


default search action
ACM Transactions on Software Engineering and Methodology, Volume 34
Volume 34, Number 1, January 2025
- Abhik Roychoudhury

:
Editorial: TOSEM Journal in 2025 and Beyond. 1:1-1:3
- Zhipeng Gao

, Yanqi Su
, Xing Hu
, Xin Xia
:
Automating TODO-missed Methods Detection and Patching. 2:1-2:28 - Jana-Rebecca Rehse

, Sander J. J. Leemans
, Peter Fettke
, Jan Martijn E. M. van der Werf
:
On Process Discovery Experimentation: Addressing the Need for Research Methodology in Process Discovery. 3:1-3:29 - Martin P. Robillard

, Mathieu Nassif
, Muhammad Sohail
:
Understanding Test Convention Consistency as a Dimension of Test Quality. 4:1-4:39 - Xinyi Wang

, Asmar Muqeet
, Tao Yue
, Shaukat Ali
, Paolo Arcaini
:
Test Case Minimization with Quantum Annealers. 5:1-5:24 - Evangelos Ntentos

, Nicole Elisabeth Lueger
, Georg Simhandl
, Uwe Zdun
, Simon Schneider
, Riccardo Scandariato
, Nicolás E. Díaz Ferreyra:
On the Understandability of Design-Level Security Practices in Infrastructure-as-Code Scripts and Deployment Architectures. 6:1-6:37 - Moses Openja

, Foutse Khomh
, Armstrong Foundjem
, Zhen Ming (Jack) Jiang
, Mouna Abidi
, Ahmed E. Hassan
:
An Empirical Study of Testing Machine Learning in the Wild. 7:1-7:63 - Haipeng Wang

, Zhengyuan Wei
, Qilin Zhou
, Wing-Kwong Chan
:
Context-Aware Fuzzing for Robustness Enhancement of Deep Learning Models. 8:1-8:68 - Haojun Zhao

, Yueming Wu
, Deqing Zou
, Yang Liu
, Hai Jin
:
MalSensor: Fast and Robust Windows Malware Classification. 9:1-9:28 - Iren Mazloomzadeh

, Gias Uddin
, Foutse Khomh
, Ashkan Sami
:
Reputation Gaming in Crowd Technical Knowledge Sharing. 10:1-10:41 - Wenkang Zhong

, Chuanyi Li
, Kui Liu
, Jidong Ge
, Bin Luo
, Tegawendé F. Bissyandé
, Vincent Ng
:
Benchmarking and Categorizing the Performance of Neural Program Repair Systems for Java. 11:1-11:35 - Jierui Zhang

, Liang Wang
, Ying Li
, Jing Jiang
, Tao Wang
, Xianping Tao
:
Measuring and Mining Community Evolution in Developer Social Networks with Entropy-Based Indices. 12:1-12:43 - Chuan Luo

, Jianping Song
, Qiyuan Zhao
, Binqi Sun
, Junjie Chen
, Hongyu Zhang
, Jinkun Lin
, Chunming Hu
:
Solving the t-Wise Coverage Maximum Problem via Effective and Efficient Local Search-Based Sampling. 13:1-13:64 - Yongda Yu, Guoping Rong, Haifeng Shen, He Zhang, Dong Shao, Min Wang, Zhao Wei, Yong Xu, Juhong Wang:

Fine-Tuning Large Language Models to Improve Accuracy and Comprehensibility of Automated Code Review. 14:1-14:26 - Li Huang

, Weifeng Sun
, Meng Yan
, Zhongxin Liu
, Yan Lei
, David Lo
:
Neuron Semantic-Guided Test Generation for Deep Neural Networks Fuzzing. 15:1-15:38 - Jasmine Latendresse

, Samuel Abedu
, Ahmad Abdellatif
, Emad Shihab
:
An Exploratory Study on Machine Learning Model Management. 16:1-16:31
- Xu Yang

, Gopi Krishnan Rajbahadur
, Dayi Lin
, Shaowei Wang
, Zhen Ming (Jack) Jiang
:
SimClone: Detecting Tabular Data Clones Using Value Similarity. 17:1-17:27 - Jon Ayerdi

, Asier Iriarte
, Pablo Valle
, Ibai Roman
, Miren Illarramendi
, Aitor Arrieta
:
MarMot: Metamorphic Runtime Monitoring of Autonomous Driving Systems. 18:1-18:35 - Nima Shiri Harzevili

, Mohammad Mahdi Mohajer
, Moshi Wei
, Hung Viet Pham
, Song Wang
:
History-Driven Fuzzing for Deep Learning Libraries. 19:1-19:29 - Hao Li

, Gopi Krishnan Rajbahadur
, Cor-Paul Bezemer
:
Studying the Impact of TensorFlow and PyTorch Bindings on Machine Learning Software Quality. 20:1-20:31 - Zhensu Sun

