💥Update: Papers accepted by ASE 2024 are included in this list!
💥Update: Papers accepted by ICSE 2025 Cycle 1 are continously being announced here and we will add them after full acceptance announcement.
Research papers accepted by {ICSE, FSE, ASE, ISSTA} since 2020.
- Dependency:
scrapy
,openpyxl
- Usage:
- add new links in
paper_spider/utils/paperlist.py
- run
scrapy crawl paper_spider
- add new links in
Conference | Title | Authors |
---|---|---|
ICSE 2024 | A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments | Gao Cuiying, Gaozhun Huang, Heng Li, Bang Wu, Yueming Wu, Wei Yuan |
ICSE 2024 | A First Look at the Inheritance-Induced Redundant Test Execution | Dong Jae Kim, Jinqiu Yang, Tse-Hsun (Peter) Chen |
ICSE 2024 | A Framework For Inferring Properties of User-Defined Functions | Xinyu Liu, Joy Arulraj, Alessandro Orso |
ICSE 2024 | A Large-Scale Survey on the Usability of AI Programming Assistants: Successes and Challenges | Jenny T. Liang, Chenyang Yang, Brad A. Myers |
ICSE 2024 | A Study on the Pythonic Functional Constructs' Understandability | Cyrine Zid, Fiorella Zampetti, Giulio Antoniol, Massimiliano Di Penta |
ICSE 2024 | A Theory of Scientific Programming Efficacy | Elizaveta Pertseva, Melinda Chang, Ulia Zaman, Michael Coblenz |
ICSE 2024 | A User-centered Security Evaluation of Copilot | Owura Asare, Mei Nagappan, N. Asokan |
ICSE 2024 | ACAV: A Framework for Automatic Causality Analysis in Autonomous Vehicle Accident Recordings | Huijia Sun, Chris Poskitt, Yang Sun, Jun Sun, Yuqi Chen |
ICSE 2024 | An Empirical Study of Data Disruption by Ransomware Attacks | Yiwei Hou, Lihua Guo, Chijin Zhou, Yiwen Xu, Zijing Yin, Shanshan Li, Chengnian Sun, Yu Jiang |
ICSE 2024 | An Empirical Study on Low GPU Utilization of Deep Learning Jobs | Yanjie Gao, yichen he, Xinze Li, Bo Zhao, Haoxiang Lin, Yoyo Liang, Jing Zhong, Hongyu Zhang, Jingzhou Wang, Yonghua Zeng, Keli Gui, Jie Tong, Mao Yang |
ICSE 2024 | An Empirical Study on Noisy Label Learning for Program Understanding | Wenhan Wang, Yanzhou Li, Anran Li, Jian Zhang, Wei Ma, Yang Liu |
ICSE 2024 | An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives | Hanyang Guo, Hong-Ning Dai, Xiapu Luo, Zibin Zheng, Gengyang Xu, Fengliang He |
ICSE 2024 | An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles | Dinghua Wang, Shuqing Li, Guanping Xiao, Yepang Liu, Yulei Sui, Pinjia He, Michael Lyu |
ICSE 2024 | Analyzing and Debugging Normative Requirements via Satisfiability Checking | Nick Feng, Lina Marsso, Sinem Getir Yaman, Yesugen Baatartogtokh, Reem Ayad, Victória Oldemburgo de Mello, Beverley Townsend, Isobel Standen, Ioannis Stefanakos, Calum Imrie, Genaína Nunes Rodrigues, Ana Cavalcanti, Radu Calinescu, Marsha Chechik |
ICSE 2024 | Are Prompt Engineering and TODO Comments Friends or Foes? An Evaluation on GitHub Copilot | David OBrien, Sumon Biswas, Sayem Mohammad Imtiaz, Rabe Abdalkareem, Emad Shihab, Hridesh Rajan |
ICSE 2024 | Are We There Yet? Unraveling the State-of-the-Art Smart Contract Fuzzers | Shuohan Wu, Zihao Li, Luyi Yan, Weimin Chen, Muhui Jiang, Chenxu Wang, Xiapu Luo, Hao Zhou |
ICSE 2024 | Are Your Requests Your True Needs? Checking Excessive Data Collection in VPA App | Fuman Xie, Chuan Yan, Mark Huasong Meng, Shaoming Teng, Yanjun Zhang, Guangdong Bai |
ICSE 2024 | Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps | Yongliang Chen, Ruoqin Tang, Chaoshun Zuo, Xiaokuan Zhang, Lei Xue, Xiapu Luo, Qingchuan Zhao |
ICSE 2024 | Automated Program Repair, What Is It Good For? Not Absolutely Nothing! | Hadeel Eladawy, Claire Le Goues, Yuriy Brun |
ICSE 2024 | Automatic Semantic Augmentation of Language Model Prompts (for Code Summarization) | Toufique Ahmed, Kunal Suresh Pai, Prem Devanbu, Earl T. Barr |
ICSE 2024 | Automatically Detecting Reflow Accessibility Issues in Responsive Web Pages | Paul T. Chiou, Robert Winn, Ali S. Alotaibi, William G.J. Halfond |
ICSE 2024 | BOMs Away! Inside the Minds of Stakeholders: A Comprehensive Study of Bills of Materials for Software Systems | Trevor Stalnaker, Nathan Wintersgill, Oscar Chaparro, Massimiliano Di Penta, Daniel M. German, Denys Poshyvanyk |
ICSE 2024 | Barriers for Students During Code Change Comprehension | Justin Middleton , John-Paul Ore, Kathryn Stolee |
ICSE 2024 | BinAug: Enhancing Binary Similarity Analysis with Low-Cost Input Repairing | WONG Wai Kin, Huaijin Wang, Li Zongjie, Shuai Wang |
ICSE 2024 | BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code Matching | Ling Jiang, Junwen An, Huihui Huang, Qiyi Tang, Sen Nie, Shi Wu, Yuqun Zhang |
ICSE 2024 | Block-based Programming for Two-Armed Robots: A Comparative Study | Felipe Fronchetti, Nico Ritschel, Logan Schorr, Chandler Barfield, Gabriella Chang, Rodrigo Spinola, Reid Holmes, David C. Shepherd |
ICSE 2024 | Breaking the Flow: A Study of Interruptions During Software Engineering Activities | Yimeng Ma, Yu Huang, Kevin Leach |
ICSE 2024 | CERT: Finding Performance Issues in Database Systems Through the Lens of Cardinality Estimation | Jinsheng Ba, Manuel Rigger |
ICSE 2024 | CIT4DNN: Generating Diverse and Rare Inputs for Neural Networks Using Latent Space Combinatorial Testing | Swaroopa Dola, Rory McDaniel, Matthew B Dwyer, Mary Lou Soffa |
ICSE 2024 | CSChecker: Revisiting GDPR and CCPA Compliance of Cookie Banners on the Web | Mingxue Zhang, Wei Meng, You Zhou, Kui Ren |
ICSE 2024 | Causal Relationships and Programming Outcomes: A Transcranial Magnetic Stimulation Experiment | Hammad Ahmad, Madeline Endres, Kaia Newman, Priscila Santiesteban, Emma Shedden, Westley Weimer |
ICSE 2024 | Characterizing Software Maintenance Meetings: Information Shared, Discussion Outcomes, and Information Captured | Adriana Meza Soria, Taylor Lopez, Liz Seero, Negin Mashhadi, Emily Evans, Janet Burge, André van der Hoek |
ICSE 2024 | ChatGPT Incorrectness Detection in Software Reviews | Minaoar Hossain Tanzil, Junaed Younus Khan, Gias Uddin |
ICSE 2024 | ChatGPT-Resistant Screening Instrument for Identifying Non-Programmers | Raphael Serafini, Clemens Otto, Stefan Albert Horstmann, Alena Naiakshina |
ICSE 2024 | Cneps: A Precise Approach for Examining Dependencies among Third-Party C/C++ Open-Source Components | Yoonjong Na, Seunghoon Woo, Joomyeong Lee, Heejo Lee |
ICSE 2024 | Co-Creation in Fully Remote Software Teams | Victoria Jackson, Rafael Prikladnicki, Andre van der Hoek |
ICSE 2024 | Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection Systems | Sicong Cao, Xiaobing Sun, Xiaoxue Wu, David Lo, Lili Bo, Bin Li, Wei Liu |
ICSE 2024 | Code Search is All You Need? Improving Code Suggestions with Code Search | Junkai Chen, Xing Hu, Zhenhao Li, Cuiyun Gao, Xin Xia, David Lo |
ICSE 2024 | CoderEval: A Benchmark of Pragmatic Code Generation with Generative Pre-trained Models | Hao Yu, Bo Shen, Dezhi Ran, Jiaxin Zhang, Qi Zhang, Yuchi Ma, Guangtai Liang, Ying Li, Qianxiang Wang, Tao Xie |
ICSE 2024 | Combining Structured Static Code Information and Dynamic Symbolic Traces for Software Vulnerability Prediction | Huanting Wang, Zhanyong Tang, Shin Hwei Tan, Jie Wang, Yuzhe Liu, Hejun Fang, Chunwei Xia, Zheng Wang |
ICSE 2024 | Compiler-directed Migrating API Callsite of Client Code | Hao Zhong, Na Meng |
ICSE 2024 | Comprehensive Semantic Repair of Obsolete GUI Test Scripts for Mobile Applications | Shaoheng Cao, Minxue Pan, Yu Pei, Wenhua Yang, Tian Zhang, Linzhang Wang, Xuandong Li |
ICSE 2024 | Concrete Constraint Guided Symbolic Execution | Yue Sun, Guowei Yang, Shichao Lv, Zhi Li, Limin Sun |
ICSE 2024 | Constraint Based Program Repair for Persistent Memory Bugs | Zunchen Huang, Chao Wang |
ICSE 2024 | Context-Aware Name Recommendation for Field Renaming | Chunhao Dong, Yanjie Jiang, Nan Niu, Yuxia Zhang, Hui Liu |
ICSE 2024 | CrashTranslator: Automatically Reproducing Mobile Application Crashes Directly from Stack Trace | Yuchao Huang, Junjie Wang, Zhe Liu, Yawen Wang, Song Wang, Chunyang Chen, Yuanzhe Hu, Qing Wang |
ICSE 2024 | Cross-Inlining Binary Function Similarity Detection | Ang Jia, Ming Fan, Xi Xu, Wuxia Jin, Haijun Wang, Ting Liu |
ICSE 2024 | Crossover in Parametric Fuzzing | Katherine Hough, Jonathan Bell |
ICSE 2024 | Curiosity-Driven Testing for Sequential Decision-Making Process | Junda He, Zhou Yang, Jieke Shi, Chengran Yang, Kisub Kim, Bowen Xu, Xin Zhou, David Lo |
ICSE 2024 | DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps | Pengcheng Ren, Chaoshun Zuo, Xiaofeng Liu, Wenrui Diao, Qingchuan Zhao, Shanqing Guo |
ICSE 2024 | DSFM: Enhancing Functional Code Clone Detection with Deep Subtree Interactions | Zhiwei Xu, Shaohua Qiang, Dinghong Song, Min Zhou, Hai Wan, Xibin Zhao, Ping Luo, Hongyu Zhang |
ICSE 2024 | Data-Driven Evidence-Based Syntactic Sugar Design | David OBrien, Robert Dyer, Tien N. Nguyen, Hridesh Rajan |
ICSE 2024 | Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection | Benjamin Steenhoek, Hongyang Gao, Wei Le |
ICSE 2024 | Deep Combination of CDCL(T) and Local Search for Satisfiability Modulo Non-Linear Integer Arithmetic Theory | Xindi Zhang, Bohan Li, Shaowei Cai |
ICSE 2024 | Deep Learning or Classical Machine Learning? An Empirical Study on Log-Based Anomaly Detection | BoXi Yu, Jiayi Yao, Qiuai Fu, Zhiqing Zhong, Haotian Xie, Yaoliang Wu, Yuchi Ma, Pinjia He |
ICSE 2024 | DeepLSH: Deep Locality-Sensitive Hash Learning for Fast and Efficient Near-Duplicate Crash Report Detection | Youcef REMIL, Anes Bendimerad, Romain Mathonat, Chedy raissi, Mehdi Kaytoue |
ICSE 2024 | DeepSample: DNN sampling-based testing for operational accuracy assessment | Antonio Guerriero, Roberto Pietrantuono, Stefano Russo |
ICSE 2024 | Deeply Reinforcing Android GUI Testing with Deep Reinforcement Learning | Yuanhong Lan, Yifei Lu, Zhong Li, Minxue Pan, Wenhua Yang, Tian Zhang, Xuandong Li |
ICSE 2024 | Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem | Chenghao Li, Yifei Wu, Wenbo Shen, Zichen Zhao, Rui Chang, Chengwei Liu, Yang Liu, Kui Ren |
ICSE 2024 | Demystifying and Detecting Misuses of Deep Learning APIs | Moshi Wei, Nima Shiri Harzevili, Yuekai Huang, Jinqiu Yang, Junjie Wang, Song Wang |
ICSE 2024 | Detecting Automatic Software Plagiarism via Token Sequence Normalization | Timur Sağlam, Moritz Brödel, Larissa Schmid, Sebastian Hahner |
ICSE 2024 | Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Pattern Transformation | Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland H. C. Yap, Zhenkai Liang, Manuel Rigger |
ICSE 2024 | Development in times of hype: How freelancers explore Generative AI? | Mateusz Dolata, Norbert Lange, Gerhard Schwabe |
ICSE 2024 | DivLog: Log Parsing with Prompt Enhanced In-Context Learning | Junjielong Xu, Ruichun Yang, Yintong Huo, Chengyu Zhang, Pinjia He |
ICSE 2024 | Do Automatic Test Generation Tools Generate Flaky Tests? | Martin Gruber, Muhammad Firhard Roslan, Owain Parry, Fabian Scharnböck, Phil McMinn, Gordon Fraser |
ICSE 2024 | DocFlow: Extracting Taint Specifications from Software Documentation | Marcos Tileria, Jorge Blasco, Santanu Dash |
ICSE 2024 | Domain Knowledge Matters: Improving Prompts with Fix Templates for Repairing Python Type Errors | Yun Peng, Shuzheng Gao, Cuiyun Gao, Yintong Huo, Michael Lyu |
ICSE 2024 | ECFuzz: Effective Configuration Fuzzing for Large-Scale Systems | Junqiang Li, Senyi Li, Keyao Li, Falin Luo, Hongfang Yu, Shanshan Li, Xiang Li |
ICSE 2024 | EDEFuzz: A Web API Fuzzer for Excessive Data Exposures | Lianglu Pan, Shaanan Cohney, Toby Murray, Thuan Pham |
ICSE 2024 | EGFE: End-to-end Grouping of Fragmented Elements in UI Designs with Multimodal Learning | Liuqing Chen, Yunnong Chen, Shuhong Xiao, Yaxuan Song, Lingyun Sun, Yankun Zhen, Tingting Zhou, Yanfang Chang |
ICSE 2024 | Efficiently Trimming the Fat: Streamlining Software Dependencies with Java Reflection and Dependency Analysis | Xiaohu Song, Ying Wang, Xiao Cheng, Guangtai Liang, Qianxiang Wang, Zhiliang Zhu |
ICSE 2024 | Empirical Analysis of Vulnerabilities Life Cycle in Golang Ecosystem | Jinchang Hu, Lyuye Zhang, Chengwei Liu, Sen Yang, Song Huang, Yang Liu |
ICSE 2024 | Empirical Study of the Docker Smells Impact on the Image Size | Thomas Durieux |
ICSE 2024 | Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning | Pingchuan Ma, Zhenlan Ji, Peisen Yao, Shuai Wang, Kui Ren |
ICSE 2024 | Enhancing Exploratory Testing by Large Language Model and Knowledge Graph | Yanqi Su, Dianshu Liao, Zhenchang Xing, Qing Huang, Mulong Xie, Qinghua Lu, Xiwei (Sherry) Xu |
ICSE 2024 | Evaluating Code Summarization Techniques: A New Metric and an Empirical Characterization | Antonio Mastropaolo, Matteo Ciniselli, Massimiliano Di Penta, Gabriele Bavota |
ICSE 2024 | Evaluating Large Language Models in Class-Level Code Generation | Xueying Du, Mingwei Liu, Kaixin Wang, Hanlin Wang, Junwei Liu, Yixuan Chen, Jiayi Feng, Chaofeng Sha, Xin Peng, Yiling Lou |
ICSE 2024 | Exploiting Library Vulnerability via Migration Based Automating Test Generation | Zirui Chen, Xing Hu, Xin Xia, Yi Gao, Tongtong Xu, David Lo, Xiaohu Yang |
ICSE 2024 | Exploring Experiences with Automated Program Repair in Practice | Fairuz Nawer Meem, Justin Smith, Brittany Johnson |
ICSE 2024 | Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study | Qi Guo, Junming Cao, Xiaofei Xie, Shangqing Liu, Xiaohong Li, Bihuan Chen, Xin Peng |
ICSE 2024 | Extrapolating Coverage Rate in Greybox Fuzzing | Danushka Liyanage, Seongmin Lee, Marcel Böhme, Kla Tantithamthavorn |
ICSE 2024 | FAIR: Flow Type-Aware Pre-Training of Compiler Intermediate Representations | Changan Niu, Chuanyi Li, Vincent Ng, David Lo, Bin Luo |
ICSE 2024 | Fairness Improvement with Multiple Protected Attributes: How Far Are We? | Zhenpeng Chen, Jie M. Zhang, Federica Sarro, Mark Harman |
ICSE 2024 | Fast Deterministic Black-box Context-free Grammar Inference | Mohammad Rifat Arefin, Suraj Shetiya, Zili Wang, Christoph Csallner |
ICSE 2024 | Finding XPath Bugs in XML Document Processors via Differential Testing | Shuxin Li, Manuel Rigger |
ICSE 2024 | Fine-SE: Integrating Semantic Features and Expert Features for Software Effort Estimation | Yue Li, Zhong Ren, Zhiqi Wang, Lanxin Yang, Liming Dong, He Zhang |
ICSE 2024 | Fine-grained, accurate and scalable source differencing | Jean-Rémy Falleri, Matias Martinez |
ICSE 2024 | FlakeSync: Automatically Repairing Async Flaky Tests | Shanto Rahman, August Shi |
ICSE 2024 | FlashSyn: Flash Loan Attack Synthesis via Counter Example Driven Approximation | Zhiyang Chen, Sidi Mohamed Beillahi, Fan Long |
ICSE 2024 | Fuzz4All: Universal Fuzzing with Large Language Models | Chunqiu Steven Xia, Matteo Paltenghi, Jia Le Tian, Michael Pradel, Lingming Zhang |
ICSE 2024 | FuzzInMem: Fuzzing Programs via In-memory Structures | Xuwei Liu, Wei You, Yapeng Ye, Zhuo Zhang, Jianjun Huang, Xiangyu Zhang |
ICSE 2024 | FuzzSlice: Pruning False Positives in Static Analysis Warnings through Function-Level Fuzzing | Aniruddhan Murali, Noble Saji Mathews, Mahmoud Alfadel, Mei Nagappan, Meng Xu |
ICSE 2024 | GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis | Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie, Yang Liu |
ICSE 2024 | GenderMag Improves Discoverability in the Field, Especially for Women | Emerson Murphy-Hill, Alberto Elizondo, Ambar Murillo, Marian Harbach, Bogdan Vasilescu, Delphine Carlson, Florian Dessloch |
ICSE 2024 | Generating REST API Specifications through Static Analysis | Ruikai Huang, Manish Motwani, Idel Martinez, Alessandro Orso |
ICSE 2024 | GrammarT5: Grammar-Integrated Pretrained Encoder-Decoder Neural Model for Code | Qihao Zhu, Qingyuan Liang, Zeyu Sun, Yingfei Xiong, Lu Zhang, Shengyu Cheng |
ICSE 2024 | Hard to Read and Understand Pythonic Idioms? DeIdiom and Explain Them in Non-Idiomatic Equivalent Code | zejun zhang, Zhenchang Xing, Dehai Zhao, Qinghua Lu, Xiwei (Sherry) Xu, Liming Zhu |
ICSE 2024 | High Expectations: An Observational Study of Programming and Cannabis Intoxication | Wenxin He, Manasvi Parikh, Westley Weimer, Madeline Endres |
ICSE 2024 | How Are Paid and Volunteer Open Source Developers Different? A Study of the Rust Project | Yuxia Zhang, Mian Qin, Klaas-Jan Stol, Minghui Zhou, Hui Liu |
ICSE 2024 | How Far Are We? The Triumphs and Trials of Generative AI in Learning Software Engineering | Rudrajit Choudhuri, Dylan Liu, Igor Steinmacher, Marco Gerosa, Anita Sarma |
ICSE 2024 | How do Developers Talk about GitHub Actions? Evidence from Online Software Development Community | Yang Zhang, Yiwen Wu, Tingting Chen, Tao Wang, Hui Liu, Huaimin Wang |
ICSE 2024 | How to Support ML End-User Programmers through a Conversational Agent | Emily Judith Arteaga Garcia, João Felipe Pimentel, Zixuan Feng, Marco Gerosa, Igor Steinmacher, Anita Sarma |
ICSE 2024 | Hypertesting of Programs: Theoretical Foundation and Automated Test Generation | Michele Pasqua, Mariano Ceccato, Paolo Tonella |
ICSE 2024 | ITER: Iterative Neural Repair for Multi-Location Patches | He Ye, Martin Monperrus |
ICSE 2024 | Identifying Affected Libraries and Their Ecosystems for Open Source Software Vulnerabilities | Susheng Wu, Wenyan Song, Kaifeng Huang, Bihuan Chen, Xin Peng |
ICSE 2024 | Improving Smart Contract Security with Contrastive Learning-based Vulnerability Detection | Yizhou Chen, Zeyu Sun, Zhihao Gong, Dan Hao |
ICSE 2024 | Improving Testing Behavior by Gamifying IntelliJ | Philipp Straubinger, Gordon Fraser |
ICSE 2024 | Inferring Data Preconditions from Deep Learning Models for Trustworthy Prediction in Deployment | Shibbir Ahmed, Hongyang Gao, Hridesh Rajan |
ICSE 2024 | Investigating White-Box Attacks for On-Device Models | Mingyi Zhou, Xiang Gao, Jing Wu, Kui Liu, Hailong Sun, Li Li |
ICSE 2024 | Is unsafe an Achilles' Heel? A Comprehensive Study of Safety Requirements in Unsafe Rust Programming | Mohan Cui, Mohan Cui, Shuran Sun, Hui Xu, Yangfan Zhou |
ICSE 2024 | It's Not a Feature, It's a Bug: Fault-Tolerant Model Mining from Noisy Data | Felix Wallner, Bernhard Aichernig, Christian Burghard |
ICSE 2024 | JLeaks: A Featured Resource Leak Repository Collected From Hundreds of Open-Source Java Projects | Tianyang Liu, Weixing Ji, Xiaohui Dong, Wuhuang Yao, Yizhuo Wang, Hui Liu, Haiyang Peng, Yuxuan Wang |
ICSE 2024 | Kind Controllers and Fast Heuristics for Non-Well-Separated GR(1) Specifications | Ariel Gorenstein, Shahar Maoz, Jan Oliver Ringert |
ICSE 2024 | KnowLog: Knowledge Enhanced Pre-trained Language Model for Log Understanding | Lipeng Ma, Weidong Yang, Bo Xu, Sihang Jiang, Ben Fei, Jiaqing Liang, Mingjie Zhou, Yanghua Xiao |
ICSE 2024 | Knowledge Graph Driven Inference Testing for Question Answering Software | Jun Wang, Yanhui Li, Zhifei Chen, Lin Chen, Xiaofang Zhang, Yuming Zhou |
ICSE 2024 | LLMParser: An Exploratory Study on Using Large Language Models for Log Parsing | Zeyang Ma, An Ran Chen, Dong Jae Kim, Tse-Hsun (Peter) Chen, Shaowei Wang |
ICSE 2024 | Language Models for Code Completion: A Practical Evaluation | Maliheh Izadi, Jonathan Katzy, Tim van Dam, Marc Otten, Răzvan Mihai Popescu, Arie van Deursen |
ICSE 2024 | Large Language Models are Edge-Case Generators: Crafting Unusual Programs for Fuzzing Deep Learning Libraries | Yinlin Deng, Chunqiu Steven Xia, Chenyuan Yang, Shizhuo Zhang, Shujing Yang, Lingming Zhang |
ICSE 2024 | Large Language Models are Few-Shot Summarizers: Multi-Intent Comment Generation via In-Context Learning | Mingyang Geng, Shangwen Wang, Dezun Dong, Haotian Wang, Ge Li, Zhi Jin, Xiaoguang Mao, Liao Xiangke |
ICSE 2024 | Large Language Models for Test-Free Fault Localization | Aidan Z.H. Yang, Claire Le Goues, Ruben Martins, Vincent J. Hellendoorn |
ICSE 2024 | Learning and Repair of Deep Reinforcement Learning Policies from Fuzz-Testing Data | Martin Tappler, Andrea Pferscher, Bernhard Aichernig, Bettina Könighofer |
ICSE 2024 | Learning in the Wild: Towards Leveraging Unlabeled Data for Effectively Tuning Pre-trained Code Models | Shuzheng Gao, Wenxin Mao, Cuiyun Gao, Li Li, Xing Hu, Xin Xia, Michael Lyu |
ICSE 2024 | Learning-based Widget Matching for Migrating GUI Test Cases | Yakun Zhang, Wenjie Zhang, Dezhi Ran, Qihao Zhu, Chengfeng Dou, Dan Hao, Tao Xie, Lu Zhang |
ICSE 2024 | Less is More? An Empirical Study on Configuration Issues in Python PyPI Ecosystem | Yun Peng, Ruida Hu, Ruoke Wang, Cuiyun Gao, Shuqing Li, Michael Lyu |
ICSE 2024 | LibAlchemy: A Two-Layer Persistent Summary Design for Taming Third-Party Libraries in Static Bug-Finding Systems | Rongxin Wu, Yuxuan He, Jiafeng Huang, Chengpeng Wang, Wensheng Tang, Qingkai Shi, Xiao Xiao, Charles Zhang |
ICSE 2024 | LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries | Chaopeng Dong, Siyuan Li, shouguo yang, Yang Xiao, Yongpan Wang, Hong Li, Zhi Li, Limin Sun |
ICSE 2024 | LogShrink: Effective Log Compression by Leveraging Commonality and Variability of Log Data | Xiaoyun Li, Hongyu Zhang, Van-Hoang Le, Pengfei Chen |
ICSE 2024 | Lost in Translation: A Study of Bugs Introduced by Large Language Models while Translating Code | Rangeet Pan, Ali Reza Ibrahimzada, Rahul Krishna, Divya Sankar, Lambert Pouguem Wassi, Michele Merler, Boris Sobolev, Raju Pavuluri, Saurabh Sinha, Reyhaneh Jabbarvand |
ICSE 2024 | MAFT: Efficient Model-Agnostic Fairness Testing for Deep Neural Networks via Zero-Order Gradient Search | Zhaohui Wang, Min Zhang, Jingran Yang, ShaoBojie , Min Zhang |
ICSE 2024 | MUT: Human-in-the-Loop Unit Test Migration | Yi Gao, Xing Hu, Tongtong Xu, Xin Xia, David Lo, Xiaohu Yang |
ICSE 2024 | Machine Learning is All You Need: A Simple Token-based Approach for Effective Code Clone Detection | Siyue Feng, Wenqi Suo, Yueming Wu, Deqing Zou, Yang Liu, Hai Jin |
ICSE 2024 | Make LLM a Testing Expert: Bringing Human-like Interaction to Mobile GUI Testing via Functionality-aware Decisions | Zhe Liu, Chunyang Chen, Junjie Wang, Mengzhuo Chen, Boyu Wu, Xing Che, Dandan Wang, Qing Wang |
ICSE 2024 | MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty | haodong li, Guosheng Xu, Liu Wang, Xusheng Xiao, Xiapu Luo, Guoai Xu, Haoyu Wang |
ICSE 2024 | MalwareTotal: Multi-Faceted and Sequence-Aware Bypass Tactics against Static Malware Detection | Shuai He, Cai Fu, Hong Hu, Jiahe Chen, Jianqiang Lv, Shuai Jiang |
ICSE 2024 | Marco: A Stochastic Asynchronous Concolic Explorer | Jie Hu, Yue Duan, Heng Yin |
ICSE 2024 | MetaLog: Generalizable Cross-System Anomaly Detection from Logs with Meta-Learning | Chenyangguang Zhang, Tong Jia, Guopeng Shen, Pinyan Zhu, Ying Li |
ICSE 2024 | MiniMon: Minimizing Android Applications with Intelligent Monitoring-Based Debloating | Jiakun Liu, Zicheng Zhang, Xing Hu, Ferdian Thung, Shahar Maoz, Debin Gao, Eran Toch, Zhipeng Zhao, David Lo |
ICSE 2024 | Mining Pull Requests to Detect Process Anomalies in Open Source Software Development | Bohan Liu, He Zhang, Weigang Ma, Hongyu Kuang, Yi Yang, Jinwei Xu, Shan Gao, Jian Gao |
ICSE 2024 | Modularizing while Training: a New Paradigm for Modularizing DNN Models | Binhang Qi, Hailong Sun, Hongyu Zhang, Ruobing Zhao, Xiang Gao |
ICSE 2024 | ModuleGuard: Understanding and Detecting Module Conflicts in Python Ecosystem | Ruofan Zhu, Xingyu Wang, Chengwei Liu, Zhengzi Xu, Wenbo Shen, Rui Chang, Yang Liu |
ICSE 2024 | MotorEase: Automated Detection of Motor Impairment Accessibility Issues in Mobile App UIs | Arun Krishna Vajjala, S M Hasan Mansur, Justin Jose, Kevin Moran |
ICSE 2024 | Mozi: Discovering DBMS Bugs via Configuration-Based Equivalent Transformation | Jie Liang, Zhiyong Wu, Jingzhou Fu, Mingzhe Wang, Chengnian Sun, Yu Jiang |
ICSE 2024 | MultiTest: Physical-Aware Object Insertion for Testing Multi-sensor Fusion Perception Systems | Xinyu Gao, Zhijie Wang, Yang Feng, Lei Ma, Zhenyu Chen, Baowen Xu |
ICSE 2024 | Novelty Begets Popularity, But Curbs Participation - A Macroscopic View of the Python Open-Source Ecosystem | Hongbo Fang, Jim Herbsleb, Bogdan Vasilescu |
ICSE 2024 | NuzzleBug: Debugging Block-Based Programs in Scratch | Adina Deiner, Gordon Fraser |
ICSE 2024 | Object Graph Programming | Aditya Thimmaiah, Leonidas Lampropoulos, Chris Rossbach, Milos Gligoric |
ICSE 2024 | On Calibration of Pre-trained Code models | Zhenhao Zhou, Chaofeng Sha, Xin Peng |
ICSE 2024 | On Extracting Specialized Code Abilities from Large Language Models: A Feasibility Study | Li Zongjie, Chaozheng Wang, Pingchuan Ma, Chaowei Liu, Shuai Wang, Daoyuan Wu, Cuiyun Gao, Yang Liu |
ICSE 2024 | On Using GUI Interaction Data to Improve Text Retrieval-based Bug Localization | Junayed Mahmud, Nadeeshan De Silva, Safwat Ali Khan, Seyed Hooman Mostafavi, S M Hasan Mansur, Oscar Chaparro, Andrian (Andi) Marcus, Kevin Moran |
ICSE 2024 | On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities | Zhen Li, Ning Wang, Deqing Zou, Yating Li, Ruqian Zhang, Shouhuai Xu, Chao Zhang, Hai Jin |
ICSE 2024 | On the Helpfulness of Answering Developer Questions on Discord with Similar Conversations and Posts from the Past | Alexander Lill, André N. Meyer, Thomas Fritz |
ICSE 2024 | Optimistic Prediction of Synchronization-Reversal Data Races | Zheng Shi, Umang Mathur, Andreas Pavlogiannis |
ICSE 2024 | Out of Context: How important is Local Context in Neural Program Repair? | Julian Prenner, Romain Robbes |
ICSE 2024 | Out of Sight, Out of Mind: Better Automatic Vulnerability Repair by Broadening Input Ranges and Sources | Xin Zhou, Kisub Kim, Bowen Xu, DongGyun Han, David Lo |
ICSE 2024 | PPT4J: Patch Presence Test for Java Binaries | Zhiyuan Pan, Xing Hu, Xin Xia, Xian Zhan, David Lo, Xiaohu Yang |
ICSE 2024 | PS3: Precise Patch Presence Test based on Semantic Symbolic Signature | Qi Zhan, Xing Hu, Zhiyang Li, Xin Xia, David Lo, Shanping Li |
ICSE 2024 | PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG) | Ruichao Liang, Jing Chen, Kun He, Yueming Wu, Gelei Deng, Ruiying Du, Cong Wu |
ICSE 2024 | Practical Non-Intrusive GUI Exploration Testing with Visual-based Robotic Arms | Shengcheng Yu, Chunrong Fang, Mingzhe Du, Yuchen Ling, Zhenyu Chen, Zhendong Su |
ICSE 2024 | Practical Program Repair via Preference-based Ensemble Strategy | Wenkang Zhong, Chuanyi Li, Kui Liu, Tongtong Xu, Jidong Ge, Tegawendé F. Bissyandé, Bin Luo, Vincent Ng |
ICSE 2024 | Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks | Zhongxin Liu, Zhijie Tang, Junwei Zhang, Xin Xia, Xiaohu Yang |
ICSE 2024 | Precise Sparse Abstract Execution via Cross-Domain Interaction | Xiao Cheng, Jiawei Wang, Yulei Sui |
ICSE 2024 | Predicting Performance and Accuracy of Mixed-Precision Programs for Precision Tuning | Yutong Wang, Cindy Rubio-González |
ICSE 2024 | Predicting open source contributor turnover from value-related discussions: An analysis of GitHub issues | Jack Jamieson, Naomi Yamashita, Eureka Foong |
ICSE 2024 | PrettySmart: Detecting Permission Re-delegation Vulnerability for Token Behaviors in Smart Contracts | Zhijie Zhong, Hong-Ning Dai, Zibin Zheng, Qing Xue, Junjia Chen, Yuhong Nan |
ICSE 2024 | Prism: Decomposing Program Semantics for Code Clone Detection through Compilation | Haoran Li, wangsiqian , Weihong Quan, Xiaoli Gong, Huayou Su, Jin Zhang |
ICSE 2024 | Programming Assistant for Exception Handling with CodeBERT | Yuchen Cai, Aashish Yadavally, Abhishek Mishra, Genesis Montejo, Tien N. Nguyen |
ICSE 2024 | Prompting Is All Your Need: Automated Android Bug Replay with Large Language Models | Sidong Feng, Chunyang Chen |
ICSE 2024 | Property-Based Testing in Practice | Harrison Goldstein, Joseph W. Cutler, Daniel Dickstein, Benjamin C. Pierce, Andrew Head |
ICSE 2024 | PyAnalyzer: An Effective and Practical Approach for Dependency Extraction from Python Code | Wuxia Jin, Shuo Xu, Dawei Chen, Jiajun He, Dinghong Zhong, Ming Fan, Hongxu Chen, Huijia Zhang, Ting Liu |
ICSE 2024 | PyTy: Repairing Static Type Errors in Python | Yiu Wai Chow, Luca Di Grazia, Michael Pradel |
ICSE 2024 | REDriver: Runtime Enforcement for Autonomous Vehicles | Yang Sun, Chris Poskitt, Xiaodong Zhang, Jun Sun |
ICSE 2024 | ROSInfer: Statically Inferring Behavioral Component Models for ROS-based Robotics Systems | Tobias Dürschmid, Christopher Steven Timperley, David Garlan, Claire Le Goues |
ICSE 2024 | RPG: Rust Library Fuzzing with Pool-based Fuzz Target Generation and Generic Support | Zhiwu Xu, Bohao Wu, Cheng Wen, Bin Zhang, Shengchao Qin, Mengda He |
ICSE 2024 | RUNNER: Responsible UNfair NEuron Repair for Enhancing Deep Neural Network Fairness | Li Tianlin, Yue Cao, Jian Zhang, Shiqian Zhao, Yihao Huang, Aishan Liu, Qing Guo, Yang Liu |
ICSE 2024 | Raisin: Identifying Rare Sensitive Functions for Bug Detection | Jianjun Huang, Jianglei Nie, Yuanjun Gong, Wei You, Bin Liang, Pan Bian |
ICSE 2024 | ReClues: Representing and indexing failures in parallel debugging with program variables | Yi Song, Xihao Zhang, Xiaoyuan Xie, Quanming Liu, Ruizhi Gao, Chenliang Xing |
ICSE 2024 | ReFAIR: Toward a Context-Aware Recommender for Fairness Requirements Engineering | Carmine Ferrara, Francesco Casillo, Carmine Gravino, Andrea De Lucia, Fabio Palomba |
ICSE 2024 | Recovering Trace Links Between Software Documentation And Code | Jan Keim, Sophie Corallo, Dominik Fuchß, Tobias Hey, Tobias Telge, Anne Koziolek |
ICSE 2024 | Reorder Pointer Flow in Sound Concurrency Bug Prediction | Yuqi Guo, Shihao Zhu, Yan Cai, Liang He, Jian Zhang |
ICSE 2024 | Resource Usage and Optimization Opportunities in Workflows of GitHub Actions | Islem BOUZENIA, Michael Pradel |
ICSE 2024 | Revealing Hidden Threats: An Empirical Study of Library Misuse in Smart Contracts | Mingyuan Huang, Jiachi Chen, Zigui Jiang, Zibin Zheng |
ICSE 2024 | Revisiting Android App Categorization | Marco Alecci, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein |
ICSE 2024 | Ripples of a Mutation — An Empirical Study of Propagation Effects in Mutation Testing | Hang Du, Vijay Krishna Palepu, James Jones |
ICSE 2024 | RogueOne: Detecting Rogue Updates via Differential Data-flow Analysis Using Trust Domains | Raphael J. Sofaer, Yaniv David, Mingqing Kang, Jianjia Yu, Yinzhi Cao, Junfeng Yang, Jason Nieh |
ICSE 2024 | Rust-lancet: Automated Ownership-Rule-Violation Fixing with Behavior Preservation | Wenzhang Yang, Linhai Song, Yinxing Xue |
ICSE 2024 | S3C: Spatial Semantic Scene Coverage for Autonomous Vehicles | Trey Woodlief, Felipe Toledo, Sebastian Elbaum, Matthew B Dwyer |
ICSE 2024 | SCTrans: Constructing a Large Public Scenario Dataset for Simulation Testing of Autonomous Driving Systems | Jiarun Dai, Bufan Gao, Mingyuan Luo, Zongan Huang, Zhongrui Li, Yuan Zhang, Min Yang |
ICSE 2024 | SCVHunter: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network | Feng Luo, Ruijie Luo, Ting Chen, Ao Qiao, Zheyuan He, Shuwei Song, Yu Jiang, Sixing Li |
ICSE 2024 | Safeguarding DeFi Smart Contracts against Oracle Deviations | Xun Deng, Sidi Mohamed Beillahi, Cyrus Minwalla, Han Du, Andreas Veneris, Fan Long |
ICSE 2024 | Scalable Relational Analysis via Relational Bound Propagation | Clay Stevens, Hamid Bagheri |
ICSE 2024 | Scaling Code Pattern Inference with Interactive What-If Analysis | Hong Jin Kang, Kevin Wang, Miryung Kim |
ICSE 2024 | Sedar: Obtaining High-Quality Seeds for DBMS Fuzzing via Cross-DBMS SQL Transfer | Jingzhou Fu, Jie Liang, Zhiyong Wu, Yu Jiang |
ICSE 2024 | Semantic Analysis of Macro Usage for Portability | Brent Pappas, Paul Gazzillo |
ICSE 2024 | Semantic GUI Scene Learning and Video Alignment for Detecting Duplicate Video-based Bug Reports | Yanfu Yan, Nathan Cooper, Oscar Chaparro, Kevin Moran, Denys Poshyvanyk |
ICSE 2024 | Semantic-Enhanced Static Vulnerability Detection in Baseband Firmware | Yiming Liu, Cen Zhang, Feng Li, Yeting Li, Jianhua Zhou, Jian Wang, Lanlan Zhan, Yang Liu, Wei Huo |
ICSE 2024 | Shedding Light on Software Engineering-specific Metaphors and Idioms | Mia Mohammad Imran, Preetha Chatterjee, Kostadin Damevski |
ICSE 2024 | Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners? | Stefanos Chaliasos, Marcos Antonios Charalambous, Liyi Zhou, Rafaila Galanopoulou, Arthur Gervais, Dimitris Mitropoulos, Ben Livshits |
ICSE 2024 | SpecBCFuzz: Fuzzing LTL Solvers with Boundary Conditions | Luiz Carvalho, Renzo Degiovanni, Maxime Cordy, Nazareno Aguirre, Yves Le Traon, Mike Papadakis |
ICSE 2024 | Streamlining Java Programming: Uncovering Well-Formed Idioms with IdioMine | Yanming Yang, Xing Hu, Xin Xia, David Lo, Xiaohu Yang |
ICSE 2024 | Strengthening Supply Chain Security with Fine-grained Safe Patch Identification | Luo Changhua, Wei Meng, Shuai Wang |
ICSE 2024 | Supporting Web-based API Searches in the IDE Using Signatures | Nick Bradley, Thomas Fritz, Reid Holmes |
ICSE 2024 | Symbol-Specific Sparsification of Interprocedural Distributive Environment Problems | Kadiray Karakaya, Eric Bodden |
ICSE 2024 | TRACED: Execution-aware Pre-training for Source Code | Yangruibo Ding, Benjamin Steenhoek, Kexin Pei, Gail Kaiser, Wei Le, Baishakhi Ray |
ICSE 2024 | TRIAD: Automated Traceability Recovery based on Biterm-enhanced Deduction of Transitive Links among Artifacts | Hui Gao, Hongyu Kuang, Wesley Assunção, Christoph Mayr-Dorn, Guoping Rong, He Zhang, Xiaoxing Ma, Alexander Egyed |
ICSE 2024 | Tensor-Aware Energy Accounting | Timur Babakol, Yu David Liu |
ICSE 2024 | Testing Graph Database Systems via Equivalent Query Rewriting | Qiuyang Mang, Aoyang Fang, BoXi Yu, Hanfei Chen, Pinjia He |
ICSE 2024 | Testing the Limits: Unusual Text Inputs Generation for Mobile App Crash Detection with Large Language Model | Zhe Liu, Chunyang Chen, Junjie Wang, Mengzhuo Chen, Boyu Wu, Zhilin Tian, Yuekai Huang, Jun Hu, Qing Wang |
ICSE 2024 | The Classics Never Go Out of Style: An Empirical Study of Downgrades from the Bazel Build Technology | Mahmoud Alfadel, Shane McIntosh |
ICSE 2024 | Toward Automatically Completing GitHub Workflows | Antonio Mastropaolo, Fiorella Zampetti, Gabriele Bavota, Massimiliano Di Penta |
ICSE 2024 | Toward Improved Deep Learning-based Vulnerability Detection | Adriana Sejfia, Satyaki Das, Saad Shafiq, Nenad Medvidović |
ICSE 2024 | Towards Causal Deep Learning for Vulnerability Detection | Md Mahbubur Rahman, Ira Ceka, Chengzhi Mao, Saikat Chakraborty, Baishakhi Ray, Wei Le |
ICSE 2024 | Towards Finding Accounting Errors in Smart Contracts | Brian Zhang |
ICSE 2024 | Towards More Practical Automation of Vulnerability Assessment | Shengyi Pan, Lingfeng Bao , Jiayuan Zhou, Xing Hu, Xin Xia, Shanping Li |
ICSE 2024 | Towards Reliable AI: Adequacy Metrics for Ensuring the Quality of System-level Testing of Autonomous Vehicles | Neelofar Neelofar, Aldeida Aleti |
ICSE 2024 | Trace-based Multi-Dimensional Root Cause Localization of Performance Issues in Microservice Systems | Chenxi Zhang, Zhen Dong, Xin Peng, Bicheng Zhang, Miao Chen |
ICSE 2024 | Traces of Memorisation in Large Language Models for Code | Ali Al-Kaswan, Maliheh Izadi, Arie van Deursen |
ICSE 2024 | Translation Validation for JIT Compiler in the V8 JavaScript Engine | Seungwan Kwon, Jaeseong Kwon, Wooseok Kang, Juneyoung Lee, Kihong Heo |
ICSE 2024 | Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts | Shuo Yang, Jiachi Chen, Mingyuan Huang, Zibin Zheng, Yuan Huang |
ICSE 2024 | Uncovering the Causes of Emotions in Software Developer Communication Using Zero-shot LLMs | Mia Mohammad Imran, Preetha Chatterjee, Kostadin Damevski |
ICSE 2024 | Understanding Transaction Bugs in Database Systems | Ziyu Cui, Wensheng Dou, Yu Gao, Dong Wang, Jiansen Song, Yingying Zheng, Tao Wang, Rui Yang, Kang Xu, Yixin Hu, Jun Wei, Tao Huang |
ICSE 2024 | UniLog: Automatic Logging via LLM and In-Context Learning | Junjielong Xu, Ziang Cui, Yuan Zhao, Xu Zhang, Shilin He, Pinjia He, Liqun Li, Yu Kang, Qingwei Lin, Yingnong Dang, Saravan Rajmohan, Dongmei Zhang |
ICSE 2024 | Unraveling the Drivers of Sense of Belonging in Software Delivery Teams: Insights from a Large-Scale Survey | Bianca Trinkenreich, Marco Gerosa, Igor Steinmacher |
ICSE 2024 | Unveiling Memorization in Code Models | Zhou Yang, Zhipeng Zhao, Chenyu Wang, Jieke Shi, Dongsun Kim, DongGyun Han, David Lo |
ICSE 2024 | Unveiling the Life Cycle of User Feedback: Best Practices from Software Practitioners | Ze Shi Li, Nowshin Nawar Arony, Kezia Devathasan, Manish Sihag, Neil Ernst, Daniela Damian |
ICSE 2024 | Using an LLM to Help With Code Understanding | Daye Nam, Andrew Macvean, Vincent J. Hellendoorn, Bogdan Vasilescu, Brad A. Myers |
ICSE 2024 | VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses | Yu Nong, Richard Fang, Guangbei Yi, Kunsong Zhao, Xiapu Luo, Feng Chen, Haipeng Cai |
ICSE 2024 | VeRe: Verification Guided Synthesis for Repairing Deep Neural Networks | Jianan Ma, Pengfei Yang, Jingyi Wang, Youcheng Sun, Cheng-Chao Huang, Zhen Wang |
ICSE 2024 | Verifying Declarative Smart Contracts | Haoxian Chen, Lan Lu, Brendan Massey, Yuepeng Wang, Boon Thau Loo |
ICSE 2024 | When Contracts Meets Crypto: Exploring Developers' Struggles with Ethereum Cryptographic APIs | Jiashuo Zhang, Jiachi Chen, Zhiyuan Wan, Ting Chen, Jianbo Gao, Zhong Chen |
ICSE 2024 | When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference | Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Li Li |
ICSE 2024 | Where is it? Tracing the Vulnerability-relevant Files from Vulnerability Reports | Jiamou Sun, Jieshan Chen, Zhenchang Xing, Qinghua Lu, Xiwei (Sherry) Xu, Liming Zhu |
ICSE 2024 | Xpert: Empowering Incident Management with Query Recommendations via Large Language Models | Yuxuan Jiang, Chaoyun Zhang, Shilin He, Zhihao Yang, Minghua Ma, Si Qin, Yu Kang, Yingnong Dang, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang |
ICSE 2024 | “I tend to view ads almost like a pestilence”: On the Accessibility Implications of Mobile Ads for Blind Users | Ziyao He, Syed Fatiul Huq, Sam Malek |
ICSE 2024 | “My GitHub Sponsors profile is live!” Investigating the Impact of Twitter/X Mentions on GitHub Sponsors | Youmei Fan, Tao Xiao, Hideaki Hata, Christoph Treude, Kenichi Matsumoto |
FSE 2024 | "The Law Doesn’t Work Like a Computer": Exploring Software Licensing Issues Faced by Legal Practitioners | Nathan Wintersgill, Trevor Stalnaker, Laura A. Heymann, Oscar Chaparro, Denys Poshyvanyk |
FSE 2024 | A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques | Max Landauer, Florian Skopik, Markus Wurzenberger |
FSE 2024 | A Deep Dive into Large Language Models for Automated Bug Localization and Repair | Soneya Binta Hossain, Nan Jiang, Qiang Zhou, Xiaopeng LI, Wen-Hao Chiang, Yingjun Lyu, Hoan Nguyen, Omer Tripp |
FSE 2024 | A Miss Is as Good as A Mile: Metamorphic Testing for Deep Learning Operators | Jinyin Chen, Chengyu Jia, Yunjie Yan, Jie Ge, haibin zheng, Yao Cheng |
FSE 2024 | A Quantitative and Qualitative Evaluation of LLM-based Explainable Fault Localization | Sungmin Kang, Gabin An, Shin Yoo |
FSE 2024 | A Transferability Study of Interpolation-Based Hardware Model Checking to Software Verification | Dirk Beyer, Po-Chun Chien, Marek Jankola, Nian-Ze Lee |
FSE 2024 | A Weak Supervision-Based Approach to Improve Chatbots for Code Repositories | Farbod Farhour, Ahmad Abdellatif, Essam Mansour, Emad Shihab |
FSE 2024 | AI-assisted Code Authoring at Scale: Fine-tuning, deploying, and mixed methods evaluation | Vijayaraghavan Murali, Chandra Sekhar Maddila, Imad Ahmad, Michael Bolin, Daniel Cheng, Negar Ghorbani, Renuka Fernandez, Nachiappan Nagappan, Peter C Rigby |
FSE 2024 | AROMA: Automatic Reproduction of Maven Artifacts | Mehdi Keshani, Tudor-Gabriel Velican, Gideon Bot, Sebastian Proksch |
FSE 2024 | Abstraction-Aware Inference of Metamorphic Relations | Agustin Nolasco, Facundo Molina, Renzo Degiovanni, Alessandra Gorla, Diego Garbervetsky, Mike Papadakis, Sebastian Uchitel, Nazareno Aguirre, Marcelo F. Frias |
FSE 2024 | Active Monitoring Mechanism for Control-based Self-Adaptive Systems | Yi Qin, Yanxiang Tong, Yifei Xu, Chun Cao, Xiaoxing Ma |
FSE 2024 | Adapting Multi-objectivized Software Configuration Tuning | Tao Chen, Miqing Li |
FSE 2024 | An Analysis of the Costs and Benefits of Autocomplete in IDEs | Shaokang Jiang, Michael Coblenz |
FSE 2024 | An Empirical Study on Focal Methods in Deep-Learning-Based Approaches for Assertion Generation | Yibo He, Jiaming Huang, Hao Yu, Tao Xie |
FSE 2024 | An empirical study on code review activity prediction in practice | Doriane Olewicki, Sarra Habchi, Bram Adams |
FSE 2024 | Analyzing Quantum Programs with LintQ: A Static Analysis Framework for Qiskit | Matteo Paltenghi, Michael Pradel |
FSE 2024 | Are Human Rules Necessary? Generating Reusable APIs with CoT Reasoning and In-context Learning | Yubo Mai, Zhipeng Gao, Xing Hu, Lingfeng Bao , Yu Liu, JianLing Sun |
FSE 2024 | BARO: Robust Root Cause Analysis for Microservices via Multivariate Bayesian Online Change Point Detection | Luan Pham, Huong Ha, Hongyu Zhang |
FSE 2024 | BRF: Fuzzing the eBPF runtime | Hsin-Wei Hung, Ardalan Amiri Sani |
FSE 2024 | Beyond Code Generation: An Observational Study of ChatGPT Usage in Software Engineering Practice | Ranim Khojah, Mazen Mohamad, Philipp Leitner, Francisco Gomes de Oliveira Neto |
FSE 2024 | Bin2Summary: Beyond Function Name Prediction in Stripped Binaries with Functionality-specific Code Embeddings | Zirui Song, Jiongyi Chen, Kehuan Zhang |
FSE 2024 | Bloat beneath Python's Scales: A Fine-Grained Inter-Project Dependency Analysis | Georgios-Petros Drosos, Thodoris Sotiropoulos, Diomidis Spinellis, Dimitris Mitropoulos |
FSE 2024 | Bounding Random Test Set Size with Computational Learning Theory | Neil Walkinshaw, Michael Foster, José Miguel Rojas, Robert Hierons |
FSE 2024 | CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection | Shihan Dou, Yueming Wu, Haoxiang Jia, Yuhao Zhou, Yang Liu |
FSE 2024 | CORE: Resolving Code Quality Issues Using LLMs | Nalin Wadhwa, Jui Pradhan, Atharv Sonwane, Surya Prakash Sahu, Nagarajan Natarajan, Aditya Kanade, Suresh Parthasarathy, Sriram Rajamani |
FSE 2024 | COSTELLO: Contrastive Testing for Embedding-based Large Language Model as a Service Embeddings | Weipeng Jiang, Juan Zhai, Shiqing Ma, Xiaoyu Zhang, Chao Shen |
FSE 2024 | Can GPT-4 Replicate Empirical Software Engineering Research? | Jenny T. Liang, Carmen Badea, Christian Bird, Robert DeLine, Denae Ford, Nicole Forsgren, Thomas Zimmermann |
FSE 2024 | Can Large Language Models Transform Natural Language Intent into Formal Method Postconditions? | Madeline Endres, Sarah Fakhoury, Saikat Chakraborty, Shuvendu K. Lahiri |
FSE 2024 | ChangeRCA: Finding Root Causes from Software Changes in Large Online Systems | Guangba Yu, Pengfei Chen, Zilong He, Qiuyu Yan, Yu Luo, Fangyuan Li, Zibin Zheng |
FSE 2024 | Characterizing Python Library Migrations | Mohayeminul Islam, Ajay Jha, Ildar Akhmetov, Sarah Nadi |
FSE 2024 | ClarifyGPT: A Framework for Enhancing LLM-based Code Generation via Requirements Clarification | Fangwen Mu, Lin Shi, Song Wang, Zhuohao Yu, Binquan Zhang, ChenXue Wang, Shichao LIu, Qing Wang |
FSE 2024 | Code-Aware Prompting: A study of Coverage guided Test Generation in Regression Setting using LLM | Gabriel Ryan, Siddhartha Jain, Mingyue Shang, Shiqi Wang, Xiaofei Ma, Murali Krishna Ramanathan, Baishakhi Ray |
FSE 2024 | CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking | Zian Su, Xiangzhe Xu, Ziyang Huang, Zhuo Zhang, Yapeng Ye, Jianjun Huang, Xiangyu Zhang |
FSE 2024 | CodePlan: Repository-level Coding using LLMs and Planning | Ramakrishna Bairi, Atharv Sonwane, Aditya Kanade, Vageesh D C, Arun Iyer, Suresh Parthasarathy, Sriram Rajamani, B. Ashok, Shashank Shet |
FSE 2024 | Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications | Keke Lian, Lei Zhang, Guangliang Yang, Shuo Mao, Xinjie Wang, Yuan Zhang, Min Yang |
FSE 2024 | CrossCert: A Cross-Checking Detection Approach to Patch Robustness Certification for Deep Learning Models | Qilin Zhou, Zhengyuan Wei, Haipeng Wang, Bo Jiang, Wing-Kwong Chan |
FSE 2024 | Cut to the Chase: An Error-Oriented Approach to Detect Error-Handling Bugs | Haoran Liu, Zhouyang Jia, Shanshan Li, Yan Lei, Yue Yu, Yu Jiang, Xiaoguang Mao, Liao Xiangke |
FSE 2024 | DAInfer: Inferring API Aliasing Specifications from Library Documentation via Neurosymbolic Optimization | Chengpeng Wang, Jipeng Zhang, Rongxin Wu, Charles Zhang |
FSE 2024 | DTD: Comprehensive and Scalable Testing for Debuggers | Hongyi Lu, Zhibo Liu, Shuai Wang, Fengwei Zhang |
FSE 2024 | DeSQL: Interactive Debugging of SQL in Data-Intensive Scalable Computing | Sabaat Haroon, Chris Brown, Muhammad Ali Gulzar |
FSE 2024 | DeciX: Explain Deep Learning Based Code Generation Applications | Simin Chen, Zexin Li, Wei Yang, Cong Liu |
FSE 2024 | Decomposing Software Verification Using Distributed Summary Synthesis | Dirk Beyer, Matthias Kettl, Thomas Lemberger |
FSE 2024 | Demystifying Invariant Effectiveness for Securing Smart Contracts | Zhiyang Chen, Ye Liu, Sidi Mohamed Beillahi, Yi Li, Fan Long |
FSE 2024 | Dependency-Induced Waste in Continuous Integration: An Empirical Study of Unused Dependencies in the NPM Ecosystem | Nimmi Weeraddana, Mahmoud Alfadel, Shane McIntosh |
FSE 2024 | DiffCoder: Enhancing Large Language Model on API Invocation via Analogical Code Exercises | Daoguang Zan, Ailun Yu, Bo Shen, Bei Chen, Wei Li, Yongshun Gong, Xiaolin Chen, Yafen Yao, Weihua Luo, Bei Guan, Yan Liu, Yongji Wang, Qianxiang Wang, Lizhen Cui |
FSE 2024 | Do Code Generation Models Think Like Us? - A Study of Attention Alignment between Large Language Models and Human Programmers | Bonan Kou, Shengmai Chen, Zhijie Wang, Lei Ma, Tianyi Zhang |
FSE 2024 | Do Words Have Power? Understanding and Fostering Civility in Code Review Discussion | Md Shamimur Rahman, Zadia Codabux, Chanchal K. Roy |
FSE 2024 | DyPyBench: A Benchmark of Executable Python Software | Islem BOUZENIA, Bajaj Piyush Krishan, Michael Pradel |
FSE 2024 | Effective Teaching through Code Reviews: Patterns and Anti-Patterns | Anita Sarma, Nina Chen |
FSE 2024 | Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts | Zexu Wang, Jiachi Chen, Yanlin Wang, Zibin Zheng, Yu Zhang, Weizhe Zhang |
FSE 2024 | Enhancing Code Understanding for Impact Analysis by Combining Transformers and Program Dependence Graphs | Yanfu Yan, Nathan Cooper, Kevin Moran, Gabriele Bavota, Denys Poshyvanyk, Steve Rich |
FSE 2024 | Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-Task Learning | Xiaoling Zhang, Zhengzi Xu, shouguo yang, Zhi Li, Zhiqiang Shi, Limin Sun |
FSE 2024 | Evaluating Directed Fuzzers: Are We Heading in the Right Direction? | Tae Eun Kim, Jaeseung Choi, Seongjae Im, Kihong Heo, Sang Kil Cha |
FSE 2024 | Evaluating and Improving ChatGPT for Unit Test Generation | Zhiqiang Yuan, Mingwei Liu, Shiji Ding, Kaixin Wang, Yixuan Chen, Xin Peng, Yiling Lou |
FSE 2024 | Evolutionary Multi-Objective Optimization for Contextual Adversarial Example Generation | Shasha Zhou, Mingyu Huang, Ke Li, Yanan Sun |
FSE 2024 | Exploring and Unleashing the Power of Large Language Models in Automated Code Translation | Zhen Yang, Fang Liu, Zhongxing Yu, Jacky Keung, Jia Li, Shuo Liu, Hong Yifan, Xiaoxue Ma, Zhi Jin, Ge Li |
FSE 2024 | EyeTrans: Merging Human and Machine Attention for Neural Code Summarization | Yifan Zhang, Jiliang Li, Zachary Karas, Aakash Bansal, Toby Jia-Jun Li, Collin McMillan, Kevin Leach, Yu Huang |
FSE 2024 | Fast Graph Simplification for Path-Sensitive Typestate Analysis through Tempo-Spatial Multi-Point Slicing | Xiao Cheng, Jiawei Ren, Yulei Sui |
FSE 2024 | FeatMaker: Automated Feature Engineering for Search Strategy of Symbolic Execution | Jaehan Yoon, Sooyoung Cha |
FSE 2024 | Finding and Understanding Defects in Static Analyzers by Constructing Automated Oracles | weigang he, Peng Di, Mengli Ming, Chengyu Zhang, Ting Su, Shijie Li, Yulei Sui |
FSE 2024 | Generative AI for Pull Request Descriptions: Adoption, Impact, and Developer Interventions | Tao Xiao, Hideaki Hata, Christoph Treude, Kenichi Matsumoto |
