Abstract is missing.
- An Empirical Study of Smart Contract DecompilersXia Liu, Baojian Hua, Yang Wang, Zhizhong Pan. 1-12 [doi]
- Understanding the Archived Projects on GitHubXiaoya Xia, Shengyu Zhao, Xinran Zhang, Zehua Lou, Wei Wang, Fenglin Bi. 13-24 [doi]
- Towards Understanding the Impacts of Textual Dissimilarity on Duplicate Bug Report DetectionSigma Jahan, Mohammad Masudur Rahman 0001. 25-36 [doi]
- A Hierarchical Topical Modeling Approach for Recommending Repair of Quality BugsRrezarta Krasniqi, Hyunsook Do. 37-48 [doi]
- Solder: Retrofitting Legacy Code with Cross-Language PatchesRyan Williams, Anthony Gavazzi, Engin Kirda. 49-60 [doi]
- Pseudocode to Code Based on Adaptive Global and Local InformationQianqian Yu, Zhangjin Huang, Naijie Gu. 61-72 [doi]
- Identifying Emergent Leadership in Open Source Software Projects Based on Communication StylesYuekai Huang, Ye Yang, Junjie Wang 0001, Wei Zheng, Qing Wang 0001. 73-84 [doi]
- NeuralCCD: Integrating Multiple Features for Neural Coincidental Correctness DetectionZhou Tao, Yan Lei, Huan Xie, Jian Hu. 85-96 [doi]
- Studying and Complementing the Use of Identifiers in LogsJianchen Zhao, Yiming Tang, Sneha Sunil, Weiyi Shang. 97-107 [doi]
- Automatic Identification of Crash-inducing Smart ContractsChao Ni, Cong Tian, Kaiwen Yang, David Lo 0001, Jiachi Chen, Xiaohu Yang. 108-119 [doi]
- MulCS: Towards a Unified Deep Representation for Multilingual Code SearchYingwei Ma, Yue Yu 0001, Shanshan Li 0001, Zhouyang Jia, Jun Ma, Rulin Xu, Wei Dong 0006, Xiangke Liao. 120-131 [doi]
- Efficient Pattern-based Static Analysis Approach via Regular-Expression RulesXiaowen Zhang, Ying Zhou, Shin Hwei Tan. 132-143 [doi]
- Intelligent Constraint Classification for Symbolic ExecutionJunye Wen, Tarek Mahmud, Meiru Che, Yan Yan, Guowei Yang 0001. 144-154 [doi]
- Cross-Language Call Graph Construction Supporting Different Host LanguagesMingzhe Hu, Qi Zhao, Yu Zhang, Yan Xiong. 155-166 [doi]
- Topic Recommendation for GitHub Repositories: How Far Can Extreme Multi-Label Learning Go?Ratnadira Widyasari, Zhipeng Zhao, Thanh Le-Cong, Hong Jin Kang, David Lo 0001. 167-178 [doi]
- An Empirical Comparison of Model-Agnostic Techniques for Defect Prediction ModelsGichan Lee, Scott Uk-Jin Lee. 179-189 [doi]
- Security Code Recommendations for Smart ContractXiaocong Zhou, Yingye Chen, Hanyang Guo, Xiangping Chen, Yuan Huang. 190-200 [doi]
- On the Effect of Transitivity and Granularity on Vulnerability Propagation in the Maven EcosystemAmir M. Mir, Mehdi Keshani, Sebastian Proksch. 201-211 [doi]
- ClawSAT: Towards Both Robust and Accurate Code ModelsJinghan Jia, Shashank Srikant, Tamara Mitrovska, Chuang Gan, Shiyu Chang, Sijia Liu 0001, Una-May O'Reilly. 212-223 [doi]
- Efficient Generation of Floating-Point Inputs for Compiler-Induced VariabilityHengbiao Yu, Xin Yi, Banghu Yin, Fa Li, Zhenbang Chen, Chun Huang. 224-235 [doi]
- In-Situ Concolic Testing of JavaScriptZhe Li, Fei Xie. 236-247 [doi]
- Learning Program Representations with a Tree-Structured TransformerWenhan Wang, Kechi Zhang, Ge Li 0001, Shangqing Liu, Anran Li, Zhi Jin, Yang Liu 0003. 248-259 [doi]
- Extending Source Code Pre-Trained Language Models to Summarise Decompiled BinarieAli Al-Kaswan, Toufique Ahmed, Maliheh Izadi, Anand Ashok Sawant, Premkumar T. Devanbu, Arie van Deursen. 260-271 [doi]