, Xiaoning Du
, Fu Song
, Shangwen Wang
, Mingze Ni
, Li Li
, David Lo
:
Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion Systems. 21:1-21:22 - Kaichun Yao

, Hao Wang
, Chuan Qin
, Hengshu Zhu
, Yanjun Wu
, Libo Zhang
:
CARL: Unsupervised Code-Based Adversarial Attacks for Programming Language Models via Reinforcement Learning. 22:1-22:32
- Sabreen Ahmadjee

, Carlos Joseph Mera-Gómez, Siamak Farshidi
, Rami Bahsoon
, Rick Kazman
:
Decision Support Model for Selecting the Optimal Blockchain Oracle Platform: An Evaluation of Key Factors. 23:1-23:35
- Shandler A. Mason

, Sandeep Kaur Kuttal
:
Diversity's Double-Edged Sword: Analyzing Race's Effect on Remote Pair Programming Interactions. 24:1-24:45
- Jingzhi Gong

, Tao Chen
:
Deep Configuration Performance Learning: A Systematic Survey and Taxonomy. 25:1-25:62
- Ruixiang Qian

, Quanjun Zhang
, Chunrong Fang
, Ding Yang
, Shun Li
, Binyu Li
, Zhenyu Chen
:
DiPri: Distance-Based Seed Prioritization for Greybox Fuzzing. 26:1-26:39
- Ruixiang Qian

, Quanjun Zhang
, Chunrong Fang
, Ding Yang
, Shun Li
, Binyu Li
, Zhenyu Chen
:
DiPri: Distance-Based Seed Prioritization for Greybox Fuzzing - RCR Report. 27:1-27:13
Volume 34, Number 2, February 2025
- Fernando Uyaguari

, Silvia Teresita Acuña, John W. Castro
, Davide Fucci
, Oscar Dieste
, Sira Vegas
:
Relevant Information in TDD Experiment Reporting. 28:1-28:41 - Olivier Nourry

, Yutaro Kashiwa
, Weiyi Shang
, Honglin Shu
, Yasutaka Kamei
:
My Fuzzers Won't Build: An Empirical Study of Fuzzing Build Failures. 29:1-29:30 - Weifeng Pan

, Wei Wu
, Ming Hua, Dae-Kyoo Kim
, Zijiang Yang
, Yutao Ma
:
Toward the Fractal Dimension of Classes. 30:1-30:50 - Leandro O. Souza, Eduardo Santana de Almeida

, Paulo Anselmo da Mota Silveira Neto
, Earl T. Barr
, Justyna Petke
:
Software Product Line Engineering via Software Transplantation. 31:1-31:27 - Madhu Selvaraj

, Gias Uddin
:
A Large-Scale Study of IoT Security Weaknesses and Vulnerabilities in the Wild. 32:1-32:40 - Xuetao Li

, Yuxia Zhang
, Cailean Osborne
, Minghui Zhou
, Zhi Jin
, Hui Liu
:
Systematic Literature Review of Commercial Participation in Open Source Software. 33:1-33:31 - Zhenyang Xu

, Yongqiang Tian
, Mengxiao Zhang
, Jiarui Zhang
, Puzhuo Liu
, Yu Jiang
, Chengnian Sun
:
T-Rec: Fine-Grained Language-Agnostic Program Reduction Guided by Lexical Syntax. 34:1-34:31 - Jongchan Park

, Tae Eun Kim
, Dongsun Kim
, Kihong Heo
:
Improving Fault Localization with External Oracle by Using Counterfactual Execution. 35:1-35:22 - Guoqing Wang

, Zeyu Sun
, Jinhao Dong
, Yuxia Zhang
, Mingxuan Zhu
, Qingyuan Liang
, Dan Hao
:
Is It Hard to Generate Holistic Commit Message? 36:1-36:28 - Jia Li

, Ge Li
, Yongmin Li
, Zhi Jin
:
Structured Chain-of-Thought Prompting for Code Generation. 37:1-37:23 - Emanuela Guglielmi

, Gabriele Bavota
, Rocco Oliveto
, Simone Scalabrino
:
Automatic Identification of Game Stuttering via Gameplay Videos Analysis. 38:1-38:29 - Ahcheong Lee

, Youngseok Choi
, Shin Hong
, Yunho Kim
, Kyutae Cho
, Moonzoo Kim
:
ZigZagFuzz: Interleaved Fuzzing of Program Options and Files. 39:1-39:31 - Pouria Alikhanifard

, Nikolaos Tsantalis
:
A Novel Refactoring and Semantic Aware Abstract Syntax Tree Differencing Tool and a Benchmark for Evaluating the Accuracy of Diff Tools. 40:1-40:63 - Zheng Zheng

