


default search action
38th ASE 2023: Luxembourg
- 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, Luxembourg, September 11-15, 2023. IEEE 2023, ISBN 979-8-3503-2996-4

- Tegawendé F. Bissyandé, Jacques Klein, Christian Bird, Federica Sarro:

Message from the Chairs: ASE 2023. xxxii-xxxv - Haibin Zheng, Jinyin Chen, Haibo Jin

:
CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature Space. 1-13 - Tsz On Li, Wenxi Zong, Yibo Wang, Haoye Tian

, Ying Wang, Shing-Chi Cheung, Jeff Kramer:
Nuances are the Key: Unlocking ChatGPT to Find Failure-Inducing Tests with Differential Prompting. 14-26 - Zhen Li, Ruqian Zhang

, Deqing Zou, Ning Wang, Yating Li, Shouhuai Xu, Chen Chen, Hai Jin:
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers. 27-39 - Xin Zhou, Kisub Kim, Bowen Xu, Jiakun Liu, DongGyun Han

, David Lo
:
The Devil is in the Tails: How Long-Tailed Code Distributions Impact Large Language Models. 40-52 - Chunyang Meng, Shijie Song, Haogang Tong, Maolin Pan, Yang Yu:

DeepScaler: Holistic Autoscaling for Microservices Based on Spatiotemporal GNN with Adaptive Graph Learning. 53-65 - Jun Huang, Yang Yang, Hang Yu, Jianguo Li, Xiao Zheng:

Twin Graph-Based Anomaly Detection via Attentive Multi-Modal Learning for Microservice System. 66-78 - Yiru Chen, Chenxi Zhang

, Zhen Dong, Dingyu Yang, Xin Peng, Jiayu Ou, Hong Yang, Zheshun Wu, Xiaojun Qu, Wei Li:
Dynamic Graph Neural Networks-Based Alert Link Prediction for Online Service Systems. 79-90 - Shangshu Qian

, Wen Fan, Lin Tan, Yongle Zhang:
Vicious Cycles in Distributed Software Systems. 91-103 - Yang Hu, Wenxi Wang, Sarfraz Khurshid, Kenneth L. McMillan, Mohit Tiwari

:
Fixing Privilege Escalations in Cloud Access Control with MaxSAT and Graph Neural Networks. 104-115 - Cheryl Lee, Tianyi Yang, Zhuangbin Chen, Yuxin Su, Michael R. Lyu:

Maat: Performance Metric Anomaly Anticipation for Cloud Services with Conditional Diffusion. 116-128 - Zhenhao Li, An Ran Chen, Xing Hu, Xin Xia, Tse-Hsun Chen

, Weiyi Shang:
Are They All Good? Studying Practitioners' Expectations on the Readability of Log Messages. 129-140 - Xuheng Wang, Jiaxing Song, Xu Zhang, Junshu Tang, Weihe Gao

, Qingwei Lin:
LogOnline: A Semi-Supervised Log-Based Anomaly Detector Aided with Online Learning Mechanism. 141-152 - Rungroj Maipradit, Dong Wang, Patanamon Thongtanunam, Raula Gaikovina Kula, Yasutaka Kamei, Shane McIntosh:

Repeated Builds During Code Review: An Empirical Study of the OpenStack Community. 153-165 - Wenbo Guo, Zhengzi Xu, Chengwei Liu, Cheng Huang, Yong Fang, Yang Liu

:
An Empirical Study of Malicious Code In PyPI Ecosystem. 166-177 - Weiwei Xu

, Hao He, Kai Gao, Minghui Zhou:
Understanding and Remediating Open-Source License Incompatibilities in the PyPI Ecosystem. 178-190 - Lyuye Zhang, Chengwei Liu, Sen Chen, Zhengzi Xu, Lingling Fan, Lida Zhao, Yiran Zhang, Yang Liu

:
Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem. 191-203 - Liang Wang, Zhiwen Zheng, Xiangchen Wu, Baihui Sang, Jierui Zhang, Xianping Tao:

Fork Entropy: Assessing the Diversity of Open Source Software Projects' Forks. 204-216 - Chenyuan Zhang, Yanlin Wang

, Zhao Wei, Yong Xu, Juhong Wang, Hui Li, Rongrong Ji:
EALink: An Efficient and Accurate Pre-Trained Framework for Issue-Commit Link Recovery. 217-229 - Shengyou Hu, Huayao Wu

, Peng Wang
, Jing Chang, Yongjun Tu, Xiu Jiang, Xintao Niu, Changhai Nie:
ATOM: Automated Black-Box Testing of Multi-Label Image Classification Systems. 230-242 - Zhuo Li, Xiongfei Wu

, Derui Zhu, Mingfei Cheng, Siyuan Chen, Fuyuan Zhang, Xiaofei Xie
, Lei Ma, Jianjun Zhao:
Generative Model-Based Testing on Decision-Making Policies. 243-254 - Sarthak Chakraborty, Shubham Agarwal, Shaddy Garg, Abhimanyu Sethia, Udit Narayan Pandey, Videh Aggarwal, Shiv Kumar Saini:

ESRO: Experience Assisted Service Reliability against Outages. 255-267 - Jinyang Liu