- Multi-Modal API RecommendationIvana Clairine Irsan, Ting Zhang, Ferdian Thung, Kisub Kim, David Lo 0001. 272-283 [doi]
- Analysis and Propagation of Feature Revisions in Preprocessor-based Software Product LinesGabriela Karoline Michelon, Wesley K. G. Assunção, Paul Grünbacher, Alexander Egyed. 284-295 [doi]
- D-ACT: Towards Diff-Aware Code Transformation for Code Review Under a Time-Wise EvaluationChanathip Pornprasit, Chakkrit Tantithamthavorn, Patanamon Thongtanunam, Chunyang Chen. 296-307 [doi]
- UDA-DP: Unsupervised Domain Adaptation for Software Defect PredictionXiaosong Huang, Yifan Wu, Hongyi Liu, Ying Li 0012, Hao Yu, Dadi Guo, Zhonghai Wu. 308-318 [doi]
- Slice-Based Code Change Representation LearningFengyi Zhang, Bihuan Chen 0001, Yufei Zhao, Xin Peng 0001. 319-330 [doi]
- Improving Fine-tuning Pre-trained Models on Small Source Code Datasets via Variational Information BottleneckJiaxing Liu, Chaofeng Sha, Xin Peng 0001. 331-342 [doi]
- Documentation-Guided API Sequence Search without Worrying about the Text-API Semantic GapHongwei Wei, Xiaohong Su, Weining Zheng, Wenxin Tao. 343-354 [doi]
- A Comprehensive Study of WebAssembly Runtime BugsYue Wang, Zhide Zhou, Zhilei Ren, Dong Liu, He Jiang 0001. 355-366 [doi]
- Automated Image Reduction for Explaining Black-box ClassifiersMingyue Jiang, Chengjian Tang, Xiao-Yi Zhang, Yangyang Zhao, Zuohua Ding. 367-378 [doi]
- MixCode: Enhancing Code Classification by Mixup-Based Data AugmentationZeming Dong, Qiang Hu, Yuejun Guo 0001, Maxime Cordy, Mike Papadakis, Zhenya Zhang, Yves Le Traon, Jianjun Zhao 0001. 379-390 [doi]
- Enhancing Comprehension and Navigation in Jupyter Notebooks with Static AnalysisAshwin Prasad Shivarpatna Venkatesh, Jiawei Wang, Li Li 0029, Eric Bodden. 391-401 [doi]
- CSSAM: Code Search via Attention Matching of Code Semantics and StructuresBo Cai, Yaoxiang Yu, Yi Hu. 402-413 [doi]
- Towards a Large-Scale Empirical Study of Python Static Type AnnotationsXinrong Lin, Baojian Hua, Yang Wang, Zhizhong Pan. 414-425 [doi]
- Understanding the Impact of Quantum Noise on Quantum ProgramsZhonghao Pan, Yang Feng, Zhiyuan Li, Yunxin Liu, Yuanchun Li. 426-437 [doi]
- Optimizing Continuous Integration by Dynamic Test Proportion SelectionLong Zhang, Binyi Cui, Zhenyu Zhang 0004. 438-449 [doi]
- A Multi-Step Learning Approach to Assist Code ReviewOussama Ben Sghaier, Houari A. Sahraoui. 450-460 [doi]
- Evaluating Learning-to-Rank Models for Prioritizing Code Review Requests using Process SimulationLanxin Yang, Bohan Liu, Junyu Jia, Junming Xue, Jinwei Xu, Alberto Bacchelli, He Zhang. 461-472 [doi]
- Characterize Software Release Notes of GitHub Projects: Structure, Writing Style, and ContentJianyu Wu, Weiwei Xu, Kai Gao, Jingyue Li, Minghui Zhou 0001. 473-484 [doi]
- Towards Privacy Preserving Cross Project Defect Prediction with Federated LearningHiroki Yamamoto, Dong Wang, Gopi Krishnan Rajbahadur, Masanari Kondo, Yasutaka Kamei, Naoyasu Ubayashi. 485-496 [doi]
- Automatic Code Annotation Generation Based on Heterogeneous Graph StructureZhijie Jiang, Haixu Xiong, Yingwei Ma, Yao Zhang 0009, Yan Ding, Yun Xiong, Shanshan Li. 497-508 [doi]
- Brigadier: A Datalog-based IAST framework for Node.js ApplicationsAngel Luis Scull Pupo, Jens Nicolay, Elisa Gonzalez Boix. 509-521 [doi]
- How Dynamic Features Affect API Usages? An Empirical Study of API Misuses in Python ProgramsXincheng He, Xiaojin Liu, Lei Xu, Baowen Xu. 522-533 [doi]
