


default search action
45th ICSE 2023: Melbourne, Australia
- 45th IEEE/ACM International Conference on Software Engineering, ICSE 2023, Melbourne, Australia, May 14-20, 2023. IEEE 2023, ISBN 978-1-6654-5701-9

- Lori L. Pollock, Massimiliano Di Penta:

Message from the ICSE 2023 Program Co-Chairs. xl - Gennaro Laudato, Simone Scalabrino, Nicole Novielli, Filippo Lanubile, Rocco Oliveto:

Predicting Bugs by Monitoring Developers During Task Execution. 1-13 - Sarah Pink:

Future Software for Life in Trusted Futures. 1 - Paolo Tonella:

The Road Toward Dependable AI Based Systems. 2 - Liming Zhu:

Software Engineering as the Linchpin of Responsible AI. 3-4 - Deze Wang, Boxing Chen, Shanshan Li, Wei Luo, Shaoliang Peng

, Wei Dong, Xiangke Liao:
One Adapter for All Programming Languages? Adapter Tuning for Code Search and Summarization. 5-16 - Zhongxin Liu, Zhijie Tang, Xin Xia, Xiaohu Yang:

CCRep: Learning Code Change Representations via Pre-Trained Code Model and Query Back. 17-29 - Shuzheng Gao, Hongyu Zhang, Cuiyun Gao, Chaozheng Wang:

Keeping Pace with Ever-Increasing Data: Towards Continual Learning of Code Intelligence Models. 30-42 - Haoxiang Jia, Ming Wen, Zifan Xie

, Xiaochen Guo, Rongxin Wu, Maolin Sun
, Kang Chen, Hai Jin:
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces. 43-55 - Mingyuan Wu, Minghai Lu, Heming Cui, Junjie Chen, Yuqun Zhang, Lingming Zhang:

JITfuzz: Coverage-guided Fuzzing for JVM Just-in-Time Compilers. 56-68 - Maolin Sun

, Yibiao Yang
, Ming Wen, Yongcong Wang, Yuming Zhou, Hai Jin:
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs. 69-81 - Hanmo You, Zan Wang, Junjie Chen, Shuang Liu, Shuochuan Li:

Regression Fuzzing for Deep Learning Systems. 82-94 - Suyue Guo, Xinyu Wan, Wei You, Bin Liang, Wenchang Shi, Yiwei Zhang, Jianjun Huang

, Jian Zhang:
Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers. 95-107 - Daniel Oliveira, Wesley K. G. Assunção, Alessandro F. Garcia, Ana Carla Bibiano, Márcio Ribeiro, Rohit Gheyi, Baldoino Fonseca:

The untold story of code refactoring customizations in practice. 108-120 - Roland Croft, Muhammad Ali Babar, M. Mehdi Kholoosi:

Data Quality for Software Vulnerability Datasets. 121-133 - André Oliveira, Vânia Neves, Alexandre Plastino, Ana Carla Bibiano, Alessandro F. Garcia, Leonardo Murta:

Do code refactorings influence the merge effort? 134-146 - Hao Guan

, Ying Xiao, Jiaying Li, Yepang Liu, Guangdong Bai
:
A Comprehensive Study of Real-World Bugs in Machine Learning Model Optimization. 147-158 - Ezekiel O. Soremekun

, Lukas Kirschner
, Marcel Böhme, Mike Papadakis:
Evaluating the Impact of Experimental Assumptions in Automated Fault Localization. 159-171 - Jiwei Yan, Miaomiao Wang, Yepang Liu, Jun Yan, Long Zhang:

Locating Framework-specific Crashing Faults with Compact and Explainable Candidate Set. 172-183 - Sunzhou Huang

, Xiaoyin Wang:
PExReport: Automatic Creation of Pruned Executable Cross-Project Failure Reports. 184-195 - Feifei Niu

, Wesley K. G. Assunção, LiGuo Huang
, Christoph Mayr-Dorn, Jidong Ge, Bin Luo, Alexander Egyed:
RAT: A Refactoring-Aware Traceability Model for Bug Localization. 196-207 - Hammad Ahmad, Zachary Karas, Kimberly Diaz, Amir Kamil

, Jean-Baptiste Jeannin, Westley Weimer:
How Do We Read Formal Claims? Eye-Tracking and the Cognition of Proofs about Algorithms. 208-220 - Rafi Shalom

, Shahar Maoz:
Which of My Assumptions are Unnecessary for Realizability and Why Should I Care? 221-232 - Andreas Dann, Ben Hermann

, Eric Bodden:
UPCY: Safely Updating Outdated Dependencies. 233-244 - Xiaoke Wang, Lei Zhao:

APICAD: Augmenting API Misuse Detection through Specifications from Code and Documents. 245-256 - Sen Yang, Sen Chen, Lingling Fan, Sihan Xu, Zhanwei Hui, Song Huang:

Compatibility Issue Detection for Android Apps Based on Path-Sensitive Semantic Analysis. 257-269 - Jiahui Wu, Zhengzi Xu, Wei Tang, Lyuye Zhang, Yueming Wu

, Chengyue Liu, Kairan Sun, Lida Zhao, Yang Liu
:
OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions. 270-282 - Taeyoung Kim

