


default search action
44th ICSE 2022: Pittsburgh, PA, USA
- 44th IEEE/ACM 44th International Conference on Software Engineering, ICSE 2022, Pittsburgh, PA, USA, May 25-27, 2022. ACM 2022, ISBN 978-1-4503-9221-1

- Matthew B. Dwyer:

Message from the ICSE 2022 General Chair. xxix-xxx - Daniela E. Damian, Andreas Zeller:

Message from the ICSE 2022 Program Chairs. xxxi-xxxii - Emily First

, Yuriy Brun
:
Diversity-Driven Automated Formal Verification. 1-13 - Wenqiang Li

, Jiameng Shi, Fengjun Li
, Jingqiang Lin, Wei Wang, Le Guan:
$\mu AFL$: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware. 1-12 - Changan Niu

, Chuanyi Li, Vincent Ng, Jidong Ge, Liguo Huang
, Bin Luo:
SPT-Code: Sequence-to-Sequence Pre-Training for Learning Source Code Representations. 1-13 - Sara Moshtari, Ahmet Okutan, Mehdi Mirakhorli:

A Grounded Theory Based Approach to Characterize Software Attack Surfaces. 13-24 - Ronnie Edson de Souza Santos, Paul Ralph:

A Grounded Theory of Coordination in Remote-First and Hybrid Software Teams. 25-35 - Eduard Baranov, Sourav Chakraborty, Axel Legay, Kuldeep S. Meel, N. Variyam Vinodchandran:

A Scalable t-wise Coverage Estimator. 36-47 - Huan Xie

, Yan Lei, Meng Yan
, Yue Yu, Xin Xia, Xiaoguang Mao
:
A Universal Data Augmentation Approach for Fault Localization. 48-60 - Zhuangbin Chen, Jinyang Liu

, Yuxin Su, Hongyu Zhang, Xiao Ling, Michael R. Lyu:
Adaptive Performance Anomaly Detection for Online Service Systems via Pattern Sketching. 61-72 - Xinyu Gao

, Yang Feng, Yining Yin, Zixi Liu, Zhenyu Chen, Baowen Xu:
Adaptive Test Selection for Deep Neural Networks. 73-85 - Xin Tan, Kai Gao, Minghui Zhou, Li Zhang:

An Exploratory Study of Deep learning Supply Chain. 86-98 - Anastasia Ruvimova

, Alexander Lill
, Jan Gugler, Lauren C. Howe
, Elaine Huang, Gail C. Murphy, Thomas Fritz
:
An Exploratory Study of Productivity Perceptions in Software Teams. 99-111 - Preksha Nema, Pauline Anthonysamy, Nina Taft, Sai Teja Peddinti:

Analyzing User Perspectives on Mobile App Privacy at Scale. 112-124 - Sinan Wang, Yibo Wang, Xian Zhan, Ying Wang, Yepang Liu, Xiapu Luo, Shing-Chi Cheung:

APER: Evolution-Aware Runtime Permission Misuse Detection for Android Apps. 125-137 - Yintong Huo

, Yuxin Su, Hongming Zhang, Michael R. Lyu:
ARCLIN: Automated API Mention Resolution for Unformatted Texts. 138-149 - Ze Tang

, Xiaoyu Shen, Chuanyi Li, Jidong Ge, Liguo Huang
, Zheling Zhu, Bin Luo:
AST-Trans: Code Summarization with Efficient Tree-Structured Attention. 150-162 - Hao Yu, Yiling Lou, Ke Sun, Dezhi Ran, Tao Xie, Dan Hao, Ying Li, Ge Li, Qianxiang Wang:

Automated Assertion Generation via Information Retrieval and Its Integration with Deep learning. 163-174 - Runhan Feng

, Ziyang Yan, Shiyan Peng
, Yuanyuan Zhang
:
Automated Detection of Password Leakage from Public GitHub Repositories. 175-186 - Saad Ezzini

, Sallam Abualhaija
, Chetan Arora
, Mehrdad Sabetzadeh:
Automated Handling of Anaphoric Ambiguity in Requirements: A Multi-solution Study. 187-199 - Zhilei Ren, Shiwei Sun, Jifeng Xuan, Xiaochen Li, Zhide Zhou, He Jiang:

Automated Patching for Unreproducible Builds. 200-211 - Chengcheng Wan

, Shicheng Liu, Sophie Xie, Yifan Liu, Henry Hoffmann, Michael Maire, Shan Lu:
Automated Testing of Software that Uses Machine Learning APIs. 212-224 - Xinyu Liu

, Qi Zhou, Joy Arulraj, Alessandro Orso:
Automatic Detection of Performance Bugs in Database Systems using Equivalent Queries. 225-236 - Patanamon Thongtanunam, Chanathip Pornprasit, Chakkrit Tantithamthavorn:

AutoTransform: Automated Code Transformation to Support Modern Code Review Process. 237-248 - Hoang Lam Nguyen, Lars Grunske:

BEDIVFUZZ: Integrating Behavioral Diversity into Generator-based Fuzzing. 249-261 - Christoph Gote, Pavlin Mavrodiev, Frank Schweitzer, Ingo Scholtes:

Big Data = Big Insights? Operationalising Brooks' Law in a Massive GitHub Data Set. 262-273 - Mairieli Santos Wessel

, Ahmad Abdellatif, Igor Wiese, Tayana Conte, Emad Shihab, Marco Aurélio Gerosa, Igor Steinmacher:
Bots for Pull Requests: The Good, the Bad, and the Promising. 274-286 - Deze Wang, Zhouyang Jia, Shanshan Li, Yue Yu, Yun Xiong, Wei Dong, Xiangke Liao:

Bridging Pre-trained Models and Downstream Tasks for Source Code Understanding. 287-298 - Lin Shi

, Fangwen Mu, Yumin Zhang, Ye Yang, Junjie Chen, Xiao Chen, Hanzhi Jiang, Ziyou Jiang
, Qing Wang:
BugListener: Identifying and Synthesizing Bug Reports from Collaborative Live Chats. 299-311 - Chen Zhang, Bihuan Chen, Xin Peng, Wenyun Zhao:

Buildsheriff: Change-Aware Test Failure Triage for Continuous Integration Builds. 312-324 - Clemens Dubslaff, Kallistos Weis, Christel Baier

, Sven Apel
:
Causality in Configurable Software Systems. 325-337 - Bing Sun

, Jun Sun, Long H. Pham, Tie Shi:
Causality-Based Neural Network Repair. 338-349 - Daniel Sokolowski

, Pascal Weisenburger
, Guido Salvaneschi
:
Change Is the Only Constant: Dynamic Updates for Workflows. 350-362 - Tao Wang, Qingxin Xu, Xiaoning Chang, Wensheng Dou, Jiaxin Zhu, Jinhui Xie, Yuetang Deng, Jianbo Yang, Jiaheng Yang, Jun Wei, Tao Huang:

Characterizing and Detecting Bugs in WeChat Mini-Programs. 363-375 - Moshi Wei, Nima Shiri Harzevili, Yuchao Huang, Junjie Wang, Song Wang:

CLEAR: Contrastive Learning for API Recommendation. 376-387 - Weisong Sun, Chunrong Fang

, Yuchen Chen, Guanhong Tao, Tingxu Han, Quanjun Zhang
:
Code Search based on Context-aware Code Translation. 388-400 - Maliheh Izadi, Roberta Gismondi, Georgios Gousios:

CodeFill: Multi-token Code Completion by Jointly learning from Structure and Naming Sequences. 401-412 - Nadia Nahar, Shurui Zhou, Grace A. Lewis, Christian Kästner:

Collaboration Challenges in Building ML-Enabled Systems: Communication, Documentation, Engineering, and Process. 413-425 - Huayao Wu

, Lixin Xu, Xintao Niu, Changhai Nie:
Combinatorial Testing of RESTful APIs. 426-437 - James Kukucka, Luís Pina, Paul Ammann, Jonathan Bell

:
CONFETTI: Amplifying Concolic Guidance for Fuzzers. 438-450 - Wei Cheng

, Xiangrong Zhu, Wei Hu:
Conflict-aware Inference of Python Compatible Runtime Environments with Domain Knowledge Graph. 451-461 - Ruidong Han

, Chao Yang, Siqi Ma
, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. 462-473 - Cheng Wen

, Mengda He, Bohao Wu, Zhiwu Xu, Shengchao Qin:
Controlled Concurrency Testing via Periodical Scheduling. 474-486 - Yitian Chai, Hongyu Zhang, Beijun Shen, Xiaodong Gu:

Cross-Domain Deep Code Search with Meta Learning. 487-498 - Rongchen Xu, Jianhui Chen, Fei He:

Data-Driven Loop Bound Learning for Termination Analysis. 499-510 - Yi Li, Shaohua Wang, Tien N. Nguyen:

DEAR: A Novel Deep Learning-based Approach for Automated Program Repair. 511-523 - Rangeet Pan, Hridesh Rajan:

Decomposing Convolutional Neural Networks into Reusable and Replaceable Modules. 524-535 - Dirk Beyer

, Jan Haltermann, Thomas Lemberger, Heike Wehrheim:
Decomposing Software Verification into Off-the-Shelf Components: An Application to CEGAR. 536-548 - Manish Shetty, Chetan Bansal, Suman Nath, Sean Bowles, Henry Wang, Ozgur Arman, Siamak Ahari:

DeepAnalyze: Learning to Localize Crashes at Scale. 549-560 - Mohammad Wardat

, Breno Dantas Cruz, Wei Le, Hridesh Rajan:
DeepDiagnosis: Automatically Diagnosing Faults and Recommending Actionable Fixes in Deep Learning Programs. 561-572 - Jialun Cao, Meiziniu Li, Xiao Chen, Ming Wen, Yongqiang Tian, Bo Wu, Shing-Chi Cheung:

DeepFD: Automated Fault Diagnosis and Localization for Deep Learning Programs. 573-585 - Eliska Kloberdanz, Kyle G. Kloberdanz, Wei Le:

DeepStability: A Study of Unstable Numerical Methods and Their Solutions in Deep Learning. 586-597 - Zixi Liu, Yang Feng, Yining Yin, Zhenyu Chen:

DeepState: Selecting Test Suites to Enhance the Robustness of Recurrent Neural Networks. 598-609 - Jie He, Ezio Bartocci

, Dejan Nickovic, Haris Isakovic, Radu Grosu:
DeepSTL - From English Requirements to Signal Temporal Logic. 610-622 - Chenxi Zhang

, Xin Peng, Chaofeng Sha, Ke Zhang, Zhenqing Fu, Xiya Wu, Qingwei Lin, Dongmei Zhang:
DeepTraLog: Trace-Log Combined Microservice Anomaly Detection through Graph-based Deep Learning. 623-634 - Xing Zhang, Jiongyi Chen, Chao Feng, Ruilin Li, Wenrui Diao

, Kehuan Zhang, Jing Lei, Chaojing Tang:
Default: Mutual Information-based Crash Triage for Massive Crashes. 635-646 - Shishuai Yang, Rui Li, Jiongyi Chen, Wenrui Diao

, Shanqing Guo:
Demystifying Android Non-SDK APls: Measurement and Understanding. 647-658 - Yu Hao

, Hang Zhang, Guoren Li, Xingyun Du, Zhiyun Qian, Ardalan Amiri Sani:
Demystifying the Dependency Challenge in Kernel Fuzzing. 659-671 - Chengwei Liu, Sen Chen, Lingling Fan, Bihuan Chen, Yang Liu

, Xin Peng:
Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem. 672-684 - Shao Yang, Yuehan Wang

, Yuan Yao, Haoyu Wang, Yanfang (Fanny) Ye, Xusheng Xiao
:
DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps. 685-697 - Hong Jin Kang

, Khai Loong Aw, David Lo
:
Detecting False Alarms from Automatic Static Analysis Tools: How Far are We? 698-709 - Courtney Miller, Sophie Cohen, Daniel Klug

, Bogdan Vasilescu, Christian Kästner
:
"Did You Miss My Comment or What?" Understanding Toxicity in Open Source Discussions. 710-722 - Jordan Samhi

, Li Li, Tegawendé F. Bissyandé, Jacques Klein:
Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps. 723-735 - Malinda Dilhara, Ameya Ketkar, Nikhith Sannidhi, Danny Dig:

Discovering Repetitive Code Changes in Python ML Systems. 736-748 - Miroslav Tushev, Fahimeh Ebrahimi, Anas Mahmoud:

Domain-Specific Analysis of Mobile App Reviews Using Keyword-Assisted Topic Models. 762-773 - Alexi Turcotte, Michael D. Shah, Mark W. Aldrich, Frank Tip:

DrAsync: Identifying and Visualizing Anti-Patterns in Asynchronous JavaScript. 774-785 - Gal Amram

, Shahar Maoz, Itai Segall, Matan Yossef:
Dynamic Update for Synthesized GR(1) Controllers. 786-797 - Jiannan Wang

, Thibaud Lutellier
, Shangshu Qian
, Hung Viet Pham, Lin Tan:
EAGLE: Creating Equivalent Graphs to Test Deep Learning Libraries. 798-810 - Fitash Ul Haq, Donghwan Shin

, Lionel C. Briand:
Efficient Online Testing for DNN-Enabled Systems using Surrogate-Assisted and Many-Objective Optimization. 811-822 - Timur Babakol

, Anthony Canino, Yu David Liu:
Eflect: Porting Energy-Aware Applications to Shared Environments. 823-834 - Mirazul Haque, Yaswanth Yadlapalli, Wei Yang, Cong Liu:

EREBA: Black-box Energy Testing of Adaptive Neural Networks. 835-846 - Mingyuan Wu, Ling Jiang, Jiahong Xiang, Yuqun Zhang, Guowei Yang

, Huixin Ma, Sen Nie, Shi Wu, Heming Cui, Lingming Zhang:
Evaluating and Improving Neural Program-Smoothing-based Fuzzing. 847-858 - Richard Schumi, Jun Sun:

ExAIS: Executable AI Semantics. 859-870 - Ming Fan, Wenying Wei, Wuxia Jin, Zijiang Yang, Ting Liu:

Explanation-Guided Fairness Testing through Genetic Algorithm. 871-882 - Efe Barlas, Xin Du, James C. Davis

:
Exploiting Input Sanitization for Regex Denial of Service. 883-895 - Jin Wu

, Jian Dong, Ruili Fang, Wen Zhang
, Wenwen Wang, Decheng Zuo:
FADATest: Fast and Adaptive Performance Regression Testing of Dynamic Binary Translation Systems. 896-908 - Saeid Tizpaz-Niari, Ashish Kumar, Gang Tan, Ashutosh Trivedi:

Fairness-aware Configuration of Machine Learning Libraries. 909-920 - Xuanqi Gao, Juan Zhai

, Shiqing Ma, Chao Shen, Yufei Chen
, Qian Wang:
Fairneuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons. 921-933 - Akshay Utture, Jens Palsberg:

Fast and Precise Application Code Analysis using a Partial Library. 934-945 - Agnieszka Ciborowska, Kostadin Damevski

:
Fast Changeset-based Bug Localization with BERT. 946-957 - Muhan Zeng, Yiqian Wu, Zhentao Ye, Yingfei Xiong, Xin Zhang

, Lu Zhang:
Fault Localization via Efficient Probabilistic Modeling of Program Semantics. 958-969 - Jinhao Dong, Yiling Lou, Qihao Zhu, Zeyu Sun, Zhilin Li, Wenjie Zhang

, Dan Hao:
FIRA: Fine-Grained Graph-Based Code Change Representation for Automated Commit Message Generation. 970-981 - Maxime Cordy, Renaud Rwemalika, Adriano Franci, Mike Papadakis, Mark Harman:

FlakiMe: Laboratory-Controlled Test Flakiness Impact Assessment. 982-994 - Anjiang Wei

, Yinlin Deng, Chenyuan Yang, Lingming Zhang:
Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source. 995-1007 - Facundo Molina

, Marcelo d'Amorim, Nazareno Aguirre:
Fuzzing Class Specifications. 1008-1020 - Michael Coblenz

, Michelle L. Mazurek, Michael Hicks:
Garbage Collection Makes Rust Easier to Use: A Randomized Controlled Trial of the Bronze Garbage Collector. 1021-1032 - Yalin Liu, Jinfeng Lin, Oghenemaro Anuyah, Ronald A. Metoyer, Jane Cleland-Huang:

Generating and Visualizing Trace Link Explanations. 1033-1044 - Sidong Feng, Chunyang Chen:

GIFdroid: Automated Replay of Visual Bug Reports for Android Apps. 1045-1057 - Naomichi Shimada, Tao Xiao

, Hideaki Hata
, Christoph Treude
, Kenichi Matsumoto:
GitHub Sponsors: Exploring a New Way to Contribute to Open Source. 1058-1069 - Harrison Green

, Thanassis Avgerinos:
GraphFuzz: Library API Fuzzing with Lifetime-aware Dataflow Graphs. 1070-1081 - Stefanos Georgiou, Maria Kechagia, Tushar Sharma

, Federica Sarro
, Ying Zou:
Green AI: Do Deep Learning Frameworks Have Different Costs? 1082-1094 - Zanis Ali Khan

, Donghwan Shin
, Domenico Bianculli, Lionel C. Briand:
Guidelines for Assessing the Accuracy of Log Message Template Identification Techniques. 1095-1106 - Madeline Endres

, Kevin Boehnke, Westley Weimer:
Hashing It Out: A Survey of Programmers' Cannabis Usage, Perception, and Motivation. 1107-1119 - Chijung Jung, Doowon Kim

, An Chen, Weihang Wang
, Yunhui Zheng, Kyu Hyung Lee, Yonghwi Kwon:
Hiding Critical Program Components via Ambiguous Translation. 1120-1132 - Yingquan Zhao

, Zan Wang, Junjie Chen, Mengdi Liu, Mingyuan Wu, Yuqun Zhang, Lingming Zhang:
History-Driven Test Program Synthesis for JVM Testing. 1133-1144 - Boyue Caroline Hu, Lina Marsso, Krzysztof Czarnecki, Rick Salay, Huakun Shen, Marsha Chechik:

If a Human Can See It, So Should Your System: Reliability Requirements for Machine Vision Components. 1145-1156 - Nils Mehlhorn, Stefan Hanenberg:

Imperative versus Declarative Collection Processing: An RCT on the Understandability of Traditional Loops versus the Stream API in Java. 1157-1168 - Xiangxin Meng, Xu Wang, Hongyu Zhang, Hailong Sun, Xudong Liu:

Improving Fault Localization and Program Repair with Deep Semantic Features and Transferred Knowledge. 1169-1180 - Zeyu Sun, Jie M. Zhang, Yingfei Xiong, Mark Harman, Mike Papadakis, Lu Zhang:

Improving Machine Translation Systems via Isotopic Replacement. 1181-1192 - Michael C. Gerten, Alexis L. Marsh, James I. Lathrop, Myra B. Cohen, Andrew S. Miner, Titus H. Klinge:

Inference and Test Generation Using Program Invariants in Chemical Reaction Networks. 1193-1205 - Ameya Ketkar, Oleg Smirnov, Nikolaos Tsantalis