, Zhihan Jiang
, Jiazhen Gu, Junjie Huang
, Zhuangbin Chen, Cong Feng, Zengyin Yang, Yongqiang Yang, Michael R. Lyu:
Prism: Revealing Hidden Functional Clusters from Massive Instances in Cloud Systems. 268-280 - Alessandro Tundo, Marco Mobilio, Shashikant Ilager, Ivona Brandic, Ezio Bartocci, Leonardo Mariani:

An Energy-Aware Approach to Design Self-Adaptive AI-based Applications on the Edge. 281-293 - Sicheng Hao, Yuhong Nan, Zibin Zheng, Xiaohui Liu:

SmartCoCo: Checking Comment-Code Inconsistency in Smart Contracts via Constraint Propagation and Binding. 294-306 - Wentao Liang, Xiang Ling, Jingzheng Wu, Tianyue Luo, Yanjun Wu:

A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering. 307-318 - Yujiang Gui, Dongjie He, Jingling Xue:

Merge-Replay: Efficient IFDS-Based Taint Analysis by Consolidating Equivalent Value Flows. 319-331 - Jian Zhang, Shangqing Liu, Xu Wang, Tianlin Li, Yang Liu

:
Learning to Locate and Describe Vulnerabilities. 332-344 - Xin-Cheng Wen, Xinchen Wang, Cuiyun Gao, Shaohua Wang, Yang Liu

, Zhaoquan Gu:
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection. 345-357 - Ziyou Jiang

, Lin Shi
, Guowei Yang
, Qing Wang:
SCPatcher: Mining Crowd Security Discussions to Enrich Secure Coding Practices. 358-370 - Zhenlan Ji

, Pingchuan Ma, Shuai Wang, Yanhui Li
:
Causality-Aided Trade-Off Analysis for Machine Learning Fairness. 371-383 - Tamal Mondal, Scott Barnett, Akash Lal, Jyothi Vedurada:

Cell2Doc: ML Pipeline for Generating Documentation in Computational Notebooks. 384-396 - Jiaxing Liu, Chaofeng Sha, Xin Peng:

An Empirical Study of Parameter-Efficient Fine-Tuning Methods for Pre-Trained Code Models. 397-408 - Nikitha Rao, Kush Jain, Uri Alon, Claire Le Goues

, Vincent J. Hellendoorn:
CAT-LM Training Language Models on Aligned Code And Tests. 409-420 - Ze Tang

, Jidong Ge, Shangqing Liu, Tingwei Zhu, Tongtong Xu, Liguo Huang
, Bin Luo:
Domain Adaptive Code Completion via Language Models and Decoupled Domain Databases. 421-433 - Mingwei Liu, Tianyong Yang, Yiling Lou, Xueying Du, Ying Wang, Xin Peng:

CodeGen4Libs: A Two-Stage Approach for Library-Oriented Code Generation. 434-445 - Myeongsoo Kim, Saurabh Sinha, Alessandro Orso:

Adaptive REST API Testing with Reinforcement Learning. 446-458 - Alexi Turcotte, Satyajit Gokhale, Frank Tip:

Increasing the Responsiveness of Web Applications by Introducing Lazy Loading. 459-470 - Qing Huang, Zhenyu Wan, Zhenchang Xing, Changjing Wang, Jieshan Chen

, Xiwei Xu, Qinghua Lu:
Let's Chat to Find the APIs: Connecting Human, LLM and Knowledge Graph through AI Chain. 471-483 - Tai Nguyen, Yifeng Di

, Joohan Lee, Muhao Chen, Tianyi Zhang:
Software Entity Recognition with Noise-Robust Learning. 484-496 - Yintong Huo

, Yichen Li
, Yuxin Su, Pinjia He, Zifan Xie
, Michael R. Lyu:
AutoLog: A Log Sequence Synthesis Framework for Anomaly Detection. 497-509 - Yi Liu, Yuekang Li

, Gelei Deng, Felix Juefei-Xu, Yao Du, Cen Zhang, Chengwei Liu, Yeting Li, Lei Ma, Yang Liu
:
ASTER: Automatic Speech Recognition System Accessibility Testing for Stutterers. 510-521 - Chunqiu Steven Xia, Yifeng Ding, Lingming Zhang:

The Plastic Surgery Hypothesis in the Era of Large Language Models. 522-534 - Quanjun Zhang

, Chunrong Fang, Tongke Zhang, Bowen Yu, Weisong Sun, Zhenyu Chen:
Gamma: Revisiting Template-Based Automated Program Repair Via Mask Prediction. 535-547 - Yi Li, Shaohua Wang, Tien N. Nguyen:

Contextuality of Code Representation Learning. 548-559 - Zhao Tian, Junjie Chen, Xiangyu Zhang:

On-the-fly Improving Performance of Deep Code Models via Input Denoising. 560-572 - Antonio Vitale, Valentina Piantadosi

, Simone Scalabrino, Rocco Oliveto:
Using Deep Learning to Automatically Improve Code Readability. 573-584 - Antonio Mastropaolo, Massimiliano Di Penta, Gabriele Bavota:

Towards Automatically Addressing Self-Admitted Technical Debt: How Far Are We? 585-597 - Prantik Chatterjee, Pankaj Kumar Kalita, Sumit Lahiri

, Sujit Kumar Muduli, Vishal Singh, Gourav Takhar, Subhajit Roy:
An Integrated Program Analysis Framework for Graduate Courses in Programming Languages and Software Engineering. 598-610 - Nikhil Parasaram, Earl T. Barr, Sergey Mechtaev, Marcel Böhme:

Precise Data-Driven Approximation for Program Analysis via Fuzzing. 611-623 - Chenghang Shi, Haofeng Li

, Yulei Sui, Jie Lu, Lian Li, Jingling Xue:
Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis. 624-636 - G. M. Shahariar

, Tahmid Hasan, Anindya Iqbal, Gias Uddin:
Contrastive Learning for API Aspect Analysis. 637-648 - Xinyue Liu

, Lukasz Ziarek:
PTDETECTOR: An Automated JavaScript Front-end Library Detector. 649-660 - Shuyao Jiang

, Ruiying Zeng, Zihao Rao, Jiazhen Gu, Yangfan Zhou, Michael R. Lyu:
Revealing Performance Issues in Server-Side WebAssembly Runtimes Via Differential Testing. 661-672 - Peisen Yao, Jingyu Ke, Jiahui Sun, Hongfei Fu, Rongxin Wu, Kui Ren:

Demystifying Template-Based Invariant Generation for Bit-Vector Programs. 673-685 - Yao Zhang, Xiaofei Xie

, Yi Li, Sen Chen, Cen Zhang, Xiaohong Li:
EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software. 686-697 - Stanly Samuel, Deepak D'Souza, Raghavan Komondoor:

Symbolic Fixpoint Algorithms for Logical LTL Games. 698-709 - Liran Wang, Xunzhu Tang, Yichen He

, Changyu Ren, Shuhua Shi, Chaoran Yan, Zhoujun Li:
Delving into Commit-Issue Correlation to Enhance Commit Message Generation Models. 710-722 - Aleksandra Eliseeva, Yaroslav Sokolov, Egor Bogomolov, Yaroslav Golubev, Danny Dig, Timofey Bryksin:

From Commit Message Generation to History-Aware Commit Message Completion. 723-735 - Jingbo Lu, Dongjie He, Wei Li, Yaoqing Gao

, Jingling Xue:
Automatic Generation and Reuse of Precise Library Summaries for Object-Sensitive Pointer Analysis. 736-747 - Chong Wang, Yiling Lou, Junwei Liu

, Xin Peng:
Generating Variable Explanations via Zero-shot Prompt Learning. 748-760 - Shuzheng Gao, Xin-Cheng Wen, Cuiyun Gao, Wenxuan Wang, Hongyu Zhang, Michael R. Lyu:

What Makes Good In-Context Demonstrations for Code Intelligence Tasks with LLMs? 761-773 - Jiaqi Xiong, Guoqiang Chen, Kejiang Chen

, Han Gao, Shaoyin Cheng
, Weiming Zhang:
HexT5: Unified Pre-Training for Stripped Binary Code Information Inference. 774-786 - Linyu Li, Sihan Xu, Yang Liu

, Ya Gao, Xiangrui Cai, Jiarun Wu, Wenli Song, Zheli Liu:
LiSum: Open Source Software License Summarization with Multi-Task Learning. 787-799 - Wenxin Xiao, Jingyue Li

, Hao He, Ruiqiao Qiu, Minghui Zhou:
Personalized First Issue Recommender for Newcomers in Open Source Projects. 800-812 - Yingying He, Wenhua Yang, Minxue Pan, Yasir Hussain, Yu Zhou:

Understanding and Enhancing Issue Prioritization in GitHub. 813-824 - Yuqiang Sun

, Zhengzi Xu, Chengwei Liu, Yiran Zhang, Yang Liu
:
Who is the Real Hero? Measuring Developer Contribution via Multi-Dimensional Data Integration. 825-836 - Mukelabai Mukelabai, Christoph Derks, Jacob Krüger, Thorsten Berger:

To Share, or Not to Share: Exploring Test-Case Reusability in Fork Ecosystems. 837-849 - Zhao Tian, Junjie Chen, Zhi Jin:

Code Difference Guided Adversarial Example Generation for Deep Code Models. 850-862 - Neng Zhang, Qinde Chen, Zibin Zheng, Ying Zou:

iASTMapper: An Iterative Similarity-Based Abstract Syntax Tree Mapping Algorithm. 863-874 - Jia Li, Chongyang Tao, Zhi Jin, Fang Liu, Jia Li, Ge Li:

ZC3: Zero-Shot Cross-Language Code Clone Detection. 875-887 - Johannes Düsing

, Ben Hermann
:
Persisting and Reusing Results of Static Program Analyses on a Large Scale. 888-900 - Talank Baral, Shanto Rahman, Bala Naren Chanumolu, Basak Balci, Tuna Tuncer, August Shi, Wing Lam:

Optimizing Continuous Development by Detecting and Preventing Unnecessary Content Generation. 901-913 - Wensheng Tang, Chengpeng Wang, Peisen Yao, Rongxin Wu, Xianjin Fu, Gang Fan, Charles Zhang:

DCLINK: Bridging Data Constraint Changes and Implementations in FinTech Systems. 914-925 - Paschal C. Amusuo, Ricardo Andrés Calvo Méndez, Zhongwei Xu, Aravind Machiry, James C. Davis

:
Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks. 926-938 - Shiyao Zhou, Muhui Jiang, Weimin Chen, Hao Zhou, Haoyu Wang, Xiapu Luo:

WADIFF: A Differential Testing Framework for WebAssembly Runtimes. 939-950 - Xiaoyin Wang, Tahmid Rafi

, Na Meng:
VRGuide: Efficient Testing of Virtual Reality Scenes via Dynamic Cut Coverage. 951-962 - Yanju Chen