, Yunhee Jang, Chanjong Lee
, Hyungjoon Koo, Hyoungshick Kim:
Smartmark: Software Watermarking Scheme for Smart Contracts. 283-294 - Zibin Zheng, Neng Zhang, Jianzhong Su, Zhijie Zhong

, Mingxi Ye, Jiachi Chen
:
Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on Ethereum. 295-306 - Peilin Zheng, Xiapu Luo, Zibin Zheng:

BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts. 307-318 - Bianca Trinkenreich, Klaas-Jan Stol, Anita Sarma, Daniel M. Germán, Marco Aurélio Gerosa, Igor Steinmacher:

Do I Belong? Modeling Sense of Virtual Community Among Linux Kernel Contributors. 319-331 - Yuekun Wang

, Yuhang Ye, Yueming Wu
, Weiwei Zhang, Yinxing Xue, Yang Liu
:
Comparison and Evaluation of Clone Detection Techniques with Different Code Representations. 332-344 - Jiahao Liu

, Jun Zeng, Xiang Wang, Zhenkai Liang:
Learning Graph-based Code Representations for Source-level Functional Similarity Detection. 345-357 - Qihong Chen, Rúben Câmara, José Campos

, André Souto
, Iftekhar Ahmed:
The Smelly Eight: An Empirical Study on the Prevalence of Code Smells in Quantum Computing. 358-370 - Danushka Liyanage

, Marcel Böhme, Chakkrit Tantithamthavorn, Stephan Lipp:
Reachable Coverage: Estimating Saturation in Fuzzing. 371-383 - Myungho Lee, Sooyoung Cha, Hakjoo Oh:

Learning Seed-Adaptive Mutation Strategies for Greybox Fuzzing. 384-396 - Sicong Cao

, Xiaobing Sun, Xiaoxue Wu, Lili Bo, Bin Li, Rongxin Wu, Wei Liu, Biao He, Yu Ouyang, Jiajia Li:
Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation. 397-409 - Ling Jiang, Hengchen Yuan, Mingyuan Wu, Lingming Zhang, Yuqun Zhang:

Evaluating and Improving Hybrid Fuzzing. 410-422 - Changjian Zhang, Tarang Saluja, Rômulo Meira-Góes, Matthew L. Bolton, David Garlan, Eunsuk Kang:

Robustification of Behavioral Designs against Environmental Deviations. 423-434 - Jenny T. Liang, Maryam Arab, Minhyuk Ko, Amy J. Ko, Thomas D. LaToza:

A Qualitative Study on the Implementation Design Decisions of Developers. 435-447 - I Luk Kim, Weihang Wang, Yonghwi Kwon, Xiangyu Zhang:

BFTDETECTOR: Automatic Detection of Business Flow Tampering for Digital Content Service. 448-459 - Ziqi Zhang, Yuanchun Li, Bingyan Liu, Yifeng Cai, Ding Li, Yao Guo, Xiangqun Chen:

FedSlice: Protecting Federated Learning Models from Malicious Participants with Model Slicing. 460-472 - Zeya Tan, Wei Song:

PTPDroid: Detecting Violated User Privacy Disclosures to Third-Parties of Android Apps. 473-485 - Yutian Yan, Yunhui Zheng, Xinyue Liu

, Nenad Medvidovic, Weihang Wang
:
Adhere: Automated Detection and Repair of Intrusive Ads. 486-498 - Duc-Ly Vu, Zachary Newman, John Speed Meyers:

Bad Snakes: Understanding and Improving Python Package Index Malware Scanning. 499-511 - Waris Gill, Ali Anwar

, Muhammad Ali Gulzar:
FedDebug: Systematic Debugging for Federated Learning Applications. 512-523 - Weibin Wu, Jianping Zhang, Victor Junqiu Wei, Xixian Chen, Zibin Zheng, Irwin King, Michael R. Lyu:

Practical and Efficient Model Extraction of Sentiment Analysis APIs. 524-536 - Changan Niu

, Chuanyi Li, Vincent Ng, Bin Luo:
CrossCodeBench: Benchmarking Cross-Task Generalization of Source Code Models. 537-549 - Austin Mordahl, Zenong Zhang, Dakota Soles, Shiyi Wei:

ECSTATIC: An Extensible Framework for Testing and Debugging Configurable Static Analysis. 550-562 - Sahar Badihi, Khaled Ahmed, Yi Li, Julia Rubin:

Responsibility in Context: On Applicability of Slicing in Semantic Regression Analysis. 563-575 - Jan Reichl, Stefan Hanenberg, Volker Gruhn:

Does the Stream API Benefit from Special Debugging Facilities? A Controlled Experiment on Loops and Streams with Specific Debuggers. 576-588 - Gabin An, Jingun Hong, Naryeong Kim, Shin Yoo:

Fonte: Finding Bug Inducing Commits from Failures. 589-601 - Sen Fang

, Tao Zhang
, Youshuai Tan, He Jiang, Xin Xia, Xiaobing Sun:
RepresentThemAll: A Universal Learning Representation of Bug Reports. 602-614 - Zhuo Zhang