- Test Input Selection for Deep Neural Network Enhancement Based on Multiple-Objective OptimizationYao Hao, Zhiqiu Huang, Hongjing Guo, Guohua Shen. 534-545 [doi]
- IRP2API: Automated Mapping of Cyber Security Incident Response Plan to Security Tools' APIsZarrin Tasnim Sworna, Muhammad Ali Babar 0001, Anjitha Sreekumar. 546-557 [doi]
- Detecting JavaScript Transpiler Bugs with Grammar-guided MutationLe Chen, Zhide Zhou, Xiaochen Li, He Jiang 0001. 558-568 [doi]
- Towards Understanding Fixes of SonarQube Static Analysis Violations: A Large-Scale Empirical StudyPing Yu, Yijian Wu, Jiahan Peng, Jian Zhang, Peicheng Xie. 569-580 [doi]
- Self-Adaptive Ensemble-based Approach for Software Effort EstimationSuyash Shukla, Sandeep Kumar 0004. 581-592 [doi]
- Boosting Compiler Testing via Eliminating Test Programs with Long-Execution-TimeJiangchang Wu, Yibiao Yang, Yuming Zhou. 593-603 [doi]
- Prediction of Vulnerability Characteristics Based on Vulnerability Description and Prompt LearningXiangwei Li, Xiaoning Ren, Yinxing Xue, Zhenchang Xing, Jiamou Sun. 604-615 [doi]
- Architecture Decisions in AI-based Systems Development: An Empirical StudyBeiqi Zhang, Tianyang Liu, Peng Liang 0001, Chong Wang 0004, Mojtaba Shahin, Jiaxin Yu. 616-626 [doi]
- Self-Admitted Library Migrations in Java, JavaScript, and Python Packaging Ecosystems: A Comparative StudyHaiqiao Gu, Hao He, Minghui Zhou 0001. 627-638 [doi]
- RGDroid: Detecting Android Malware with Graph Convolutional Networks against Structural AttacksYakang Li, Yikun Hu, Yizhuo Wang, Yituo He, Haining Lu, Dawu Gu. 639-650 [doi]
- Exploring and Repairing Gender Fairness Violations in Word Embedding-based Sentiment Analysis Model through Adversarial PatchesLin Sze Khoo, Jia Qi Bay, Ming Lee Kimberly Yap, Mei Kuan Lim, Chun Yong Chong, Zhou Yang, David Lo 0001. 651-662 [doi]
- Constructing Temporal Networks of OSS Programming Language EcosystemsAlexander Agroskin, Elena Lyulina, Sergey Titov, Vladimir Kovalenko. 663-667 [doi]
- An Adaptive Partition-Based Approach for Adaptive Random Testing on Real ProgramsYisheng Xia, Weifeng Sun, Meng Yan, Lei Xu, Dan Yang 0001. 668-672 [doi]
- WasmSlim: Optimizing WebAssembly Binary Distribution via Automatic Module SplittingElliott Wen, Jens Dietrich 0001. 673-677 [doi]
- Large Language Models: The Next Frontier for Variable Discovery within Metamorphic Testing?Christos Tsigkanos, Pooja Rani, Sebastian Müller, Timo Kehrer. 678-682 [doi]
- Combining Contexts from Multiple Sources for Documentation-Specific Code Example GenerationJunaed Younus Khan, Gias Uddin 0001. 683-687 [doi]
- CGORewritter: A better way to use C library in GBoyao Ding, Yu Zhang, Jinbao Chen, Mingzhe Hu, Qingwei Li. 688-692 [doi]
- An Empirical Investigation on the Performance of Domain Adaptation for T5 Code CompletionDaisuke Fukumoto, Yutaro Kashiwa, Toshiki Hirao, Kenji Fujiwara, Hajimu Iida. 693-697 [doi]
- Weak Labelling for File-level Source Code ClassificationCezar Sas, Andrea Capiluppi. 698-702 [doi]
- Towards Automated Code Reviews: Does Learning Code Structure Help?Hong-Yi Lin, Patanamon Thongtanunam. 703-707 [doi]
- How Robust Is a Large Pre-trained Language Model for Code Generationƒ A Case on Attacking GPT2Rui Zhu, Cunming Zhang. 708-712 [doi]
