


default search action
32nd APSEC 2025: Macau, China
- 32nd Asia-Pacific Software Engineering Conference, APSEC 2025, Macau, China, December 2-5, 2025. IEEE 2025, ISBN 979-8-3315-6653-1

- Martin Monperrus:

Software Supply Chain Security of Web3. 1-10 - Feiqiao Mao, Xingyang Du, Shaocheng Feng, Jiafeng Guo, Yifan Bai:

CSMS: Boosting Class Code Summarization via Transformer Refinement and Method Summary Fusion. 1-5 - Mingda Chen, Bo Wang, Youfang Lin, Jie M. Zhang:

CAMUS: Context-Aware Neural Mutation Selection. 11-22 - Shunhui Ji, Yu Shi, Ji Deng, Pengcheng Zhang:

ISA: Test Case Generation Based on Improved Simulated Annealing Algorithm. 23-34 - Hadia Syed, Zhixing He, Ye Tang, Jiqing Liu, Shengjie Chen, Lixin Sun, Hao Zhong:

Understanding Commercial Low-code App Bugs. 35-46 - Ying Zhou, Yingying Shen, Bixin Li:

AutoRCA: A Graph Sequence-based Automatic Root Cause Analysis Method for Microservice Systems through Multimodal Data. 47-56 - Jingxiang Tu, Bo Lin, Yihao Qin, Shangwen Wang, Liqian Chen, Xiaoguang Mao:

Trace: Test Repair via Agent-based Context Extraction with LLMs. 57-68 - Tianchi Zhang, Jinhui Lyu, Yong Cai:

A Hierarchical Hybrid-Intelligence Architecture with Consensus, Debate, and Reflection for High-Fidelity NL-to-PPTL Conversion. 69-80 - Maha Sroor, Teerath Das, Rahul Mohanani, Tommi Mikkonen:

A Systematic Mapping Study on Risks and Vulnerabilities in Software Containers. 81-92 - Xinrui Li, Xin Yin, Chao Ni:

Enhancing Commit Classification for Software Maintenance with Adversarial Learning. 93-103 - Lingyun Huang, Xin Yin, Xinrui Li, Chao Ni:

Reliable Code Generation with Test Case Prioritization and Cognitive Validation. 104-114 - Qian Yan, Minhuan Huang, Huayang Cao:

SeedOrNot: A Classification-Based Framework for Efficient Seed Scheduling in Hybrid Fuzzing. 115-126 - Jiayi Wang, Shuxiang Zheng, Miao Zhang, Yan Xiao, Peihong Chen, Xiaoxing Yang:

An Empirical Study of Reinforcement Learning-based Class Integration Test Order Generation. 127-138 - Junfan Chen, Zhiyuan Fu, Ting Yang, Hongyu Sun, Ruidong Li, Yuqing Zhang:

MAAP: A Self-Evolving Multi-Agent Automated Vulnerability Repair Framework for Python. 139-148 - Zhiling Deng, Juepeng Wang, Zhuangbin Chen:

MICRORACER: Detecting Concurrency Bugs for Cloud Service Systems. 149-160 - Ziqing Su, Sini Chen, Ran Li, Huibiao Zhu, Jiapeng Wang:

BDafny: A Formal Execution and Verification Framework of BPMN 2.0 in Dafny. 161-172 - Yueqin Wang, Jingzheng Wu, Xiang Ling, Tianyue Luo, Xu Wang:

PyReach: A Multi-Agent Framework for Vulnerability Reachability Analysis in Python. 173-183 - Tiecheng Ma, Sirui Liu, Wei Dong, Jiaxin Liu, Yating Zhang:

MUATC: Multi-Agent Utilization to Augment Test Coverage. 184-195 - Peng Wang, Shunhui Ji, Yikun Guo, Pengcheng Zhang:

IPSO: An Improved Particle Swarm Optimization-Based Method for Test Case Generation. 196-207 - Dongxu Yu, Feiqiao Mao, Xingyang Du, Yifan Bai:

MTL-CR: A Multitask Learning Approach for Code Representation. 208-218 - Yan Song, Songqiang Chen, Haoyu Peng, Xiaoyuan Xie:

Testing Deep Learning Libraries with Semantic Equivalent API Patterns. 219-230 - Zhenglin Li, Dongqi Wang, Shuyue Zhang, Ruiguo Hu, Dongming Chen:

BEGA: A Binary Code Embedding Method Based on Gravity-Model Augmentation Graph Contrastive Learning. 231-242 - Xinyuan Miao, Yuting Chen, Ziyi Lin:

Conanj: Confidential Data Analysis for Confidential Computing of Java Programs. 243-254 - Nathan Daniel Schiele, Olga Gadyatskaya:

Empirical assessment of the perception of graphical threat model acceptability. 255-266 - Jiayi Li, Jingxuan Zhang, He Jiang, Jingjing Gu, Weiqin Zou:

Recovering Variable Names in the Decompiled Code Based on Multi-Task Learning. 267-278 - Peng He, Shuai Hu, Ju Ma, Haoqing Yang, Yifan Wang:

Software Defect Prediction Based on Temporal Hypergraph Neural Network. 279-289 - Gang Hu, Linhui Geng, Jiayao Jin, Xiaoshu Sun, Min Peng:

FixConsult: Leveraging External Defect Knowledge Driven Natural Language Suggestions Generation for Software Vulnerability Repair. 290-301 - Dingcheng Li, Shihao Zhu, Yan Cai, Long Zhang:

Seed-Adapted Cross-State Protocol Fuzzing. 302-313 - Bailing Song, Lanhao Qin, Wenhua Hu, Jianwen Xiang, Rui Hao:

Lightweight Attention-based Temporal Modeling of Key Facial Features for Driver Fatigue Detection in Intelligent Driver Monitoring Systems. 314-324 - Yue Yu, Jiahui Wang, Bo Meng, Dejun Wang:

caSPESC2Vyper: Conformant and Automatic Generation from DeFi SPESC Legal Contract to Vyper Smart Contract. 325-336 - Qingyuan Sun, Wentian Zhao, Tian Song:

Latent Search-Based Boundary Aware Fairness Testing for Deployed Deep Models. 337-346 - Shidong Pan, Yikai Ge, Xiaoyu Sun:

A First Look at Privacy Risks of Android Task-executable Voice Assistant Applications. 347-358 - Jianing Zhang, Jinchen Xu, Hongru Yang, Tao Zhang, Shuai Wang, Bei Zhou:

GATUNER:Genetic Algorithm Applied to Floating-Point Precision Tuning. 359-370 - Yingqian Guo, Wentian Zhao, Tian Song:

Cobweb: Enhanced Generation Diversity for Black-box Fairness Testing. 371-382 - Jiawen Wen, Bangshuo Zhu, Huaming Chen:

What You See Is Not Always What You Get: Evaluating GPT's Comprehension of Source Code. 383-394 - Gengwu Zhao, Lu Xiao, Hanbin Qin, Eman Abdullah AlOmar, Sunny Wong:

Mock Clones in the Wild: An Empirical Investigation Across Six Open-Source Projects. 395-406 - Xiao Yu, Lei Liu, Xing Hu, Jin Liu, Xin Xia:

Where Is Self-admitted Code Generated by Large Language Models on GitHub? 407-418 - Yunrui Pei, Yuk Kwan Wong, Chenyang Zhang, Hongshu Wang, Wenjie Zhang, Yun Lin:

TraceWalker: Synthesizing Interactive Debugging Progresses via Dataflow and Control-flow Inference. 419-430 - Yongqian Chen, Junwei Zhang, Xing Hu, Xin Xia:

Multi-Stage Generation of Rust Unit Tests with LLMs. 431-442 - Zhengxiang Chen, Zhiqiang Li, Hongyu Zhang, Jie Ren, Feng Tian:

An empirical comparison of data transformation techniques for clustering-based unsupervised software defect prediction. 443-454 - Changrong Huang, Shunhui Ji, Yu Shi, Pengcheng Zhang:

Dynamic Variance Reduction-Based Reusable Test Case Generation for Image Classification. 455-466 - Yuman Qin, Rong Peng:

ChatNRC: A Non-functional Requirement Classification Framework Based on a Generative and Discriminative Mechanism. 467-478 - Yu Zhao, Zixuan Zeng, Zhiqiu Huang, Lina Gong:

Dialogue Framework for Bug Issue Types Classification in Deep Learning-oriented Projects Based on Large Language Model. 479-490 - Yicheng Sun, Jacky Keung, Yihan Liao, Hi Kuen Yu:

Understanding Industrial Log Analysis: A Multi-Dataset Evaluation of Parsing and Anomaly Detection. 491-502 - Jun Huang, Meng Li, Xiaohua Yang, Jie Liu, Shiyu Yan:

SVPrompt-MR: An LLM-Based Metamorphic Relation Identification Method with Self-Verification Mechanism. 503-514 - Yangyang Zhao, Bingzheng Zhao, Zanxiang He, Liming Nie:

Exploring Developer Departure in Open-Source Software Projects: Prevalence, Reason Taxonomy, and Influencing Factors. 515-526 - Ruoxin Bai, Meng Wang, Wanqing Liu, Liang Wang:

Smart Contract Vulnerability Detection Based on Residual Dilated Convolution with Multi-Head Attention. 527-538 - Zhengyue Pan, Mingjie Tu, Shijie Li, Dandan Wang, Jie Chen:

Breaking the Curse of High-Dimensionality: A Transformer-Based Approach to Software Configuration Performance Prediction. 539-550 - Linghan Huang, Peizhou Zhao, Huaming Chen:

LLMs are All You Need? Improving Fuzz Testing for MOJO with Large Language Models. 551-562 - Yangyang Liu, Xinyu Li, Yan Xiao, Miao Zhang, Pengcheng Zhang:

LLM-Based Semantic Modeling and Cooperative Evolutionary Fuzzing for Traffic Violation Scenario Generation. 563-574 - Yifei Wang, Jacky Keung, Zhenyu Mao, Jingyu Zhang, Yuchen Cao:

Chart2Code-MoLA: Efficient Multi-Modal Code Generation via Adaptive Expert Routing. 575-586 - Xifan Xu, Jun Ma, Chun Cao:

Optimizing Type Duplication in WebAssembly Module Splitting. 587-598 - Gang Hu, Jiayao Jin, Fan Su, Linhui Geng, Fei Yang, Min Peng:

A Multi-Model Hybrid Framework Leveraging Query Expansion without Fine-Tuning for Zero-Shot Cross-Domain Code Search. 599-610 - Sinan Wang, Zhiyuan Zhong, Shaojin Wen, Yepang Liu:

Multi-Agent Assisted Automatic Test Generation for Java JSON Libraries. 611-622 - Long Chen, Wenhua Hu, Rui Hao, Junwei Zhou, Jianwen Xiang:

Practical Lossless Recompression of JPEG Images Using Transform Domain Prediction. 623-633 - Junyu Chen, Xiuhua Li, Jinping Wang, Huan Xie, Chunyan Liu, Zhenyu Wu, Yan Lei:

AgentTCP: A Collaborative Multi-Agent Framework for Change-Aware Test Case Prioritization. 634-645 - Sicheng He, Wanwei Zhan, Jijun Wang, Junjie Dai, Haoxuan Chen, Cheng Tan, Fuyang Li:

How Do Developers Use ChatGPT for Software Test Generation? Usage Patterns, Satisfaction, and Code Adoption Analysis. 646-657 - Ziyang Wang, Xiaohong Li, Lili Quan, Zhiping Zhou, Yao Zhang, Ruitao Feng:

SMTPRT: Performance Regression Testing and Localization for SMT Solvers Across Multiple Logics. 658-667 - Ben Cheng, Yi Wang, Oscar Wu, Thuong N. Hoang, Xiao Liu, Chetan Arora:

Edge4RE: A Novel Edge-Cloud Collaborative Framework for Privacy-Preserving Automated Requirements Documentation. 668-677 - Huan Jin, Yingkai Yuan, Bangchao Wang, Hongyan Wan, Zhiyuan Zou:

HGTRTracer: Advancing Requirements-Code Traceability with LLM-Augmented Attribution Reasoning and Heterogeneous Graph Transformer. 678-689 - ShengXin Zhao, Chunhui Wang, Zhiguo Liu, Tong Li, Ye Zhai:

A Soft Prompt-Enhanced Device Knowledge Extraction Method for Embedded System Requirements Elicitation. 690-701 - Joonwoo Lee, Seungho Kim, Scott Uk-Jin Lee:

Enhancing Diffusion-Driven Test Input Generation using Large Language Model. 702-713 - Yi Wang, Chunhui Wang, Ye Zhai, Tong Li, Zhiguo Liu:

MSPM: A Multi-Strategy Prompting Method for Goal-Oriented Modeling from User Stories. 714-724 - Siyuan Ma, Shihao Zhu, Long Zhang, Yan Cai:

A Packing-Insensitive Detection Method for Android Malware Based on Image Representation. 725-736 - Yihan Liao, Jacky Keung, Xiaoxue Ma, Jingyu Zhang, Yicheng Sun:

PerProb: Indirectly Evaluating Memorization in Large Language Models. 737-748 - Yihan Liao, Jacky Keung, Xiaoxue Ma, Jingyu Zhang, Yicheng Sun:

Exposing and Defending Membership Leakage in Vulnerability Prediction Models. 749-760 - Peyman Yazdanian, Yan Liu, Zheng Li:

A Comparative Study Towards Designing a Hybrid Architecture of Microservices and LLM-based Multi-Agent Systems. 761-772 - Zhichao Shi, Qiang Han, Zihao Zhang:

Chain of Command: Context-Aware Android Malware Detection via Permission-to-API Call Chains and Graph Representation Learning. 773-784 - Hi Kuen Yu, Jacky Keung, Yicheng Sun, Yihan Liao, Richard Suen:

Towards Lightweight LLM Software Solutions for InsurTech: A Framework for Scalable Question Answering Systems. 785-795 - Iflaah Salman, Alvaro Francisco Gil, Juan Garbajosa, Peter A. Gloor:

Human Ants are Beneficial for Team Performance. 796-807 - Haruka Tsuchida, Yuha Nishigata, Miyu Sato, Waka Ito, Kimio Kuramitsu:

Developing a Japanese-Localization Code Generation Benchmark for LLMs. 808-809 - Tomoki Nakamaru:

Compressing Cell Execution Logs Embedded within Jupyter Notebook Files. 810-811 - Wenqing Wang, Ye Wang, Liping Zhao, Qiao Huang, Bo Jiang:

Enhancing Requirement-to-Code Traceability via Chain-of-Thought Prompting in Large Language Models. 812-816 - ShinHyuck Kang, Jinseok Heo, Eunseok Lee:

An Empirical Analysis of ESLint Information Components and Their Interactions in LLM-based Program Repair. 817-821 - Zhiyao Wang, Xiujing Guo, Tatsuhiro Tsuchiya:

RAG4Test: Retrieving GUI States for Multilingual Bug Report and Test Case Generation via LLMs. 822-826 - Jigang Xie, Zhengfan Wang, Junchao He, Wenjing Jiao, Pengfei Dang, Yadong Zhou, Wei Zhang, Ming Fan:

MAJD: Intent-Aware Multi-Agent Framework for Jailbreak Defense. 827-831 - Sota Nakashima, Yuta Ishimoto, Masanari Kondo, Tao Xiao, Yasutaka Kamei:

How Far Have LLMs Come Toward Automated SATD Taxonomy Construction? 832-836 - Ming Zhong, Xin Sun:

Towards Function-Level Correctness Assessment of System Software with LLMs: A Case Study. 837-841 - Zheng Li, Maria Angela Ferrario, Ben Crossey, Austen Rainer:

Explainable Software Engineering: From State of the Practice to State of the Art. 842-846 - Xinni Liu, Xinpeng Li, Guangping Yu, Hengbiao Yu, Xin Yi, Chun Huang:

Function-level Optimization Automatic Tuner for Numerical Programs. 847-851 - Hussain Ahmad, Christoph Treude, Markus Wagner, Claudia Szabo:

Resilient Auto-Scaling of Microservice Architectures with Efficient Resource Management. 852-856 - Zhifang Tan, Chuanqi Tao:

MDT-TM: Multi-Dimensional Metamorphic Testing of Terminology in Machine Translation. 857-861 - Teeradaj Racharak, Chaiyong Ragkhitwetsagul, Chayanee Junplong, Akara Supratak:

Natural Language Explanation in Code Clone Detection using LLM-based Post Hoc Explainer. 862-866 - Yunpeng Wang, Dongcheng Li, Man Zhao, W. Eric Wong:

Feature-based Transfer Learning in Cross-Project Defect Prediction: A Systematic Review. 867-871 - Hanyu Zhang, Tomoji Kishi:

KG-Code: A Knowledge Graph Guided Pre-Training Approach for Code Representation. 872-876 - Chao Zhang:

Practices and Challenges of Using DeepSeek in SE: An Empirical Study. 877-881 - Xianglu Zhou, Xiaoyan Zhu, Yu Wang, Jiayin Wang, Xin Lai:

Cross-Project Defect Prediction Based on Feature Fusion and Local Domain Adaptation. 882-886 - Lingzhong Yu, Qing Zhou, Subo Zhao, Siyuan Wang:

MSWT: Multi-Scale Wavelet Transformer for Dynamic Feature-Based Student Program Error Identification. 887-891 - Sijia Wang, Jy Duan, Xin Li, Haoguang Wen, Yizhuo Zhang, Chunming Liu, Zibo Yi:

QEC-LLM: Training Query-focused Extractive Compression Model with LLM-guiding for Open Domain QA. 892-896 - Zhenyu Mao, Jacky Keung, Fengji Zhang, Shuo Liu, Yifei Wang, Jialong Li:

Towards Engineering Multi-Agent LLMs: A Protocol-Driven Approach. 897-901 - Chenxi Lv, Shmuel S. Tyszberowicz, Zhiming Liu, Bo Liu:

Automating Requirements Modelling with LLMs: An Iterative Contrastive Optimisation Approach. 902-906 - Hao Chen, Bixin Li, Chunguang Zhang, Zixuan Liu:

A Software Architecture Resilience Assessment Method via Dynamic Bayesian Networks. 907-911 - Jing Shi, Chenglin Xie, Jianbo Gao, Peilun Li, Guoli Yang, Xiaoying Bai:

BlockAlign: Fair Performance Testing for Blockchains based on Configuration Alignment. 912-916 - Ruiguo Hu, Dongqi Wang, Mingzhao Xie, Zhenglin Li, Dongming Chen:

TriGraSum: A Tri-level Graph-based Architecture for Source Code Summarization. 917-921 - Jianbo Lin, Yuan Zhang, Chuanyi Li, Wentao Zou, Jidong Ge, Bin Luo:

Retrieval-Augmented Code Generation of Low-Resource Programming Languages. 927-931 - Yihui Guo, Shmuel S. Tyszberowicz, Zhiming Liu, Bo Liu:

Unified Modelling and Consistency Verification of UML Multi-View Models Using Alloy. 932-936 - Chenxi Mao, Yuxin Su, Dan Li:

LogExpertSolver: A Multi-Agent Framework for Domain-Specialized Log Parsing. 937-946 - Yunqian Wang, Xiaohong Li, Ruitao Feng, Yao Zhang, Yuekang Li, Zhiping Zhou:

It Only Gets Worse: Revisiting DL-Based Vulnerability Detectors from a Practical Perspective. 947-956 - Xiyue Ruan, Zheng Xu, Yifan Xu, Yunduo Wang, Lindong Wang, Minzhe Li, Ning Ge:

Constructing and Evaluating Domain-Specific Synthetic QA Datasets for Airborne Software Engineering: An LLM-Based Framework in Practice. 957-966 - Wei Minn, Phong Phan, Vikas Kumar Malviya, Benjamin Adolphi, Yan Naing Tun, Henning Benzon Treichl, Albert Ching, Lwin Khin Shar, David Lo:

Virtualization-based Penetration Testing Study for Detecting Accessibility Abuse Vulnerabilities in Banking Apps in East and Southeast Asia. 967-972 - Xingru Chen, Muhammad Usman, Deepika Badampudi:

A Catalog of Participatory Reuse Challenges, Solutions, and Lessons Learned. 973-982 - Shady Hegazy, Muhammad Ammar, Christoph Elsner, Jan Bosch, Helena Holmström Olsson:

Towards Data-Driven Real-Time Performance Monitoring of Platform Ecosystems. 983-992 - Shijia Li, Gaowei Zhang, Yi Wang:

Galene: A Toolkit for Encapsulating Software Engineering Practices in Marine Science AI Applications. 993-996 - Arogya Kharel, Xiangchi Song, In-Young Ko:

OrchestML: Continuous Integration Tool for Automated Machine Learning Service Compositions. 997-1000 - Alfred Asare Amoah, Yan Liu:

XRepair - Unifying Retrieval, Repair, and Evaluation for Explainable LLM-Based Vulnerability Fixes. 1001-1004 - Chommakorn Sontesadisai, Chalisa Sae-Ngow, Jirateep Rudeerudchanawong, Lapatrada Dangsungnoen, Chaiyong Ragkhitwetsagul, Teeradaj Racharak, Thanwadee Sunetnanta:

PromptOps: Automated Tool for Testing Trustworthiness of LLMs. 1005-1008 - Nichika Takasu, Shinpei Ogata, Kozo Okano, Erina Makihara:

A Block-Based Educational Tool for Novice Understanding of State Machine Representation. 1009-1012 - Mengyuan Liu, Zexun Zhan, Cuiyun Gao, Yujia Chen, Guoai Xu, Chun Yong Chong, Shan Gao, Xin Xia:

Multi-view Leaderboard: Towards Evaluating the Code Intelligence of LLMs From Multiple Views. 1013-1016 - Yusaku Kato, Norihiro Yoshida, Erina Makihara, Katsuro Inoue:

BiFuzz: A Two-Stage Fuzzing Tool for Open-World Video Games. 1017-1020 - Panya Trakoolgerntong, Tao Xiao, Masanari Kondo, Chaiyong Ragkhitwetsagul, Morakot Choetkiertikul, Pattaraporn Sangaroonsilp, Yasutaka Kamei:

AILinkPreviewer: Enhancing Code Reviews with LLM-Powered Link Previews. 1021-1024 - Binchang Li, Qingyuan Li, Cuiyun Gao, Qing Liao:

PATCHOULI: Fine-grained Security Patch Detection Engine. 1025-1028 - Keyu Liang, Chao Xiang, Zhifan Ye, Zhongxin Liu, Haoye Wang, Hao Guo, Youju Chen:

SQLWizard: A Tool for Robust Text-to-SQL via Intelligent Selection and Fine-Grained Refinement. 1029-1032 - Weina Zhang, Dalin Zhang, Zhenguo Ding:

Software Trustworthiness Assessment Based on Causal Evidence Graph. 1033-1035 - Wenxin Yao:

CIMAS: A Multilingual Semantic-Driven Model for Code Idiom Mining, Abstraction and Synthesis. 1036-1038 - Nanami Moribe:

Reasoning Design and Code from Mockup Diagrams Using Vision-LMs. 1039-1041 - Junhua Zhu:

ModelVirtualizer: A Light-weight Virtualization Framework for On-Device Deep Learning Models. 1042-1044 - Karin Yamashita:

Detecting Data Contamination in Code Generation Benchmarks via DiffMIA. 1045-1046

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