, Brian Zhang, Wen Xu, Zhiqiang Lin:
Demystifying Exploitable Bugs in Smart Contracts. 615-627 - Teng Wang

, Zhouyang Jia, Shanshan Li, Si Zheng, Yue Yu, Erci Xu, Shaoliang Peng
, Xiangke Liao:
Understanding and Detecting On-The-Fly Configuration Bugs. 628-639 - Parvez Mahbub, Ohiduzzaman Shuvo, Mohammad Masudur Rahman

:
Explaining Software Bugs Leveraging Code Structures in Neural Machine Translation. 640-652 - Xin Tan, Yiran Chen, Haohua Wu, Minghui Zhou, Li Zhang:

Is It Enough to Recommend Tasks to Newcomers? Understanding Mentoring on Good First Issues. 653-664 - Kaia Newman

, Madeline Endres
, Westley Weimer, Brittany Johnson:
From Organizations to Individuals: Psychoactive Substance Use By Professional Programmers. 665-677 - Likang Yin, Xiyu Zhang, Vladimir Filkov:

On the Self-Governance and Episodic Changes in Apache Incubator Projects: An Empirical Study. 678-689 - Alina Mailach, Norbert Siegmund:

Socio-Technical Anti-Patterns in Building ML-Enabled Software: Insights from Leaders on the Forefront. 690-702 - Patrícia G. F. Matsubara, Igor Steinmacher, Bruno Gadelha, Tayana Conte:

Moving on from the Software Engineers' Gambit: An Approach to Support the Defense of Software Effort Estimates. 703-715 - Jaemin Hong

, Sukyoung Ryu:
Concrat: An Automatic C-to-Rust Lock API Translator for Concurrent Programs. 716-728 - Gal Amram

, Dor Ma'ayan
, Shahar Maoz, Or Pistiner, Jan Oliver Ringert:
Triggers for Reactive Synthesis Specifications. 729-741 - Dor Ma'ayan

, Shahar Maoz:
Using Reactive Synthesis: An End-to-End Exploratory Case Study. 742-754 - Fang Liu, Jia Li, Li Zhang:

Syntax and Domain Aware Model for Unsupervised Program Translation. 755-767 - Fangwen Mu, Xiao Chen, Lin Shi

, Song Wang, Qing Wang:
Developer-Intent Driven Code Comment Generation. 768-780 - Shengbin Xu, Yuan Yao, Feng Xu, Tianxiao Gu, Jingwei Xu, Xiaoxing Ma:

Data Quality Matters: A Case Study of Obsolete Comment Detection. 781-793 - Jinhao Dong, Yiling Lou, Dan Hao, Lin Tan:

Revisiting Learning-based Commit Message Generation. 794-805 - Jiawei Li, Iftekhar Ahmed:

Commit Message Matters: Investigating Impact and Evolution of Commit Message Quality. 806-817 - Hetong Dai, Yiming Tang

, Heng Li, Weiyi Shang:
PILAR: Studying and Mitigating the Influence of Configurations on Log Parsing. 818-829 - Zhenhao Li

, Chuan Luo, Tse-Hsun Chen
, Weiyi Shang, Shilin He, Qingwei Lin, Dongmei Zhang:
Did We Miss Something Important? Studying and Exploring Variable-Aware Log Abstraction. 830-842 - Zishuo Ding, Yiming Tang

, Yang Li, Heng Li, Weiyi Shang:
On the Temporal Relations between Logging and Code. 843-854 - Guoping Rong, Shenghui Gu, Haifeng Shen, He Zhang, Hongyu Kuang

:
How Do Developers' Profiles and Experiences Influence their Logging Practices? An Empirical Study of Industrial Practitioners. 855-867 - Islem Bouzenia, Michael Pradel:

When to Say What: Learning to Find Condition-Message Inconsistencies. 868-880 - Yintong Huo

, Yuxin Su, Cheryl Lee, Michael R. Lyu:
SemParser: A Semantic Parser for Log Analytics. 881-893 - Dezhi Ran

, Hao Wang
, Wenyu Wang, Tao Xie:
Badge: Prioritizing UI Events with Hierarchical Multi-Armed Bandits for Automated UI Testing. 894-905 - Sidong Feng, Mulong Xie, Chunyang Chen:

Efficiency Matters: Speeding Up Automated Testing with GUI Rendering Inference. 906-918 - Caroline Lemieux, Jeevana Priya Inala, Shuvendu K. Lahiri, Siddhartha Sen:

CodaMosa: Escaping Coverage Plateaus in Test Generation with Pre-trained Large Language Models. 919-931 - Chao Wang, Ronny Ko, Yue Zhang, Yuqing Yang

, Zhiqiang Lin:
Taintmini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis. 932-944 - Asem Ghaleb, Julia Rubin, Karthik Pattabiraman:

AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities. 945-956 - Shengyi Pan, Lingfeng Bao, Xin Xia, David Lo

, Shanping Li:
Fine-grained Commit-level Vulnerability Type Prediction by CWE Tree Structure. 957-969 - Jiamou Sun, Zhenchang Xing, Qinghua Lu, Xiwei Xu, Liming Zhu, Thong Hoang, Dehai Zhao:

Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation. 970-982 - Binhang Qi, Hailong Sun, Xiang Gao, Hongyu Zhang, Zhaotian Li, Xudong Liu:

Reusing Deep Neural Network Models through Model Re-engineering. 983-994 - Malinda Dilhara, Danny Dig, Ameya Ketkar:

PYEVOLVE: Automating Frequent Code Changes in Python ML Systems. 995-1007 - Xiaoning Ren

, Yun Lin, Yinxing Xue, Ruofan Liu
, Jun Sun, Zhiyong Feng, Jin Song Dong:
DeepArc: Modularizing Neural Networks for the Model Maintenance. 1008-1019 - Sayem Mohammad Imtiaz, Fraol Batole, Astha Singh, Rangeet Pan, Breno Dantas Cruz, Hridesh Rajan:

Decomposing a Recurrent Neural Network into Modules for Enabling Reusability and Replacement. 1020-1032 - Yunbo Lyu

, Thanh Le-Cong
, Hong Jin Kang
, Ratnadira Widyasari, Zhipeng Zhao
, Xuan-Bach Dinh Le, Ming Li, David Lo
:
CHRONOS: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports. 1033-1045 - Yulun Wu, Zeliang Yu, Ming Wen, Qiang Li, Deqing Zou, Hai Jin:

Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem. 1046-1058 - Masudul Hasan Masud Bhuiyan

, Adithya Srinivas Parthasarathy, Nikos Vasilakis, Michael Pradel, Cristian-Alexandru Staicu:
SecBench.js: An Executable Security Benchmark Suite for Server-Side JavaScript. 1059-1070 - Pattaraporn Sangaroonsilp, Hoa Khanh Dam, Aditya Ghose:

On Privacy Weaknesses and Vulnerabilities in Software Systems. 1071-1083 - Hao Zhang, Ji Luo, Mengze Hu, Jun Yan, Jian Zhang, Zongyan Qiu:

Detecting Exception Handling Bugs in C++ Programs. 1084-1095 - Yoonseok Ko, Hakjoo Oh:

Learning to Boost Disjunctive Static Bug-Finders. 1097-1109 - Wensheng Dou, Ziyu Cui, Qianwang Dai, Jiansen Song

, Dong Wang, Yu Gao, Wei Wang, Jun Wei, Lei Chen, Hanmo Wang, Hua Zhong, Tao Huang:
Detecting Isolation Bugs via Transaction Oracle Construction. 1123-1135 - Siwei Cui, Yifei Gao, Rainer Unterguggenberger, Wilfried Pichler, Sean Livingstone, Jeff Huang:

SmallRace: Static Race Detection for Dynamic Languages - A Case on Smalltalk. 1136-1147 - Sterre van Breukelen, Ann Barcomb, Sebastian Baltes, Alexander Serebrenik

:
"STILL AROUND": Experiences and Survival Strategies of Veteran Women Software Developers. 1148-1160 - Vincenzo Riccio

, Paolo Tonella
:
When and Why Test Generators for Deep Learning Produce Invalid Inputs: an Empirical Study. 1161-1173 - Chenyuan Yang, Yinlin Deng, Jiayi Yao, Yuxing Tu, Hanchi Li, Lingming Zhang:

Fuzzing Automatic Differentiation in Deep-Learning Libraries. 1174-1186 - Zenan Li, Maorun Zhang, Jingwei Xu, Yuan Yao, Chun Cao, Taolue Chen

, Xiaoxing Ma, Jian Lu:
Lightweight Approaches to DNN Regression Error Reduction: An Uncertainty Alignment Perspective. 1187-1199 - Yuanyuan Yuan, Qi Pang, Shuai Wang:

Revisiting Neuron Coverage for DNN Testing: A Layer-Wise and Distribution-Aware Criterion. 1200-1212 - Mahtab Nejati, Mahmoud Alfadel, Shane McIntosh:

Code Review of Build System Specifications: Prevalence, Purposes, Patterns, and Perceptions. 1213-1224 - Manish Motwani, Yuriy Brun

:
Better Automatic Program Repair by Using Bug Reports and Tests Together. 1225-1237 - Zongjie Li, Chaozheng Wang, Zhibo Liu, Haoxuan Wang, Dong Chen, Shuai Wang, Cuiyun Gao:

CCTEST: Testing and Repairing Code Completion Systems. 1238-1250 - Nan Jiang

, Thibaud Lutellier
, Yiling Lou, Lin Tan, Dan Goldwasser, Xiangyu Zhang:
KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair. 1251-1263 - Nikhil Parasaram, Earl T. Barr, Sergey Mechtaev:

Rete: Learning Namespace Representation for Program Repair. 1264-1276 - Saad Ezzini

, Sallam Abualhaija
, Chetan Arora
, Mehrdad Sabetzadeh:
AI-based Question Answering Assistance for Analyzing Natural-language Requirements. 1277-1289 - Alessio Ferrari, Paola Spoletini:

Strategies, Benefits and Challenges of App Store-inspired Requirements Elicitation. 1290-1302 - Zhilei Han

, Fei He:
Data-driven Recurrent Set Learning For Non-termination Analysis. 1303-1315 - Guannan Wei