- JTestMigBench and JTestMigTax: A benchmark and taxonomy for unit test migrationAjay Kumar Jha, Mohayeminul Islam, Sarah Nadi. 713-717 [doi]
- TADL: Fault Localization with Transformer-based Anomaly Detection for Dynamic Microservice SystemsYuewei Li, Yan Lu, Jingyu Wang, Qi Qi 0001, Jing Wang, Yingying Wang, Jianxin Liao. 718-722 [doi]
- TemLock: A Lightweight Template-based Approach for Fixing Deadlocks Caused by ReentrantLockLili Bo, Yanchi Yuan, Xiaobing Sun 0001, Hao Xie, Bin Li 0006. 723-727 [doi]
- HFCommunity: A Tool to Analyze the Hugging Face Hub CommunityAdem Ait, Javier Luis Cánovas Izquierdo, Jordi Cabot. 728-732 [doi]
- Multi-Layer Observability for Fault Localization in Microservices Based SystemsRupashree Rangaiyengar, Raghavan Komondoor, Raveendra Kumar Medicherla. 733-737 [doi]
- xVMP: An LLVM-based Code Virtualization ObfuscatorXuangan Xiao, Yizhuo Wang, Yikun Hu, Dawu Gu. 738-742 [doi]
- Naturalistic Static Program AnalysisMohammad Mehdi Pourhashem Kallehbasti, Mohammad Ghafari. 743-747 [doi]
- µDetector: Automated Intrusion Detection for MicroservicesJosé Flora, Miguel Teixeira, Nuno Antunes. 748-752 [doi]
- WasmA: A Static WebAssembly Analysis Framework for EveryoneFlorian Breitfelder, Tobias Roth, Lars Baumgärtner, Mira Mezini. 753-757 [doi]
- ISTA: Automatic Test Case Generation and Optimization for Intelligent Systems based on Coverage AnalysisWei Zheng 0006, Lidan Lin, Xiang Chen, Guoliang Liu, Hao Huang, Jinjin Shen, Qingqing Xu, Yizeng Gu. 758-762 [doi]
- Environment-aware Testing for DNN-based Smart-home WiFi Sensing SystemsNaiyu Zheng, Ting Chen, Chuchu Dong, Yubo Yang, Yuanzhe Li, Yunxin Liu, Yuanchun Li. 763-767 [doi]
- Leveraging and Evaluating Automatic Code Summarization for JPA Program ComprehensionRichard Mayer, Michael Moser, Verena Geist. 768-772 [doi]
- A Method of Component Prediction for Crash Bug Reports Using Component-Based Features and Machine LearningYang Xu, Chao Liu 0042, Yong Li, Qiaoluan Xie, Hyun-Deok Choi. 773-777 [doi]
- An Experience Report on Regression-Free Repair of Deep Neural Network ModelTakao Nakagawa, Susumu Tokumoto, Shogo Tokui, Fuyuki Ishikawa. 778-782 [doi]
- Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods : An Application to the Android Framework for Data Leak DetectionJordan Samhi, Maria Kober, Abdoul Kader Kaboré, Steven Arzt, Tegawendé F. Bissyandé, Jacques Klein. 783-794 [doi]
- MLinter: Learning Coding Practices from Examples - Dream or Reality?Corentin Latappy, Quentin Perez, Thomas Degueule, Jean-Rémy Falleri, Christelle Urtado, Sylvain Vauttier, Xavier Blanc 0001, Cédric Teyton. 795-804 [doi]
- Revisiting Inter-Class Maintainability IndicatorsLena Gregor, Markus Schnappinger, Alexander Pretschner. 805-814 [doi]
- Large-Scale Evaluation of Method-Level Bug Localization with FinerBench4BLShizuka Tsumita, Shinpei Hayashi, Sousuke Amasaki. 815-824 [doi]
- Technical Debt Diffuseness in the Apache Ecosystem: A Differentiated ReplicationDario Amoroso d'Aragona, Fabiano Pecorelli, Maria Teresa Baldassarre, Davide Taibi 0001, Valentina Lenarduzzi. 825-833 [doi]
- Evaluating and improving transformers pre-trained on ASTs for Code CompletionMarcel Ochs, Krishna Narasimhan, Mira Mezini. 834-844 [doi]
- Extended Abstract of A Comparative Study and Analysis of Developer Communications on Slack and GitterEsteban Parra, Mohammad Alahmadi, Ashley Ellis, Sonia Haiduc. 845 [doi]
