are We?Hanwei Qian, Wei Liu, Ziqi Ding, Weisong Sun, Chunrong Fang. 464-475 [doi]
- Commit Classification via Diff-Code GCN based on System Dependency GraphZaixing Zhang, Liang Liu, Jianming Chang, Lulu Wang, Li Liao. 476-487 [doi]
- Software Code Quality Measurement: Implications from Metric DistributionsSiyuan Jin, Ziyuan Li, Bichao Chen, Bing Zhu, Yong Xia. 488-496 [doi]
- Research, Implementation and Analysis of Source Code Metrics in Rust-Code-AnalysisLuca Ardito, Marco Ballario, Michele Valsesia. 497-506 [doi]
- Cancelable Iris Biometrics Based on Transformation NetworkDongdong Zhao 0001, Hucheng Liao, Songsong Liao, Huanhuan Li 0002, Jianwen Xiang. 507-516 [doi]
- RUSPATCH: Towards Timely and Effectively Patching Rust ApplicationsYufei Wu 0011, Baojian Hua. 517-528 [doi]
- Wireless Threats Against V2X CommunicationAxel Boström, Franz Wotawa. 529-540 [doi]
- CGSA-RNN: Abnormal Network Traffic Detection Model Based on CycleGAN and Self-Attention MechanismSaihua Cai, Wenjun Zhao, Han Tang, Jinfu Chen 0001, Wuhao Guo. 541-549 [doi]
- Automatic Generation of Component Fault Trees from AADL Models for Design Failure Modes and Effects AnalysisXiongpeng Hu, Jing Liu, Hui Dou, Hongtao Chen, Yuhong Zhang. 550-561 [doi]
- intCV: Automatically Inferring Correlated Variables in Interrrupt-Driven ProgramChao Li, Zhixuan Wang, Rui Chen, Mengfei Yang. 562-568 [doi]
- Towards an Effective and Interpretable Refinement Approach for DNN VerificationJiaying Li, Guangdong Bai, Long H. Pham, Jun Sun 0001. 569-580 [doi]
- BTM: Black-Box Testing for DNN Based on Meta-LearningZhuangyu Zhang, Zhiyi Zhang 0004, Ziyuan Wang, Fang Chen, Zhiqiu Huang. 581-592 [doi]
- Mucha: Multi-channel based Code Change Representation Learning for Commit Message GenerationChuangwei Wang, Yifan Wu, Xiaofang Zhang. 593-603 [doi]
- DeepIA: An Interpretability Analysis based Test Data Generation Method for DNNQifan He, Ruilin Xie, Li Li, Zhanqi Cui. 604-615 [doi]
- DeepDiffer: Find Deep Learning Compiler Bugs via Priority-guided Differential FuzzingKuiliang Lin, Xiangpu Song, Yingpei Zeng, Shanqing Guo. 616-627 [doi]
- MicroKGCL: A Knowledge Graph for Root Cause Localization of Feedback Issues in MicroservicesXin-Wei Yao 0001, Qi-Chao Lu, Qiang Li, Lin-Lang Liu, Zhi-chao Zhu. 628-637 [doi]
- An Approach to Build and Verify Stable Neural Network Controllers for Cyber Physical Systems with Non-Linear DynamicsXudong He. 638-649 [doi]
- SPIRT: A Fault-Tolerant and Reliable Peer-to-Peer Serverless ML Training ArchitectureAmine Barrak, Mayssa Jaziri, Ranim Trabelsi, Fehmi Jaafar, Fábio Petrillo. 650-661 [doi]
- VMCanary: Effective Memory Protection for WebAssembly via Virtual Machine-assisted ApproachZiyao Zhang, Wenlong Zheng, Baojian Hua, Qiliang Fan, Zhizhong Pan. 662-671 [doi]
- IMCSCL: Image-Based Malware Classification using Self-Supervised and Contrastive LearningYetao Jia, Yangyang Meng, Honglin Zhuang. 672-683 [doi]
- MAD: One-Shot Machine Activity Detector for Physics-Based Cyber SecurityArthur Grisel-Davy, Sebastian Fischmeister. 684-695 [doi]
- Improving Software Modularization Quality Through the Use of Multi-Pattern Modularity Clustering AlgorithmTsung-Han Yang, Chin-Yu Huang. 696-706 [doi]
- Just-In-Time Method Name Updating With Heuristics and Neural ModelZhenting Guo, Meng Yan 0001, Hongyan Li, Zhezhe Chen, Weifeng Sun. 707-718 [doi]
- On Error Representativeness of Function Call Interfaces for C/C++ ProgramWei Zhang, Hao Xu, Zhangjun Lu, Jianhui Jiang. 719-728 [doi]
- Adaptive Tracing and Fault Injection based Fault Diagnosis for Open Source Server SoftwareWei Zhang, Yuxi Hu, Bolong Tan, Xiaohai Shi, Jianhui Jiang. 729-740 [doi]
- Knowledge Graph Completing with Dual Confrontation Learning Model based on Variational Information Bottleneck MethodSong Han, Zhengyi Guan, Sihui Li, Jin Wang, Xiaobing Zhou. 741-750 [doi]
- Evaluating the Availability of Service Function Chain under Different Elasticity Strategies Based on Colored Petri NetHui Dong, Zhenyu Liu, Hua Li, Xianrong Wang. 751-760 [doi]
- Modeling of GPGPU architectures for performance analysis of CUDA programsFrancesco Terrosi, Francesco Mariotti, Paolo Lollini, Andrea Bondavalli. 761-771 [doi]
- SRRA: A Novel Skewness-Based Algorithm for Cloudlet SchedulingSanjaya Kumar Panda, Shidhanta Sen. 772-781 [doi]