, Songlin Jia
, Ruiqi Gao, Haotian Deng, Shangyin Tan, Oliver Bracevac
, Tiark Rompf:
Compiling Parallel Symbolic Execution with Continuations. 1316-1328 - Chengpeng Wang, Gang Fan, Peisen Yao, Fuxiong Pan, Charles Zhang:

Verifying Data Constraint Equivalence in FinTech Systems. 1329-1341 - Shihao Zhu, Yuqi Guo, Long Zhang, Yan Cai

:
Tolerate Control-Flow Changes for Sound Data Race Prediction. 1342-1354 - Zhe Liu

, Chunyang Chen, Junjie Wang, Xing Che, Yuekai Huang, Jun Hu, Qing Wang:
Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing. 1355-1367 - Paul T. Chiou

, Ali S. Alotaibi, William G. J. Halfond:
Detecting Dialog-Related Keyboard Navigation Failures in Web Applications. 1368-1380 - Priyanka Bose, Dipanjan Das, Saastha Vasan, Sebastiano Mariani, Ilya Grishchenko

, Andrea Continella
, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Columbus: Android App Testing Through Systematic Callback Exploration. 1381-1392 - Jiongchi Yu

, Yuechen Wu, Xiaofei Xie
, Wei Le, Lei Ma, Yingfeng Chen, Jingyu Hu, Fan Zhang:
GameRTS: A Regression Testing Framework for Video Games. 1393-1404 - Amir Ghorbani, Nathan Cassee, Derek Robinson

, Adam Alami, Neil A. Ernst, Alexander Serebrenik
, Andrzej Wasowski
:
Autonomy Is An Acquired Taste: Exploring Developer Preferences for GitHub Bots. 1405-1417 - Donald Pinckney, Federico Cassano, Arjun Guha

, Jonathan Bell, Massimiliano Culpo, Todd Gamblin:
Flexible and Optimal Dependency Management via Max-SMT. 1418-1429 - Nan Jiang

, Kevin Liu, Thibaud Lutellier
, Lin Tan:
Impact of Code Language Models on Automated Program Repair. 1430-1442 - Qihao Zhu, Zeyu Sun, Wenjie Zhang

, Yingfei Xiong, Lu Zhang:
Tare: Type-Aware Neural Program Repair. 1443-1455 - Xiangxin Meng, Xu Wang, Hongyu Zhang, Hailong Sun, Xudong Liu, Chunming Hu:

Template-based Neural Program Repair. 1456-1468 - Zhiyu Fan

, Xiang Gao, Martin Mirchev, Abhik Roychoudhury, Shin Hwei Tan:
Automated Repair of Programs from Large Language Models. 1469-1481 - Chunqiu Steven Xia, Yuxiang Wei

, Lingming Zhang:
Automated Program Repair in the Era of Large Pre-trained Language Models. 1482-1494 - Zejun Zhang, Zhenchang Xing, Xin Xia, Xiwei Xu, Liming Zhu, Qinghua Lu:

Faster or Slower? Performance Mystery of Python Idioms Unveiled with Empirical Evidence. 1495-1507 - Pavel Reich, Walid Maalej:

Testability Refactoring in Pull Requests: Patterns and Trends. 1508-1519 - Catarina Gamboa

, Paulo Canelas, Christopher Steven Timperley, Alcides Fonseca:
Usability-Oriented Design of Liquid Types for Java. 1520-1532 - Usman Gohar

, Sumon Biswas
, Hridesh Rajan:
Towards Understanding Fairness and its Composition in Ensemble Machine Learning. 1533-1545 - Sumon Biswas

, Hridesh Rajan:
Fairify: Fairness Verification of Neural Networks. 1546-1558 - Jiri Gesi, Xinyun Shen, Yunfan Geng, Qihong Chen, Iftekhar Ahmed:

Leveraging Feature Bias for Scalable Misprediction Explanation of Machine Learning Models. 1559-1570 - Verya Monjezi

, Ashutosh Trivedi, Gang Tan, Saeid Tizpaz-Niari:
Information-Theoretic Testing and Debugging of Fairness Defects in Deep Neural Networks. 1571-1582 - Kaifa Zhao, Xian Zhan, Le Yu, Shiyao Zhou, Hao Zhou, Xiapu Luo, Haoyu Wang, Yepang Liu:

Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps. 1583-1595 - Zhiyuan Chang, Mingyang Li, Qing Wang, Shoubin Li, Junjie Wang:

Cross-Domain Requirements Linking via Adversarial-based Domain Adaptation. 1596-1608 - Viktoria Koscinski

, Sara Hashemi, Mehdi Mirakhorli
:
On-Demand Security Requirements Synthesis with Relational Generative Adversarial Networks. 1609-1621 - Ita Ryan, Utz Roedig, Klaas-Jan Stol:

Measuring Secure Coding Practice and Culture: A Finger Pointing at the Moon is not the Moon. 1622-1634 - Setu Kumar Basak

, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts? 1635-1647 - Xinyuan Miao

, Ziyi Lin, Shaojun Wang, Lei Yu, Sanhong Li, Zihan Wang, Pengbo Nie, Yuting Chen, Beijun Shen, He Jiang:
Lejacon: A Lightweight and Efficient Approach to Java Confidential Computing on SGX. 1648-1660 - Jeffy Jahfar Poozhithara, Hazeline U. Asuncion, Brent Lagesse