, Chenglong Wang, Xinyu Wang
, Osbert Bastani, Yu Feng:
Fast and Reliable Program Synthesis via User Interaction. 963-975 - Xiaoxue Ren, Xinyuan Ye, Dehai Zhao, Zhenchang Xing, Xiaohu Yang:

From Misuse to Mastery: Enhancing Code Generation with Knowledge-Driven AI Chaining. 976-987 - Yun Peng, Chaozheng Wang, Wenxuan Wang, Cuiyun Gao, Michael R. Lyu:

Generative Type Inference for Python. 988-999 - Mingxuan Zhu, Dan Hao:

Compiler Auto-Tuning via Critical Flag Selection. 1000-1011 - Atish Kumar Dipongkor, Kevin Moran:

A Comparative Study of Transformer-Based Neural Text Representation Techniques on Bug Triaging. 1012-1023 - Lingxiao Tang

, Lingfeng Bao, Xin Xia, Zhongdong Huang:
Neural SZZ Algorithm. 1024-1035 - Cedric Richter, Heike Wehrheim:

How to Train Your Neural Bug Detector: Artificial vs Real Bugs. 1036-1048 - Baoquan Cui

, Miaomiao Wang, Chi Zhang, Jiwei Yan, Jun Yan, Jian Zhang:
Detection of Java Basic Thread Misuses Based on Static Event Analysis. 1049-1060 - Eric Liu

, Shengjie Xu
, David Lie:
FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers. 1061-1072 - Ran Mo, Yingjie Jiang, Wenjing Zhan, Dongyu Wang, Zengyang Li:

A Comprehensive Study on Code Clones in Automated Driving Software. 1073-1085 - Tao Wang, Wei Chen, Liwei Liu, Guoquan Wu, Jun Wei, Tao Huang:

Detecting Smart Home Automation Application Interferences with Domain Knowledge. 1086-1097 - Szymon Stradowski

, Lech Madeyski
:
Bridging the Gap Between Academia and Industry in Machine Learning Software Defect Prediction: Thirteen Considerations. 1098-1110 - Xing Hu, Zhuang Liu, Xin Xia, Zhongxin Liu, Tongtong Xu, Xiaohu Yang:

Identify and Update Test Cases When Production Code Changes: A Transformer-Based Approach. 1111-1122 - Weifeng Sun

, Hongyan Li
, Meng Yan, Yan Lei, Hongyu Zhang:
Revisiting and Improving Retrieval-Augmented Deep Assertion Generation. 1123-1135 - Mingxuan Xiao, Yan Xiao, Hai Dong

, Shunhui Ji, Pengcheng Zhang:
LEAP: Efficient and Automated Test Method for NLP Software. 1136-1148 - Jiaming Ye, Shangzhou Xia, Fuyuan Zhang, Paolo Arcaini

, Lei Ma, Jianjun Zhao, Fuyuki Ishikawa:
QuraTest: Integrating Quantum Specific Features in Quantum Program Testing. 1149-1161 - Kai Huang, Xiangxin Meng, Jian Zhang, Yang Liu

, Wenjie Wang, Shuhao Li, Yuqing Zhang:
An Empirical Study on Fine-Tuning Large Language Models of Code for Automated Program Repair. 1162-1174 - Arooba Shahoor, Askar Yeltayuly Khamit, Jooyong Yi, Dongsun Kim:

Leakpair: Proactive Repairing of Memory Leaks in Single Page Web Applications. 1175-1187 - Yuanzhang Lin

, Guoyao Wen, Xiang Gao:
Automated Fixing of Web UI Tests via Iterative Element Matching. 1188-1199 - Wenjie Zhang

, Guancheng Wang, Junjie Chen, Yingfei Xiong, Yong Liu, Lu Zhang:
OrdinalFix: Fixing Compilation Errors via Shortest-Path CFL Reachability. 1200-1211 - Zhijie Liu, Liang Feng Zhang, Yutian Tang

:
Enhancing Malware Detection for Android Apps: Detecting Fine-Granularity Malicious Components. 1212-1224 - Vikas Kumar Malviya

, Yan Naing Tun, Chee Wei Leow, Ailys Tee Xynyn, Lwin Khin Shar
, Lingxiao Jiang
:
Fine-Grained In-Context Permission Classification for Android Apps Using Control-Flow Graph Embedding. 1225-1237 - Shaokun Zhang, Hanwen Lei, Yuanpeng Wang, Ding Li, Yao Guo, Xiangqun Chen:

How Android Apps Break the Data Minimization Principle: An Empirical Study. 1238-1250 - Xiangyu Zhang

, Lingling Fan, Sen Chen, Yucheng Su
, Boyuan Li
:
Scene-Driven Exploration and GUI Modeling for Android Apps. 1251-1262 - Yuyi Zhong, Ruiwei Wang, Siau-Cheng Khoo:

Expediting Neural Network Verification via Network Reduction. 1263-1275 - Jingyang Li

, Guoqiang Li:
HOBAT: Batch Verification for Homogeneous Structural Neural Networks. 1276-1287 - Maolin Sun, Yibiao Yang, Yang Wang, Ming Wen, Haoxiang Jia, Yuming Zhou:

SMT Solver Validation Empowered by Large Pre-Trained Language Models. 1288-1300 - Ali Ghanbari