FSE 2024 | Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection | Yuxi Li, Yi Liu, Gelei Deng, Ying Zhang, Wenjia Song, Ling Shi, Kailong Wang, Yuekang Li, Yang Liu, Haoyu Wang |
FSE 2024 | Go Static: Contextualized Logging Statement Generation | Yichen LI, Yintong Huo, Renyi Zhong, Zhihan Jiang, Jinyang Liu, Junjie Huang, Jiazhen Gu, Pinjia He, Michael Lyu |
FSE 2024 | Harnessing Neuron Stability to Improve DNN Verification | Hai Duong, Dong Xu, ThanhVu Nguyen, Matthew B Dwyer |
FSE 2024 | How does Simulation-based Testing for Self-driving Cars match Human Perception? | Christian Birchler, Tanzil Kombarabettu Mohammed, Pooja Rani, Teodora Nechita, Timo Kehrer, Sebastiano Panichella |
FSE 2024 | How to Gain Commit Rights in Modern Top Open Source Communities? | Xin Tan, Yan Gong, Geyu Huang, Haohua Wu, Li Zhang |
FSE 2024 | IRCoCo: Immediate Rewards-Guided Deep Reinforcement Learning for Code Completion | Bolun Li, Zhihong Sun, Tao Huang, Hongyu Zhang, Yao Wan, Chen Lyu, Ge Li, Zhi Jin |
FSE 2024 | Improving the Learning of Code Review Successive Tasks with Cross-Task Knowledge Distillation | Oussama Ben Sghaier, Houari Sahraoui |
FSE 2024 | Investigating Documented Privacy Changes in Android OS | Chuan Yan, Mark Huasong Meng, Fuman Xie, Guangdong Bai |
FSE 2024 | JIT-Smart: A Multi-Task Learning Framework for Just-In-Time Defect Prediction and Localization | Xiangping Chen, Furen Xu, Yuan Huang, Neng Zhang, Zibin Zheng |
FSE 2024 | Java JIT Testing with Template Extraction | Zhiqiang Zang, Fu-Yao Yu, Aditya Thimmaiah, August Shi, Milos Gligoric |
FSE 2024 | LILAC: Log Parsing using LLMs with Adaptive Parsing Cache | Zhihan Jiang, Jinyang Liu, Zhuangbin Chen, Yichen LI, Junjie Huang, Yintong Huo, Pinjia He, Jiazhen Gu, Michael Lyu |
FSE 2024 | Learning to Detect and Localize Multilingual Bugs | Haoran Yang, Yu Nong, Tao Zhang, Xiapu Luo, Haipeng Cai |
FSE 2024 | Less Cybersickness, Please: Demystifying and Detecting Stereoscopic Visual Inconsistencies in Virtual Reality Applications | Shuqing Li, Cuiyun Gao, Jianping Zhang, Yujia Zhang, Yepang Liu, Jiazhen Gu, Yun Peng, Michael Lyu |
FSE 2024 | LogSD: Detecting Anomalies from System Logs through Self-supervised Learning and Frequency-based Masking | Yongzheng Xie, Hongyu Zhang, Muhammad Ali Babar |
FSE 2024 | MTAS: A Reference-Free Approach for Evaluating Abstractive Summarization Systems | Xiaoyan Zhu, Mingyue Jiang, Xiao-Yi Zhang, Liming Nie, Zuohua Ding |
FSE 2024 | Maximizing Patch Coverage for Testing of Highly-Configurable Software without Exploding Build Times | Necip Fazıl Yıldıran, Jeho Oh, Julia Lawall, Paul Gazzillo |
FSE 2024 | Metamorphic Testing of Secure Multi-Party Computation (MPC) Compilers | Dongwei Xiao, Zhibo Liu, Qi Pang, Shuai Wang, Yichen LI |
FSE 2024 | Mining Action Rules for Defect Reduction Planning | Khouloud Oueslati, Gabriel Laberge, Maxime Lamothe, Foutse Khomh |
FSE 2024 | MirrorFair: Fixing Fairness Bugs in Machine Learning Software via Counterfactual Predictions | Ying Xiao, Jie M. Zhang, Yepang Liu, Mohammad Reza Mousavi, Sicen Liu, Dingyuan Xue |
FSE 2024 | MisConferenceiguration Software Testing for Failure Emergence in Autonomous Driving Systems | Yuntianyi Chen, Yuqi Huai, Shilong Li, Changnam Hong, Joshua Garcia |
FSE 2024 | Mobile Bug Report Reproduction via Global Search on the App UI Model | Zhaoxu Zhang, Fazle Mohammed Tawsif, Komei Ryu, Tingting Yu, William G.J. Halfond |
FSE 2024 | Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large Language Models | Yan Wang, Xiaoning Li, Tien N. Nguyen, Shaohua Wang, Chao Ni, Ling Ding |
FSE 2024 | Natural Symbolic Execution-based Testing for Big Data Analytics | Yaoxuan Wu, Ahmad Humayun, Muhammad Ali Gulzar, Miryung Kim |
FSE 2024 | On Reducing Undesirable Behavior in Deep-Reinforcement-Learning-Based Software | Ophir Carmel, Guy Katz |
FSE 2024 | On the Contents and Utility of IoT Cybersecurity Guidelines | Jesse Chen, Dharun Anandayuvaraj, James C. Davis, Sazzadur Rahaman |
FSE 2024 | Only diff is Not Enough: Generating Commit Messages Leveraging Reasoning and Action of Large Language Model | Jiawei Li, David Faragó, Christian Petrov, Iftekhar Ahmed |
FSE 2024 | PBE-based Selective Abstraction and Refinement for Efficient Property Falsification of Embedded Software | Yoel Kim, Yunja Choi |
FSE 2024 | PPM: Automated Generation of Diverse Programming Problems for Benchmarking Code Generation Models | Simin Chen, XiaoNing Feng, Xiaohong Han, Cong Liu, Wei Yang |
FSE 2024 | Partial Solution Based Constraint Solving Cache in Symbolic Execution | Ziqi Shuai, Zhenbang Chen, Kelin Ma, Kunlin Liu, Yufeng Zhang, Jun Sun, Ji Wang |
FSE 2024 | Predicting Code Comprehension: A Novel Approach to Align Human Gaze with Code Using Deep Neural Networks | Tarek Alakmeh, David Reich, Lena Jäger, Thomas Fritz |
FSE 2024 | Predicting Configuration Performance in Multiple Environments with Sequential Meta-Learning | Jingzhi Gong, Tao Chen |
FSE 2024 | Predicting Failures of Autoscaling Distributed Applications | Giovanni Denaro, Noura El Moussa, Rahim Heydarov, Francesco Lomio, Mauro Pezze, Ketai Qiu |
FSE 2024 | Predictive Program Slicing via Execution Knowledge-Guided Dynamic Dependence Learning | Aashish Yadavally, Yi Li, Tien N. Nguyen |
FSE 2024 | ProveNFix: Temporal Property guided Program Repair | Yahui Song, Xiang Gao, Wenhua Li, Wei-Ngan Chin, Abhik Roychoudhury |
FSE 2024 | PyRadar: Towards Automatically Retrieving and Validating Source Code Repository Information for PyPI Packages | Kai Gao, Weiwei Xu, Wenhao Yang, Minghui Zhou |
FSE 2024 | R2I: A Relative Readability Metric for Decompiled Code | Haeun Eom, Dohee Kim, Sori Lim, Hyungjoon Koo, Sungjae Hwang |
FSE 2024 | RavenBuild: Context, Relevance, and Dependency Aware Build Outcome Prediction | Gengyi Sun, Sarra Habchi, Shane McIntosh |
FSE 2024 | Refactoring to Pythonic Idioms: A Hybrid Knowledge-Driven Approach Leveraging Large Language Models | zejun zhang, Zhenchang Xing, Xiaoxue Ren, Qinghua Lu, Xiwei (Sherry) Xu |
FSE 2024 | Revealing Software Development Work Patterns with PR-Issue Graph Topologies | Cleidson de Souza, Emilie Ma, Jesse Wong, Dongwook Yoon, Ivan Beschastnikh |
FSE 2024 | Rocks Coding, Not Development–A Human-Centric, Experimental Evaluation of LLM-Supported SE Tasks | Wei Wang, Huilong Ning, Gaowei Zhang, Libo Liu, Yi Wang |
FSE 2024 | Semi-Supervised Crowdsourced Test Report Clustering via Screenshot-Text Binding Rules | Shengcheng Yu, Chunrong Fang, Quanjun Zhang, Mingzhe Du, Jia Liu, Zhenyu Chen |
FSE 2024 | Shadows in the Interface: A Comprehensive Study on Dark Patterns | Liming Nie, Yangyang Zhao, Chenglin Li, Xuqiong Luo, Yang Liu |
FSE 2024 | Sharing Software-Evolution Datasets: Practices, Challenges, and Recommendations | David Broneske, Sebastian Kittan, Jacob Krüger |
FSE 2024 | SimLLM: Measuring Semantic Similarity in Code Summaries Using a Large Language Model-Based Approach | Xin Jin, Zhiqiang Lin |
FSE 2024 | SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis | Zeqin Liao, Henglong Liang, Yuhong Nan, Sicheng Hao, Zibin Zheng, Juan Zhai, Jiajing Wu |
FSE 2024 | State Reconciliation Defects in Infrastructure as Code | Md Mahadi Hassan, John Salvador, Shubhra Kanti Karmaker Santu, Akond Rahman |
FSE 2024 | Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We? | Kaixuan Li, Yue Xue, Sen Chen, Han Liu, Kairan Sun, Ming Hu, Haijun Wang, Yang Liu, Yixiang Chen |
FSE 2024 | Syntax Is All You Need: A Universal-Language Approach to Mutant Generation | Sourav Deb, Kush Jain, Rijnard van Tonder, Claire Le Goues, Alex Groce |
FSE 2024 | TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers | Changwei Zou, Dongjie He, Yulei Sui, Jingling Xue |
FSE 2024 | Towards AI-Assisted Synthesis of Verified Dafny Methods | Md Rakib Hossain Misu, Crista Lopes, Iris Ma, James Noble |
FSE 2024 | Towards Better Graph Neural Network-based Fault Localization Through Enhanced Code Representation | Md Nakhla Rafi, Dong Jae Kim, An Ran Chen, Tse-Hsun (Peter) Chen, Shaowei Wang |
FSE 2024 | Towards Effective Multi-Hunk Bug Repair: Detecting, Creating, Evaluating, and Understanding Indivisible Bugs | Qi Xin, Haojun Wu, Jinran Tang, Xinyu Liu, Steven P. Reiss, Jifeng Xuan |
FSE 2024 | Towards Efficient Build Ordering for Incremental Builds with Multiple Configurations | Jun Lyu, Shanshan Li, He Zhang, Lanxin Yang, Bohan Liu, Manuel Rigger |
FSE 2024 | Towards Efficient Verification of Constant-Time Cryptographic Implementations | Luwei Cai, Fu Song, Taolue Chen |
FSE 2024 | TraStrainer: Adaptive Sampling for Distributed Traces with System Runtime State | Haiyu Huang, Xiaoyu Zhang, Pengfei Chen, Zilong He, Zhiming Chen, Guangba Yu, Hongyang Chen, Chen Sun |
FSE 2024 | Understanding Developers' Discussions and Perceptions on Non-Functional Requirements: The Case of the Spring Ecosystem | Anderson Oliveira, João Lucas Correia, Wesley Assunção, Juliana Alves Pereira, Rafael de Mello, Daniel Coutinho, Caio Barbosa, Paulo Vítor C. F. Libório, Alessandro Garcia |
FSE 2024 | Understanding and Detecting Annotation-induced Faults of Static Analyzers | Huaien Zhang, Yu Pei, Shuyun Liang, Shin Hwei Tan |
FSE 2024 | Understanding the Impact of APIs Behavioral Breaking Changes on Client Applications | Dhanushka Jayasuriya, Valerio Terragni, Jens Dietrich, Kelly Blincoe |
FSE 2024 | Unprecedented Code Change Automation: The Fusion of LLMs and Transformation by Example | Malinda Dilhara, Abhiram Bellur, Timofey Bryksin, Danny Dig |
FSE 2024 | Your Code Secret Belongs to Me: Neural Code Completion Tools Can Memorize Hard-coded Credentials | Yizhan Huang, Yichen LI, Weibin Wu, Jianping Zhang, Michael Lyu |
ASE 2024 | 1+1>2: Integrating Deep Code Behaviors with Metadata Features for Malicious PyPI Package Detection | Xiaobing Sun, Xingan Gao, Sicong Cao, Lili Bo, Xiaoxue Wu, Kaifeng Huang |
ASE 2024 | A Combinatorial Testing Approach to Surrogate Model Construction | Sunny Shree, Krishna Khadka, Jeff Yu Lei, Raghu Kacker, D. Richard Kuhn |
ASE 2024 | A Joint Learning Model with Variational Interaction for Multilingual Program Translation | Yali Du, Hui Sun, Ming Li |
ASE 2024 | A Longitudinal Analysis Of Replicas in the Wild Wild Android | Syeda Mashal Abbas Zaidi, Shahpar Khan, Parjanya Vyas, Yousra Aafer |
ASE 2024 | A Pair Programming Framework for Code Generation via Multi-Plan Exploration and Feedback-Driven Refinement | Huan Zhang, Wei Cheng, Yuhan Wu, Wei Hu |
ASE 2024 | A Position-Aware Approach to Decomposing God Classes | Tianyi Chen, Yanjie Jiang, Fu Fan, Bo Liu, Hui Liu |
ASE 2024 | A Systematic Evaluation of Large Code Models in API Suggestion: When, Which, and How | Chaozheng Wang, Shuzheng Gao, Cuiyun Gao, Wenxuan Wang, Chun Yong Chong, Shan Gao, Michael Lyu |
ASE 2024 | AACEGEN: Attention Guided Adversarial Code Example Generation for Deep Code Models | Zhong Li, Chong Zhang, Minxue Pan, Tian Zhang, Xuandong Li |
ASE 2024 | AI-driven Java Performance Testing: Balancing Result Quality with Testing Time | Luca Traini, Federico Di Menna, Vittorio Cortellessa |
ASE 2024 | ART: A Unified Unsupervised Framework for Incident Management in Microservice Systems | Yongqian Sun, Binpeng Shi, Mingyu Mao, Minghua Ma, Sibo Xia, Shenglin Zhang, Dan Pei |
ASE 2024 | AVIATE: Exploiting Translation Variants of Artifacts to Improve IR-based Traceability Recovery in Bilingual Software Projects | Kexin Sun, Yiding Ren, Hongyu Kuang, Hui Gao, Xiaoxing Ma, Guoping Rong, Dong Shao, He Zhang |
ASE 2024 | AXA: Cross-Language Analysis through Integration of Single-Language Analyses | Tobias Roth, Julius Näumann, Dominik Helm, Sven Keidel, Mira Mezini |
ASE 2024 | AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis | Yin Wu, Xiaofei Xie, Chenyang Peng, Dijun Liu, Hao Wu, Ming Fan, Ting Liu, Haijun Wang |
ASE 2024 | An Empirical Study on Learning-based Techniques for Explicit and Implicit Commit Messages Generation | Zhiquan Huang, Yuan Huang, Xiangping Chen, Xiaocong Zhou, Changlin Yang, Zibin Zheng |
ASE 2024 | An Empirical Study to Evaluate AIGC Detectors on Code Content | wang.jian , Shangqing Liu, Xiaofei Xie, Yi Li |
ASE 2024 | An Explainable Automated Model for Measuring Software Engineer Contribution | Yue Li, He Zhang, Yuzhe Jin, Zhong Ren, Liming Dong, Jun Lyu, Lanxin Yang, David Lo, Dong Shao |
ASE 2024 | Approximation-guided Fairness Testing through Discriminatory Space Analysis | Zhenjiang Zhao, Takahisa Toda, Takashi Kitamura |
ASE 2024 | Attribution-guided Adversarial Code Prompt Generation for Code Completion Models | Xueyang Li, Guozhu Meng, Shangqing Liu, Lu Xiang, Kun Sun, Kai Chen, Xiapu Luo, Yang Liu |
ASE 2024 | B4: Towards Optimal Assessment of Plausible Code Solutions with Plausible Tests | Mouxiang Chen, Zhongxin Liu, He Tao, Yusu Hong, David Lo, Xin Xia, JianLing Sun |
ASE 2024 | Balancing the Quality and Cost of Updating Dependencies | Damien Jaime, Pascal Poizat, Joyce El Haddad, Thomas Degueule |
ASE 2024 | Beyond Manual Modeling: Automating GUI Model Generation Using Design Documents | Shaoheng Cao, Renyi Chen, Minxue Pan, Wenhua Yang, Xuandong Li |
ASE 2024 | Blackbox Observability of Features and Feature Interactions | Kallistos Weis, Leopoldo Teixeira, Clemens Dubslaff, Sven Apel |
ASE 2024 | Bridging the Gap between Real-world and Synthetic Images for Testing Autonomous Driving Systems | Mohammad Hossein Amini, Shiva Nejati |
ASE 2024 | CEDAR: Assembling LLMs with Expert Toolsets for Code Smell Detection and Refactoring | Di Wu, Fangwen Mu, Lin Shi, Zhaoqiang Guo, Kui Liu, Weiguang Zhuang, Yuqi Zhong, Li Zhang |
ASE 2024 | COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts | Wenkai Li, Xiaoqi Li, Zongwei Li, Yuqing Zhang |
ASE 2024 | Can Cooperative Multi-Agent Reinforcement Learning Boost Automatic Web Testing? An Exploratory Study | Yujia Fan, Sinan Wang, Zebang Fei, Yao Qin, Huaxuan Li, Yepang Liu |
ASE 2024 | ChatBR: Automated assessment and improvement of bug report quality using ChatGPT | Lili Bo, wangjie ji, Xiaobing Sun, Ting Zhang, Xiaoxue Wu, Ying Wei |
ASE 2024 | Coding-PTMs: How to Find Optimal Code Pre-trained Models for Code Embedding in Vulnerability Detection? | Yu Zhao, Lina Gong, Zhiqiu Huang, Yongwei Wang, Mingqiang Wei, Fei Wu |
ASE 2024 | Combining Coverage and Expert Features with Semantic Representation for Coincidental Correctness Detection | Huan Xie, Yan Lei, Maojin Li, Meng Yan, Sheng Zhang |
ASE 2024 | Compiler Bug Isolation via Enhanced Test Program Mutation | Yujie Liu, Mingxuan Zhu, Jinhao Dong, Junzhe Yu, Dan Hao |
ASE 2024 | ComplexCodeEval: A Benchmark for Evaluating Large Code Models on More Complex Code | jiafeng , Jiachen Liu, Cuiyun Gao, Chun Yong Chong, Chaozheng Wang, Shan Gao, Xin Xia |
ASE 2024 | Compositional Security Analysis of Dynamic Component-based Systems | Narges Khakpour, Charilaos Skandylas |
ASE 2024 | Constraint-Based Test Oracles for Program Analyzers | Markus Fleischmann, David Kaindlstorfer, Anastasia Isychev, Valentin Wüstholz, Maria Christakis |
ASE 2024 | Context-Aware Automated Sprint Plan Generation for Agile Software Development | Elvan Kula, Arie van Deursen, Georgios Gousios |
ASE 2024 | Contextualized Data-Wrangling Code Generation in Computational Notebooks | Junjie Huang, Daya Guo, Chenglong Wang, Jiazhen Gu, Shuai Lu, Jeevana Priya Inala, Cong Yan, Jianfeng Gao, Nan Duan, Michael Lyu |
ASE 2024 | DRMiner: Extracting Latent Design Rationale from Jira Issue Logs | Jiuang Zhao, Zitian Yang, Li Zhang, Xiaoli Lian, Donghao Yang, Xin Tan |
ASE 2024 | DataRecipe — How to Cook the Data for CodeLLM? | Kisub Kim, Jounghoon Kim, Byeongjo Park, Dongsun Kim, Chun Yong Chong, Yuan Wang, Tiezhu Sun, Xunzhu Tang, Jacques Klein, Tegawendé F. Bissyandé |
ASE 2024 | DeepREST: Automated Test Case Generation for REST APIs Exploiting Deep Reinforcement Learning | Davide Corradini, Zeno Montolli, Michele Pasqua, Mariano Ceccato |
ASE 2024 | Demonstration-Free: Towards More Practical Log Parsing with Large Language Models | Yi Xiao, Van-Hoang Le, Hongyu Zhang |
ASE 2024 | Detect Hidden Dependency to Untangle Commits | Mengdan Fan, Wei Zhang, Haiyan Zhao, Guangtai Liang, Zhi Jin |
ASE 2024 | Detecting Element Accessing Bugs in C++ Sequence Containers | zhilin li, Xutong Ma, Mengze Hu, Jun Yan |
ASE 2024 | Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality | Yifan Liao, Ming Xu, Yun Lin, Xiwen Teoh, Xiaofei Xie, Ruitao Feng, Frank Liauw, Hongyu Zhang, Jin Song Dong |
ASE 2024 | DevMuT: Testing Deep Learning Framework via Developer Expertise-Based Mutation | Yanzhou Mu, Juan Zhai, Chunrong Fang, Xiang Chen, Zhixiang Cao, Peiran Yang, Zou Yinglong, Tao Zheng, Zhenyu Chen |
ASE 2024 | Developer-Defined Accelerations in Continuous Integration: A Detection Approach and Catalog of Patterns | Mingyang Yin, Yutaro Kashiwa, Keheliya Gallaba, Mahmoud Alfadel, Yasutaka Kamei, Shane McIntosh |
ASE 2024 | Diagnosis via Proofs of Unsatisfiability for First-Order Logic with Relational Objects | Nick Feng, Lina Marsso, Marsha Chechik |
ASE 2024 | Differential Fuzzing for Data Distribution Service Programs via Dynamic Configuration and Packet Input Generation | Dohyun Ryu, Giyeol Kim, Daeun Lee, Seongjin Kim, Seungjin Bae, Junghwan Rhee, Taegyu Kim |
ASE 2024 | Discovering Likely Program Invariants for Persistent Memory | Zunchen Huang, Srivatsan Ravi, Chao Wang |
ASE 2024 | Do not neglect what's on your hands: localizing software faults with exception trigger stream | Xihao Zhang, Yi Song, Xiaoyuan Xie, Qi Xin, Chenliang Xing |
ASE 2024 | DroidCoder: Enhanced Android Code Completion with Context-Enriched Retrieval-Augmented Generation | Xinran Yu, Chun Li, Minxue Pan, Xuandong Li |
ASE 2024 | DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL Operators | Mingyi Zhou, Xiang Gao, Xiao Chen, Chunyang Chen, John Grundy, Li Li |
ASE 2024 | Dynamic Scoring Code Token Tree: A Novel Decoding Strategy for Generating High-Performance Code | Muzi Qu, Jie Liu, Liangyi Kang, Shuai Wang, Dan Ye, Tao Huang |
ASE 2024 | Effective Unit Test Generation for Java Null Pointer Exceptions | Myungho Lee, Jiseong Bak, Seokhyeon Moon, Yoon-Chan Jhi, Hakjoo Oh |
ASE 2024 | Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language Models | Yulun Wu, Ming Wen, Zeliang Yu, Xiaochen Guo, Hai Jin |
ASE 2024 | Efficient Detection of Test Interference in C Projects | Florian Eder, Stefan Winter |
ASE 2024 | Efficient Detection of Toxic Prompts in Large Language Models | Yi Liu, Junzhe Yu, Huijia Sun, Ling Shi, Gelei Deng, Yuqi Chen, Yang Liu |
ASE 2024 | Efficient Incremental Code Coverage Analysis for Regression Test Suites | Jiale Amber Wang, Kaiyuan Wang, Pengyu Nie |
ASE 2024 | Efficient Slicing of Feature Models via Projected d-DNNF Compilation | Chico Sundermann, Jacob Loth, Thomas Thüm |
ASE 2024 | End-to-End AutoML for Unsupervised Log Anomaly Detection | Shenglin Zhang, Yuhe Ji, Jiaqi Luan, Xiaohui Nie, Zi`ang Cheng, Minghua Ma, Yongqian Sun, Dan Pei |
ASE 2024 | Enhancing Automated Program Repair with Solution Design | Jiuang Zhao, Donghao Yang, Li Zhang, Xiaoli Lian, Zitian Yang, Fang Liu |
ASE 2024 | Enhancing the Efficiency of Automated Program Repair via Greybox Analysis | YoungJae Kim, Yechan Park, Seungheon Han, Jooyong Yi |
ASE 2024 | Evaluating Terminology Translation in Machine Translation Systems via Metamorphic Testing | Yihui Xu, Yanhui Li, Jun Wang, Xiaofang Zhang |
ASE 2024 | Evaluation of Version Control Merge Tools | Benedikt Schesch, Ryan Featherman, Ben Roberts, Kenneth J Yang, Michael D. Ernst |
ASE 2024 | Exploring ChatGPT App Ecosystem: Distribution, Deployment and Security | Chuan Yan, Mark Huasong Meng, Liuhuo Wan, Tian Yang Ooi, Ruomai Ren, Guangdong Bai |
ASE 2024 | Exploring Parameter-Efficient Fine-Tuning of Large Language Model on Automated Program Repair | liguochang , Chen Zhi, Jialiang Chen, Junxiao Han, Shuiguang Deng |
ASE 2024 | FAIL: Analyzing Software Failures from the News Using LLMs | Dharun Anandayuvaraj, Matthew Campbell, Arav Tewari, James C. Davis |
ASE 2024 | FAST: Boosting Uncertainty-based Test Prioritization Methods for Neural Networks via Feature Selection | Jialuo Chen, Jingyi Wang, Xiyue Zhang, Youcheng Sun, Marta Kwiatkowska, Jiming Chen, Peng Cheng |
ASE 2024 | FIPSER: Improving Fairness Testing of DNN by Seed Prioritization | Junwei Chen, Yueling Zhang, Lingfeng Zhang, Min Zhang, Chengcheng Wan, Ting Su, Geguang Pu |
ASE 2024 | FaaSConf: QoS-aware Hybrid Resources Configuration for Serverless Workflows | yilun wang, Pengfei Chen, Hui Dou, Yiwen Zhang, Guangba Yu, Zilong He, Haiyu Huang |
ASE 2024 | FastFixer: An Efficient and Effective Approach for Repairing Programming Assignments | Fang Liu, Zhenwei Liu, Qianhui Zhao, Jing Jiang, Li Zhang, Zian Sun, Ge Li, Zhongqi Li, Yuchi Ma |
ASE 2024 | GPP: A Graph-Powered Prioritizer for Code Review Requests | Lanxin Yang, Jinwei Xu, He Zhang, Fanghao Wu, Jun Lyu, Yue Li, Alberto Bacchelli |
ASE 2024 | General and Practical Property-based Testing for Android Apps | Yiheng Xiong, Ting Su, Jue Wang, Jingling Sun, Geguang Pu, Zhendong Su |
ASE 2024 | Getting Inspiration for Feature Elicitation: App Store- vs. LLM-based Approach | Jialiang Wei, Anne-Lise Courbis, Thomas Lambolais, Binbin Xu, Pierre Louis Bernard, Gerard Dray, Walid Maalej |
ASE 2024 | Giving Every Modality a Voice in Microservice Failure Diagnosis via Multimodal Adaptive Optimization | Lei Tao, Shenglin Zhang, ZedongJia , Jinrui Sun, Minghua Ma, Zhengdan Li, Yongqian Sun, Canqun Yang, Yuzhi Zhang, Dan Pei |
ASE 2024 | Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps | Ming Fan, Jifei Shi, Yin Wang, Le Yu, Xicheng Zhang, Haijun Wang, Wuxia Jin, Ting Liu |
ASE 2024 | GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models | Zhibo Zhang, Wuxia Bai, Yuxi Li, Mark Huasong Meng, Kailong Wang, Ling Shi, Li Li, Jun Wang, Haoyu Wang |
ASE 2024 | GraphCoder: Enhancing Repository-Level Code Completion via Coarse-to-fine Retrieval Based on Code Context Graph | Wei Liu, Ailun Yu, Daoguang Zan, Bo Shen, Wei Zhang, Haiyan Zhao, Zhi Jin, Qianxiang Wang |
ASE 2024 | How Does Code Optimization Impact Third-party Library Detection for Android Applications? | Zifan Xie, Ming Wen, Tinghan Li, Yiding Zhu, Qinsheng Hou, Hai Jin |
ASE 2024 | How Effective Do Code Language Models Understand Poor-Readability Code? | Chao Hu, Yitian Chai, Hao Zhou, Fandong Meng, Jie Zhou, Xiaodong Gu |
ASE 2024 | How to Pet a Two-Headed Snake? Solving Cross-Repository Compatibility Issues with Hera | Yifan Xie, Zhouyang Jia, Shanshan Li, Ying Wang, Jun Ma, Xiaoling Li, Haoran Liu, Ying Fu, Liao Xiangke |
ASE 2024 | Hybrid Regression Test Selection by Integrating File and Method Dependences | Guofeng Zhang, Luyao Liu, Zhenbang Chen, Ji Wang |
ASE 2024 | Imperceptible Content Poisoning in LLM-Powered Applications | Quan Zhang, Chijin Zhou, Gwihwan Go, Binqi Zeng, Heyuan Shi, Zichen Xu, Yu Jiang |
ASE 2024 | Incremental Context-free Grammar Inference in Black Box Settings | Feifei Li, Xiao Chen, Xi Xiao, Xiaoyu Sun, Chuan Chen, Shaohua Wang, Jitao Han |
ASE 2024 | Instructive Code Retriever: Learn from Large Language Model's Feedback for Code Intelligence Tasks | jiawei lu, Haoye Wang, Zhongxin Liu, Keyu Liang, Lingfeng Bao , Xiaohu Yang |
ASE 2024 | Interrogation Testing of Program Analyzers for Soundness and Precision Issues | David Kaindlstorfer, Anastasia Isychev, Valentin Wüstholz, Maria Christakis |
ASE 2024 | JavaBench: A Benchmark of Object-Oriented Code Generation for Evaluating Large Language Models | Jialun Cao, Zhiyong Chen, Jiarong Wu, Shing-Chi Cheung, Chang Xu |
ASE 2024 | LLM Meets Bounded Model Checking: Neuro-symbolic Loop Invariant Inference | Guangyuan Wu, Weining Cao, Yuan Yao, Hengfeng Wei, Taolue Chen, Xiaoxing Ma |
ASE 2024 | LLM-Generated Invariants for Bounded Model Checking Without Loop Unrolling | Muhammad A. A. Pirzada, Giles Reger, Ahmed Bhayat, Lucas C. Cordeiro |
ASE 2024 | Language-Agnostic Static Analysis of Probabilistic Programs | Markus Böck, Michael Schröder, Jürgen Cito |
ASE 2024 | LeGEND: A Top-Down Approach to Scenario Generation of Autonomous Driving Systems Assisted by Large Language Models | Shuncheng Tang, Zhenya Zhang, Jixiang Zhou, Lei Wang, Yuan Zhou, Yinxing Xue |
ASE 2024 | LeanBin: Harnessing Lifting and Recompilation to Debloat Binaries | Igor Wodiany, Antoniu Pop, Mikel Luján |
ASE 2024 | Leveraging Large Language Model to Assist Detecting Rust Code Comment Inconsistency | Zhang Yichi, Zixi Liu, Yang Feng, Baowen Xu |
ASE 2024 | MR-Adopt: Automatic Deduction of Input Transformation Function for Metamorphic Testing | Congying Xu, Songqiang Chen, Jiarong Wu, Shing-Chi Cheung, Valerio Terragni, Hengcheng Zhu, Jialun Cao |
ASE 2024 | MRCA: Metric-level Root Cause Analysis for Microservices via Multi-Modal Data | Wang yidan, Zhouruixing Zhu, Qiuai Fu, Yuchi Ma, Pinjia He |
ASE 2024 | Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed Fuzzing | Zhuotong Zhou, Yongzhuo Yang, Susheng Wu, Yiheng Huang, Bihuan Chen, Xin Peng |
ASE 2024 | MaskDroid: Robust Android Malware Detection with Masked Graph Representations | Jingnan Zheng, Jiahao Liu, Kechi Zhang, Jun ZENG, Ziqi Yang, Zhenkai Liang, Tat-Seng Chua |
ASE 2024 | Microservice Decomposition Techniques: An Independent Tool Comparison | YINGYING WANG, Sarah Bornais, Julia Rubin |
ASE 2024 | MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-Programs | Yin Wang, Ming Fan, Hao Zhou, Haijun Wang, Wuxia Jin, Jiajia Li, Wenbo Chen, Shijie Li, Yu Zhang, Deqiang Han, Ting Liu |
ASE 2024 | Mutation-Based Deep Learning Framework Testing Method in JavaScript Environment | Zou Yinglong, Juan Zhai, Chunrong Fang, Jiawei Liu, Tao Zheng, Zhenyu Chen |
ASE 2024 | Mutual Learning-Based Framework for Enhancing Robustness of Code Models via Adversarial Training | Yangsen Wang, Yizhou Chen, Yifan Zhao, Zhihao Gong, Junjie Chen, Dan Hao |
ASE 2024 | Navigating Mobile Testing Evaluation: A Comprehensive Statistical Analysis of Android GUI Testing Metrics | Yuanhong Lan, Yifei Lu, Minxue Pan, Xuandong Li |
ASE 2024 | NeuroJIT: Improving Just-In-Time Defect Prediction Using Neurophysiological and Empirical Perceptions of Modern Developers | Gichan Lee, Hansae Ju, Scott Uk-Jin Lee |
ASE 2024 | On the Evaluation of Large Language Models in Unit Test Generation | Lin Yang, Chen Yang, Shutao Gao, Weijing Wang, Bo Wang, Qihao Zhu, Xiao Chu, Jianyi Zhou, Guangtai Liang, Qianxiang Wang, Junjie Chen |
ASE 2024 | Parf: Adaptive Parameter Tuning for Abstract Interpretation | Zhongyi Wang, Linyu Yang, Mingshuai Chen, Yixuan Bu, Zhiyang Li, Qiuye Wang, Shengchao Qin, Yi Xiao, Jianwei Yin |
ASE 2024 | PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code | Ziyou Jiang, Lin Shi, Guowei Yang, Qing Wang |
ASE 2024 | Preference-Guided Refactored Tuning for Retrieval Augmented Code Generation | gao xin yu, Yun Xiong, Deze Wang, Zhenhan Guan, Zejian Shi, Haofen Wang, Shanshan Li |
ASE 2024 | Prioritizing Test Inputs for DNNs Using Training Dynamics | Jian Shen, Zhong Li, Minxue Pan, Xuandong Li |
ASE 2024 | Program Synthesis Meets Visual What-Comes-Next Puzzles | Akshay Kumar Chittora, Varun Vankudre, Pankaj Kumar Kalita, Sumit Lahiri, Subhajit Roy |
ASE 2024 | Promise and Peril of Collaborative Code Generation Models: Balancing Effectiveness and Memorization | Zhi Chen, Lingxiao Jiang |
ASE 2024 | Proof Automation with Large Language Models | Minghai Lu, Benjamin Delaware, Tianyi Zhang |
ASE 2024 | RCFG2Vec: Considering Long-Distance Dependency for Binary Code Similarity Detection | Weilong Li, Jintian Lu, Ruizhi Xiao, Pengfei Shao, Shuyuan Jin |
ASE 2024 | REACT: IR-Level Patch Presence Test for Binary | Qi Zhan, Xing Hu, Xin Xia, Shanping Li |
ASE 2024 | RMCBench: Benchmarking Large Language Models' Resistance to Malicious Code | Jiachi Chen, Qingyuan Zhong, Yanlin Wang, Kaiwen Ning, Yongkun Liu, Zenan Xu, Zhe Zhao, Ting Chen, Zibin Zheng |
ASE 2024 | ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation | Shiwei Feng, Yapeng Ye, Qingkai Shi, Zhiyuan Cheng, Xiangzhe Xu, Siyuan Cheng, Hongjun Choi, Xiangyu Zhang |
ASE 2024 | Reducing Test Runtime by Transforming Test Fixtures | Chengpeng Li, Abdelrahman Baz, August Shi |
ASE 2024 | Refinement Types for Visualization | Jingtao Xia, Junrui Liu, Nicholas Brown, Yanju Chen, Yu Feng |
ASE 2024 | Repairing Regex-Dependent String Functions | Nariyoshi Chida, Tachio Terauchi |
ASE 2024 | Revisiting the Conflict-Resolving Problem from a Semantic Perspective | Jinhao Dong, Jun Sun, Yun Lin, Yedi Zhang, Murong Ma, Jin Song Dong, Dan Hao |
ASE 2024 | Root Cause Analysis for Microservice System based on Causal Inference: How Far Are We? | Luan Pham, Huong Ha, Hongyu Zhang |
ASE 2024 | Rust-twins: Automatic Rust Compiler Testing through Program Mutation and Dual Macros Generation | Wenzhang Yang, Cuifeng Gao, Xiaoyuan Liu, Yuekang Li, Yinxing Xue |
ASE 2024 | SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in Microservice | Rui Ren, Jingbang Yang, Linxiao Yang, Xinyue Gu, Liang Sun |
ASE 2024 | STASE: Static Analysis Guided Symbolic Execution for UEFI Vulnerability Signature Generation | Md Shafiuzzaman, Achintya Desai, Laboni Sarker, Tevfik Bultan |
ASE 2024 | Scaler: Efficient and Effective Cross Flow Analysis | Steven (Jiaxun) Tang, Mingcan Xiang, Yang Wang, Bo Wu, Jianjun Chen, Tongping Liu |
ASE 2024 | Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models | Cong Wu, Jing Chen, Ziwei Wang, Ruichao Liang, Ruiying Du |
ASE 2024 | Semantic-Enhanced Indirect Call Analysis with Large Language Models | Baijun Cheng, Cen Zhang, Kailong Wang, Ling Shi, Yang Liu, Haoyu Wang, Yao Guo, Xiangqun Chen |
ASE 2024 | Semi-Supervised Code Translation Overcoming the Scarcity of Parallel Code Data | Ming Zhu, Mohimenul Karim, Ismini Lourentzou, Daphne Yao |
ASE 2024 | Semistructured Merge with Language-Specific Syntactic Separators | Guilherme Cavalcanti, Paulo Borba, Leonardo dos Anjos, Jonatas Clementino |
ASE 2024 | Shoot Yourself in the Foot — Efficient Code Causes Inefficiency in Compiler Optimizations | Fengjuan Gao, Hongyu Chen, Yuewei Zhou, Ke Wang |
ASE 2024 | Sifting through the Chaff: On Utilizing Execution Feedback for Ranking the Generated Code Candidates | Zhihong Sun, Yao Wan, Jia Li, Hongyu Zhang, Zhi Jin, Ge Li, Chen Lyu |
ASE 2024 | Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts | Haijun Wang, Yurui Hu, Hao Wu, Dijun Liu, Chenyang Peng, Yin Wu, Ming Fan, Ting Liu |
ASE 2024 | SlicePromptTest4J: High-coverage Test Generation using LLM via Method Slicing | Zejun Wang, Kaibo Liu, Ge Li, Zhi Jin |
ASE 2024 | Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection | Sicong Cao, Xiaobing Sun, Xiaoxue Wu, David Lo, Lili Bo, Bin Li, Xiaolei Liu, Xingwei Lin, Wei Liu |
ASE 2024 | SoVAR: Build Generalizable Scenarios from Accident Reports for Autonomous Driving Testing | An Guo, Yuan Zhou, Haoxiang Tian, Chunrong Fang, Yunjian Sun, Weisong Sun, Xinyu Gao, Luu Anh Tuan, Yang Liu, Zhenyu Chen |
ASE 2024 | SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and Matching | Yiheng Huang, Ruisi Wang, Wen Zheng, Zhuotong Zhou, Susheng Wu, Shulin Ke, Bihuan Chen, Shan Gao, Xin Peng |
ASE 2024 | Spotting Code Mutation for Predictive Mutation Testing | Yifan Zhao, Yizhou Chen, Zeyu Sun, Qingyuan Liang, Guoqing Wang, Dan Hao |
ASE 2024 | Test Case Generation for Simulink Models using Model Fuzzing and State Solving | Zhuo Su, Zehong Yu, Dongyan Wang, Wanli Chang, Bin Gu, Yu Jiang |
ASE 2024 | Test-Driven Development and LLM-based Code Generation | Noble Saji Mathews, Mei Nagappan |
ASE 2024 | The Potential of One-Shot Failure Root Cause Analysis: Collaboration of the Large Language Model and Small Classifier | Yongqi Han, Qingfeng Du, Ying Huang, Jiaqi Wu, Fulong Tian, Cheng He |
ASE 2024 | Three Heads Are Better Than One: Suggesting Move Method Refactoring Opportunities with Inter-class Code Entity Dependency Enhanced Hybrid Hypergraph Neural Network | Di Cui, Jiaqi Wang, Qiangqiang Wang, Peng Ji, Minglang Qiao, Yutong Zhao, Jingzhao Hu, Luqiao Wang, Qingshan Li |
ASE 2024 | To Tag, or Not to Tag: Translating C’s Unions to Rust’s Tagged Unions | Jaemin Hong, Sukyoung Ryu |
ASE 2024 | Towards Effective Static Type-Error Detection for Python | Wonseok Oh, Hakjoo Oh |
ASE 2024 | Towards Synthetic Trace Generation of Modeling Operations using In-Context Learning Approach | Vittoriano Muttillo, Claudio Di Sipio, Riccardo Rubei, Luca Berardinelli, MohammadHadi Dehghani |
ASE 2024 | Towards Understanding the Effectiveness of Large Language Models on Directed Test Input Generation | Zongze Jiang, Ming Wen, Jialun Cao, Xuanhua Shi, Hai Jin |
ASE 2024 | TypeFSL: Type Prediction from Binaries via Inter-procedural Data-flow Analysis and Few-shot Learning | Zirui Song, YuTong Zhou, Shuaike Dong, Ke Zhang, Kehuan Zhang |
ASE 2024 | Typed and Confused: Studying the Unexpected Dangers of Gradual Typing | Dominic Troppmann, Aurore Fass, Cristian-Alexandru Staicu |
ASE 2024 | UFront: Toward A Unified MLIR Frontend for Deep Learning | Guoqing Bao, Heng Shi, Chengyi Cui, Yalin Zhang, Jianguo Yao |
ASE 2024 | Understanding Code Changes Practically with Small-Scale Language Models | Cong Li, Zhaogui Xu, Peng Di, Dongxia Wang, Zheng Li, Qian Zheng |
ASE 2024 | Understanding the Implications of Changes to Build Systems | Mahtab Nejati, Mahmoud Alfadel, Shane McIntosh |
ASE 2024 | Unlocking the Power of Numbers: Log Compression via Numeric Token Parsing | Siyu Yu, Yifan Wu, Ying Li, Pinjia He |
ASE 2024 | Unveiling the Characteristics and Impact of Security Patch Evolution | Zifan Xie, Ming Wen, Zichao Wei, Hai Jin |
ASE 2024 | Verifying the Option Type With Rely-Guarantee Reasoning | James Yoo, Michael D. Ernst, René Just |
ASE 2024 | Vision: Identifying Affected Library Versions for Open Source Software Vulnerabilities | Susheng Wu, Ruisi Wang, Kaifeng Huang, Yiheng Cao, Wenyan Song, Zhuotong Zhou, Yiheng Huang, Bihuan Chen, Xin Peng |
ASE 2024 | VulAdvisor: Natural Language Suggestion Generation for Software Vulnerability Repair | Jian Zhang, Chong Wang, Anran Li, Wenhan Wang, Li Tianlin, Yang Liu |
ASE 2024 | WaDec: Decompile WebAssembly Using Large Language Model | Xinyu She, Yanjie Zhao, Haoyu Wang |
ASE 2024 | What Is Wrong with My Model? Identifying Systematic Problems with Semantic Data Slicing | Chenyang Yang, Yining Hong, Grace Lewis, Tongshuang Wu, Christian Kästner |
ASE 2024 | What Makes a High-Quality Training Dataset for Large Language Models: A Practitioners’ Perspective | Xiao Yu, Zexian Zhang, Feifei Niu, Xing Hu, Xin Xia, John Grundy |
ISSTA 2024 | A Large-Scale Empirical Study on Improving the Fairness of Image Classification Models | Junjie Yang, Jiajun Jiang, Zeyu Sun, Junjie Chen |
ISSTA 2024 | A Large-Scale Evaluation for Log Parsing Techniques: How Far Are We? | Zhihan Jiang, Jinyang Liu, Junjie Huang, Yichen LI, Yintong Huo, Jiazhen Gu, Zhuangbin Chen, Jieming Zhu, Michael Lyu |
ISSTA 2024 | AI Coders Are Among Us: Rethinking Programming Language Grammar Towards Efficient Code Generation | Zhensu Sun, Xiaoning Du, Zhou Yang, Li Li, David Lo |
ISSTA 2024 | AI Coders Are among Us: Rethinking Programming Language Grammar towards Efficient Code Generation | Zhensu Sun, Xiaoning Du, Zhou Yang, Li Li, David Lo |
ISSTA 2024 | API Misuse Detection via Probabilistic Graphical Model | Yunlong Ma, Wentong Tian, Xiang Gao, Hailong Sun, Li Li |
ISSTA 2024 | An Empirical Examination of Fuzzer Mutator Performance | James Kukucka, Luís Pina, Paul Ammann, Jonathan Bell |
ISSTA 2024 | An Empirical Study of Static Analysis Tools for Secure Code Review | Wachiraphan (Ping) Charoenwet, Patanamon Thongtanunam, Thuan Pham, Christoph Treude |
ISSTA 2024 | An Empirical Study on Kubernetes Operator Bugs | Qingxin Xu, Yu Gao, Jun Wei |
ISSTA 2024 | An In-Depth Study of Runtime Verification Overheads during Software Testing | Kevin Guan, Owolabi Legunsen |
ISSTA 2024 | An In-depth Study of Runtime Verification Overheads during Software Testing | Kevin Guan, Owolabi Legunsen |
ISSTA 2024 | Arfa: An Agile Regime-Based Floating-Point Optimization Approach for Rounding Errors | Jinchen Xu, Mengqi Cui, Fei Li, Zuoyan Zhang, Hongru Yang, Bei Zhou, Jie Zhao |
ISSTA 2024 | Arfa: an Agile Regime-based Floating-point Optimization Approach for Rounding Errors | Jinchen Xu, Mengqi Cui, Fei Li, Zuoyan Zhang, Hongru Yang, Bei Zhou, Jie Zhao |
ISSTA 2024 | AsFuzzer: Differential Testing of Assemblers with Error-Driven Grammar Inference | Hyungseok Kim, Soomin Kim, Jungwoo Lee, Sang Kil Cha |
ISSTA 2024 | Atlas: Automating Cross-Language Fuzzing on Android Closed-Source Libraries | Hao Xiong, Qinming Dai, Rui Chang, Mingran Qiu, Renxiang Wang, Wenbo Shen, Yajin Zhou |
ISSTA 2024 | AutoCodeRover: Autonomous Program Improvement | Yuntong Zhang, Haifeng Ruan, Zhiyu Fan, Abhik Roychoudhury |
ISSTA 2024 | Automated Data Binding Vulnerability Detection for Java Web Frameworks via Nested Property Graph | Xiaoyong Yan, Biao He, Wenbo Shen, Yu Ouyang, Kaihang Zhou, Xingjian Zhang, Xingyu Wang, Yukai Cao, Rui Chang |
ISSTA 2024 | Automated Deep Learning Optimization via DSL-Based Source Code Transformation | Ruixin Wang, Minghai Lu, Cody Hao Yu, Yi-Hsiang Lai, Tianyi Zhang |
ISSTA 2024 | Automated Program Repair via Conversation: Fixing 162 out of 337 Bugs for $0.42 Each using ChatGPT | Chunqiu Steven Xia, Lingming Zhang |
ISSTA 2024 | Automated Program Repair via Conversation: Fixing 162 out of 337 bugs for $0.42 each using ChatGPT | Chunqiu Steven Xia, Lingming Zhang |
ISSTA 2024 | Automating Zero-Shot Patch Porting for Hard Forks | Shengyi Pan, You Wang, Zhongxin Liu, Xing Hu, Xin Xia, Shanping Li |
ISSTA 2024 | BRAFAR: Bidirectional Refactoring, Alignment, Fault Localization, and Repair for Programming Assignments | Linna Xie, Chongmin Li, Yu Pei, Tian Zhang, Minxue Pan |
ISSTA 2024 | Benchmarking Automated Program Repair: An Extensive Study on Both Real-World and Artificial Bugs | Yicheng Ouyang, Jun Yang, Lingming Zhang |
ISSTA 2024 | Better Not Together: Staged Solving for Context-Free Language Reachability | Chenghang Shi, Haofeng Li, Jie Lu, Lian Li |
ISSTA 2024 | Beyond Pairwise Testing: Advancing 3-wise Combinatorial Interaction Testing for Highly Configurable Systems | Chuan Luo, Shuangyu Lyu, Qiyuan Zhao, Wei Wu, Hongyu Zhang, Chunming Hu |
ISSTA 2024 | Bridge and Hint: Extending Pre-trained Language Models for Long-Range Code | Yujia Chen, Cuiyun Gao, Zezhou Yang, Hongyu Zhang, Qing Liao |
ISSTA 2024 | Bugs in Pods: Understanding Bugs in Container Runtime Systems | Jiongchi Yu, Xiaofei Xie, Cen Zhang, Sen Chen, Yuekang Li, Wenbo Shen |
ISSTA 2024 | C2D2: Extracting Critical Changes for Real-World Bugs with Dependency-Sensitive Delta Debugging | Xuezhi Song, Yijian Wu, Shuning Liu, Bihuan Chen, Yun Lin, Xin Peng |
ISSTA 2024 | CEBin: A Cost-Effective Framework for Large-Scale Binary Code Similarity Detection | Hao Wang, Zeyu Gao, Chao Zhang, Mingyang Sun, Yuchen Zhou, Han Qiu, Xi Xiao |
ISSTA 2024 | CLAP: Learning Transferable Binary Code Representations with Natural Language Supervision | Hao Wang, Zeyu Gao, Chao Zhang, Zihan Sha, Mingyang Sun, Yuchen Zhou, Wenyu Zhu, Wenju Sun, Han Qiu, Xi Xiao |
ISSTA 2024 | CREF: An LLM-Based Conversational Software Repair Framework for Programming Tutors | Boyang Yang, Haoye Tian, Weiguo Pian, Haoran Yu, Haitao Wang, Jacques Klein, Tegawendé F. Bissyandé, Shunfu Jin |
ISSTA 2024 | CREF: An LLM-based Conversational Software Repair Framework for Programming Tutors | Boyang Yang, Haoye Tian, Weiguo PIAN, Haoran Yu, Haitao Wang, Jacques Klein, Tegawendé F. Bissyandé, Shunfu Jin |
ISSTA 2024 | Calico: Automated Knowledge Calibration and Diagnosis for Elevating AI Mastery in Code Tasks | Yuxin Qiu, Jie Hu, Qian Zhang, Heng Yin |
ISSTA 2024 | Call Graph Soundness in Android Static Analysis | Jordan Samhi, René Just, Tegawendé F. Bissyandé, Michael D. Ernst, Jacques Klein |
ISSTA 2024 | Can Graph Database Systems Correctly Handle Writing Operations? A Metamorphic Testing Approach with Graph-State Persistence Oracle | Shuang Liu, Junhao Lan, Xiaoning Du, Jiyuan Li, Wei Lu, Jiajun Jiang, Xiaoyong Du |
ISSTA 2024 | Certified Continual Learning for Neural Network Regression | Long H. Pham, Jun Sun |
ISSTA 2024 | Characterizing and Detecting Program Representation Faults of Static Analysis Frameworks | Huaien Zhang, Yu Pei, Shuyun Liang, Zezhong Xing, Shin Hwei Tan |
ISSTA 2024 | Characterizing and Detecting Program Representation Faults of Static Analysis Frameworks via Two-Dimensional Testing | Huaien Zhang, Yu Pei, Shuyun Liang, Zezhong Xing, Shin Hwei Tan |
ISSTA 2024 | CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature | Chenyan Liu, Yufan Cai, Yun Lin, Yuhuan Huang, Yunrui Pei, Bo Jiang, Ping Yang, Jin Song Dong, Hong Mei |
ISSTA 2024 | CoSec: On-the-Fly Security Hardening of Code LLMs via Supervised Co-Decoding | dong li, Meng Yan, Yaosheng Zhang, Zhongxin Liu, Chao Liu, Xiaohong Zhang, Ting Chen, David Lo |
ISSTA 2024 | CoSec: On-the-Fly Security Hardening of Code LLMs via Supervised Co-decoding | Dong Li, Meng Yan, Yaosheng Zhang, Zhongxin Liu, Chao Liu, Xiaohong Zhang, Ting Chen, David Lo |
ISSTA 2024 | CoderUJB: An Executable and Unified Java Benchmark for Practical Programming Scenarios | Zhengran Zeng, Yidong Wang, Rui Xie, Wei Ye, Shikun Zhang |
ISSTA 2024 | Commit Artifact Preserving Build Prediction | Guoqing Wang, Zeyu Sun, Yizhou Chen, Yifan Zhao, Qingyuan Liang, Dan Hao |
ISSTA 2024 | CooTest: An Automated Testing Approach for V2X Communication Systems | An Guo, Xinyu Gao, Zhenyu Chen, Yuan Xiao, Jiakai Liu, Xiuting Ge, Weisong Sun, Chunrong Fang |
ISSTA 2024 | DAppFL: Just-in-Time Fault Localization for Decentralized Applications in Web3 | Zhiying Wu, Jiajing Wu, Hui Zhang, Ziwei Li, Jiachi Chen, Zibin Zheng, Qing Xia, Gang Fan, Yi Zhen |
ISSTA 2024 | DBStorm: Generating Various Effective Workloads for Testing Isolation Levels | Keqiang Li, Siyang Weng, Lyu Ni, Chengcheng Yang, Rong Zhang, Xuan Zhou, Aoying Zhou |
ISSTA 2024 | DDGF: Dynamic Directed Greybox Fuzzing with Path Profiling | Haoran Fang, Kaikai Zhang, Donghui Yu, Yuanyuan Zhang |
ISSTA 2024 | Dance of the ADS: Orchestrating Failures through Historically-Informed Scenario Fuzzing | Tong Wang, Taotao Gu, Huan Deng, Hu Li, Xiaohui Kuang, Gang Zhao |
ISSTA 2024 | Datactive: Data Fault Localization for Object Detection Systems | Yining Yin, Yang Feng, Shihao Weng, Yuan Yao, Jia Liu, Zhihong Zhao |
ISSTA 2024 | DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications | Maoyi Xie, Ming Hu, Ziqiao Kong, Cen Zhang, Yebo Feng, Haijun Wang, Yue Xue, Hao Zhang, Ye Liu, Yang Liu |
ISSTA 2024 | DeLink: Source File Information Recovery in Binaries | Zhe Lang, Zhengzi Xu, Xiaohui Chen, Shichao Lv, Zhanwei Song, Zhiqiang Shi, Limin Sun |
ISSTA 2024 | Decomposition of Deep Neural Networks into Modules via Mutation Analysis | Ali Ghanbari |
ISSTA 2024 | Define-Use Guided Path Exploration for Better Forced Execution | Dongnan He, Dongchen Xie, Yujie Wang, Wei You, Bin Liang, Jianjun Huang, Wenchang Shi, Zhuo Zhang, Xiangyu Zhang |
ISSTA 2024 | Detecting Build Dependency Errors in Incremental Builds | Jun Lyu, Shanshan Li, He Zhang, Yang Zhang, Guoping Rong, Manuel Rigger |
ISSTA 2024 | DiaVio: LLM-Empowered Diagnosis of Safety Violations in ADS Simulation Testing | You Lu, Yifan Tian, Yuyang Bi, Bihuan Chen, Xin Peng |
ISSTA 2024 | Distance-Aware Test Input Selection for Deep Neural Networks | Zhong Li, Zhengfeng Xu, Ruihua Ji, Minxue Pan, Tian Zhang, Linzhang Wang, Xuandong Li |
ISSTA 2024 | DistillSeq: A Framework for Safety Alignment Testing in Large Language Models using Knowledge Distillation | Mingke Yang, Yuqi Chen, Yi Liu, Ling Shi |
ISSTA 2024 | Domain Adaptation for Code Model-Based Unit Test Case Generation | Jiho Shin, Sepehr Hashtroudi, Hadi Hemmati, Song Wang |
ISSTA 2024 | Domain Adaptation for Code Model-based Unit Test Case Generation | Jiho Shin, Sepehr Hashtroudi, Hadi Hemmati, Song Wang |
ISSTA 2024 | Efficient DNN-Powered Software with Fair Sparse Models | Xuanqi Gao, Weipeng Jiang, Juan Zhai, Shiqing Ma, Xiaoyu Zhang, Chao Shen |
ISSTA 2024 | Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis | Shuwei Song, Jiachi Chen, Ting Chen, Xiapu Luo, Teng Li, Wenwu Yang, Leqing Wang, Weijie Zhang, Feng Luo, Zheyuan He, Yi Lu, Pan Li |
ISSTA 2024 | Enhancing Multi-Agent System Testing with Diversity-Guided Exploration and Adaptive Critical State Exploitation | Ma Xuyan, Yawen Wang, Junjie Wang, Xiaofei Xie, Boyu Wu, Shoubin Li, Fanjiang Xu, Qing Wang |
ISSTA 2024 | Enhancing Multi-agent System Testing with Diversity-Guided Exploration and Adaptive Critical State Exploitation | Xuyan Ma, Yawen Wang, Junjie Wang, Xiaofei Xie, Boyu Wu, Shoubin Li, Fanjiang Xu, Qing Wang |
ISSTA 2024 | Enhancing ROS System Fuzzing through Callback Tracing | Yuheng Shen, Jianzhong Liu, Yiru Xu, Hao Sun, Mingzhe Wang, Nan Guan, Heyuan Shi, Yu Jiang |
ISSTA 2024 | Enhancing Robustness of Code Authorship Attribution through Expert Feature Knowledge | Xiaowei Guo, Cai Fu, Juan Chen, Hongle Liu, Lansheng Han, Wenjin Li |
ISSTA 2024 | Equivalent Mutants in the Wild: Identifying and Efficiently Suppressing Equivalent Mutants for Java Programs | Benjamin Kushigian, Samuel Kaufman, Ryan Featherman, Hannah Potter, Ardi Madadi, René Just |
ISSTA 2024 | Evaluating Deep Neural Networks in Deployment: A Comparative Study (Replicability Study) | Eduard Pinconschi, Divya Gopinath, Rui Abreu, Corina S. Păsăreanu |
ISSTA 2024 | Evaluating the Effectiveness of Decompilers | Ying Cao, Runze Zhang, Ruigang Liang, Kai Chen |
ISSTA 2024 | Evaluating the Trustworthiness of Deep Neural Networks in Deployment - A Comparative Study (Replicability Study) | Eduard Pinconschi, Divya Gopinath, Rui Abreu, Corina Pasareanu |
ISSTA 2024 | Exploration-Driven Reinforcement Learning for Avionic System Fault Detection (Experience Paper) | Paul-Antoine Le Tolguenec, Emmanuel Rachelson, Yann Besse, Florent Teichteil-Koenigsbuch, Nicolas Schneider, Helene Waeselynck, Dennis Wilson |
ISSTA 2024 | FDI: Attack Neural Code Generation Systems through User Feedback Channel | Zhensu Sun, Xiaoning Du, Xiapu Luo, Fu Song, David Lo, Li Li |
ISSTA 2024 | FRIES: Fuzzing Rust Library Interactions via Efficient Ecosystem-Guided Target Generation | Xizhe Yin, Yang Feng, Qingkai Shi, Zixi Liu, Hongwang Liu, Baowen Xu |
ISSTA 2024 | FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion | Qi Guo, Xiaohong Li, Xiaofei Xie, Shangqing Liu, Ze Tang, Ruitao Feng, Junjie Wang, Jidong Ge, Lei Bu |
ISSTA 2024 | Face It Yourselves: An LLM-Based Two-Stage Strategy to Localize Configuration Errors via Logs | Shiwen Shan, Yintong Huo, Yuxin Su, Yichen LI, Dan Li, Zibin Zheng |
ISSTA 2024 | FastLog: An End-to-End Method to Efficiently Generate and Insert Logging Statements | Xiaoyuan Xie, Zhipeng Cai, Songqiang Chen, Jifeng Xuan |
ISSTA 2024 | Feedback-Directed Partial Execution | Ishrak Hayet, Adam Scott, Marcelo d'Amorim |
ISSTA 2024 | Feedback-Driven Automated Whole Bug Report Reproduction for Android Apps | Dingbang Wang, Yu Zhao, Sidong Feng, Zhaoxu Zhang, William G.J. Halfond, Chunyang Chen, Xiaoxia Sun, Jiangfan Shi, Tingting Yu |
ISSTA 2024 | Finding Cuts in Static Analysis Graphs to Debloat Software | Christoph Blumschein, Fabio Niephaus, Codrut Stancu, Christian Wimmer, Jens Lincke, Robert Hirschfeld |
ISSTA 2024 | Foliage: Nourishing Evolving Software by Characterizing and Clustering Field Bugs | Zhanyao Lei, Yixiong Chen, Mingyuan Xia, Zhengwei Qi |
ISSTA 2024 | Following the "Thread": Toward Finding Manipulatable Bottlenecks In Blockchain Clients | Shuohan Wu, zihao li, Hao Zhou, Xiapu Luo, Jianfeng Li, Haoyu Wang |
ISSTA 2024 | Following the “Thread”: Toward Finding Manipulatable Bottlenecks in Blockchain Clients | Shuohan Wu, Zihao Li, Hao Zhou, Xiapu Luo, Jianfeng Li, Haoyu Wang |
ISSTA 2024 | FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor | Zhenyu Ye, Lei Zhou, Fengwei Zhang, Wenqiang Jin, Zhenyu Ning, Yupeng Hu, Zheng Qin |
