default search action
38th ASE 2023: Luxembourg
- 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, Luxembourg, September 11-15, 2023. IEEE 2023, ISBN 979-8-3503-2996-4
- Tegawendé F. Bissyandé, Jacques Klein, Christian Bird, Federica Sarro:
Message from the Chairs: ASE 2023. xxxii-xxxv - Haibin Zheng, Jinyin Chen, Haibo Jin:
CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature Space. 1-13 - Tsz On Li, Wenxi Zong, Yibo Wang, Haoye Tian, Ying Wang, Shing-Chi Cheung, Jeff Kramer:
Nuances are the Key: Unlocking ChatGPT to Find Failure-Inducing Tests with Differential Prompting. 14-26 - Zhen Li, Ruqian Zhang, Deqing Zou, Ning Wang, Yating Li, Shouhuai Xu, Chen Chen, Hai Jin:
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers. 27-39 - Xin Zhou, Kisub Kim, Bowen Xu, Jiakun Liu, DongGyun Han, David Lo:
The Devil is in the Tails: How Long-Tailed Code Distributions Impact Large Language Models. 40-52 - Chunyang Meng, Shijie Song, Haogang Tong, Maolin Pan, Yang Yu:
DeepScaler: Holistic Autoscaling for Microservices Based on Spatiotemporal GNN with Adaptive Graph Learning. 53-65 - Jun Huang, Yang Yang, Hang Yu, Jianguo Li, Xiao Zheng:
Twin Graph-Based Anomaly Detection via Attentive Multi-Modal Learning for Microservice System. 66-78 - Yiru Chen, Chenxi Zhang, Zhen Dong, Dingyu Yang, Xin Peng, Jiayu Ou, Hong Yang, Zheshun Wu, Xiaojun Qu, Wei Li:
Dynamic Graph Neural Networks-Based Alert Link Prediction for Online Service Systems. 79-90 - Shangshu Qian, Wen Fan, Lin Tan, Yongle Zhang:
Vicious Cycles in Distributed Software Systems. 91-103 - Yang Hu, Wenxi Wang, Sarfraz Khurshid, Kenneth L. McMillan, Mohit Tiwari:
Fixing Privilege Escalations in Cloud Access Control with MaxSAT and Graph Neural Networks. 104-115 - Cheryl Lee, Tianyi Yang, Zhuangbin Chen, Yuxin Su, Michael R. Lyu:
Maat: Performance Metric Anomaly Anticipation for Cloud Services with Conditional Diffusion. 116-128 - Zhenhao Li, An Ran Chen, Xing Hu, Xin Xia, Tse-Hsun Chen, Weiyi Shang:
Are They All Good? Studying Practitioners' Expectations on the Readability of Log Messages. 129-140 - Xuheng Wang, Jiaxing Song, Xu Zhang, Junshu Tang, Weihe Gao, Qingwei Lin:
LogOnline: A Semi-Supervised Log-Based Anomaly Detector Aided with Online Learning Mechanism. 141-152 - Rungroj Maipradit, Dong Wang, Patanamon Thongtanunam, Raula Gaikovina Kula, Yasutaka Kamei, Shane McIntosh:
Repeated Builds During Code Review: An Empirical Study of the OpenStack Community. 153-165 - Wenbo Guo, Zhengzi Xu, Chengwei Liu, Cheng Huang, Yong Fang, Yang Liu:
An Empirical Study of Malicious Code In PyPI Ecosystem. 166-177 - Weiwei Xu, Hao He, Kai Gao, Minghui Zhou:
Understanding and Remediating Open-Source License Incompatibilities in the PyPI Ecosystem. 178-190 - Lyuye Zhang, Chengwei Liu, Sen Chen, Zhengzi Xu, Lingling Fan, Lida Zhao, Yiran Zhang, Yang Liu:
Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem. 191-203 - Liang Wang, Zhiwen Zheng, Xiangchen Wu, Baihui Sang, Jierui Zhang, Xianping Tao:
Fork Entropy: Assessing the Diversity of Open Source Software Projects' Forks. 204-216 - Chenyuan Zhang, Yanlin Wang, Zhao Wei, Yong Xu, Juhong Wang, Hui Li, Rongrong Ji:
EALink: An Efficient and Accurate Pre-Trained Framework for Issue-Commit Link Recovery. 217-229 - Shengyou Hu, Huayao Wu, Peng Wang, Jing Chang, Yongjun Tu, Xiu Jiang, Xintao Niu, Changhai Nie:
ATOM: Automated Black-Box Testing of Multi-Label Image Classification Systems. 230-242 - Zhuo Li, Xiongfei Wu, Derui Zhu, Mingfei Cheng, Siyuan Chen, Fuyuan Zhang, Xiaofei Xie, Lei Ma, Jianjun Zhao:
Generative Model-Based Testing on Decision-Making Policies. 243-254 - Sarthak Chakraborty, Shubham Agarwal, Shaddy Garg, Abhimanyu Sethia, Udit Narayan Pandey, Videh Aggarwal, Shiv Kumar Saini:
ESRO: Experience Assisted Service Reliability against Outages. 255-267 - Jinyang Liu, Zhihan Jiang, Jiazhen Gu, Junjie Huang, Zhuangbin Chen, Cong Feng, Zengyin Yang, Yongqiang Yang, Michael R. Lyu:
Prism: Revealing Hidden Functional Clusters from Massive Instances in Cloud Systems. 268-280 - Alessandro Tundo, Marco Mobilio, Shashikant Ilager, Ivona Brandic, Ezio Bartocci, Leonardo Mariani:
An Energy-Aware Approach to Design Self-Adaptive AI-based Applications on the Edge. 281-293 - Sicheng Hao, Yuhong Nan, Zibin Zheng, Xiaohui Liu:
SmartCoCo: Checking Comment-Code Inconsistency in Smart Contracts via Constraint Propagation and Binding. 294-306 - Wentao Liang, Xiang Ling, Jingzheng Wu, Tianyue Luo, Yanjun Wu:
A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering. 307-318 - Yujiang Gui, Dongjie He, Jingling Xue:
Merge-Replay: Efficient IFDS-Based Taint Analysis by Consolidating Equivalent Value Flows. 319-331 - Jian Zhang, Shangqing Liu, Xu Wang, Tianlin Li, Yang Liu:
Learning to Locate and Describe Vulnerabilities. 332-344 - Xin-Cheng Wen, Xinchen Wang, Cuiyun Gao, Shaohua Wang, Yang Liu, Zhaoquan Gu:
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection. 345-357 - Ziyou Jiang, Lin Shi, Guowei Yang, Qing Wang:
SCPatcher: Mining Crowd Security Discussions to Enrich Secure Coding Practices. 358-370 - Zhenlan Ji, Pingchuan Ma, Shuai Wang, Yanhui Li:
Causality-Aided Trade-Off Analysis for Machine Learning Fairness. 371-383 - Tamal Mondal, Scott Barnett, Akash Lal, Jyothi Vedurada:
Cell2Doc: ML Pipeline for Generating Documentation in Computational Notebooks. 384-396 - Jiaxing Liu, Chaofeng Sha, Xin Peng:
An Empirical Study of Parameter-Efficient Fine-Tuning Methods for Pre-Trained Code Models. 397-408 - Nikitha Rao, Kush Jain, Uri Alon, Claire Le Goues, Vincent J. Hellendoorn:
CAT-LM Training Language Models on Aligned Code And Tests. 409-420 - Ze Tang, Jidong Ge, Shangqing Liu, Tingwei Zhu, Tongtong Xu, Liguo Huang, Bin Luo:
Domain Adaptive Code Completion via Language Models and Decoupled Domain Databases. 421-433 - Mingwei Liu, Tianyong Yang, Yiling Lou, Xueying Du, Ying Wang, Xin Peng:
CodeGen4Libs: A Two-Stage Approach for Library-Oriented Code Generation. 434-445 - Myeongsoo Kim, Saurabh Sinha, Alessandro Orso:
Adaptive REST API Testing with Reinforcement Learning. 446-458 - Alexi Turcotte, Satyajit Gokhale, Frank Tip:
Increasing the Responsiveness of Web Applications by Introducing Lazy Loading. 459-470 - Qing Huang, Zhenyu Wan, Zhenchang Xing, Changjing Wang, Jieshan Chen, Xiwei Xu, Qinghua Lu:
Let's Chat to Find the APIs: Connecting Human, LLM and Knowledge Graph through AI Chain. 471-483 - Tai Nguyen, Yifeng Di, Joohan Lee, Muhao Chen, Tianyi Zhang:
Software Entity Recognition with Noise-Robust Learning. 484-496 - Yintong Huo, Yichen Li, Yuxin Su, Pinjia He, Zifan Xie, Michael R. Lyu:
AutoLog: A Log Sequence Synthesis Framework for Anomaly Detection. 497-509 - Yi Liu, Yuekang Li, Gelei Deng, Felix Juefei-Xu, Yao Du, Cen Zhang, Chengwei Liu, Yeting Li, Lei Ma, Yang Liu:
ASTER: Automatic Speech Recognition System Accessibility Testing for Stutterers. 510-521 - Chunqiu Steven Xia, Yifeng Ding, Lingming Zhang:
The Plastic Surgery Hypothesis in the Era of Large Language Models. 522-534 - Quanjun Zhang, Chunrong Fang, Tongke Zhang, Bowen Yu, Weisong Sun, Zhenyu Chen:
Gamma: Revisiting Template-Based Automated Program Repair Via Mask Prediction. 535-547 - Yi Li, Shaohua Wang, Tien N. Nguyen:
Contextuality of Code Representation Learning. 548-559 - Zhao Tian, Junjie Chen, Xiangyu Zhang:
On-the-fly Improving Performance of Deep Code Models via Input Denoising. 560-572 - Antonio Vitale, Valentina Piantadosi, Simone Scalabrino, Rocco Oliveto:
Using Deep Learning to Automatically Improve Code Readability. 573-584 - Antonio Mastropaolo, Massimiliano Di Penta, Gabriele Bavota:
Towards Automatically Addressing Self-Admitted Technical Debt: How Far Are We? 585-597 - Prantik Chatterjee, Pankaj Kumar Kalita, Sumit Lahiri, Sujit Kumar Muduli, Vishal Singh, Gourav Takhar, Subhajit Roy:
An Integrated Program Analysis Framework for Graduate Courses in Programming Languages and Software Engineering. 598-610 - Nikhil Parasaram, Earl T. Barr, Sergey Mechtaev, Marcel Böhme:
Precise Data-Driven Approximation for Program Analysis via Fuzzing. 611-623 - Chenghang Shi, Haofeng Li, Yulei Sui, Jie Lu, Lian Li, Jingling Xue:
Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis. 624-636 - G. M. Shahariar, Tahmid Hasan, Anindya Iqbal, Gias Uddin:
Contrastive Learning for API Aspect Analysis. 637-648 - Xinyue Liu, Lukasz Ziarek:
PTDETECTOR: An Automated JavaScript Front-end Library Detector. 649-660 - Shuyao Jiang, Ruiying Zeng, Zihao Rao, Jiazhen Gu, Yangfan Zhou, Michael R. Lyu:
Revealing Performance Issues in Server-Side WebAssembly Runtimes Via Differential Testing. 661-672 - Peisen Yao, Jingyu Ke, Jiahui Sun, Hongfei Fu, Rongxin Wu, Kui Ren:
Demystifying Template-Based Invariant Generation for Bit-Vector Programs. 673-685 - Yao Zhang, Xiaofei Xie, Yi Li, Sen Chen, Cen Zhang, Xiaohong Li:
EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software. 686-697 - Stanly Samuel, Deepak D'Souza, Raghavan Komondoor:
Symbolic Fixpoint Algorithms for Logical LTL Games. 698-709 - Liran Wang, Xunzhu Tang, Yichen He, Changyu Ren, Shuhua Shi, Chaoran Yan, Zhoujun Li:
Delving into Commit-Issue Correlation to Enhance Commit Message Generation Models. 710-722 - Aleksandra Eliseeva, Yaroslav Sokolov, Egor Bogomolov, Yaroslav Golubev, Danny Dig, Timofey Bryksin:
From Commit Message Generation to History-Aware Commit Message Completion. 723-735 - Jingbo Lu, Dongjie He, Wei Li, Yaoqing Gao, Jingling Xue:
Automatic Generation and Reuse of Precise Library Summaries for Object-Sensitive Pointer Analysis. 736-747 - Chong Wang, Yiling Lou, Junwei Liu, Xin Peng:
Generating Variable Explanations via Zero-shot Prompt Learning. 748-760 - Shuzheng Gao, Xin-Cheng Wen, Cuiyun Gao, Wenxuan Wang, Hongyu Zhang, Michael R. Lyu:
What Makes Good In-Context Demonstrations for Code Intelligence Tasks with LLMs? 761-773 - Jiaqi Xiong, Guoqiang Chen, Kejiang Chen, Han Gao, Shaoyin Cheng, Weiming Zhang:
HexT5: Unified Pre-Training for Stripped Binary Code Information Inference. 774-786 - Linyu Li, Sihan Xu, Yang Liu, Ya Gao, Xiangrui Cai, Jiarun Wu, Wenli Song, Zheli Liu:
LiSum: Open Source Software License Summarization with Multi-Task Learning. 787-799 - Wenxin Xiao, Jingyue Li, Hao He, Ruiqiao Qiu, Minghui Zhou:
Personalized First Issue Recommender for Newcomers in Open Source Projects. 800-812 - Yingying He, Wenhua Yang, Minxue Pan, Yasir Hussain, Yu Zhou:
Understanding and Enhancing Issue Prioritization in GitHub. 813-824 - Yuqiang Sun, Zhengzi Xu, Chengwei Liu, Yiran Zhang, Yang Liu:
Who is the Real Hero? Measuring Developer Contribution via Multi-Dimensional Data Integration. 825-836 - Mukelabai Mukelabai, Christoph Derks, Jacob Krüger, Thorsten Berger:
To Share, or Not to Share: Exploring Test-Case Reusability in Fork Ecosystems. 837-849 - Zhao Tian, Junjie Chen, Zhi Jin:
Code Difference Guided Adversarial Example Generation for Deep Code Models. 850-862 - Neng Zhang, Qinde Chen, Zibin Zheng, Ying Zou:
iASTMapper: An Iterative Similarity-Based Abstract Syntax Tree Mapping Algorithm. 863-874 - Jia Li, Chongyang Tao, Zhi Jin, Fang Liu, Jia Li, Ge Li:
ZC3: Zero-Shot Cross-Language Code Clone Detection. 875-887 - Johannes Düsing, Ben Hermann:
Persisting and Reusing Results of Static Program Analyses on a Large Scale. 888-900 - Talank Baral, Shanto Rahman, Bala Naren Chanumolu, Basak Balci, Tuna Tuncer, August Shi, Wing Lam:
Optimizing Continuous Development by Detecting and Preventing Unnecessary Content Generation. 901-913 - Wensheng Tang, Chengpeng Wang, Peisen Yao, Rongxin Wu, Xianjin Fu, Gang Fan, Charles Zhang:
DCLINK: Bridging Data Constraint Changes and Implementations in FinTech Systems. 914-925 - Paschal C. Amusuo, Ricardo Andrés Calvo Méndez, Zhongwei Xu, Aravind Machiry, James C. Davis:
Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks. 926-938 - Shiyao Zhou, Muhui Jiang, Weimin Chen, Hao Zhou, Haoyu Wang, Xiapu Luo:
WADIFF: A Differential Testing Framework for WebAssembly Runtimes. 939-950 - Xiaoyin Wang, Tahmid Rafi, Na Meng:
VRGuide: Efficient Testing of Virtual Reality Scenes via Dynamic Cut Coverage. 951-962 - Yanju Chen, Chenglong Wang, Xinyu Wang, Osbert Bastani, Yu Feng:
Fast and Reliable Program Synthesis via User Interaction. 963-975 - Xiaoxue Ren, Xinyuan Ye, Dehai Zhao, Zhenchang Xing, Xiaohu Yang:
From Misuse to Mastery: Enhancing Code Generation with Knowledge-Driven AI Chaining. 976-987 - Yun Peng, Chaozheng Wang, Wenxuan Wang, Cuiyun Gao, Michael R. Lyu:
Generative Type Inference for Python. 988-999 - Mingxuan Zhu, Dan Hao:
Compiler Auto-Tuning via Critical Flag Selection. 1000-1011 - Atish Kumar Dipongkor, Kevin Moran:
A Comparative Study of Transformer-Based Neural Text Representation Techniques on Bug Triaging. 1012-1023 - Lingxiao Tang, Lingfeng Bao, Xin Xia, Zhongdong Huang:
Neural SZZ Algorithm. 1024-1035 - Cedric Richter, Heike Wehrheim:
How to Train Your Neural Bug Detector: Artificial vs Real Bugs. 1036-1048 - Baoquan Cui, Miaomiao Wang, Chi Zhang, Jiwei Yan, Jun Yan, Jian Zhang:
Detection of Java Basic Thread Misuses Based on Static Event Analysis. 1049-1060 - Eric Liu, Shengjie Xu, David Lie:
FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers. 1061-1072 - Ran Mo, Yingjie Jiang, Wenjing Zhan, Dongyu Wang, Zengyang Li:
A Comprehensive Study on Code Clones in Automated Driving Software. 1073-1085 - Tao Wang, Wei Chen, Liwei Liu, Guoquan Wu, Jun Wei, Tao Huang:
Detecting Smart Home Automation Application Interferences with Domain Knowledge. 1086-1097 - Szymon Stradowski, Lech Madeyski:
Bridging the Gap Between Academia and Industry in Machine Learning Software Defect Prediction: Thirteen Considerations. 1098-1110 - Xing Hu, Zhuang Liu, Xin Xia, Zhongxin Liu, Tongtong Xu, Xiaohu Yang:
Identify and Update Test Cases When Production Code Changes: A Transformer-Based Approach. 1111-1122 - Weifeng Sun, Hongyan Li, Meng Yan, Yan Lei, Hongyu Zhang:
Revisiting and Improving Retrieval-Augmented Deep Assertion Generation. 1123-1135 - Mingxuan Xiao, Yan Xiao, Hai Dong, Shunhui Ji, Pengcheng Zhang:
LEAP: Efficient and Automated Test Method for NLP Software. 1136-1148 - Jiaming Ye, Shangzhou Xia, Fuyuan Zhang, Paolo Arcaini, Lei Ma, Jianjun Zhao, Fuyuki Ishikawa:
QuraTest: Integrating Quantum Specific Features in Quantum Program Testing. 1149-1161 - Kai Huang, Xiangxin Meng, Jian Zhang, Yang Liu, Wenjie Wang, Shuhao Li, Yuqing Zhang:
An Empirical Study on Fine-Tuning Large Language Models of Code for Automated Program Repair. 1162-1174 - Arooba Shahoor, Askar Yeltayuly Khamit, Jooyong Yi, Dongsun Kim:
Leakpair: Proactive Repairing of Memory Leaks in Single Page Web Applications. 1175-1187 - Yuanzhang Lin, Guoyao Wen, Xiang Gao:
Automated Fixing of Web UI Tests via Iterative Element Matching. 1188-1199 - Wenjie Zhang, Guancheng Wang, Junjie Chen, Yingfei Xiong, Yong Liu, Lu Zhang:
OrdinalFix: Fixing Compilation Errors via Shortest-Path CFL Reachability. 1200-1211 - Zhijie Liu, Liang Feng Zhang, Yutian Tang:
Enhancing Malware Detection for Android Apps: Detecting Fine-Granularity Malicious Components. 1212-1224 - Vikas Kumar Malviya, Yan Naing Tun, Chee Wei Leow, Ailys Tee Xynyn, Lwin Khin Shar, Lingxiao Jiang:
Fine-Grained In-Context Permission Classification for Android Apps Using Control-Flow Graph Embedding. 1225-1237 - Shaokun Zhang, Hanwen Lei, Yuanpeng Wang, Ding Li, Yao Guo, Xiangqun Chen:
How Android Apps Break the Data Minimization Principle: An Empirical Study. 1238-1250 - Xiangyu Zhang, Lingling Fan, Sen Chen, Yucheng Su, Boyuan Li:
Scene-Driven Exploration and GUI Modeling for Android Apps. 1251-1262 - Yuyi Zhong, Ruiwei Wang, Siau-Cheng Khoo:
Expediting Neural Network Verification via Network Reduction. 1263-1275 - Jingyang Li, Guoqiang Li:
HOBAT: Batch Verification for Homogeneous Structural Neural Networks. 1276-1287 - Maolin Sun, Yibiao Yang, Yang Wang, Ming Wen, Haoxiang Jia, Yuming Zhou:
SMT Solver Validation Empowered by Large Pre-Trained Language Models. 1288-1300 - Ali Ghanbari, Deepak-George Thomas, Muhammad Arbab Arshad, Hridesh Rajan:
Mutation-based Fault Localization of Deep Neural Networks. 1301-1313 - Ahmed Haj Yahmed, Rached Bouchoucha, Houssem Ben Braiek, Foutse Khomh:
An Intentional Forgetting-Driven Self-Healing Method for Deep Reinforcement Learning Systems. 1314-1325 - Lwin Khin Shar, Arda Goknil, Erik Johannes Husom, Sagar Sen, Yan Naing Tun, Kisub Kim:
AutoConf: Automated Configuration of Unsupervised Learning Systems Using Metamorphic Testing and Bayesian Optimization. 1326-1338 - Wenxuan Wang, Jingyuan Huang, Jen-tse Huang, Chang Chen, Jiazhen Gu, Pinjia He, Michael R. Lyu:
An Image is Worth a Thousand Toxic Words: A Metamorphic Testing Framework for Content Moderation Software. 1339-1351 - Yuanjie Xia, Zishuo Ding, Weiyi Shang:
CoMSA: A Modeling-Driven Sampling Approach for Configuration Performance Testing. 1352-1363 - Zongze Jiang, Ming Wen, Yixin Yang, Chao Peng, Ping Yang, Hai Jin:
Effective Concurrency Testing for Go via Directional Primitive-Constrained Interleaving Exploration. 1364-1376 - Jaekwon Lee, Enrico Viganò, Oscar Cornejo, Fabrizio Pastore, Lionel C. Briand:
Fuzzing for CPS Mutation Testing. 1377-1389 - Yonghui Liu, Xiao Chen, Pei Liu, John Grundy, Chunyang Chen, Li Li:
ReuNify: A Step Towards Whole Program Analysis for React Native Android Apps. 1390-1402 - Shi Meng, Liu Wang, Shenao Wang, Kailong Wang, Xusheng Xiao, Guangdong Bai, Haoyu Wang:
Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs. 1403-1415 - Ruihua Ji, Tingwei Zhu, Xiaoqing Zhu, Chunyang Chen, Minxue Pan, Tian Zhang:
Vision-Based Widget Mapping for Test Migration Across Mobile Platforms: Are We There Yet? 1416-1428 - Xutong Ma, Jiwei Yan, Hao Zhang, Jun Yan, Jian Zhang:
Detecting Memory Errors in Python Native Code by Tracking Object Lifecycle with Reference Count. 1429-1440 - Zuoyan Zhang, Bei Zhou, Jiangwei Hao, Hongru Yang, Mengqi Cui, Yuchang Zhou, Guanghui Song, Fei Li, Jinchen Xu, Jie Zhao:
Eiffel: Inferring Input Ranges of Significant Floating-point Errors via Polynomial Extrapolation. 1441-1453 - Zhenlan Ji, Pingchuan Ma, Shuai Wang:
Perfce: Performance Debugging on Databases with Chaos Engineering-Enhanced Causality Analysis. 1454-1466 - Shuai Shao, Tingting Yu:
Information Retrieval-Based Fault Localization for Concurrent Programs. 1467-1479 - Thomas Hirsch, Birgit Hofer:
The MAP Metric in Information Retrieval Fault Localization. 1480-1491 - Abdulkarim Malkadi, Ahmad Tayeb, Sonia Haiduc:
Improving Code Extraction from Coding Screencasts Using a Code-Aware Encoder-Decoder Model. 1492-1504 - Shuai Zhang, Xiaodong Gu, Yuting Chen, Beijun Shen:
InfeRE: Step-by-Step Regex Generation via Chain of Inference. 1505-1515 - Daniel Ramos, Hailie Mitchell, Inês Lynce, Vasco Manquinho, Ruben Martins, Claire Le Goues:
MELT: Mining Effective Lightweight Transformations from Pull Requests. 1516-1528 - Mingsheng Jiao, Tingrui Yu, Xuan Li, Guanjie Qiu, Xiaodong Gu, Beijun Shen:
On the Evaluation of Neural Code Translation: Taxonomy and Benchmark. 1529-1541 - Martin Kellogg, Daniel Daskiewicz, Loi Ngo Duc Nguyen, Muyeed Ahmed, Michael D. Ernst:
Pluggable Type Inference for Free. 1542-1554 - Haoyu Wang, Junjie Chen, Chuyue Xie, Shuang Liu, Zan Wang, Qingchao Shen, Yingquan Zhao:
MLIRSmith: Random Program Generation for Fuzzing MLIR Compiler Infrastructure. 1555-1566 - Yang Lan, Di Jin, Zhun Wang, Wende Tan, Zheyu Ma, Chao Zhang:
Thunderkaller: Profiling and Improving the Performance of Syzkaller. 1567-1578 - Dongwei Xiao, Zhibo Liu, Shuai Wang:
PhyFu: Fuzzing Modern Physics Simulation Engines. 1579-1591 - Ahmad Humayun, Yaoxuan Wu, Miryung Kim, Muhammad Ali Gulzar:
NaturalFuzz: Natural Input Generation for Big Data Analytics. 1592-1603 - Wenke Li, Feng Wu, Cai Fu, Fan Zhou:
A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem. 1604-1614 - Bo Liu, Hui Liu, Nan Niu, Yuxia Zhang, Guangjie Li, Yanjie Jiang:
Automated Software Entity Matching Between Successive Versions. 1615-1627 - Suhaib Mujahid, Diego Elias Costa, Rabe Abdalkareem, Emad Shihab:
Where to Go Now? Finding Alternatives for Declining Packages in the npm Ecosystem. 1628-1639 - Teng Wang, Haochen He, Xiaodong Liu, Shanshan Li, Zhouyang Jia, Yu Jiang, Qing Liao, Wang Li:
ConfTainter: Static Taint Analysis For Configuration Options. 1640-1651 - Jinhao Dong, Qihao Zhu, Zeyu Sun, Yiling Lou, Dan Hao:
Merge Conflict Resolution: Classification or Generation? 1652-1663 - Jianzhong Su, Xingwei Lin, Zhiyuan Fang, Zhirong Zhu, Jiachi Chen, Zibin Zheng, Wei Lv, Jiashui Wang:
DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities. 1664-1675 - Yuwei Liu, Siqi Chen, Yuchong Xie, Yanhao Wang, Libo Chen, Bin Wang, Yingming Zeng, Zhi Xue, Purui Su:
VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual Device. 1676-1687 - Robert Feldt, Sungmin Kang, Juyeon Yoon, Shin Yoo:
Towards Autonomous Testing Agents via Conversational Large Language Models. 1688-1693 - Sondess Missaoui, Simos Gerasimou, Nicholas Matragkas:
Semantic Data Augmentation for Deep Learning Testing Using Generative AI. 1694-1698 - Van-Hoang Le, Hongyu Zhang:
Log Parsing: How Far Can ChatGPT Go? 1699-1704 - Sergio Morales, Robert Clarisó, Jordi Cabot:
Automating Bias Testing of LLMs. 1705-1707 - Qiang Hu, Yuejun Guo, Maxime Cordy, Mike Papadakis, Yves Le Traon:
MUTEN: Mutant-Based Ensembles for Boosting Gradient-Based Adversarial Attack. 1708-1712 - Bowen Xu, Thanh-Dat Nguyen, Thanh Le-Cong, Thong Hoang, Jiakun Liu, Kisub Kim, Chen Gong, Changan Niu, Chenyu Wang, Bach Le, David Lo:
Are We Ready to Embrace Generative AI for Software Q&A? 1713-1717 - Priyavanshi Pathania, Rohit Mehra, Vibhu Saujanya Sharma, Vikrant Kaulgud, Sanjay Podder, Adam P. Burden:
Towards a Knowledge Base of Common Sustainability Weaknesses in Green Software Development. 1718-1720 - Shubham Kulkarni, Arya Marda, Karthik Vaidhyanathan:
Towards Self-Adaptive Machine Learning-Enabled Systems Through QoS-Aware Model Switching. 1721-1725 - Tao Yue, Shaukat Ali:
Evolve the Model Universe of a System Universe. 1726-1731 - Aakash Bansal, Chia-Yi Su, Zachary Karas, Yifan Zhang, Yu Huang, Toby Jia-Jun Li, Collin McMillan:
Modeling Programmer Attention as Scanpath Prediction. 1732-1736 - Mira Leung, Gail C. Murphy:
On Automated Assistants for Software Development: The Role of LLMs. 1737-1741 - Toufique Ahmed, Premkumar T. Devanbu:
Better Patching Using LLM Prompting, via Self-Consistency. 1742-1746 - Allison Sullivan:
Live Programming for Finite Model Finders. 1747-1752 - Xiaoning Chang, Zheheng Liang, Guoquan Wu, Yu Gao, Wei Chen, Jun Wei, Zhenyue Long, Lei Cui, Tao Huang:
Characterizing Flaky Tests in Node.js Applications. 1753-1755 - Fuqi Jia, Rui Han, Xutong Ma, Baoquan Cui, Minghao Liu, Pei Huang, Feifei Ma, Jian Zhang:
PSMT: Satisfiability Modulo Theories Meets Probability Distribution. 1756-1760 - Weilin Luo, Yuhang Zheng, Rongzhen Ye, Hai Wan, Jianfeng Du, Pingjia Liang, Polong Chen:
SAT-Verifiable LTL Satisfiability Checking via Graph Representation Learning. 1761-1765 - Bo Peng, Pingjia Liang, Tingchen Han, Weilin Luo, Jianfeng Du, Hai Wan, Rongzhen Ye, Yuhang Zheng:
PURLTL: Mining LTL Specification from Imperfect Traces in Testing. 1766-1770 - Junjie Luo, Jianjun Zhao:
Enhancing Code Safety in Quantum Intermediate Representation. 1771-1775 - Nick Feng, Lina Marsso, Sinem Getir Yaman, Beverley A. Townsend, Ana Cavalcanti, Radu Calinescu, Marsha Chechik:
Towards a Formal Framework for Normative Requirements Elicitation. 1776-1780 - Carol Hanna, Justyna Petke:
Hot Patching Hot Fixes: Reflection and Perspectives. 1781-1786 - Siang Zhao, Zhongyang Li, Zhenbang Chen, Ji Wang:
Symbolic Verification of Fuzzy Logic Models. 1787-1789 - Qilin Zhou, Zhengyuan Wei, Haipeng Wang, W. K. Chan:
A Majority Invariant Approach to Patch Robustness Certification for Deep Learning Models. 1790-1794 - Nikolaos Louloudakis, Perry Gibson, José Cano, Ajitha Rajan:
Fault Localization for Buggy Deep Learning Framework Conversions in Image Recognition. 1795-1799 - Raffi Khatchadourian, Tatiana Castro Vélez, Mehdi Bagherzadeh, Nan Jia, Anita Raja:
Towards Safe Automated Refactoring of Imperative Deep Learning Programs to Graph Execution. 1800-1802 - Justin Kur, Jingshu Chen, Jun Huang:
Scalable Industrial Control System Analysis via XAI-Based Gray-Box Fuzzing. 1803-1807 - Junhao Hu, Chaozheng Wang, Hailiang Huang, Huang Luo, Yu Jin, Yuetang Deng, Tao Xie:
Predicting Compilation Resources for Adaptive Build in an Industrial Setting. 1808-1813 - Umut Tirasoglu, Abdussamet Türker, Adnan Ekici, Hayri Yigit, Yusuf Enes Bölükbasi, Toygar Akgün:
Open Source Software Tools for Data Management and Deep Model Training Automation. 1814-1818 - Juntao Ji, Rongtong Jin, Yubao Fu, Yinyou Gu, Tsung-Han Tsai, Qingshan Lin:
RocketHA: A High Availability Design Paradigm for Distributed Log-Based Storage System. 1819-1824 - Rohit Mehra, Priyavanshi Pathania, Vibhu Saujanya Sharma, Vikrant Kaulgud, Sanjay Podder, Adam P. Burden:
Assessing the Impact of Refactoring Energy-Inefficient Code Patterns on Software Sustainability: An Industry Case Study. 1825-1827 - Samarth Sikand, Vibhu Saujanya Sharma, Vikrant Kaulgud, Sanjay Podder:
Green AI Quotient: Assessing Greenness of AI-based software and the way forward. 1828-1833 - Swarnava Dey, Avik Ghose, Soumik Das:
Challenges of Accurate and Efficient AutoML. 1834-1839 - Wei Wang, Andrei Benea, Franjo Ivancic:
Zero-Config Fuzzing for Microservices. 1840-1845 - Kanchanjot Kaur Phokela, Samarth Sikand, Kapil Singi, Kuntal Dey, Vibhu Saujanya Sharma, Vikrant Kaulgud:
Smart Prompt Advisor: Multi-Objective Prompt Framework for Consistency and Best Practices. 1846-1848 - Celal Ziftci, Ben Greenberg:
Improving Design Reviews at Google. 1849-1854 - Samdyuti Suri, Sankar Narayan Das, Kapil Singi, Kuntal Dey, Vibhu Saujanya Sharma, Vikrant Kaulgud:
Software Engineering Using Autonomous Agents: Are We There Yet? 1855-1857 - Tooba Aamir, Mohan Baruwal Chhetri, M. A. P. Chamikara, Marthie Grobler:
Government Mobile Apps: Analysing Citizen Feedback via App Reviews. 1858-1863 - Shinobu Saito:
Coding and Debugging by Separating Secret Code Toward Secure Remote Development. 1864-1869 - Vikas Kumar Malviya, Phong Phan, Yan Naing Tun, Albert Ching, Lwin Khin Shar:
An Industrial Practice for Securing Android Apps in the Banking Domain. 1870-1875 - Zhipeng Xue, Zhipeng Gao, Xing Hu, Shanping Li:
ACWRecommender: A Tool for Validating Actionable Warnings with Weak Supervision. 1876-1880 - Wenkang Zhong, Chuanyi Li, Yunfei Zhang, Ziwen Ge, Jingyu Wang, Jidong Ge, Bin Luo:
An Automated and Flexible Multilingual Bug-Fix Dataset Construction System. 1881-1886 - Dapeng Yan, Zhipeng Gao, Zhiming Liu:
A Closer Look at Different Difficulty Levels Code Generation Abilities of ChatGPT. 1887-1898 - He Ye, Zimin Chen, Claire Le Goues:
PreciseBugCollector: Extensible, Executable and Precise Bug-Fix Collection: Solution for Challenge 8: Automating Precise Data Collection for Code Snippets with Bugs, Fixes, Locations, and Types. 1899-1910 - Chao Ni, Xinrong Guo, Yan Zhu, Xiaodan Xu, Xiaohu Yang:
Function-Level Vulnerability Detection Through Fusing Multi-Modal Knowledge. 1911-1918 - Xuezhi Song, Yijian Wu, Junming Cao, Bihuan Chen, Yun Lin, Zhengjie Lu, Dingji Wang, Xin Peng:
BugMiner: Automating Precise Bug Dataset Construction by Code Evolution History Mining. 1919-1929 - Aoyang Fang, Ruiyu Zhou, Xiaoying Tang, Pinjia He:
RPCover: Recovering gRPC Dependency in Multilingual Projects. 1930-1939 - Pengcheng Liu, Yifei Lu, Wenhua Yang, Minxue Pan:
VALAR: Streamlining Alarm Ranking in Static Analysis with Value-Flow Assisted Active Learning. 1940-1951 - Chaozheng Wang, Zongjie Li, Yun Peng, Shuzheng Gao, Sirong Chen, Shuai Wang, Cuiyun Gao, Michael R. Lyu:
REEF: A Framework for Collecting Real-World Vulnerabilities and Fixes. 1952-1962 - Jifeng Xuan, Qi Xin, Liqian Chen, Xiaoguang Mao:
Potential Solutions to Challenges in C Program Repair: A Practical Perspective. 1963-1968 - Sai Krishna Avula, Venkatesh Vobbilisetti, Shouvick Mondal:
Minecraft: Automated Mining of Software Bug Fixes with Precise Code Context. 1969-1979 - Chao Ni, Kaiwen Yang, Yan Zhu, Xiang Chen, Xiaohu Yang:
Unifying Defect Prediction, Categorization, and Repair by Multi-Task Deep Learning. 1980-1992 - Ningke Li, Shenao Wang, Mingxi Feng, Kailong Wang, Meizhen Wang, Haoyu Wang:
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains. 1993-2005 - Tianzhi Ma, Yanjie Zhao, Li Li, Liang Liu:
CiD4HMOS: A Solution to HarmonyOS Compatibility Issues. 2006-2017 - Egor Klimov, Muhammad Umair Ahmed, Nikolai Sviridov, Pouria Derakhshanfar, Eray Tüzün, Vladimir Kovalenko:
Bus Factor Explorer. 2018-2021 - Jia Xu, Xiao Liu, Wuzhen Pan, Xuejun Li, Aiting Yao, Yun Yang:
EXPRESS 2.0: An Intelligent Service Management Framework for AIoT Systems in the Edge. 2022-2025 - Rajrupa Chattaraj, Sridhar Chimalakonda:
RJoules: An Energy Measurement Tool for R. 2026-2029 - Imam Nur Bani Yusuf, Diyanah Binte Abdul Jamal, Lingxiao Jiang:
ArduinoProg: Towards Automating Arduino Programming. 2030-2033 - Gabin An, Minhyuk Kwon, Kyunghwa Choi, Jooyong Yi, Shin Yoo:
BUGSC++: A Highly Usable Real World Defect Benchmark for C/C++. 2034-2037 - Yuan-an Xiao, Chenyang Yang, Bo Wang, Yingfei Xiong:
ExpressAPR: Efficient Patch Validation for Java Automated Program Repair Systems. 2038-2041 - Nuno Saavedra, João Gonçalves, Miguel Henriques, João F. Ferreira, Alexandra Mendes:
Polyglot Code Smell Detection for Infrastructure as Code with GLITCH. 2042-2045 - Minghao Liu, Kunhang Lv, Pei Huang, Rui Han, Fuqi Jia, Yu Zhang, Feifei Ma, Jian Zhang:
NRAgo: Solving SMT(NRA) Formulas with Gradient-Based Optimization. 2046-2049 - Dirk Beyer, Po-Chun Chien, Nian-Ze Lee:
CPA-DF: A Tool for Configurable Interval Analysis to Boost Program Verification. 2050-2053 - Debeshee Das, Noble Saji Mathews, Alex Mathai, Srikanth Tamilselvam, Kranthi Sedamaki, Sridhar Chimalakonda, Atul Kumar:
COMEX: A Tool for Generating Customized Source Code Representations. 2054-2057 - Christian Birchler, Cyrill Rohrbach, Hyeongkyun Kim, Alessio Gambi, Tianhai Liu, Jens Horneber, Timo Kehrer, Sebastiano Panichella:
TEASER: Simulation-Based CAN Bus Regression Testing for Self-Driving Cars Software. 2058-2061 - Michael Bar-Sinai, Achiya Elyasaf, Gera Weiss, Yeshayahu Weiss:
Provengo: A Tool Suite for Scenario Driven Model-Based Testing. 2062-2065 - Xinyi Wang, Paolo Arcaini, Tao Yue, Shaukat Ali:
QuCAT: A Combinatorial Testing Tool for Quantum Software. 2066-2069 - Shixin Zhang, Shanna Li, Xi Deng, Jiwei Yan, Jun Yan:
ICTDroid: Parameter-Aware Combinatorial Testing for Components of Android Apps. 2070-2073 - Dirk Beyer, Martin Spiessl:
LIV: Loop-Invariant Validation Using Straight-Line Programs. 2074-2077 - Dirk Beyer, Marian Lingsch Rosenfeld, Martin Spiessl:
cegar-pt: A Tool for Abstraction by Program Transformation. 2078-2081 - Bohan Zhang, Yashaswini Shivalingaiah, Ankit Agrawal:
DroneReqValidator: Facilitating High Fidelity Simulation Testing for Uncrewed Aerial Systems Developers. 2082-2085 - Halil Ibrahim Ceylan, Onur Kilinççeker, Mutlu Beyazit, Serge Demeyer:
MUT4SLX: Fast Mutant Generation for Simulink. 2086-2089 - Jiakun Liu, Xing Hu, Ferdian Thung, Shahar Maoz, Eran Toch, Debin Gao, David Lo:
AutoDebloater: Automated Android App Debloating. 2090-2093 - Facundo Molina, Marcelo d'Amorim, Nazareno Aguirre:
SpecFuzzer: A Tool for Inferring Class Specifications via Grammar-Based Fuzzing. 2094-2097 - Xiufeng Xu, Chenguang Zhu, Yi Li:
Compsuite: A Dataset of Java Library Upgrade Incompatibility Issues. 2098-2101 - Monika Di Angelo, Thomas Durieux, João F. Ferreira, Gernot Salzer:
SmartBugs 2.0: An Execution Framework for Weakness Detection in Ethereum Smart Contracts. 2102-2105
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.