, Deepak-George Thomas, Muhammad Arbab Arshad, Hridesh Rajan:
Mutation-based Fault Localization of Deep Neural Networks. 1301-1313 - Ahmed Haj Yahmed, Rached Bouchoucha, Houssem Ben Braiek, Foutse Khomh:

An Intentional Forgetting-Driven Self-Healing Method for Deep Reinforcement Learning Systems. 1314-1325 - Lwin Khin Shar

, Arda Goknil, Erik Johannes Husom, Sagar Sen, Yan Naing Tun, Kisub Kim:
AutoConf: Automated Configuration of Unsupervised Learning Systems Using Metamorphic Testing and Bayesian Optimization. 1326-1338 - Wenxuan Wang, Jingyuan Huang, Jen-tse Huang

, Chang Chen, Jiazhen Gu, Pinjia He, Michael R. Lyu:
An Image is Worth a Thousand Toxic Words: A Metamorphic Testing Framework for Content Moderation Software. 1339-1351 - Yuanjie Xia

, Zishuo Ding, Weiyi Shang:
CoMSA: A Modeling-Driven Sampling Approach for Configuration Performance Testing. 1352-1363 - Zongze Jiang, Ming Wen, Yixin Yang, Chao Peng

, Ping Yang, Hai Jin:
Effective Concurrency Testing for Go via Directional Primitive-Constrained Interleaving Exploration. 1364-1376 - Jaekwon Lee

, Enrico Viganò, Oscar Cornejo, Fabrizio Pastore
, Lionel C. Briand:
Fuzzing for CPS Mutation Testing. 1377-1389 - Yonghui Liu

, Xiao Chen, Pei Liu, John Grundy, Chunyang Chen, Li Li:
ReuNify: A Step Towards Whole Program Analysis for React Native Android Apps. 1390-1402 - Shi Meng, Liu Wang, Shenao Wang

, Kailong Wang
, Xusheng Xiao, Guangdong Bai
, Haoyu Wang:
Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs. 1403-1415 - Ruihua Ji, Tingwei Zhu, Xiaoqing Zhu, Chunyang Chen, Minxue Pan, Tian Zhang:

Vision-Based Widget Mapping for Test Migration Across Mobile Platforms: Are We There Yet? 1416-1428 - Xutong Ma

, Jiwei Yan, Hao Zhang, Jun Yan, Jian Zhang:
Detecting Memory Errors in Python Native Code by Tracking Object Lifecycle with Reference Count. 1429-1440 - Zuoyan Zhang

, Bei Zhou, Jiangwei Hao, Hongru Yang, Mengqi Cui, Yuchang Zhou, Guanghui Song
, Fei Li, Jinchen Xu, Jie Zhao:
Eiffel: Inferring Input Ranges of Significant Floating-point Errors via Polynomial Extrapolation. 1441-1453 - Zhenlan Ji

, Pingchuan Ma, Shuai Wang:
Perfce: Performance Debugging on Databases with Chaos Engineering-Enhanced Causality Analysis. 1454-1466 - Shuai Shao

, Tingting Yu:
Information Retrieval-Based Fault Localization for Concurrent Programs. 1467-1479 - Thomas Hirsch, Birgit Hofer

:
The MAP Metric in Information Retrieval Fault Localization. 1480-1491 - Abdulkarim Malkadi, Ahmad Tayeb

, Sonia Haiduc:
Improving Code Extraction from Coding Screencasts Using a Code-Aware Encoder-Decoder Model. 1492-1504 - Shuai Zhang, Xiaodong Gu, Yuting Chen, Beijun Shen:

InfeRE: Step-by-Step Regex Generation via Chain of Inference. 1505-1515 - Daniel Ramos

, Hailie Mitchell, Inês Lynce
, Vasco Manquinho
, Ruben Martins, Claire Le Goues
:
MELT: Mining Effective Lightweight Transformations from Pull Requests. 1516-1528 - Mingsheng Jiao, Tingrui Yu, Xuan Li, Guanjie Qiu, Xiaodong Gu, Beijun Shen:

On the Evaluation of Neural Code Translation: Taxonomy and Benchmark. 1529-1541 - Martin Kellogg, Daniel Daskiewicz, Loi Ngo Duc Nguyen, Muyeed Ahmed, Michael D. Ernst:

Pluggable Type Inference for Free. 1542-1554 - Haoyu Wang, Junjie Chen, Chuyue Xie, Shuang Liu, Zan Wang, Qingchao Shen, Yingquan Zhao

:
MLIRSmith: Random Program Generation for Fuzzing MLIR Compiler Infrastructure. 1555-1566 - Yang Lan, Di Jin, Zhun Wang, Wende Tan, Zheyu Ma, Chao Zhang:

Thunderkaller: Profiling and Improving the Performance of Syzkaller. 1567-1578 - Dongwei Xiao

, Zhibo Liu, Shuai Wang:
PhyFu: Fuzzing Modern Physics Simulation Engines. 1579-1591 - Ahmad Humayun, Yaoxuan Wu, Miryung Kim, Muhammad Ali Gulzar:

NaturalFuzz: Natural Input Generation for Big Data Analytics. 1592-1603 - Wenke Li

, Feng Wu, Cai Fu
, Fan Zhou:
A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem. 1604-1614 - Bo Liu, Hui Liu, Nan Niu, Yuxia Zhang, Guangjie Li, Yanjie Jiang:

Automated Software Entity Matching Between Successive Versions. 1615-1627 - Suhaib Mujahid, Diego Elias Costa, Rabe Abdalkareem, Emad Shihab:

Where to Go Now? Finding Alternatives for Declining Packages in the npm Ecosystem. 1628-1639 - Teng Wang, Haochen He, Xiaodong Liu, Shanshan Li, Zhouyang Jia, Yu Jiang, Qing Liao, Wang Li:

ConfTainter: Static Taint Analysis For Configuration Options. 1640-1651 - Jinhao Dong, Qihao Zhu, Zeyu Sun, Yiling Lou, Dan Hao:

Merge Conflict Resolution: Classification or Generation? 1652-1663 - Jianzhong Su, Xingwei Lin, Zhiyuan Fang, Zhirong Zhu, Jiachi Chen

, Zibin Zheng, Wei Lv, Jiashui Wang:
DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities. 1664-1675 - Yuwei Liu, Siqi Chen, Yuchong Xie

, Yanhao Wang, Libo Chen, Bin Wang, Yingming Zeng, Zhi Xue, Purui Su:
VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual Device. 1676-1687 - Robert Feldt, Sungmin Kang, Juyeon Yoon, Shin Yoo:

Towards Autonomous Testing Agents via Conversational Large Language Models. 1688-1693 - Sondess Missaoui, Simos Gerasimou, Nicholas Matragkas:

Semantic Data Augmentation for Deep Learning Testing Using Generative AI. 1694-1698 - Van-Hoang Le

, Hongyu Zhang:
Log Parsing: How Far Can ChatGPT Go? 1699-1704 - Sergio Morales

, Robert Clarisó
, Jordi Cabot
:
Automating Bias Testing of LLMs. 1705-1707 - Qiang Hu, Yuejun Guo, Maxime Cordy, Mike Papadakis, Yves Le Traon:

MUTEN: Mutant-Based Ensembles for Boosting Gradient-Based Adversarial Attack. 1708-1712 - Bowen Xu, Thanh-Dat Nguyen, Thanh Le-Cong

, Thong Hoang, Jiakun Liu, Kisub Kim, Chen Gong, Changan Niu, Chenyu Wang, Bach Le, David Lo
:
Are We Ready to Embrace Generative AI for Software Q&A? 1713-1717 - Priyavanshi Pathania, Rohit Mehra, Vibhu Saujanya Sharma, Vikrant Kaulgud, Sanjay Podder

, Adam P. Burden:
Towards a Knowledge Base of Common Sustainability Weaknesses in Green Software Development. 1718-1720 - Shubham Kulkarni, Arya Marda, Karthik Vaidhyanathan:

Towards Self-Adaptive Machine Learning-Enabled Systems Through QoS-Aware Model Switching. 1721-1725 - Tao Yue

, Shaukat Ali
:
Evolve the Model Universe of a System Universe. 1726-1731 - Aakash Bansal, Chia-Yi Su, Zachary Karas, Yifan Zhang, Yu Huang, Toby Jia-Jun Li, Collin McMillan:

Modeling Programmer Attention as Scanpath Prediction. 1732-1736 - Mira Leung, Gail C. Murphy:

On Automated Assistants for Software Development: The Role of LLMs. 1737-1741 - Toufique Ahmed, Premkumar T. Devanbu:

Better Patching Using LLM Prompting, via Self-Consistency. 1742-1746 - Allison Sullivan:

Live Programming for Finite Model Finders. 1747-1752 - Xiaoning Chang, Zheheng Liang, Guoquan Wu, Yu Gao, Wei Chen, Jun Wei, Zhenyue Long, Lei Cui, Tao Huang:

Characterizing Flaky Tests in Node.js Applications. 1753-1755 - Fuqi Jia

, Rui Han, Xutong Ma, Baoquan Cui, Minghao Liu
, Pei Huang
, Feifei Ma, Jian Zhang:
PSMT: Satisfiability Modulo Theories Meets Probability Distribution. 1756-1760 - Weilin Luo, Yuhang Zheng, Rongzhen Ye, Hai Wan, Jianfeng Du, Pingjia Liang, Polong Chen:

SAT-Verifiable LTL Satisfiability Checking via Graph Representation Learning. 1761-1765 - Bo Peng, Pingjia Liang, Tingchen Han, Weilin Luo, Jianfeng Du, Hai Wan, Rongzhen Ye, Yuhang Zheng:

PURLTL: Mining LTL Specification from Imperfect Traces in Testing. 1766-1770 - Junjie Luo, Jianjun Zhao:

Enhancing Code Safety in Quantum Intermediate Representation. 1771-1775 - Nick Feng, Lina Marsso, Sinem Getir Yaman, Beverley A. Townsend, Ana Cavalcanti, Radu Calinescu, Marsha Chechik:

Towards a Formal Framework for Normative Requirements Elicitation. 1776-1780 - Carol Hanna

, Justyna Petke
:
Hot Patching Hot Fixes: Reflection and Perspectives. 1781-1786 - Siang Zhao, Zhongyang Li, Zhenbang Chen, Ji Wang:

Symbolic Verification of Fuzzy Logic Models. 1787-1789 - Qilin Zhou

, Zhengyuan Wei
, Haipeng Wang
, W. K. Chan:
A Majority Invariant Approach to Patch Robustness Certification for Deep Learning Models. 1790-1794 - Nikolaos Louloudakis, Perry Gibson, José Cano, Ajitha Rajan:

Fault Localization for Buggy Deep Learning Framework Conversions in Image Recognition. 1795-1799 - Raffi Khatchadourian

, Tatiana Castro Vélez
, Mehdi Bagherzadeh, Nan Jia, Anita Raja:
Towards Safe Automated Refactoring of Imperative Deep Learning Programs to Graph Execution. 1800-1802 - Justin Kur, Jingshu Chen

, Jun Huang
:
Scalable Industrial Control System Analysis via XAI-Based Gray-Box Fuzzing. 1803-1807 - Junhao Hu, Chaozheng Wang, Hailiang Huang, Huang Luo, Yu Jin, Yuetang Deng, Tao Xie:

Predicting Compilation Resources for Adaptive Build in an Industrial Setting. 1808-1813 - Umut Tirasoglu, Abdussamet Türker, Adnan Ekici, Hayri Yigit, Yusuf Enes Bölükbasi, Toygar Akgün

:
Open Source Software Tools for Data Management and Deep Model Training Automation. 1814-1818 - Juntao Ji, Rongtong Jin, Yubao Fu, Yinyou Gu, Tsung-Han Tsai, Qingshan Lin:

RocketHA: A High Availability Design Paradigm for Distributed Log-Based Storage System. 1819-1824 - Rohit Mehra, Priyavanshi Pathania, Vibhu Saujanya Sharma, Vikrant Kaulgud, Sanjay Podder

, Adam P. Burden:
Assessing the Impact of Refactoring Energy-Inefficient Code Patterns on Software Sustainability: An Industry Case Study. 1825-1827 - Samarth Sikand, Vibhu Saujanya Sharma, Vikrant Kaulgud, Sanjay Podder

:
Green AI Quotient: Assessing Greenness of AI-based software and the way forward. 1828-1833 - Swarnava Dey, Avik Ghose, Soumik Das:

Challenges of Accurate and Efficient AutoML. 1834-1839 - Wei Wang, Andrei Benea, Franjo Ivancic:

Zero-Config Fuzzing for Microservices. 1840-1845 - Kanchanjot Kaur Phokela, Samarth Sikand, Kapil Singi, Kuntal Dey, Vibhu Saujanya Sharma, Vikrant Kaulgud:

Smart Prompt Advisor: Multi-Objective Prompt Framework for Consistency and Best Practices. 1846-1848 - Celal Ziftci, Ben Greenberg:

Improving Design Reviews at Google. 1849-1854 - Samdyuti Suri, Sankar Narayan Das, Kapil Singi, Kuntal Dey, Vibhu Saujanya Sharma, Vikrant Kaulgud:

Software Engineering Using Autonomous Agents: Are We There Yet? 1855-1857 - Tooba Aamir, Mohan Baruwal Chhetri, M. A. P. Chamikara, Marthie Grobler:

Government Mobile Apps: Analysing Citizen Feedback via App Reviews. 1858-1863 - Shinobu Saito

:
Coding and Debugging by Separating Secret Code Toward Secure Remote Development. 1864-1869 - Vikas Kumar Malviya

, Phong Phan, Yan Naing Tun, Albert Ching, Lwin Khin Shar
:
An Industrial Practice for Securing Android Apps in the Banking Domain. 1870-1875 - Zhipeng Xue, Zhipeng Gao, Xing Hu, Shanping Li:

ACWRecommender: A Tool for Validating Actionable Warnings with Weak Supervision. 1876-1880 - Wenkang Zhong, Chuanyi Li, Yunfei Zhang, Ziwen Ge, Jingyu Wang, Jidong Ge, Bin Luo:

An Automated and Flexible Multilingual Bug-Fix Dataset Construction System. 1881-1886 - Dapeng Yan

, Zhipeng Gao
, Zhiming Liu:
A Closer Look at Different Difficulty Levels Code Generation Abilities of ChatGPT. 1887-1898 - He Ye, Zimin Chen, Claire Le Goues

:
PreciseBugCollector: Extensible, Executable and Precise Bug-Fix Collection: Solution for Challenge 8: Automating Precise Data Collection for Code Snippets with Bugs, Fixes, Locations, and Types. 1899-1910 - Chao Ni, Xinrong Guo, Yan Zhu, Xiaodan Xu, Xiaohu Yang:

Function-Level Vulnerability Detection Through Fusing Multi-Modal Knowledge. 1911-1918 - Xuezhi Song, Yijian Wu, Junming Cao, Bihuan Chen, Yun Lin, Zhengjie Lu, Dingji Wang

, Xin Peng:
BugMiner: Automating Precise Bug Dataset Construction by Code Evolution History Mining. 1919-1929 - Aoyang Fang, Ruiyu Zhou

, Xiaoying Tang, Pinjia He:
RPCover: Recovering gRPC Dependency in Multilingual Projects. 1930-1939 - Pengcheng Liu, Yifei Lu, Wenhua Yang, Minxue Pan:

VALAR: Streamlining Alarm Ranking in Static Analysis with Value-Flow Assisted Active Learning. 1940-1951 - Chaozheng Wang, Zongjie Li, Yun Peng, Shuzheng Gao, Sirong Chen, Shuai Wang, Cuiyun Gao, Michael R. Lyu:

REEF: A Framework for Collecting Real-World Vulnerabilities and Fixes. 1952-1962 - Jifeng Xuan, Qi Xin, Liqian Chen, Xiaoguang Mao