ISSTA 2024 | FunRedisp: Reordering Function Dispatch in Smart Contract to Reduce Invocation Gas Fees | Yunqi Liu, Wei Song |
ISSTA 2024 | Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based Mutation | Jueon Eom, Seyeon Jeong, Taekyoung Kwon |
ISSTA 2024 | Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-based Mutation | Jueon Eom, Seyeon Jeong, Taekyoung Kwon |
ISSTA 2024 | Fuzzing MLIR Compiler Infrastructure via Operation Dependency Analysis | Chenyao Suo, Junjie Chen, Shuang Liu, Jiajun Jiang, Yingquan Zhao, Jianrong Wang |
ISSTA 2024 | Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation | Zhaoyang Chu, Yao Wan, Qian Li, Yang Wu, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin |
ISSTA 2024 | Guardian: A Runtime Framework for LLM-Based UI Exploration | Dezhi Ran, Hao Wang, Zihe Song, Mengzhou Wu, Yuan Cao, Ying Zhang, Wei Yang, Tao Xie |
ISSTA 2024 | Guardian: A Runtime Framework for LLM-based UI Exploration | Dezhi Ran, Hao Wang, Zihe Song, Mengzhou Wu, Yuan Cao, Ying Zhang, Wei Yang, Tao Xie |
ISSTA 2024 | How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation | Cen Zhang, Yaowen Zheng, Mingqiang Bai, Yeting Li, Wei Ma, Xiaofei Xie, Yuekang Li, Limin Sun, Yang Liu |
ISSTA 2024 | Identifying Smart Contract Security Issues in Code Snippets from Stack Overflow | Jiachi Chen, Chong Chen, Jiang Hu, John Grundy, Yanlin Wang, Ting Chen, Zibin Zheng |
ISSTA 2024 | Inconsistencies in TeX-Produced Documents | Jovyn Tan, Manuel Rigger |
ISSTA 2024 | Inconsistencies in TeX-produced Documents | Jovyn Tan, Manuel Rigger |
ISSTA 2024 | Interoperability in Deep Learning: A User Survey and Failure Analysis of ONNX Model Converters | Purvish Jajal, Wenxin Jiang, Arav Tewari, Erik Kocinare, Joseph Woo, Anusha Sarraf, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis |
ISSTA 2024 | Interpretability Based Neural Network Repair | Zuohui Chen, Jun Zhou, Youcheng Sun, Jingyi Wang, Qi Xuan, Xiaoniu Yang |
ISSTA 2024 | Interpretability based Neural Network Repair | Zuohui Chen, Jun Zhou, Youcheng Sun, Jingyi Wang, Qi Xuan, Xiaoniu Yang |
ISSTA 2024 | Interprocedural Path Complexity Analysis | Mira Kaniyur, Ana Cavalcante-Studart, Yihan Yang, Sangeon Park, David Chen, Duy Lam, Lucas Bang |
ISSTA 2024 | Isolation-Based Debugging for Neural Networks | Jialuo Chen, Jingyi Wang, Youcheng Sun, Peng Cheng, Jiming Chen |
ISSTA 2024 | LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts | Peilin Zheng, Bowei Su, Xiapu Luo, Ting Chen, Neng Zhang, Zibin Zheng |
ISSTA 2024 | LLM4Fin: Fully Automating LLM-Powered Test Case Generation for FinTech Software Acceptance Testing | Zhiyi Xue, Liangguo Li, Senyue Tian, Xiaohong Chen, Pingping Li, Liangyu Chen, Tingting Jiang, Min Zhang |
ISSTA 2024 | LPR: Large Language Models-Aided Program Reduction | Mengxiao Zhang, Yongqiang Tian, Zhenyang Xu, Yiwen Dong, Shin Hwei Tan, Chengnian Sun |
ISSTA 2024 | Large Language Models Can Connect the Dots: Exploring Model Optimization Bugs with Domain Knowledge-Aware Prompts | Hao Guan, Guangdong Bai, Yepang Liu |
ISSTA 2024 | Large Language Models can Connect the Dots: Exploring Model Optimization Bugs with Domain Knowledge-aware Prompts | Hao Guan, Guangdong Bai, Yepang Liu |
ISSTA 2024 | Large Language Models for Equivalent Mutant Detection: How Far Are We? | Zhao Tian, Honglin Shu, Dong Wang, Xuejie Cao, Yasutaka Kamei, Junjie Chen |
ISSTA 2024 | Large Language Models for Equivalent Mutant Detection: How Far are We? | Zhao Tian, Honglin Shu, Dong Wang, Xuejie Cao, Yasutaka Kamei, Junjie Chen |
ISSTA 2024 | Learning to Check LTL Satisfiability and to Generate Traces via Differentiable Trace Checking | Weilin Luo, Pingjia Liang, Junming Qiu, Polong Chen, Hai Wan, Jianfeng Du, Weiyuan Fang |
ISSTA 2024 | Learning to SAT-verifiably Check LTL Satisfiability via Differentiable Trace Checking | Weilin Luo, Pingjia Liang, Qiu Junming, Polong Chen, Hai Wan, Jianfeng Du, Weiyuan Fang |
ISSTA 2024 | Logos: Log Guided Fuzzing for Protocol Implementations | Feifan Wu, Zhengxiong Luo, Yanyang Zhao, Qingpeng Du, Junze Yu, Ruikang Peng, Heyuan Shi, Yu Jiang |
ISSTA 2024 | Ma11y: A Mutation Framework for Web Accessibility Testing | Mahan Tafreshipour, Anmol Vilas Deshpande, Forough Mehralian, Iftekhar Ahmed, Sam Malek |
ISSTA 2024 | Maltracker: A Fine-Grained NPM Malware Tracker Copiloted by LLM-Enhanced Dataset | Zeliang Yu, Ming Wen, Xiaochen Guo, Hai Jin |
ISSTA 2024 | MicroRes: Versatile Resilience Profiling in Microservices via Degradation Dissemination Indexing | Tianyi Yang, Cheryl Lee, Jiacheng Shen, Yuxin Su, Cong Feng, Yongqiang Yang, Michael Lyu |
ISSTA 2024 | Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential Analysis | Mingxi Ye, Xingwei Lin, Yuhong Nan, Jiajing Wu, Zibin Zheng |
ISSTA 2024 | Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models | Mingyi Zhou, Xiang Gao, Pei Liu, John Grundy, Chunyang Chen, Xiao Chen, Li Li |
ISSTA 2024 | Multi-modal Learning for WebAssembly Reverse Engineering | Hanxian Huang, Jishen Zhao |
ISSTA 2024 | NativeSummary: Summarizing Native Binary Code for Inter-language Static Analysis of Android Apps | Jikai Wang, Haoyu Wang |
ISSTA 2024 | NeuFair: Neural Network Fairness Repair with Dropout | Vishnu Asutosh Dasu, Ashish Kumar, Saeid Tizpaz-Niari, Gang (Gary) Tan |
ISSTA 2024 | Neurosymbolic Repair of Test Flakiness | Yang Chen, Reyhaneh Jabbarvand |
ISSTA 2024 | One Size Does Not Fit All: Multi-Granularity Patch Generation for Better Automated Program Repair | Bo Lin, Shangwen Wang, Ming Wen, Liqian Chen, Xiaoguang Mao |
ISSTA 2024 | One Size Does Not Fit All: Multi-granularity Patch Generation for Better Automated Program Repair | Bo Lin, Shangwen Wang, Ming Wen, Liqian Chen, Xiaoguang Mao |
ISSTA 2024 | One-to-One or One-to-Many? Suggesting Extract Class Refactoring Opportunities with Intra-class Dependency Hypergraph Neural Network | Di Cui, Qiangqiang Wang, Yutong Zhao, Jiaqi Wang, Minjie Wei, Jingzhao Hu, Luqiao Wang, Qingshan Li |
ISSTA 2024 | Oracle-Guided Program Selection from Large Language Models | Zhiyu Fan, Haifeng Ruan, Sergey Mechtaev, Abhik Roychoudhury |
ISSTA 2024 | Oracle-guided Program Selection from Large Language Models | Zhiyu Fan, Haifeng Ruan , Sergey Mechtaev, Abhik Roychoudhury |
ISSTA 2024 | PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open-Source Software | Kaixuan Li, Jian Zhang, Sen Chen, Han Liu, Yang Liu, Yixiang Chen |
ISSTA 2024 | Policy Testing with MDPFuzz (Replicability Study) | Quentin Mazouni, Helge Spieker, Arnaud Gotlieb, Mathieu Acher |
ISSTA 2024 | Practitioners’ Expectations on Automated Test Generation | Xiao Yu, Lei Liu, Xing Hu, Jacky Keung, Xin Xia, David Lo |
ISSTA 2024 | Precise Compositional Buffer Overflow Detection via Heap Disjointness | Yiyuan Guo, Peisen Yao, Charles Zhang |
ISSTA 2024 | Preserving Reactiveness: Understanding and Improving the Debugging Practice of Blocking-Call Bugs | Arooba Shahoor, Jooyong Yi, Dongsun Kim |
ISSTA 2024 | Preserving Reactiveness: Understanding and Improving the Debugging Practice of Blocking-call Bugs | Arooba Shahoor, Jooyong Yi, Dongsun Kim |
ISSTA 2024 | Prospector: Boosting Directed Greybox Fuzzing for Large-Scale Target Sets with Iterative Prioritization | Zhijie Zhang, Liwei Chen, Haolai Wei, Gang Shi, Dan Meng |
ISSTA 2024 | Prospector: Boosting Directed Greybox Fuzzing for Large-scale Target Sets with Iterative Prioritization | Zhijie Zhang, Liwei Chen, Haolai Wei, Gang Shi, Dan Meng |
ISSTA 2024 | Reproducing Timing-Dependent GUI Flaky Tests in Android Apps via a Single Event Delay | Xiaobao Cai, Zhen Dong, Yongjiang Wang, Abhishek Tiwari, Xin Peng |
ISSTA 2024 | Reproducing Timing-dependent GUI Flaky Tests in Android Apps via A Single Event Delay | Xiaobao Cai, Zhen Dong, Yongjiang Wang, Abhishek Tiwari, Xin Peng |
ISSTA 2024 | Revisiting Test-Case Prioritization on Long-Running Test Suites | Runxiang Cheng, Shuai Wang, Reyhaneh Jabbarvand, Darko Marinov |
ISSTA 2024 | SCALE: Constructing Structured Natural Language Comment Trees for Software Vulnerability Detection | Xin-Cheng Wen, Cuiyun Gao, Shuzheng Gao, Yang Xiao, Michael Lyu |
ISSTA 2024 | SCALE: Constructing Symbolic Comment Trees for Software Vulnerability Detection | Xin-Cheng Wen, Cuiyun Gao, Shuzheng Gao, Yang Xiao, Michael Lyu |
ISSTA 2024 | SQLess: Dialect-Agnostic SQL Query Simplification | Li Lin, Zongyin Hao, Chengpeng Wang, Zhuangda Wang, Rongxin Wu, Gang Fan |
ISSTA 2024 | Scalable, Sound and Accurate Jump Table Analysis | Huan Nguyen, Soumyakant Priyadarshan, R. Sekar |
ISSTA 2024 | Scalable, Sound, and Accurate Jump Table Analysis | Huan Nguyen, Soumyakant Priyadarshan, R. Sekar |
ISSTA 2024 | See the Forest, not Trees: Unveiling and Escaping the Pitfalls of Error-Triggering Inputs in Neural Network Testing | Yuanyuan Yuan, Shuai Wang, Zhendong Su |
ISSTA 2024 | Segment-Based Test Case Prioritization: A Multi-objective Approach | Hieu Huynh, Nhu Pham, Tien N. Nguyen, Vu Nguyen |
ISSTA 2024 | Segment-based Test Case Prioritization: a Multi-objective Approach | Hieu Huynh, Nhu Pham, Vu Nguyen, Tien N. Nguyen |
ISSTA 2024 | SelfPiCo: Self-Guided Partial Code Execution with LLMs | Zhipeng Xue, Zhipeng Gao, Shaohua Wang, Xing Hu, Xin Xia, Shanping Li |
ISSTA 2024 | Semantic Constraint Inference for Web Form Test Generation | Parsa Alian, Noor Nashid, Mobina Shahbandeh, Ali Mesbah |
ISSTA 2024 | Silent Taint-Style Vulnerability Fixes Identification | Zhongzhen Wen, Jiayuan Zhou, Minxue Pan, Shaohua Wang, Xing Hu, Tongtong Xu, Tian Zhang, Xuandong Li |
ISSTA 2024 | Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoC | Haolai Wei, Liwei Chen, Zhijie Zhang, Gang Shi, Dan Meng |
ISSTA 2024 | Synthesis of Sound and Precise Storage Cost Bounds via Unsound Resource Analysis and Max-SMT | Elvira Albert, Jesús Correas, Pablo Gordillo, Guillermo Román-Díez, Albert Rubio |
ISSTA 2024 | Synthesis-Based Enhancement for GUI Test Case Migration | Yakun Zhang, Qihao Zhu, Jiwei Yan, Chen Liu, Wenjie Zhang, Yifan Zhao, Dan Hao, Lu Zhang |
ISSTA 2024 | Synthesis-based Enhancement for GUI Test Case Migration | Yakun Zhang, Qihao Zhu, Jiwei Yan, Chen Liu, Wenjie Zhang, Yifan Zhao, Dan Hao, Lu Zhang |
ISSTA 2024 | Synthesizing Boxes Preconditions for Deep Neural Networks | Zengyu Liu, Liqian Chen, Wanwei Liu, Ji Wang |
ISSTA 2024 | Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment | Jiashui Wang, Peng Qian, Xilin Huang, Xinlei Ying, Yan Chen, Shouling Ji, Jianhai Chen, Jundong Xie, Long Liu |
ISSTA 2024 | TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model Development | Xiangshan Gao, Jialuo Chen, Jingyi Wang, Jie Shi, Peng Cheng, Jiming Chen |
ISSTA 2024 | Test Selection for Deep Neural Networks using Meta-Models with Uncertainty Metrics | Demet Demir, Aysu Betin Can, Elif Surer |
ISSTA 2024 | Testing Graph Database Systems with Graph-State Persistence Oracle | Shuang Liu, Junhao Lan, Xiaoning Du, Jiyuan Li, Wei Lu, Jiajun Jiang, Xiaoyong Du |
ISSTA 2024 | Testing Gremlin-Based Graph Database Systems via Query Disassembling | Yingying Zheng, Wensheng Dou, Lei Tang, Ziyu Cui, Yu Gao, Jiansen Song, Liang Xu, Jiaxin Zhu, Wei Wang, Jun Wei, Hua Zhong, Tao Huang |
ISSTA 2024 | ThinkRepair: Self-Directed Automated Program Repair | Xin Yin, Chao Ni, Shaohua Wang, Zhenhao Li, Limin Zeng, Xiaohu Yang |
ISSTA 2024 | Total Recall? How Good Are Static Call Graphs Really? | Dominik Helm, Sven Keidel, Anemone Kampkötter, Johannes Düsing, Tobias Roth, Ben Hermann, Mira Mezini |
ISSTA 2024 | Toward the Automated Localization of Buggy Mobile App UIs from Bug Descriptions | Antu Saha, Yang Song, Junayed Mahmud, Ying Zhou, Kevin Moran, Oscar Chaparro |
ISSTA 2024 | Towards Automatic Oracle Prediction for AR Testing: Assessing Virtual Object Placement Quality under Real-World Scenes | Xiaoyi Yang, Yuxing Wang, Tahmid Rafi, Dongfang Liu, Xiaoyin Wang, Xueling Zhang |
ISSTA 2024 | Towards Automatic Oracle Prediction for AR testing: Assessing Virtual Object Placement Quality under Real-world Scenes | Xiaoyi Yang, Yuxing Wang, Tahmid Rafi, Dongfang Liu, Xiaoyin Wang, Xueling Zhang |
ISSTA 2024 | Towards More Complete Constraints for Deep Learning Library Testing via Complementary Set Guided Refinement | Gwihwan Go, Chijin Zhou, Quan Zhang, Xiazijian Zou, Heyuan Shi, Yu Jiang |
ISSTA 2024 | Towards Understanding the Bugs in Solidity Compiler | Haoyang Ma, Wuqi Zhang, Qingchao Shen, Yongqiang Tian, Junjie Chen, Shing-Chi Cheung |
ISSTA 2024 | Traceback: A Fault Localization Technique for Molecular Programs | Michael C. Gerten, James I. Lathrop, Myra Cohen |
ISSTA 2024 | UPBEAT: Test Input Checks of Q# Quantum Libraries | Tianmin Hu, Guixin Ye, Zhanyong Tang, Shin Hwei Tan, Huanting Wang, Meng Li, Zheng Wang |
ISSTA 2024 | Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus Engines | Gao Cuiying, Yueming Wu, Heng Li, Wei Yuan, Haoyu Jiang, Qidan He, Yang Liu |
ISSTA 2024 | Understanding MisConferenceigurations in ROS: An Empirical Study and Current Approaches | Paulo Canelas, Bradley Schmerl, Alcides Fonseca, Christopher Steven Timperley |
ISSTA 2024 | UniTSyn: A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program Testing | Yifeng He, Jiabo Huang, Yuyang Rong, Yiwen Guo, Ethan Wang, Hao Chen |
ISSTA 2024 | Unimocg: Modular Call-Graph Algorithms for Consistent Handling of Language Features | Dominik Helm, Tobias Roth, Sven Keidel, Michael Reif, Mira Mezini |
ISSTA 2024 | VRDSynth: Synthesizing Programs for Multilingual Visually Rich Document Information Extraction | Thanh-Dat Nguyen, Tung Do-Viet, Hung Nguyen-Duy, Tuan-Hai Luu, Hung Le, Xuan-Bach D. Le, Patanamon Thongtanunam |
ISSTA 2024 | VioHawk: Detecting Traffic Violations of Autonomous Driving Systems through Criticality-Guided Simulation Testing | Zhongrui Li, Jiarun Dai, Zongan Huang, Nianhao You, Yuan Zhang, Min Yang |
ISSTA 2024 | VioHawk: Detecting Traffic Violations of Autonomous Driving Systems through Criticality-guided Simulation Testing | Zhongrui Li, Jiarun Dai, Zongan Huang, Nianhao You, Yuan Zhang, Min Yang |
ISSTA 2024 | WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-Aware Binary Generation | Shangtong Cao, Ningyu He, Xinyu She, Yixuan Zhang, Mu Zhang, Haoyu Wang |
ISSTA 2024 | WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-aware Binary Generation | Shangtong Cao, Ningyu He, Xinyu She, Yixuan Zhang, Mu Zhang, Haoyu Wang |
ISSTA 2024 | Wapplique: Testing WebAssembly Runtime via Execution Context-Aware Bytecode Mutation | Wenxuan Zhao, Ruiying Zeng, Yangfan Zhou |
ISSTA 2024 | Wapplique: Testing WebAssembly Runtime via Execution Context-aware Bytecode Mutation | Wenxuan Zhao, Ruiying Zeng, Yangfan Zhou |
ISSTA 2024 | When to Stop? Towards Efficient Code Generation in LLMs with Excess Token Prevention | Lianghong Guo, Yanlin Wang, Ensheng Shi, Wanjun Zhong, Hongyu Zhang, Jiachi Chen, Ruikai Zhang, Yuchi Ma, Zibin Zheng |
ISSTA 2024 | Your "Notice" is Missing: Detecting and Fixing Violations of Modification Terms in Open Source Licenses during Forking | Kaifeng Huang, Yingfeng Xia, Bihuan Chen, Siyang He, Huazheng Zeng, Zhuotong Zhou, Jin Guo, Xin Peng |
ISSTA 2024 | Your “Notice” Is Missing: Detecting and Fixing Violations of Modification Terms in Open Source Licenses during Forking | Kaifeng Huang, Yingfeng Xia, Bihuan Chen, Siyang He, Huazheng Zeng, Zhuotong Zhou, Jin Guo, Xin Peng |
ICSE 2023 | (Partial) Program Dependence Learning | Aashish Yadavally, Wenbo Wang, Shaohua Wang, Tien N. Nguyen |
ICSE 2023 | A Comprehensive Study of Real-World Bugs in Machine Learning Model Optimization | Hao Guan, Ying Xiao, Jiaying LI, Yepang Liu, Guangdong Bai |
ICSE 2023 | A Qualitative Study on the Implementation Design Decisions of Developers | Jenny T. Liang, Maryam Arab, Minhyuk Ko, Amy Ko, Thomas LaToza |
ICSE 2023 | A Semantic-aware Parsing Approach for Log Analytics | Yintong Huo, Yuxin Su, Cheryl Lee, Michael Lyu |
ICSE 2023 | AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities | Asem Ghaleb, Julia Rubin, Karthik Pattabiraman |
ICSE 2023 | AI-based Question Answering Assistance for Analyzing Natural-language Requirements | Saad Ezzini, Sallam Abualhaija, Chetan Arora, Mehrdad Sabetzadeh |
ICSE 2023 | APICAD: Augmenting API Misuse Detection Through Specifications From Code And Documents | Xiaoke Wang, Lei Zhao |
ICSE 2023 | ATM: Black-box Test Case Minimization based on Test Code Similarity and Evolutionary Search | Rongqi Pan, Taher A Ghaleb, Lionel Briand |
ICSE 2023 | AdHere: Automated Detection and Repair of Intrusive Ads | Yutian Yan, Yunhui Zheng, Xinyue Liu, Nenad Medvidović, Weihang Wang |
ICSE 2023 | AidUI: Toward Automated Recognition of Dark Patterns in User Interfaces | S M Hasan Mansur, Sabiha Salma, Damilola Awofisayo, Kevin Moran |
ICSE 2023 | An Empirical Comparison of Pre-Trained Models of Source Code | Changan Niu, Chuanyi Li, Vincent Ng, Dongxiao Chen, Jidong Ge, Bin Luo |
ICSE 2023 | An Empirical Study of Deep Learning Models for Vulnerability Detection | Benjamin Steenhoek, Md Mahbubur Rahman, Richard Jiles, Wei Le |
ICSE 2023 | An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry | Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis |
ICSE 2023 | An Empirical Study on Software Bill of Materials: Where We Stand and the Road Ahead | Boming Xia, Tingting Bi, Zhenchang Xing, Qinghua Lu, Liming Zhu |
ICSE 2023 | Analyzing the Impact of Workloads on Modeling the Performance of Configurable Software Systems | Stefan Mühlbauer, Florian Sattler, Christian Kaltenecker, Johannes Dorn, Sven Apel, Norbert Siegmund |
ICSE 2023 | Aries: Efficient Testing of Deep Neural Networks via Labeling-Free Accuracy Estimation | Qiang Hu, Yuejun GUo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon |
ICSE 2023 | Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs | Davide Corradini, Michele Pasqua, Mariano Ceccato |
ICSE 2023 | Automated Program Repair in the Era of Large Pre-trained Language Models | Chunqiu Steven Xia, Yuxiang Wei, Lingming Zhang |
ICSE 2023 | Automated Repair of Programs from Large Language Models | Zhiyu Fan, Xiang Gao, Martin Mirchev, Abhik Roychoudhury, Shin Hwei Tan |
ICSE 2023 | Automated Summarization of Stack Overflow Posts | Bonan Kou, Muhao Chen, Tianyi Zhang |
ICSE 2023 | Automating Code-Related Tasks Through Transformers: The Impact of Pre-training | Rosalia Tufano, Luca Pascarella, Gabriele Bavota |
ICSE 2023 | Autonomy Is An Acquired Taste: Exploring Developer Preferences for GitHub Bots | Amir Ghorbani, Nathan Cassee, Derek Robinson, Adam Alami, Neil Ernst, Alexander Serebrenik, Andrzej Wąsowski |
ICSE 2023 | BADGE: Prioritizing UI Events with Hierarchical Multi-Armed Bandits for Automated UI Testing | Dezhi Ran, Hao Wang, Wenyu Wang, Tao Xie |
ICSE 2023 | BFTDetector: Automatic Detection of Business Flow Tampering for Digital Content Service | I Luk Kim, Weihang Wang, Yonghwi Kwon, Xiangyu Zhang |
ICSE 2023 | BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts | Peilin Zheng, Xiapu Luo, Zibin Zheng |
ICSE 2023 | Bad Snakes: Understanding and Improving Python Package Index Malware Scanning | Duc Ly Vu, Zachary Newman, John Speed Meyers |
ICSE 2023 | Balancing Effectiveness and Flakiness of Non-Deterministic Machine Learning Tests | Chunqiu Steven Xia, Saikat Dutta, Sasa Misailovic, Darko Marinov, Lingming Zhang |
ICSE 2023 | Better Automatic Program Repair by Using Bug Reports and Tests Together | Manish Motwani, Yuriy Brun |
ICSE 2023 | CC: Causality-Aware Coverage Criterion for Deep Neural Networks | Zhenlan Ji, Pingchuan Ma, Yuanyuan Yuan, Shuai Wang |
ICSE 2023 | CCRep: Learning Code Change Representations via Pre-Trained Code Model and Query Back | Zhongxin Liu, Zhijie Tang, Xin Xia, Xiaohu Yang |
ICSE 2023 | CCTEST: Testing and Repairing Code Completion Systems | Li Zongjie, Chaozheng Wang, Zhibo Liu, Haoxuan Wang, Dong Chen, Shuai Wang, Cuiyun Gao |
ICSE 2023 | COLUMBUS: Android App Testing Through Systematic Callback Exploration | Priyanka Bose, Dipanjan Das, Saastha Vasan, Sebastiano Mariani, Ilya Grishchenko, Andrea Continella, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna |
ICSE 2023 | Carving UI Tests to Generate API Tests and API Specification | Rahulkrishna Yandrapally, Saurabh Sinha, Rachel Tzoref-Brill, Ali Mesbah |
ICSE 2023 | Chronos: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports | Yunbo Lyu, Le-Cong Thanh, Hong Jin Kang, Ratnadira Widyasari, Zhipeng Zhao, Xuan-Bach D. Le, Ming Li, David Lo |
ICSE 2023 | CoCoSoDa: Effective Contrastive Learning for Code Search | Ensheng Shi, Wenchao Gu, Yanlin Wang, Lun Du, Hongyu Zhang, Shi Han, Dongmei Zhang, Hongbin Sun |
ICSE 2023 | CoLeFunDa: Explainable Silent Vulnerability Fix Identification | Jiayuan Zhou, Michael Pacheco, Jinfu Chen, Xing Hu, Xin Xia, David Lo, Ahmed E. Hassan |
ICSE 2023 | CodaMOSA: Escaping Coverage Plateaus in Test Generation with Pre-trained Large Language Models | Caroline Lemieux, Jeevana Priya Inala, Shuvendu K. Lahiri, Siddhartha Sen |
ICSE 2023 | Code Review of Build System Specifications: Prevalence, Purposes, Patterns, and Perceptions | Mahtab Nejati, Mahmoud Alfadel, Shane McIntosh |
ICSE 2023 | Commit Message Matters: Investigating Impact and Evolution of Commit Message Quality | Jiawei Li, Iftekhar Ahmed |
ICSE 2023 | Comparison and Evaluation of Clone Detection Techniques with Different Code Representations | Yuekun Wang, Yuhang Ye, Yueming Wu, Weiwei Zhang, Yinxing Xue, Yang Liu |
ICSE 2023 | Compatibility Issue Detection for Android Apps Based on Path-Sensitive Semantic Analysis | Sen Yang, Sen Chen, Lingling Fan, Sihan Xu, Zhanwei Hui, Song Huang |
ICSE 2023 | Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects | Lyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen, Lingling Fan, Lida Zhao, Wu Jiahui, Yang Liu |
ICSE 2023 | Compiler Test-Program Generation via Memoized Configuration Search | Junjie Chen, Chenyao Suo, Jiajun Jiang, Peiqi Chen, Xingjian Li |
ICSE 2023 | Compiling Parallel Symbolic Execution with Continuations | Guannan Wei, Songlin Jia, Ruiqi Gao, Haotian Deng, Shangyin Tan, Oliver Bračevac, Tiark Rompf |
ICSE 2023 | Concrat: An Automatic C-to-Rust Lock API Translator for Concurrent Programs | Jaemin Hong, Sukyoung Ryu |
ICSE 2023 | Context-aware Bug Reproduction for Mobile Apps | Yuchao Huang, Junjie Wang, Zhe Liu, Song Wang, Chunyang Chen, Mingyang Li, Qing Wang |
ICSE 2023 | ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning | Shangqing Liu, bozhi wu, Xiaofei Xie, Guozhu Meng, Yang Liu |
ICSE 2023 | Coverage Guided Fault Injection for Cloud Systems | Yu Gao, Wensheng Dou, Dong Wang, Wenhan Feng, Jun Wei, Hua Zhong, Tao Huang |
ICSE 2023 | Cross-Domain Requirements Linking via Adversarial-based Domain Adaptation | Zhiyuan Chang, Mingyang Li, Qing Wang, Shoubin Li, Junjie Wang |
ICSE 2023 | CrossCodeBench: Benchmarking Cross-Task Generalization of Source Code Models | Changan Niu, Chuanyi Li, Vincent Ng, Bin Luo |
ICSE 2023 | DLInfer: Deep Learning with Static Slicing for Python Type Inference | Yanyan Yan, Yang Feng, Hongcheng Fan, Baowen Xu |
ICSE 2023 | DStream: A Streaming-Based Highly Parallel IFDS Framework | Xizao Wang, Zhiqiang Zuo, Lei Bu, Jianhua Zhao |
ICSE 2023 | Data Quality Matters: A Case Study of ObsoleteComment Detection | Shengbin Xu, Yuan Yao, Feng Xu, Tianxiao Gu, Jingwei Xu, Xiaoxing Ma |
ICSE 2023 | Data Quality for Software Vulnerability Datasets | Roland Croft, Muhammad Ali Babar, M. Mehdi Kholoosi |
ICSE 2023 | Data-driven Recurrent Set Learning For Non-termination Analysis | Zhilei Han, Fei He |
ICSE 2023 | Decomposing a Recurrent Neural Network into Modules for Enabling Reusability and Replacement | Sayem Mohammad Imtiaz, Fraol Batole, Astha Singh, Rangeet Pan, Breno Dantas Cruz, Hridesh Rajan |
ICSE 2023 | DeepArc: Modularizing Neural Networks for the Model Maintenance | xiaoning ren, Yun Lin, Yinxing Xue, Ruofan Liu, Jun Sun, Zhiyong Feng, Jin Song Dong |
ICSE 2023 | DeepVD: Toward Class-Separation Features for Neural Network Vulnerability Detection | Wenbo Wang, Tien N. Nguyen, Shaohua Wang, Yi Li, Jiyuan Zhang, Aashish Yadavally |
ICSE 2023 | Demystifying Exploitable Bugs in Smart Contracts | Zhuo Zhang, Brian Zhang, Wen Xu, Zhiqiang Lin |
ICSE 2023 | Demystifying Issues, Challenges, and Solutions for Multilingual Software Development | Haoran Yang, Weile Lian, Shaowei Wang, Haipeng Cai |
ICSE 2023 | Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps | Kaifa ZHAO, Xian Zhan, Le Yu, Shiyao Zhou, Hao Zhou, Xiapu Luo, Haoyu Wang, Yepang Liu |
ICSE 2023 | Dependency Facade: The Coupling and Conflicts between Android Framework and Its Customization | Wuxia Jin, Yitong Dai, Jianguo Zheng, Yu Qu, Ming Fan, Zhenyu Huang, Dezhi Huang, Ting Liu |
ICSE 2023 | Detecting Dialog-Related Keyboard Navigation Failures in Web Applications | Paul T. Chiou, Ali S. Alotaibi, William G.J. Halfond |
ICSE 2023 | Detecting Exception Handling Bugs in C++ Programs | Hao Zhang, Ji Luo, Mengze Hu, Jun Yan, Jian Zhang, Zongyan Qiu |
ICSE 2023 | Detecting Isolation Bugs via Transaction Oracle Construction | Wensheng Dou, Ziyu Cui, Qianwang Dai, Jiansen Song, Dong Wang, Yu Gao, Wei Wang, Jun Wei, Lei Chen, Hanmo Wang, Hua Zhong, Tao Huang |
ICSE 2023 | Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces | Haoxiang Jia, Ming Wen, Zifan Xie, Xiaochen Guo, Rongxin Wu, Maolin Sun, Kang Chen, Hai Jin |
ICSE 2023 | Developer-Intent Driven Code Comment Generation | Fangwen Mu, Xiao Chen, Lin Shi, Song Wang, Qing Wang |
ICSE 2023 | Developers’ Visuo-spatial Mental Model and Program Comprehension | Abir Bouraffa, Gian-Luca Fuhrmann, Walid Maalej |
ICSE 2023 | Did We Miss Something Important? Studying and Exploring Variable-Aware Log Abstraction | Zhenhao Li, Chuan Luo, Tse-Hsun (Peter) Chen, Weiyi Shang, Shilin He, Qingwei Lin, Dongmei Zhang |
ICSE 2023 | Diver: Oracle-Guided SMT Solver Testing with Unrestricted Random Mutations | Jongwook Kim, Sunbeom So, Hakjoo Oh |
ICSE 2023 | Do I Belong? Modeling Sense of Virtual Community Among Linux Kernel Contributors | Bianca Trinkenreich, Klaas-Jan Stol, Anita Sarma, Daniel M. German, Marco Gerosa, Igor Steinmacher |
ICSE 2023 | Do code refactorings influence the merge effort? | André Oliveira, Vania Neves, Alexandre Plastino, Ana Carla Bibiano, Alessandro Garcia, Leonardo Murta |
ICSE 2023 | Does data sampling improve deep learning-based vulnerability detection? Yeas! and Nays! | Xu Yang, Shaowei Wang, Yi Li, Shaohua Wang |
ICSE 2023 | Does the Stream API Benefit from Special Debugging Facilities? A Controlled Experiment on Loops and Streams with Specific Debuggers | Jan Reichl, Stefan Hanenberg, Volker Gruhn |
ICSE 2023 | Doppelganger Test Generation for Revealing Bugs in Autonomous Driving Software | Yuqi Huai, Yuntianyi Chen, Sumaya Almanee, Tuan Ngo, Xiang Liao, Ziwen Wan, Qi Alfred Chen, Joshua Garcia |
ICSE 2023 | DuetCS: Code Style Transfer through Generation and Retrieval | Binger Chen, Ziawasch Abedjan |
ICSE 2023 | ECSTATIC: An Extensible Framework for Testing and Debugging Configurable Static Analysis | Austin Mordahl, Zenong Zhang, Dakota Soles, Shiyi Wei |
ICSE 2023 | Eadro: An End-to-End Troubleshooting Framework for Microservices on Multi-source Data | Cheryl Lee, Tianyi Yang, Zhuangbin Chen, Yuxin Su, Michael Lyu |
ICSE 2023 | Efficiency Matters: Speeding Up Automated Testing with GUI Rendering Inference | Sidong Feng, Mulong Xie, Chunyang Chen |
ICSE 2023 | Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model | Bin Yuan, Yifan Lu, Yilin Fang, Yueming Wu, Deqing Zou, Zhen Li, Zhi Li, Hai Jin |
ICSE 2023 | Evaluating and Improving Hybrid Fuzzing | Ling Jiang, Hengchen Yuan, Mingyuan Wu, Lingming Zhang, Yuqun Zhang |
ICSE 2023 | Evaluating the Impact of Experimental Assumptions in Automated Fault Localization | Ezekiel Soremekun, Lukas Kirschner, Marcel Böhme, Mike Papadakis |
ICSE 2023 | Evidence Profiles for Validity Threats in Program Comprehension Experiments | Marvin Muñoz Barón, Marvin Wyrich, Daniel Graziotin, Stefan Wagner |
ICSE 2023 | Ex pede Herculem: Augmenting Activity Transition Graph for Apps via Graph Convolution Network | Zhe Liu, Chunyang Chen, Junjie Wang, Yuhui Su, Yuekai Huang, Jun Hu, Qing Wang |
ICSE 2023 | Explaining Software Bugs Leveraging Code Structures in Neural Machine Translation | Parvez Mahbub, Ohiduzzaman Shuvo, Masud Rahman |
ICSE 2023 | Fairify: Fairness Verification of Neural Networks | Sumon Biswas, Hridesh Rajan |
ICSE 2023 | Faster or Slower? Performance Mystery of Python Idioms Unveiled with Empirical Evidence | zejun zhang, Zhenchang Xing, Xin Xia, Xiwei (Sherry) Xu, Liming Zhu, Qinghua Lu |
ICSE 2023 | FedDebug: Systematic Debugging for Federated Learning Applications | Waris Gill, Ali Anwar, Muhammad Ali Gulzar |
ICSE 2023 | FedSlice: Protecting Federated Learning Models from Malicious Participants with Model Slicing | Ziqi Zhang, Yuanchun Li, Bingyan Liu, Yifeng Cai, Ding Li, Yao Guo, Xiangqun Chen |
ICSE 2023 | Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing | Zhe Liu, Chunyang Chen, Junjie Wang, Xing Che, Yuekai Huang, Jun Hu, Qing Wang |
ICSE 2023 | Finding Causally Different Tests for an Industrial Control System | Chris Poskitt, Yuqi Chen, Jun Sun, Yu Jiang |
ICSE 2023 | Fine-grained Commit-level Vulnerability Type Prediction By CWE Tree Structure | Shengyi Pan, Lingfeng Bao , Xin Xia, David Lo, Shanping Li |
ICSE 2023 | Flexible and Optimal Dependency Management via Max-SMT | Donald Pinckney, Federico Cassano, Arjun Guha, Jonathan Bell, Massimiliano Culpo, Todd Gamblin |
ICSE 2023 | Fonte: Finding Bug Inducing Commits from Failures | Gabin An, Jingun Hong, Naryeong Kim, Shin Yoo |
ICSE 2023 | From Organizations to Individuals: Psychoactive Substance Use By Professional Programmers | Kaia Newman, Madeline Endres, Westley Weimer, Brittany Johnson |
ICSE 2023 | Fuzzing Automatic Differentiation in Deep-Learning Libraries | Chenyuan Yang, Yinlin Deng, Jiayi Yao, Yuxing Tu, Hanchi Li, Lingming Zhang |
ICSE 2023 | GameRTS: A Regression Testing Framework for Video Games | Jiongchi Yu, Yuechen Wu, Xiaofei Xie, Wei Le, Lei Ma, Yingfeng Chen, Yujing Hu, Fan Zhang |
ICSE 2023 | Generating Realistic and Diverse Tests for LiDAR-Based Perception Systems | Garrett Christian, Trey Woodlief, Sebastian Elbaum |
ICSE 2023 | Generating Test Databases for Database-Backed Applications | Cong Yan, Suman Nath, Shan Lu |
ICSE 2023 | Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal Attention | Cheryl Lee, Tianyi Yang, Zhuangbin Chen, Yuxin Su, Yongqiang Yang, Michael Lyu |
ICSE 2023 | How Do Developers' Profiles and Experiences Influence their Logging Practices? An Empirical Study of Industrial Practitioners | Guoping Rong, shenghui gu, Haifeng Shen, He Zhang, Hongyu Kuang |
ICSE 2023 | How Do We Read Formal Claims? Eye-Tracking and the Cognition of Proofs about Algorithms | Hammad Ahmad, Zachary Karas, Kimberly Diaz, Amir Kamil, Jean-Baptiste Jeannin, Westley Weimer |
ICSE 2023 | Identifying Key Classes for Initial Software Comprehension: Can We Do It Better? | Weifeng Pan, Xin Du, Hua Ming, Dae-Kyoo Kim, Zijiang Yang |
ICSE 2023 | Impact of Code Language Models on Automated Program Repair | Nan Jiang, Kevin Liu, Thibaud Lutellier, Lin Tan |
ICSE 2023 | Improving API Knowledge Discovery with ML: A Case Study of Comparable API Methods | Daye Nam, Brad A. Myers, Bogdan Vasilescu, Vincent J. Hellendoorn |
ICSE 2023 | Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation | Sicong Cao, Xiaobing Sun, Xiaoxue Wu, Lili Bo, Bin Li, Rongxin Wu, Wei Liu, Biao He, Yu Ouyang, Jiajia Li |
ICSE 2023 | Incident-aware Duplicate Ticket Aggregation for Cloud Systems | Jinyang Liu, Shilin He, Zhuangbin Chen, Liqun Li, Yu Kang, Xu Zhang, Pinjia He, Hongyu Zhang, Qingwei Lin, Zhangwei Xu, Saravan Rajmohan, Dongmei Zhang, Michael Lyu |
ICSE 2023 | Information-Theoretic Testing and Debugging of Fairness Defects in Deep Neural Networks | Verya Monjezi, Ashutosh Trivedi, Gang (Gary) Tan, Saeid Tizpaz-Niari |
ICSE 2023 | Is It Enough to Recommend Tasks to Newcomers? Understanding Mentoring on Good First Issues | Xin Tan, Yiran Chen, Haohua Wu, Minghui Zhou, Li Zhang |
ICSE 2023 | JITfuzz: Coverage-guided Fuzzing for JVM Just-in-Time Compilers | Mingyuan Wu, Minghai Lu, Heming Cui, Junjie Chen, Yuqun Zhang, Lingming Zhang |
ICSE 2023 | KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair | Nan Jiang, Thibaud Lutellier, Yiling Lou, Lin Tan, Dan Goldwasser, Xiangyu Zhang |
ICSE 2023 | Keeping Pace with Ever-Increasing Data: Towards Continual Learning of Code Intelligence Models | Shuzheng Gao, Hongyu Zhang, Cuiyun Gao, Chaozheng Wang |
ICSE 2023 | Keyword Extraction From Specification Documents for Planning Security Mechanisms | Jeffy Jahfar Poozhithara, Hazeline Asuncion, Brent Lagesse |
ICSE 2023 | Large Language Models are Few-shot Testers: Exploring LLM-based General Bug Reproduction | Sungmin Kang, Juyeon Yoon, Shin Yoo |
ICSE 2023 | Learning Deep Semantics for Test Completion | Pengyu Nie, Rahul Banerjee, Junyi Jessy Li, Raymond Mooney, Milos Gligoric |
ICSE 2023 | Learning Graph-based Code Representations for Source-level Functional Similarity Detection | Jiahao Liu, Jun Zeng, Xiang Wang, Zhenkai Liang |
ICSE 2023 | Learning Seed-Adaptive Mutation Strategies for Greybox Fuzzing | Myungho Lee, Sooyoung Cha, Hakjoo Oh |
ICSE 2023 | Learning to Boost Disjunctive Static Bug-Finders | Yoonseok Ko, Hakjoo Oh |
ICSE 2023 | Lejacon: A Lightweight and Efficient Approach to Java Confidential Computing on SGX | Xinyuan Miao, Ziyi Lin, Shaojun Wang, Lei Yu, Sanhong Li, Zihan Wang, Pengbo Nie, Yuting Chen, Beijun Shen, He Jiang |
ICSE 2023 | Leveraging Feature Bias for Scalable Misprediction Explanation of Machine Learning Models | Jiri Gesi, Xinyun Shen, Yunfan Geng, Qihong Chen, Iftekhar Ahmed |
ICSE 2023 | Lightweight Approaches to DNN Regression Error Reduction: An Uncertainty Alignment Perspective | Zenan Li, Maorun Zhang, Jingwei Xu, Yuan Yao, Chun Cao, Taolue Chen, Xiaoxing Ma, Jian Lu |
ICSE 2023 | Locating Framework-specific Crashing Faults with Compact and Explainable Candidate Set | Jiwei Yan, MiaoMiao Wang, Yepang Liu, Jun Yan, Long Zhang |
ICSE 2023 | Log Parsing with Prompt-based Few-shot Learning | Van-Hoang Le, Hongyu Zhang |
ICSE 2023 | LogReducer: Identify and Reduce Log Hotspots in Kernel on the Fly | Guangba Yu, Pengfei Chen, Pairui Li, Tianjun Weng, Haibing Zheng, Yuetang Deng, Zibin Zheng |
ICSE 2023 | MTTM: Metamorphic Testing for Textual Content Moderation Software | Wenxuan Wang, Jen-tse Huang, Weibin Wu, Jianping Zhang, Yizhan Huang, Shuqing Li, Pinjia He, Michael Lyu |
ICSE 2023 | Many-Objective Reinforcement Learning for Online Testing of DNN-Enabled Systems | Fitash ul haq, Donghwan Shin, Lionel Briand |
ICSE 2023 | Measuring Secure Coding Practice and Culture: A Finger Pointing at the Moon is not the Moon | Ita Ryan, Utz Roedig, Klaas-Jan Stol |
ICSE 2023 | Measuring and Mitigating Gaps in Structural Testing | Soneya Binta Hossain, Matthew B Dwyer, Sebastian Elbaum, Anh Nguyen-Tuong |
ICSE 2023 | Metamorphic Shader Fusion for Testing Graphics Shader Compilers | Dongwei Xiao, Zhibo Liu, Shuai Wang |
ICSE 2023 | MirrorTaint: Practical Non-intrusive Dynamic Taint Tracking for JVM-based Microservice Systems | Yicheng Ouyang, Kailai Shao, Kunqiu Chen, Ruobing Shen, Chao Chen, Mingze Xu, Yuqun Zhang, Lingming Zhang |
ICSE 2023 | MorphQ: Metamorphic Testing of the Qiskit Quantum Computing Platform | Matteo Paltenghi, Michael Pradel |
ICSE 2023 | Moving on from the software engineers' gambit: an approach to support the defense of software effort estimates | Patricia Matsubara, Igor Steinmacher, Bruno Gadelha, Tayana Conte |
ICSE 2023 | OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions | Wu Jiahui, Zhengzi Xu, Wei Tang, Lyuye Zhang, Yueming Wu, Chengyue Liu, Kairan Sun, Lida Zhao, Yang Liu |
ICSE 2023 | On Privacy Weaknesses and Vulnerabilities in Software Systems | Pattaraporn Sangaroonsilp, Hoa Khanh Dam, Aditya Ghose |
ICSE 2023 | On the Applicability of Language Models to Block-Based Programs | Elisabeth Griebl, Benedikt Fein, Florian Obermueller, Gordon Fraser, René Just |
ICSE 2023 | On the Reproducibility of Software Defect Datasets | Hao-Nan Zhu, Cindy Rubio-González |
ICSE 2023 | On the Robustness of Code Generation Techniques: An Empirical Study on GitHub Copilot | Antonio Mastropaolo, Luca Pascarella, Emanuela Guglielmi, Matteo Ciniselli, Simone Scalabrino, Rocco Oliveto, Gabriele Bavota |
ICSE 2023 | On the Self-Governance and Episodic Changes in Apache Incubator Projects: An Empirical Study | Likang Yin, Xiyu Zhang, Vladimir Filkov |
ICSE 2023 | On the Temporal Relations between Logging and Code | Zishuo Ding, Yiming Tang, Yang Li, Heng Li, Weiyi Shang |
ICSE 2023 | On-Demand Security Requirements Synthesis with Relational Generative Adversarial Networks (RelGAN) | Viktoria Koscinski, Sara Hashemi, Mehdi Mirakhorli |
ICSE 2023 | One Adapter for All Programming Languages? Adapter Tuning for Multilingual Tasks in Software Engineering | Deze Wang, Boxing Chen, Shanshan Li, Wei Luo, Shaoliang Peng, Wei Dong, Liao Xiangke |
ICSE 2023 | Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers | Suyue Guo, Xinyu Wan, Wei You, Bin Liang, Wenchang Shi, Yiwei Zhang, Jianjun Huang, Jian Zhang |
ICSE 2023 | PExReport: Automatic Creation of Pruned Executable Cross-Project Failure Reports | Sunzhou Huang, Xiaoyin Wang |
ICSE 2023 | PILAR: Studying and Mitigating the Influence of Configurations on Log Parsing | Hetong Dai, Yiming Tang, Heng Li, Weiyi Shang |
ICSE 2023 | PTPDroid: Detecting Violated User Privacy Disclosures to Third-Parties of Android Apps | Zeya Tan, Wei Song |
ICSE 2023 | Practical and Efficient Model Extraction of Sentiment Analysis APIs | Weibin Wu, Jianping Zhang, Victor Junqiu Wei, Xixian Chen, Zibin Zheng, Irwin King, Michael Lyu |
ICSE 2023 | Predicting Bugs by Monitoring Developers During Task Execution | Gennaro Laudato, Simone Scalabrino, Nicole Novielli, Filippo Lanubile, Rocco Oliveto |
ICSE 2023 | PyEvolve: Automating Frequent Code Changes in Python ML Systems | Malinda Dilhara, Danny Dig, Ameya Ketkar |
ICSE 2023 | RAT: A Refactoring-Aware Traceability Model for Bug Localization | Feifei Niu, Wesley Assunção, Liguo Huang, Christoph Mayr-Dorn, Jidong Ge, Bin Luo, Alexander Egyed |
ICSE 2023 | Reachable Code Coverage | Danushka Liyanage, Marcel Böhme, Kla Tantithamthavorn, Stephan Lipp |
ICSE 2023 | Read It, Don't Watch It: Captioning Bug Recordings Automatically | Sidong Feng, Mulong Xie, Yinxing Xue, Chunyang Chen |
ICSE 2023 | Recommending Root-Cause and Mitigation Steps for Cloud Incidents using Large Language Models | Toufique Ahmed, Supriyo Ghosh, Chetan Bansal, Thomas Zimmermann, Xuchao Zhang, Saravanakumar Rajmohan |
ICSE 2023 | Regression Fuzzing for Deep Learning Systems | Hanmo You, Zan Wang, Junjie Chen, Shuang Liu, Shuochuan Li |
ICSE 2023 | Reliability Assurance for Deep Neural Network Architectures Against Numerical Defects | Linyi Li, Yuhao Zhang, Luyao Ren, Yingfei Xiong, Tao Xie |
ICSE 2023 | RepresentThemAll: A Universal Learning Representation of Bug Reports | Sen Fang, Tao Zhang, Youshuai Tan, He Jiang, Xin Xia, Xiaobing Sun |
ICSE 2023 | Responsibility in Context: On Applicability of Slicing in Semantic Regression Analysis | Sahar Badihi, Khaled Ahmed, Yi Li, Julia Rubin |
ICSE 2023 | Rete: Learning Namespace Representation for Program Repair | Nikhil Parasaram, Earl T. Barr, Sergey Mechtaev |
ICSE 2023 | Retrieval-Based Prompt Selection for Code-Related Few-Shot Learning | Noor Nashid, Mifta Sintaha, Ali Mesbah |
ICSE 2023 | Reusing Deep Neural Network Models through Model Re-engineering | Binhang Qi, Hailong Sun, Xiang Gao, Hongyu Zhang, Zhaotian Li, Xudong Liu |
ICSE 2023 | Revisiting Learning-based Commit Message Generation | Jinhao Dong, Yiling Lou, Dan Hao, Lin Tan |
ICSE 2023 | Revisiting Neuron Coverage for DNN Testing: A Layer-Wise and Distribution-Aware Criterion | Yuanyuan Yuan, Qi Pang, Shuai Wang |
ICSE 2023 | Robustification of Behavioral Designs against Environmental Deviations | Changjian Zhang, Tarang Saluja, Rômulo Meira-Góes, Matthew Bolton, David Garlan, Eunsuk Kang |
ICSE 2023 | Rules of Engagement: Why and How Companies Participate in OSS | Mariam Guizani, Aileen Abril Castro-Guzman, Anita Sarma, Igor Steinmacher |
ICSE 2023 | Safe low-level code without overhead is practical | Solal Pirelli, George Candea |
ICSE 2023 | SecBench.js: An Executable Security Benchmark Suite for Server-Side JavaScript | Masudul Hasan Masud Bhuiyan, Adithya Srinivas Parthasarathy, Nikos Vasilakis, Michael Pradel, Cristian-Alexandru Staicu |
ICSE 2023 | SeeHow: Workflow Extraction from Programming Screencasts through Action-Aware Video Analytics | Dehai Zhao, Zhenchang Xing, Xin Xia, Deheng Ye, Xiwei (Sherry) Xu, Liming Zhu |
ICSE 2023 | Semi-Automatic, Inline and Collaborative Web Page Code Curations | Roy Rutishauser, André N. Meyer, Reid Holmes, Thomas Fritz |
ICSE 2023 | Sibyl: Improving Software Engineering Tools with SMT Selection | Will Leeson, Matthew B Dwyer, Antonio Filieri |
ICSE 2023 | Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation | Jiamou Sun, Zhenchang Xing, Qinghua Lu, Xiwei (Sherry) Xu, Liming Zhu, Thong Hoang, Dehai Zhao |
ICSE 2023 | SkCoder: A Sketch-based Approach for Automatic Code Generation | Jia Li, Yongmin Li, Ge Li, Zhi Jin, Xing Hu |
ICSE 2023 | SmallRace: Static Race Detection for Dynamic Languages - A Case on Smalltalk | Siwei Cui, Yifei Gao, Rainer Unterguggenberger, Wilfried Pichler, Sean Livingstone, Jeff Huang |
ICSE 2023 | SmartMark: Software Watermarking Scheme for Smart Contracts | Taeyoung Kim, Yunhee Jang, Chanjong Lee, Hyungjoon Koo, hyoungshick kim |
ICSE 2023 | Socio-Technical Anti-Patterns in Building ML-Enabled Software: Insights from Leaders on the Forefront | Alina Mailach, Norbert Siegmund |
ICSE 2023 | Source Code Recommender Systems: The Practitioners' Perspective | Matteo Ciniselli, Luca Pascarella, Emad Aghajani, Simone Scalabrino, Rocco Oliveto, Gabriele Bavota |
ICSE 2023 | Strategies, Benefits and Challenges of App Store-inspired Requirements Elicitation | Alessio Ferrari, Paola Spoletini |
ICSE 2023 | Sustainability is Stratified: Toward a Better Theory of Sustainable Software Engineering | Erin Schultz, Sean McGuire, Bimpe Ayoola, Paul Ralph |
ICSE 2023 | Syntax and Domain Aware Model for Unsupervised Program Translation | Fang Liu, Jia Li, Li Zhang |
ICSE 2023 | TAINTMINI: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis | Chao Wang, Ronny Ko, Yue Zhang, Yuqing Yang, Zhiqiang Lin |
ICSE 2023 | Tare: Type-Aware Neural Program Repair | Qihao Zhu, Zeyu Sun, Wenjie Zhang, Yingfei Xiong, Lu Zhang |
ICSE 2023 | Template-based Neural Program Repair | Xiangxin Meng, Xu Wang, Hongyu Zhang, Hailong Sun, Xudong Liu, Chunming Hu |
ICSE 2023 | Test Selection for Unified Regression Testing | Shuai Wang, Xinyu Lian, Darko Marinov, Tianyin Xu |
ICSE 2023 | Testability Refactoring in Pull Requests: Patterns and Trends | Pavel Reich, Walid Maalej |
ICSE 2023 | Testing Database Engines via Query Plan Guidance | Jinsheng Ba, Manuel Rigger |
ICSE 2023 | Testing Database Systems via Differential Query Execution | Jiansen Song, Wensheng Dou, Ziyu Cui, Qianwang Dai, Wei Wang, Jun Wei, Hua Zhong, Tao Huang |
ICSE 2023 | The Smelly Eight: An Empirical Study on the Prevalence of Code Smells in Quantum Computing | Qihong Chen, Rúben Câmara, José Campos, André Souto, Iftekhar Ahmed |
ICSE 2023 | The untold story of code refactoring customizations in practice | Daniel Oliveira, Wesley Assunção, Alessandro Garcia, Ana Carla Bibiano, Márcio Ribeiro, Rohit Gheyi, Baldoino Fonseca |
ICSE 2023 | Tolerate Control-Flow Changes for Sound Data Race Prediction | Shihao Zhu, Yuqi Guo, Long Zhang, Yan Cai |
ICSE 2023 | Towards Understanding Fairness and its Composition in Ensemble Machine Learning | Usman Gohar, Sumon Biswas, Hridesh Rajan |
ICSE 2023 | Triggers for Reactive Synthesis Specifications | Gal Amram, Dor Ma'ayan, Shahar Maoz, Or Pistiner, Jan Oliver Ringert |
ICSE 2023 | Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on Ethereum | Zibin Zheng, Neng Zhang, Jianzhong Su, Zhijie Zhong, Mingxi Ye, Jiachi Chen |
ICSE 2023 | Twins or False Friends? A Study on Energy Consumption and Performance of Configurable Software | Max Weber, Christian Kaltenecker, Florian Sattler, Sven Apel, Norbert Siegmund |
ICSE 2023 | Two Sides of the Same Coin: Exploiting the Impact of Identifiers in Neural Code Comprehension | Shuzheng Gao, Cuiyun Gao, Chaozheng Wang, Jun Sun, David Lo, Yue Yu |
ICSE 2023 | Understanding and Detecting On-the-Fly Configuration Bugs | Teng Wang, Zhouyang Jia, Shanshan Li, Si Zheng, Yue Yu, Erci Xu, Shaoliang Peng, Liao Xiangke |
ICSE 2023 | Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem | Yulun Wu, Zeliang Yu, Ming Wen, Qiang Li, Deqing Zou, Hai Jin |
ICSE 2023 | UpCy: Safely Updating Outdated Dependencies | Andreas Dann, Ben Hermann, Eric Bodden |
ICSE 2023 | Usability-Oriented Design of Liquid Types for Java | Catarina Gamboa, Paulo Canelas, Christopher Steven Timperley, Alcides Fonseca |
ICSE 2023 | Using Reactive Synthesis: An End-to-End Exploratory Case Study | Dor Ma'ayan, Shahar Maoz |
ICSE 2023 | Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs | Maolin Sun, Yibiao Yang, Ming Wen, Yongcong Wang, Yuming Zhou, Hai Jin |
ICSE 2023 | Verifying Data Constraint Equivalence in FinTech Systems | Chengpeng Wang, Gang Fan, Peisen Yao, Fuxiong Pan, Charles Zhang |
ICSE 2023 | ViolationTracker: Building Precise Histories for Static Analysis Violations | Ping Yu, Yijian Wu, Xin Peng, Jiahan Peng, Jian Zhang, Peicheng Xie, Wenyun Zhao |
ICSE 2023 | VulGen: Realistic Vulnerability Generation Via Pattern Mining and Deep Learning | Yu Nong, Yuzhe Ou, Michael Pradel, Feng Chen, Haipeng Cai |
ICSE 2023 | Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning | Xin-Cheng Wen, Yupan , Cuiyun Gao, Hongyu Zhang, Jie M. Zhang, Qing Liao |
ICSE 2023 | What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts? | Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie Williams |
ICSE 2023 | When and Why Test Generators for Deep Learning Produce Invalid Inputs: an Empirical Study | Vincenzo Riccio, Paolo Tonella |
ICSE 2023 | When to Say What: Learning to Find Condition-Message Inconsistencies | Islem BOUZENIA, Michael Pradel |
ICSE 2023 | Which of My Assumptions are Unnecessary for Realizability and Why Should I Care? | Rafi Shalom, Shahar Maoz |
ICSE 2023 | “STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers | Sterre van Breukelen, Ann Barcomb, Sebastian Baltes, Alexander Serebrenik |
FSE 2023 | "We Feel Like We're Winging It": A Study on Navigating Open-Source Dependency Abandonment | Courtney Miller, Christian Kästner, Bogdan Vasilescu |
FSE 2023 | A Case Study of Developer Bots: Motivations, Perceptions, and Challenges | Sumit Asthana, Hitesh Sajnani, Elena Voyloshnikova, Birendra Acharya, Kim Herzig |
FSE 2023 | A Generative and Mutational Approach for Synthesizing Bug-exposing Test Cases to Guide Compiler Fuzzing | Guixin Ye, Tianmin Hu, Zhanyong Tang, Zhenye Fan, Shin Hwei Tan, Bo Zhang, Wenxiang Qian, Zheng Wang |
FSE 2023 | A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing | Min-Yih Hsu, Felicitas Hetzelt, David Gens, Michael Maitland, Michael Franz |
FSE 2023 | A Large-scale Empirical Review of Patch Correctness Checking Approaches | Jun Yang, Yuehan Wang, Yiling Lou, Ming Wen, Lingming Zhang |
FSE 2023 | A Longitudinal Study of Student Contributions to OSS vs. OSS4SG with a Lightweight Intervention | Zihan Fang, Madeline Endres, Thomas Zimmermann, Denae Ford, Westley Weimer, Kevin Leach, Yu Huang |
FSE 2023 | A Practical Human Labeling Method for Online Just-in-Time Software Defect Prediction | Liyan Song, Leandro Minku, Cong Teng, Xin Yao |