- Extended Abstract of E-SC4R: Explaining Software Clustering for RemodularisationAlvin Jian Jia Tan, Chun Yong Chong, Aldeida Aleti. 846-847 [doi]
- Extended Abstract of SeCNN: A semantic CNN parser for code comment generationZheng Li 0002, Yonghao Wu, Bin Peng, Xiang Chen, Zeyu Sun 0004, Yong Liu, Deli Yu. 848-849 [doi]
- Extended Abstract of Graph4Web: A Relation-Aware Graph Attention Network for Web Service ClassificationKunsong Zhao, Jin Liu, Zhou Xu 0003, Xiao Liu, Lei Xue, Zhiwen Xie, Yuxuan Zhou, Xin Wang. 850 [doi]
- Extended Abstract of Combine Sliced Joint Graph with Graph Neural Networks for Smart Contract Vulnerability DetectionJie Cai, Bin Li 0006, Jiale Zhang, Xiaobing Sun 0001, Bing Chen 0002. 851-852 [doi]
- Extended Abstract of Candidate Test Set Reduction for Adaptive Random Testing: An Overheads Reduction TechniqueRubing Huang, Haibo Chen 0005, Weifeng Sun, Dave Towey. 853-854 [doi]
- Blockchain oracles for document certification: A case studyManuel Boi, Andrea Pinna 0002, Maria Ilaria Lunesu. 855-864 [doi]
- Analysis of Users' Most Discussed Topics and Trends on Blockchain Technologies and Smart ContractsGiacomo Ibba, Matteo Vaccargiu. 865-873 [doi]
- An Optimized Concurrent Proof of Authority Consensus ProtocolA. Nazir, M. Singh, Giuseppe Destefanis, J. Memon, Rumyana Neykova, Mohamad Kassab, Roberto Tonelli. 874-877 [doi]
- An analysis of the Oracles used in Ethereum's blockchainGiuseppe Antonio Pierro, Honore Mahugnon. 878-885 [doi]
- Investigating Software Testing and Maintenance of Open-Source Distributed LedgerPetya Hristova Cvitic, Felix Dobslaw, Francisco Gomes de Oliveira Neto. 886-896 [doi]
- Detection of test smells with basic language analysis methods and its evaluationFlorian Maier, Michael Felderer. 897-904 [doi]
- Bug or not Bug? Analysing the Reasons Behind Metamorphic Relation ViolationsAlejandra Duque-Torres, Dietmar Pfahl, Claus Klammer, Stefan Fischer 0006. 905-912 [doi]
- A Comparative Study of Code Clone Genealogies in Test Code and Production CodeBrent van Bladel, Serge Demeyer. 913-920 [doi]
- Insights from Building a GUI Testing ToolStefan Fischer 0006. 921-924 [doi]
- Deep Reinforcement Learning Guided Decision Tree Learning For Program SynthesisMingrui Yang, Dalin Zhang. 925-932 [doi]
- EcoDialTest: Adaptive Mutation Schedule for Automated Dialogue Systems TestingXiangchen Shen, Haibo Chen, Jinfu Chen, Jiawei Zhang, Shuhui Wang. 933-939 [doi]
- Interpretable Software Defect Prediction Incorporating Multiple RulesFengyu Yang, Guangdong Zeng, Fa Zhong, Wei Zheng, Peng Xiao. 940-947 [doi]
- A Cross-Language Name Binding Recognition and Discrimination Approach for IdentifiersYue Ju, Yixuan Tang, Jinpeng Lan, Xiangbo Mi, Jingxuan Zhang. 948-955 [doi]
- TAG: UML Activity Diagram Deeply Supervised Generation from Business Textural SpecificationRui Zhu, Wenxin Li, Canchang Jin. 956-961 [doi]
- Multimodal Sentiment Analysis under modality deficiency with prototype-Augmentation in software engineeringBaolei Wang, Xuan Zhang, Kunpeng Du, Chen Gao, Linyu Li. 962-969 [doi]
- SICUP: A Comment Updating Approach based on Structural InformationShifan Liu, Zhanqi Cui, Ruilin Xie. 970-971 [doi]
- ASTHGCN: Adaptive Spatio-Temporal Hypergraph Convolutional Network for Traffic ForecastingChao Zhu, Jing Chen, Rui Zhu, Zhengqiong Wang, Shihan Liu, Jishu Wang. 972-979 [doi]