


default search action
Automated Software Engineering, Volume 32
Volume 32, Number 1, June 2025
- Shiji Wang, Xiangfu Zhao:
Contractsentry: a static analysis tool for smart contract vulnerability detection. 1 - James Callan, Justyna Petke
:
Multi-objective improvement of Android applications. 2 - Kenneth H. Chan, Betty H. C. Cheng:
Evoattack: suppressive adversarial attacks against object detection models using evolutionary search. 3 - Andrea Arcuri, Man Zhang, Susruthan Seran, Juan Pablo Galeotti, Amid Golmohammadi, Onur Duman, Agustina Aldasoro, Hernan Ghianni:
Tool report: EvoMaster - black and white box search-based fuzzing for REST, GraphQL and RPC APIs. 4 - Alexander Poth, Olsi Rrjolli, Andrea Arcuri:
Technology adoption performance evaluation applied to testing industrial REST APIs. 5 - William B. Langdon, David Clark
:
Deep imperative mutations have less impact. 6 - Dongjin Yu, Yihang Xu
, Lehui Weng, Jie Chen, Xin Chen, Quanxin Yang:
Efficient feature envy detection and refactoring based on graph neural network. 7 - Arif Ali Khan, Muhammad Azeem Akbar, Valtteri Lahtinen, Marko Paavola, Mahmood Niazi, Mohammed Naif Alatawi, Shoayee Dlaim Alotaibi:
Correction: Agile meets quantum: a novel genetic algorithm model for predicting the success of quantum software development project. 8 - Taha Varol, Milad Elyasi, T. Huzeyfe Aktas, Okan Örsan Özener, Hasan Sözer:
Parallelization of genetic algorithms for software architecture recovery. 9 - Max-Arno Meyer
, Mehdi Zouari, Sebastian Bannenberg, Markus Deppe, Sébastien Christiaens, Sung-Yong Lee, Jakob Andert:
Machine-readable specification and intelligent cloud-based execution of logical test cases for automated driving functions. 10 - Meetesh Nevendra, Pradeep Singh:
Meta network attention-based feature matching for heterogeneous defect prediction. 11 - Jiaze Sun, Zhiqiang Yin, Hengshan Zhang, Xiang Chen, Wei Zheng:
Adversarial generation method for smart contract fuzz testing seeds guided by chain-based LLM. 12 - Qirong Bu, Xiangqiang Guo, Xia Sun, Jingjing Jiang, Xiaodi Zhao, Wang Zou, Xuxin Wang, Jianqiang Yan:
Detecting question relatedness in programming Q&A communities via bimodal feature fusion. 13 - Xuehai Jia, Junwei Du, Minying Fang
, Hao Liu, Yuying Li, Feng Jiang:
Vulnerability detection with graph enhancement and global dependency representation learning. 14 - Alexander E. I. Brownlee, James Callan, Karine Even-Mendoza, Alina Geiger, Carol Hanna
, Justyna Petke
, Federica Sarro, Dominik Sobania:
Large language model based mutations in genetic improvement. 15 - Gong Chen, Wenjie Liu, Xiaoyuan Xie:
RFMC-CS: a representation fusion based multi-view momentum contrastive learning framework for code search. 16 - Yubin Qu, Song Huang, Yanzhou Li, Tongtong Bai, Xiang Chen, Xingya Wang, Long Li, Yongming Yao:
BadCodePrompt: backdoor attacks against prompt engineering of large language models for code generation. 17 - Miriam Ugarte, Pablo Valle, Miren Illarramendi
, Aitor Arrieta:
Enhancing multi-objective test case selection through the mutation operator. 18 - Yanlin Wang, Ensheng Shi, Lun Du, Xiaodi Yang, Yuxuan Hu, Yan Wang, Daya Guo, Shi Han, Hongyu Zhang, Dongmei Zhang:
Context-aware code summarization with multi-relational graph neural network. 19 - Ruofan Yang, Xianghua Xu, Ran Wang:
LLM-enhanced evolutionary test generation for untyped languages. 20 - Cheng-Hao Cai:
MP: motion program synthesis with machine learning interpretability and knowledge graph analogy. 21 - Kashumi Madampe, John C. Grundy, Minh Nguyen, Ellen Welstead-Cloud, Vinh Tuan Huynh, Linh Doan, William Lay, Sayed Hashim:
EmoReflex: an AI-powered emotion-centric developer insights platform. 22 - Ahmad Bilal, Hamid Turab Mirza, Adnan Ahmad, Ibrar Hussain, Ahmad Salman Khan:
Unveiling functional aspects in google play education app titles and descriptions influencing app success. 23 - Feiqiao Mao, Kaihang Zhong, Long Cheng:
Bmco-o: a smart code smell detection method based on co-occurrences. 24 - Yingling Li, Yuhan Wu, Ziao Wang, Lei Huang, Junjie Wang, Jianping Li, Minying Huang:
CodeDoctor: multi-category code review comment generation. 25 - Bo Liu, Yanjie Jiang, Yuxia Zhang, Nan Niu, Guangjie Li, Hui Liu:
Exploring the potential of general purpose LLMs in automated software refactoring: an empirical study. 26 - Ashis Kumar Mandal, Md. Nadim, Chanchal K. Roy, Banani Roy, Kevin A. Schneider:
Quantum software engineering and potential of quantum computing in software engineering research: a review. 27 - Junsan Zhang, Yang Zhu, Ao Lu, Yudie Yan, Yao Wan:
Bash command comment generation via multi-scale heterogeneous feature fusion. 28 - Chengyu Jia, Jinyin Chen, Xiaohao Li, Haibin Zheng, Luxin Zhang:
BallPri: test cases prioritization for deep neuron networks via tolerant ball in variable space. 29 - Jialun Cao, Meiziniu Li, Ming Wen, Shing-Chi Cheung:
A study on prompt design, advantages and limitations of ChatGPT for deep learning program repair. 30
Volume 32, Number 2, November 2025
- Carol Hanna
, Aymeric Blot, Justyna Petke:
Reinforcement learning for mutation operator selection in automated program repair. 31 - Xiao Liu, Yinkang Xu, Weifeng Sun, Naiqi Huang, Song Sun, Qiang Li, Dan Yang, Meng Yan:
Tab: template-aware bug report title generation via two-phase fine-tuned models. 32 - Jarkko Peltomäki, Ivan Porres:
Requirement falsification for cyber-physical systems using generative models. 33 - Juha Mylläri
, Tatu Aalto, Jukka K. Nurminen
:
Ladle: a method for unsupervised anomaly detection across log types. 34 - Yuning Li, Wenkang Zhong, Zongwen Shen, Chuanyi Li, Xiang Chen, Jidong Ge, Bin Luo:
An empirical study on the code naturalness modeling capability for LLMs in automated patch correctness assessment. 35 - Tiancheng Tang, Yi Man, Xinbing Zhou, Duqing Wang:
Pipe-DBT: enhancing dynamic binary translation simulators to support pipeline-level simulation. 36 - Qunying Song, Avner Bensoussan, Mohammad Reza Mousavi:
Synthetic versus real: an analysis of critical scenarios for autonomous vehicle testing. 37 - Liping Wang, Guilong Lu, Xiang Chen, Xiaofeng Dai, Jianlin Qiu:
SIFT: enhance the performance of vulnerability detection by incorporating structural knowledge and multi-task learning. 38 - Neetu Singh, Sandeep Kumar Singh:
Navigating bug cold start with contextual multi-armed bandits: an enhanced approach to developer assignment in software bug repositories. 39 - Zhiqiang Li, Wenzhi Zhu, Hongyu Zhang, Yuantian Miao, Jie Ren:
The impact of unsupervised feature selection techniques on the performance and interpretation of defect prediction models. 40 - Dawei Yuan, Guocang Yang, Tao Zhang:
UI2HTML: utilizing LLM agents with chain of thought to convert UI into HTML code. 41 - Yingling Li, Muxin Cai, Junjie Chen, Yang Xu, Lei Huang, Jianping Li:
Context-aware prompting for LLM-based program repair. 42 - Yonghao Long, Yuanyuan Chen, Chu Zeng, Xiangping Chen, Xing Chen, Xiaocong Zhou, Jingru Yang, Gang Hua, Zibin Zheng:
ExtRep: a GUI test repair method for mobile applications based on test-extension. 43 - Mashal Afzal Memon, Gian Luca Scoccia, Marco Autili:
A systematic mapping study on automated negotiation for autonomous intelligent systems. 44 - Jiyu Wang, Xiang Chen, Wenlong Pei, Shaoyu Yang:
Improving prompt tuning-based software vulnerability assessment by fusing source code and vulnerability description. 45 - Yonghui Liu, Xiao Chen, Yue Liu, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein, Xiaoyu Sun, Li Li, Chunyang Chen, John C. Grundy:
A comparative study between android phone and TV apps. 46 - Hongwei Wei, Xiaohong Su, Weining Zheng, Wenxing Tao, Hailong Yu, Yuqian Kuang:
Knowledge-guided large language models are trustworthy API recommenders. 47

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