FSE 2023 | API-Knowledge Aware Search-based Software Testing: Where, What and How | Xiaoxue Ren, Xinyuan Ye, Yun Lin, Zhenchang Xing, Shuqing Li, Michael Lyu |
FSE 2023 | Accelerating Continuous Integration with Parallel Batch Testing | Emad Fallahzadeh, Amir Hossein Bavand, Peter Rigby |
FSE 2023 | An Automated Approach to Extracting Local Variables | Xiaye Chi, Hui Liu, Guangjie Li, Weixiao Wang, Yunni Xia, Yanjie Jiang, Yuxia Zhang, Weixing Ji |
FSE 2023 | An Extensive Study on Adversarial Attack against Pre-trained Models of Code | Xiaohu Du, Ming Wen, Zichao Wei, Shangwen Wang, Hai Jin |
FSE 2023 | Automata-based Trace Analysis for Aiding Diagnosing GUI Testing Tools for Android | Enze Ma, Shan Huang, weigang he, Ting Su, Jue Wang, Huiyu Liu, Geguang Pu, Zhendong Su |
FSE 2023 | Automated Testing and Improvement of Named Entity Recognition Systems | BoXi Yu, Yiyan Hu, Qiuyang Mang, Wenhan Hu, Pinjia He |
FSE 2023 | Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android Apps | Yuxin Zhang, Sen Chen, Lingling Fan, Chunyang Chen, Xiaohong Li |
FSE 2023 | Automatically Resolving Dependency-Conflict Building Failures via Behavior-Consistent Loosening of Library Version Constraints | Huiyan Wang, Shuguan Liu, Lingyu Zhang, Chang Xu |
FSE 2023 | Baldur: Whole-Proof Generation and Repair with Large Language Models | Emily First, Markus Rabe, Talia Ringer, Yuriy Brun |
FSE 2023 | Benchmarking Robustness of AI-enabled Multi-sensor Fusion Systems: Challenges and Opportunities | Xinyu Gao, Zhijie Wang, Yang Feng, Lei Ma, Zhenyu Chen, Baowen Xu |
FSE 2023 | BiasAsker: Measuring the Bias in Conversational AI System | Yuxuan Wan, Wenxuan Wang, Pinjia He, Jiazhen Gu, Haonan Bai, Michael Lyu |
FSE 2023 | BigDataflow: A Distributed Interprocedural Dataflow Analysis Framework | Zewen Sun, Duanchen Xu, Yiyu Zhang, Yun Qi, Yueyang Wang, Zhiqiang Zuo, Zhaokang Wang, Yue Li, Xuandong Li, Qingda Lu, Wenwen Peng, Shengjian (Daniel) Guo |
FSE 2023 | Building and Sustaining Ethnically, Racially, and Gender Diverse Software Engineering Teams: A Study at Google | Ella Dagan, Anita Sarma, Alison Chang, Sarah D'Angelo, Jillian Dicker, Emerson Murphy-Hill |
FSE 2023 | CAmpactor: A Novel and Effective Local Search Algorithm for Optimizing Pairwise Covering Arrays | Qiyuan Zhao, Chuan Luo, Shaowei Cai, Wei Wu, Jinkun Lin, Hongyu Zhang, Chunming Hu |
FSE 2023 | CCT5: A Code-Change-Oriented Pre-Trained Model | Bo Lin, Shangwen Wang, Zhongxin Liu, Yepang Liu, Xin Xia, Xiaoguang Mao |
FSE 2023 | Can Machine Learning Pipelines Be Better Configured? | Yibo Wang, Ying Wang, Tingwei Zhang, Yue Yu, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu |
FSE 2023 | Co-Dependence Aware Fuzzing for Dataflow-based Big Data Analytics | Ahmad Humayun, Miryung Kim, Muhammad Ali Gulzar |
FSE 2023 | Code Coverage Criteria for Asynchronous Programs | Mohammad Ganji, Saba Alimadadi, Frank Tip |
FSE 2023 | CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models | Zhensu Sun, Xiaoning Du, Fu Song, Li Li |
FSE 2023 | Commit-level, Neural Vulnerability Detection and Assessment | Yi Li, Aashish Yadavally, Jiaxing Zhang, Shaohua Wang, Tien N. Nguyen |
FSE 2023 | Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java | Kaixuan Li, Sen Chen, Lingling Fan, Ruitao Feng, Han Liu, Chengwei Liu, Yang Liu, Yixiang Chen |
FSE 2023 | Compatibility Issues in Deep Learning Systems: Problems and Opportunities | Jun Wang, Guanping Xiao, Shuai Zhang, Huashan Lei, Yepang Liu, Yulei Sui |
FSE 2023 | Contextual Predictive Mutation Testing | Kush Jain, Uri Alon, Alex Groce, Claire Le Goues |
FSE 2023 | Copiloting the Copilots: Fusing Large Language Models with Completion Engines for Automated Program Repair | Yuxiang Wei, Chunqiu Steven Xia, Lingming Zhang |
FSE 2023 | Crystallizer: A Hybrid Path Analysis Framework To Aid in Uncovering Deserialization Vulnerabilities | Prashast Srivastava, Flavio Toffalini, Kostyantyn Vorobyov, François Gauthier, Antonio Bianchi, Mathias Payer |
FSE 2023 | DeMinify: Neural Variable Name Recovery and Type Inference | Yi Li, Aashish Yadavally, Jiaxing Zhang, Shaohua Wang, Tien N. Nguyen |
FSE 2023 | DecompoVision: Reliability Analysis of Machine Vision Components Through Decomposition and Reuse | Boyue Caroline Hu, Lina Marsso, Nikita Dvornik, Huakun Shen, Marsha Chechik |
FSE 2023 | Deep Learning Based Feature Envy Detection Boosted by Real-World Examples | Bo Liu, Hui Liu, Guangjie Li, Nan Niu, Zimao Xu, Yifan Wang, Yunni Xia, Yuxia Zhang, Yanjie Jiang |
FSE 2023 | DeepDebugger: An Interactive Time-Travelling Debugging Approach for Deep Classifiers | Xianglin Yang, Yun Lin, Yifan Zhang, Linpeng Huang, Jin Song Dong, Hong Mei |
FSE 2023 | DeepInfer: Deep Type Inference from Smart Contract Bytecode | Kunsong Zhao, Zihao Li, Jianfeng Li, He Ye, Xiapu Luo, Ting Chen |
FSE 2023 | DeepRover: A Query-efficient Blackbox Attack for Deep Neural Networks | Fuyuan Zhang, Xinwen Hu, Lei Ma, Jianjun Zhao |
FSE 2023 | Demystifying Dependency Bugs in Deep Learning Stack | Kaifeng Huang, Bihuan Chen, Susheng Wu, Junming Cao, Lei Ma, Xin Peng |
FSE 2023 | Demystifying the Composition and Code Reuse in Solidity Smart Contracts | Kairan Sun, Zhengzi Xu, Chengwei Liu, Kaixuan Li, Yang Liu |
FSE 2023 | Design by Contract for Deep Learning APIs | Shibbir Ahmed, Sayem Mohammad Imtiaz, Samantha Syeda Khairunnesa, Breno Dantas Cruz, Hridesh Rajan |
FSE 2023 | Detecting Atomicity Violations in Interrupt-Driven Programs via Interruption Points Selecting and Delayed ISR-Triggering | Bin Yu, Cong Tian, Hengrui Xing, Zuchao Yang, Jie Su, Xu Lu, Jiyu Yang, Liang Zhao, Xiaofeng Li, Zhenhua Duan |
FSE 2023 | DiagConfig: Configuration Diagnosis of Performance Violations in Configurable Software Systems | Zhiming Chen, Pengfei Chen, Guangba Yu, Zilong He, Genting Mai, Peipei Wang |
FSE 2023 | Discovering Parallelisms in Python Programs | Siwei Wei, Guyang Song, Senlin Zhu, Ruoyi Ruan, Shihao Zhu, Yan Cai |
FSE 2023 | DistXplore: Distribution-guided Testing for Evaluating and Enhancing Deep Learning Systems | Longtian Wang, Xiaofei Xie, Xiaoning Du, Meng Tian, Qing Guo, Yang Zheng, Chao Shen |
FSE 2023 | Distinguishing Look-Alike Innocent and Vulnerable Code by Subtle Semantic Representation Learning and Explanation | Chao Ni, Xin Yin, Kaiwen Yang, Dehai Zhao, Zhenchang Xing, Xin Xia |
FSE 2023 | Do CONTRIBUTING files provide information about OSS newcomers' onboarding barriers? | Felipe Fronchetti, David C. Shepherd, Igor Scaliante Wiese, Christoph Treude, Marco Gerosa, Igor Steinmacher |
FSE 2023 | Dynamic Data Fault Localization for Deep Neural Networks | Yining Yin, Yang Feng, Shihao Weng, Zixi Liu, Yuan Yao, Yichi Zhang, Zhihong Zhao, Zhenyu Chen |
FSE 2023 | Dynamic Prediction of Delays in Software Projects Using Delay Patterns and Bayesian Modeling | Elvan Kula, Eric Greuter, Arie van Deursen, Georgios Gousios |
FSE 2023 | Efficient Text-to-Code Retrieval with Cascaded Fast and Slow Transformer Models | Akhilesh Deepak Gotmare, Junnan Li, Shafiq Joty, Steven C.H. Hoi |
FSE 2023 | Engineering a Formally Verified Automated Bug Finder | Arthur Correnson, Dominic Steinhöfel |
FSE 2023 | Enhancing Coverage-guided Fuzzing via Phantom Program | Mingyuan Wu, Kunqiu Chen, Qi Luo, Jiahong Xiang, Ji Qi, Junjie Chen, Heming Cui, Yuqun Zhang |
FSE 2023 | EtherDiffer: Differential Testing on RPC Services of Ethereum Nodes | Shinhae Kim, Sungjae Hwang |
FSE 2023 | EvaCRC: Evaluating Code Review Comments | Lanxin Yang, Jinwei Xu, YiFan Zhang, He Zhang, Alberto Bacchelli |
FSE 2023 | Evaluating Transfer Learning for Simplifying GitHub READMEs | Haoyu Gao, Christoph Treude, Mansooreh Zahedi |
FSE 2023 | Fix Fairness, Don’t Ruin Accuracy: Performance Aware Fairness Repair using AutoML | Giang Nguyen, Sumon Biswas, Hridesh Rajan |
FSE 2023 | Flow experience in software engineering | Saima Ritonummi, Valtteri Siitonen, Markus Salo, Henri Pirkkalainen, Anu Sivunen |
FSE 2023 | From Leaks to Fixes: Automated Repairs for Resource Leak Warnings | Akshay Utture, Jens Palsberg |
FSE 2023 | FunProbe: Probing Functions from Binary Code through Probabilistic Analysis | Soomin Kim, Hyungseok Kim, Sang Kil Cha |
FSE 2023 | Gitor: Scalable Code Clone Detection by Building Global Sample Graph | Junjie shan, Shihan Dou, Yueming Wu, Hairu wu, Yang Liu |
FSE 2023 | GrACE: Language Models Meet Code Edits | Priyanshu Gupta, Avishree Khare, Yasharth Bajpai, Saikat Chakraborty, Sumit Gulwani, Aditya Kanade, Arjun Radhakrishna, Gustavo Soares, Ashish Tiwari |
FSE 2023 | Heterogeneous Testing for Coverage Profilers Empowered with Debugging Support | Yibiao Yang, Maolin Sun, Yang Wang, Qingyang Li, Ming Wen, Yuming Zhou |
FSE 2023 | How Early Participation Determines Long-Term Sustained Activity in GitHub Projects? | Wenxin Xiao, Hao He, Weiwei Xu, Yuxia Zhang, Minghui Zhou |
FSE 2023 | How Practitioners Expect Code Completion? | Chaozheng Wang, Junhao Hu, Cuiyun Gao, Yu Jin, Tao Xie, Hailiang Huang, Zhenyu Lei, Yuetang Deng |
FSE 2023 | Hue: A User-Adaptive Parser for Hybrid Logs | Junjielong Xu, Qiuai Fu, Zhouruixing Zhu, Yutong Cheng, zhijing li, Yuchi Ma, Pinjia He |
FSE 2023 | HyperDiff: Computing Source Code Diffs at Scale | Quentin Le-dilavrec, Djamel Eddine Khelladi, Arnaud Blouin, Jean-Marc Jézéquel |
FSE 2023 | Input-driven Dynamic Program Debloating for Code-reuse Attack Mitigation | Xiaoke Wang, Tao Hui, Lei Zhao, Yueqiang Cheng |
FSE 2023 | IoPV: On Inconsistent Option Performance Variations | Jinfu Chen, Zishuo Ding, Yiming Tang, Mohammed Sayagh, Heng Li, Bram Adams, Weiyi Shang |
FSE 2023 | KG4CraSolver: Recommending Crash Solutions via Knowledge Graph | Xueying Du, Yiling Lou, Mingwei Liu, Xin Peng, Tianyong Yang |
FSE 2023 | Knowledge-based Version Incompatibility Detection for Deep Learning | Zhongkai Zhao, Bonan Kou, Mohamed Yilmaz Ibrahim, Muhao Chen, Tianyi Zhang |
FSE 2023 | LExecutor: Learning-Guided Execution | Beatriz Souza, Michael Pradel |
FSE 2023 | Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing | bozhi wu, Shangqing Liu, Yang Xiao, Zhiming Li, Jun Sun, Shang-Wei Lin |
FSE 2023 | Leveraging Hardware Probes and Optimizations for Accelerating Fuzz Testing of Heterogeneous Applications | Jiyuan Wang, Qian Zhang, Hongbo Rong, Guoqing Harry Xu, Miryung Kim |
FSE 2023 | LibKit: Detecting Third-Party Libraries in iOS Apps | Daniel Dominguez Alvarez, Alejandro de la Cruz, Alessandra Gorla, Juan Caballero |
FSE 2023 | Log Parsing with Generalization Ability under New Log Types | Siyu Yu, Yifan Wu, Zhijing Li, Pinjia He, Ningjiang Chen, Changjian Liu |
FSE 2023 | Matching Skills, Past Collaboration, and Limited Competition: Modeling When Open-Source Projects Attract Contributors | Hongbo Fang, James Herbsleb, Bogdan Vasilescu |
FSE 2023 | Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors | Ruoxi Sun, Jason Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal |
FSE 2023 | Metamong: Detecting Render-update Bugs in Web Browsers through Fuzzing | Suhwan Song, Byoungyoung Lee |
FSE 2023 | Mining Resource-Operation Knowledge to Support Resource Leak Detection | Chong Wang, Yiling Lou, Xin Peng, Jianan Liu, Baihan Zou |
FSE 2023 | MuAkka: Mutation Testing for Actor Concurrency in Akka Using Real-World Bugs | Mohsen Moradi Moghadam, Mehdi Bagherzadeh, Raffi Khatchadourian, Hamid Bagheri |
FSE 2023 | Multilingual Code Co-Evolution Using Large Language Models | Jiyang Zhang, Pengyu Nie, Junyi Jessy Li, Milos Gligoric |
FSE 2023 | NaNofuzz: A Usable Tool for Automatic Test Generation | Matthew C. Davis, Sangheon Choi, Sam Estep, Brad A. Myers, Joshua Sunshine |
FSE 2023 | Natural Language to Code: How Far are We? | Shangwen Wang, Mingyang Geng, Bo Lin, Zhensu Sun, Ming Wen, Yepang Liu, Li Li, Tegawendé F. Bissyandé, Xiaoguang Mao |
FSE 2023 | NeuRI: Diversifying DNN Generation via Inductive Rule Inference | Jiawei Liu, Jinjun Peng, Yuyao Wang, Lingming Zhang |
FSE 2023 | Neural-Based Test Oracle Generation: A Large-scale Evaluation and Lessons Learned | Soneya Binta Hossain, Antonio Filieri, Matthew B Dwyer, Sebastian Elbaum, Willem Visser |
FSE 2023 | Nezha: Interpretable Fine-Grained Root Causes Analysis for Microservices on Multi-Modal Observability Data | Guangba Yu, Pengfei Chen, Yufeng Li, Hongyang Chen, Xiaoyun Li, Zibin Zheng |
FSE 2023 | OOM-Guard: Towards Improving The Ergonomics of Rust OOM Handling via A Reservation-based Approach | Chengjun Chen, Zhicong Zhang, Hongliang Tian, Shoumeng Yan, Hui Xu |
FSE 2023 | On the Relationship Between Code Verifiability and Understandability | Kobi Feldman, Martin Kellogg, Oscar Chaparro |
FSE 2023 | On the Usage of Continual Learning for Out-of-Distribution Generalization in Pre-trained Language Models of Code | Martin Weyssow, Xin Zhou, Kisub Kim, David Lo, Houari Sahraoui |
FSE 2023 | Outage-Watch: Early Prediction of Outages using Extreme Event Regularizer | Shubham Agarwal, Sarthak Chakraborty, Shaddy Garg, Sumit Bisht, Chahat Jain, Ashritha Gonuguntla, Shiv Saini |
FSE 2023 | PEM: Representing Binary Program Semantics for Similarity Analysis via A Probabilistic Execution Model | Xiangzhe Xu, Zhou Xuan, Shiwei Feng, Siyuan Cheng, Yapeng Ye, Qingkai Shi, Guanhong Tao, Le Yu, Zhuo Zhang, Xiangyu Zhang |
FSE 2023 | PPR: Pairwise Program Reduction | Mengxiao Zhang, Zhenyang Xu, Yongqiang Tian, Yu Jiang, Chengnian Sun |
FSE 2023 | Pitfalls in Experiments with DNN4SE: An Analysis of the State of the Practice | Sira Vegas, Sebastian Elbaum |
FSE 2023 | Practical Inference of Nullability Types | Nima Karimipour, Justin Pham, Lazaro Clapp, Manu Sridharan |
FSE 2023 | Pre-training Code Representation with Semantic Flow Graph for Effective Bug Localization | Yali Du, Zhongxing Yu |
FSE 2023 | Predicting Software Performance with Divide-and-Learn | Jingzhi Gong, Tao Chen |
FSE 2023 | Program Repair Guided by Datalog-Defined Static Analysis | Yu Liu, Sergey Mechtaev, Pavle Subotic, Abhik Roychoudhury |
FSE 2023 | Property-based Fuzzing for Finding Data Manipulation Errors in Android Apps | Jingling Sun, Ting Su, Jiayi Jiang, Jue Wang, Geguang Pu, Zhendong Su |
FSE 2023 | RAP-Gen: Retrieval-Augmented Patch Generation with CodeT5 for Automatic Program Repair | Weishi Wang, Yue Wang, Shafiq Joty, Steven C.H. Hoi |
FSE 2023 | Recommending Analogical APIs via Knowledge Graph Embedding | Mingwei Liu, Yanjun Yang, Yiling Lou, Xin Peng, Zhong Zhou, Xueying Du, Tianyong Yang |
FSE 2023 | Revisiting Neural Program Smoothing for Fuzzing | Maria Irina Nicolae, Max Eisele, Andreas Zeller |
FSE 2023 | SJFuzz: Seed & Mutator Scheduling for JVM Fuzzing | Mingyuan Wu, Yicheng Ouyang, Minghai Lu, Junjie Chen, Yingquan Zhao, Heming Cui, Guowei Yang, Yuqun Zhang |
FSE 2023 | Scalable Program Clone Search Through Spectral Analysis | Tristan Benoit, Jean-Yves Marion, Sébastien Bardin |
FSE 2023 | Self-Supervised Query Reformulation for Code Search | Yuetian Mao, Chengcheng Wan, Yuze Jiang, Xiaodong Gu |
FSE 2023 | Semantic Debugging | Martin Eberlein, Marius Smytzek, Dominic Steinhöfel, Lars Grunske, Andreas Zeller |
FSE 2023 | Semantic Test Repair for Web applications | Xiaofang Qi, Xiang Qian, Yanhui Li |
FSE 2023 | SmartFix: Fixing Vulnerable Smart Contracts by Accelerating Generate-and-Verify Repair using Statistical Models | Sunbeom So, Hakjoo Oh |
FSE 2023 | Software Architecture Recovery with Information Fusion | Yiran Zhang, Zhengzi Xu, Chengwei Liu, Hongxu Chen, Sun Jianwen, Dong Qiu, Yang Liu |
FSE 2023 | Software Architecture in Practice: Challenges and Opportunities | Zhiyuan Wan, Yun Zhang, Xin Xia, Yi Jiang, David Lo |
FSE 2023 | Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects | Lida Zhao, Sen Chen, Zhengzi Xu, Chengwei Liu, Lyuye Zhang, Wu Jiahui, Jun Sun, Yang Liu |
FSE 2023 | Speeding up SMT Solving via Compiler Optimization | Benjamin Mikek, Qirun Zhang |
FSE 2023 | State Merging with Quantifiers in Symbolic Execution | David Trabish, Noam Rinetzky, Sharon Shoham, Vaibhav Sharma |
FSE 2023 | Statfier: Automated Testing of Static Analyzers via Semantic-preserving Program Transformations | Huaien Zhang, Yu Pei, Junjie Chen, Shin Hwei Tan |
FSE 2023 | Statistical Reachability Analysis | Seongmin Lee, Marcel Böhme |
FSE 2023 | Statistical Type Inference for Incomplete Programs | Yaohui Peng, Jing Xie, Qiongling Yang, Hanwen Guo, Qingan Li, Jingling Xue, YUAN Mengting |
FSE 2023 | Testing Coreference Resolution Systems without Labeled Test Sets | Jialun Cao, Yaojie Lu, Ming Wen, Shing-Chi Cheung |
FSE 2023 | The EarlyBIRD Catches the Bug: On Exploiting Early Layers of Encoder Models for More Efficient Code Classification | Anastasiia Grishina, Max Hort, Leon Moonen |
FSE 2023 | Towards Automated Detection of Unethical Behavior in Open-source Software Projects | Hsu Myat Win, Haibo Wang, Shin Hwei Tan |
FSE 2023 | Towards Greener Yet Powerful Code Generation via Quantization: An Empirical Study | Xiaokai Wei, Sujan Kumar Gonugondla, Shiqi Wang, Wasi Ahmad, Baishakhi Ray, Haifeng Qian, Xiaopeng LI, Varun Kumar, Zijian Wang, Yuchen Tian, Qing Sun, Ben Athiwaratkun, Mingyue Shang, Murali Krishna Ramanathan, Parminder Bhatia, Bing Xiang |
FSE 2023 | TransMap: Pinpointing Mistakes in Neural Code Translation | Bo Wang, Ruishi Li, Mingkai Li, Prateek Saxena |
FSE 2023 | TransRacer: Function Dependence-Guided Transaction Race Detection for Smart Contracts | Chenyang Ma, Wei Song, Jeff Huang |
FSE 2023 | Tritor: Detecting Semantic Code Clones by Building Social Network-based Triads Model | Deqing Zou, Siyue Feng, Yueming Wu, Wenqi Suo, Hai Jin |
FSE 2023 | Understanding Solidity Event Logging Practices in the Wild | Lantian Li, Yejian Liang, Zhihao Liu, Zhongxing Yu |
FSE 2023 | Understanding the Bug Characteristics and Fix Strategies of Federated Learning Systems | Xiaohu Du, Xiao CHEN, Jialun Cao, Ming Wen, Shing-Chi Cheung, Hai Jin |
FSE 2023 | Understanding the topics and challenges of GPU programming by classifying and analyzing Stack Overflow posts | Wenhua Yang, Chong Zhang, Minxue Pan |
FSE 2023 | ViaLin: Path-Aware Dynamic Taint Analysis for Android | Khaled Ahmed, YINGYING WANG, Mieszko Lis, Julia Rubin |
FSE 2023 | When Function Inlining Meets WebAssembly: Counterintuitive Impacts on Runtime Performance | Alan Romano, Weihang Wang |
ASE 2023 | A Comparative Study of Transformer-based Neural Text Representation Techniques on Bug Triaging | Atish Kumar Dipongkor, Kevin Moran |
ASE 2023 | A Comprehensive Study on Code Clones in Automated Driving Software | Ran Mo, Yingjie Jiang, Wenjing Zhan, Dongyu Wang, Zengyang Li |
ASE 2023 | A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem | Wenke Li, Feng Wu, Cai Fu, Fan Zhou |
ASE 2023 | A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering | Wentao Liang, Xiang Ling, Jingzheng Wu, Tianyue Luo, Yanjun Wu |
ASE 2023 | ATOM: Automated Black-Box Testing of Multi-Label Image Classification Systems | Shengyou Hu, Huayao Wu, Peng Wang, Jing Chang, Yongjun Tu, Xiu Jiang, Xintao Niu, Changhai Nie |
ASE 2023 | Adaptive REST API Testing with Reinforcement Learning | Myeongsoo Kim, Saurabh Sinha, Alessandro Orso |
ASE 2023 | An Empirical Study of Malicious Code In PyPI Ecosystem | Wenbo Guo, Zhengzi Xu, Chengwei Liu, Cheng Huang, Yong Fang, Yang Liu |
ASE 2023 | An Empirical Study of Parameter-Efficient Fine-Tuning Methods for Pre-trained Code Models | Jiaxing Liu, Chaofeng Sha, Xin Peng |
ASE 2023 | An Empirical Study on Fine-tuning Large Language Models of Code for Automated Program Repair | Kai Huang, Xiangxin Meng, Jian Zhang, Yang Liu, Wenjie Wang, Shuhao Li, Yuqing Zhang |
ASE 2023 | An Energy-Aware Approach to Design Self-Adaptive AI-based Applications on the Edge | Alessandro Tundo, Marco Mobilio, Shashikant Ilager, Ivona Brandic, Ezio Bartocci, Leonardo Mariani |
ASE 2023 | An Image is Worth a Thousand Toxic Words: A Metamorphic Testing Framework for Content Moderation Software | Wenxuan Wang, Jingyuan Huang, Jen-tse Huang, Chang Chen, Jiazhen Gu, Pinjia He, Michael Lyu |
ASE 2023 | An Integrated Program Analysis Framework for Graduate Courses in Programming Languages and Software Engineering | Prantik Chatterjee, Pankaj Kumar Kalita, Sumit Lahiri, Sujit Kumar Muduli, Vishal Singh, Gourav Takhar, Subhajit Roy |
ASE 2023 | An Intentional Forgetting-Driven Self-Healing Method For Deep Reinforcement Learning Systems | Ahmed Haj Yahmed, Rached Bouchoucha, Houssem Ben Braiek , Foutse Khomh |
ASE 2023 | Are They All Good? Studying Practitioners' Expectations on the Readability of Log Messages | Zhenhao Li, An Ran Chen, Xing Hu, Xin Xia, Tse-Hsun (Peter) Chen, Weiyi Shang |
ASE 2023 | Aster: Automatic Speech Recognition System Accessibility Testing for Stutterers | Yi Liu, Yuekang Li, Gelei Deng, Felix Juefei-Xu, Yao Du, Cen Zhang, Chengwei Liu, Yeting Li, Lei Ma, Yang Liu, Yuekang Li |
ASE 2023 | AutoConf : Automated Configuration of Unsupervised Learning Systems using Metamorphic Testing and Bayesian Optimization | Lwin Khin Shar, Arda Goknil, Erik Johannes Husom, Sagar Sen, Yan Naing Tun, Kisub Kim |
ASE 2023 | AutoLog: A Log Sequence Synthesis Framework for Anomaly Detection | Yintong Huo, Yichen LI, Yuxin Su, Pinjia He, Zifan Xie, Michael Lyu |
ASE 2023 | Automated Fixing of Web UI Tests via Iterative Element Matching | Yuanzhang Lin, Guoyao Wen, Xiang Gao |
ASE 2023 | Automated Software Entity Matching Between Successive Versions | Bo Liu, Hui Liu, Nan Niu, Yuxia Zhang, Guangjie Li, Yanjie Jiang |
ASE 2023 | Automatic Generation and Reuse of Precise Library Summaries for Object-Sensitive Pointer Analysis | Jingbo Lu, Dongjie He, Wei Li, Yaoqing Gao, Jingling Xue |
ASE 2023 | Bridging the Gap between Academia and Industry in Machine Learning Software Defect Prediction: Thirteen Considerations | Szymon Stradowski, Lech Madeyski |
ASE 2023 | CAT-LM: Training Language Models on Aligned Code And Tests | Nikitha Rao, Kush Jain, Uri Alon, Claire Le Goues, Vincent J. Hellendoorn |
ASE 2023 | Causality-Aided Trade-off Analysis for Machine Learning Fairness | Zhenlan Ji, Pingchuan Ma, Shuai Wang, Yanhui Li |
ASE 2023 | Cell2Doc: ML Pipeline for Generating Documentation in Computational Notebooks | Tamal Mondal, Scott Barnett, Akash Lal, Jyothi Vedurada |
ASE 2023 | CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature Space | haibin zheng, Jinyin Chen, Haibo Jin |
ASE 2023 | CoMSA: A modeling driven sampling approach for Conferenceiguration performance testing | Yuanjie Xia, Zishuo Ding, Weiyi Shang |
ASE 2023 | Code Difference Guided Adversarial Example Generation for Deep Code Models | Zhao Tian, Junjie Chen, Zhi Jin |
ASE 2023 | CodeGen4Libs: A Two-Stage Approach for Library-Oriented Code Generation | Mingwei Liu, Tianyong Yang, Yiling Lou, Xueying Du, Ying Wang, Xin Peng |
ASE 2023 | Compiler Auto-tuning via Critical Flag Selection | Mingxuan Zhu, Dan Hao |
ASE 2023 | ConfTainter: Static Taint Analysis For Configuration Options | Teng Wang, Haochen He, Xiaodong Liu, Shanshan Li, Zhouyang Jia, Yu Jiang, Qing Liao, Wang Li |
ASE 2023 | Contextuality of Code Representation Learning | Yi Li, Shaohua Wang, Tien N. Nguyen |
ASE 2023 | Contrastive Learning for API Aspect Analysis | G. M. Shahariar, Tahmid Hasan, Anindya Iqbal, Gias Uddin |
ASE 2023 | DCLink: Bridging Data Constraint Changes and Implementations in FinTech Systems | Wensheng Tang, Chengpeng Wang, Peisen Yao, Rongxin Wu, Xianjin Fu, Gang Fan, Charles Zhang |
ASE 2023 | DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities | Jianzhong Su, Xingwei Lin, Zhiyuan Fang, Zhirong Zhu, Jiachi Chen, Zibin Zheng, Wei Lv, Jiashui Wang |
ASE 2023 | DeepScaler: Holistic Autoscaling for Microservices Based on Spatiotemporal GNN with Adaptive Graph Learning | Chunyang Meng, Shijie Song, Haogang Tong, Maolin Pan, Yang Yu |
ASE 2023 | Delving into Commit-Issue Correlation to Enhance Commit Message Generation Models | Liran Wang, Xunzhu Tang, Yichen He, Changyu Ren, Shuhua Shi, Chaoran Yan, Zhoujun Li |
ASE 2023 | Demystifying Template-based Invariant Generation for Bit-Vector Programs | Peisen Yao, Jingyu Ke, Jiahui Sun, Hongfei Fu, Rongxin Wu, Kui Ren |
ASE 2023 | Detecting Memory Errors in Python Native Code by Tracking Object Lifecycle with Reference Count | Xutong Ma, Jiwei Yan, Hao Zhang, Jun Yan, Jian Zhang |
ASE 2023 | Detecting Smart Home Automation Application Interferences with Domain Knowledge | Tao Wang, Wei Chen, Liwei Liu, Guoquan Wu, Jun Wei, Tao Huang |
ASE 2023 | Detection of Java Basic Thread Misuses Based on Static Event Analysis | Baoquan Cui, MiaoMiao Wang, Chi Zhang, Jiwei Yan, Jun Yan, Jian Zhang |
ASE 2023 | Domain Adaptive Code Completion via Language Models and Decoupled Domain Databases | Ze Tang, Jidong Ge, Shangqing Liu, Tingwei Zhu, Tongtong Xu, Liguo Huang, Bin Luo |
ASE 2023 | Dynamic Graph Neural Networks-based Alert Link Prediction for Online Service Systems | Yiru Chen, Chenxi Zhang, Zhen Dong, Dingyu Yang, Xin Peng, Jiayu Ou, Hong Yang, Zheshun Wu, Xiaojun Qu, Wei Li |
ASE 2023 | EALink: An Efficient and Accurate Pre-Trained Framework for Issue-Commit Link Recovery | Chenyuan Zhang, Yanlin Wang, Zhao Wei, Yong Xu, Juhong Wang, Hui Li, Rongrong Ji |
ASE 2023 | ESRO: Experience Assisted Service Reliability against Outages | Sarthak Chakraborty, Shubham Agarwal, Shaddy Garg, Abhimanyu Sethia, Udit Narayan Pandey, Videh Aggarwal, Shiv Saini |
ASE 2023 | Effective Concurrency Testing for Go via Directional Primitive-constrained Interleaving Exploration | Zongze Jiang, Ming Wen, Yixin Yang, Chao Peng, Ping Yang, Hai Jin |
ASE 2023 | Eiffel: Inferring Input Ranges of Significant Floating-point Errors via Polynomial Extrapolation | Zuoyan Zhang, Bei Zhou, Jiangwei Hao, Hongru Yang, Mengqi Cui, Yuchang Zhou, Guanghui Song, Fei Li, Jinchen Xu, Jie Zhao |
ASE 2023 | EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software | Yao Zhang, Xiaofei Xie, Yi Li, Sen Chen, Cen Zhang, Xiaohong Li |
ASE 2023 | Enhancing Malware Detection for Android Apps: Detecting Fine-granularity Malicious Components | Zhijie Liu, Liangfeng Zhang, Yutian Tang |
ASE 2023 | Expediting Neural Network Verification via Network Reduction | Yuyi Zhong, Ruiwei Wang, Siau-Cheng Khoo |
ASE 2023 | FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers | Eric Liu, Shengjie Xu, David Lie |
ASE 2023 | Fast and Reliable Program Synthesis via User Interaction | Yanju Chen, Chenglong Wang, Xinyu Wang, Osbert Bastani, Yu Feng |
ASE 2023 | Fine-Grained In-Context Permission Classification for Android Apps using Control-Flow Graph Embedding | Vikas K. Malviya, Yan Naing Tun, Chee Wei Leow, Ailys Tee Xynyn, Lwin Khin Shar, Lingxiao Jiang |
ASE 2023 | Fixing Privilege Escalations in Cloud Access Control with MaxSAT and Graph Neural Networks | Yang Hu, Wenxi Wang, Sarfraz Khurshid, Kenneth L. McMillan, Mohit Tiwari |
ASE 2023 | Fork Entropy: Assessing the Diversity of Open Source Software Projects' Forks | Liang Wang, Zhiwen Zheng, Xiangchen Wu, Baihui Sang, Jierui Zhang, Xianping Tao |
ASE 2023 | From Commit Message Generation to History-Aware Commit Message Completion | Aleksandra Eliseeva, Yaroslav Sokolov, Egor Bogomolov, Yaroslav Golubev, Danny Dig, Timofey Bryksin |
ASE 2023 | From Misuse to Mastery: Enhancing Code Generation with Knowledge-Driven AI Chaining | Xiaoxue Ren, Xinyuan Ye, Dehai Zhao, Zhenchang Xing, Xiaohu Yang |
ASE 2023 | Fuzzing for CPS Mutation Testing | Jaekwon Lee, Enrico Viganò, Oscar Cornejo, Fabrizio Pastore, Lionel Briand |
ASE 2023 | GAMMA: Revisiting Template-based Automated Program Repair via Mask Prediction | Quanjun Zhang, Chunrong Fang, Tongke Zhang, Bowen Yu, Weisong Sun, Zhenyu Chen |
ASE 2023 | Generating Variable Explanations via Zero-shot Prompt Learning | Chong Wang, Yiling Lou, Liu Junwei, Xin Peng |
ASE 2023 | Generative Model-Based Testing on Decision-Making Policies | Zhuo Li, Xiongfei Wu, Derui Zhu, Mingfei Cheng, Siyuan Chen, Fuyuan Zhang, Xiaofei Xie, Lei Ma, Jianjun Zhao |
ASE 2023 | Generative Type Inference for Python | Yun Peng, Chaozheng Wang, Wenxuan Wang, Cuiyun Gao, Michael Lyu |
ASE 2023 | HOBAT: Batch Verification for Homogeneous Structural Neural Networks | Jingyang Li, Guoqiang Li |
ASE 2023 | HexT5: Unified Pre-training for Stripped Binary Code Information Inference | Jiaqi Xiong, Guoqiang Chen, Kejiang Chen, Han Gao, Shaoyin Cheng, Weiming Zhang |
ASE 2023 | How Android Apps Break the Data Minimization Principle: An Empirical Study | Shaokun Zhang, Hanwen Lei, Yuanpeng Wang, Ding Li, Yao Guo, Xiangqun Chen |
ASE 2023 | How to Train Your Neural Bug Detector: Artificial vs Real Bugs | Cedric Richter, Heike Wehrheim |
ASE 2023 | Identify and Update Test Cases when Production Code Changes: A Transformer-based Approach | Xing Hu, Zhuang Liu, Xin Xia, Zhongxin Liu, Tongtong Xu, Xiaohu Yang |
ASE 2023 | Improving code extraction from coding screencasts using a code-aware encoder-decoder model | Abdulkarim Malkadi, Ahmad Tayeb, Sonia Haiduc |
ASE 2023 | Increasing the Responsiveness of Web Applications by Introducing Lazy Loading | Alexi Turcotte, Satyajit Gokhale, Frank Tip |
ASE 2023 | InfeRE: Step-by-Step Regex Generation via Chain of Inference | Shuai Zhang, Xiaodong Gu, Beijun Shen, Yuting Chen |
ASE 2023 | Information Retrieval-based Fault Localization for Concurrent Programs | Shuai Shao, Tingting Yu |
ASE 2023 | LEAP: Efficient and Automated Test Method for NLP Software | Mingxuan Xiao, Yan Xiao, Hai Dong, Shunhui Ji, Pengcheng Zhang |
ASE 2023 | LeakPair: Proactive Repairing of Memory Leaks in Single Page Web Applications | Arooba Shahoor, Askar Yeltayuly Khamit, Jooyong Yi, Dongsun Kim |
ASE 2023 | Learning to Locate and Describe Vulnerabilities | Jian Zhang, Shangqing Liu, Xu Wang, Li Tianlin, Yang Liu |
ASE 2023 | Let's Chat to Find the APIs: Connecting Human, LLM and Knowledge Graph through AI Chain | Qing Huang, Zhenyu Wan, Zhenchang Xing, Changjing Wang, Jieshan Chen, Xiwei (Sherry) Xu, Qinghua Lu |
ASE 2023 | LiSum: Open Source Software License Summarization with Multi-Task Learning | Linyu Li, Sihan Xu, Yang Liu, Ya Gao, Xiangrui Cai, Jiarun Wu, Wenli Song, Zheli Liu |
ASE 2023 | LogOnline: A Semi-supervised Log-based Anomaly Detector Aided with Online Learning Mechanism | Xuheng Wang, Jiaxing Song, Xu Zhang, Junshu Tang, Weihe Gao, Qingwei Lin, Xuheng Wang |
ASE 2023 | MELT: Mining Effective Lightweight Transformations from Pull Requests | Daniel Ramos, Hailie Mitchell, Ines Lynce, Vasco Manquinho, Ruben Martins, Claire Le Goues |
ASE 2023 | MLIRSmith: Random Program Generation for Fuzzing MLIR Compiler Infrastructure | Haoyu Wang, Junjie Chen, Chuyue Xie, Shuang Liu, Zan Wang, Qingchao Shen, Yingquan Zhao |
ASE 2023 | Maat: Performance Metric Anomaly Anticipation for Cloud Services with Conditional Diffusion | Cheryl Lee, Tianyi Yang, Zhuangbin Chen, Yuxin Su, Michael Lyu |
ASE 2023 | Merge Conflict Resolution: Classification or Generation? | Jinhao Dong, Qihao Zhu, Zeyu Sun, Yiling Lou, Dan Hao |
ASE 2023 | Merge-Replay: Efficient IFDS-Based Taint Analysis by Consolidating Equivalent Value Flows | Yujiang Gui, Dongjie He, Jingling Xue |
ASE 2023 | Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem | Lyuye Zhang, Chengwei Liu, Sen Chen, Zhengzi Xu, Lingling Fan, Lida Zhao, Yiran Zhang, Yang Liu |
ASE 2023 | Mutation-based Fault Localization of Deep Neural Networks | Ali Ghanbari, Deepak-George Thomas, Muhammad Arbab Arshad, Hridesh Rajan |
ASE 2023 | NaturalFuzz: Natural Input Generation for Big Data Analytics | Ahmad Humayun, Yaoxuan Wu, Miryung Kim, Muhammad Ali Gulzar |
ASE 2023 | Neural SZZ Algorithm | LingXiao Tang, Lingfeng Bao , Xin Xia, Zhongdong Huang |
ASE 2023 | Nuances are the Key: Unlocking ChatGPT to Find Failure-Inducing Tests with Differential Prompting | Li Tsz On, Wenxi Zong, Yibo Wang, Haoye Tian, Ying Wang, Shing-Chi Cheung, Jeffrey Kramer |
ASE 2023 | On the Evaluation of Neural Code Translation: Taxonomy and Benchmark | Mingsheng Jiao, Tingrui Yu, Xuan Li, Guan Jie Qiu, Xiaodong Gu, Beijun Shen |
ASE 2023 | On-the-fly Improving Performance of Deep Code Models via Input Denoising | Zhao Tian, Junjie Chen, Xiangyu Zhang |
ASE 2023 | Optimizing Continuous Development By Detecting and Preventing Unnecessary Content Generation | Talank Baral, Shanto Rahman, Bala Naren Chanumolu, Basak Balci, Tuna Tuncer, August Shi, Wing Lam |
ASE 2023 | OrdinalFix: Fixing Compilation Errors via Shortest-Path CFL Reachability with Attribute Checking | Wenjie Zhang, Guancheng Wang, Junjie Chen, Yingfei Xiong, Yong Liu, Lu Zhang |
ASE 2023 | PERFCE: Performance Debugging on Databases with Chaos Engineering-Enhanced Causality Analysis | Zhenlan Ji, Pingchuan Ma, Shuai Wang |
ASE 2023 | PHYFU: Fuzzing Modern Physics Simulation Engines | Dongwei Xiao, Zhibo Liu, Shuai Wang |
ASE 2023 | PTdetector: An Automated JavaScript Front-end Library Detector | Xinyue Liu, Lukasz Ziarek |
ASE 2023 | Persisting and Reusing Results of Static Program Analyses on a Large Scale | Johannes Düsing, Ben Hermann, Ben Hermann |
ASE 2023 | Personalized First Issue Recommender for Newcomers in Open Source Projects | Wenxin Xiao, Jingyue Li, Hao He, Ruiqiao Qiu, Minghui Zhou |
ASE 2023 | Pluggable Type Inference for Free | Martin Kellogg, Daniel Daskiewicz, Loi Ngo Duc Nguyen, Muyeed Ahmed, Michael D. Ernst |
ASE 2023 | Precise Data-Driven Approximation for Program Analysis via Fuzzing | Nikhil Parasaram, Earl T. Barr, Sergey Mechtaev, Marcel Böhme |
ASE 2023 | Prism: Revealing Hidden Functional Clusters of Massive Instances in Cloud Systems | Jinyang Liu, Zhihan Jiang, Jiazhen Gu, Junjie Huang, Zhuangbin Chen, Cong Feng, Zengyin Yang, Yongqiang Yang, Michael Lyu |
ASE 2023 | QuraTest: Integrating Quantum Specific Features in Quantum Program Testing | Jiaming Ye, Shangzhou Xia, Fuyuan Zhang, Paolo Arcaini, Lei Ma, Jianjun Zhao, Fuyuki Ishikawa |
ASE 2023 | Repeated Builds During Code Review: An Empirical Study of the OpenStack Community | Rungroj Maipradit, Dong Wang, Patanamon Thongtanunam, Raula Gaikovina Kula, Yasutaka Kamei, Shane McIntosh |
ASE 2023 | ReuNify: A Step Towards Whole Program Analysis for React Native Android App | Yonghui Liu, Xiao Chen, Pei Liu, John Grundy, Chunyang Chen, Li Li |
ASE 2023 | Revealing Performance Issues in Server-side WebAssembly Runtimes via Differential Testing | Shuyao Jiang, Ruiying Zeng, Zihao Rao, Jiazhen Gu, Yangfan Zhou, Michael Lyu |
ASE 2023 | Revisiting and Improving Retrieval-Augmented Deep Assertion Generation | Weifeng Sun, Hongyan Li, Meng Yan, Yan Lei, Hongyu Zhang, Hongyu Zhang |
ASE 2023 | Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers | Zhen Li, Ruqian Zhang, Deqing Zou, Ning Wang, Yating Li, Shouhuai Xu, Chen Chen, Hai Jin, Yating Li |
ASE 2023 | SCPatcher: Mining Crowd Security Discussions to Enrich Secure Coding Practices | Ziyou Jiang, Lin Shi, Guowei Yang, Qing Wang |
ASE 2023 | SMT Solver Validation Empowered by Large Pre-trained Language Models | Maolin Sun, Yibiao Yang, Yang Wang, Ming Wen, Haoxiang Jia, Yuming Zhou |
ASE 2023 | Scene-Driven Exploration and GUI Modeling for Android Apps | Xiangyu Zhang, Lingling Fan, Sen Chen, Yucheng Su, Boyuan Li |
ASE 2023 | SmartCoCo: Checking Comment-code Inconsistency in Smart Contracts via Constraint Propagation and Binding | Sicheng Hao, Yuhong Nan, Zibin Zheng, Xiaohui Liu |
ASE 2023 | Software Entity Recognition with Noise-Robust Learning | Tai Nguyen, Yifeng Di, Joohan Lee, Muhao Chen, Tianyi Zhang |
ASE 2023 | Symbolic Fixpoint Algorithms for Logical LTL Games | Stanly Samuel, Deepak D'Souza, Raghavan Komondoor |
ASE 2023 | Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks | Paschal Amusuo, Ricardo Andrés Calvo Méndez, Zhongwei Xu, Aravind Machiry, James C. Davis |
ASE 2023 | The Devil is in the Tails: How Long-Tailed Code Distributions Impact Large Language Models | Xin Zhou, Kisub Kim, Bowen Xu, Jiakun Liu, DongGyun Han, David Lo |
ASE 2023 | The MAP metric in Information Retrieval Fault Localization | Thomas Hirsch, Birgit Hofer |
ASE 2023 | The Plastic Surgery Hypothesis in the Era of Large Language Models | Chunqiu Steven Xia, Yifeng Ding, Lingming Zhang |
ASE 2023 | Thunderkaller: Profiling and Improving the Performance of Syzkaller | Yang Lan, Di Jin, Zhun Wang, Wende Tan, Zheyu Ma, Chao Zhang |
ASE 2023 | To Share, or Not to Share: Exploring Test-Case Reusability in Fork Ecosystems | Mukelabai Mukelabai, Christoph Derks, Jacob Krüger, Thorsten Berger |
ASE 2023 | Towards Automatically Addressing Self-Admitted Technical Debt: How Far Are We? | Antonio Mastropaolo, Massimiliano Di Penta, Gabriele Bavota |
ASE 2023 | Twin Graph-based Anomaly Detection via Attentive Multi-Modal Learning for Microservice System | Jun Huang, Yang Yang, Hang Yu, Jianguo Li, Xiao Zheng |
ASE 2023 | Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis | Chenghang Shi, Haofeng Li, Yulei Sui, Jie Lu, Lian Li, Jingling Xue |
ASE 2023 | Understanding and Enhancing Issue Prioritization in GitHub | Yingying He, Wenhua Yang, Minxue Pan, Yasir Hussain, Yu Zhou |
ASE 2023 | Understanding and Remediating Open-Source License Incompatibilities in the PyPI Ecosystem | Weiwei Xu, Hao He, Kai Gao, Minghui Zhou |
ASE 2023 | Using Deep Learning to Automatically Improve Code Readability | Antonio Vitale, Valentina Piantadosi, Simone Scalabrino, Rocco Oliveto |
ASE 2023 | VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual Device | Yuwei Liu, Siqi Chen, Yuchong Xie, Yanhao Wang, Libo Chen, Bin Wang, Yingming Zeng, Zhi Xue, Purui Su |
ASE 2023 | VRGuide: Efficient Testing of Virtual Reality Scenes via Dynamic Cut Coverage | Xiaoyin Wang, Tahmid Rafi, Na Meng |
ASE 2023 | Vicious Cycles in Distributed Software Systems | Shangshu Qian, Wen Fan, Lin Tan, Yongle Zhang |
ASE 2023 | Vision-based Widget Mapping for Test Migration across Mobile Platforms: Are We There Yet? | Ruihua Ji, Tingwei Zhu, Xiaoqing Zhu, Chunyang Chen, Minxue Pan, Tian Zhang |
ASE 2023 | WADIFF: A Differential Testing Framework for WebAssembly Runtimes | Shiyao Zhou, Muhui Jiang, Weimin Chen, Hao Zhou, Haoyu Wang, Xiapu Luo |
ASE 2023 | WeMinT: Tainting Sensitive Data Leaks in WeChat Mini-Programs | Shi Meng, Liu Wang, Shenao Wang, Kailong Wang, Xusheng Xiao, Guangdong Bai, Haoyu Wang |
ASE 2023 | What Makes Good In-context Demonstrations for Code Intelligence Tasks with LLMs? | Shuzheng Gao, Xin-Cheng Wen, Cuiyun Gao, Wenxuan Wang, Hongyu Zhang, Michael Lyu |
ASE 2023 | When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection | Xin-Cheng Wen, Xinchen Wang, Cuiyun Gao, Shaohua Wang, Yang Liu, Zhaoquan Gu |
ASE 2023 | Where to Go Now? Finding Alternatives for Declining Packages in the npm Ecosystem | Suhaib Mujahid, Diego Costa, Rabe Abdalkareem, Emad Shihab |
ASE 2023 | Who is the Real Hero? Measuring Developer Contribution via Multi-dimensional Data Integration | Yuqiang Sun, Zhengzi Xu, Chengwei Liu, Yiran Zhang, Yang Liu |
ASE 2023 | ZC3 Zero-Shot Cross-Language Code Clone Detection | Jia Li, Chongyang Tao, Zhi Jin, Fang Liu, Jia Li, Ge Li |
ASE 2023 | iASTMapper: An Iterative Similarity-Based Abstract Syntax Tree Mapping Algorithm | Neng Zhang, ChenQinde , Zibin Zheng, Ying Zou |
ISSTA 2023 | 1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing | Songtao Yang, Yubo He, Kaixiang Chen, Zheyu Ma, Xiapu Luo, Yong Xie, Jianjun Chen, Chao Zhang |
ISSTA 2023 | A Bayesian Framework for Automated Debugging | Sungmin Kang, Wonkeun Choi, Shin Yoo |
ISSTA 2023 | A Comprehensive Study on Quality Assurance Tools for Java | Han Liu, Sen Chen, Ruitao Feng, Chengwei Liu, Kaixuan Li, Zhengzi Xu, Liming Nie, Yang Liu, Yixiang Chen |
ISSTA 2023 | A Tale of Two Approximations: Tightening Over-Approximation for DNN Robustness Verification via Under-Approximation | Zhiyi Xue, Si Liu, Zhaodi Zhang, Yiting Wu, Min Zhang |
ISSTA 2023 | ACETest: Automated Constraint Extraction for Testing Deep Learning Operators | Jingyi Shi, Yang Xiao, Yuekang Li, Yeting Li, DongSong Yu, Chendong Yu, Hui Su, Yufeng Chen, Wei Huo |
ISSTA 2023 | AGORA: Automated Generation of Test Oracles for REST APIs | Juan C. Alonso, Sergio Segura, Antonio Ruiz-Cortés |
ISSTA 2023 | API2Vec: Learning Representations of API Sequences for Malware Detection | Lei Cui, Jiancong Cui, Yuede Ji, Zhiyu Hao, Lun Li, Zhenquan Ding |
ISSTA 2023 | Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features | Yiming Zhang, Yuxin Hu, Haonan Li, Wenxuan Shi, Zhenyu Ning, Xiapu Luo, Fengwei Zhang |
ISSTA 2023 | An Empirical Study of Functional Bugs in Android Apps | Yiheng Xiong, Mengqian Xu, Ting Su, Jingling Sun, Jue Wang, He Wen, Geguang Pu, Jifeng He, Zhendong Su |
ISSTA 2023 | An Empirical Study on Concurrency Bugs in Interrupt-Driven Embedded Software | Chao Li, Rui Chen, Boxiang Wang, Zhixuan Wang, Tingting Yu, Yunsong Jiang, Mengfei Yang |
ISSTA 2023 | An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors | Kunlun Ren, Qiang Weizhong, Yueming Wu, yi zhou, Deqing Zou, Hai Jin |
ISSTA 2023 | Applying and Extending the Delta Debugging Algorithm for Elevator Dispatching Algorithms (Experience Paper) | Pablo Valle, Aitor Arrieta, Maite Arratibel |
ISSTA 2023 | Automated Generation of Security-Centric Descriptions for Smart Contract Bytecode | Yu Pan, Zhichao Xu, Levi Taiji Li, Yunhe Yang, Mu Zhang |
ISSTA 2023 | Automated Program Repair from Fuzzing Perspective | YoungJae Kim, Seungheon Han, Askar Yeltayuly Khamit, Jooyong Yi |
ISSTA 2023 | Automatically Reproducing Android Bug Reports using Natural Language Processing and Reinforcement Learning | Zhaoxu Zhang, Robert Winn, Yu Zhao, Tingting Yu, William G.J. Halfond |
ISSTA 2023 | Back Deduction Based Testing for Word Sense Disambiguation Ability of Machine Translation Systems | Jun Wang, Yanhui Li, Xiang Huang, Lin Chen, Xiaofang Zhang, Yuming Zhou |
ISSTA 2023 | BehAVExplor: Behavior Diversity Guided Testing for Autonomous Driving Systems | Mingfei Cheng, Yuan Zhou, Xiaofei Xie |
ISSTA 2023 | Beware of the Unexpected: Bimodal Taint Analysis | Yiu Wai Chow, Max Schaefer, Michael Pradel |
ISSTA 2023 | Beyond “Protected” and “Private”: An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts | Yuzhou Fang, Daoyuan Wu, Xiao Yi, Shuai Wang, Yufan Chen, Mengjie Chen, Yang Liu, Lingxiao Jiang |
ISSTA 2023 | Building Critical Testing Scenarios for Autonomous Driving from Real Accidents | Xudong Zhang, Yan Cai |
ISSTA 2023 | CGuard: Scalable and Precise Object Bounds Protection for C | Piyus Kedia, Rahul Purandare, Udit Kumar Agarwal, Rishabh |
ISSTA 2023 | CILIATE: Towards Fairer Class-Based Incremental Learning by Dataset and Training Refinement | Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Shiwei Wang |
ISSTA 2023 | CODEP: Grammatical Seq2Seq Model for General-Purpose Code Generation | Yihong Dong, Ge Li, Zhi Jin |
ISSTA 2023 | COME: Commit Message Generation with Modification Embedding | Yichen He, Liran Wang, Kaiyi Wang, Yupeng Zhang, Hang Zhang, Zhoujun Li |
ISSTA 2023 | CONCORD: Clone-Aware Contrastive Learning for Source Code | Yangruibo Ding, Saikat Chakraborty, Luca Buratti, Saurabh Pujar, Alessandro Morari, Gail Kaiser, Baishakhi Ray |
ISSTA 2023 | Catamaran: Low-Overhead Memory Safety Enforcement via Parallel Acceleration | Yiyu Zhang, Tianyi Liu, Zewen Sun, Zhe Chen, Xuandong Li, Zhiqiang Zuo |
ISSTA 2023 | CodeGrid: A Grid Representation of Code | Abdoul Kader Kaboré, Earl T. Barr, Jacques Klein, Tegawendé F. Bissyandé |
ISSTA 2023 | Concept-Based Automated Grading of CS-1 Programming Assignments | Zhiyu Fan, Shin Hwei Tan, Abhik Roychoudhury |
ISSTA 2023 | ConfFix: Repairing Configuration Compatibility Issues in Android Apps | Huaxun Huang, Chi Xu, Ming Wen, Yepang Liu, Shing-Chi Cheung |
ISSTA 2023 | CoopHance: Cooperative Enhancement for Robustness of Deep Learning Systems | Quan Zhang, Yongqiang Tian, Yifeng Ding, Shanshan Li, Chengnian Sun, Yu Jiang, Jiaguang Sun |
ISSTA 2023 | CydiOS: A Model-Based Testing Framework for iOS Apps | Shuohan Wu, Jianfeng Li, Hao Zhou, Yongsheng Fang, Kaifa ZHAO, Haoyu Wang, Chenxiong Qian, Xiapu Luo |
ISSTA 2023 | DDLDroid: Efficiently Detecting Data Loss Issues in Android Apps | Yuhao Zhou, Wei Song |
ISSTA 2023 | Data Constraint Mining for Automatic Reconciliation Scripts Generation | Tianxiao Wang, Chen Zhi, Xiaoqun Zhou, Jinjie Wu, Jianwei Yin, Shuiguang Deng |
ISSTA 2023 | DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi Protocols | Queping Kong, Jiachi Chen, Yanlin Wang, Zigui Jiang, Zibin Zheng |
ISSTA 2023 | DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity | Zhuo Chen, Jie Liu, Yubo Hu, Lei Wu, Yajin Zhou, Yiling He, Xianhao Liao, Ke Wang, Jinku Li, Zhan Qin |
ISSTA 2023 | DeepAtash: Focused Test Generation for Deep Learning Systems | Tahereh Zohdinasab, Vincenzo Riccio, Paolo Tonella |
ISSTA 2023 | Definition and Detection of Defects in NFT Smart Contracts | Shuo Yang, Jiachi Chen, Zibin Zheng |
ISSTA 2023 | Dependency-Aware Metamorphic Testing of Datalog Engines | Muhammad Numair Mansur, Valentin Wüstholz, Maria Christakis |
ISSTA 2023 | Detecting Condition-Related Bugs with Control Flow Graph Neural Network | Jian Zhang, Xu Wang, Hongyu Zhang, Hailong Sun, Xudong Liu, Chunming Hu, Yang Liu |
ISSTA 2023 | Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing | Mingxi Ye, Yuhong Nan, Zibin Zheng, Dongpeng Wu, Huizhong Li |
ISSTA 2023 | Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis | Kai Cheng, Yaowen Zheng, Tao Liu, Le Guan, Peng Liu, Hong Li, Hongsong Zhu, Kejiang Ye, Limin Sun |
ISSTA 2023 | DyCL: Dynamic Neural Network Compilation Via Program Rewriting and Graph Optimization | Simin Chen, Shiyi Wei, Cong Liu, Wei Yang |
ISSTA 2023 | Enhancing REST API Testing with NLP Techniques | Myeongsoo Kim, Davide Corradini, Saurabh Sinha, Alessandro Orso, Michele Pasqua, Rachel Tzoref-Brill, Mariano Ceccato |
ISSTA 2023 | Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries | Ningyu He, Zhehao Zhao, Jikai Wang, Yubin Hu, Shengjian (Daniel) Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, Yao Guo |
ISSTA 2023 | Exploring Missed Optimizations in WebAssembly Optimizers | Zhibo Liu, Dongwei Xiao, Li Zongjie, Shuai Wang, Wei Meng |
ISSTA 2023 | Extracting Inline Tests from Unit Tests | Yu Liu, Pengyu Nie, Anna Guo, Milos Gligoric, Owolabi Legunsen |
ISSTA 2023 | FairRec: Fairness Testing for Deep Recommender Systems | Huizhong Guo, Jinfeng Li, Jingyi Wang, Xiangyu Liu, Dongxia Wang, Zehong Hu, Rong Zhang, Hui Xue |
ISSTA 2023 | Finding Short Slow Inputs Faster with Grammar-Based Search | Ziyad Alsaeed, Michal Young |
ISSTA 2023 | Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree | Tiancheng Hu, Zijing Xu, Yilin Fang, Yueming Wu, Bin Yuan, Deqing Zou, Hai Jin |
ISSTA 2023 | Fuzzing Deep Learning Compilers with HirGen | Haoyang Ma, Qingchao Shen, Yongqiang Tian, Junjie Chen, Shing-Chi Cheung |
ISSTA 2023 | Fuzzing Embedded Systems using Debug Interfaces | Max Eisele, Daniel Ebert, Christopher Huth, Andreas Zeller |
ISSTA 2023 | GDsmith: Detecting Bugs in Cypher Graph Database Engines | Ziyue Hua, Wei Lin, Luyao Ren, Zongyang Li, Lu Zhang, Wenpin Jiao, Tao Xie |
ISSTA 2023 | GPUHarbor: Testing GPU Memory Consistency at Large (Experience Paper) | Reese Levine, Mingun Cho, Devon McKee, Andrew Quinn, Tyler Sorensen |
ISSTA 2023 | GenCoG: A DSL-Based Approach to Generating Computation Graphs for TVM Testing | Zihan Wang, Pengbo Nie, Xinyuan Miao, Yuting Chen, Chengcheng Wan, Lei Bu, Jianjun Zhao |
ISSTA 2023 | GrayC: Greybox Fuzzing of Compilers and Analysers for C | Karine Even-Mendoza, Arindam Sharma, Alastair F. Donaldson, Cristian Cadar |
ISSTA 2023 | Green Fuzzer Benchmarking | Jiradet Ounjai, Valentin Wüstholz, Maria Christakis |
ISSTA 2023 | Green Fuzzing: A Saturation-Based Stopping Criterion using Vulnerability Prediction | Stephan Lipp, Daniel Elsner, Severin Kacianka, Alexander Pretschner, Marcel Böhme, Sebastian Banescu |
ISSTA 2023 | Guided Retraining to Enhance the Detection of Difficult Android Malware | Nadia Daoudi, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein |
ISSTA 2023 | Guiding Greybox Fuzzing with Mutation Testing | Vasudev Vikram, Isabella Laybourn, Ao Li, Nicole Nair, Kelton OBrien, Rafaello Sanna, Rohan Padhye |
ISSTA 2023 | How Effective Are Neural Networks for Fixing Security Vulnerabilities | Yi Wu, Nan Jiang, Hung Viet Pham, Thibaud Lutellier, Jordan Davis, Lin Tan, Petr Babkin, Sameena Shah |
ISSTA 2023 | Hybrid Inlining: A Framework for Compositional and Context-Sensitive Static Analysis | Jiangchao Liu, Jierui Liu, Peng Di, Diyu Wu, Hengjie Zheng, Alex X. Liu, Jingling Xue |
ISSTA 2023 | Icicle: A Re-designed Emulator for Grey-Box Firmware Fuzzing | Michael Chesser, Surya Nepal, Damith C. Ranasinghe |
ISSTA 2023 | Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis | Xiangzhe Xu, Shiwei Feng, Yapeng Ye, Guangyu Shen, Zian Su, Siyuan Cheng, Guanhong Tao, Qingkai Shi, Zhuo Zhang, Xiangyu Zhang |
ISSTA 2023 | Improving Bit-Blasting for Nonlinear Integer Constraints | Fuqi Jia, Rui Han, Pei Huang, Minghao Liu, Feifei Ma, Jian Zhang |
ISSTA 2023 | Improving Spectrum-Based Localization of Multiple Faults by Iterative Test Suite Reduction | Dylan Callaghan, Bernd Fischer |
ISSTA 2023 | In Defense of Simple Techniques for Neural Network Test Case Selection | Shenglin Bao, Chaofeng Sha, Bihuan Chen, Xin Peng, Wenyun Zhao |
ISSTA 2023 | Interpreters for GNN-Based Vulnerability Detection: Are We There Yet? | Yutao Hu, Suyuan Wang, Wenke Li, Junru Peng, Yueming Wu, Deqing Zou, Hai Jin |
ISSTA 2023 | ItyFuzz: Snapshot-Based Fuzzer for Smart Contract | Chaofan Shou, Shangyin Tan, Koushik Sen |
ISSTA 2023 | June: A Type Testability Transformation for Improved ATG Performance | Dan Bruce, David Kelly, Hector Menendez, Earl T. Barr, David Clark |
ISSTA 2023 | Large Language Models Are Zero-Shot Fuzzers: Fuzzing Deep-Learning Libraries via Large Language Models | Yinlin Deng, Chunqiu Steven Xia, Haoran Peng, Chenyuan Yang, Lingming Zhang |
ISSTA 2023 | Latent Imitator: Generating Natural Individual Discriminatory Instances for Black-Box Fairness Testing | Yisong Xiao, Aishan Liu, Li Tianlin, Xianglong Liu |
ISSTA 2023 | LiResolver: License Incompatibility Resolution for Open Source Software | Sihan Xu, Ya Gao, Lingling Fan, Linyu Li, Xiangrui Cai, Zheli Liu |
ISSTA 2023 | Loop Invariant Inference through SMT Solving Enhanced Reinforcement Learning | Shiwen Yu, Ting Wang, Ji Wang |
ISSTA 2023 | ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-Based Systems | Mingyi Zhou, Xiang Gao, Jing Wu, John Grundy, Xiao Chen, Chunyang Chen, Li Li |
ISSTA 2023 | More Precise Regression Test Selection via Reasoning about Semantics-Modifying Changes | Yu Liu, Jiyang Zhang, Pengyu Nie, Milos Gligoric, Owolabi Legunsen |
ISSTA 2023 | NodeRT: Detecting Races in Node.js Applications Practically | Jingyao Zhou, Lei Xu, Gongzheng Lu, Weifeng Zhang, Xiangyu Zhang |
ISSTA 2023 | OCFI: Make Function Entry Identification Hard Again | Chengbin Pang, Tiantai Zhang, Xuelan Xu, Linzhang Wang, Bing Mao |
ISSTA 2023 | Pattern-Based Peephole Optimizations with Java JIT Tests | Zhiqiang Zang, Aditya Thimmaiah, Milos Gligoric |
ISSTA 2023 | PhysCov: Physical Test Coverage for Autonomous Vehicles | Carl Hildebrandt, Meriel von Stein, Sebastian Elbaum |
ISSTA 2023 | Precise and Efficient Patch Presence Test for Android Applications against Code Obfuscation | Zifan Xie, Ming Wen, Haoxiang Jia, Xiaochen Guo, Xiaotong Huang, Deqing Zou, Hai Jin |
ISSTA 2023 | Quantitative Policy Repair for Access Control on the Cloud | William Eiers, Ganesh Sankaran, Tevfik Bultan |
ISSTA 2023 | ROME: Testing Image Captioning Systems via Recursive Object Melting | BoXi Yu, Zhiqing Zhong, Jiaqi Li, Yixing Yang, Shilin He, Pinjia He |
ISSTA 2023 | Rare Path Guided Fuzzing | Seemanta Saha, Laboni Sarker, Md Shafiuzzaman, Chaofan Shou, Albert Li, Ganesh Sankaran, Tevfik Bultan |
ISSTA 2023 | Reducing the Memory Footprint of IFDS-Based Data-Flow Analyses using Fine-Grained Garbage Collection | Dongjie He, Yujiang Gui, Yaoqing Gao, Jingling Xue |
ISSTA 2023 | RefBERT: A Two-Stage Pre-trained Framework for Automatic Rename Refactoring | Hao Liu, Yanlin Wang, Zhao Wei, Yong Xu, Juhong Wang, Hui Li, Rongrong Ji |
ISSTA 2023 | SBDT: Search-Based Differential Testing of Certificate Parsers in SSL/TLS Implementations | Chu Chen, Pinghong Ren, Zhenhua Duan, Cong Tian, Xu Lu, Bin Yu |
ISSTA 2023 | Security Checking of Trigger-Action-Programming Smart Home Integrations | Lei Bu, Qiuping Zhang, Suwan Li, Jinglin Dai, Guangdong Bai, Kai Chen, Xuandong Li |
ISSTA 2023 | Semantic-Based Neural Network Repair | Richard Schumi, Jun Sun |
ISSTA 2023 | Silent Compiler Bug De-duplication via Three-Dimensional Analysis | Chen Yang, Junjie Chen, Xingyu Fan, Jiajun Jiang, Jun Sun |
ISSTA 2023 | Simulation-Based Validation for Autonomous Driving Systems | Changwen Li, Joseph Sifakis, Qiang Wang, Rongjie Yan, Jian Zhang |
ISSTA 2023 | SlipCover: Near Zero-Overhead Code Coverage for Python | Juan Altmayer Pizzorno, Emery D. Berger |
ISSTA 2023 | SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis | Zeqin Liao, Sicheng Hao, Yuhong Nan, Zibin Zheng |
ISSTA 2023 | Splendor: Static Detection of Stored XSS in Modern Web Applications | He Su, Feng Li, Lili Xu, Wenbo Hu, Yujie Sun, Qing Sun, Huina Chao, Wei Huo |
ISSTA 2023 | Synthesizing Speech Test Cases with Text-to-Speech? An Empirical Study on the False Alarms in Automated Speech Recognition Testing | Julia Kaiwen Lau, Kelvin Kai Wen Kong, Julian Hao Yong, Per Hoong Tan, Zhou Yang, Zi Qian Yong, Joshua Chern Wey Low, Chun Yong Chong, Mei Kuan Lim, David Lo |
ISSTA 2023 | Systematic Testing of the Data-Poisoning Robustness of KNN | Yannan Li, Jingbo Wang, Chao Wang |
ISSTA 2023 | Systematically Producing Test Orders to Detect Order-Dependent Flaky Tests | Chengpeng Li, M. Mahdi Khosravi, Wing Lam, August Shi |
ISSTA 2023 | Tai-e: A Developer-Friendly Static Analysis Framework for Java by Harnessing the Good Designs of Classics | Tian Tan, Yue Li |
ISSTA 2023 | Testing Automated Driving Systems by Breaking Many Laws Efficiently | Xiaodong Zhang, Zhao Wei, Yang Sun, Jun Sun, Yulong Shen, Xuewen Dong, Zijiang Yang |
ISSTA 2023 | Testing Graph Database Engines via Query Partitioning | Matteo Kamm, Manuel Rigger, Chengyu Zhang, Zhendong Su |
ISSTA 2023 | Testing the Compiler for a New-Born Programming Language: An Industrial Case Study (Experience Paper) | Yingquan Zhao, Junjie Chen, Ruifeng Fu, Haojie Ye, Zan Wang |
ISSTA 2023 | That’s a Tough Call: Studying the Challenges of Call Graph Construction for WebAssembly | Daniel Lehmann, Michelle Thalakottur, Frank Tip, Michael Pradel |
ISSTA 2023 | Third-Party Library Dependency for Large-Scale SCA in the C/C++ Ecosystem: How Far Are We? | Ling Jiang, Hengchen Yuan, Qiyi Tang, Sen Nie, Shi Wu, Yuqun Zhang |
ISSTA 2023 | To Kill a Mutant: An Empirical Study of Mutation Testing Kills | Hang Du, Vijay Krishna Palepu, James Jones |
ISSTA 2023 | Toward Automated Detecting Unanticipated Price Feed in Smart Contract | Yifan Mo, Jiachi Chen, Yanlin Wang, Zibin Zheng |
ISSTA 2023 | Towards Efficient Fine-Tuning of Pre-trained Code Models: An Experimental Study and Beyond | Ensheng Shi, Yanlin Wang, Hongyu Zhang, Lun Du, Shi Han, Dongmei Zhang, Hongbin Sun |
ISSTA 2023 | Towards More Realistic Evaluation for Neural Test Oracle Generation | Zhongxin Liu, Kui Liu, Xin Xia, Xiaohu Yang |
ISSTA 2023 | Transforming Test Suites into Croissants | Yang Chen, Alperen Yildiz, Darko Marinov, Reyhaneh Jabbarvand |
ISSTA 2023 | Type Batched Program Reduction | Golnaz Gharachorlu, Nick Sumner |
ISSTA 2023 | Understanding Breaking Changes in the Wild | Dhanushka Jayasuriya, Valerio Terragni, Jens Dietrich, Samuel Ou, Kelly Blincoe |
ISSTA 2023 | Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper) | XuNie , Ningke Li, Kailong Wang, Shangguang Wang, Xiapu Luo, Haoyu Wang |
ISSTA 2023 | Validating Multimedia Content Moderation Software via Semantic Fusion | Wenxuan Wang, Jingyuan Huang, Chang Chen, Jiazhen Gu, Jianping Zhang, Weibin Wu, Pinjia He, Michael Lyu |
ISSTA 2023 | Vectorizing Program Ingredients for Better JVM Testing | Tianchang Gao, Junjie Chen, Yingquan Zhao, Yuqun Zhang, Lingming Zhang |
ISSTA 2023 | Virtual Reality (VR) Automated Testing in the Wild: A Case Study on Unity-Based VR Applications | Dhia Elhaq Rzig, Nafees Iqbal, Isabella Attisano, Xue Qin, Foyzul Hassan |
ISSTA 2023 | What You See Is What You Get? It Is Not the Case! Detecting Misleading Icons for Mobile Applications | Linlin Li, Ruifeng Wang, Xian Zhan, Ying Wang, Cuiyun Gao, Sinan Wang, Yepang Liu |
ISSTA 2023 | Who Judges the Judge: An Empirical Study on Online Judge Tests | Kaibo Liu, Yudong Han, Jie M. Zhang, Zhenpeng Chen, Federica Sarro, Mark Harman, Gang Huang, Yun Ma |
ISSTA 2023 | iSyn: Semi-automated Smart Contract Synthesis from Legal Financial Agreements | Pengcheng Fang, Zhenhua Zou, Xusheng Xiao, Zhuotao Liu |
ISSTA 2023 | ωTest: WebView-Oriented Testing for Android Applications | Jiajun Hu, Lili Wei, Yepang Liu, Shing-Chi Cheung |
ICSE 2022 | "Did You Miss My Comment or What?" Understanding Toxicity in Open Source Discussions | Courtney Miller, Sophie Cohen, Daniel Klug, Bogdan Vasilescu, Christian Kästner |
ICSE 2022 | "This Is Damn Slick!" Estimating the Impact of Tweets on Open Source Project Popularity and New Contributors | Hongbo Fang, Hemank Lamba, Jim Herbsleb, Bogdan Vasilescu |
ICSE 2022 | A Grounded Theory Based Approach to Characterize Software Attack Surfaces | sara moshtari, Ahmet Okutan, Mehdi Mirakhorli |
ICSE 2022 | A Grounded Theory of Coordination in Remote-First and Hybrid Software Teams | Ronnie de Souza Santos, Paul Ralph |
ICSE 2022 | A Scalable t-wise Coverage Estimator | Eduard Baranov, Sourav Chakraborty, Axel Legay, Kuldeep S. Meel, N. V. Vinodchandran |
ICSE 2022 | A Universal Data Augmentation Approach for Fault Localization | Huan Xie, Yan Lei, Meng Yan, Yue Yu, Xin Xia, Xiaoguang Mao |
ICSE 2022 | ARCLIN: Automated API Mention Resolution for Unformatted Texts | Yintong Huo, Yuxin Su, Hongming Zhang, Michael Lyu |
ICSE 2022 | AST-Trans: Code Summarization with Efficient Tree-Structured Attention | Ze Tang, Xiaoyu Shen, Chuanyi Li, Jidong Ge, Liguo Huang, Zheling Zhu, Bin Luo |
ICSE 2022 | Adaptive Performance Anomaly Detection for Online Service Systems via Pattern Sketching | Zhuangbin Chen, Jinyang Liu, Yuxin Su, Hongyu Zhang, Xiao Ling, Yongqiang Yang, Michael Lyu |
ICSE 2022 | Adaptive Test Selection for Deep Neural Networks | Xinyu Gao, Yang Feng, Yining Yin, Zixi Liu, Zhenyu Chen, Baowen Xu |
ICSE 2022 | An Exploratory Study of Deep Learning Supply Chain | Xin Tan, Kai Gao, Minghui Zhou, Li Zhang |
ICSE 2022 | An Exploratory Study of Productivity in Software Teams | Anastasia Ruvimova, Alexander Lill, Gail Murphy, Elaine Huang, Jan Gugler, Lauren Howe, Thomas Fritz |
ICSE 2022 | Analyzing User Perspectives on Mobile App Privacy at Scale | Preksha Nema, Pauline Anthonysamy, Nina Taft, Sai Teja Peddinti |
ICSE 2022 | Aper: Evolution-Aware Runtime Permission Misuse Detection for Android Apps | Sinan Wang, Yibo Wang, Xian Zhan, Ying Wang, Yepang Liu, Xiapu Luo, Shing-Chi Cheung |
ICSE 2022 | AutoTransform: Automated Code Transformation to Support Modern Code Review Process | Patanamon Thongtanunam, Chanathip Pornprasit, Kla Tantithamthavorn |
ICSE 2022 | Automated Assertion Generation via Information Retrieval and Its Integration with Deep Learning | Hao Yu, Yiling Lou, Ke Sun, Dezhi Ran, Tao Xie, Dan Hao, Ying Li, Ge Li, Qianxiang Wang |
ICSE 2022 | Automated Detection of Password Leakage from Public GitHub Repositories | Runhan Feng, Ziyang Yan, Shiyan Peng, Yuanyuan Zhang |
ICSE 2022 | Automated Handling of Anaphoric Ambiguity in Requirements: A Multi-solution Study | Saad Ezzini, Sallam Abualhaija, Chetan Arora, Mehrdad Sabetzadeh |
ICSE 2022 | Automated Patching for Unreproducible Builds | Zhilei Ren, Shiwei Sun, Jifeng Xuan, Xiaochen Li, Zhide Zhou, He Jiang |
ICSE 2022 | Automated Testing of Software that Uses Machine Learning APIs | Chengcheng Wan, Shicheng Liu, Sophie Xie, Yifan Liu, Henry Hoffmann, Michael Maire, Shan Lu |
ICSE 2022 | Automatic Detection of Performance Bugs in Database Systems using Equivalent Queries | Xinyu Liu, Qi Zhou, Joy Arulraj, Alessandro Orso |
ICSE 2022 | BeDivFuzz: Integrating Behavioral Diversity into Generator-based Fuzzing | Hoang Lam Nguyen, Lars Grunske |
ICSE 2022 | Big Data = Big Insights? Operationalizing Brooks’ Law in a Massive GitHub Data Set | Christoph Gote, Pavlin Mavrodiev, Frank Schweitzer, Ingo Scholtes |
ICSE 2022 | Bots for Pull Requests: The Good, the Bad, and the Promising | Mairieli Wessel, Ahmad Abdellatif, Igor Wiese, Tayana Conte, Emad Shihab, Marco Gerosa, Igor Steinmacher |
ICSE 2022 | Bridging Pre-trained Models and Downstream Tasks for Source Code Understanding | Deze Wang, Zhouyang Jia, Shanshan Li, Yue Yu, Yun Xiong, Wei Dong, Liao Xiangke |
ICSE 2022 | BugListener: Identifying and Synthesizing Bug Reports from Collaborative Live Chats | Lin Shi, Fangwen Mu, YuMin Zhang, Ye Yang, Junjie Chen, Xiao Chen, Hanzhi Jiang, Ziyou Jiang, Qing Wang |
ICSE 2022 | BuildSheriff: Change-Aware Test Failure Triage for Continuous Integration Builds | Chen Zhang, Bihuan Chen, Xin Peng, Wenyun Zhao |
ICSE 2022 | CLEAR: Contrastive Learning for API Recommendation | Moshi Wei, Nima Shiri Harzevili, Yuchao Huang, Junjie Wang, Song Wang |
ICSE 2022 | CONFETTI: Amplifying Concolic Guidance for Fuzzers | James Kukucka, Luís Pina, Paul Ammann, Jonathan Bell |
ICSE 2022 | Causality in Configurable Software Systems | Clemens Dubslaff, Kallistos Weis, Christel Baier, Sven Apel |
ICSE 2022 | Causality-Based Neural Network Repair | Bing Sun, Jun Sun, Long H. Pham, Jie Shi |
ICSE 2022 | Change Is the Only Constant: Dynamic Updates for Workflows | Daniel Sokolowski, Pascal Weisenburger, Guido Salvaneschi |
ICSE 2022 | Characterizing and Detecting Bugs in WeChat Mini-Programs | Tao Wang, Qingxin Xu, Xiaoning Chang, Wensheng Dou, Jiaxin Zhu, Jinhui Xie, Yuetang Deng, Jianbo Yang, Jiaheng Yang, Jun Wei, Tao Huang |
ICSE 2022 | Code Search based on Context-aware Code Translation | Weisong Sun, Chunrong Fang, Yuchen Chen, Guanhong Tao, Tingxu Han, Quanjun Zhang |
ICSE 2022 | CodeFill: Multi-token Code Completion by Jointly Learning from Structure and Naming Sequences | Maliheh Izadi, Roberta Gismondi, Georgios Gousios |
ICSE 2022 | Collaboration Challenges in Building ML-Enabled Systems: Communication, Documentation, Engineering, and Process | Nadia Nahar, Shurui Zhou, Grace Lewis, Christian Kästner |
ICSE 2022 | Combinatorial Testing of RESTful APIs | Huayao Wu, Lixin Xu, Xintao Niu, Changhai Nie |
ICSE 2022 | Conflict-aware Inference of Python Compatible Runtime Environments with Domain Knowledge Graph | Wei Cheng, XiangRong Zhu, Wei Hu |
ICSE 2022 | Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search | Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino |
ICSE 2022 | Controlled Concurrency Testing via Periodical Scheduling | Cheng Wen, Mengda He, Bohao Wu, Zhiwu Xu, Shengchao Qin |
ICSE 2022 | Cross-Domain Deep Code Search with Few-Shot Learning | Yitian Chai, Hongyu Zhang, Beijun Shen, Xiaodong Gu |
ICSE 2022 | DEAR: A Novel Deep Learning-based Approach for Automated Program Repair | Yi Li, Shaohua Wang, Tien N. Nguyen |
ICSE 2022 | Data-Driven Loop Bound Learning for Termination Analysis | Rongchen Xu, Jianhui Chen, Fei He |
ICSE 2022 | DeFault: Mutual Information-based Crash Triage for Massive Crashes | Xing Zhang, Jiongyi Chen, Chao Feng, Ruilin Li, Wenrui Diao, Kehuan Zhang |
ICSE 2022 | Decomposing Convolutional Neural Networks into Reusable and Replaceable Modules | Rangeet Pan, Hridesh Rajan |
ICSE 2022 | Decomposing Software Verification into Off-the-Shelf Components: An Application to CEGAR | Dirk Beyer, Jan Haltermann, Thomas Lemberger, Heike Wehrheim |
ICSE 2022 | DeepAnalyze: Learning to Localize Crashes at Scale | Manish Shetty, Chetan Bansal, Suman Nath, Sean Bowles, Henry Wang, Ozgur Arman, Siamak Ahari |
ICSE 2022 | DeepDiagnosis: Automatically Diagnosing Faults and Recommending Actionable Fixes in Deep Learning Programs | Mohammad Wardat, Breno Dantas Cruz, Wei Le, Hridesh Rajan |
ICSE 2022 | DeepFD: Automated Fault Diagnosis and Localization for Deep Learning Programs | Jialun Cao, Meiziniu LI, Xiao Chen, Ming Wen, Yongqiang Tian, Bo Wu, Shing-Chi Cheung |
ICSE 2022 | DeepSTL - From English Requirements to Signal Temporal Logic | Jie He, Ezio Bartocci, Dejan Nickovic, Haris Isakovic, Radu Grosu |
ICSE 2022 | DeepStability: A Study of Unstable Numerical Methods and Their Solutions in Deep Learning | Eliska Kloberdanz, Kyle Kloberdanz, Wei Le |
ICSE 2022 | DeepState: Selecting Test Suites to Enhance the Robustness of Recurrent Neural Networks | Zixi Liu, Yang Feng, Yining Yin, Zhenyu Chen |
ICSE 2022 | DeepTraLog: Trace-Log Combined Microservice Anomaly Detection through Graph-based Deep Learning | Chenxi Zhang, Xin Peng, Chaofeng Sha, Ke Zhang, Zhenqing Fu, Xiya Wu, Qingwei Lin, Dongmei Zhang |
ICSE 2022 | Demystifying Android Non-SDK APIs: Measurement and Understanding | Shishuai Yang, Rui Li, Jiongyi Chen, Wenrui Diao, Shanqing Guo |
ICSE 2022 | Demystifying the Dependency Challenge in Kernel Fuzzing | Yu Hao, Hang Zhang, Guoren Li, Xingyun Du, Zhiyun Qian, Ardalan Amiri Sani |
ICSE 2022 | Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem | Chengwei Liu, Sen Chen, Lingling Fan, Bihuan Chen, Yang Liu, Xin Peng |
ICSE 2022 | DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps | Shao Yang, Yuehan Wang, Yuan Yao, Haoyu Wang, Yanfang Ye, Xusheng Xiao |
ICSE 2022 | Detecting False Alarms from Automatic Static Analysis Tools: How Far are We? | Hong Jin Kang, Khai Loong Aw, David Lo |
ICSE 2022 | Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps | Jordan Samhi, Li Li, Tegawendé F. Bissyandé, Jacques Klein |
ICSE 2022 | Discovering Repetitive Code Changes in Python ML Systems | Malinda Dilhara, Ameya Ketkar, Nikhith Sannidhi, Danny Dig |
ICSE 2022 | Diversity-Driven Automated Formal Verification | Emily First, Yuriy Brun |
ICSE 2022 | Domain-Specific Analysis of Mobile App Reviews Using Keyword-Assisted Topic Models | Miroslav Tushev, Fahimeh Ebrahimi, Anas "Nash" Mahmoud |
ICSE 2022 | DrAsync: Identifying and Visualizing Anti-Patterns in Asynchronous JavaScript | Alexi Turcotte, Michael D. Shah, Mark W. Aldrich, Frank Tip |
ICSE 2022 | Dynamic Update for Synthesized GR(1) Controllers | Gal Amram, Shahar Maoz, Itai Segall, Matan Yossef |
ICSE 2022 | EAGLE: Creating Equivalent Graphs to Test Deep Learning Libraries | Jiannan Wang, Thibaud Lutellier, Shangshu Qian, Hung Viet Pham, Lin Tan |
ICSE 2022 | EREBA: Black-box Energy Testing of Adaptive Neural Networks | Mirazul Haque, Yaswanth Yadlapalli, Wei Yang, Cong Liu |
ICSE 2022 | Efficient Online Testing for DNN-Enabled Systems using Surrogate-Assisted and Many-Objective Optimization | Fitash Ul Haq, Donghwan Shin, Lionel Briand |
ICSE 2022 | Eflect: Porting Energy-Aware Applications to Shared Environments | Timur Babakol, Anthony Canino, Yu David Liu |
ICSE 2022 | Evaluating and Improving Neural Program-Smoothing-based Fuzzing | Mingyuan Wu, Ling Jiang, Jiahong Xiang, Yuqun Zhang, Guowei Yang, Huixin Ma, Sen Nie, Shi Wu, Heming Cui, Lingming Zhang |
ICSE 2022 | ExAIS: Executable AI Semantics | Richard Schumi, Jun Sun |
ICSE 2022 | Explanation-Guided Fairness Testing through Genetic Algorithm | Ming Fan, Wenying Wei, Wuxia Jin, Zijiang Yang, Ting Liu |
ICSE 2022 | Exploiting Input Sanitization for Regex Denial of Service | Efe Barlas, Xin Du, James C. Davis |
ICSE 2022 | FADATest: Fast and Adaptive Performance Regression Testing of Dynamic Binary Translation Systems | Jin Wu, Jian Dong, Ruili Fang, Wen Zhang, Wenwen Wang, Decheng Zuo |
ICSE 2022 | FIRA: Fine-Grained Graph-Based Code Change Representation for Automated Commit Message Generation | Jinhao Dong, Yiling Lou, Qihao Zhu, Zeyu Sun, Zhilin Li, Wenjie Zhang, Dan Hao |
ICSE 2022 | FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons | Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Qian Wang |
ICSE 2022 | Fairness-aware Configuration of Machine Learning Libraries | Saeid Tizpaz-Niari, Ashish Kumar, Gang (Gary) Tan, Ashutosh Trivedi |
ICSE 2022 | Fast Changeset-based Bug Localization with BERT | Agnieszka Ciborowska , Kostadin Damevski |
ICSE 2022 | Fast and Precise Application Code Analysis using a Partial Library | Akshay Utture, Jens Palsberg |
ICSE 2022 | Fault Localization via Efficient Probabilistic Modeling of Program Semantics | Muhan Zeng, Yiqian Wu, Zhentao Ye, Yingfei Xiong, Xin Zhang, Lu Zhang |
ICSE 2022 | FlakiMe: Laboratory-Controlled Test Flakiness Impact Assessment | Maxime Cordy, Renaud Rwemalika, Adriano Franci, Mike Papadakis, Mark Harman |
ICSE 2022 | Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source | Anjiang Wei, Yinlin Deng, Chenyuan Yang, Lingming Zhang |
ICSE 2022 | Fuzzing Class Specifications | Facundo Molina, Marcelo d'Amorim, Nazareno Aguirre |
ICSE 2022 | GIFdroid: Automated Replay of Visual Bug Reports for Android Apps | Sidong Feng, Chunyang Chen |
ICSE 2022 | Garbage Collection Makes Rust Easier to Use: A Randomized Controlled Trial of the Bronze Garbage Collector | Michael Coblenz, Michelle Mazurek, Michael Hicks |
ICSE 2022 | Generating and Visualizing Trace Link Explanations | Yalin Liu, Jinfeng Lin, Oghenemaro Anuyah, Ronald Metoyer, Jane Cleland-Huang |
ICSE 2022 | GitHub Sponsors: Exploring a New Way to Contribute to Open Source | Naomichi Shimada, Tao Xiao, Hideaki Hata, Christoph Treude, Kenichi Matsumoto |
ICSE 2022 | GraphFuzz: Library API Fuzzing with Lifetime-aware Dataflow Graphs | Harrison Green, Thanassis Avgerinos |
ICSE 2022 | Green AI: Do Deep Learning Frameworks Have Different Costs? | Stefanos Georgiou, Maria Kechagia, Tushar Sharma, Federica Sarro, Ying Zou |
ICSE 2022 | Guidelines for Assessing the Accuracy of Log Message Template Identification Techniques | Zanis Ali Khan, Donghwan Shin, Domenico Bianculli, Lionel Briand |
ICSE 2022 | Hashing It Out: A Survey of Programmers’ Cannabis Usage, Perception, and Motivation | Madeline Endres, Kevin Boehnke, Westley Weimer |
ICSE 2022 | Hiding Critical Program Components via Ambiguous Translation | Chijung Jung, Doowon Kim, An Chen, Weihang Wang, Yunhui Zheng, Kyu Hyung Lee, Yonghwi Kwon |
ICSE 2022 | History-Driven Test Program Synthesis for JVM Testing | Yingquan Zhao, Zan Wang, Junjie Chen, Mengdi Liu, Mingyuan Wu, Yuqun Zhang, Lingming Zhang |
ICSE 2022 | If a Human Can See It, So Should Your System: Reliability Requirements for Machine Vision Components | Boyue Caroline Hu, Lina Marsso, Krzysztof Czarnecki, Rick Salay, Huakun Shen, Marsha Chechik |
ICSE 2022 | Imperative versus Declarative Collection Processing: An RCT on the Understandability of Traditional Loops versus the Stream API in Java | Nils Mehlhorn, Stefan Hanenberg |
ICSE 2022 | Improving Fault Localization and Program Repair with Deep Semantic Features and Transferred Knowledge | Xiangxin Meng, Xu Wang, Hongyu Zhang, Hailong Sun, Xudong Liu |
ICSE 2022 | Improving Machine Translation Systems via Isotopic Replacement | Zeyu Sun, Jie M. Zhang, Yingfei Xiong, Mark Harman, Mike Papadakis, Lu Zhang |
ICSE 2022 | Inference and Test Generation Using Program Invariants in Chemical Reaction Networks | Michael C. Gerten, Alexis L. Marsh, James I. Lathrop, Myra Cohen, Andrew S. Miner, Titus H. Klinge |
ICSE 2022 | Inferring And Applying Type Changes | Ameya Ketkar, Oleg Smirnov, Nikolaos Tsantalis, Danny Dig, Timofey Bryksin |
ICSE 2022 | Jigsaw: Large Language Models meet Program Synthesis | Naman Jain, Skanda Vaidyanath, Arun Iyer, Nagarajan Natarajan, Suresh Parthasarathy, Sriram Rajamani, Rahul Sharma |
ICSE 2022 | JuCify: A Step Towards Android Code Unification for Enhanced Static Analysis | Jordan Samhi, Jun Gao, Nadia Daoudi, Pierre Graux, Henri Hoyez, Xiaoyu Sun, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein |
ICSE 2022 | Knowledge-Based Environment Dependency Inference for Python Programs | Hongjie Ye, Wei Chen, Wensheng Dou, Guoquan Wu, Jun Wei |
ICSE 2022 | Large-scale Security Measurements on the Android Firmware Ecosystem | Qinsheng Hou, Wenrui Diao, Yanhao Wang, Xiaofeng Liu, Song Liu, Lingyun Ying, Shanqing Guo, Yuanzhi Li, Meining Nie, Haixin Duan |
ICSE 2022 | Learning Probabilistic Models for Static Analysis Alarms | Hyunsu Kim, Mukund Raghothaman, Kihong Heo |
ICSE 2022 | Learning and Programming Challenges of Rust: A Mixed-Methods Study | Shuofei Zhu, Ziyi Zhang, Boqin Qin, Aiping Xiong, Linhai Song |
ICSE 2022 | Learning to Recommend Method Names with Global Context | Fang Liu, Ge Li, Zhiyi Fu, Shuai Lu, Yiyang Hao, Zhi Jin |
ICSE 2022 | Learning to Reduce False Positives in Analytic Bug Detectors | Anant Kharkar, Roshanak Zilouchian Moghaddam, Matthew Jin, Xiaoyu Liu, Xin Shi, Colin Clement, Neel Sundaresan |
ICSE 2022 | Less is More: Supporting Developers in Vulnerability Detection during Code Review | Larissa Braz, Christian Aeberhard, Gül Calikli, Alberto Bacchelli |
ICSE 2022 | Lessons from Eight Years of Operational Data from a Continuous Integration Service: A Case Study of CircleCI | Keheliya Gallaba, Maxime Lamothe, Shane McIntosh |
ICSE 2022 | Linear-time Temporal Logic guided Greybox Fuzzing | Ruijie Meng, Zhen Dong, Jialin Li, Ivan Beschastnikh, Abhik Roychoudhury |
ICSE 2022 | Log-based Anomaly Detection with Deep Learning: How Far Are We | Van-Hoang Le, Hongyu Zhang |
ICSE 2022 | MOREST: Model-based RESTful API Testing with Execution Feedback | Yi Liu, Yuekang Li, Gelei Deng, Yang Liu, Ruiyuan Wan, Runchao Wu, Dandan Ji, Shiheng Xu, Minli Bao |
ICSE 2022 | MVD: Memory-related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks | Sicong Cao, Xiaobing Sun, Lili Bo, Rongxin Wu, Bin Li, Chuanqi Tao |
ICSE 2022 | Manas: Mining Software Repositories to Assist AutoML | Giang Nguyen, Md Johirul Islam, Rangeet Pan, Hridesh Rajan |
ICSE 2022 | Modeling Review History for Reviewer Recommendation: A Hypergraph Approach | Guoping Rong, YiFan Zhang, Lanxin Yang, Fuli Zhang, Hongyu Kuang, He Zhang |
ICSE 2022 | Modx: Binary Level Partial Imported Third-Party Library Detection through Program Modularization and Semantic Matching | Can Yang, Zhengzi Xu, Hongxu Chen, Yang Liu, Xiaorui Gong, Baoxu Liu |
ICSE 2022 | Muffin: Testing Deep Learning Libraries via Neural Architecture Fuzzing | Jiazhen Gu, Xuchuan Luo, Yangfan Zhou, Xin Wang |
ICSE 2022 | Multi-Intention-Aware Configuration Selection for Performance Tuning | Haochen He, Zhouyang Jia, Shanshan Li, Yue Yu, Chenglong Zhou, Qing Liao, Ji Wang, Liao Xiangke |
ICSE 2022 | Multilingual training for Software Engineering | Toufique Ahmed, Prem Devanbu |
ICSE 2022 | NPEX: Repairing Java Null Pointer Exceptions without Tests | Junhee Lee, Seongjoon Hong, Hakjoo Oh |
ICSE 2022 | Nalin: Learning from Runtime Behavior to Find Name-Value Inconsistencies | Jibesh Patra, Michael Pradel |
ICSE 2022 | Natural Attack for Pre-trained Models of Code | Zhou Yang, Jieke Shi, Junda He, David Lo |
ICSE 2022 | Nessie: Automatically Testing JavaScript APIs with Asynchronous Callbacks | Ellen Arteca, Sebastian Harner, Michael Pradel, Frank Tip |
ICSE 2022 | Neural Program Repair using Execution-based Backpropagation | He Ye, Matias Martinez, Martin Monperrus |
ICSE 2022 | NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification | haibin zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, Jinyin Chen |
ICSE 2022 | Nufix: Escape From NuGet Dependency Maze | Zhenming Li, Ying Wang, Zeqi Lin, Shing-Chi Cheung, Jian-Guang Lou |
ICSE 2022 | OJXPerf: Featherlight Object Replica Detection for Java Programs | Bolun Li, Hao Xu, Qidong Zhao, Pengfei Su, Milind Chabbi, Shuyin Jiao, Xu Liu |
ICSE 2022 | On Debugging the Performance of Configurable Software Systems: Developer Needs and Tailored Tool Support | Miguel Velez, Pooyan Jamshidi, Norbert Siegmund, Sven Apel, Christian Kästner |
ICSE 2022 | On the Benefits and Limits of Incremental Build of Software Configurations: An Exploratory Study | Georges Aaron RANDRIANAINA, Xhevahire Tërnava, Djamel Eddine Khelladi, Mathieu Acher |
ICSE 2022 | On the Evaluation of Neural Code Summarization | Ensheng Shi, Yanlin Wang, Lun Du, Junjie Chen, Shi Han, Hongyu Zhang, Dongmei Zhang, Hongbin Sun |
ICSE 2022 | On the Importance of Building High-quality Training Datasets for Neural Code Search | Zhensu Sun, Li Li, Yan Liu, Xiaoning Du, Li Li |
ICSE 2022 | On the Reliability of Coverage-Based Fuzzer Benchmarking | Marcel Böhme, Laszlo Szekeres, Jonathan Metzman |
ICSE 2022 | One Fuzzing Strategy to Rule Them All | Mingyuan Wu, Ling Jiang, Jiahong Xiang, Yanwei Huang, Heming Cui, Lingming Zhang, Yuqun Zhang |
ICSE 2022 | Online Summarizing Alerts through Semantic and Behavior Information | ChenJ , Peng Wang, Wei Wang |
ICSE 2022 | PReach: A Heuristic for Probabilistic Reachability to Identify Hard to Reach Statements | Seemanta Saha, Mara Downing, Tegan Brennan, Tevfik Bultan |
ICSE 2022 | PUS: A Fast and Highly Efficient Solver for Inclusion-based Pointer Analysis | Peiming Liu, Yanze Li, Bradley Swain, Jeff Huang |
ICSE 2022 | Path Transitions Tell More: Optimizing Fuzzing Schedules via Runtime Program States | Kunpeng Zhang, Xi Xiao, Xiaogang Zhu, Ruoxi Sun, Minhui (Jason) Xue, Sheng Wen |
ICSE 2022 | PerfSig: Extracting Performance Bug Signatures via Multi-modality Causal Analysis | Jingzhu He, Yuhang Lin, Xiaohui Gu, Chin-Chia Michael Yeh, Zhongfang Zhuang |
ICSE 2022 | Practical Automated Detection of Malicious npm Packages | Adriana Sejfia, Max Schaefer |
ICSE 2022 | Practitioners’ Expectations on Automated Code Comment Generation | Xing Hu, Xin Xia, David Lo, Zhiyuan Wan, Qiuyuan Chen, Thomas Zimmermann |
ICSE 2022 | Precise Divide-By-Zero Detection with Affirmative Evidence | Yiyuan Guo, Jinguo Zhou, Peisen Yao, Qingkai Shi, Charles Zhang |
ICSE 2022 | Preempting Flaky Tests via Non-Idempotent-Outcome Tests | Anjiang Wei, Pu Yi, Zhengxi Li, Tao Xie, Darko Marinov, Wing Lam |
ICSE 2022 | Prioritizing Mutants to Guide Mutation Testing | Samuel Kaufman, Ryan Featherman, Justin Alvin, Bob Kurtz, Paul Ammann, René Just |
ICSE 2022 | Promal: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning | Changlin Liu, Hanlin Wang, Tianming Liu, Diandian Gu, Yun Ma, Haoyu Wang, Xusheng Xiao |
ICSE 2022 | PropR: Property-Based Automatic Program Repair | Matthías Páll Gissurarson, Leonhard Applis, Annibale Panichella, Arie van Deursen, Dave Sands |
ICSE 2022 | Push-Button Synthesis of Watch Companions for Android Apps | Cong Li, Yanyan Jiang, Chang Xu |
ICSE 2022 | Quantifying Permissiveness of Access Control Policies | William Eiers, Ganesh Sankaran, Albert Li, Emily O'Mahony, Benjamin Prince, Tevfik Bultan |
ICSE 2022 | R2Z2: Detecting Rendering Regressions in Web Browsers through Differential Fuzz Testing | Suhwan Song, Jaewon Hur, Sunwoo Kim, Philip Rogers, Byoungyoung Lee |
ICSE 2022 | ReMoS: Reducing Defect Inheritance in Transfer Learning via Relevant Model Slicing | Ziqi Zhang, Yuanchun Li, Jindong Wang, Bingyan Liu, Ding Li, Xiangqun Chen, Yao Guo, Yunxin Liu |
ICSE 2022 | Recommending Good First Issues in GitHub OSS Projects | Wenxin Xiao, Hao He, Weiwei Xu, Xin Tan, Jinhao Dong, Minghui Zhou |
ICSE 2022 | Refty: Refinement Types for Valid Deep Learning Models | Yanjie Gao, lizhengxian , Haoxiang Lin, Hongyu Zhang, Ming Wu, Mao Yang |
ICSE 2022 | Repairing Brain-Computer Interfaces with Fault-based Data Acquisition | Cailin Winston, Caleb Winston, Chloe N Winston, Claris Winston, Cleah Winston, Rajesh PN Rao, René Just |
ICSE 2022 | Repairing Order-Dependent Flaky Tests via Test Generation | Chengpeng Li, Chenguang Zhu, Wenxi Wang, August Shi |
ICSE 2022 | Retrieving Data Constraint Implementations Using Fine-Grained Code Patterns | Juan Manuel Florez, Jonathan Perry, Shiyi Wei, Andrian Marcus |
ICSE 2022 | RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation | Zhen Li, Guenevere (Qian) Chen, Chen Chen, Yayi Zou, Shouhuai Xu |
ICSE 2022 | Rotten Apples Spoil the Bunch: An Anatomy of Google Play Malware | Michael Cao, Khaled Ahmed, Julia Rubin |
ICSE 2022 | SPT-Code: Sequence-to-Sequence Pre-Training for Learning Representation of Source Code | Changan Niu, Chuanyi Li, Vincent Ng, Jidong Ge, Liguo Huang, Bin Luo |
ICSE 2022 | SZZ for Vulnerability: Automatic Identification of Version Ranges Affected by CVE Vulnerabilities | Lingfeng Bao , Xin Xia, Ahmed E. Hassan, Xiaohu Yang |
ICSE 2022 | SapientML: Synthesizing Machine Learning Pipelines by Learning from Human-Written Solutions | Ripon Saha, Akira Ura, Sonal Mahajan, Chenguang Zhu, Linyi Li, Yang Hu, Hiroaki Yoshida, Sarfraz Khurshid, Mukul Prasad |
ICSE 2022 | Search-based Diverse Sampling from Real-world Software Product Lines | Yi Xiang, Han Huang, Yuren Zhou, Sizhe Li, Chuan Luo, Qingwei Lin, Miqing Li, Xiaowei Yang |
ICSE 2022 | Semantic Image Fuzzing of AI Perception Systems | Trey Woodlief, Sebastian Elbaum, Kevin Sullivan |
ICSE 2022 | ShellFusion: Answer Generation for Shell Programming Tasks via Knowledge Fusion | Neng Zhang, Chao Liu, Xin Xia, Christoph Treude, Ying Zou, David Lo, Zibin Zheng |
ICSE 2022 | SnR: Constraint-Based Type Inference for Incomplete Java Code Snippets | Yiwen Dong, Tianxiao Gu, Yongqiang Tian, Chengnian Sun |
ICSE 2022 | Social Science Theories in Software Engineering Research | Tobias Lorey, Paul Ralph, Michael Felderer |
ICSE 2022 | Static Inference Meets Deep Learning: A Hybrid Type Inference Approach for Python | Yun Peng, Cuiyun Gao, Zongjie Li, Bowei Gao, David Lo, Qirun Zhang, Michael Lyu |
ICSE 2022 | Static Stack-Preserving Intra-Procedural Slicing of WebAssembly Binaries | Quentin Stiévenart, David Binkley, Coen De Roover |
ICSE 2022 | Striking a Balance: Pruning False-Positives from Static Call Graphs | Akshay Utture, Shuyang Liu, Christian Gram Kalhauge, Jens Palsberg |
ICSE 2022 | SugarC: Scalable Desugaring of Real-World Preprocessor Usage into Pure C | Zachary Patterson, Zenong Zhang, Brent Pappas, Shiyi Wei, Paul Gazzillo |
ICSE 2022 | SymTuner: Maximizing the Power of Symbolic Execution by Adaptively Tuning External Parameters | Sooyoung Cha, Myungho Lee, Seokhyun Lee, Hakjoo Oh |
ICSE 2022 | TOGA: A Neural Method for Test Oracle Generation | Elizabeth Dinella, Gabriel Ryan, Todd Mytkowicz, Shuvendu K. Lahiri |
ICSE 2022 | Testing Time Limits in Screener Questions for Online Surveys with Programmers | Anastasia Danilova, Stefan Horstmann, Matthew Smith, Alena Naiakshina |
ICSE 2022 | The Art and Practice of Data Science Pipelines: A Comprehensive Study of Data Science Pipelines In Theory, In-The-Small, and In-The-Large | Sumon Biswas, Mohammad Wardat, Hridesh Rajan |
ICSE 2022 | The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software | David Reid, Mahmoud Jahanshahi, Audris Mockus |
ICSE 2022 | Towards Automatically Repairing Compatibility Issues in Published Android Apps | Yanjie Zhao, Li Li, Kui Liu, John Grundy |
ICSE 2022 | Towards Bidirectional Live Programming for Incomplete Programs | Xing Zhang, Zhenjiang Hu |
ICSE 2022 | Towards Boosting Patch Execution On-the-Fly | Samuel Benton, Yuntong Xie, Lan Lu, Mengshi Zhang, Xia Li, Lingming Zhang |
ICSE 2022 | Towards Language-independent Brown Build Detection | Doriane Olewicki, Mathieu Nayrolles, Bram Adams |
ICSE 2022 | Towards Practical Robustness Analysis for DNNs based on PAC-Model Learning | Renjue Li, Pengfei Yang, Cheng-Chao Huang, Youcheng Sun, Bai Xue, Lijun Zhang |
ICSE 2022 | Towards Training Reproducible Deep Learning Models | Boyuan Chen, Mingzhi Wen, Yong Shi, Dayi Lin, Gopi Krishnan Rajbahadur, Zhen Ming (Jack) Jiang |
ICSE 2022 | Training Data Debugging for the Fairness of Machine Learning Software | Yanhui Li, Linghan Meng, Lin Chen, Li Yu, Di Wu, Yuming Zhou, Baowen Xu |
ICSE 2022 | Trust Enhancement Issues in Program Repair | Yannic Noller, Ridwan Salihin Shariffdeen, Xiang Gao, Abhik Roychoudhury |
ICSE 2022 | Type4Py: Practical Deep Similarity Learning-Based Type Inference for Python | Amir Mir, Evaldas Latoskinas, Sebastian Proksch, Georgios Gousios |
ICSE 2022 | Unleashing the Power of Compiler Intermediate Representation to Enhance Neural Program Embeddings | Zongjie Li, Pingchuan Ma, Huaijin Wang, Shuai Wang, Qiyi Tang, Sen Nie, Shi Wu |
ICSE 2022 | Use of Test Doubles in Android Testing: An In-Depth Investigation | Mattia Fazzini, Chase Choi, Juan Manuel Copia, Gabriel Lee, Yoshiki Kakehi, Alessandra Gorla, Alessandro Orso |
ICSE 2022 | Using Deep Learning to Generate Complete Log Statements | Antonio Mastropaolo, Luca Pascarella, Gabriele Bavota |
ICSE 2022 | Using Pre-Trained Models to Boost Code Review Automation | Rosalia Tufano, Simone Masiero, Antonio Mastropaolo, Luca Pascarella, Denys Poshyvanyk, Gabriele Bavota |
ICSE 2022 | Using Reinforcement Learning for Load Testing of Video Games | Rosalia Tufano, Simone Scalabrino, Luca Pascarella, Emad Aghajani, Rocco Oliveto, Gabriele Bavota |
ICSE 2022 | Utilizing Parallelism in Smart Contracts on Decentralized Blockchains by Taming Application-Inherent Conflicts | Péter Garamvölgyi, Yuxi Liu, Dong Zhou, Fan Long, Ming Wu |
ICSE 2022 | VarCLR: Variable Semantic Representation Pre-training via Contrastive Learning | Qibin Chen, Jeremy Lacomis, Edward J. Schwartz, Graham Neubig, Bogdan Vasilescu, Claire Le Goues |
ICSE 2022 | Verification of ORM-based Controllers by Summary Inference | Geetam Chawla, Navneet Aman, Raghavan Komondoor, Ashish Shashikant Bokil, Nilesh Ramesh Kharat |
ICSE 2022 | VulCNN: An Image-inspired Scalable Vulnerability Detection System | Yueming Wu, Deqing Zou, Shihan Dou, Wei Yang, Duo Xu, Hai Jin |
ICSE 2022 | What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code | Yao Wan, Wei Zhao, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin |
ICSE 2022 | What Makes Effective Leadership in Agile Software Development Teams? | Lucas Gren, Paul Ralph |
ICSE 2022 | What Makes a Good Commit Message? | Yingchen Tian, Yuxia Zhang, Klaas-Jan Stol, Lin Jiang, Hui Liu |
ICSE 2022 | What the Fork? Finding Hidden Code Clones in npm | Elizabeth Wyss, Lorenzo De Carli, Drew Davidson |
ICSE 2022 | Where is Your App Frustrating Users? | Yawen Wang, Junjie Wang, Hongyu Zhang, Xuran Ming, Lin Shi, Qing Wang |
ICSE 2022 | WindRanger: A Directed Greybox Fuzzer driven by DeviationBasic Blocks | Zhengjie Du, Yuekang Li, Yang Liu, Bing Mao |
ICSE 2022 | μAFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware | Wenqiang Li, Jiameng Shi, Fengjun Li, Jingqiang Lin, Wei Wang, Le Guan |
FSE 2022 | 23 Shades of Self-Admitted Technical Debt: An Empirical Study on Machine Learning Software | David OBrien, Sumon Biswas, Sayem Mohammad Imtiaz, Rabe Abdalkareem, Emad Shihab, Hridesh Rajan |
FSE 2022 | A Case Study of Implicit Mentoring, Its Prevalence, and Impact in Apache | Zixuan Feng, Amreeta Chatterjee, Anita Sarma, Iftekhar Ahmed |
FSE 2022 | A Retrospective Study of One Decade of Artifact Evaluations | Stefan Winter, Christopher Steven Timperley, Ben Hermann, Jürgen Cito, Jonathan Bell, Michael Hilton, Dirk Beyer |
FSE 2022 | API Recommendation for Machine Learning Libraries: How Far Are We? | Moshi Wei, Yuchao Huang, Junjie Wang, Jiho Shin, Nima Shiri Harzevili, Song Wang |
FSE 2022 | AUGER: Automatically Generating Review Comments with Pre-training Models | Lingwei Li, Li Yang, Huaxi Jiang, Jun Yan, Tiejian Luo, Zihan Hua, Geng Liang, Chun Zuo |
FSE 2022 | AccessiText: Automated Detection of Text Accessibility Issues in Android Apps | Abdulaziz Alshayban, Sam Malek |
FSE 2022 | Accurate Method and Variable Tracking in Commit History | Mehran Jodavi, Nikolaos Tsantalis |
FSE 2022 | Actionable and Interpretable Fault Localization for Recurring Failures in Online Service Systems | Zeyan Li, Nengwen Zhao, Mingjie Li, Xianglin Lu, Lixin Wang, Dongdong Chang, Xiaohui Nie, Li Cao, Wenchi Zhang, Kaixin Sui, Yanhua Wang, Xu Du, Guoqiang Duan, Dan Pei |
FSE 2022 | Adaptive Fairness Improvement Based on Causality Analysis | Mengdi Zhang, Jun Sun |
FSE 2022 | AgileCtrl: A Self-Adaptive Framework for Configuration Tuning | Shu Wang, Henry Hoffmann, Shan Lu |
FSE 2022 | An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns | Xiao Yi, Daoyuan Wu, Lingxiao Jiang, Yuzhou Fang, Kehuan Zhang, Wei Zhang |
FSE 2022 | An Exploratory Study on the Predominant Programming Paradigms in Python Code | Robert Dyer, Jigyasa Chauhan |
FSE 2022 | Are We Building on the Rock? On the Importance of Data Preprocessing for Code Summarization | Lin Shi, Fangwen Mu, Xiao Chen, Song Wang, Junjie Wang, Ye Yang, Ge Li, Xin Xia, Qing Wang |
FSE 2022 | Asynchronous Technical Interviews: Reducing the Effect of Supervised Think-Aloud on Communication Ability | Mahnaz (Mana) Behroozi, Chris Parnin, Chris Brown |
FSE 2022 | AutoPruner: Transformer-Based Call Graph Pruning | Le-Cong Thanh, Hong Jin Kang, Truong Giang Nguyen, Stefanus Agus Haryono, David Lo, Xuan-Bach D. Le, Quyet Thang Huynh |
FSE 2022 | Automated Unearthing of Dangerous Issue Reports | Shengyi Pan, Jiayuan Zhou, Filipe Cogo, Xin Xia, Lingfeng Bao , Xing Hu, Shanping Li, Ahmed E. Hassan |
FSE 2022 | Automatically Deriving JavaScript Static Analyzers from Specifications using Meta-level Static Analysis | Jihyeok Park, Seungmin An, Sukyoung Ryu |
FSE 2022 | Automating Code Review Activities by Large-Scale Pre-training | Zhiyu Li, Shuai Lu, Daya Guo, Nan Duan, Shailesh Jannu, Grant Jenks, Deep Majumder, Jared Green, Alexey Svyatkovskiy, Shengyu Fu, Neel Sundaresan |
FSE 2022 | Avgust: Automating Usage-Based Test Generation from Videos of App Executions | Yixue Zhao, Saghar Talebipour, Kesina Baral, Hyojae Park, Leon Yee, Safwat Ali Khan, Yuriy Brun, Nenad Medvidović, Kevin Moran |
FSE 2022 | CORMS: A GitHub and Gerrit Based Hybrid Code Reviewer Recommendation Approach for Modern Code Review | Pandya Prahar Hemantkumar, Saurabh Tiwari |
FSE 2022 | Classifying Edits to Variability in Source Code | Paul Maximilian Bittner, Christof Tinnes, Alexander Schultheiß, Sören Viegener, Timo Kehrer, Thomas Thüm |
FSE 2022 | Code, Quality, and Process Metrics in Graduated and Retired ASFI Projects | Ştefan Stănciulescu, Likang Yin, Vladimir Filkov |
FSE 2022 | CommentFinder: A Simpler, Faster, More Accurate Code Review Comments Recommendation | Yang Hong, Kla Tantithamthavorn, Patanamon Thongtanunam, Aldeida Aleti |
FSE 2022 | Corporate Dominance in Open Source Ecosystems: A Case Study of OpenStack | Yuxia Zhang, Klaas-Jan Stol, Hui Liu, Minghui Zhou |
FSE 2022 | Correlates of Programmer Efficacy and Their Link to Experience: A Combined EEG and Eye-Tracking Study | Norman Peitek, Annabelle Bergum, Maurice Rekrut, Jonas Mucke, Matthias Nadig, Chris Parnin, Janet Siegmund, Sven Apel |
FSE 2022 | Cross-Device Record and Replay for Android Apps | Cong Li, Yanyan Jiang, Chang Xu |
FSE 2022 | Cross-Language Android Permission Specification | Chaoran Li, Xiao Chen, Ruoxi Sun, Minhui (Jason) Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang |
FSE 2022 | DeJITLeak: Eliminating JIT-Induced Timing Side-Channel Leaks | Qi Qin, JulianAndres JiYang, Fu Song, Taolue Chen, Xinyu Xing |
FSE 2022 | Declarative Smart Contracts | Haoxian Chen, Gerald Whitters, Mohammad Javad Amiri, Yuepeng Wang, Boon Thau Loo |
FSE 2022 | DeepDev-PERF: A Deep Learning-Based Approach for Improving Software Performance | Spandan Garg, Roshanak Zilouchian Moghaddam, Colin Clement, Neel Sundaresan, Chen Wu |
FSE 2022 | Demystifying the Underground Ecosystem of Account Registration Bots | Yuhao Gao, Guoai Xu, Li Li, Xiapu Luo, Chenyu Wang, Yulei Sui |
FSE 2022 | Detecting Non-crashing Functional Bugs in Android Apps via Deep-State Differential Analysis | Jue Wang, Yanyan Jiang, Ting Su, Shaohua Li, Chang Xu, Jian Lu, Zhendong Su |
FSE 2022 | Detecting Simulink Compiler Bugs via Controllable Zombie Blocks Mutation | Shikai Guo, He Jiang, Zhihao Xu, Xiaochen Li, Zhilei Ren, Zhide Zhou, Rong Chen |
FSE 2022 | Diet Code Is Healthy: Simplifying Programs for Pre-trained Models of Code | Zhaowei Zhang, Hongyu Zhang, Beijun Shen, Xiaodong Gu |
FSE 2022 | Do Bugs Lead to Unnaturalness of Source Code? | Yanjie Jiang, Hui Liu, Yuxia Zhang, Weixing Ji, Hao Zhong, Lu Zhang |
FSE 2022 | DynaPyt: A Dynamic Analysis Framework for Python | Aryaz Eghbali, Michael Pradel |
FSE 2022 | Fault Localization to Detect Co-change Fixing Locations | Yi Li, Shaohua Wang, Tien N. Nguyen |
FSE 2022 | First Come First Served: The Impact of File Position on Code Review | Enrico Fregnan, Larissa Braz, Marco D'Ambros, Gül Calikli, Alberto Bacchelli |
FSE 2022 | Fuzzing Deep-Learning Libraries via Automated Relational API Inference | Yinlin Deng, Chenyuan Yang, Anjiang Wei, Lingming Zhang |
FSE 2022 | Generating Realistic Vulnerabilities via Neural Code Editing: An Empirical Study | Yu Nong, Yuzhe Ou, Michael Pradel, Feng Chen, Haipeng Cai |
FSE 2022 | Generic Sensitivity: Customizing Context-Sensitive Pointer Analysis for Generics | Haofeng Li, Jie Lu, Haining Meng, Liqing Cao, Yongheng Huang, Lian Li, Lin Gao |
FSE 2022 | Hierarchical Bayesian Multi-kernel Learning for Integrated Classification and Summarization of App Reviews | Moayad Alshangiti, Weishi Shi, Eduardo Coelho de Lima, Xumin Liu, Qi Yu |
FSE 2022 | How to Better Utilize Code Graphs in Semantic Code Search? | Yucen Shi, Ying Yin, Zhengkui Wang, David Lo, Tao Zhang, Xin Xia, Yuhai Zhao, Bowen Xu |
FSE 2022 | How to Formulate Specific How-To Questions in Software Development? | Mingwei Liu, Xin Peng, Andrian Marcus, Christoph Treude, Jiazhan Xie, Huanjun Xu, Yanjun Yang |
FSE 2022 | Input Invariants | Dominic Steinhöfel, Andreas Zeller |
FSE 2022 | Large-Scale Analysis of Non-Termination Bugs in Real-World OSS Projects | Xiuhan Shi, Xiaofei Xie, Yi Li, Yao Zhang, Sen Chen, Xiaohong Li |
FSE 2022 | Less Training, More Repairing Please: Revisiting Automated Program Repair via Zero-Shot Learning | Chunqiu Steven Xia, Lingming Zhang |
FSE 2022 | Lighting Up Supervised Learning in User Review-Based Code Localization: Dataset and Benchmark | Xinwen Hu, Yu Guo, Jianjie Lu, Zheling Zhu, Chuanyi Li, Jidong Ge, Liguo Huang, Bin Luo |
FSE 2022 | MAAT: A Novel Ensemble Approach to Addressing Fairness and Performance Bugs for Machine Learning Software | Zhenpeng Chen, Jie M. Zhang, Federica Sarro, Mark Harman |
FSE 2022 | MOSAT: Finding Safety Violations of Autonomous Driving Systems using Multi-objective Genetic Algorithm | Haoxiang Tian, Yan Jiang, Guoquan Wu, Jiren Yan, Jun Wei, Wei Chen, Shuo Li, Dan Ye |
FSE 2022 | Making Python Code Idiomatic by Automatic Refactoring Non-idiomatic Python Code with Pythonic Idioms | zejun zhang, Zhenchang Xing, Xin Xia, Xiwei (Sherry) Xu, Liming Zhu |
FSE 2022 | Minerva: Browser API Fuzzing with Dynamic Mod-Ref Analysis | Chijin Zhou, Quan Zhang, Mingzhe Wang, Lihua Guo, Jie Liang, Zhe Liu, Mathias Payer, Yu Jiang |
FSE 2022 | Modus: A Datalog Dialect for Building Container Images | Chris Tomy, Tingmao Wang, Earl T. Barr, Sergey Mechtaev |
FSE 2022 | Multi-Phase Invariant Synthesis | Daniel Riley, Grigory Fedyukovich |
FSE 2022 | NL2Viz: Natural Language to Visualization via Constrained Syntax-Guided Synthesis | Zhengkai Wu, Vu Le, Ashish Tiwari, Sumit Gulwani, Arjun Radhakrishna, Ivan Radiček, Gustavo Soares, Xinyu Wang, Zhenwen Li, Tao Xie |
FSE 2022 | NMTSloth: Understanding and Testing Efficiency Degradation of Neural Machine Translation Systems | Simin Chen, Cong Liu, Mirazul Haque, Zihe Song, Wei Yang |
FSE 2022 | NatGen: Generative Pre-training by “Naturalizing” Source Code | Saikat Chakraborty, Toufique Ahmed, Yangruibo Ding, Prem Devanbu, Baishakhi Ray |
FSE 2022 | NeuDep: Neural Binary Memory Dependence Analysis | Kexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray |
FSE 2022 | Neural Termination Analysis | Mirco Giacobbe, Daniel Kroening, Julian Parsert |