, Dai-Xu Ren
, Huai Liu
, Tsong Yueh Chen
, Tiancheng Li
:
Identifying the Failure-Revealing Test Cases in Metamorphic Testing: A Statistical Approach. 41:1-41:26 - Shuyin Ouyang

, Jie M. Zhang
, Mark Harman
, Meng Wang
:
An Empirical Study of the Non-Determinism of ChatGPT in Code Generation. 42:1-42:28 - Jianhong Zhao

, Yongwang Zhao
, Peisen Yao
, Fanlang Zeng
, Bohua Zhan
, Kui Ren
:
KBX: Verified Model Synchronization via Formal Bidirectional Transformation. 43:1-43:40 - Yuekai Huang

, Junjie Wang
, Song Wang
, Moshi Wei
, Lin Shi
, Zhe Liu
, Qing Wang
:
Deep API Sequence Generation via Golden Solution Samples and API Seeds. 44:1-44:21 - Yu Pei

, Jeongju Sohn
, Sarra Habchi
, Mike Papadakis
:
Non-Flaky and Nearly Optimal Time-Based Treatment of Asynchronous Wait Web Tests. 45:1-45:29 - Jianming Chen

, Yawen Wang
, Junjie Wang
, Xiaofei Xie
, Dandan Wang
, Qing Wang
, Fanjiang Xu
:
Demo2Test: Transfer Testing of Agent in Competitive Environment with Failure Demonstrations. 46:1-46:28
- Qipeng Wang

, Shiqi Jiang
, Zhenpeng Chen
, Xu Cao
, Yuanchun Li
, Aoyu Li
, Yun Ma
, Ting Cao
, Xuanzhe Liu
:
Anatomizing Deep Learning Inference in Web Browsers. 47:1-47:43 - Jinjing Shi

, Zimeng Xiao
, Heyuan Shi
, Yu Jiang
, Xuelong Li
:
QuanTest: Entanglement-Guided Testing of Quantum Neural Network Systems. 48:1-48:32 - Pin Ji

, Yang Feng
, Ruohao Zhang
, Ruichen Xue
, Yichi Zhang
, Weitao Huang
, Jia Liu
, Zhihong Zhao
:
NLPLego: Assembling Test Generation for Natural Language Processing Applications. 49:1-49:36 - Xinyu Sun

, Wanwei Liu
, Shangwen Wang
, Tingyu Chen
, Ye Tao
, Xiaoguang Mao
:
AutoRIC: Automated Neural Network Repairing Based on Constrained Optimization. 50:1-50:29 - Ali Rezaei Nasab

, Maedeh Dashti
, Mojtaba Shahin
, Mansooreh Zahedi
, Hourieh Khalajzadeh
, Chetan Arora
, Peng Liang
:
Fairness Concerns in App Reviews: A Study on AI-Based Mobile Apps. 51:1-51:30 - Yongqian Sun

, Zihan Lin
, Binpeng Shi
, Shenglin Zhang
, Shiyu Ma
, Pengxiang Jin
, Zhenyu Zhong
, Lemeng Pan
, Yicheng Guo
, Dan Pei
:
Interpretable Failure Localization for Microservice Systems Based on Graph Autoencoder. 52:1-52:28 - Damiano Torre

, Anitha Chennamaneni
, JaeYun Jo
, Gitika Vyas
, Brandon Sabrsula
:
Toward Enhancing Privacy Preservation of a Federated Learning CNN Intrusion Detection System in IoT: Method and Empirical Study. 53:1-53:48
- Mathieu Nassif

, Martin P. Robillard
:
Non-Linear Software Documentation with Interactive Code Examples. 54:1-54:32
- Zhiwei Fei

, Jidong Ge
, Chuanyi Li
, Tianqi Wang
, Yuning Li
, Haodong Zhang
, LiGuo Huang
, Bin Luo
:
Patch Correctness Assessment: A Survey. 55:1-55:50
- Hichem Belgacem

, Xiaochen Li
, Domenico Bianculli
, Lionel C. Briand
:
A Machine Learning Approach for Automated Filling of Categorical Fields in Data Entry Forms - RCR Report. 56:1-56:7
Volume 34, Number 3, March 2025
- Luciano Zemín

, Ariel Godio
, César Cornejo
, Renzo Degiovanni
, Simón Gutiérrez Brida
, Germán Regis
, Nazareno Aguirre
, Marcelo Fabian Frias
:
An Empirical Study on the Suitability of Test-based Patch Acceptance Criteria. 57:1-57:20 - Shangwen Wang

, Bo Lin
, Liqian Chen
, Xiaoguang Mao
:
Divide-and-Conquer: Automating Code Revisions via Localization-and-Revision. 58:1-58:26 - Beatriz Pérez

, Ángel Luis Rubio
, María A. Zapata
:
PROV-IDEA: Supporting Interoperable Schema and Data Provenance within Database Evolution. 59:1-59:27 - Ting Zhang