:
Potential Solutions to Challenges in C Program Repair: A Practical Perspective. 1963-1968 - Sai Krishna Avula, Venkatesh Vobbilisetti, Shouvick Mondal

:
Minecraft: Automated Mining of Software Bug Fixes with Precise Code Context. 1969-1979 - Chao Ni, Kaiwen Yang, Yan Zhu, Xiang Chen, Xiaohu Yang:

Unifying Defect Prediction, Categorization, and Repair by Multi-Task Deep Learning. 1980-1992 - Ningke Li, Shenao Wang

, Mingxi Feng, Kailong Wang
, Meizhen Wang, Haoyu Wang:
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains. 1993-2005 - Tianzhi Ma, Yanjie Zhao, Li Li, Liang Liu:

CiD4HMOS: A Solution to HarmonyOS Compatibility Issues. 2006-2017 - Egor Klimov, Muhammad Umair Ahmed

, Nikolai Sviridov, Pouria Derakhshanfar, Eray Tüzün
, Vladimir Kovalenko:
Bus Factor Explorer. 2018-2021 - Jia Xu, Xiao Liu, Wuzhen Pan, Xuejun Li, Aiting Yao, Yun Yang:

EXPRESS 2.0: An Intelligent Service Management Framework for AIoT Systems in the Edge. 2022-2025 - Rajrupa Chattaraj, Sridhar Chimalakonda:

RJoules: An Energy Measurement Tool for R. 2026-2029 - Imam Nur Bani Yusuf, Diyanah Binte Abdul Jamal, Lingxiao Jiang

:
ArduinoProg: Towards Automating Arduino Programming. 2030-2033 - Gabin An, Minhyuk Kwon, Kyunghwa Choi, Jooyong Yi, Shin Yoo:

BUGSC++: A Highly Usable Real World Defect Benchmark for C/C++. 2034-2037 - Yuan-an Xiao, Chenyang Yang, Bo Wang

, Yingfei Xiong:
ExpressAPR: Efficient Patch Validation for Java Automated Program Repair Systems. 2038-2041 - Nuno Saavedra

, João Gonçalves, Miguel Henriques, João F. Ferreira, Alexandra Mendes
:
Polyglot Code Smell Detection for Infrastructure as Code with GLITCH. 2042-2045 - Minghao Liu

, Kunhang Lv, Pei Huang
, Rui Han, Fuqi Jia
, Yu Zhang, Feifei Ma, Jian Zhang:
NRAgo: Solving SMT(NRA) Formulas with Gradient-Based Optimization. 2046-2049 - Dirk Beyer

, Po-Chun Chien
, Nian-Ze Lee:
CPA-DF: A Tool for Configurable Interval Analysis to Boost Program Verification. 2050-2053 - Debeshee Das, Noble Saji Mathews

, Alex Mathai, Srikanth Tamilselvam, Kranthi Sedamaki, Sridhar Chimalakonda, Atul Kumar:
COMEX: A Tool for Generating Customized Source Code Representations. 2054-2057 - Christian Birchler, Cyrill Rohrbach, Hyeongkyun Kim, Alessio Gambi, Tianhai Liu, Jens Horneber, Timo Kehrer, Sebastiano Panichella:

TEASER: Simulation-Based CAN Bus Regression Testing for Self-Driving Cars Software. 2058-2061 - Michael Bar-Sinai

, Achiya Elyasaf, Gera Weiss, Yeshayahu Weiss
:
Provengo: A Tool Suite for Scenario Driven Model-Based Testing. 2062-2065 - Xinyi Wang, Paolo Arcaini

, Tao Yue, Shaukat Ali:
QuCAT: A Combinatorial Testing Tool for Quantum Software. 2066-2069 - Shixin Zhang, Shanna Li, Xi Deng, Jiwei Yan, Jun Yan:

ICTDroid: Parameter-Aware Combinatorial Testing for Components of Android Apps. 2070-2073 - Dirk Beyer

, Martin Spiessl
:
LIV: Loop-Invariant Validation Using Straight-Line Programs. 2074-2077 - Dirk Beyer

, Marian Lingsch Rosenfeld, Martin Spiessl:
cegar-pt: A Tool for Abstraction by Program Transformation. 2078-2081 - Bohan Zhang, Yashaswini Shivalingaiah, Ankit Agrawal

:
DroneReqValidator: Facilitating High Fidelity Simulation Testing for Uncrewed Aerial Systems Developers. 2082-2085 - Halil Ibrahim Ceylan

, Onur Kilinççeker, Mutlu Beyazit
, Serge Demeyer:
MUT4SLX: Fast Mutant Generation for Simulink. 2086-2089 - Jiakun Liu, Xing Hu, Ferdian Thung, Shahar Maoz, Eran Toch

, Debin Gao
, David Lo
:
AutoDebloater: Automated Android App Debloating. 2090-2093 - Facundo Molina

, Marcelo d'Amorim
, Nazareno Aguirre:
SpecFuzzer: A Tool for Inferring Class Specifications via Grammar-Based Fuzzing. 2094-2097 - Xiufeng Xu, Chenguang Zhu

, Yi Li:
Compsuite: A Dataset of Java Library Upgrade Incompatibility Issues. 2098-2101 - Monika Di Angelo

, Thomas Durieux
, João F. Ferreira
, Gernot Salzer
:
SmartBugs 2.0: An Execution Framework for Weakness Detection in Ethereum Smart Contracts. 2102-2105

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