FSE 2022 | No More Fine-Tuning? An Experimental Evaluation of Prompt Tuning in Code Intelligence | Chaozheng Wang, Yuanhang Yang, Cuiyun Gao, Yun Peng, Hongyu Zhang, Michael Lyu |
FSE 2022 | On the Vulnerability Proneness of Multilingual Code | Wen Li, Li Li, Haipeng Cai |
FSE 2022 | On-the-Fly Syntax Highlighting using Neural Networks | Marco Edoardo Palma, Pasquale Salza, Harald Gall |
FSE 2022 | Online Testing of RESTful APIs: Promises and Challenges | Alberto Martin-Lopez, Sergio Segura, Antonio Ruiz-Cortés |
FSE 2022 | PaReco: Patched Clones and Missed Patches among the Divergent Variants of a Software Family | Poedjadevie Kadjel Ramkisoen, John Businge, Brent van Bladel, Alexandre Decan , Serge Demeyer, Coen De Roover, Foutse Khomh |
FSE 2022 | Pair Programming Conversations with Agents vs. Developers: Challenges and Opportunities for SE Community | Peter Robe, Sandeep Kuttal, Jake AuBuchon, Jacob Hart |
FSE 2022 | Parasol: Efficient Parallel Synthesis of Large Model Spaces | Clay Stevens, Hamid Bagheri |
FSE 2022 | Peahen: Fast and Precise Static Deadlock Detection via Context Reduction | Yuandao Cai, Chengfeng Ye, Qingkai Shi, Charles Zhang |
FSE 2022 | Perfect Is the Enemy of Test Oracle | Ali Reza Ibrahimzada, Yigit Varli, Dilara Tekinoglu, Reyhaneh Jabbarvand |
FSE 2022 | Program Merge Conflict Resolution via Neural Transformers | Alexey Svyatkovskiy, Sarah Fakhoury, Negar Ghorbani, Todd Mytkowicz, Elizabeth Dinella, Christian Bird, Jinu Jang, Neel Sundaresan, Shuvendu K. Lahiri |
FSE 2022 | Psychologically-Inspired, Unsupervised Inference of Perceptual Groups of GUI Widgets from GUI Images | Mulong Xie, Zhenchang Xing, Sidong Feng, Xiwei (Sherry) Xu, Liming Zhu, Chunyang Chen |
FSE 2022 | Putting Them under Microscope: A Fine-Grained Approach for Detecting Redundant Test Cases in Natural Language | Zhiyuan Chang, Mingyang Li, Junjie Wang, Qing Wang, Shoubin Li |
FSE 2022 | PyTER: Effective Program Repair for Python Type Errors | Wonseok Oh, Hakjoo Oh |
FSE 2022 | Quantifying Community Evolution in Developer Social Networks | Liang Wang, Ying Li, Jierui Zhang, Xianping Tao |
FSE 2022 | Quantitative Relational Modelling with QAlloy | Pedro Silva, Jose Nuno Oliveira, Nuno Macedo, Alcino Cunha |
FSE 2022 | RULER: Discriminative and Iterative Adversarial Training for Deep Neural Network Fairness | Guanhong Tao, Weisong Sun, Tingxu Han, Chunrong Fang, Xiangyu Zhang |
FSE 2022 | RoboFuzz: Fuzzing Robotic Systems over Robot Operating System (ROS) for Finding Correctness Bugs | Seulbae Kim, Taesoo Kim |
FSE 2022 | SEDiff: Scope-Aware Differential Fuzzing to Test Internal Function Models in Symbolic Execution | Penghui Li, Wei Meng, Kangjie Lu |
FSE 2022 | SPINE: A Scalable Log Parser with Feedback Guidance | Xuheng Wang, Xu Zhang, Liqun Li, Shilin He, Hongyu Zhang, Yudong Liu, Lingling Zheng, Yu Kang, Qingwei Lin, Yingnong Dang, Saravanakumar Rajmohan, Dongmei Zhang |
FSE 2022 | SamplingCA: Effective and Efficient Sampling-Based Pairwise Testing for Highly Configurable Software Systems | Chuan Luo, Qiyuan Zhao, Shaowei Cai, Hongyu Zhang, Chunming Hu |
FSE 2022 | Scenario-Based Test Reduction and Prioritization for Multi-Module Autonomous Driving Systems | Yao Deng, Xi Zheng, Mengshi Zhang, Guannan Lou, Tianyi Zhang |
FSE 2022 | Security Code Smells in Apps: Are We Getting Better? | Steven Arzt |
FSE 2022 | Semi-supervised Pre-processing for Learning-Based Traceability Framework on Real-World Software Projects | Liming Dong, He Zhang, Wei Liu, Zhiluo Weng, Hongyu Kuang |
FSE 2022 | Software Security during Modern Code Review: The Developer’s Perspective | Larissa Braz, Alberto Bacchelli |
FSE 2022 | Static Executes-Before Analysis for Event Driven Programs | Rekha Pai, Abhishek Uppar, Akshatha Shenoy, Pranshul Kushwaha, Deepak D'Souza |
FSE 2022 | SymMC: Approximate Model Enumeration and Counting using Symmetry Information for Alloy Specifications | Wenxi Wang, Yang Hu, Kenneth L. McMillan, Sarfraz Khurshid |
FSE 2022 | Testing of Autonomous Driving Systems: Where Are We and Where Should We Go? | Guannan Lou, Yao Deng, Xi Zheng, Mengshi Zhang, Tianyi Zhang |
FSE 2022 | The Best of Both Worlds: Integrating Semantic Features with Expert Features for Defect Prediction and Localization | Chao Ni, Wei Wang, Kaiwen Yang, Xin Xia, Kui Liu, David Lo |
FSE 2022 | The Evolution of Type Annotations in Python: An Empirical Study | Luca Di Grazia, Michael Pradel |
FSE 2022 | Toward Interactive Bug Reporting for (Android App) End-Users | Yang Song, Junayed Mahmud, Ying Zhou, Oscar Chaparro, Kevin Moran, Andrian Marcus, Denys Poshyvanyk |
FSE 2022 | TraceCRL: Contrastive Representation Learning for Microservice Trace Analysis | Chenxi Zhang, Xin Peng, Tong Zhou, Chaofeng Sha, Zhenghui Yan, Yiru Chen, Yang Hong |
FSE 2022 | Tracking Patches for Open Source Software Vulnerabilities | Congying Xu, Bihuan Chen, Chenhao Lu, Kaifeng Huang, Xin Peng, Yang Liu |
FSE 2022 | UTANGO: Untangling Commits with Context-Aware, Graph-Based, Code Change Clustering Learning Model | Yi Li, Shaohua Wang, Tien N. Nguyen |
FSE 2022 | Understanding Performance Problems in Deep Learning Systems | Junming Cao, Bihuan Chen, Chao Sun, Longjie Hu, Shuaihong Wu, Xin Peng |
FSE 2022 | Understanding Skills for OSS Communities on GitHub | Jenny T. Liang, Thomas Zimmermann, Denae Ford |
FSE 2022 | Using Graph Neural Networks for Program Termination | Yoav Alon, Cristina David |
FSE 2022 | Using Nudges to Accelerate Code Reviews at Scale | Qianhua Shan, David Sukhdeo, Qianying Huang, Seth Rogers, Lawrence Chen, Elise Paradis, Peter Rigby, Nachiappan Nagappan |
FSE 2022 | VulRepair: A T5-Based Automated Software Vulnerability Repair | Micheal Fu, Kla Tantithamthavorn, Trung Le, Van Nguyen, Dinh Phung |
FSE 2022 | What Motivates Software Practitioners to Contribute to Inner Source? | Zhiyuan Wan, Xin Xia, Yun Zhang, David Lo, zhou daibing, Qiuyuan Chen, Ahmed E. Hassan |
FSE 2022 | You See What I Want You to See: Poisoning Vulnerabilities in Neural Code Search | Yao Wan, Shijie Zhang, Hongyu Zhang, Yulei Sui, Guandong Xu, Dezhong Yao, Hai Jin, Lichao Sun |
ASE 2022 | A Comprehensive Evaluation of Android ICC Resolution Techniques | Jiwei Yan, Shixin Zhang, Yepang Liu, Xi Deng, Jun Yan, Jian Zhang |
ASE 2022 | A Hybrid Approach for Inference between Behavioral Exception API Documentation and Implementations, and Its Applications | Hoan Anh Nguyen, Hung Phan, Samantha Syeda Khairunnesa, Son Nguyen, Aashish Yadavally, Shaohua Wang, Hridesh Rajan, Tien N. Nguyen |
ASE 2022 | A Light Bug Triage Framework for Applying Large Pre-trained Language Model | Jaehyung Lee, Hwanjo Yu, HanKisun |
ASE 2022 | A Transferable Time Series Forecasting Service using Deep Transformer model for Online Systems | Tao Huang, Pengfei Chen, Jingrun Zhang, Ruipeng Li, Rui Wang |
ASE 2022 | AST-Probe: Recovering abstract syntax trees from hidden representations of pre-trained language models | José Antonio Hernández López, Martin Weyssow, Jesús Sánchez Cuadrado, Houari Sahraoui |
ASE 2022 | Accelerating Build Dependency Error Detection via Virtual Build | Rongxin Wu, Minglei Chen, Chengpeng Wang, Gang Fan, Jiguang Qiu, Charles Zhang |
ASE 2022 | Accelerating OCR-Based Widget Localization for Test Automation of GUI Applications | Ju Qian, Yingwei Ma, Chenghao Lin, Lin Chen |
ASE 2022 | An Empirical Study of Automation in Software Security Patch Management | Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, Muhammad Ali Babar |
ASE 2022 | Answer Summarization for Technical Queries: Benchmark and New Approach | Chengran Yang, Bowen Xu, Ferdian Thung, Yucen Shi, Ting Zhang, Zhou Yang, Xin Zhou, Jieke Shi, Junda He, DongGyun Han, David Lo |
ASE 2022 | Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs? | Cedric Richter, Jan Haltermann, Marie-Christine Jakobs, Felix Pauck, Stefan Schott, Heike Wehrheim |
ASE 2022 | Are They Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions | Yuxi Ling, Kailong Wang, Guangdong Bai, Haoyu Wang, Jin Song Dong |
ASE 2022 | Auto Off-Target: Enabling Thorough and Scalable Testing for Complex Software Systems | Tomasz Kuchta, Bartosz Zator |
ASE 2022 | Automated Feedback Generation for Competition-Level Code | Jialu Zhang, De Li, John C. Kolesar, Hanyuan Shi, Ruzica Piskac |
ASE 2022 | Automatic Comment Generation via Multi-Pass Deliberation | Fangwen Mu, Xiao Chen, Lin Shi, Song Wang, Qing Wang |
ASE 2022 | Automatically Detecting Visual Bugs in HTML5 Games | Finlay Macklon, Mohammad Reza Taesiri, Markos Viggiato, Stefan Antoszko, Natalia Romanova, Dale Paas, Cor-Paul Bezemer |
ASE 2022 | B-AIS: An Automated Process for Black-box Evaluation of AI-enabled Software Systems against Domain Semantics | Hamed Barzamini, Mona Rahimi |
ASE 2022 | Boosting the Revealing of Detected Violations in Deep Learning Testing: A Diversity-Guided Method | Xiaoyuan Xie, Pengbo Yin, Songqiang Chen |
ASE 2022 | BuildSonic: Detecting and Repairing Performance-Related Configuration Smells for Continuous Integration Builds | Chen Zhang, Bihuan Chen, Junhao Hu, Xin Peng, Wenyun Zhao |
ASE 2022 | CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices Architecture | Vikram Nitin, Shubhi Asthana, Baishakhi Ray, Rahul Krishna |
ASE 2022 | Call Me Maybe: Using NLP to Automatically Generate Unit Test Cases Respecting Temporal Constraints | Arianna Blasi, Alessandra Gorla, Michael D. Ernst, Mauro Pezze |
ASE 2022 | Checking LTL Satisfiability via End-to-end Learning | Weilin Luo, Hai Wan, Delong Zhang, Jianfeng Du, Hengdi Su |
ASE 2022 | CoditT5: Pretraining for Source Code and Natural Language Editing | Jiyang Zhang, Sheena Panthaplackel, Pengyu Nie, Junyi Jessy Li, Milos Gligoric |
ASE 2022 | Compiler Testing using Template Java Programs | Zhiqiang Zang, Nathan Wiatrek, Milos Gligoric, August Shi |
ASE 2022 | Compressing Pre-trained Models of Code into 3 MB | Jieke Shi, Zhou Yang, Bowen Xu, Hong Jin Kang, David Lo |
ASE 2022 | Consistent Scene Graph Generation by Constraint Optimization | Boqi Chen, Kristóf Marussy, Sebastian Pilarski, Oszkár Semeráth, Daniel Varro |
ASE 2022 | Constructing a System Knowledge Graph of User Tasks and Failures from Bug Reports to Support Soap Opera Testing | Yanqi Su, Zheming Han, Zhenchang Xing, Xin Xia, Xiwei (Sherry) Xu, Liming Zhu, Qinghua Lu |
ASE 2022 | Cornucopia: A Framework for Feedback Guided Generation of Binaries | Vidush Singhal, Akul Abhilash Pillai, Charitha Saumya, Milind Kulkarni, Aravind Machiry |
ASE 2022 | CrystalBLEU: Precisely and Efficiently Measuring the Similarity of Code | Aryaz Eghbali, Michael Pradel |
ASE 2022 | Data Augmentation for Improving Emotion Recognition in Software Engineering Communication | Mia Mohammad Imran, Yashasvi Jain, Preetha Chatterjee, Kostadin Damevski |
ASE 2022 | Data Leakage in Notebooks: Static Detection and Better Processes | Chenyang Yang, Rachel A Brower-Sinning, Grace Lewis, Christian Kästner |
ASE 2022 | DeepPerform: An Efficient Approach for Performance Testing of Resource-Constrained Neural Networks | Simin Chen, Mirazul Haque, Cong Liu, Wei Yang |
ASE 2022 | Detecting Blocking Errors in Go Programs using Localized Abstract Interpretation | Oskar Haarklou Veileborg, Georgian-Vlad Saioc, Anders Møller |
ASE 2022 | Detecting Build Conflicts in Software Merge for Java Programs via Static Analysis | Sheikh Shadab Towqir, Bowen Shen, Muhammad Ali Gulzar, Na Meng |
ASE 2022 | Detecting Semantic Code Clones by Building AST-based Markov Chains Model | Yueming Wu, Siyue Feng, Deqing Zou, Hai Jin |
ASE 2022 | Differentially Testing Database Transactions for Fun and Profit | Ziyu Cui, Wensheng Dou, Qianwang Dai, Jiansen Song, Wei Wang, Jun Wei, Dan Ye |
ASE 2022 | Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided Fuzzing | Jianzhong Su, Hong-Ning Dai, Lingjun Zhao, Zibin Zheng, Xiapu Luo |
ASE 2022 | Efficient Greybox Fuzzing to Detect Memory Errors | Jinsheng Ba, Gregory J. Duck, Abhik Roychoudhury |
ASE 2022 | Efficient Synthesis of Method Call Sequences for Test Generation and Bounded Verification | Yunfan Zhang, Ruidong Zhu, Yingfei Xiong, Tao Xie |
ASE 2022 | Empirical Study of System Resources Abused by IoT Attackers | Zijing Yin, Yiwen Xu, Chijin Zhou, Yu Jiang |
ASE 2022 | Enriching Compiler Testing with Real Program from Bug Report | Hao Zhong |
ASE 2022 | Evolving Ranking-Based Failure Proximities for Better Clustering in Fault Isolation | Yi Song, Xiaoyuan Xie, Xihao Zhang, Quanming Liu, Ruizhi Gao |
ASE 2022 | Exploiting Epochs and Symmetries in Analysing MPI Programs | Rishabh Ranjan, Ishita Agrawal, Subodh Sharma |
ASE 2022 | Finding and Understanding Incompleteness Bugs in SMT Solvers | Mauro Bringolf, Dominik Winterer, Zhendong Su |
ASE 2022 | FuzzerAid: Grouping Fuzzed Crashes Based On Fault Signatures | Ashwin Kallingal Joshy, Wei Le |
ASE 2022 | Fuzzle: Making a Puzzle for Fuzzers | Haeun Lee, Soomin Kim, Sang Kil Cha |
ASE 2022 | GLITCH: Automated Polyglot Security Smell Detection in Infrastructure as Code | Nuno Saavedra, João F. Ferreira |
ASE 2022 | Generating Critical Test Scenarios for Autonomous Driving Systems via Influential Behavior Patterns | Haoxiang Tian, Guoquan Wu, Jiren Yan, Yan Jiang, Jun Wei, Wei Chen, Shuo Li, Dan Ye |
ASE 2022 | Graph based Incident Extraction and Diagnosis in Large-Scale Online Systems | Zilong He, Pengfei Chen, Yu Luo, Qiuyu Yan, Hongyang Chen, Guangba Yu, Fangyuan Li |
ASE 2022 | Griffin: Grammar-Free DBMS Fuzzing | Jingzhou Fu, Jie Liang, Zhiyong Wu, Mingzhe Wang, Yu Jiang |
ASE 2022 | Groundhog: An Automated Accessibility Crawler for Mobile Apps | Navid Salehnamadi, Forough Mehralian, Sam Malek |
ASE 2022 | HTFuzz: Heap Operation Sequence Sensitive Fuzzing | Yuanping Yu, Xiangkun Jia, Yuwei Liu, Yanhao Wang, Qian Sang, Chao Zhang, Purui Su |
ASE 2022 | Has My Release Disobeyed Semantic Versioning? Static Detection Based On Semantic Differencing | Lyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen, Lingling Fan, Bihuan Chen, Yang Liu |
ASE 2022 | How Useful is Code Change Information for Fault Localization in Continuous Integration? | An Ran Chen, Tse-Hsun (Peter) Chen, Junjie Chen |
ASE 2022 | HyperAST: Enabling Efficient Analysis of Software Histories at Scale | Quentin Le-dilavrec, Djamel Eddine Khelladi, Arnaud Blouin, Jean-Marc Jézéquel |
ASE 2022 | ICEBAR: Feedback-Driven Iterative Repair of Alloy Specifications | Simón Gutiérrez Brida, Germán Regis, Guolong Zheng, Hamid Bagheri, ThanhVu Nguyen, Nazareno Aguirre, Marcelo F. Frias |
ASE 2022 | Identifying Solidity Smart Contract API Documentation Errors | Chenguang Zhu, Ye Liu, Xiuheng Wu, Yi Li |
ASE 2022 | Inline Tests | Yu Liu, Pengyu Nie, Owolabi Legunsen, Milos Gligoric |
ASE 2022 | Insight: Exploring Cross-Ecosystem Vulnerability Impacts | Meiqiu Xu, Ying Wang, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu |
ASE 2022 | Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness | Haoye Tian, Xunzhu Tang, Andrew Habib, Shangwen Wang, Kui Liu, Xin Xia, Jacques Klein, Tegawendé F. Bissyandé |
ASE 2022 | Jasmine: A Static Analysis Framework for Spring Core Technologies | Miao Chen, Tengfei Tu, Hua Zhang, Qiaoyan Wen, Weihang Wang |
ASE 2022 | Keeping Secrets: Multi-objective Genetic Improvement for Detecting and Reducing Information Leakage | Ibrahim Mesecan, Daniel Blackwell, David Clark, Myra Cohen, Justyna Petke |
ASE 2022 | LISSA: Lazy Initialization with Specialized Solver Aid | Juan Manuel Copia, Pablo Ponzio, Nazareno Aguirre, Alessandra Gorla, Marcelo F. Frias |
ASE 2022 | LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous Vehicles | Yang Sun, Chris Poskitt, Jun Sun, Yuqi Chen, Zijiang Yang |
ASE 2022 | Learning Contract Invariants Using Reinforcement Learning | Junrui Liu, Yanju Chen, Bryan Tan, Işıl Dillig, Yu Feng |
ASE 2022 | Learning to Construct Better Mutation Faults | Zhao Tian, Junjie Chen, Qihao Zhu, Junjie Yang, Lingming Zhang |
ASE 2022 | Learning to Synthesize Relational Invariants | Jingbo Wang, Chao Wang |
ASE 2022 | Leveraging Practitioners' Feedback to Improve a Security Linter | Sofia Reis, Rui Abreu, Marcelo d'Amorim, Daniel Fortunato |
ASE 2022 | Low-Resources Project-Specific Code Summarization | Rui Xie, Tianxiang Hu, Wei Ye, Shikun Zhang |
ASE 2022 | MalWhiteout: Reducing Label Errors in Android Malware Detection | Liu Wang, Haoyu Wang, Xiapu Luo, Yulei Sui |
ASE 2022 | Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues | Xiaoyu Sun, Xiao Chen, Yanjie Zhao, Pei Liu, John Grundy, Li Li |
ASE 2022 | Natural Test Generation for Precise Testing of Question Answering Software | Qingchao Shen, Junjie Chen, Jie M. Zhang, Haoyu Wang, Shuang Liu, Menghan Tian |
ASE 2022 | Neuroevolution-Based Generation of Tests and Oracles for Games | Patric Feldmeier, Gordon Fraser |
ASE 2022 | Not All Dependencies are Equal: An Empirical Study on Production Dependencies in NPM | Jasmine Latendresse, Suhaib Mujahid, Diego Costa, Emad Shihab |
ASE 2022 | PRCBERT: Prompt Learning for Requirement Classification using BERT-based Pretrained Language Models | Xianchang Luo, Yinxing Xue, Zhenchang Xing, Jiamou Sun |
ASE 2022 | Patching Weak Convolutional Neural Network Models through Modularization and Composition | Binhang Qi, Hailong Sun, Xiang Gao, Hongyu Zhang |
ASE 2022 | Precise (Un)Affected Version Analysis for Web Vulnerabilities | ShiYoukun , Yuan Zhang, Tianhan Luo, Xiangyu Mao, Min Yang |
ASE 2022 | PredART: Towards Automatic Oracle Prediction of Object Placements in Augmented Reality Testing | Tahmid Rafi, Xueling Zhang, Xiaoyin Wang |
ASE 2022 | Prioritized Constraint-Aided Dynamic Partial-Order Reduction | Jie Su, Cong Tian, Zuchao Yang, Jiyu Yang, Bin Yu, Zhenhua Duan |
ASE 2022 | Prompt-tuned Code Language Model as a Neural Knowledge Base for Type Inference in Statically-Typed Partial Code | Qing Huang, Zhiqiang Yuan, Zhenchang Xing, Xiwei (Sherry) Xu, Liming Zhu, Qinghua Lu |
ASE 2022 | Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural Networks | Zhaodi Zhang, Yiting Wu, Si Liu, Jing Liu, Min Zhang |
ASE 2022 | QATest: A Uniform Fuzzing Framework for Question Answering Systems | Zixi Liu, Yang Feng, Yining Yin, Jingyu Sun, Zhenyu Chen, Baowen Xu |
ASE 2022 | QVIP: An ILP-based Formal Verification Approach for Quantized Neural Networks | Yedi Zhang, Zhe Zhao, Guangke Chen, Fu Song, Min Zhang, Taolue Chen, Jun Sun |
ASE 2022 | Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase Approach | Zhuo Zhang, Yan Lei, Meng Yan, Yue Yu, Jiachi Chen, Shangwen Wang, Xiaoguang Mao |
ASE 2022 | Reformulator: Automated Refactoring of the N+1 Problem in Database-Backed Applications | Alexi Turcotte, Mark W. Aldrich, Frank Tip |
ASE 2022 | Repairing Failure-inducing Inputs with Input Reflection | Yan Xiao, Yun Lin, Ivan Beschastnikh, Changsheng SUN, David Rosenblum, Jin Song Dong |
ASE 2022 | Robust Learning of Deep Predictive Models from Noisy and Imbalanced Software Engineering Datasets | Zhong Li, Minxue Pan, Yu Pei, Tian Zhang, Linzhang Wang, Xuandong Li |
ASE 2022 | SA4U: Practical Static Analysis for Unit Type Error Detection | Max Taylor, Johnathon Aurand, Feng Qin, Xiaorui Wang, Brandon Henry, Xiangyu Zhang |
ASE 2022 | Safety and Performance, Why not Both? Bi-Objective Optimized Model Compression toward AI Software Deployment | Jie Zhu, Leye Wang, Xiao Han |
ASE 2022 | Scalable Sampling of Highly-Configurable Systems: Generating Random Instances of the Linux Kernel | David Fernandez-Amoros, Ruben Heradio, Christoph Mayr-Dorn, Alexander Egyed |
ASE 2022 | Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps | Fuman Xie, Yanjun Zhang, Chuan Yan, Suwan Li, Lei Bu, Kai Chen, Zi Huang, Guangdong Bai |
ASE 2022 | Selectively Combining Multiple Coverage Goals in Search-Based Unit Test Generation | Zhichao Zhou, Yuming Zhou, Chunrong Fang, Zhenyu Chen, Yutian Tang |
ASE 2022 | SelfAPR: Self-supervised Program Repair with Test Execution Diagnostics | He Ye, Matias Martinez, Xiapu Luo, Tao Zhang, Martin Monperrus |
ASE 2022 | SmOOD: Smoothness-based Out-of-Distribution Detection Approach for Surrogate Neural Networks in Aircraft Design | Houssem Ben Braiek , Ali Tfaily, Foutse Khomh, Thomas Reid, Ciro Guida |
ASE 2022 | SmartPip: A Smart Approach to Resolving Python Dependency Conflict Issues | Chao Wang, Rongxin Wu, Haohao Song, Jiwu Shu, Guoqing Li |
ASE 2022 | So Many Fuzzers, So Little Time - Experience from Evaluating Fuzzers on the Contiki-NG Network (Hay)Stack | Clement Poncelet, Konstantinos (Kostis) Sagonas, Nicolas Tsiftes |
ASE 2022 | Sorry, I don't Understand: Improving Voice User Interface Testing | Emanuela Guglielmi, Giovanni Rosa, Simone Scalabrino, Gabriele Bavota, Rocco Oliveto |
ASE 2022 | StandUp4NPR: Standardizing Setup for Empirically Comparing Neural Program Repair Systems | Wenkang Zhong, Hongliang Ge, Hongfei Ai, Chuanyi Li, Kui Liu, Jidong Ge, Bin Luo |
ASE 2022 | Static Type Recommendation for Python | Ke Sun, Yifan Zhao, Dan Hao, Lu Zhang |
ASE 2022 | Studying and Understanding the Tradeoffs Between Generality and Reduction in Software Debloating | Qi Xin, Qirun Zhang, Alessandro Orso |
ASE 2022 | SymFusion: Hybrid Instrumentation for Concolic Execution | Emilio Coppa, Heng Yin, Camil Demetrescu |
ASE 2022 | The Metamorphosis: Automatic Detection of Scaling Issues for Mobile Apps | Yuhui Su, Chunyang Chen, Junjie Wang, Zhe Liu, Dandan Wang, Shoubin Li, Qing Wang |
ASE 2022 | ThirdEye: Attention Maps for Safe Autonomous Driving Systems | Andrea Stocco, Paulo J. Nunes, Marcelo d'Amorim, Paolo Tonella |
ASE 2022 | Too Much Accessibility is Harmful! Automated Detection and Analysis of Overly Accessible Elements in Mobile Apps | Forough Mehralian, Navid Salehnamadi, Syed Fatiul Huq, Sam Malek |
ASE 2022 | Toward Improving the Robustness of Deep Learning Models via Model Transformation | Yingyi Zhang, Zan Wang, Jiajun Jiang, Hanmo You, Junjie Chen |
ASE 2022 | Towards Understanding Third-party Library Dependency in C/C++ Ecosystem | Wei Tang, Zhengzi Xu, Chengwei Liu, Wu Jiahui, shouguo yang, Yi Li, Ping Luo, Yang Liu |
ASE 2022 | Towards Understanding the Faults of JavaScript-Based Deep Learning Systems | Lili Quan, Qianyu Guo, Xiaofei Xie, Sen Chen, Xiaohong Li, Yang Liu |
ASE 2022 | TransRepair: Context-aware Program Repair for Compilation Errors | Xueyang Li, Shangqing Liu, Ruitao Feng, Guozhu Meng, Xiaofei Xie, Kai Chen, Yang Liu |
ASE 2022 | TransplantFix: Graph Differencing-based Code Transplantation for Automated Program Repair | Deheng Yang, Xiaoguang Mao, Liqian Chen, Xuezheng Xu, Yan Lei, David Lo, Jiayu He |
ASE 2022 | TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection | Yutao Hu, Deqing Zou, Junru Peng, Yueming Wu, Junjie Shan, Hai Jin |
ASE 2022 | Tseitin or not Tseitin? The Impact of CNF Transformations on Feature-Model Analyses | Elias Kuiter, Sebastian Krieter, Chico Sundermann, Thomas Thüm, Gunter Saake |
ASE 2022 | Understanding and Predicting Docker Build Duration: An Empirical Study of Containerized Workflow of OSS Projects | Yiwen Wu, Yang Zhang, Kele Xu, Tao Wang, Huaimin Wang |
ASE 2022 | Unsupervised Summarization of Privacy Concerns in Mobile Application Reviews | Fahimeh Ebrahimi, Anas "Nash" Mahmoud |
ASE 2022 | Unveiling Hidden DNN Defects with Decision-Based Metamorphic Testing | Yuanyuan Yuan, Qi Pang, Shuai Wang |
ASE 2022 | Using Consensual Biterms from Text Structures of Requirements and Code to Improve IR-Based Traceability Recovery | Hui Gao, Hongyu Kuang, Kexin Sun, Xiaoxing Ma, Alexander Egyed, Patrick Mäder, Guoping Rong, Dong Shao, He Zhang |
ASE 2022 | VITAS : Guided Model-based VUI Testing of VPA Apps | Suwan Li, Lei Bu, Guangdong Bai, Zhixiu Guo, Kai Chen, Hanlin Wei |
ASE 2022 | Which Exception Shall We Throw? | Hao Zhong |
ISSTA 2022 | A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware | Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah |
ISSTA 2022 | A Large-scale Study of Usability Criteria addressed by Static Analysis Tools | Marcus Nachtigall, Michael Schlichtig, Eric Bodden |
ISSTA 2022 | AEON: A Method for Automatic Evaluation of NLP Test Cases | Jen-tse Huang, Jianping Zhang, Wenxuan Wang, Pinjia He, Yuxin Su, Michael Lyu |
ISSTA 2022 | ASRTest: Automated Testing for Deep-Neural-Network-Driven Speech Recognition Systems | Pin Ji, Yang Feng, Jia Liu, Zhihong Zhao, Zhenyu Chen |
ISSTA 2022 | ATR: Template-based Repair for Alloy Specifications | Guolong Zheng, ThanhVu Nguyen, Simón Gutiérrez Brida, Germán Regis, Nazareno Aguirre, Marcelo F. Frias, Hamid Bagheri |
ISSTA 2022 | Almost Correct Invariants: Synthesizing Inductive Invariants by Fuzzing Proofs | Sumit Lahiri, Subhajit Roy |
ISSTA 2022 | An Empirical Study on the Effectiveness of Static C/C++ Analyzers for Vulnerability Detection | Stephan Lipp, Sebastian Banescu, Alexander Pretschner |
ISSTA 2022 | An Extensive Study on Pre-trained Models for Program Understanding and Generation | Zhengran Zeng, Hanzhuo Tan, Haotian Zhang, Jing Li, Yuqun Zhang, Lingming Zhang |
ISSTA 2022 | Automated Test Generation for REST APIs: No Time to Rest Yet | Myeongsoo Kim, Qi Xin, Saurabh Sinha, Alessandro Orso |
ISSTA 2022 | Automated Testing of Image Captioning Systems | BoXi Yu, Zhiqing Zhong, Xinran Qin, Jiayi Yao, Yuancheng Wang, Pinjia He |
ISSTA 2022 | Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study) | Pei Liu, Yanjie Zhao, Haipeng Cai, Mattia Fazzini, John Grundy, Li Li |
ISSTA 2022 | BET: Black-box Efficient Testing for Convolutional Neural Networks | Wang Jialai, Han Qiu, Yi Rong, Hengkai Ye, Qi Li, Zongpeng Li, Chao Zhang |
ISSTA 2022 | CIRCLE: Continual Repair across Programming Languages | Wei Yuan, Quanjun Zhang, Tieke He, Chunrong Fang, Nguyen Quoc Viet Hung, Xiaodong Hao, Hongzhi Yin |
ISSTA 2022 | Combining Solution Reuse and Bound Tightening for Efficient Analysis of Evolving Systems | Clay Stevens, Hamid Bagheri |
ISSTA 2022 | Combining Static Analysis Error Traces with Dynamic Symbolic Execution (Experience Paper) | Frank Busse, Pritam Gharat, Cristian Cadar, Alastair F. Donaldson |
ISSTA 2022 | Cross-Lingual Transfer Learning for Statistical Type Inference | Zhiming Li, Xiaofei Xie, Haoliang Li, Zhengzi Xu, Yi Li, Yang Liu |
ISSTA 2022 | Deadlock Prediction via Generalized Dependency | Jinpeng Zhou, Hanmei Yang, John Lange, Tongping Liu |
ISSTA 2022 | Detecting Multi-Sensor Fusion Errors in Advanced Driver-Assistance Systems | Ziyuan Zhong, Zhisheng Hu, Shengjian Guo, Xinyang Zhang, Zhenyu Zhong, Baishakhi Ray |
ISSTA 2022 | Detecting Resource Utilization Bugs Induced by Variant Lifecycles in Android | Yifei Lu, Minxue Pan, Yu Pei, Xuandong Li |
ISSTA 2022 | Detecting and Fixing Data Loss Issues in Android Apps | Wunan Guo, Zhen Dong, Liwei Shen, Wei Tian, Ting Su, Xin Peng |
ISSTA 2022 | DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions | Danning Xie, Yitong Li, Mijung Kim, Hung Viet Pham, Lin Tan, Xiangyu Zhang, Michael W. Godfrey |
ISSTA 2022 | Efficient Greybox Fuzzing of Applications in Linux-based IoT Devices via Enhanced User-mode Emulation | Yaowen Zheng, Yuekang Li, Cen Zhang, Hongsong Zhu, Yang Liu, Limin Sun |
ISSTA 2022 | Evolution-Aware Detection of Order-Dependent Flaky Tests | Chengpeng Li, August Shi |
ISSTA 2022 | FDG: A Precise Measurement of Fault Diagnosability Gain of Test Cases | Gabin An, Shin Yoo |
ISSTA 2022 | Finding Bugs in Gremlin-Based Graph Database Systems via Randomized Differential Testing | Yingying Zheng, Wensheng Dou, Yicheng Wang, Zheng Qin, Lei Tang, Yu Gao, Dong Wang, Wei Wang, Jun Wei |
ISSTA 2022 | Finding Permission Bugs in Smart Contracts with Role Mining | Ye Liu, Yi Li, Shang-Wei Lin, Cyrille Artho |
ISSTA 2022 | Human-in-the-Loop Oracle Learning for Semantic Bugs in String Processing Programs | Charaka Geethal, Thuan Pham, Aldeida Aleti, Marcel Böhme |
ISSTA 2022 | Hunting Bugs with Accelerated Optimal Graph Vertex Matching | Xiaohui Zhang, Yuanjun Gong, Bin Liang, Jianjun Huang, Wei You, Wenchang Shi, Jian Zhang |
ISSTA 2022 | HybridRepair: Towards Annotation-Efficient Repair for Deep Learning Models | Yu Li, Muxi Chen, Xu, Qiang |
ISSTA 2022 | Improving Cross-Platform Binary Analysis using Representation Learning via Graph Alignment | Geunwoo Kim, Sanghyun Hong, Michael Franz, Dokyung Song |
ISSTA 2022 | LiRTest: Augmenting LiDAR Point Clouds for Automated Testing of Autonomous Driving Systems | An Guo, Yang Feng, Zhenyu Chen |
ISSTA 2022 | MDPFuzz: Testing Models Solving Markov Decision Processes | Qi Pang, Yuanyuan Yuan, Shuai Wang |
ISSTA 2022 | Metamorphic Relations via Relaxations: An Approach to Obtain Oracles for Action-Policy Testing | Hasan Ferit Eniser, Timo P. Gros, Valentin Wüstholz, Jörg Hoffmann, Maria Christakis |
ISSTA 2022 | NCScope: Hardware-Assisted Analyzer for Native Code in Android Apps | Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Yajin Zhou, Chao Zhang, Haipeng Cai |
ISSTA 2022 | On the Use of Evaluation Measures for Defect Prediction Studies | Rebecca Moussa, Federica Sarro |
ISSTA 2022 | On the Use of Mutation Analysis For Evaluating Student Test Suite Quality | James Perretta, Andrew DeOrio, Arjun Guha, Jonathan Bell |
ISSTA 2022 | One Step Further: Evaluating Interpreters Using Metamorphic Testing | Ming Fan, Jiali Wei, Wuxia Jin, Zhou Xu, Wenying Wei, Ting Liu |
ISSTA 2022 | Park: Accelerating Smart Contract Vulnerability Detection via Parallel-fork Symbolic Execution | Peilin Zheng, Zibin Zheng, Xiapu Luo |
ISSTA 2022 | Patch Correctness Assessment in Automated Program Repair Based on the Impact of Patches on Production and Test Code | Ali Ghanbari, Andrian Marcus |
ISSTA 2022 | Path-Sensitive Code Embedding via Contrastive Learning for Software Vulnerability Detection | Xiao Cheng, Guanqin Zhang, Haoyu Wang, Yulei Sui |
ISSTA 2022 | PermDroid: Automatically Testing Permission-Related Behaviour of Android Applications | Shuaihao Yang, Zigang Zeng, Wei Song |
ISSTA 2022 | PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation | Zheyu Ma, Bodong Zhao, Letu Ren, Zheming Li, Siqi Ma, Xiapu Luo, Chao Zhang |
ISSTA 2022 | Precise and Efficient Atomicity Violation Detection for Interrupt-driven Programs via Staged Path Pruning | Chao Li, Rui Chen, Boxiang Wang, Tingting Yu, Dongdong Gao, Mengfei Yang |
ISSTA 2022 | Program Vulnerability Repair via Inductive Inference | Yuntong Zhang, Xiang Gao, Gregory J. Duck, Abhik Roychoudhury |
ISSTA 2022 | RegMiner: Towards Constructing a Large Regression Dataset from Code Evolution History | Xuezhi Song, Yun Lin, Siang Hwee Ng, Yijian Wu, Xin Peng, Jin Song Dong, Hong Mei |
ISSTA 2022 | SLIME: Program-sensitive Energy Allocation for Fuzzing | Chenyang Lyu, Hong Liang, Shouling Ji, Xuhong Zhang, Binbin Zhao, Meng Han, Yun Li, Zhe Wang, Wenhai Wang, Raheem Beyah |
ISSTA 2022 | Simple Techniques Work Surprisingly Well for Neural Network Test Prioritization and Active Learning (Replicability Study) | Michael Weiss, Paolo Tonella |
ISSTA 2022 | SmartDagger : A Bytecode-based Static Analysis Approach for Detecting Cross-contract Vulnerability | Zeqin Liao, Zibin Zheng, Xiao Chen, Yuhong Nan |
ISSTA 2022 | SnapFuzz: High-Throughput Fuzzing of Network Applications | Anastasios Andronidis, Cristian Cadar |
ISSTA 2022 | TELL: Log Level Suggestions via Modeling Multi-level Code Block Information | Jiahao Liu, Jun Zeng, Xiang Wang, Kaihang Ji, Zhenkai Liang |
ISSTA 2022 | TensileFuzz: Facilitating Seed Input Generation in Fuzzing via String Constraint Solving | Xuwei Liu, Wei You, Zhuo Zhang, Xiangyu Zhang |
ISSTA 2022 | Test Mimicry to Assess the Exploitability of Library Vulnerabilities | Hong Jin Kang, Truong Giang Nguyen, Xuan Bach D. Le, Corina S. Pasareanu, David Lo |
ISSTA 2022 | Testing Dafny (Experience Paper) | Ahmed Irfan, Sorawee Porncharoenwase, Zvonimir Rakamaric, Neha Rungta, Emina Torlak |
ISSTA 2022 | The Raise of Machine Learning Hyperparameter Constraints in Python Code | Ingkarat Rak-amnouykit, Ana Milanova, Guillaume Baudart, Martin Hirzel, Julian Dolby |
ISSTA 2022 | Understanding Device Integration Bugs in Smart Home System | Tao Wang, Kangkang Zhang, Wei Chen, Wensheng Dou, Jiaxin Zhu, Jun Wei, Tao Huang |
ISSTA 2022 | Unicorn: Detect Runtime Error in Time-Series Databases With Hybrid Input Synthesis | Zhiyong Wu, Jie Liang, Mingzhe Wang, Chijin Zhou, Yu Jiang |
ISSTA 2022 | Using Pre-trained Language Models to Resolve Textual and Semantic Merge Conflicts (Experience Paper) | Jialu Zhang, Todd Mytkowicz, Mike Kaufman, Ruzica Piskac, Shuvendu K. Lahiri |
ISSTA 2022 | WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts | Weimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai, Lei Wu |
ISSTA 2022 | eTainter: Detecting Gas-Related Vulnerabilities in Smart Contracts | Asem Ghaleb, Julia Rubin, Karthik Pattabiraman |
ISSTA 2022 | jTrans: Jump-Aware Transformer for Binary Code Similarity Detection | Hao Wang, Wenjie Qu, Gilad Katz, Wenyu Zhu, Zeyu Gao, Han Qiu, Jianwei Zhuge, Chao Zhang |
ISSTA 2022 | ε-weakened Robustness of Deep Neural Networks | Pei Huang, Yuting Yang, Minghao Liu, Fuqi Jia, Feifei Ma, Jian Zhang |
ICSE 2021 | "Ignorance and Prejudice" in Software Fairness | Jie M. Zhang, Mark Harman |
ICSE 2021 | A Case Study of Onboarding in Software Teams: Tasks and Strategies | An Ju, Hitesh Sajnani, Scot Kelly, Kim Herzig |
ICSE 2021 | A Context-based Automated Approach for Method Name Consistency Checking and Suggestion | Yi Li, Shaohua Wang, Tien N. Nguyen |
ICSE 2021 | A Differential Testing Approach for Evaluating Abstract Syntax Tree Mapping Algorithms | Yuanrui Fan, Xin Xia, David Lo, Ahmed E. Hassan, Yuan Wang, Shanping Li |
ICSE 2021 | AID: An Automated Inclusivity-Bug Detector | Amreeta Chatterjee, Mariam Guizani, Catherine Stevens, Jillian Emard, Mary Evelyn May, Margaret Burnett, Iftekhar Ahmed, Anita Sarma |
ICSE 2021 | ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Apps | Xian Zhan, Lingling Fan, Sen Chen, Feng Wu, Tianming Liu, Xiapu Luo, Yang Liu |
ICSE 2021 | AUTOTRAINER: An Automatic DNN Training Problem Detection and Repair System | Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Chao Shen |
ICSE 2021 | Abacus: Precise Side-Channel Analysis | Qinkun Bao, Zihao Wang, Xiaoting Li, James Larus, Dinghao Wu |
ICSE 2021 | An Empirical Analysis of UI-based Flaky Tests | Alan Romano, Zihe Song, Sampath Grandhi, Wei Yang, Weihang Wang |
ICSE 2021 | An Empirical Assessment of Global COVID-19 Contact Tracing Applications | Ruoxi Sun, Wei (Zach) Wang, Minhui (Jason) Xue, Gareth Tyson, Seyit Camtepe, Damith C. Ranasinghe |
ICSE 2021 | An Empirical Study of Refactorings and Technical Debt in Machine Learning Systems | Yiming Tang, Raffi Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja |
ICSE 2021 | An Empirical Study on Deployment Faults of Deep Learning Based Mobile Applications | Zhenpeng Chen, Huihan Yao, Yiling Lou, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Xuanzhe Liu |
ICSE 2021 | An Evolutionary Study of Configuration Design and Implementation in Cloud Systems | Yuanliang Zhang, Haochen He, Owolabi Legunsen, Shanshan Li, Wei Dong, Tianyin Xu |
ICSE 2021 | App's Auto-Login Function Security Testing via Android OS-Level Virtualization | Wenna Song, Jiang Ming, Lin Jiang, Han Yan, Yi Xiang, Yuan Chen, Jianming Fu, Guojun Peng |
ICSE 2021 | Are Machine Learning Cloud APIs Used Correctly? | Chengcheng Wan, Shicheng Liu, Henry Hoffmann, Michael Maire, Shan Lu |
ICSE 2021 | AutoCCAG: An Automated Approach to Constrained Covering Array Generation | Chuan Luo, Jinkun Lin, Shaowei Cai, Xin Chen, Bing He, Bo Qiao, Pu Zhao, Qingwei Lin, Hongyu Zhang, Wei Wu, Saravanakumar Rajmohan, Dongmei Zhang |
ICSE 2021 | Automated Query Reformulation for Efficient Search Based on Query Logs from Stack Overflow | Kaibo Cao, Chunyang Chen, Sebastian Baltes, Christoph Treude, Xiang Chen |
ICSE 2021 | Automatic Extraction of Opinion-based Q&A from Online Developer Chats | Preetha Chatterjee, Kostadin Damevski, Lori Pollock |
ICSE 2021 | Automatic Solution Summarization for Crash Bugs | Haoye Wang, Xin Xia, David Lo, John Grundy, Xinyu Wang |
ICSE 2021 | Automatic Unit Test Generation for Machine Learning Libraries: How Far Are We? | Song Wang, Nishtha Shrestha, Abarna Kucheri Subburaman, Junjie Wang, Moshi Wei, Nachiappan Nagappan |
ICSE 2021 | Automatic Web Testing using Curiosity-Driven Reinforcement Learning | YAN ZHENG, Yi Liu, Xiaofei Xie, Yepang Liu, Lei Ma, Jianye Hao, Yang Liu |
ICSE 2021 | Automatically Matching Bug Reports With Related App Reviews | Marlo Haering, Christoph Stanik, Walid Maalej |
ICSE 2021 | Bounded Exhaustive Search of Alloy Specification Repairs | Simón Gutiérrez Brida, Germán Regis, Guolong Zheng, Hamid Bagheri, ThanhVu Nguyen, Nazareno Aguirre, Marcelo F. Frias |
ICSE 2021 | CENTRIS: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse | Seunghoon Woo, Sunghan Park, Seulbae Kim, Heejo Lee, Hakjoo Oh |
ICSE 2021 | CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies | Yangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao, Yao Guo |
ICSE 2021 | CURE: Code-Aware Neural Machine Translation for Automatic Program Repair | Nan Jiang, Thibaud Lutellier, Lin Tan |
ICSE 2021 | Can Program Synthesis be Used to Learn Merge Conflict Resolutions? An Empirical Analysis | Rangeet Pan, Vu Le, Nachiappan Nagappan, Sumit Gulwani, Shuvendu K. Lahiri, Mike Kaufman |
ICSE 2021 | Code Prediction by Feeding Trees to Transformers | Seohyun Kim, Jinman Zhao, Yuchi Tian, Satish Chandra |
ICSE 2021 | CodeShovel: Constructing Method-Level Source Code Histories | Felix Grund, Shaiful Alam Chowdhury, Nick Bradley, Braxton Hall, Reid Holmes |
ICSE 2021 | Containing Malicious Package Updates in npm with a Lightweight Permission System | Gabriel Ferreira, Limin Jia, Joshua Sunshine, Christian Kästner |
ICSE 2021 | Data-Driven Synthesis of a Provably Sound Side Channel Analysis | Jingbo Wang, Chungha Sung, Mukund Raghothaman, Chao Wang |
ICSE 2021 | Data-Oriented Differential Testing of Object-Relational Mapping Systems | Thodoris Sotiropoulos, Stefanos Chaliasos, Vaggelis Atlidakis, Dimitris Mitropoulos, Diomidis Spinellis |
ICSE 2021 | DeepBackdoor: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection | Yuanchun Li, Jiayi Hua, Haoyu Wang, Chunyang Chen, Yunxin Liu |
ICSE 2021 | DeepLV: Suggesting Log Levels Using Ordinal Based Neural Networks | Zhenhao Li, Heng Li, Tse-Hsun (Peter) Chen, Weiyi Shang |
ICSE 2021 | DeepLocalize: Fault Localization for Deep Neural Networks | Mohammad Wardat, Wei Le, Hridesh Rajan |
ICSE 2021 | DepOwl: Detecting Dependency Bugs to Prevent Compatibility Failures | Zhouyang Jia, Shanshan Li, Tingting Yu, Chen Zeng, Erci Xu, Xiaodong Liu, Ji Wang, Liao Xiangke |
ICSE 2021 | Distribution-Aware Testing of Neural Networks Using Generative Models | Swaroopa Dola, Matthew B Dwyer, Mary Lou Soffa |
ICSE 2021 | Do you really code? Designing and Evaluating Screening Questions for Online Surveys with Programmers | Anastasia Danilova, Alena Naiakshina, Stefan Horstmann, Matthew Smith |
ICSE 2021 | Does mutation testing improve testing practices? | Goran Petrović, Marko Ivanković, Gordon Fraser, René Just |
ICSE 2021 | Domain-Specific Fixes for Flaky Tests with Wrong Assumptions on Underdetermined Specifications | Peilun Zhang, Yanjie Jiang, Anjiang Wei, Victoria Stodden, Darko Marinov, August Shi |
ICSE 2021 | Don't Do That! Hunting Down Visual Design Smells in Complex UIs against Design Guidelines | Bo Yang, Zhenchang Xing, Xin Xia, Chunyang Chen, Deheng Ye, Shanping Li |
ICSE 2021 | Early Life Cycle Software Defect Prediction. Why? How? | Shrikanth N C, Suvodeep Majumder, Tim Menzies |
ICSE 2021 | Efficient Compiler Autotuning via Bayesian Optimization | Junjie Chen, Ningxin Xu, Peiqi Chen, Hongyu Zhang |
ICSE 2021 | Enabling Software Resilience in GPGPU Applications via Partial Thread Protection | Lishan Yang, Bin Nie, Adwait Jog, Evgenia Smirni |
ICSE 2021 | Enhancing Genetic Improvement of Software with Regression Test Selection | Giovani Guizzo, Justyna Petke, Federica Sarro, Mark Harman |
ICSE 2021 | Evaluating SZZ Implementations Through a Developer-informed Oracle | Giovanni Rosa, Luca Pascarella, Simone Scalabrino, Rosalia Tufano, Gabriele Bavota, Michele Lanza, Rocco Oliveto |
ICSE 2021 | Evaluating Unit Testing Practices in R Packages | Melina Vidoni |
ICSE 2021 | EvoSpex: An Evolutionary Algorithm for Learning Postconditions | Facundo Molina, Pablo Ponzio, Nazareno Aguirre, Marcelo F. Frias |
ICSE 2021 | Extracting Concise Bug-Fixing Patches from Human-Written Patches in Version Control Systems | Yanjie Jiang, Hui Liu, Nan Niu, Lu Zhang, Yamin Hu |
ICSE 2021 | Extracting Rationale for Software Development Decisions—A Study of Python Email Archives | Pankajeshwara Sharma, Bastin Tony Roy Savarimuthu, Nigel Stanger |
ICSE 2021 | FLACK: Counterexample-Guided Fault Localization for Alloy Models | Guolong Zheng, ThanhVu Nguyen, Simón Gutiérrez Brida, Germán Regis, Marcelo F. Frias, Nazareno Aguirre, Hamid Bagheri |
ICSE 2021 | Fast Outage Analysis of Large-scale Production Clouds with Service Correlation Mining | Yaohui Wang, Guozheng Li, Zijian Wang, Yu Kang, Yangfan Zhou, Hongyu Zhang, Feng Gao, Jeffrey Sun, Li Yang, Pochian Lee, Zhangwei Xu, Pu Zhao, Bo Qiao, Liqun Li, Xu Zhang, Qingwei Lin |
ICSE 2021 | Fast Parametric Model Checking through Model Fragmentation | Xinwei Fang, Radu Calinescu, Simos Gerasimou, Faisal Alhwikem |
ICSE 2021 | Fast and Precise On-the-fly Patch Validation for All | Lingchao Chen, Yicheng Ouyang, Lingming Zhang |
ICSE 2021 | Fault Localization with Code Coverage Representation Learning | Yi Li, Shaohua Wang, Tien N. Nguyen |
ICSE 2021 | Fine with ``1234''? An Analysis of SMS One-Time Password Randomness in Android Apps | Siqi Ma, Juanru Li, hyoungshick kim, Elisa Bertino, Surya Nepal, Diet Ostry, Cong Sun |
ICSE 2021 | FlakeFlagger: Predicting Flakiness Without Rerunning Tests | Abdulrahman Alshammari, Christopher Morris, Michael Hilton, Jonathan Bell |
ICSE 2021 | Fuzzing Symbolic Expressions | Luca Borzacchiello, Emilio Coppa, Camil Demetrescu |
ICSE 2021 | GUIGAN: Learning to Generate GUI Designs Using Generative Adversarial Networks | Tianming Zhao, Chunyang Chen, Yuanning Liu, Xiaodong Zhu |
ICSE 2021 | GenTree: Using Decision Trees to Learn Interactions for Configurable Software | KimHao Nguyen, ThanhVu Nguyen |
ICSE 2021 | Graph-based Fuzz Testing for Deep Learning Inference Engines | Weisi Luo, Xiaoyue Run, Dong Chai, Jiang Wang, Chunrong Fang, Zhenyu Chen |
ICSE 2021 | Growing A Test Corpus with Bonsai Fuzzing | Vasudev Vikram, Rohan Padhye, Koushik Sen |
ICSE 2021 | Hero: On the Chaos When PATH Meets Modules | Ying Wang, Liang Qiao, Chang Xu, Yepang Liu, Shing-Chi Cheung, Na Meng, Hai Yu, Zhiliang Zhu |
ICSE 2021 | How Developers Optimize Virtual Reality Applications: A Study of Optimization Commits in Open Source Unity Projects | Fariha Nusrat, Foyzul Hassan, Hao Zhong, Xiaoyin Wang |
ICSE 2021 | How Gamification Affects Software Developers: Cautionary Evidence from a Natural Experiment on GitHub | Lukas Moldon, Markus Strohmaier, Johannes Wachs |
ICSE 2021 | How to identify Boundary Conditions with Contrasty Metric? | Weilin Luo, Hai Wan, Xiaotong Song, Binhao Yang, Hongzhen Zhong, Yin Chen |
ICSE 2021 | IMGDroid: Detecting Image Loading Defects in Android Applications | Wei Song, Mengqi Han, Jeff Huang |
ICSE 2021 | IdBench: Evaluating Semantic Representations of Identifier Names in Source Code | Yaza Wainakh, Moiz Rauf, Michael Pradel |
ICSE 2021 | Identifying Key Features from App User Reviews | Huayao Wu, Wenjun Deng, Xintao Niu, Changhai Nie |
ICSE 2021 | If It’s Not Secure, It Should Not Compile: Preventing DOM-Based XSS in Large-Scale Web Development with API Hardening | Pei Wang, Julian Bangert, Christoph Kern |
ICSE 2021 | Improving Fault Localization by Integrating Value and Predicate Based Causal Inference Techniques | Yigit Kucuk, Tim A. D. Henderson, Andy Podgurski |
ICSE 2021 | InferCode: Self-Supervised Learning of Code Representations by Predicting Subtrees | Nghi D. Q. Bui, Yijun Yu, Lingxiao Jiang |
ICSE 2021 | Input Algebras | Rahul Gopinath, Hamed Nemati, Andreas Zeller |
ICSE 2021 | Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine | Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Matthieu Lemerre, Laurent Mounier, Marie-Laure Potet |
ICSE 2021 | Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model | Xi Xu, Qinghua Zheng, Zheng Yan, Ming Fan, Ang Jia, Ting Liu |
ICSE 2021 | IoT Bugs and Development Challenges | Amir Makhshari, Ali Mesbah |
ICSE 2021 | It Takes Two to Tango: Combining Visual and Textual Information for Detecting Duplicate Video-Based Bug Reports | Nathan Cooper, Carlos Bernal-Cárdenas, Oscar Chaparro, Kevin Moran, Denys Poshyvanyk |
ICSE 2021 | JEST: N+1-version Differential Testing of Both JavaScript Engines and Specification | Jihyeok Park, Seungmin An, Dongjun Youn, Gyeongwon Kim, Sukyoung Ryu |
ICSE 2021 | JUSTGen: Effective Test Generation for Unspecified JNI Behaviors on JVMs | Sungjae Hwang, Sungho Lee, Jihoon Kim, Sukyoung Ryu |
ICSE 2021 | Layout and Image Recognition Driving Cross-Platform Automated Mobile Testing | Shengcheng Yu, Chunrong Fang, Yexiao Yun, Yang Feng |
ICSE 2021 | Leaving My Fingerprints: Motivations and Challenges of Contributing to OSS for Social Good | Yu Huang, Denae Ford, Thomas Zimmermann |
ICSE 2021 | Measuring Discrimination to Boost Comparative Testing for Multiple Deep Learning Models | Linghan Meng, Yanhui Li, Lin Chen, Zhi Wang, Di Wu, Yuming Zhou, Baowen Xu |
ICSE 2021 | MuDelta: Delta-Oriented Mutation Testing at Commit Time | Wei Ma, Thierry Titcheu Chekam, Mike Papadakis, Mark Harman |
ICSE 2021 | On Indirectly Dependent Documentation in the Context of Code Evolution: A Study | Devika Sondhi, Avyakt Gupta, Salil Purandare, Ankit Rana, Deepanshu Kaushal, Rahul Purandare |
ICSE 2021 | On the Naming of Methods: A Survey of Professional Developers | Reem S. Alsuhaibani, Christian D. Newman, Michael J. Decker, Michael L. Collard, Jonathan I. Maletic |
ICSE 2021 | Onboarding vs. Diversity, Productivity and Quality -- Empirical Study of the OpenStack Ecosystem | Armstrong Foundjem, Ellis E. Eghan, Bram Adams |
ICSE 2021 | Operation is the hardest teacher: estimating DNN accuracy looking for mispredictions | Antonio Guerriero, Roberto Pietrantuono, Stefano Russo |
ICSE 2021 | Playing Planning Poker in Crowds: Human Computation of Software Effort Estimates | Mohammed Alhamed, Tim Storer |
ICSE 2021 | Prioritize Crowdsourced Test Reports via Deep Screenshot Understanding | Shengcheng Yu, Chunrong Fang, Zhenfei Cao, Xu Wang, Tongyu Li, Zhenyu Chen |
ICSE 2021 | Prioritizing Test Inputs for Deep Neural Networks via Mutation Analysis | Zan Wang, Hanmo You, Junjie Chen, Yingyi Zhang, Xuyuan Dong, Wenbin Zhang |
ICSE 2021 | Program Comprehension and Code Complexity Metrics: An fMRI Study | Norman Peitek, Sven Apel, Chris Parnin, André Brechmann, Janet Siegmund |
ICSE 2021 | PyART: Python API Recommendation in Real-Time | Xincheng He, Lei Xu, Xiangyu Zhang, Rui Hao, Yang Feng, Baowen Xu |
ICSE 2021 | PyCG: Practical Call Graph Generation in Python | Vitalis Salis, Thodoris Sotiropoulos, Panos Louridas, Diomidis Spinellis, Dimitris Mitropoulos |
ICSE 2021 | RAICC: Revealing Atypical Inter-Component Communication in Android Apps | Jordan Samhi, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein |
ICSE 2021 | Reducing DNN Properties to Enable Falsification with Adversarial Attacks | David Shriver, Sebastian Elbaum, Matthew B Dwyer |
ICSE 2021 | Relating Reading, Visualization, and Coding for New Programmers: A Neuroimaging Study | Madeline Endres, Zachary Karas, Xiaosu Hu, Ioulia Kovelman, Westley Weimer |
ICSE 2021 | Representation of Developer Expertise in Open Source Software | Tapajit Dey, Andrey Karnauch, Audris Mockus |
ICSE 2021 | Resource-Guided Configuration Space Reduction for Deep Learning Models | Yanjie Gao, Yonghao Zhu, Hongyu Zhang, Haoxiang Lin, Mao Yang |