:
Keyword Extraction From Specification Documents for Planning Security Mechanisms. 1661-1673 - Wuxia Jin, Yitong Dai, Jianguo Zheng, Yu Qu

, Ming Fan, Zhenyu Huang, Dezhi Huang, Ting Liu:
Dependency Facade: The Coupling and Conflicts between Android Framework and Its Customization. 1674-1686 - Shuai Wang, Xinyu Lian, Darko Marinov, Tianyin Xu:

Test Selection for Unified Regression Testing. 1687-1699 - Rongqi Pan, Taher Ahmed Ghaleb, Lionel C. Briand:

ATM: Black-box Test Case Minimization based on Test Code Similarity and Evolutionary Search. 1700-1711 - Soneya Binta Hossain, Matthew B. Dwyer

, Sebastian G. Elbaum, Anh Nguyen-Tuong:
Measuring and Mitigating Gaps in Structural Testing. 1712-1723 - Cheryl Lee, Tianyi Yang, Zhuangbin Chen, Yuxin Su, Yongqiang Yang, Michael R. Lyu:

Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal Attention. 1724-1736 - Toufique Ahmed, Supriyo Ghosh, Chetan Bansal, Thomas Zimmermann, Xuchao Zhang, Saravan Rajmohan:

Recommending Root-Cause and Mitigation Steps for Cloud Incidents using Large Language Models. 1737-1749 - Cheryl Lee, Tianyi Yang, Zhuangbin Chen, Yuxin Su, Michael R. Lyu:

Eadro: An End-to-End Troubleshooting Framework for Microservices on Multi-source Data. 1750-1762 - Guangba Yu

, Pengfei Chen, Pairui Li, Tianjun Weng, Haibing Zheng, Yuetang Deng, Zibin Zheng:
LogReducer: Identify and Reduce Log Hotspots in Kernel on the Fly. 1763-1775 - Qiang Hu, Yuejun Guo, Xiaofei Xie

, Maxime Cordy, Mike Papadakis, Lei Ma, Yves Le Traon:
Aries: Efficient Testing of Deep Neural Networks via Labeling-Free Accuracy Estimation. 1776-1787 - Zhenlan Ji

, Pingchuan Ma, Yuanyuan Yuan, Shuai Wang:
CC: Causality-Aware Coverage Criterion for Deep Neural Networks. 1788-1800 - Chunqiu Steven Xia, Saikat Dutta, Sasa Misailovic, Darko Marinov, Lingming Zhang:

Balancing Effectiveness and Flakiness of Non-Deterministic Machine Learning Tests. 1801-1813 - Fitash Ul Haq, Donghwan Shin

, Lionel C. Briand:
Many-Objective Reinforcement Learning for Online Testing of DNN-Enabled Systems. 1814-1826 - Linyi Li, Yuhao Zhang, Luyao Ren, Yingfei Xiong, Tao Xie:

Reliability Assurance for Deep Neural Network Architectures Against Numerical Defects. 1827-1839 - Haoran Yang, Weile Lian, Shaowei Wang, Haipeng Cai

:
Demystifying Issues, Challenges, and Solutions for Multilingual Software Development. 1840-1852 - Bonan Kou, Muhao Chen, Tianyi Zhang:

Automated Summarization of Stack Overflow Posts. 1853-1865 - Roy Rutishauser, André A. Meyer, Reid Holmes, Thomas Fritz:

Semi-Automatic, Inline and Collaborative Web Page Code Curations. 1866-1877 - Weifeng Pan, Xin Du, Ming Hua, Dae-Kyoo Kim, Zijiang Yang:

Identifying Key Classes for Initial Software Comprehension: Can We Do It Better? 1878-1889 - Daye Nam

, Brad A. Myers, Bogdan Vasilescu, Vincent J. Hellendoorn:
Improving API Knowledge Discovery with ML: A Case Study of Comparable API Methods. 1890-1906 - Marvin Muñoz Barón

, Marvin Wyrich, Daniel Graziotin, Stefan Wagner
:
Evidence Profiles for Validity Threats in Program Comprehension Experiments. 1907-1919 - Abir Bouraffa, Gian-Luca Fuhrmann, Walid Maalej:

Developers' Visuo-spatial Mental Model and Program Comprehension. 1920-1932 - Shuzheng Gao, Cuiyun Gao, Chaozheng Wang, Jun Sun, David Lo

, Yue Yu:
Two Sides of the Same Coin: Exploiting the Impact of Identifiers in Neural Code Comprehension. 1933-1945 - Dehai Zhao, Zhenchang Xing, Xin Xia, Deheng Ye, Xiwei Xu, Liming Zhu:

SeeHow: Workflow Extraction from Programming Screencasts through Action-Aware Video Analytics. 1946-1957 - S. M. Hasan Mansur, Sabiha Salma, Damilola Awofisayo, Kevin Moran:

AidUI: Toward Automated Recognition of Dark Patterns in User Interfaces. 1958-1970 - Rahulkrishna Yandrapally, Saurabh Sinha, Rachel Tzoref-Brill, Ali Mesbah:

Carving UI Tests to Generate API Tests and API Specification. 1971-1982 - Zhe Liu

, Chunyang Chen, Junjie Wang, Yuhui Su, Yuekai Huang, Jun Hu, Qing Wang:
Ex pede Herculem: Augmenting Activity Transition Graph for Apps via Graph Convolution Network. 1983-1995 - Sean McGuire, Erin Schultz, Bimpe Ayoola, Paul Ralph:

Sustainability is Stratified: Toward a Better Theory of Sustainable Software Engineering. 1996-2008 - Yanyan Yan, Yang Feng, Hongcheng Fan, Baowen Xu:

DLInfer: Deep Learning with Static Slicing for Python Type Inference. 2009-2021 - Ping Yu, Yijian Wu, Xin Peng, Jiahan Peng, Jian Zhang, Peicheng Xie, Wenyun Zhao:

ViolationTracker: Building Precise Histories for Static Analysis Violations. 2022-2034 - Junjie Chen, Chenyao Suo, Jiajun Jiang, Peiqi Chen, Xingjian Li:

Compiler Test-Program Generation via Memoized Configuration Search. 2035-2047 - Cong Yan, Suman Nath, Shan Lu:

Generating Test Databases for Database-Backed Applications. 2048-2059 - Jinsheng Ba, Manuel Rigger:

Testing Database Engines via Query Plan Guidance. 2060-2071 - Jiansen Song

, Wensheng Dou, Ziyu Cui, Qianwang Dai, Wei Wang, Jun Wei, Hua Zhong, Tao Huang:
Testing Database Systems via Differential Query Execution. 2072-2084 - Stefan Mühlbauer

, Florian Sattler, Christian Kaltenecker, Johannes Dorn, Sven Apel, Norbert Siegmund:
Analysing the Impact of Workloads on Modeling the Performance of Configurable Software Systems. 2085-2097 - Max Weber, Christian Kaltenecker, Florian Sattler, Sven Apel, Norbert Siegmund:

Twins or False Friends? A Study on Energy Consumption and Performance of Configurable Software. 2098-2110 - Pengyu Nie, Rahul Banerjee, Junyi Jessy Li, Raymond J. Mooney, Milos Gligoric:

Learning Deep Semantics for Test Completion. 2111-2123 - Jia Li, Yongmin Li

, Ge Li, Zhi Jin, Yiyang Hao, Xing Hu:
SkCoder: A Sketch-based Approach for Automatic Code Generation. 2124-2135 - Changan Niu

, Chuanyi Li, Vincent Ng, Dongxiao Chen, Jidong Ge, Bin Luo:
An Empirical Comparison of Pre-Trained Models of Source Code. 2136-2148 - Antonio Mastropaolo

, Luca Pascarella, Emanuela Guglielmi
, Matteo Ciniselli, Simone Scalabrino, Rocco Oliveto, Gabriele Bavota:
On the Robustness of Code Generation Techniques: An Empirical Study on GitHub Copilot. 2149-2160 - Matteo Ciniselli, Luca Pascarella, Emad Aghajani, Simone Scalabrino, Rocco Oliveto, Gabriele Bavota:

Source Code Recommender Systems: The Practitioners' Perspective. 2161-2172 - Solal Pirelli, George Candea:

Safe Low-Level Code Without Overhead is Practical. 2173-2184 - Will Leeson

, Matthew B. Dwyer
, Antonio Filieri:
Sibyl: Improving Software Engineering Tools with SMT Selection. 2185-2197 - Ensheng Shi, Yanlin Wang

, Wenchao Gu, Lun Du, Hongyu Zhang, Shi Han, Dongmei Zhang, Hongbin Sun:
CoCoSoDa: Effective Contrastive Learning for Code Search. 2198-2210 - Yu Gao, Wensheng Dou, Dong Wang, Wenhan Feng

, Jun Wei, Hua Zhong, Tao Huang:
Coverage Guided Fault Injection for Cloud Systems. 2211-2223 - Jongwook Kim, Sunbeom So

, Hakjoo Oh:
Diver: Oracle-Guided SMT Solver Testing with Unrestricted Random Mutations. 2224-2236 - Benjamin Steenhoek, Md Mahbubur Rahman, Richard Jiles, Wei Le:

An Empirical Study of Deep Learning Models for Vulnerability Detection. 2237-2248 - Wenbo Wang, Tien N. Nguyen, Shaohua Wang, Yi Li, Jiyuan Zhang, Aashish Yadavally:

DeepVD: Toward Class-Separation Features for Neural Network Vulnerability Detection. 2249-2261 - Bin Yuan, Yifan Lu, Yilin Fang, Yueming Wu

, Deqing Zou, Zhen Li, Zhi Li, Hai Jin:
Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model. 2262-2274 - Xin-Cheng Wen, Yupan Chen, Cuiyun Gao, Hongyu Zhang, Jie M. Zhang, Qing Liao:

Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning. 2275-2286 - Xu Yang

, Shaowei Wang, Yi Li, Shaohua Wang:
Does data sampling improve deep learning-based vulnerability detection? Yeas! and Nays! 2287-2298 - Jinyang Liu