, Danny Dig, Timofey Bryksin:
Inferring and Applying Type Changes. 1206-1218 - Naman Jain, Skanda Vaidyanath, Arun Iyer

, Nagarajan Natarajan, Suresh Parthasarathy, Sriram K. Rajamani, Rahul Sharma:
Jigsaw: Large Language Models meet Program Synthesis. 1219-1231 - Jordan Samhi

, Jun Gao, Nadia Daoudi
, Pierre Graux
, Henri Hoyez, Xiaoyu Sun
, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
JuCify: A Step Towards Android Code Unification for Enhanced Static Analysis. 1232-1244 - Hongjie Ye, Wei Chen, Wensheng Dou, Guoquan Wu, Jun Wei:

Knowledge-Based Environment Dependency Inference for Python Programs. 1245-1256 - Qinsheng Hou, Wenrui Diao

, Yanhao Wang, Xiaofeng Liu, Song Liu, Lingyun Ying, Shanqing Guo, Yuanzhi Li, Meining Nie, Haixin Duan:
Large-scale Security Measurements on the Android Firmware Ecosystem. 1257-1268 - Shuofei Zhu, Ziyi Zhang

, Boqin Qin, Aiping Xiong, Linhai Song:
Learning and Programming Challenges of Rust: A Mixed-Methods Study. 1269-1281 - Hyunsu Kim, Mukund Raghothaman

, Kihong Heo:
Learning Probabilistic Models for Static Analysis Alarms. 1282-1293 - Fang Liu, Ge Li, Zhiyi Fu, Shuai Lu, Yiyang Hao, Zhi Jin:

Learning to Recommend Method Names with Global Context. 1294-1306 - Anant Kharkar, Roshanak Zilouchian Moghaddam, Matthew Jin, Xiaoyu Liu, Xin Shi, Colin B. Clement, Neel Sundaresan:

Learning to Reduce False Positives in Analytic Bug Detectors. 1307-1316 - Larissa Braz, Christian Aeberhard, Gül Çalikli, Alberto Bacchelli:

Less is More: Supporting Developers in Vulnerability Detection during Code Review. 1317-1329 - Keheliya Gallaba

, Maxime Lamothe, Shane McIntosh:
Lessons from Eight Years of Operational Data from a Continuous Integration Service: An Exploratory Case Study of CircleCI. 1330-1342 - Ruijie Meng, Zhen Dong, Jialin Li, Ivan Beschastnikh, Abhik Roychoudhury:

Linear-time Temporal Logic guided Greybox Fuzzing. 1343-1355 - Van-Hoang Le

, Hongyu Zhang:
Log-based Anomaly Detection with Deep Learning: How Far Are We? 1356-1367 - Giang Nguyen, Md Johirul Islam, Rangeet Pan, Hridesh Rajan:

Manas: Mining Software Repositories to Assist AutoML. 1368-1380 - Guoping Rong, Yifan Zhang, Lanxin Yang

, Fuli Zhang, Hongyu Kuang
, He Zhang:
Modeling Review History for Reviewer Recommendation: A Hypergraph Approach. 1381-1392 - Can Yang, Zhengzi Xu, Hongxu Chen, Yang Liu

, Xiaorui Gong, Baoxu Liu:
ModX: Binary Level Partially Imported Third-Party Library Detection via Program Modularization and Semantic Matching. 1393-1405 - Yi Liu

, Yuekang Li
, Gelei Deng, Yang Liu
, Ruiyuan Wan, Runchao Wu, Dandan Ji, Shiheng Xu, Minli Bao:
Morest: Model-based RESTful API Testing with Execution Feedback. 1406-1417 - Jiazhen Gu, Xuchuan Luo

, Yangfan Zhou, Xin Wang:
Muffin: Testing Deep Learning Libraries via Neural Architecture Fuzzing. 1418-1430 - Haochen He, Zhouyang Jia, Shanshan Li, Yue Yu, Chenglong Zhou, Qing Liao, Ji Wang, Xiangke Liao:

Multi-Intention-Aware Configuration Selection for Performance Tuning. 1431-1442 - Toufique Ahmed, Premkumar T. Devanbu:

Multilingual training for Software Engineering. 1443-1455 - Sicong Cao

, Xiaobing Sun, Lili Bo, Rongxin Wu
, Bin Li, Chuanqi Tao:
MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks. 1456-1468 - Jibesh Patra, Michael Pradel:

Nalin: learning from Runtime Behavior to Find Name-Value Inconsistencies in Jupyter Notebooks. 1469-1481 - Zhou Yang, Jieke Shi

, Junda He, David Lo
:
Natural Attack for Pre-trained Models of Code. 1482-1493 - Ellen Arteca, Sebastian Harner, Michael Pradel, Frank Tip:

Nessie: Automatically Testing JavaScript APIs with Asynchronous Callbacks. 1494-1505 - He Ye, Matias Martinez

, Martin Monperrus
:
Neural Program Repair with Execution-based Backpropagation. 1506-1518 - Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, Jinyin Chen:

NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification. 1519-1531 - Junhee Lee, Seongjoon Hong, Hakjoo Oh:

NPEX: Repairing Java Null Pointer Exceptions without Tests. 1532-1544 - Zhenming Li, Ying Wang, Zeqi Lin, Shing-Chi Cheung, Jian-Guang Lou:

Nufix: Escape From NuGet Dependency Maze. 1545-1557 - Bolun Li, Hao Xu

, Qidong Zhao, Pengfei Su, Milind Chabbi, Shuyin Jiao
, Xu Liu:
OJXPERF: Featherlight Object Replica Detection for Java Programs. 1558-1570 - Miguel Velez, Pooyan Jamshidi, Norbert Siegmund, Sven Apel

, Christian Kästner:
On Debugging the Performance of Configurable Software Systems: Developer Needs and Tailored Tool Support. 1571-1583 - Georges Aaron Randrianaina

, Xhevahire Tërnava, Djamel Eddine Khelladi, Mathieu Acher:
On the Benefits and Limits of Incremental Build of Software Configurations: An Exploratory Study. 1584-1596 - Ensheng Shi, Yanlin Wang

, Lun Du, Junjie Chen, Shi Han, Hongyu Zhang, Dongmei Zhang, Hongbin Sun:
On the Evaluation of Neural Code Summarization. 1597-1608 - Zhensu Sun, Li Li, Yan Liu, Xiaoning Du, Li Li:

On the Importance of Building High-quality Training Datasets for Neural Code Search. 1609-1620 - Marcel Böhme, László Szekeres, Jonathan Metzman:

On the Reliability of Coverage-Based Fuzzer Benchmarking. 1621-1633 - Mingyuan Wu, Ling Jiang, Jiahong Xiang, Yanwei Huang

, Heming Cui, Lingming Zhang, Yuqun Zhang:
One Fuzzing Strategy to Rule Them All. 1634-1645 - Jia Chen

, Peng Wang, Wei Wang:
Online Summarizing Alerts through Semantic and Behavior Information. 1646-1657 - Kunpeng Zhang, Xi Xiao, Xiaogang Zhu

, Ruoxi Sun
, Minhui Xue, Sheng Wen:
Path Transitions Tell More: Optimizing Fuzzing Schedules via Runtime Program States. 1658-1668 - Jingzhu He, Yuhang Lin, Xiaohui Gu, Chin-Chia Michael Yeh, Zhongfang Zhuang:

PerfSig: Extracting Performance Bug Signatures via Multi-modality Causal Analysis. 1669-1680 - Adriana Sejfia, Max Schäfer:

Practical Automated Detection of Malicious npm Packages. 1681-1692 - Xing Hu, Xin Xia, David Lo

, Zhiyuan Wan, Qiuyuan Chen, Thomas Zimmermann:
Practitioners' Expectations on Automated Code Comment Generation. 1693-1705 - Seemanta Saha

, Mara Downing, Tegan Brennan, Tevfik Bultan:
PREACH: A Heuristic for Probabilistic Reachability to Identify Hard to Reach Statements. 1706-1717 - Yiyuan Guo, Jinguo Zhou, Peisen Yao, Qingkai Shi

, Charles Zhang:
Precise Divide-By-Zero Detection with Affirmative Evidence. 1718-1729 - Anjiang Wei

, Pu Yi, Zhengxi Li, Tao Xie, Darko Marinov, Wing Lam:
Preempting Flaky Tests via Non-Idempotent-Outcome Tests. 1730-1742 - Samuel J. Kaufman, Ryan Featherman, Justin Alvin, Bob Kurtz, Paul Ammann, René Just:

Prioritizing Mutants to Guide Mutation Testing. 1743-1754 - Changlin Liu, Hanlin Wang, Tianming Liu

, Diandian Gu, Yun Ma, Haoyu Wang, Xusheng Xiao
:
PROMAL: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning. 1755-1767 - Matthías Páll Gissurarson, Leonhard Applis, Annibale Panichella, Arie van Deursen

, David Sands:
PROPR: Property-Based Automatic Program Repair. 1768-1780 - Peiming Liu, Yanze Li, Bradley Swain, Jeff Huang:

PUS: A Fast and Highly Efficient Solver for Inclusion-based Pointer Analysis. 1781-1792 - Cong Li

, Yanyan Jiang, Chang Xu:
Push-Button Synthesis of Watch Companions for Android Apps. 1793-1804 - William Eiers

, Ganesh Sankaran
, Albert Li
, Emily O'Mahony, Benjamin Prince, Tevfik Bultan:
Quantifying Permissiveness of Access Control Policies. 1805-1817 - Suhwan Song

, Jaewon Hur, Sunwoo Kim, Philip Rogers, Byoungyoung Lee
:
R2Z2: Detecting Rendering Regressions in Web Browsers through Differential Fuzz Testing. 1818-1829 - Wenxin Xiao, Hao He, Weiwei Xu, Xin Tan, Jinhao Dong, Minghui Zhou:

Recommending Good First Issues in GitHub OSS Projects. 1830-1842 - Yanjie Gao, Zhengxian Li, Haoxiang Lin

, Hongyu Zhang, Ming Wu, Mao Yang:
REFTY: Refinement Types for Valid Deep Learning Models. 1843-1855 - Ziqi Zhang, Yuanchun Li, Jindong Wang

, Bingyan Liu, Ding Li, Yao Guo
, Xiangqun Chen, Yunxin Liu:
ReMoS: Reducing Defect Inheritance in Transfer Learning via Relevant Model Slicing. 1856-1868 - Cailin Winston, Caleb Winston, Chloe N. Winston, Claris Winston, Cleah Winston, Rajesh P. N. Rao, René Just:

Repairing Brain-Computer Interfaces with Fault-Based Data Acquisition. 1869-1880 - Chengpeng Li, Chenguang Zhu

, Wenxi Wang, August Shi:
Repairing Order-Dependent Flaky Tests via Test Generation. 1881-1892 - Juan Manuel Florez, Jonathan Perry, Shiyi Wei, Andrian Marcus:

Retrieving Data Constraint Implementations Using Fine-Grained Code Patterns. 1893-1905 - Zhen Li, Qian (Guenevere) Chen, Chen Chen, Yayi Zou, Shouhuai Xu:

RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation. 1906-1918 - Michael Cao, Khaled Ahmed, Julia Rubin:

Rotten Apples Spoil the Bunch: An Anatomy of Google Play Malware. 1919-1931 - Ripon K. Saha, Akira Ura, Sonal Mahajan, Chenguang Zhu

, Linyi Li, Yang Hu, Hiroaki Yoshida, Sarfraz Khurshid, Mukul R. Prasad:
SAPIENTML: Synthesizing Machine Learning Pipelines by Learning from Human-Written Solutions. 1932-1944 - Yi Xiang, Han Huang, Yuren Zhou, Sizhe Li, Chuan Luo, Qingwei Lin, Miqing Li

, Xiaowei Yang:
Search-based Diverse Sampling from Real-world Software Product Lines. 1945-1957 - Trey Woodlief

, Sebastian G. Elbaum, Kevin Sullivan:
Semantic Image Fuzzing of AI Perception Systems. 1958-1969 - Neng Zhang, Chao Liu, Xin Xia, Christoph Treude

, Ying Zou, David Lo
, Zibin Zheng:
ShellFusion: Answer Generation for Shell Programming Tasks via Knowledge Fusion. 1970-1981 - Yiwen Dong, Tianxiao Gu, Yongqiang Tian, Chengnian Sun:

SnR: Constraint-Based Type Inference for Incomplete Java Code Snippets. 1982-1993 - Tobias Lorey, Paul Ralph, Michael Felderer

:
Social Science Theories in Software Engineering Research. 1994-2005 - Yun Peng, Cuiyun Gao, Zongjie Li, Bowei Gao, David Lo

, Qirun Zhang
, Michael R. Lyu:
Static Inference Meets Deep learning: A Hybrid Type Inference Approach for Python. 2019-2030 - Quentin Stiévenart

, David W. Binkley, Coen De Roover
:
Static Stack-Preserving Intra-Procedural Slicing of WebAssembly Binaries. 2031-2042 - Akshay Utture, Shuyang Liu, Christian Gram Kalhauge

, Jens Palsberg:
Striking a Balance: Pruning False-Positives from Static Call Graphs. 2043-2055 - Zach Patterson, Zenong Zhang, Brent Pappas, Shiyi Wei, Paul Gazzillo

:
SugarC: Scalable Desugaring of Real-World Preprocessor Usage into Pure C. 2056-2067 - Sooyoung Cha, Myungho Lee, Seokhyun Lee, Hakjoo Oh:

SYMTUNER: Maximizing the Power of Symbolic Execution by Adaptively Tuning External Parameters. 2068-2079 - Anastasia Danilova, Stefan Horstmann

, Matthew Smith, Alena Naiakshina:
Testing Time Limits in Screener Questions for Online Surveys with Programmers. 2080-2090 - Sumon Biswas

, Mohammad Wardat
, Hridesh Rajan:
The Art and Practice of Data Science Pipelines: A Comprehensive Study of Data Science Pipelines In Theory, In-The-Small, and In-The-Large. 2091-2103 - David Reid, Mahmoud Jahanshahi

, Audris Mockus
:
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software. 2104-2115 - Hongbo Fang, Hemank Lamba, James D. Herbsleb, Bogdan Vasilescu:

"This Is Damn Slick!" Estimating the Impact of Tweets on Open Source Project Popularity and New Contributors. 2116-2129 - Elizabeth Dinella, Gabriel Ryan, Todd Mytkowicz, Shuvendu K. Lahiri:

TOGA: A Neural Method for Test Oracle Generation. 2130-2141 - Yanjie Zhao, Li Li, Kui Liu

, John C. Grundy:
Towards Automatically Repairing Compatibility Issues in Published Android Apps. 2142-2153 - Xing Zhang, Zhenjiang Hu:

Towards Bidirectional Live Programming for Incomplete Programs. 2154-2164 - Samuel Benton, Yuntong Xie, Lan Lu, Mengshi Zhang, Xia Li, Lingming Zhang:

Towards Boosting Patch Execution On-the-Fly. 2165-2176 - Doriane Olewicki, Mathieu Nayrolles, Bram Adams:

Towards language-independent Brown Build Detection. 2177-2188 - Renjue Li, Pengfei Yang, Cheng-Chao Huang, Youcheng Sun, Bai Xue, Lijun Zhang:

Towards Practical Robustness Analysis for DNNs based on PAC-Model Learning. 2189-2201 - Boyuan Chen, Mingzhi Wen, Yong Shi, Dayi Lin, Gopi Krishnan Rajbahadur, Zhen Ming Jiang:

Towards Training Reproducible Deep Learning Models. 2202-2214 - Yanhui Li

, Linghan Meng, Lin Chen, Li Yu, Di Wu, Yuming Zhou, Baowen Xu:
Training Data Debugging for the Fairness of Machine Learning Software. 2215-2227 - Yannic Noller

, Ridwan Shariffdeen
, Xiang Gao, Abhik Roychoudhury:
Trust Enhancement Issues in Program Repair. 2228-2240 - Amir M. Mir

, Evaldas Latoskinas, Sebastian Proksch, Georgios Gousios:
Type4Py: Practical Deep Similarity Learning-Based Type Inference for Python. 2241-2252 - Zongjie Li, Pingchuan Ma, Huaijin Wang

, Shuai Wang, Qiyi Tang
, Sen Nie, Shi Wu:
Unleashing the Power of Compiler Intermediate Representation to Enhance Neural Program Embeddings. 2253-2265 - Mattia Fazzini

, Chase Choi, Juan Manuel Copia, Gabriel Lee, Yoshiki Kakehi, Alessandra Gorla, Alessandro Orso:
Use of Test Doubles in Android Testing: An In-Depth Investigation. 2266-2278 - Antonio Mastropaolo

, Luca Pascarella
, Gabriele Bavota
:
Using Deep Learning to Generate Complete Log Statements. 2279-2290 - Rosalia Tufano

, Simone Masiero, Antonio Mastropaolo
, Luca Pascarella
, Denys Poshyvanyk
, Gabriele Bavota
:
Using Pre-Trained Models to Boost Code Review Automation. 2291-2302 - Rosalia Tufano

, Simone Scalabrino, Luca Pascarella
, Emad Aghajani, Rocco Oliveto, Gabriele Bavota
:
Using Reinforcement Learning for Load Testing of Video Games. 2303-2314 - Péter Garamvölgyi, Yuxi Liu, Dong Zhou, Fan Long, Ming Wu:

Utilizing Parallelism in Smart Contracts on Decentralized Blockchains by Taming Application-Inherent Conflicts. 2315-2326 - Qibin Chen

, Jeremy Lacomis
, Edward J. Schwartz, Graham Neubig, Bogdan Vasilescu, Claire Le Goues:
VarCLR: Variable Semantic Representation Pre-training via Contrastive Learning. 2327-2339 - Geetam Chawla, Navneet Aman, Raghavan Komondoor, Ashish Bokil, Nilesh Kharat:

Verification of ORM-based Controllers by Summary Inference. 2340-2351 - Lingfeng Bao, Xin Xia, Ahmed E. Hassan, Xiaohu Yang:

V-SZZ: Automatic Identification of Version Ranges Affected by CVE Vulnerabilities. 2352-2364 - Yueming Wu

, Deqing Zou, Shihan Dou, Wei Yang, Duo Xu, Hai Jin:
VulCNN: An Image-inspired Scalable Vulnerability Detection System. 2365-2376 - Yao Wan, Wei Zhao, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin:

What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code. 2377-2388 - Yingchen Tian, Yuxia Zhang, Klaas-Jan Stol, Lin Jiang, Hui Liu:

What Makes a Good Commit Message? 2389-2401 - Lucas Gren, Paul Ralph:

What Makes Effective Leadership in Agile Software Development Teams? 2402-2414 - Elizabeth Wyss

, Lorenzo De Carli
, Drew Davidson:
What the Fork? Finding Hidden Code Clones in npm. 2415-2426 - Yawen Wang

, Junjie Wang, Hongyu Zhang, Xuran Ming, Lin Shi
, Qing Wang:
Where is Your App Frustrating Users? 2427-2439 - Zhengjie Du, Yuekang Li

, Yang Liu
, Bing Mao:
Windranger: A Directed Greybox Fuzzer driven by Deviation Basic Blocks. 2440-2451

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