ICSE 2021 | Restoring Execution Environments of Jupyter Notebooks | Jiawei Wang, Li Li, Andreas Zeller |
ICSE 2021 | RobOT: Robustness-Oriented Testing for Deep Learning Systems | Jingyi Wang, Jialuo Chen, Youcheng Sun, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng |
ICSE 2021 | SOAR: A Synthesis Approach for Data Science API Refactoring | Ansong Ni, Daniel Ramos, Aidan Z.H. Yang, Ines Lynce, Vasco Manquinho, Ruben Martins, Claire Le Goues |
ICSE 2021 | Same File, Different Changes: The Potential of Meta-Maintenance on GitHub | Hideaki Hata, Raula Gaikovina Kula, Takashi Ishio, Christoph Treude |
ICSE 2021 | Scalable Quantitative Verification For Deep Neural Networks | Teodora Baluta, Zheng Leong Chua, Kuldeep S. Meel, Prateek Saxena |
ICSE 2021 | Seamless Variability Management With the Virtual Platform | Wardah Mahmood, Daniel Strüber, Thorsten Berger, Ralf Laemmel, Mukelabai Mukelabai |
ICSE 2021 | Self-Checking Deep Neural Networks in Deployment | Yan Xiao, Ivan Beschastnikh, David Rosenblum, Changsheng Sun, Sebastian Elbaum, Yun Lin, Jin Song Dong |
ICSE 2021 | Semantic Patches for Adaptation of JavaScript Programs to Evolving Libraries | Benjamin Barslev Nielsen, Martin Toldam Torp, Anders Møller |
ICSE 2021 | Semantic Web Accessibility Testing via Hierarchical Visual Analysis | Mohammad Bajammal, Ali Mesbah |
ICSE 2021 | Semi-supervised Log-based Anomaly Detection via Probabilistic Label Estimation | Lin Yang, Junjie Chen, Zan Wang, Weijing Wang, Jiajun Jiang, Xuyuan Dong, Wenbin Zhang |
ICSE 2021 | Shipwright: A Human-in-the-Loop System for Dockerfile Repair | Jordan Henkel, Denini Silva, Leopoldo Teixeira, Marcelo d'Amorim, Thomas Reps |
ICSE 2021 | Siri, Write the Next Method | Fengcai Wen, Emad Aghajani, Csaba Nagy, Michele Lanza, Gabriele Bavota |
ICSE 2021 | Smart Contract Security: a Practitioners’ Perspective | Zhiyuan Wan, Xin Xia, David Lo, Jiachi Chen, Xiapu Luo, Xiaohu Yang |
ICSE 2021 | Studying Test Annotation Maintenance in the Wild | Dong Jae Kim, Nikolaos Tsantalis, Tse-Hsun (Peter) Chen, Jinqiu Yang |
ICSE 2021 | Studying the Usage of Text-To-Text Transfer Transformer to Support Code-Related Tasks | Antonio Mastropaolo, Simone Scalabrino, Nathan Cooper, David Nader Palacio, Denys Poshyvanyk, Rocco Oliveto, Gabriele Bavota |
ICSE 2021 | Supporting Quality Assurance with Automated Process-Centric Quality Constraints Checking | Christoph Mayr-Dorn, Michael Vierhauser, Stefan Bichler, Felix Keplinger, Jane Cleland-Huang, Alexander Egyed, Thomas Mehofer |
ICSE 2021 | Sustainable Solving: Reducing The Memory Footprint of IFDS-Based Data Flow Analyses Using Intelligent Garbage Collection | Steven Arzt |
ICSE 2021 | Synthesizing Object State Transformers for Dynamic Software Updates | Zelin Zhao, Yanyan Jiang, Chang Xu, Tianxiao Gu, Xiaoxing Ma |
ICSE 2021 | Technical Leverage in a Software Ecosystem: Development Opportunities and Security Risks | Fabio Massacci, Ivan Pashchenko |
ICSE 2021 | Testing Machine Translation via Referential Transparency | Pinjia He, Clara Meister, Zhendong Su |
ICSE 2021 | The Mind Is a Powerful Place: How Showing Code Comprehensibility Metrics Influences Code Understanding | Marvin Wyrich, Andreas Preikschat, Daniel Graziotin, Stefan Wagner |
ICSE 2021 | The Shifting Sands of Motivation: Revisiting What Drives Contributors in Open Source | Marco Gerosa, Igor Scaliante Wiese, Bianca Trinkenreich, Georg Link, Gregorio Robles, Christoph Treude, Igor Steinmacher, Anita Sarma |
ICSE 2021 | Too Quiet in the Library: An Empirical Study of Security Updates in Android Apps’ Native Code | Sumaya Almanee, Arda Ünal, Mathias Payer, Joshua Garcia |
ICSE 2021 | Towards Automating Code Review Activities | Rosalia Tufano, Luca Pascarella, Michele Tufano, Denys Poshyvanyk, Gabriele Bavota |
ICSE 2021 | Trace-Checking CPS Properties: Bridging the Cyber-Physical Gap | Claudio Menghi, Enrico Viganò, Domenico Bianculli, Lionel Briand |
ICSE 2021 | Traceability Transformed: Generating more Accurate Links with Pre-Trained BERT Models | Jinfeng Lin, Yalin Liu, Qingkai Zeng, Meng Jiang, Jane Cleland-Huang |
ICSE 2021 | TransRegex: Multi-modal Regular Expression Synthesis by Generate-and-Repair | Yeting Li, Shuaimin Li, Zhiwu Xu, Jialun Cao, Zixuan Chen, Yun Hu, Haiming Chen, Shing-Chi Cheung |
ICSE 2021 | Understanding Bounding Functions in Safety-Critical UAV Software | Xiaozhou Liang, John Henry Burns, Joseph Sanchez, Karthik Dantu, Lukasz Ziarek, Yu David Liu |
ICSE 2021 | Unrealizable Cores for Reactive Systems Specifications | Shahar Maoz, Rafi Shalom |
ICSE 2021 | Using Domain-specific Corpora for Improved Handling of Ambiguity in Requirements | Saad Ezzini, Sallam Abualhaija, Chetan Arora, Mehrdad Sabetzadeh, Lionel Briand |
ICSE 2021 | Verifying Determinism in Sequential Programs | Rashmi Mudduluru, Jason Waataja, Suzanne Millstein, Michael D. Ernst |
ICSE 2021 | We’ll Fix It in Post: What Do Bug Fixes in Video Game Update Notes Tell Us? | Andrew Truelove, Eduardo Santana de Almeida, Iftekhar Ahmed |
ICSE 2021 | What Makes a Great Maintainer of Open Source Projects? | Edson Dias, Paulo Meirelles, Fernando Castor, Igor Steinmacher, Igor Wiese, Gustavo Pinto |
ICSE 2021 | What helped, and what did not? An Evaluation of the Strategies to Improve Continuous Integration | Xianhao Jin, Francisco Servant |
ICSE 2021 | White-Box Analysis over Machine Learning: Modeling Performance of Configurable Systems | Miguel Velez, Pooyan Jamshidi, Norbert Siegmund, Sven Apel, Christian Kästner |
ICSE 2021 | White-Box Performance-Influence Models: A Profiling and Learning Approach | Max Weber, Sven Apel, Norbert Siegmund |
ICSE 2021 | Why Security Defects Go Unnoticed during Code Reviews? A Case-Control Study of the Chromium OS Project | Rajshakhar Paul, Asif Kamal Turzo, Amiangshu Bosu |
ICSE 2021 | Why don’t Developers Detect Improper Input Validation?'; DROP TABLE Papers; -- | Larissa Braz, Enrico Fregnan, Gül Calikli, Alberto Bacchelli |
ICSE 2021 | “Do this! Do that!, And nothing will happen” Do specifications lead to securely stored passwords? | Joseph Hallett, Nikhil Patnaik, Benjamin Shreeve, Awais Rashid |
ICSE 2021 | “How Was Your Weekend?” Software Development Teams Working From Home During COVID-19 | Courtney Miller, Paige Rodeghero, Margaret-Anne Storey, Denae Ford, Thomas Zimmermann |
FSE 2021 | A Bounded Symbolic-Size Model for Symbolic Execution | David Trabish, Shachar Itzhaky, Noam Rinetzky |
FSE 2021 | A Comprehensive Study of Deep Learning Compiler Bugs | Qingchao Shen, Haoyang Ma, Junjie Chen, Yongqiang Tian, Shing-Chi Cheung, Xiang Chen |
FSE 2021 | A First Look at Developers’ Live Chat on Gitter | Lin Shi, Xiao Chen, Ye Yang, Hanzhi Jiang, Ziyou Jiang, Nan Niu, Qing Wang |
FSE 2021 | A Grounded Theory of the Role of Coordination in Software Security Patch Management | Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar |
FSE 2021 | A Large-Scale Empirical Study on Java Library Migrations: Prevalence, Trends, and Rationales | Hao He, Runzhi He, Haiqiao Gu, Minghui Zhou |
FSE 2021 | A Longitudinal Analysis of Bloated Java Dependencies | César Soto-Valero, Thomas Durieux, Benoit Baudry |
FSE 2021 | A Syntax-Guided Edit Decoder for Neural Program Repair | Qihao Zhu, Zeyu Sun, Yuan-An Xiao, Wenjie Zhang, Kang Yuan, Yingfei Xiong, Lu Zhang |
FSE 2021 | ACHyb: A Hybrid Analysis Approach to Detect Kernel Access Control Vulnerabilities | Yang Hu, Wenxi Wang, Casen Hunger, Riley Wood, Sarfraz Khurshid, Mohit Tiwari |
FSE 2021 | Accelerating JavaScript Static Analysis via Dynamic Shortcuts | Joonyoung Park, Jihyeok Park, Dongjun Youn, Sukyoung Ryu |
FSE 2021 | Algebraic-Datatype Taint Tracking, with Applications to Understanding Android Identifier Leaks | Sydur Rahaman, Iulian Neamtiu, Xin Yin |
FSE 2021 | AlloyMax: Bringing Maximum Satisfaction to Relational Specifications | Changjian Zhang, Ryan Wagner, Pedro Orvalho, David Garlan, Vasco Manquinho, Ruben Martins, Eunsuk Kang |
FSE 2021 | An Automatic Refactoring Framework for Replacing Test-Production Inheritance by Mocking Mechanism | Xiao Wang, Lu Xiao, Tingting Yu, Anne Woepse, Sunny Wong |
FSE 2021 | An Empirical Study on Challenges of Application Development in Serverless Computing | Jinfeng Wen, Zhenpeng Chen, Yi Liu, Yiling Lou, Yun Ma, Gang Huang, Xin Jin, Xuanzhe Liu |
FSE 2021 | An Exploratory Study of Autopilot Software Bugs in Unmanned Aerial Vehicles | Dinghua Wang, Shuqing Li, Guanping Xiao, Yepang Liu, Yulei Sui |
FSE 2021 | Authorship Attribution of Source Code: A Language-Agnostic Approach and Applicability in Software Engineering | Egor Bogomolov, Vladimir Kovalenko, Yurii Rebryk, Alberto Bacchelli, Timofey Bryksin |
FSE 2021 | Automating Serverless Deployments for DevOps Organizations | Daniel Sokolowski, Pascal Weisenburger, Guido Salvaneschi |
FSE 2021 | Automating the Removal of Obsolete TODO Comments | Zhipeng Gao, Xin Xia, David Lo, John Grundy, Thomas Zimmermann |
FSE 2021 | Benchmarking Automated GUI Testing for Android against Real-World Bugs | Ting Su, Jue Wang, Zhendong Su |
FSE 2021 | Bias in Machine Learning Software: Why? How? What to Do? | Joymallya Chakraborty, Suvodeep Majumder, Tim Menzies |
FSE 2021 | Boosting Coverage-Based Fault Localization via Graph-Based Representation Learning | Yiling Lou, Qihao Zhu, Jinhao Dong, Xia Li, Zeyu Sun, Dan Hao, Lu Zhang, Lingming Zhang |
FSE 2021 | Boosting Static Analysis Accuracy with Instrumented Test Executions | Tianyi Chen, Kihong Heo, Mukund Raghothaman |
FSE 2021 | Characterizing Search Activities on Stack Overflow | Jiakun Liu, Sebastian Baltes, Christoph Treude, David Lo, Yun Zhang, Xin Xia |
FSE 2021 | Checking Conformance of Applications against GUI Policies | Zhen Zhang, Yu Feng, Michael D. Ernst, Sebastian Porst, Işıl Dillig |
FSE 2021 | Checking LTL[F,G,X] on Compressed Traces in Polynomial Time | Minjian Zhang, Umang Mathur, Mahesh Viswanathan |
FSE 2021 | Code Integrity Attestation for PLCs using Black Box Neural Network Predictions | Yuqi Chen, Chris Poskitt, Jun Sun |
FSE 2021 | Conditional Interpolation: Making Concurrent Program Verification More Effective | Jie Su, Cong Tian, Zhenhua Duan |
FSE 2021 | Connecting the Dots: Rethinking the Relationship between Code and Prose Writing with Functional Connectivity | Zachary Karas, Andrew Jahn, Westley Weimer, Yu Huang |
FSE 2021 | Context-Aware and Data-Driven Feedback Generation for Programming Assignments | Dowon Song, Woosuk Lee, Hakjoo Oh |
FSE 2021 | Cross-Language Code Search using Static and Dynamic Analyses | George Mathew, Kathryn Stolee |
FSE 2021 | DIFFBASE: A Differential Factbase for Effective Software Evolution Management | Xiuheng Wu, Chenguang Zhu, Yi Li |
FSE 2021 | Data-Driven Accessibility Repair Revisited: On the Effectiveness of Generating Labels for Icons in Android Apps | Forough Mehralian, Navid Salehnamadi, Sam Malek |
FSE 2021 | Demystifying “Bad” Error Messages in Data Science Libraries | Yida Tao, Zhihui Chen, Yepang Liu, Jifeng Xuan, Zhiwu Xu, Shengchao Qin |
FSE 2021 | Detecting Concurrency Vulnerabilities Based on Partial Orders of Memory and Thread Events | Kunpeng Yu, Chenxu Wang, Yan Cai, Xiapu Luo, Zijiang Yang |
FSE 2021 | Detecting Node.js Prototype Pollution Vulnerabilities via Object Lookup Analysis | Song Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao |
FSE 2021 | Detecting and Localizing Keyboard Accessibility Failures in Web Applications | Paul T. Chiou, Ali S. Alotaibi, William G.J. Halfond |
FSE 2021 | Efficient Module-Level Dynamic Analysis for Dynamic Languages with Module Recontextualization | Nikos Vasilakis, Grigoris Ntousakis, Veit Heller, Martin C. Rinard |
FSE 2021 | Embedding App-Library Graph for Neural Third Party Library Recommendation | Bo Li, Qiang He, Feifei Chen, Xin Xia, Li Li, John Grundy, Yun Yang |
FSE 2021 | Empirical Study of Transformers for Source Code | Nadezhda Chirkova, Sergey Troshin |
FSE 2021 | Estimating Residual Risk in Greybox Fuzzing | Marcel Böhme, Danushka Liyanage, Valentin Wüstholz |
FSE 2021 | Explaining Mispredictions of Machine Learning Models using Rule Induction | Jürgen Cito, Işıl Dillig, Seohyun Kim, Vijayaraghavan Murali, Satish Chandra |
FSE 2021 | Exposing Numerical Bugs in Deep Learning via Gradient Back-Propagation | Ming Yan, Junjie Chen, Xiangyu Zhang, Lin Tan, Gan Wang |
FSE 2021 | FLEX: Fixing Flaky Tests in Machine Learning Projects by Updating Assertion Bounds | Saikat Dutta, August Shi, Sasa Misailovic |
FSE 2021 | Fair Preprocessing: Towards Understanding Compositional Fairness of Data Transformers in Machine Learning Pipeline | Sumon Biswas, Hridesh Rajan |
FSE 2021 | Fairea: A Model Behaviour Mutation Approach to Benchmarking Bias Mitigation Methods | Max Hort, Jie M. Zhang, Federica Sarro, Mark Harman |
FSE 2021 | Feature Trace Recording | Paul Maximilian Bittner, Alexander Schultheiß, Thomas Thüm, Timo Kehrer, Jeffrey M. Young, Lukas Linsbauer |
FSE 2021 | Finding Broken Linux Configuration Specifications by Statically Analyzing the KConferenceig Language | Jeho Oh, Necip Fazıl Yıldıran, Julian Braha, Paul Gazzillo |
FSE 2021 | Flaky Test Detection in Android via Event Order Exploration | Zhen Dong, Abhishek Tiwari, Xiao Liang Yu, Abhik Roychoudhury |
FSE 2021 | GLIB: Towards Automated Test Oracle for Graphically-Rich Applications | Ke Chen, Yufei Li, Yingfeng Chen, Changjie Fan, Zhipeng Hu, Wei Yang |
FSE 2021 | Generalizable and Interpretable Learning for Configuration Extrapolation | Yi Ding, Ahsan Pervaiz, Michael Carbin, Henry Hoffmann |
FSE 2021 | Generating Efficient Solvers from Constraint Models | Shu Lin, Na Meng, Wenxin Li |
FSE 2021 | Graph-Based Seed Object Synthesis for Search-Based Unit Testing | Yun Lin, You Sheng Ong, Jun Sun, Gordon Fraser, Jin Song Dong |
FSE 2021 | Hazard Analysis for Human-on-the-Loop Interactions in sUAS Systems | Michael Vierhauser, Md Nafee Al Islam, Ankit Agrawal, Jane Cleland-Huang, James Mason |
FSE 2021 | HeteroFuzz: Fuzz Testing to Detect Platform Dependent Divergence for Heterogeneous Applications | Qian Zhang, Jiyuan Wang, Miryung Kim |
FSE 2021 | How Disabled Tests Manifest in Test Maintainability Challenges? | Dong Jae Kim, Bo Yang, Jinqiu Yang, Tse-Hsun (Peter) Chen |
FSE 2021 | IDE Support for Cloud-Based Static Analyses | Linghui Luo, Martin Schäf, Daniel J Sanchez, Eric Bodden |
FSE 2021 | Identifying Bad Software Changes via Multimodal Anomaly Detection for Online Service Systems | Nengwen Zhao, Junjie Chen, Zhaoyang Yu, Honglin Wang, Jiesong Li, Bin Qiu, Hongyu Xu, Wenchi Zhang, Kaixin Sui, Dan Pei |
FSE 2021 | Identifying Casualty Changes in Software Patches | Adriana Sejfia, Yixue Zhao, Nenad Medvidović |
FSE 2021 | JSISOLATE: Lightweight In-Browser JavaScript Isolation | Mingxue Zhang, Wei Meng |
FSE 2021 | LS-Sampling: An Effective Local Search Based Sampling Approach for Achieving High t-wise Coverage | Chuan Luo, Binqi Sun, Bo Qiao, Junjie Chen, Hongyu Zhang, Jinkun Lin, Qingwei Lin, Dongmei Zhang |
FSE 2021 | LastPyMile: Identifying the Discrepancy between Sources and Packages | Duc Ly Vu, Fabio Massacci, Ivan Pashchenko, Henrik Plate, Antonino Sabetta |
FSE 2021 | Learning-Based Extraction of First-Order Logic Representations of API Directives | Mingwei Liu, Xin Peng, Andrian Marcus, Christoph Treude, Xuefang Bai, Gang Lyu, Jiazhan Xie, Xiaoxin Zhang |
FSE 2021 | Lightweight Global and Local Contexts Guided Method Name Recommendation with Prior Knowledge | Shangwen Wang, Ming Wen, Bo Lin, Xiaoguang Mao |
FSE 2021 | Lightweight and Modular Resource Leak Verification | Martin Kellogg, Narges Shadab, Manu Sridharan, Michael D. Ernst |
FSE 2021 | Metamorphic Testing of Datalog Engines | Muhammad Numair Mansur, Maria Christakis, Valentin Wüstholz |
FSE 2021 | Multi-objectivizing Software Configuration Tuning | Tao Chen, Miqing Li |
FSE 2021 | NIL: Large-Scale Detection of Large-Variance Clones | Tasuku Nakagawa, Yoshiki Higo, Shinji Kusumoto |
FSE 2021 | PHYSFRAME: Type Checking Physical Frames of Reference for Robotic Systems | Sayali Kate, Michael Chinn, Hongjun Choi, Xiangyu Zhang, Sebastian Elbaum |
FSE 2021 | Parallel Shadow Execution to Accelerate the Debugging of Numerical Errors | Sangeeta Chowdhary, Santosh Nagarakatte |
FSE 2021 | Probabilistic Delta Debugging | Guancheng Wang, Ruobing Shen, Junjie Chen, Yingfei Xiong, Lu Zhang |
FSE 2021 | Probing Model Signal-Awareness via Prediction-Preserving Input Minimization | Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim A. Laredo, Alessandro Morari |
FSE 2021 | Reassessing Automatic Evaluation Metrics for Code Summarization Tasks | Devjeet Roy, Sarah Fakhoury, Venera Arnaoudova |
FSE 2021 | Reel Life vs. Real Life: How Software Developers Share Their Daily Life through Vlogs | Souti Chattopadhyay, Thomas Zimmermann, Denae Ford |
FSE 2021 | Semantic Bug Seeding: A Learning-Based Approach for Creating Realistic Bugs | Jibesh Patra, Michael Pradel |
FSE 2021 | Skeletal Approximation Enumeration for SMT Solver Testing | Peisen Yao, Heqing Huang, Wensheng Tang, Qingkai Shi, Rongxin Wu, Charles Zhang |
FSE 2021 | SmartCommit: A Graph-Based Interactive Assistant for Activity-Oriented Commits | Bo Shen, Wei Zhang, Christian Kästner, Haiyan Zhao, Zhao Wei, Guangtai Liang, Zhi Jin |
FSE 2021 | Sound and Efficient Concurrency Bug Prediction | Yan Cai, Hao Yun, Jinqiu Wang, Lei Qiao, Jens Palsberg |
FSE 2021 | StateFormer: Fine-Grained Type Recovery from Binaries using Generative State Modeling | Kexin Pei, Jonas Guan, Matthew Broughton, Zhongtian Chen, Songchen Yao, David Williams-King, Vikas Ummadisetty, Junfeng Yang, Baishakhi Ray, Suman Jana |
FSE 2021 | Sustainability Forecasting for Apache Incubator Projects | Likang Yin, Zhuangzhi Chen, Qi Xuan, Vladimir Filkov |
FSE 2021 | Swarmbug: Debugging Configuration Bugs in Swarm Robotics | Chijung Jung, Ali Ahad, Jinho Jung, Sebastian Elbaum, Yonghwi Kwon |
FSE 2021 | Symbolic Parallel Adaptive Importance Sampling for Probabilistic Program Analysis | Yicheng Luo, Antonio Filieri, Yuan Zhou |
FSE 2021 | SynGuar: Guaranteeing Generalization in Programming by Example | Bo Wang, Teodora Baluta, Aashish Kolluri, Prateek Saxena |
FSE 2021 | Synthesis of Web Layouts from Examples | Dylan Lukes, John Sarracino, Cora Coleman, Hila Peleg, Sorin Lerner, Nadia Polikarpova |
FSE 2021 | TaintStream: Fine-Grained Taint Tracking for Big Data Platforms through Dynamic Code Translation | Chengxu Yang, Yuanchun Li, Mengwei Xu, Zhenpeng Chen, Yunxin Liu, Gang Huang, Xuanzhe Liu |
FSE 2021 | Timely and Accurate Detection of Model Deviation in Self-Adaptive Software-Intensive Systems | Yanxiang Tong, Yi Qin, Yanyan Jiang, Chang Xu, Chun Cao, Xiaoxing Ma |
FSE 2021 | To Read or to Rotate? Comparing the Effects of Technical Reading Training and Spatial Skills Training on Novice Programming Ability | Madeline Endres, Madison Fansher, Priti Shah, Westley Weimer |
FSE 2021 | Toward Efficient Interactions between Python and Native Libraries | Jialiang Tan, Yu Chen, Zhenming Liu, Bin Ren, Shuaiwen Leon Song, Xipeng Shen, Xu Liu |
FSE 2021 | Understanding Neural Code Intelligence through Program Simplification | Md Rafiqul Islam Rabin, Vincent J. Hellendoorn, Amin Alipour |
FSE 2021 | Understanding and Detecting Server-Side Request Races in Web Applications | Zhengyi Qiu, Shudi Shao, Qi Zhao, Guoliang Jin |
FSE 2021 | Validation on Machine Reading Comprehension Software without Annotated Labels: A Property-Based Method | Songqiang Chen, Shuo Jin, Xiaoyuan Xie |
FSE 2021 | VarFix: Balancing Edit Expressiveness and Search Effectiveness in Automated Program Repair | Chu-Pan Wong, Priscila Santiesteban, Christian Kästner, Claire Le Goues |
FSE 2021 | Vet: Identifying and Avoiding UI Exploration Tarpits | Wenyu Wang, Wei Yang, Tianyin Xu, Tao Xie |
FSE 2021 | Vulnerability Detection with Fine-Grained Interpretations | Yi Li, Shaohua Wang, Tien N. Nguyen |
FSE 2021 | Which Abbreviations Should Be Expanded? | Yanjie Jiang, Hui Liu, Yuxia Zhang, Nan Niu, Yuhai Zhao, Lu Zhang |
FSE 2021 | Would You Like a Quick Peek? Providing Logging Support to Monitor Data Processing in Big Data Applications | Zehao Wang, Haoxiang Zhang, Tse-Hsun (Peter) Chen, Shaowei Wang |
FSE 2021 | XAI Tools in the Public Sector: A Case Study on Predicting Combined Sewer Overflows | Nicholas Maltbie, Nan Niu, Matthew Van Doren, Reese Johnson |
FSE 2021 | iBatch: Saving Ethereum Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations | Yibo Wang, Qi Zhang, Kai Li, Yuzhe Tang, Jiaqi Chen, Xiapu Luo, Ting Chen |
FSE 2021 | ÐArcher: Detecting On-Chain-Off-Chain Synchronization Bugs in Decentralized Applications | Wuqi Zhang, Lili Wei, Shuqing Li, Yepang Liu, Shing-Chi Cheung |
ASE 2021 | "What makes my queries slow?": Subgroup Discovery for SQL Workload Analysis | Youcef Remil, Anes Bendimerad, Romain Mathonat, Philippe Chaleat, Mehdi Kaytoue |
ASE 2021 | A Compositional Deadlock Detector for Android Java | James Brotherston, Paul Brunet, Nikos Gorogiannis, Max Kanovich |
ASE 2021 | AID: Efficient Prediction of Aggregated Intensity of Dependency in Large-scale Cloud Systems | Tianyi Yang, Jiacheng Shen, Yuxin Su, Xiao Ling, Yongqiang Yang, Michael Lyu |
ASE 2021 | APIzation: Generating Reusable APIs from StackOverflow Code Snippets | Valerio Terragni, Pasquale Salza |
ASE 2021 | ASE: A Value Set Decision Procedure for Symbolic Execution | Alireza S. Abyaneh, Christoph Kirsch |
ASE 2021 | Adversarial Attacks to API Recommender Systems: Time to Wake Up and Smell the Coffee? | Phuong T. Nguyen, Claudio Di Sipio, Juri Di Rocco, Massimiliano Di Penta, Davide Di Ruscio |
ASE 2021 | An Empirical Study of Bugs in WebAssembly Compilers | Alan Romano, Xinyue Liu, Yonghwi Kwon, Weihang Wang |
ASE 2021 | Automated Repair for Size-Based Inaccessibility Issues in Mobile Apps | Ali S. Alotaibi, Paul T. Chiou, William G.J. Halfond |
ASE 2021 | Automated Testing for Machine Translation via Constituency Invariance | Pin Ji, Yang Feng, Jia Liu, Zhihong Zhao, Baowen Xu |
ASE 2021 | Automated Verification of Go Programs via Bounded Model Checking | Nicolas Dilley, Julien Lange |
ASE 2021 | Automating Developer Chat Mining | Shengyi Pan, Lingfeng Bao , Xiaoxue Ren, Xin Xia, David Lo, Shanping Li |
ASE 2021 | Automating User Notice Generation for Smart Contract Functions | Xing Hu, Zhipeng Gao, Xin Xia, David Lo, Xiaohu Yang |
ASE 2021 | Binary Diffing as a Network Alignment Problem via Belief Propagation | Elie Mengin, Fabrice Rossi |
ASE 2021 | Can neural clone detection generalize to unseen functionalities? | Chenyao Liu, Zeqi Lin, Jian-Guang Lou, Lijie Wen, Dongmei Zhang |
ASE 2021 | Characterizing Transaction-Reverting Statements in Ethereum Smart Contracts | Lu Liu, Lili Wei, Wuqi Zhang, Ming Wen, Yepang Liu, Shing-Chi Cheung |
ASE 2021 | Characterizing and Detecting Configuration Compatibility Issues in Android Apps | Huaxun Huang, Ming Wen, Lili Wei, Yepang Liu, Shing-Chi Cheung |
ASE 2021 | CiFi: Versatile Analysis of Class and Field Immutability | Tobias Roth, Dominik Helm, Michael Reif, Mira Mezini |
ASE 2021 | Context Debloating for Object-Sensitive Pointer Analysis | Dongjie He, Jingbo Lu, Jingling Xue |
ASE 2021 | CorbFuzz: Checking Browser Security Policies with Fuzzing | Chaofan Shou, Ismet Burak Kadron, Qi Su, Tevfik Bultan |
ASE 2021 | Data-Driven Design and Evaluation of SMT Meta-Solving Strategies: Balancing Performance, Accuracy, and Cost | Malte Mues, Falk Howar |
ASE 2021 | Deep GUI: Black-box GUI Input Generation with Deep Learning | Faraz YazdaniBanafsheDaragh, Sam Malek |
ASE 2021 | DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning | Triet Le, David Hin, Roland Croft, Muhammad Ali Babar |
ASE 2021 | DeepMemory: Model-based Memorization Analysis of Deep Neural Language Models | Derui Zhu, Jinfu Chen, Weiyi Shang, Xuebing Zhou, Jens Grossklags, Ahmed E. Hassan |
ASE 2021 | DeepMetis: Augmenting a Deep Learning Test Set to Increase its Mutation Score | Vincenzo Riccio, Nargiz Humbatova, Gunel Jahangirova, Paolo Tonella |
ASE 2021 | Detecting Memory-Related Bugs by Tracking Heap Memory Management of C++ Smart Pointers | Xutong Ma, Jiwei Yan, Wei Wang, Jun Yan, Jian Zhang, Zongyan Qiu |
ASE 2021 | Detecting TensorFlow Program Bugs in Real-World Industrial Environment | Chen Liu, Jie Lu, Guangwei Li, Ting Yuan, Lian Li, Feng Tan, Jun Yang, Liang You, Jingling Xue |
ASE 2021 | Distribution Models for Falsification and Verification of DNNs | Felipe Toledo, David Shriver, Sebastian Elbaum, Matthew B Dwyer |
ASE 2021 | Dynamic Generation of Python Bindings for HPC Kernels | Steven Zhu, Nader Al Awar, Mattan Erez, Milos Gligoric |
ASE 2021 | EditSum: A Retrieve-and-Edit Framework for Source Code Summarization | Jia Li, Yongmin Li, Ge Li, Xing Hu, Xin Xia, Zhi Jin |
ASE 2021 | Efficient SMT-Based Model Checking for Signal Temporal Logic | Jia Lee, Geunyeol Yu, Kyungmin Bae |
ASE 2021 | Efficient state synchronisation in model-based testing through reinforcement learning | Uraz Cengiz Türker, Robert Hierons, Mohammad Reza Mousavi, Ivan Tyukin |
ASE 2021 | End-to-End Automation of Feedback on Student Assembly Programs | Zikai Liu, Tingkai Liu, Qi Li, Wenqing Luo, Steven S. Lumetta |
ASE 2021 | Evolutionary-Guided Synthesis of Verified Pareto Optimal Policies | Simos Gerasimou, Javier Camara, Radu Calinescu, Naif Alasmari, Faisal Alhwikem, Xinwei Fang |
ASE 2021 | FIGCPS: Effective Failure-inducing Input Generation for Cyber-Physical Systems with Deep Reinforcement Learning | Shaohua Zhang, Shuang Liu, Jun Sun, Yuqi Chen, Wenzhi Huang, Jinyi Liu, Jian Liu, Jianye Hao |
ASE 2021 | FRUGAL: Unlocking Semi-supervised Learning for Software Analytics | Huy Tu, Tim Menzies |
ASE 2021 | Faster Mutation Analysis with Fewer Processes and Smaller Overheads | Bo Wang, Sirui Lu, Yingfei Xiong, Feng Liu |
ASE 2021 | Finding A Needle in a Haystack: Automated Mining of Silent Vulnerability Fixes | Jiayuan Zhou, Michael Pacheco, Zhiyuan Wan, Xin Xia, David Lo, Yuan Wang, Ahmed E. Hassan |
ASE 2021 | Finding Replacements for Missing APIs in Library Update | Kaifeng Huang, Bihuan Chen, Linghao Pan, Shuai Wu, Xin Peng |
ASE 2021 | Finding the Missing Piece: Permission Specification Analysis for Android NDK | Hao Zhou, Haoyu Wang, Shuohan Wu, Xiapu Luo, Yajin Zhou, Ting Chen, Ting Wang |
ASE 2021 | FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution | Qiang Liu, Cen Zhang, Lin Ma, Muhui Jiang, Yajin Zhou, Lei Wu, Wenbo Shen, Xiapu Luo, Yang Liu, Kui Ren |
ASE 2021 | Graph-based Incident Aggregation for Large-Scale Online Service Systems | Zhuangbin Chen, Yuxin Su, Jinyang Liu, Hongyu Zhang, Xuemin Wen, Xiao Ling, Yongqiang Yang, Michael Lyu |
ASE 2021 | Groot: An Event-graph-based Approach for Root Cause Analysis in Industrial Settings | Hanzhang Wang, Zhengkai Wu, Huai Jiang, Yichao Huang, Jiamu Wang, Selcuk Kopru, Tao Xie |
ASE 2021 | ISPY: Automatic Issue-Solution Pair Extraction from Community Live Chats | Lin Shi, Ziyou Jiang, Ye Yang, Xiao Chen, YuMin Zhang, Fangwen Mu, Hanzhi Jiang, Qing Wang |
ASE 2021 | Improving Test Case Generation for REST APIs Through Hierarchical Clustering | Dimitri Stallenberg, Mitchell Olsthoorn, Annibale Panichella |
ASE 2021 | InstruGuard: Find and Fix Instrumentation Errors for Coverage-based Greybox Fuzzing | Yuwei Liu, Yanhao Wang, Purui Su, Yuanping Yu, Xiangkun Jia |
ASE 2021 | Intelligent Change Operators for Multi-Objective Refactoring | Chaima Abid, James Ivers, Thiago Ferreira, Marouane Kessentini, Fares El Kahla, Ipek Ozkaya |
ASE 2021 | Interactive Cross-language Code Retrieval with Auto-Encoders | Binger Chen, Ziawasch Abedjan |
ASE 2021 | Is Historical Data an Appropriate Benchmark for Reviewer Recommendation Systems? A Case Study of the Gerrit Community | Ian X. Gauthier, Maxime Lamothe, Gunter Mussbacher, Shane McIntosh |
ASE 2021 | JSTAR: JavaScript Specification Type Analyzer using Refinement | Jihyeok Park, Seungmin An, Shin Wonho, Yusung Sim, Sukyoung Ryu |
ASE 2021 | Learning Domain-Specific Edit Operations from Model Repositories with Frequent Subgraph Mining | Christof Tinnes, Timo Kehrer, Mitchell Joblin, Uwe Hohenstein, Andreas Biesdorf, Sven Apel |
ASE 2021 | Learning Highly Recursive Input Grammars | Neil Kulkarni, Caroline Lemieux, Koushik Sen |
ASE 2021 | Learning Patterns in Configuration | Ranjita Bhagwan, Sonu Mehta, Arjun Radhakrishna, Sahil Garg |
ASE 2021 | Log-based Anomaly Detection Without Log Parsing | Van-Hoang Le, Hongyu Zhang |
ASE 2021 | Mining Cross-Domain Apps for Software Evolution: A Feature-based Approach | MD KAFIL UDDIN, Qiang He, Jun Han, Caslon Chua |
ASE 2021 | Modeling Team Dynamics for the Characterization and Prediction of Delays in User Stories | Elvan Kula, Arie van Deursen, Georgios Gousios |
ASE 2021 | Nekara: Generalized Concurrency Testing | Udit Agarwal, Pantazis Deligiannis, Cheng Huang, Kumseok Jung, Akash Lal, Immad Naseer, Matthew J. Parkinson, Arun Thangamani, Jyothi Vedurada, Yunpeng Xiao |
ASE 2021 | On Multi-Modal Learning of Editing Source Code | Saikat Chakraborty, Baishakhi Ray |
ASE 2021 | On the Real-World Effectiveness of Static Bug Detectors at Finding Null Pointer Exceptions | David A Tomassi, Cindy Rubio-González |
ASE 2021 | Performance Testing for Cloud Computing with Dependent Data Bootstrapping | Sen He, Tianyi Liu, Palden Lama, Jaewoo Lee, In Kee Kim, Wei Wang |
ASE 2021 | PyExplainer: Explaining the Predictions of Just-In-Time Defect Models | Chanathip Pornprasit, Kla Tantithamthavorn, Jirayus Jiarpakdee, Michael Fu, Patanamon Thongtanunam |
ASE 2021 | PyNose: A Test Smell Detector For Python | Tongjie Wang, Yaroslav Golubev, Oleg Smirnov, Jiawei Li, Timofey Bryksin, Iftekhar Ahmed |
ASE 2021 | QDiff: Differential Testing of Quantum Software Stacks | Jiyuan Wang, Qian Zhang, Guoqing Harry Xu, Miryung Kim |
ASE 2021 | RULF: Rust Library Fuzzing via API Dependency Graph Traversal | Jianfeng Jiang, Hui Xu, Yangfan Zhou |
ASE 2021 | Race Detection for Event-Driven Node.js Applications | Xiaoning Chang, Wensheng Dou, Jun Wei, Tao Huang, Jinhui Xie, Yuetang Deng, Jianbo Yang, Jiaheng Yang |
ASE 2021 | Reducing Bug Triaging Confusion by Learning from Mistakes with a Bug Tossing Knowledge Graph | Yanqi Su, Zhenchang Xing, Xin Peng, Xin Xia, Chong Wang, Xiwei (Sherry) Xu, Liming Zhu |
ASE 2021 | Refactorings and Technical Debt in Docker Projects: An Empirical Study | Emna Ksontini, Marouane Kessentini, Thiago Ferreira, Foyzul Hassan |
ASE 2021 | Restoring the Executability of Jupyter Notebooks by Automatic Upgrade of Deprecated APIs | Chenguang Zhu, Ripon Saha, Mukul Prasad, Sarfraz Khurshid |
ASE 2021 | SATune: A Study-Driven Auto-Tuning Approach for Configurable Software Verification Tools | Ugur Koc, Austin Mordahl, Shiyi Wei, Jeffrey S. Foster, Adam Porter |
ASE 2021 | SMARTIAN : Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses | Jaeseung Choi, Doyeon Kim, Soomin Kim, Gustavo Grieco, Alex Groce, Sang Kil Cha |
ASE 2021 | Subtle Bugs Everywhere: Generating Documentation for Data Wrangling Code | Chenyang Yang, Shurui Zhou, Jin L.C. Guo, Christian Kästner |
ASE 2021 | Targeting Requirements Violations of Autonomous Driving Systems by Dynamic Evolutionary Search | Yixing Luo, Xiao-Yi Zhang, Paolo Arcaini, Zhi Jin, Haiyan Zhao, Fuyuki Ishikawa, Rongxin Wu, Tao Xie |
ASE 2021 | Testing Your Question Answering Software via Asking Recursively | Songqiang Chen, Shuo Jin, Xiaoyuan Xie |
ASE 2021 | Thinking Like a Developer? Comparing the Attention of Humans with Neural Models of Code | Matteo Paltenghi, Michael Pradel |
ASE 2021 | Towards Exploring the Limitations of Active Learning: An Empirical Study | Qiang Hu, Yuejun GUo, Maxime Cordy, Xiaofei Xie, Wei Ma, Mike Papadakis, Yves Le Traon |
ASE 2021 | Transcode: Detecting Status Code Mapping Errors in Large-Scale Systems | Wensheng Tang, Yikun Hu, Gang Fan, Peisen Yao, Rongxin Wu, Guangyuan Bai, Pengcheng Wang, Charles Zhang |
ASE 2021 | UI Test Migration Across Mobile Platforms | Saghar Talebipour, Yixue Zhao, Luka Dojcilovic, Chenggang Li, Nenad Medvidović |
ASE 2021 | Understanding and Detecting Performance Bugs in Markdown Compilers | Penghui Li, Yinxi Liu, Wei Meng |
ASE 2021 | Unsupervised Labeling and Extraction of Phrase-based Concepts in Vulnerability Descriptions | Sofonias Yitagesu, Zhenchang Xing, Xiaowang Zhang, Zhiyong Feng, Xiaohong Li, Linyi Han |
ASE 2021 | VizSmith: Automated Visualization Synthesis by Mining Data-Science Notebooks | Rohan Bavishi, Shadaj Laddad, Hiroaki Yoshida, Mukul Prasad, Koushik Sen |
ASE 2021 | Where to Start: Studying Type Annotation Practices in Python | Wuxia Jin, Dinghong Zhong, Zifan Ding, Ming Fan, Ting Liu |
ASE 2021 | Why Do Developers Remove Lambda Expressions in Java? | Mingwei Zheng, Jun Yang, Ming Wen, Hengcheng Zhu, Yepang Liu, Hai Jin |
ASE 2021 | iFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware | Peiyu Liu, Shouling Ji, Xuhong Zhang, Qinming Dai, Kangjie Lu, Lirong Fu, Wenzhi Chen, Peng Cheng, Wenhai Wang, Raheem Beyah |
ISSTA 2021 | A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries | Han Gao, Shaoyin Cheng, Yinxing Xue, Weiming Zhang |
ISSTA 2021 | AdvDoor: Adversarial Backdoor Attack of Deep Learning System | Quan Zhang, Yifeng Ding, Yongqiang Tian, Jianmin Guo, Min Yuan, Yu Jiang |
ISSTA 2021 | An Infrastructure Approach to Improving Effectiveness of Android UI Testing Tools | Wenyu Wang, Wing Lam, Tao Xie |
ISSTA 2021 | Attack as Defense: Characterizing Adversarial Examples using Robustness | Zhe Zhao, Guangke Chen, Jingyi Wang, Yiwei Yang, Fu Song, Jun Sun |
ISSTA 2021 | Automated Patch Backporting in Linux (Experience Paper) | Ridwan Salihin Shariffdeen, Xiang Gao, Gregory J. Duck, Shin Hwei Tan, Julia Lawall, Abhik Roychoudhury |
ISSTA 2021 | Automatic Test Suite Generation for Key-Points Detection DNNs using Many-Objective Search (Experience Paper) | Fitash Ul Haq, Donghwan Shin, Lionel Briand, Thomas Stifter, Jun Wang |
ISSTA 2021 | Boosting Symbolic Execution via Constraint Solving Time Prediction (Experience Paper) | Sicheng Luo, Hui Xu, Yanxiang Bi, Xin Wang, Yangfan Zhou |
ISSTA 2021 | Challenges and Opportunities: An In-Depth Empirical Study on Configuration Error Injection Testing | Wang Li, Zhouyang Jia, Shanshan Li, Yuanliang Zhang, Teng Wang, Erci Xu, Ji Wang, Liao Xiangke |
ISSTA 2021 | Continuous Test Suite Failure Prediction | Cong Pan, Michael Pradel |
ISSTA 2021 | Deep Just-in-Time Defect Prediction: How Far Are We? | Zhengran Zeng, Yuqun Zhang, Haotian Zhang, Lingming Zhang |
ISSTA 2021 | DeepCrime: Mutation Testing of Deep Learning Systems Based on Real Faults | Nargiz Humbatova, Gunel Jahangirova, Paolo Tonella |
ISSTA 2021 | DeepHyperion: Exploring the Feature Space of Deep Learning-Based Systems through Illumination Search | Tahereh Zohdinasab, Vincenzo Riccio, Alessio Gambi, Paolo Tonella |
ISSTA 2021 | DialTest: Automated Testing for Recurrent-Neural-Network-Driven Dialogue Systems | Zixi Liu, Yang Feng, Zhenyu Chen |
ISSTA 2021 | Efficient White-Box Fairness Testing through Gradient Search | Lingfeng Zhang, Yueling Zhang, Min Zhang |
ISSTA 2021 | Empirical Evaluation of Smart Contract Testing: What Is the Best Choice? | Meng Ren, Zijing Yin, Fuchen Ma, Zhenyang Xu, Yu Jiang, Chengnian Sun, Huizhong Li, Yan Cai |
ISSTA 2021 | Empirically Evaluating Readily Available Information for Regression Test Optimization in Continuous Integration | Daniel Elsner, Florian Hauer, Alexander Pretschner, Silke Reimer |
ISSTA 2021 | Exposing Previously Undetectable Faults in Deep Neural Networks | Isaac Dunn, Hadrien Pouget, Daniel Kroening, Tom Melham |
ISSTA 2021 | Faster, Deeper, Easier: Crowdsourcing Diagnosis of Microservice Kernel Failure from User Space | Yicheng Pan, Meng Ma, Xinrui Jiang, Ping Wang |
ISSTA 2021 | Finding Data Compatibility Bugs with JSON Subschema Checking | Andrew Habib, Avraham Shinnar, Martin Hirzel, Michael Pradel |
ISSTA 2021 | Fixing Dependency Errors for Python Build Reproducibility | Suchita Mukherjee, Abigail Almanza, Cindy Rubio-González |
ISSTA 2021 | Fuzzing SMT Solvers via Two-Dimensional Input Space Exploration | Peisen Yao, Heqing Huang, Wensheng Tang, Qingkai Shi, Rongxin Wu, Charles Zhang |
ISSTA 2021 | GUIDER: GUI Structure and Vision Co-Guided Test Script Repair for Android Apps | Tongtong Xu, Minxue Pan, Yu Pei, Guiyin Li, Xia Zeng, Tian Zhang, Yuetang Deng, Xuandong Li |
ISSTA 2021 | Gramatron: Effective Grammar-Aware Fuzzing | Prashast Srivastava, Mathias Payer |
ISSTA 2021 | Grammar-Agnostic Symbolic Execution by Token Symbolization | Weiyu Pan, Zhenbang Chen, Guofeng Zhang, Yunlai Luo, Yufeng Zhang, Ji Wang |
ISSTA 2021 | HomDroid: Detecting Android Covert Malware by Social-Network Homophily Analysis | Yueming Wu, Deqing Zou, Wei Yang, Xiang Li, Hai Jin |
ISSTA 2021 | Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms | Kulani Tharaka Mahadewa, Yanjun Zhang, Guangdong Bai, Lei Bu, Zhiqiang Zuo, Dileepa Fernando, Zhenkai Liang, Jin Song Dong |
ISSTA 2021 | Interval Constraint-Based Mutation Testing of Numerical Specifications | Clothilde Jeangoudoux, Eva Darulova, Christoph Lauter |
ISSTA 2021 | Log-Based Slicing for System-Level Test Cases | Salma Messaoudi, Donghwan Shin, Annibale Panichella, Domenico Bianculli, Lionel Briand |
ISSTA 2021 | Model-Based Testing of Networked Applications | Yishuai Li, Benjamin C. Pierce, Steve Zdancewic |
ISSTA 2021 | ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection | Yuanchun Li, Ziqi Zhang, Bingyan Liu, Ziyue Yang, Yunxin Liu |
ISSTA 2021 | Modular Call Graph Construction for Security Scanning of Node.js Applications | Benjamin Barslev Nielsen, Martin Toldam Torp, Anders Møller |
ISSTA 2021 | Parema: An Unpacking Framework for Demystifying VM-Based Android Packers | Lei Xue, Yuxiao Yan, Luyi Yan, Muhui Jiang, Xiapu Luo, Dinghao Wu, Yajin Zhou |
ISSTA 2021 | Predoo: Precision Testing of Deep Learning Operators | Xufan Zhang, Ning Sun, Chunrong Fang, Jiawei Liu, Jia Liu, Dong Chai, Jiang Wang, Zhenyu Chen |
ISSTA 2021 | QFuzz: Quantitative Fuzzing for Side Channels | Yannic Noller, Saeid Tizpaz-Niari |
ISSTA 2021 | RAProducer: Efficiently Diagnose and Reproduce Data Race Bugs for Binaries via Trace Analysis | Ming Yuan, Yeseop Lee, Chao Zhang, Yun Li, Yan Cai, Bodong Zhao |
ISSTA 2021 | Runtime Detection of Memory Errors with Smart Status | Zhe Chen, Chong Wang, Junqi Yan, Yulei Sui, Jingling Xue |
ISSTA 2021 | SAND: A Static Analysis Approach for Detecting SQL Antipatterns | Yingjun Lyu, Sasha Volokh, William G.J. Halfond, Omer Tripp |
ISSTA 2021 | Seed Selection for Successful Fuzzing | Adrian Herrera, Hendra Gunadi, Shane Magrath, Michael Norrish, Mathias Payer, Tony Hosking |
ISSTA 2021 | Semantic Matching of GUI Events for Test Reuse: Are We There Yet? | Leonardo Mariani, Ali Mohebbi, Mauro Pezze, Valerio Terragni |
ISSTA 2021 | Semantic Table Structure Identification in Spreadsheets | Yakun Zhang, Xiao Lv, Haoyu Dong, Wensheng Dou, Shi Han, Dongmei Zhang, Jun Wei, Dan Ye |
ISSTA 2021 | Synthesize Solving Strategy for Symbolic Execution | Zhenbang Chen, Zehua Chen, Ziqi Shuai, Guofeng Zhang, Weiyu Pan, Yufeng Zhang, Ji Wang |
ISSTA 2021 | TERA: Optimizing Stochastic Regression Tests in Machine Learning Projects | Saikat Dutta, Jeeva Selvam, Aryaman Jain, Sasa Misailovic |
ISSTA 2021 | Test-Case Prioritization for Configuration Testing | Runxiang Cheng, Lingming Zhang, Darko Marinov, Tianyin Xu |
ISSTA 2021 | The Impact of Tool Configuration Spaces on the Evaluation of Configurable Taint Analysis for Android | Austin Mordahl, Shiyi Wei |
ISSTA 2021 | Toward Optimal MC/DC Test Case Generation | Sangharatna Godboley, Joxan Jaffar, Rasool Maghareh, Arpita Dutta |
ISSTA 2021 | Type and Interval Aware Array Constraint Solving for Symbolic Execution | Ziqi Shuai, Zhenbang Chen, Yufeng Zhang, Jun Sun, Ji Wang |
ISSTA 2021 | UAFSan: An Object-Identifier-Based Dynamic Approach for Detecting Use-After-Free Vulnerabilities | Binfa Gui, Wei Song, Jeff Huang |
ISSTA 2021 | Understanding and Finding System Setting-Related Defects in Android Apps | Jingling Sun, Ting Su, Junxin Li, Zhen Dong, Geguang Pu, Tao Xie, Zhendong Su |
ISSTA 2021 | Validating Static Warnings via Testing Code Fragments | Ashwin Kallingal Joshy, Xueyuan Chen, Benjamin Steenhoek, Wei Le |
ISSTA 2021 | WebEvo: Taming Web Application Evolution via Detecting Semantic Structure Changes | Fei Shao, Rui Xu, Wasif Haque, Jingwei Xu, Ying Zhang, Wei Yang, Yanfang Ye, Xusheng Xiao |
ISSTA 2021 | iDEV: Exploring and Exploiting Semantic Deviations in ARM Instruction Processing | Shisong Qin, Chao Zhang, Kaixiang Chen, Zheming Li |
ICSE 2020 | A Comprehensive Study of Autonomous Vehicle Bugs | Joshua Garcia, Yang Feng, Junjie Shen, Sumaya Almanee, Yuan Xia, Qi Alfred Chen |
ICSE 2020 | A Cost-efficient Approach to Building in Continuous Integration | Xianhao Jin, Francisco Servant |
ICSE 2020 | A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons Learned | Bingchang Liu, Guozhu Meng, Chao Zhang, Feng Li, Qi Gong, Min Lin, Dandan Sun, Wei Huo, Wei Zou |
ICSE 2020 | A Novel Approach to Tracing Safety Requirements and State-Based Design Models | Mounifah Alenazi, Nan Niu, Juha Savolainen |
ICSE 2020 | A Study on the Lifecycle of Flaky Tests | Wing Lam, Kıvanç Muşlu, Hitesh Sajnani, Suresh Thummalapenta |
ICSE 2020 | A Study on the Prevalence of Human Values in Software Engineering Publications, 2015 – 2018 | Jon Whittle, Gillian Oliver, Waqar Hussain, Davoud Mougouei, Harsha Perera, Arif Nurwidyantoro, Rifat Ara Shams |
ICSE 2020 | A Tale from the Trenches: Cognitive Biases and Software Development | Souti Chattopadhyay, Nicholas Nelson, Audrey Au, Natalia Morales, Christopher Sanchez, Rahul Pandita, Anita Sarma |
ICSE 2020 | Accessibility Issues in Android Apps: State of Affairs, Sentiments, and Ways Forward | Abdulaziz Alshayban, Iftekhar Ahmed, Sam Malek |
ICSE 2020 | Adapting Requirements Models to Varying Environments | Dalal Alrajeh, Antoine Cailliau, Axel van Lamsweerde |
ICSE 2020 | An Empirical Assessment of Security Risks of Global Android Banking Apps | Sen Chen, Lingling Fan, Guozhu Meng, Ting Su, Jason Minhui Xue, Yinxing Xue, Yang Liu, Lihua Xu |
ICSE 2020 | An Empirical Study on API Parameter Rules | Hao Zhong, Na Meng, Zexuan Li, Li Jia |
ICSE 2020 | An Empirical Study on Program Failures of Deep Learning Jobs | Ru Zhang, Wencong Xiao, Hongyu Zhang, Yu Liu, Haoxiang Lin, Mao Yang |
ICSE 2020 | An Evidence-Based Inquiry into the Use of Grey Literature in Software Engineering | He Zhang, Xin Zhou, Xin Huang, Huang Huang, Muhammad Ali Babar |
ICSE 2020 | An Investigation of Cross-Project Learning in Online Just-In-Time Software Defect Prediction | Sadia Tabassum, Leandro Minku, Danyi Feng, George Cabral, Liyan Song |
ICSE 2020 | Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference | Valentin Manès, Soomin Kim, Sang Kil Cha |
ICSE 2020 | Approximation-Refinement Testing of Compute-Intensive Cyber-Physical Models: An Approach Based on System Identification | Claudio Menghi, Shiva Nejati, Lionel Briand, Yago Isasi Parache |
ICSE 2020 | Automatic Testing and Improvement of Machine Translation | Zeyu Sun, Jie M. Zhang, Mark Harman, Mike Papadakis, Lu Zhang |
ICSE 2020 | Automatically Testing String Solvers | Alexandra Bugariu, Peter Müller |
ICSE 2020 | BCFA: Bespoke Control Flow Analysis for CFA at Scale | Ramanathan Ramu, Ganesha Upadhyaya, Hoan Anh Nguyen, Hridesh Rajan |
ICSE 2020 | Big Code != Big Vocabulary: Open-Vocabulary Models for Source code | Rafael-Michael Karampatsis, Hlib Babii, Romain Robbes, Charles Sutton, Andrea Janes |
ICSE 2020 | Burn After Reading: A Shadow Stack with Microsecond-level Runtime Rerandomization for Protecting Return Addresses | Changwei Zou, Jingling Xue |
ICSE 2020 | CC2Vec: Distributed Representations of Code Changes | Thong Hoang, Hong Jin Kang, Julia Lawall, David Lo |
ICSE 2020 | CPC: Automatically Classifying and Propagating Natural Language Comments via Program Analysis | Juan Zhai, Xiangzhe Xu, Yu Shi, Guanhong Tao, Minxue Pan, Shiqing Ma, Lei Xu, Weifeng Zhang, Lin Tan, Xiangyu Zhang |
ICSE 2020 | Caspar: Extracting and Synthesizing User Stories of Problems from App Reviews | Hui Guo, Munindar P. Singh |
ICSE 2020 | Causal Testing: Understanding Defects' Root Causes | Brittany Johnson, Yuriy Brun, Alexandra Meliou |
ICSE 2020 | Co-Evolving Code with Evolving Metamodels | Djamel Eddine Khelladi, Benoit Combemale, Mathieu Acher, Olivier Barais, Jean-Marc Jézéquel |
ICSE 2020 | Collaborative Bug Finding for Android Apps | Shin Hwei Tan, Ziqiang Li |
ICSE 2020 | ComboDroid: Generating High-Quality Test Inputs for Android Apps via Use Case Combinations | Jue Wang, Yanyan Jiang, Chang Xu, Chun Cao, Xiaoxing Ma, Jian Lu |
ICSE 2020 | Comparing Formal Tools for System Design: a Judgment Study | Alessio Ferrari, Franco Mazzanti, Davide Basile, Maurice H. ter Beek, Alessandro Fantechi |
ICSE 2020 | Conquering the Extensional Scalability Problem for Value-Flow Analysis Frameworks | Qingkai Shi, Rongxin Wu, Gang Fan, Charles Zhang |
ICSE 2020 | Context-aware In-process Crowdworker Recommendation | Junjie Wang, Ye Yang, Song Wang, Yuanzhe Hu, Dandan Wang, Qing Wang |
ICSE 2020 | DISSECTOR: Input Validation for Deep Learning Applications by Crossing-layer Dissection | Huiyan Wang, Jingwei Xu, Chang Xu, Xiaoxing Ma, Jian Lu |
ICSE 2020 | DLFix: Context-based Code Transformation Learning for Automated Program Repair | Yi Li, Shaohua Wang, Tien N. Nguyen |
ICSE 2020 | Debugging Inputs | Lukas Kirschner, Ezekiel Soremekun, Andreas Zeller |
ICSE 2020 | DeepBillboard: Systematic Physical-World Testing of Autonomous Driving Systems | Husheng Zhou, Wei Li, Zelun Kong, Junfeng Guo, Yuqun Zhang, Lingming Zhang, Bei Yu, Cong Liu |
ICSE 2020 | Demystify Official API Usage Directives with Crowdsourced API Misuse Scenarios, Erroneous Code Examples and Patches | Xiaoxue Ren, Zhenchang Xing, Jiamou Sun, Xin Xia, JianLing Sun |
ICSE 2020 | Detection of Hidden Feature Requests from Massive Chat Messages via Deep Siamese Network | Lin Shi, Mingzhe Xing, Mingyang Li, Yawen Wang, Shoubin Li, Qing Wang |
ICSE 2020 | Efficient Generation of Error-Inducing Floating-Point Inputs via Symbolic Execution | Hui Guo, Cindy Rubio-González |
ICSE 2020 | Empirical Review of Automated Analysis Tools on 47,587 Ethereum Smart Contracts | Thomas Durieux, João F. Ferreira, Rui Abreu, Pedro Cruz |
ICSE 2020 | Engineering Gender-Inclusivity into Software: Ten Teams' Tales from the Trenches | Claudia Hilderbrand, Christopher Perdriau, Lara Letaw, Jillian Emard, Zoe Steine-Hanson, Margaret Burnett, Anita Sarma |
ICSE 2020 | Establishing Multilevel Test-to-Code Traceability Links | Robert White, Jens Krinke, Raymond Tan |
ICSE 2020 | Explaining Pair Programming Session Dynamics from Knowledge Gaps | Franz Zieris, Lutz Prechelt |
ICSE 2020 | Extracting Taint Specifications for JavaScript Libraries | Cristian-Alexandru Staicu, Martin Toldam Torp, Max Schaefer, Anders Møller, Michael Pradel |
ICSE 2020 | Finding Client-side Business Flow Tampering Vulnerabilities | I Luk Kim, Yunhui Zheng, Hogun Park, Weihang Wang, Wei You, Yousra Aafer, Xiangyu Zhang |
ICSE 2020 | Fuzz Testing based Data Augmentation to Improve Robustness of Deep Neural Networks | Xiang Gao, Ripon Saha, Mukul Prasad, Abhik Roychoudhury |
ICSE 2020 | Gang of Eight: A Defect Taxonomy for Infrastructure as Code Scripts | Akond Rahman, Effat Farhana, Chris Parnin, Laurie Williams |
ICSE 2020 | Gap between Theory and Practice : An Empirical Study of Security Patches in Solidity | Sungjae Hwang, Sukyoung Ryu |
ICSE 2020 | HARP: Holistic Analysis for Refactoring Python-Based Analytics Programs | Weijie Zhou, Yue Zhao, Guoqiang Zhang, Xipeng Shen |
ICSE 2020 | Heaps'n Leaks: How Heap Snapshots Improve Android Taint Analysis | Manuel Benz, Erik Krogh Kristensen, Linghui Luo, Nataniel Borges Jr., Eric Bodden, Andreas Zeller |