, Shilin He, Zhuangbin Chen, Liqun Li, Yu Kang
, Xu Zhang, Pinjia He, Hongyu Zhang, Qingwei Lin, Zhangwei Xu, Saravan Rajmohan, Dongmei Zhang, Michael R. Lyu:
Incident-aware Duplicate Ticket Aggregation for Cloud Systems. 2299-2311 - Sungmin Kang, Juyeon Yoon

, Shin Yoo:
Large Language Models are Few-shot Testers: Exploring LLM-based General Bug Reproduction. 2312-2323 - Hao-Nan Zhu, Cindy Rubio-González:

On the Reproducibility of Software Defect Datasets. 2324-2335 - Yuchao Huang, Junjie Wang, Zhe Liu, Song Wang, Chunyang Chen, Mingyang Li, Qing Wang:

Context-aware Bug Reproduction for Mobile Apps. 2336-2348 - Sidong Feng, Mulong Xie, Yinxing Xue, Chunyang Chen:

Read It, Don't Watch It: Captioning Bug Recordings Automatically. 2349-2361 - Binger Chen, Ziawasch Abedjan:

Duetcs: Code Style Transfer through Generation and Retrieval. 2362-2373 - Elisabeth Griebl

, Benedikt Fein
, Florian Obermüller, Gordon Fraser, René Just:
On the Applicability of Language Models to Block-Based Programs. 2374-2386 - Wenxuan Wang, Jen-tse Huang

, Weibin Wu, Jianping Zhang, Yizhan Huang, Shuqing Li
, Pinjia He, Michael R. Lyu:
MTTM: Metamorphic Testing for Textual Content Moderation Software. 2387-2399 - Dongwei Xiao

, Zhibo Liu, Shuai Wang:
Metamorphic Shader Fusion for Testing Graphics Shader Compilers. 2400-2412 - Matteo Paltenghi

, Michael Pradel:
MorphQ: Metamorphic Testing of the Qiskit Quantum Computing Platform. 2413-2424 - Rosalia Tufano

, Luca Pascarella, Gabriele Bavota:
Automating Code-Related Tasks Through Transformers: The Impact of Pre-training. 2425-2437 - Van-Hoang Le

, Hongyu Zhang:
Log Parsing with Prompt-based Few-shot Learning. 2438-2449 - Noor Nashid, Mifta Sintaha, Ali Mesbah:

Retrieval-Based Prompt Selection for Code-Related Few-Shot Learning. 2450-2462 - Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis

:
An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry. 2463-2475 - Shangqing Liu, Bozhi Wu, Xiaofei Xie

, Guozhu Meng, Yang Liu
:
ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning. 2476-2487 - Xizao Wang

, Zhiqiang Zuo, Lei Bu
, Jianhua Zhao:
DStream: A Streaming-Based Highly Parallel IFDS Framework. 2488-2500 - Aashish Yadavally, Tien N. Nguyen, Wenbo Wang, Shaohua Wang:

(Partial) Program Dependence Learning. 2501-2513 - Yicheng Ouyang, Kailai Shao, Kunqiu Chen, Ruobing Shen, Chao Chen, Mingze Xu, Yuqun Zhang, Lingming Zhang:

MirrorTaint: Practical Non-intrusive Dynamic Taint Tracking for JVM-based Microservice Systems. 2514-2526 - Yu Nong, Yuzhe Ou, Michael Pradel, Feng Chen, Haipeng Cai

:
VULGEN: Realistic Vulnerability Generation Via Pattern Mining and Deep Learning. 2527-2539 - Lyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen, Lingling Fan, Lida Zhao, Jiahui Wu, Yang Liu

:
Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects. 2540-2552 - Davide Corradini, Michele Pasqua, Mariano Ceccato

:
Automated Black-Box Testing of Mass Assignment Vulnerabilities in RESTful APIs. 2553-2564 - Jiayuan Zhou, Michael Pacheco, Jinfu Chen

, Xing Hu, Xin Xia, David Lo
, Ahmed E. Hassan:
CoLeFunDa: Explainable Silent Vulnerability Fix Identification. 2565-2577 - Christopher M. Poskitt

, Yuqi Chen, Jun Sun, Yu Jiang:
Finding Causally Different Tests for an Industrial Control System. 2578-2590 - Yuqi Huai

, Yuntianyi Chen
, Sumaya Almanee
, Tuan Ngo
, Xiang Liao
, Ziwen Wan
, Qi Alfred Chen
, Joshua Garcia
:
Doppelgänger Test Generation for Revealing Bugs in Autonomous Driving Software. 2591-2603 - Garrett Christian, Trey Woodlief

, Sebastian G. Elbaum:
Generating Realistic and Diverse Tests for LiDAR-Based Perception Systems. 2604-2616 - Mariam Guizani

, Aileen Abril Castro-Guzman, Anita Sarma, Igor Steinmacher:
Rules of Engagement: Why and How Companies Participate in OSS. 2617-2629 - Boming Xia, Tingting Bi

, Zhenchang Xing, Qinghua Lu, Liming Zhu:
An Empirical Study on Software Bill of Materials: Where We Stand and the Road Ahead. 2630-2642

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