ICSE 2020 | Here We Go Again: Why Is It Difficult for Developers to Learn Another Programming Language? | Nischal Shrestha, Colton Botta, Titus Barik, Chris Parnin |
ICSE 2020 | HeteroRefactor: Refactoring for Heterogeneous Computing with FPGA | Aishwarya Sivaraman, Jason Lau, Qian Zhang, Muhammad Ali Gulzar, Jason Cong, Miryung Kim |
ICSE 2020 | How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale Study | Hao Xia, Yuan Zhang, Yingtian Zhou, Xiaoting Chen, Yang Wang, Xiangyu Zhang, Shuaishuai Cui, Geng Hong, Xiaohan Zhang, Min Yang, Zhemin Yang |
ICSE 2020 | How Does MisConferenceiguration of Analytic Services Compromise Mobile Privacy? | Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Travis Breaux, Jianwei Niu |
ICSE 2020 | How Has Forking Changed in the Last 20 Years? A Study of Hard Forks on GitHub | Shurui Zhou, Bogdan Vasilescu, Christian Kästner |
ICSE 2020 | How Software Practitioners Use Informal Local Meetups to Share Software Engineering Knowledge | Claire Ingram, Anders Drachen |
ICSE 2020 | How do Companies Collaborate in Open Source Ecosystems? An Empirical Study of OpenStack | Yuxia Zhang, Minghui Zhou, Klaas-Jan Stol, Jianyu Wu, Zhi Jin |
ICSE 2020 | How to Not Get Rich: An Empirical Study of Donations in Open Source | Cassandra Overney, Jens Meinicke, Christian Kästner, Bogdan Vasilescu |
ICSE 2020 | HyDiff: Hybrid Differential Software Analysis | Yannic Noller, Corina S. Pasareanu, Marcel Böhme, Youcheng Sun, Hoang Lam Nguyen, Lars Grunske |
ICSE 2020 | Impact Analysis of Cross-Project Bugs on Software Ecosystems | Wanwangying Ma, Lin Chen, Xiangyu Zhang, Yang Feng, Zhaogui Xu, Zhifei Chen, Yuming Zhou, Baowen Xu |
ICSE 2020 | Importance-Driven Deep Learning System Testing | Simos Gerasimou, Hasan Ferit Eniser, Alper Sen, Alper Çakan |
ICSE 2020 | Improving Data Scientist Efficiency with Provenance | Jingmei Hu, Jiwon Joung, Maia Jacobs, Margo Seltzer, Krzysztof Gajos |
ICSE 2020 | Improving the Effectiveness of Traceability Link Recovery using Hierarchical Bayesian Networks | Kevin Moran, David Nader Palacio, Carlos Bernal-Cárdenas, Denys Poshyvanyk, Daniel McCrystal, Chris Shenefiel, Jeff Johnson |
ICSE 2020 | Interpreting Cloud Computer Vision Pain-Points: A Mining Study of Stack Overflow | Alex Cummaudo, Rajesh Vasa, Scott Barnett, John Grundy, Mohamed Abdelrazek |
ICSE 2020 | Is Rust Used Safely by Software Developers? | Ana Nora Evans, Bradford Campbell, Mary Lou Soffa |
ICSE 2020 | JVM Fuzzing for JIT-Induced Side-Channel Detection | Tegan Brennan, Seemanta Saha, Tevfik Bultan |
ICSE 2020 | Lazy Product Discovery in Huge Configuration Spaces | Michael Lienhardt, Ferruccio Damiani, Einar Broch Johnsen, Jacopo Mauro |
ICSE 2020 | Learning from, Understanding, and Supporting DevOps Artifacts for Docker | Jordan Henkel, Christian Bird, Shuvendu K. Lahiri, Thomas Reps |
ICSE 2020 | Learning-to-Rank vs Ranking-to-Learn: Strategies for Regression Testing in Continuous Integration | Antonia Bertolino, Antonio Guerriero, Breno Miranda, Roberto Pietrantuono, Stefano Russo |
ICSE 2020 | Low-Overhead Deadlock Prediction | Yan Cai, Ruijie Meng, Jens Palsberg |
ICSE 2020 | Managing data constraints in database-backed web applications | Junwen Yang, Utsav Sethi, Cong Yan, Alvin Cheung, Shan Lu |
ICSE 2020 | MemLock: Memory Usage Guided Fuzzing | Cheng Wen, Haijun Wang, Yuekang Li, Shengchao Qin, Yang Liu, Zhiwu Xu, Hongxu Chen, Xiaofei Xie, Geguang Pu, Ting Liu |
ICSE 2020 | Misbehaviour Prediction for Autonomous Driving Systems | Andrea Stocco, Michael Weiss, Marco Calzana, Paolo Tonella |
ICSE 2020 | Mitigating Turnover with Code Review Recommendation: Balancing Expertise, Workload, and Knowledge Distribution | Ehsan Mirsaeedi, Peter Rigby |
ICSE 2020 | Multiple-Entry Testing of Android Applications by Constructing Activity Launching Contexts | Jiwei Yan, Hao Liu, Linjie Pan, Jun Yan, Jian Zhang, Bin Liang |
ICSE 2020 | Near-Duplicate Detection in Web App Model Inference | Rahulkrishna Yandrapally, Andrea Stocco, Ali Mesbah |
ICSE 2020 | Neurological Divide: An fMRI Study of Prose and Code Writing | Ryan Krueger, Yu Huang, Xinyu Liu, Tyler Santander, Westley Weimer, Kevin Leach |
ICSE 2020 | On Learning Meaningful Assert Statements for Unit Test Cases | Cody Watson, Michele Tufano, Kevin Moran, Gabriele Bavota, Denys Poshyvanyk |
ICSE 2020 | On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs | Kui Liu, Shangwen Wang, Anil Koyuncu, Kisub Kim, Tegawendé F. Bissyandé, Dongsun Kim, Peng Wu, Jacques Klein, Xiaoguang Mao, Yves Le Traon |
ICSE 2020 | On the Recall of Static Call Graph Construction in Practice | Li Sui, Jens Dietrich, Amjed Tahir, George Fourtounis |
ICSE 2020 | One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning Types | Anastasia Danilova, Alena Naiakshina, Matthew Smith |
ICSE 2020 | Pipelining Bottom-up Data Flow Analysis | Qingkai Shi, Charles Zhang |
ICSE 2020 | Planning for Untangling: Predicting the Difficulty of Merge Conflicts | Caius Brindescu, Iftekhar Ahmed, Rafael Leano, Anita Sarma |
ICSE 2020 | Posit: Simultaneously Tagging Natural and Programming Languages | Profir-Petru Pârțachi, Santanu Dash, Christoph Treude, Earl T. Barr |
ICSE 2020 | Practical Fault Detection in Puppet Programs | Thodoris Sotiropoulos, Dimitris Mitropoulos, Diomidis Spinellis |
ICSE 2020 | Primers or Reminders? The Effects of Existing Review Comments on Code Review | Davide Spadini, Gül Calikli, Alberto Bacchelli |
ICSE 2020 | Pushback in Code Review: Characterizing and Detecting Negative Interpersonal Interactions | Carolyn Egelman, Emerson Murphy-Hill, Liz Kammer, Margaret Morrow Hodges, Collin Green, Ciera Jaspan, James Lin |
ICSE 2020 | Quickly Generating Diverse Valid Test Inputs with Reinforcement Learning | Sameer Reddy, Caroline Lemieux, Rohan Padhye, Koushik Sen |
ICSE 2020 | Recognizing Developers' Emotions while Programming | Daniela Girardi, Nicole Novielli, Davide Fucci, Filippo Lanubile |
ICSE 2020 | Reducing Run-Time Adaptation Space via Analysis of Possible Utility Bounds | Clay Stevens, Hamid Bagheri |
ICSE 2020 | ReluDiff: Differential Verification of Deep Neural Networks | Brandon Paulsen, Jingbo Wang, Chao Wang |
ICSE 2020 | Repairing Deep Neural Networks: Fix Patterns and Challenges | Md Johirul Islam, Rangeet Pan, Giang Nguyen, Hridesh Rajan |
ICSE 2020 | Retrieval-based Neural Source Code Summarization | Jian Zhang, Xu Wang, Hongyu Zhang, Hailong Sun, Xudong Liu |
ICSE 2020 | Revealing Injection Vulnerabilities by Leveraging Existing Tests | Katherine Hough, Gebrehiwet Biyane Welearegai, Christian Hammer, Jonathan Bell |
ICSE 2020 | RoScript: A Visual Script Driven Truly Non-Intrusive Robotic Testing System for Touch Screen Applications | Ju Qian, Zhengyu Shang, Shuoyan Yan, Yan Wang, Lin Chen |
ICSE 2020 | SAVER: Scalable, Precise, and Safe Memory-Error Repair | Seongjoon Hong, Junhee Lee, Jeongsoo Lee, Hakjoo Oh |
ICSE 2020 | SLACC: Simion-based Language Agnostic Code Clones | George Mathew, Chris Parnin, Kathryn Stolee |
ICSE 2020 | SLEMI: Equivalence Modulo Input (EMI) Based Mutation of CPS Models for Finding Compiler Bugs in Simulink | Shafiul Azam Chowdhury, Sohil Lal Shrestha, Taylor T Johnson, Christoph Csallner |
ICSE 2020 | Scaling Open Source Communities: an Empirical Study of the Linux kernel | Xin Tan, Minghui Zhou, Brian Fitzgerald |
ICSE 2020 | Schrödinger's Security: Opening the Box on App Developers' Security Rationale | Dirk van der Linden, Pauline Anthonysamy, Bashar Nuseibeh, Thein Tun, Marian Petre, Mark Levine, John Towse, Awais Rashid |
ICSE 2020 | Securing UnSafe Rust Programs with XRust | Peiming Liu, Gang Zhao, Jeff Huang |
ICSE 2020 | Seenomaly: Vision-Based Linting of GUI Animation Effects Against Design-Don’t Guidelines | Dehai Zhao, Zhenchang Xing, Chunyang Chen, Xiwei (Sherry) Xu, Liming Zhu, Guoqiang Li, Jinshui Wang |
ICSE 2020 | Simulee: Detecting CUDA Synchronization Bugs via Memory-Access Modeling | Mingyuan Wu, Yicheng Ouyang, Husheng Zhou, Lingming Zhang, Cong Liu, Yuqun Zhang |
ICSE 2020 | Software Documentation: The Practitioners' Perspective | Emad Aghajani, Csaba Nagy, Mario Linares-Vásquez, Laura Moreno, Gabriele Bavota, Michele Lanza, David C. Shepherd |
ICSE 2020 | Software Visualization and Deep Transfer Learning for Effective Software Defect Prediction | Jinyin Chen, Keke Hu, Yue Yu, Zhuangzhi Chen, Qi Xuan, Yi Liu, Vladimir Filkov |
ICSE 2020 | SpecuSym: Speculative Symbolic Execution for Cache Timing Leak Detection | Shengjian Guo, Yueqi Chen, Peng Li, Yueqiang Cheng, Huibo Wang, Meng Wu, Zhiqiang Zuo |
ICSE 2020 | Structure-Invariant Testing for Machine Translation | Pinjia He, Clara Meister, Zhendong Su |
ICSE 2020 | Studying the Use of Java Logging Utilities in the Wild | Boyuan Chen, Zhen Ming (Jack) Jiang |
ICSE 2020 | Suggesting Natural Method Names to Check Name Consistencies | Son Nguyen, Hung Phan, Trinh Le, Tien N. Nguyen |
ICSE 2020 | Symbolic Verification of Message Passing Interface Programs | Hengbiao Yu, Zhenbang Chen, Xianjin Fu, Ji Wang, Zhendong Su, Jun Sun, Chun Huang, Wei Dong |
ICSE 2020 | TRADER: Trace Divergence Analysis and Embedding Regulation for Debugging Recurrent Neural Networks | Guanhong Tao, Shiqing Ma, Yingqi Liu, Qiuling Xu, Xiangyu Zhang |
ICSE 2020 | Tailoring Programs for Static Analysis via Program Transformation | Rijnard van Tonder, Claire Le Goues |
ICSE 2020 | Taming Behavioral Backward Incompatibilities via Cross-Project Testing and Analysis | Lingchao Chen, Foyzul Hassan, Xiaoyin Wang, Lingming Zhang |
ICSE 2020 | Targeted Greybox Fuzzing with Static Lookahead Analysis | Valentin Wüstholz, Maria Christakis |
ICSE 2020 | Taxonomy of Real Faults in Deep Learning Systems | Nargiz Humbatova, Gunel Jahangirova, Gabriele Bavota, Vincenzo Riccio, Andrea Stocco, Paolo Tonella |
ICSE 2020 | Testing DNN Image Classifier for Confusion & Bias Errors | Yuchi Tian, Ziyuan Zhong, Vicente Ordonez, Gail Kaiser, Baishakhi Ray |
ICSE 2020 | Testing File System Implementations on Layered Models | Dongjie Chen, Yanyan Jiang, Chang Xu, Xiaoxing Ma, Jian Lu |
ICSE 2020 | Time-travel Testing of Android Apps | Zhen Dong, Marcel Böhme, Lucia Cojocaru, Abhik Roychoudhury |
ICSE 2020 | Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty | Xiyue Zhang, Xiaofei Xie, Lei Ma, Xiaoning Du, Qiang Hu, Yang Liu, Jianjun Zhao, Meng Sun |
ICSE 2020 | Towards the Use of the Readily Available Tests from the Release Pipeline as Performance Tests. Are We There Yet? | Zishuo Ding, Jinfu Chen, Weiyi Shang |
ICSE 2020 | Translating Video Recordings of Mobile App Usages into Replayable Scenarios | Carlos Bernal-Cárdenas, Nathan Cooper, Kevin Moran, Oscar Chaparro, Andrian Marcus, Denys Poshyvanyk |
ICSE 2020 | Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities | Haijun Wang, Xiaofei Xie, Yi Li, Cheng Wen, Yuekang Li, Yang Liu, Shengchao Qin, Hongxu Chen, Yulei Sui |
ICSE 2020 | Unblind Your Apps: Predicting Natural-Language Labels for Mobile GUI Components by Deep Learning | Jieshan Chen, Chunyang Chen, Zhenchang Xing, Xiwei (Sherry) Xu, Liming Zhu, Guoqiang Li, Jinshui Wang |
ICSE 2020 | Understanding the Automated Parameter Optimization on Transfer Learning for Cross-Project Defect Prediction: An Empirical Study | Ke Li, Zilin Xiang, Tao Chen, Shuo Wang, Kay Chen Tan |
ICSE 2020 | Unsuccessful Story about Few Shot Malware-Family Classification and Siamese Network to the Rescue | Yude Bai, Zhenchang Xing, Xiaohong Li, Zhiyong Feng, Duoyuan Ma |
ICSE 2020 | Verifying Object Construction | Martin Kellogg, Manli Ran, Manu Sridharan, Martin Schäf, Michael D. Ernst |
ICSE 2020 | Watchman: Monitoring Dependency Conflicts for Python Library Ecosystem | Ying Wang, Ming Wen, Yepang Liu, Yibo Wang, Zhenming Li, Chao Wang, Hai Yu, Shing-Chi Cheung, Chang Xu, Zhiliang Zhu |
ICSE 2020 | When APIs are Intentionally Bypassed: An Exploratory Study of API Workarounds | Maxime Lamothe, Weiyi Shang |
ICSE 2020 | White-box Fairness Testing through Adversarial Sampling | Peixin Zhang, Jingyi Wang, Jun Sun, Guoliang Dong, Xinyu Wang, Xingen Wang, Jin Song Dong, Dai Ting |
ICSE 2020 | sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart Contracts | Tai D. Nguyen, Long H. Pham, Jun Sun, Yun Lin, Minh Quang Tran |
FSE 2020 | A Behavioral Notion of Robustness for Software Systems | Changjian Zhang, David Garlan, Eunsuk Kang |
FSE 2020 | A Comprehensive Study on Challenges in Deploying Deep Learning Based Software | Zhenpeng Chen, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Tao Xie, Xuanzhe Liu |
FSE 2020 | A First Look at Good First Issues on GitHub | Xin Tan, Minghui Zhou, Zeyu Sun |
FSE 2020 | A Principled Approach to GraphQL Query Cost Analysis | Alan Cha, Erik Wittern, Guillaume Baudart, James C. Davis, Louis Mandel, Jim A. Laredo |
FSE 2020 | A Randomized Controlled Trial on the Effects of Embedded Computer Language Switching | P. Merlin Uesbeck, Cole S. Peterson, Bonita Sharif, Andreas Stefik |
FSE 2020 | A Theory of the Engagement in Open Source Projects via Summer of Code Programs | Jefferson Silva, Igor Wiese, Daniel M. German, Christoph Treude, Marco Gerosa, Igor Steinmacher |
FSE 2020 | AMS: Generating AutoML Search Spaces from Weak Specifications | José Pablo Cambronero, Jürgen Cito, Martin C. Rinard |
FSE 2020 | API Method Recommendation via Explicit Matching of Functionality Verb Phrases | Wenkai Xie, Xin Peng, Mingwei Liu, Christoph Treude, Zhenchang Xing, Xiaoxin Zhang, Wenyun Zhao |
FSE 2020 | ARDiff: Scaling Program Equivalence Checking via Iterative Abstraction and Refinement of Common Code | Sahar Badihi, Faridah Akinotcho, Yi Li, Julia Rubin |
FSE 2020 | All Your App Links Are Belong to Us: Understanding the Threats of Instant Apps Based Attacks | Yutian Tang, Yulei Sui, Haoyu Wang, Xiapu Luo, Hao Zhou, Zhou Xu |
FSE 2020 | An Empirical Analysis of the Costs of Clone- and Platform-Oriented Software Reuse | Jacob Krüger, Thorsten Berger |
FSE 2020 | An Empirical Study of Bots in Software Development: Characteristics and Challenges from a Practitioner’s Perspective | Linda Erlenhov, Francisco Gomes de Oliveira Neto, Philipp Leitner |
FSE 2020 | An Evaluation of Methods to Port Legacy Code to SGX Enclaves | Kripa Shanker, Arun Joseph, Vinod Ganapathy |
FSE 2020 | Automated Construction of Energy Test Oracles for Android | Reyhaneh Jabbarvand, Forough Mehralian, Sam Malek |
FSE 2020 | Automatically Identifying Performance Issue Reports with Heuristic Linguistic Patterns | Yutong Zhao, Lu Xiao, Pouria Babvey, Lei Sun, Sunny Wong, Angel A. Martinez, Xiao Wang |
FSE 2020 | Baital: An Adaptive Weighted Sampling Approach for Improved t-wise Coverage | Eduard Baranov, Axel Legay, Kuldeep S. Meel |
FSE 2020 | Beware the Evolving ‘Intelligent’ Web Service! An Integration Architecture Tactic to Guard AI-First Components | Alex Cummaudo, Scott Barnett, Rajesh Vasa, John Grundy, Mohamed Abdelrazek |
FSE 2020 | Biases and Differences in Code Review using Medical Imaging and Eye-Tracking: Genders, Humans, and Machines | Yu Huang, Kevin Leach, Zohreh Sharafi, Nicholas McKay, Tyler Santander, Westley Weimer |
FSE 2020 | Block Public Access: Trust Safety Verification of Access Control Policies | Malik Bouchet, Byron Cook, Bryant Cutler, Anna Druzkina, Andrew Gacek, Liana Hadarean, Ranjit Jhala, Brad Marshall, Dan Peebles, Neha Rungta, Cole Schlesinger, Chriss Stephens, Carsten Varming, Andy Warfield |
FSE 2020 | Boosting Fuzzer Efficiency: An Information Theoretic Perspective | Marcel Böhme, Valentin Manès, Sang Kil Cha |
FSE 2020 | Borrowing Your Enemy’s Arrows: The Case of Code Reuse in Android via Direct Inter-app Code Invocation | Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein |
FSE 2020 | C2S: Translating Natural Language Comments to Formal Program Specifications | Juan Zhai, Yu Shi, Minxue Pan, Guian Zhou, Yongxiang Liu, Chunrong Fang, Shiqing Ma, Lin Tan, Xiangyu Zhang |
FSE 2020 | Calm Energy Accounting for Multithreaded Java Applications | Timur Babakol, Anthony Canino, Khaled Mahmoud, Rachit Saxena, Yu David Liu |
FSE 2020 | Code Recommendation for Exception Handling | Tam Nguyen, Phong Vu, Tung Nguyen |
FSE 2020 | Community Expectations for Research Artifacts and Evaluation Processes | Ben Hermann, Stefan Winter, Janet Siegmund |
FSE 2020 | Configuration Smells in Continuous Delivery Pipelines: A Linter and a Six-Month Study on GitLab | Carmine Vassallo, Sebastian Proksch, Anna Jancso, Harald Gall, Massimiliano Di Penta |
FSE 2020 | Conversations on ML Testing 1 | Fabrice Harel-Canada, Ming Yan, Sakshi Udeshi, Shenao Yan, Yuhao Zhang, Zenan Li, Ziqi Zhang, Hamid Bagheri |
FSE 2020 | Conversations on Security | Frederico Araujo, Kripa Shanker, Pan Bian, Salah Ghamizi, Tamara Lopez, Chaima Abid, Ben Hermann |
FSE 2020 | Correlations between Deep Neural Network Model Coverage Criteria and Model Quality | Shenao Yan, Guanhong Tao, Xuwei Liu, Juan Zhai, Shiqing Ma, Lei Xu, Xiangyu Zhang |
FSE 2020 | Cost Measures Matter for Mutation Testing Study Validity | Giovani Guizzo, Federica Sarro, Mark Harman |
FSE 2020 | CrFuzz: Fuzzing Multi-purpose Programs through Input Validation | Suhwan Song, Chengyu Song, Yeongjin Jang, Byoungyoung Lee |
FSE 2020 | DENAS: Automated Rule Generation by Knowledge Extraction from Neural Networks | Simin Chen, Soroush Bateni, Sampath Grandhi, Xiaodi Li, Cong Liu, Wei Yang |
FSE 2020 | Deep Learning Library Testing via Effective Model Generation | Zan Wang, Ming Yan, Junjie Chen, Shuang Liu, Dongdi Zhang |
FSE 2020 | DeepSearch: A Simple and Effective Blackbox Attack for Deep Neural Networks | Fuyuan Zhang, Sankalan Pal Chowdhury, Maria Christakis |
FSE 2020 | Detecting Critical Bugs in SMT Solvers Using Blackbox Mutational Fuzzing | Muhammad Numair Mansur, Maria Christakis, Valentin Wüstholz, Fuyuan Zhang |
FSE 2020 | Detecting Numerical Bugs in Neural Network Architectures | Yuhao Zhang, Luyao Ren, Liqian Chen, Yingfei Xiong, Shing-Chi Cheung, Tao Xie |
FSE 2020 | Detecting Optimization Bugs in Database Engines via Non-optimizing Reference Engine Construction | Manuel Rigger, Zhendong Su |
FSE 2020 | Detecting and Understanding JavaScript Global Identifier Conflicts on the Web | Mingxue Zhang, Wei Meng |
FSE 2020 | Dimensions of Software Configuration: On the Configuration Context in Modern Software Development | Norbert Siegmund, Nicolai Ruckel, Janet Siegmund |
FSE 2020 | Do the Machine Learning Models on a Crowd Sourced Platform Exhibit Bias? An Empirical Study on Model Fairness | Sumon Biswas, Hridesh Rajan |
FSE 2020 | Docable: Evaluating the Executability of Software Tutorials | Samim Mirhosseini, Chris Parnin |
FSE 2020 | Does Stress Impact Technical Interview Performance? | Mahnaz (Mana) Behroozi, Shivani Shirolkar, Titus Barik, Chris Parnin |
FSE 2020 | Domain-Independent Interprocedural Program Analysis using Block-Abstraction Memoization | Dirk Beyer, Karlheinz Friedberger |
FSE 2020 | Dynamic Slicing for Deep Neural Networks | Ziqi Zhang, Yuanchun Li, Yao Guo, Xiangqun Chen, Yunxin Liu |
FSE 2020 | Dynamically ReConferenceiguring Software Microbenchmarks: Reducing Execution Time without Sacrificing Result Quality | Christoph Laaber, Stefan Würsten, Harald Gall, Philipp Leitner |
FSE 2020 | Efficient Binary-Level Coverage Analysis | M. Ammar Ben Khadra, Dominik Stoffel, Wolfgang Kunz |
FSE 2020 | Efficient Incident Identification from Multi-dimensional Issue Reports via Meta-heuristic Search | Jiazhen Gu, Chuan Luo, Si Qin, Bo Qiao, Qingwei Lin, Hongyu Zhang, Ze Li, Yingnong Dang, Shaowei Cai, Wei-Cheng Wu, Yangfan Zhou, Murali Chintalapati, Dongmei Zhang |
FSE 2020 | Efficiently Finding Higher-Order Mutants | Chu-Pan Wong, Jens Meinicke, Leo Chen, João Paulo Diniz, Christian Kästner, Eduardo Figueiredo |
FSE 2020 | Evolutionary Improvement of Assertion Oracles | Valerio Terragni, Gunel Jahangirova, Paolo Tonella, Mauro Pezze |
FSE 2020 | Exploring How Deprecated Python Library APIs Are (Not) Handled | Jiawei Wang, Li Li, Kui Liu, Haipeng Cai |
FSE 2020 | Exploring the Evolution of Software Practices | Yvonne Dittrich, Christian Bo Michelsen, Paolo Tell, Pernille Lous, Allan Ebdrup |
FSE 2020 | Fairway: A Way to Build Fair ML Software | Joymallya Chakraborty, Suvodeep Majumder, Zhe Yu, Tim Menzies |
FSE 2020 | Flexeme: Untangling Commits Using Lexical Flows | Profir-Petru Pârțachi, Santanu Dash, Miltiadis Allamanis, Earl T. Barr |
FSE 2020 | FrUITeR: A Framework for Evaluating UI Test Reuse | Yixue Zhao, Justin Chen, Adriana Sejfia, Marcelo Schmitt Laser, Jie M. Zhang, Federica Sarro, Mark Harman, Nenad Medvidović |
FSE 2020 | Fuzzing: On the Exponential Cost of Vulnerability Discovery | Marcel Böhme, Brandon Falk |
FSE 2020 | Global Cost/Quality Management across Multiple Applications | Liu Liu, Sibren Isaacman, Uli Kremer |
FSE 2020 | HISyn: Human Learning-Inspired Natural Language Programming | Zifan Nan, Hui Guan, Xipeng Shen |
FSE 2020 | Heard It through the Gitvine: An Empirical Study of Tool Diffusion across the npm Ecosystem | Hemank Lamba, Asher Trockman, Daniel Armanios, Christian Kästner, Heather Miller, Bogdan Vasilescu |
FSE 2020 | Identifying Linked Incidents in Large-Scale Online Service Systems | Yujun Chen, Xian Yang, Hang Dong, Xiaoting He, Hongyu Zhang, Qingwei Lin, Junjie Chen, Pu Zhao, Yu Kang, Feng Gao, Zhangwei Xu, Dongmei Zhang |
FSE 2020 | Inductive Program Synthesis over Noisy Data | Shivam Handa, Martin C. Rinard |
FSE 2020 | Inherent Vacuity for GR(1) Specifications | Shahar Maoz, Rafi Shalom |
FSE 2020 | Intelligent REST API Data Fuzzing | Patrice Godefroid, Bo-Yuan Huang, Marina Polishchuk |
FSE 2020 | Interactive, Effort-Aware Library Version Harmonization | Kaifeng Huang, Bihuan Chen, Bowen Shi, Ying Wang, Congying Xu, Xin Peng |
FSE 2020 | Interval Counterexamples for Loop Invariant Learning | Rongchen Xu, Fei He, Bow-Yaw Wang |
FSE 2020 | Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? | Fabrice Harel-Canada, Lingxiao Wang, Muhammad Ali Gulzar, Quanquan Gu, Miryung Kim |
FSE 2020 | JShrink: In-Depth Investigation into Debloating Modern Java Applications | Bobby Bruce, Tianyi Zhang, Jaspreet Arora, Guoqing Harry Xu, Miryung Kim |
FSE 2020 | Java Ranger: Statically Summarizing Regions for Efficient Symbolic Execution of Java | Vaibhav Sharma, Soha Hussein, Michael Whalen, Stephen McCamant, Willem Visser |
FSE 2020 | MTFuzz: Fuzzing with a Multi-task Neural Network | Dongdong She, Rahul Krishna, Lu Yan, Suman Jana, Baishakhi Ray |
FSE 2020 | Machine Translation Testing via Pathological Invariance | Shashij Gupta, Pinjia He, Clara Meister, Zhendong Su |
FSE 2020 | Making Symbolic Execution Promising by Learning Aggressive State-Pruning Strategy | Sooyoung Cha, Hakjoo Oh |
FSE 2020 | Mining Assumptions for Software Components using Machine Learning | Khouloud Gaaloul, Claudio Menghi, Shiva Nejati, Lionel Briand, David Wolfe |
FSE 2020 | Mining Input Grammars from Dynamic Control Flow | Rahul Gopinath, Björn Mathis, Andreas Zeller |
FSE 2020 | Model-Based Exploration of the Frontier of Behaviours for Deep Learning System Testing | Vincenzo Riccio, Paolo Tonella |
FSE 2020 | Modular Collaborative Program Analysis in OPAL | Dominik Helm, Florian Kübler, Michael Reif, Michael Eichberg, Mira Mezini |
FSE 2020 | Object Detection for Graphical User Interface: Old Fashioned or Deep Learning or a Combination? | Jieshan Chen, Mulong Xie, Zhenchang Xing, Chunyang Chen, Xiwei (Sherry) Xu, Liming Zhu, Guoqiang Li |
FSE 2020 | On Decomposing a Deep Neural Network into Modules | Rangeet Pan, Hridesh Rajan |
FSE 2020 | On the Naturalness of Hardware Descriptions | Jaeseong Lee, Pengyu Nie, Junyi Jessy Li, Milos Gligoric |
FSE 2020 | On the Relationship between Design Discussions and Design Quality: A Case Study of Apache Projects | Umme Ayda Mannan, Iftekhar Ahmed, Carlos Jensen, Anita Sarma |
FSE 2020 | On the Relationship between Refactoring Actions and Bugs: A Differentiated Replication | Massimiliano Di Penta, Gabriele Bavota, Fiorella Zampetti |
FSE 2020 | Operational Calibration: Debugging Confidence Errors for DNNs in the Field | Zenan Li, Xiaoxing Ma, Chang Xu, Jingwei Xu, Chun Cao, Jian Lu |
FSE 2020 | Past-Sensitive Pointer Analysis for Symbolic Execution | David Trabish, Timotej Kapus, Noam Rinetzky, Cristian Cadar |
FSE 2020 | Questions for Data Scientists in Software Engineering: A Replication | Hennie Huijgens, Ayushi Rastogi, Ernst Mulders, Georgios Gousios, Arie van Deursen |
FSE 2020 | Real-Time Incident Prediction for Online Service Systems | Nengwen Zhao, Junjie Chen, Zhou Wang, Xiao Peng, Gang Wang, Yong Wu, Fang Zhou, Zhen Feng, Xiaohui Nie, Wenchi Zhang, Kaixin Sui, Dan Pei |
FSE 2020 | Recommending Stack Overflow Posts for Fixing Runtime Exceptions using Failure Scenario Matching | Sonal Mahajan, Negarsadat Abolhassani, Mukul Prasad |
FSE 2020 | Reducing Implicit Gender Biases in Software Development: Does Intergroup Contact Theory Work? | Yi Wang, Min Zhang |
FSE 2020 | Robotics Software Engineering: A Perspective from the Service Robotics Domain | Sergio Garcia, Daniel Strüber, Davide Brugali, Thorsten Berger, Patrizio Pelliccione |
FSE 2020 | RulePad: Interactive Authoring of Checkable Design Rules | Sahar Mehrpour, Thomas LaToza, Hamed Sarvari |
FSE 2020 | Search-Based Adversarial Testing and Improvement of Constrained Credit Scoring Systems | Salah Ghamizi, Maxime Cordy, Martin Gubri, Mike Papadakis, Andrey Boystov, Yves Le Traon, Anne Goujon |
FSE 2020 | Selecting Third-Party Libraries: The Practitioners’ Perspective | Enrique Larios Vargas, Maurício Aniche, Christoph Treude, Magiel Bruntink, Georgios Gousios |
FSE 2020 | SinkFinder: Harvesting Hundreds of Unknown Interesting Function Pairs with Just One Seed | Pan Bian, Bin Liang, Jianjun Huang, Wenchang Shi, Xidong Wang, Jian Zhang |
FSE 2020 | Static Asynchronous Component Misuse Detection for Android Applications | Linjie Pan, Baoquan Cui, Hao Liu, Jiwei Yan, Siqi Wang, Jun Yan, Jian Zhang |
FSE 2020 | Testing Self-Adaptive Software with Probabilistic Guarantees on Performance Metrics | Claudio Mandrioli, Martina Maggio |
FSE 2020 | Thinking Aloud about Confusing Code: A Qualitative Investigation of Program Comprehension and Atoms of Confusion | Dan Gopstein , Anne-Laure Fayard, Sven Apel, Justin Cappos |
FSE 2020 | Towards Automated Verification of Smart Contract Fairness | Ye Liu, Yi Li, Shang-Wei Lin, Rong Zhao |
FSE 2020 | TypeWriter: Neural Type Prediction with Search-Based Validation | Michael Pradel, Georgios Gousios, Jason Liu, Satish Chandra |
FSE 2020 | UBITect: A Precise and Scalable Method to Detect Use-before-Initialization Bugs in Linux Kernel | Yizhuo Zhai, Yu Hao, Hang Zhang, Daimeng Wang, Chengyu Song, Zhiyun Qian, Mohsen Lesani, Srikanth V. Krishnamurthy, Paul Yu |
FSE 2020 | Understanding Build Issue Resolution in Practice: Symptoms and Fix Patterns | Yiling Lou, Zhenpeng Chen, Yanbin Cao, Dan Hao, Lu Zhang |
FSE 2020 | Understanding Type Changes in Java | Ameya Ketkar, Nikolaos Tsantalis, Danny Dig |
FSE 2020 | Understanding and Automatically Detecting Conflicting Interactions between Smart Home IoT Applications | Rahmadi Trimananda, Seyed Amir Hossein Aqajari, Jason Chuang, Brian Demsky, Guoqing Harry Xu, Shan Lu |
FSE 2020 | Understanding and Discovering Software Configuration Dependencies in Cloud and Datacenter Systems | Qingrong Chen, Teng Wang, Owolabi Legunsen, Shanshan Li, Tianyin Xu |
FSE 2020 | Understanding the Impact of GitHub Suggested Changes on Recommendations between Developers | Chris Brown, Chris Parnin |
FSE 2020 | When Does My Program Do This? Learning Circumstances of Software Behavior | Alexander Kampmann, Nikolas Havrikov, Ezekiel O. Soremekun, Andreas Zeller |
FSE 2020 | eQual: Informing Early Design Decisions | Arman Shahbazian, Suhrid Karthik, Yuriy Brun, Nenad Medvidović |
ASE 2020 | A Deep Multitask Learning Approach for Requirements Discovery and Annotation from Open Forum | Mingyang Li, Lin Shi, Ye Yang, Qing Wang |
ASE 2020 | A Predictive Analysis for Detecting Deadlock in MPI Programs | Yu Huang, Benjamin Ogles, Eric Mercer |
ASE 2020 | API-Misuse Detection Driven by Fine-Grained API-Constraint Knowledge Graph | Xiaoxue Ren, Xinyuan Ye, Zhenchang Xing, Xin Xia, Xiwei (Sherry) Xu, Liming Zhu, JianLing Sun |
ASE 2020 | Accelerating All-SAT Computation with Short Blocking Clauses | Yueling Zhang, Geguang Pu, Jun Sun |
ASE 2020 | Assessing and Restoring Reproducibility of Jupyter Notebooks | Jiawei Wang, Tzu-yang Kuo, Li Li, Andreas Zeller |
ASE 2020 | Attend and Represent: A Novel View on Algorithm Selection for Software Verification | Cedric Richter, Heike Wehrheim |
ASE 2020 | Audee: Automated Testing for Deep Learning Frameworks | Qianyu Guo, Xiaofei Xie, Yi Li, Xiaoyu Zhang, Yang Liu, Xiaohong Li, Chao Shen |
ASE 2020 | Automated Implementation of Windows-related Security-Configuration Guides | Patrick Stöckle, Bernd Grobauer, Alexander Pretschner |
ASE 2020 | Automated Patch Correctness Assessment: How Far are We? | Shangwen Wang, Ming Wen, Bo Lin, Hongjun Wu, Yihao Qin, Deqing Zou, Xiaoguang Mao, Hai Jin |
ASE 2020 | Automated Third-party Library Detection for Android Applications: Are We There Yet? | Xian Zhan, Lingling Fan, Tianming Liu, Sen Chen, Li Li, Haoyu Wang, Yifei Xu, Xiapu Luo, Yang Liu |
ASE 2020 | Automatic Extraction of Cause-Effect-Relations from Requirements Artifacts | Julian Frattini, Maximilian Junker, Michael Unterkalmsteiner, Daniel Mendez |
ASE 2020 | Automating Just-In-Time Comment Updating | Zhongxin Liu, Xin Xia, Meng Yan, Shanping Li |
ASE 2020 | BiLO-CPDP: Bi-Level Programming for Automated Model Discovery in Cross-Project Defect Prediction | Ke Li, Zilin Xiang, Tao Chen, Kay Chen Tan |
ASE 2020 | BigFuzz: Efficient Fuzz Testing for Data Analytics using Framework Abstraction | Qian Zhang, Jiyuan Wang, Muhammad Ali Gulzar, Rohan Padhye, Miryung Kim |
ASE 2020 | Broadening Horizons of Multilingual Static Analysis: Semantic Summary Extraction from C Code for JNI Program Analysis | Sungho Lee, Hyogun Lee, Sukyoung Ryu |
ASE 2020 | BuildFast: History-Aware Build Outcome Prediction for Fast Feedback and Reduced Cost in Continuous Integration | Bihuan Chen, Linlin Chen, Chen Zhang, Xin Peng |
ASE 2020 | CCGraph: a PDG-based code clone detector with approximate graph matching | Yue Zou, Bihuan Ban, Yinxing Xue, Yun Xu |
ASE 2020 | CP-Detector: Using Configuration-related Performance Properties to Expose Performance Bugs | Haochen He, Zhouyang Jia, Shanshan Li, Erci Xu, Tingting Yu, Yue Yu, Ji Wang, Liao Xiangke |
ASE 2020 | Cats Are Not Fish: Deep Learning Testing Calls for Out-Of-Distribution Awareness | David Berend, Xiaofei Xie, Lei Ma, Lingjun Zhou, Yang Liu, Chi Xu, Jianjun Zhao |
ASE 2020 | ChemTest: An Automated Software Testing Framework for an Emerging Paradigm | Michael C. Gerten, James I. Lathrop, Myra Cohen, Titus H. Klinge |
ASE 2020 | CoFI: Consistency-Guided Fault Injection for Cloud Systems | Haicheng Chen, Wensheng Dou, Dong Wang, Feng Qin |
ASE 2020 | Code to Comment "Translation": Data, Metrics, Baselining & Evaluation | David Gros, Hariharan Sezhiyan, Prem Devanbu, Zhou Yu |
ASE 2020 | Continuous Compliance | Martin Kellogg, Martin Schäf, Serdar Tasiran, Michael D. Ernst |
ASE 2020 | Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts | Yinxing Xue, Mingliang Ma, Yun Lin, Yulei Sui, Jiaming Ye, Tianyong Peng |
ASE 2020 | DeepTC-Enhancer: Improving the Readability of Automatically Generated Tests | Devjeet Roy, Ziyi Zhang, Maggie Ma, Venera Arnaoudova, Annibale Panichella, Sebastiano Panichella, Danielle Gonzalez, Mehdi Mirakhorli |
ASE 2020 | Defect Prediction Guided Search-Based Software Testing | Anjana Perera, Aldeida Aleti, Marcel Böhme, Burak Turhan |
ASE 2020 | Demystifying Diehard Android Apps | Hao Zhou, Haoyu Wang, Yajin Zhou, Xiapu Luo, Yutian Tang, Lei Xue, Ting Wang |
ASE 2020 | Demystifying Loops in Smart Contracts | Benjamin Mariano, Yanju Chen, Yu Feng, Shuvendu K. Lahiri, Işıl Dillig |
ASE 2020 | Detecting and Explaining Self-Admitted Technical Debts with Attention-based Neural Networks | Xin Wang, Jin Liu, Li Li, Xiao Chen, Xiao Liu, Hao Wu |
ASE 2020 | ER Catcher: A Static Analysis Framework for Accurate and Scalable Event-Race Detection in Android | Navid Salehnamadi, Abdulaziz Alshayban, Iftekhar Ahmed, Sam Malek |
ASE 2020 | Enhanced Compiler Bug Isolation via Memoized Search | Junjie Chen, Haoyang Ma, Lingming Zhang |
ASE 2020 | Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair | Haoye Tian, Kui Liu, Abdoul Kader Kaboré, Anil Koyuncu, Li Li, Jacques Klein, Tegawendé F. Bissyandé |
ASE 2020 | Exploring the Architectural Impact of Possible Dependencies in Python software | Wuxia Jin, Yuanfang Cai, Rick Kazman, Gang Zhang, Qinghua Zheng, Ting Liu |
ASE 2020 | FlashRegex: Deducing Anti-ReDoS Regexes from Examples | Yeting Li, Zhiwu Xu, Jialun Cao, Haiming Chen, Tingjian Ge, Shing-Chi Cheung, Haoren Zhao |
ASE 2020 | Generating Concept based API Element Comparison Using a Knowledge Graph | Yang Liu, Mingwei Liu, Xin Peng, Christoph Treude, Zhenchang Xing, Xiaoxin Zhang |
ASE 2020 | Good Things Come In Threes: Improving Search-based Crash Reproduction With Helper Objectives | Pouria Derakhshanfar, Xavier Devroey, Andy Zaidman, Arie van Deursen, Annibale Panichella |
ASE 2020 | How Incidental are the Incidents? Characterizing and Prioritizing Incidents for Large-Scale Online Service Systems | Junjie Chen, Shu Zhang, Xiaoting He, Qingwei Lin, Hongyu Zhang, Dan Hao, Yu Kang, Feng Gao, Zhangwei Xu, Yingnong Dang, Dongmei Zhang |
ASE 2020 | Hybrid Deep Neural Networks to Infer State Models of Black-Box Systems | Mohammad Jafar Mashhadi, Hadi Hemmati |
ASE 2020 | Identifying Software Performance Changes Across Variants and Versions | Stefan Mühlbauer, Sven Apel, Norbert Siegmund |
ASE 2020 | Identifying and Describing Information Seeking Tasks | Chris Satterfield, Thomas Fritz, Gail Murphy |
ASE 2020 | Inferring and Applying Def-Use Like Configuration Couplings in Deployment Descriptors | Chengyuan Wen, Yaxuan Zhang, Xiao He, Na Meng |
ASE 2020 | Interval Change-Point Detection for Runtime Probabilistic Model Checking | Xingyu Zhao, Radu Calinescu, Simos Gerasimou, Valentin Robu, David Flynn |
ASE 2020 | JISET: JavaScript IR-based Semantics Extraction Toolchain | Jihyeok Park, Jihee Park, Seungmin An, Sukyoung Ryu |
ASE 2020 | Just-In-Time Reactive Synthesis | Shahar Maoz, Ilia Shevrin |
ASE 2020 | Learning to Handle Exceptions | Jian Zhang, Xu Wang, Hongyu Zhang, Hailong Sun, Yanjun Pu, Xudong Liu |
ASE 2020 | Legion: Best-First Concolic Testing | Dongge Liu, Gidon Ernst, Toby Murray, Benjamin I.P. Rubinstein |
ASE 2020 | M3: Semantic API Migrations | Bruce Collie, Philip Ginsbach, Jackson Woodruff, Ajitha Rajan, Michael F. P. O'Boyle |
ASE 2020 | MARBLE: Model-Based Robustness Analysis of Stateful Deep Learning Systems | Xiaoning Du, Yi Li, Xiaofei Xie, Lei Ma, Yang Liu, Jianjun Zhao |
ASE 2020 | Mastering Uncertainty in Performance Estimations of Configurable Software Systems | Johannes Dorn, Sven Apel, Norbert Siegmund |
ASE 2020 | Metamorphic Object Insertion for Testing Object Detection Systems | Shuai Wang, Zhendong Su |
ASE 2020 | MinerRay: Semantics-Aware Analysis for Ever-Evolving Cryptojacking Detection | Alan Romano, Yunhui Zheng, Weihang Wang |
ASE 2020 | MoFuzz: A Fuzzer Suite for Testing Model-Driven Software Engineering Tools | Hoang Lam Nguyen, Nebras Nassar, Timo Kehrer, Lars Grunske |
ASE 2020 | MockSniffer: Characterizing and Recommending Mocking Decisions for Unit Tests | Hengcheng Zhu, Lili Wei, Ming Wen, Yepang Liu, Shing-Chi Cheung, Qin Sheng, Cui Zhou |
ASE 2020 | Multi-task Learning based Pre-trained Language Model for Code Completion | Fang Liu, Ge Li, Yunfei Zhao, Zhi Jin |
ASE 2020 | Multiple-Boundary Clustering and Prioritization to Promote Neural Network Retraining | Weijun Shen, Yanhui Li, Lin Chen, YuanLei Han, Yuming Zhou, Baowen Xu |
ASE 2020 | Multiplex Symbolic Execution: Exploring Multiple Paths by Solving Once | Yufeng Zhang, Zhenbang Chen, Ziqi Shuai, Tianqi Zhang, Kenli Li, Ji Wang |
ASE 2020 | NeuroDiff: Scalable Differential Verification of Neural Networks using Fine-Grained Approximation | Brandon Paulsen, Jingbo Wang, Jiawei Wang, Chao Wang |
ASE 2020 | No Strings Attached: An Empirical Study of String-related Software Bugs | Aryaz Eghbali, Michael Pradel |
ASE 2020 | OCoR: An Overlapping-Aware Code Retriever | Qihao Zhu, Zeyu Sun, Xiran Liang, Yingfei Xiong, Lu Zhang |
ASE 2020 | On the Effectiveness of Unified Debugging: An Extensive Study on 16 Program Repair Systems | Samuel Benton, Xia Li, Yiling Lou, Lingming Zhang |
ASE 2020 | Owl Eyes: Spotting UI Display Issues via Visual Understanding | Zhe Liu, Chunyang Chen, Junjie Wang, Yuekai Huang, Jun Hu, Qing Wang |
ASE 2020 | Patching as Translation: The Data and the Metaphor | Yangruibo Ding, Baishakhi Ray, Prem Devanbu, Vincent J. Hellendoorn |
ASE 2020 | Pending Constraints in Symbolic Execution for Better Exploration and Seeding | Timotej Kapus, Frank Busse, Cristian Cadar |
ASE 2020 | Plug the Database & Play With Automatic Testing: Improving System Testing by Exploiting Persistent Data | Diego Clerissi, Giovanni Denaro, Marco Mobilio, Leonardo Mariani |
ASE 2020 | Predicting Code Context Models for Software Development Tasks | Zhiyuan Wan, Gail Murphy, Xin Xia |
ASE 2020 | Prober: Practically Defending Overflows with Page Protection | Hongyu Liu, Ruiqin Tian, Bin Ren, Tongping Liu |
ASE 2020 | Problems and Opportunities in Training Deep Learning Software Systems: An Analysis of Variance | Hung Viet Pham, Shangshu Qian, Jiannan Wang, Thibaud Lutellier, Jonathan Rosenthal, Lin Tan, Yaoliang Yu, Nachiappan Nagappan |
ASE 2020 | Representing and Reasoning about Dynamic Code | Jesse Bartels, Jon Stephens, Saumya Debray |
ASE 2020 | Retrieve and Refine: Exemplar-based Neural Comment Generation | Bolin Wei, Yongmin Li, Ge Li, Xin Xia, Zhi Jin |
ASE 2020 | Revisiting the relationship between fault detection, test adequacy criteria, and test set size. | Yiqun Chen, Rahul Gopinath, Anita Tadakamalla, Michael D. Ernst, Reid Holmes, Gordon Fraser, Paul Ammann, René Just |
ASE 2020 | SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementions | Lili Quan, Qianyu Guo, Hongxu Chen, xiexiaofei , Xiaohong Li, Yang Liu, Jing Hu |
ASE 2020 | SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis | Yueming Wu, Deqing Zou, Shihan Dou, Siru Yang, Wei Yang, Feng Cheng, Hong Liang, Hai Jin |
ASE 2020 | Scalable Multiple-View Analysis of Reactive Systems via Bidirectional Model Transformations | Christos Tsigkanos, NIANYU LI, Zhi Jin, Zhenjiang Hu, Carlo Ghezzi |
ASE 2020 | Scaling Client-Specific Equivalence Checking via Impact Boundary Search | Nick Feng, Vincent Hui, Federico Mora, Marsha Chechik |
ASE 2020 | Seven Reasons Why: An In-Depth Study of the Limitations of Random Test Input Generation for Android | Farnaz Behrang, Alessandro Orso |
ASE 2020 | Stay Professional and Efficient: Automatically Generate Titles for Your Bug Reports | Songqiang Chen, Xiaoyuan Xie, Bangguo Yin, Yuanxiang Ji, Lin Chen, Baowen Xu |
ASE 2020 | Subdomain-Based Generality-Aware Debloating | Qi Xin, Myeongsoo Kim, Qirun Zhang, Alessandro Orso |
ASE 2020 | Summary-Based Symbolic Evaluation for Smart Contracts | Yu Feng, Emina Torlak, Rastislav Bodík |
ASE 2020 | Synthesis of Infinite-State Systems with Random Behavior | Andreas Katis, Grigory Fedyukovich, Jeffrey Chen, David Greve, Sanjai Rayadurgam, Michael Whalen |
ASE 2020 | Synthesis-Based Resolution of Feature Interactions in Cyber-Physical Systems | Benjamin Gafford, Tobias Dürschmid, Gabriel A. Moreno, Eunsuk Kang |
ASE 2020 | Team Discussions and Dynamics During DevOps Tool Adoptions in OSS Projects | Likang Yin, Vladimir Filkov |
ASE 2020 | Test Automation in Open-Source Android Apps: A Large-Scale Empirical Study | Jun-Wei Lin, Navid Salehnamadi, Sam Malek |
ASE 2020 | TestMC: Testing Model Counters using Differential and Metamorphic Testing | Muhammad Usman, Wenxi Wang, Sarfraz Khurshid |
ASE 2020 | The Impact of Generic Data Structures: Decoding the Role of Lists in the Linux Kernel | Nic Volanschi, Julia Lawall |
ASE 2020 | Towards Generating Thread-Safe Classes Automatically | Haichi Wang, Zan Wang, Jun Sun, Shuang Liu, Ayesha Sadiq, Yuan-Fang Li |
ASE 2020 | Towards Interpreting Recurrent Neural Networks through Probabilistic Abstraction | Guoliang Dong, Jingyi Wang, Jun Sun, Yang Zhang, Xinyu Wang, Dai Ting, Jin Song Dong, Xingen Wang |
ASE 2020 | Trace-Checking Signal-based Temporal Properties: A Model-Driven Approach | Chaima Boufaied, Claudio Menghi, Domenico Bianculli, Lionel Briand, Yago Isasi Parache |
ASE 2020 | UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps | Hao Zhou, Ting Chen, Haoyu Wang, Le Yu, Xiapu Luo, Ting Wang, Wei Zhang |
ASE 2020 | UnchartIt: An Interactive Framework for Program Recovery from Charts | Daniel Ramos, Jorge Pereira, Ines Lynce, Vasco Manquinho, Ruben Martins |
ASE 2020 | Understanding Performance Concerns in the API Documentation of Data Science Libraries | Yida Tao, Jiefang Jiang, Yepang Liu, Zhiwu Xu, Shengchao Qin |
ASE 2020 | Verified from Scratch: Program Analysis for Learners' Programs | Andreas Stahlbauer, Christoph Frädrich, Gordon Fraser |
ASE 2020 | Where Shall We Log? Studying and Suggesting Logging Locations in Code Blocks | Zhenhao Li, Tse-Hsun (Peter) Chen, Weiyi Shang |
ASE 2020 | Zeror: Speed Up Fuzzing with Coverage-sensitive Tracing and Scheduling | Chijin Zhou, Mingzhe Wang, Jie Liang, Zhe Liu, Yu Jiang |
ISSTA 2020 | A Programming Model for Semi-implicit Parallelization of Static Analyses | Dominik Helm, Florian Kübler, Jan Thomas Kölzer, Philipp Haller, Michael Eichberg, Guido Salvaneschi, Mira Mezini |
ISSTA 2020 | Abstracting Failure-Inducing Inputs | Rahul Gopinath, Alexander Kampmann, Nikolas Havrikov, Ezekiel Soremekun, Andreas Zeller |
ISSTA 2020 | Active Fuzzing for Testing and Securing Cyber-Physical Systems | Yuqi Chen, Bohan Xuan, Chris Poskitt, Jun Sun, Fan Zhang |
ISSTA 2020 | An Empirical Study on ARM Disassembly Tools | Muhui Jiang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu, Kui Ren |
ISSTA 2020 | Automated Classification of Actions in Bug Reports of Mobile Apps | Hui Liu, Mingzhu Shen, Jiahao Jin, Yanjie Jiang |
ISSTA 2020 | Automated Repair of Feature Interaction Failures in Automated Driving Systems | Raja Ben Abdessalem, Annibale Panichella, Shiva Nejati, Lionel C. Briand, Thomas Stifter |
ISSTA 2020 | Can Automated Program Repair Refine Fault Localization? A Unified Debugging Approach | Yiling Lou, Ali Ghanbari, Xia Li, Lingming Zhang, Haotian Zhang, Dan Hao, Lu Zhang |
ISSTA 2020 | CoCoNuT: Combining Context-Aware Neural Translation Models using Ensemble for Program Repair | Thibaud Lutellier, Hung Viet Pham, Lawrence Pang, Yitong Li, Moshi Wei, Lin Tan |
ISSTA 2020 | Data Loss Detector: Automatically Revealing Data Loss Bugs in Android Apps | Oliviero Riganelli, Simone Paolo Mottadelli, Claudio Rota, Daniela Micucci, Leonardo Mariani |
ISSTA 2020 | Debugging the Performance of Maven’s Test Isolation: Experience Report | Pengyu Nie, Ahmet Celik, Matthew Coley, Aleksandar Milicevic, Jonathan Bell, Milos Gligoric |
ISSTA 2020 | DeepGini: Prioritizing Massive Tests to Enhance the Robustness of Deep Neural Networks | Yang Feng, Qingkai Shi, Xinyu Gao, Muhammed Kerem Kahraman, Chunrong Fang, Zhenyu Chen |
ISSTA 2020 | DeepSQLi: Deep Semantic Learning for Testing SQL Injection | Muyang Liu, Ke Li, Tao Chen |
ISSTA 2020 | Dependent-Test-Aware Regression Testing Techniques | Wing Lam, August Shi, Reed Oei, Sai Zhang, Michael D. Ernst, Tao Xie |
ISSTA 2020 | Detecting Cache-Related Bugs in Spark Applications | Hui Li, Dong Wang, Tianze Huang, Yu Gao, Wensheng Dou, Lijie Xu, Wei Wang, Jun Wei, Hua Zhong |
ISSTA 2020 | Detecting Flaky Tests in Probabilistic and Machine Learning Applications | Saikat Dutta, August Shi, Rutvik Choudhary, Zhekun Zhang, Aryaman Jain, Sasa Misailovic |
ISSTA 2020 | Detecting and Diagnosing Energy Issues for Mobile Applications | Xueliang Li, Yuming Yang, Yepang Liu, John P. Gallagher, Kaishun Wu |
ISSTA 2020 | Detecting and Understanding Real-World Differential Performance Bugs in Machine Learning Libraries | Saeid Tizpaz-Niari, Pavol Cerny, Ashutosh Trivedi |
ISSTA 2020 | Differential Regression Testing for REST APIs | Patrice Godefroid, Daniel Lehmann, Marina Polishchuk |
ISSTA 2020 | Discovering Discrepancies in Numerical Libraries | Jackson Vanover, Xuan Deng, Cindy Rubio-González |
ISSTA 2020 | Effective White-Box Testing of Deep Neural Networks with Adaptive Neuron-Selection Strategy | Seokhyun Lee, Sooyoung Cha, Dain Lee, Hakjoo Oh |
ISSTA 2020 | Empirically Revisiting and Enhancing IR-Based Test-Case Prioritization | Qianyang Peng, August Shi, Lingming Zhang |
ISSTA 2020 | Escaping Dependency Hell: Finding Build Dependency Errors with the Unified Dependency Graph | Gang Fan, Chengpeng Wang, Rongxin Wu, Xiao Xiao, Qingkai Shi, Charles Zhang |
ISSTA 2020 | Fast Bit-Vector Satisfiability | Peisen Yao, Qingkai Shi, Heqing Huang, Charles Zhang |
ISSTA 2020 | Feasible and Stressful Trajectory Generation for Mobile Robots | Carl Hildebrandt, Sebastian Elbaum, Nicola Bezzo, Matthew B Dwyer |
ISSTA 2020 | Feedback-Driven Side-Channel Analysis for Networked Applications | Ismet Burak Kadron, Nico Rosner, Tevfik Bultan |
ISSTA 2020 | Functional Code Clone Detection with Syntax and Semantics Fusion Learning | Chunrong Fang, Zixi Liu, Yangyang Shi, Jeff Huang, Qingkai Shi |
ISSTA 2020 | Higher Income, Larger Loan? Monotonicity Testing of Machine Learning Models | Arnab Sharma, Heike Wehrheim |
ISSTA 2020 | How Effective Are Smart Contract Analysis Tools? Evaluating Smart Contract Static Analysis Tools using Bug Injection | Asem Ghaleb, Karthik Pattabiraman |
ISSTA 2020 | How Far We Have Come: Testing Decompilation Correctness of C Decompilers | Zhibo Liu, Shuai Wang |
ISSTA 2020 | Identifying Java Calls in Native Code via Binary Scanning | George Fourtounis, Leonidas Triantafyllou, Yannis Smaragdakis |
ISSTA 2020 | Intermittently Failing Tests in the Embedded Systems Domain | Per Erik Strandberg, Thomas Ostrand, Elaine Weyuker, Wasif Afzal, Daniel Sundmark |
ISSTA 2020 | Learning Input Tokens for Effective Fuzzing | Björn Mathis, Rahul Gopinath, Andreas Zeller |
ISSTA 2020 | Learning to Detect Table Clones in Spreadsheets | Yakun Zhang, Wensheng Dou, Jiaxin Zhu, Liang Xu, Zhiyong Zhou, Jun Wei, Dan Ye, Bo Yang |
ISSTA 2020 | Patch Based Vulnerability Matching for Binary Programs | Yifei Xu, Zhengzi Xu, Bihuan Chen, Fu Song, Yang Liu, Ting Liu |
ISSTA 2020 | Recovering Fitness Gradients for Interprocedural Boolean Flags in Search-Based Testing | Yun Lin, Jun Sun, Gordon Fraser, Ziheng Xiu, Ting Liu, Jin Song Dong |
ISSTA 2020 | Reinforcement Learning Based Curiosity-Driven Testing of Android Applications | Minxue Pan, An Huang, Guoxin Wang, Tian Zhang, Xuandong Li |
ISSTA 2020 | Relocatable Addressing Model for Symbolic Execution | David Trabish, Noam Rinetzky |
ISSTA 2020 | Running Symbolic Execution Forever | Frank Busse, Martin Nowack, Cristian Cadar |
ISSTA 2020 | Scaffle: Bug Localization on Millions of Files | Michael Pradel, Vijayaraghavan Murali, Rebecca Qian, Mateusz Machalica, Erik Meijer, Satish Chandra |
ISSTA 2020 | Scalable Analysis of Interaction Threats in IoT Systems | Mohannad Alhanahnah, Clay Stevens, Hamid Bagheri |
ISSTA 2020 | Scalable Build Service System with Smart Scheduling Service | Kaiyuan Wang, Greg Tener, Vijay Gullapalli, Xin Huang, Ahmed Gad, Daniel Rall |
ISSTA 2020 | Testing High Performance Numerical Simulation Programs: Experience, Lessons Learned, and Open Issues | Xiao He, Xingwei Wang, Jia Shi, Yi Liu |
ISSTA 2020 | WEIZZ: Automatic Grey-Box Fuzzing for Structured Binary Formats | Andrea Fioraldi, Daniele Cono D'Elia, Emilio Coppa |
Icyrockton rocks 🥳!