, Ivana Clairine Irsan
, Ferdian Thung
, David Lo
:
Revisiting Sentiment Analysis for Software Engineering in the Era of Large Language Models. 60:1-60:30 - Victor Crespo-Rodriguez

, Neelofar
, Aldeida Aleti
, Burak Turhan
:
Instance Space Analysis of Testing of Autonomous Vehicles in Critical Scenarios. 61:1-61:36 - Xiao Yu

, Guancheng Lin
, Xing Hu
, Jacky Wai Keung
, Xin Xia
:
Less Is More: Unlocking Semi-Supervised Deep Learning for Vulnerability Detection. 62:1-62:37 - Jakob Svennevik Notland

, Mariusz Nowostawski
, Jingyue Li
:
An Empirical Study on Governance in Bitcoin's Consensus Evolution. 63:1-63:47 - Wenwei Gu

, Jinyang Liu
, Zhuangbin Chen
, Jianping Zhang
, Yuxin Su
, Jiazhen Gu
, Cong Feng
, Zengyin Yang
, Yongqiang Yang
, Michael R. Lyu
:
Identifying Performance Issues in Cloud Service Systems Based on Relational-Temporal Features. 64:1-64:31 - Luyao Ren

, Xing Zhang
, Ziyue Hua
, Yanyan Jiang
, Xiao He
, Yingfei Xiong
, Tao Xie
:
Validity-Preserving Delta Debugging via Generator Trace Reduction. 65:1-65:33 - Juan de Lara

, Esther Guerra
:
Adaptive Modelling Languages: Abstract Syntax and Model Migration. 66:1-66:54 - Elvira Albert

, Reiner Hähnle
, Alicia Merayo
, Dominic Steinhöfel
:
Certified Cost Bounds for Abstract Programs. 67:1-67:33 - Shayan Noei

, Heng Li
, Ying Zou
:
Detecting Refactoring Commits in Machine Learning Python Projects: A Machine Learning-Based Approach. 68:1-68:25 - Yuntong Zhang

, Andreea Costea
, Ridwan Shariffdeen
, Davin McCall
, Abhik Roychoudhury
:
EffFix: Efficient and Effective Repair of Pointer Manipulating Programs. 69:1-69:27 - Yunqi Chen

, Zhiyuan Wan
, Yifei Zhuang
, Ning Liu
, David Lo
, Xiaohu Yang
:
Understanding the OSS Communities of Deep Learning Frameworks: A Comparative Case Study of PyTorch and TensorFlow. 70:1-70:30 - Yuan Zhang

, Lei Qu
, Yifei Wu
, Leihuan Wu
, Tingting Yu
, Rui Chen
, Weiqiang Kong
:
Bounded Verification of Atomicity Violations for Interrupt-Driven Programs via Lazy Sequentialization. 71:1-71:33 - Mikhail Evtikhiev

, Ekaterina Koshchenko
, Vladimir Kovalenko
:
What Could Possibly Go Wrong: Undesirable Patterns in Collective Development. 72:1-72:50 - Yufei Zhou

, Haihua Tang
, Longtao Zhu
, Hao Ding
, Junyan Qian
:
Refining Code-Line-Level Bugginess Identification: Getting the Best of Both Worlds by Fusing Syntactic and Semantic Features. 73:1-73:43 - Xiaoqin Fu

, Asif Zaman
, Haipeng Cai
:
DistMeasure: A Framework for Runtime Characterization and Quality Assessment of Distributed Software via Interprocess Communications. 74:1-74:53 - Yinan Chen

, Yuan Huang
, Xiangping Chen
, Zibin Zheng
:
TG-CUP: A Transformer and GNN-Based Multi-Modal Comment Updating Method. 75:1-75:22
- Ye Fan

, Chuanyi Li
, Jidong Ge
, LiGuo Huang
, Bin Luo
:
Effective Hard Negative Mining for Contrastive Learning-Based Code Search. 76:1-76:35 - Yihong Dong

, Jiazheng Ding
, Xue Jiang
, Ge Li
, Zhuo Li
, Zhi Jin
:
CodeScore: Evaluating Code Generation by Learning Code Execution. 77:1-77:22 - Xiaodong Gu

, Meng Chen
, Yalan Lin
, Yuhan Hu
, Hongyu Zhang
, Chengcheng Wan
, Zhao Wei
, Yong Xu
, Juhong Wang
:
On the Effectiveness of Large Language Models in Domain-Specific Code Generation. 78:1-78:22 - Jianhang Xiang

, Zhipeng Gao
, Lingfeng Bao
, Xing Hu
, Jiayuan Chen
, Xin Xia
:
Automating Comment Generation for Smart Contract from Bytecode. 79:1-79:31 - Wentao Zou

, Qi Li
, Chuanyi Li
, Jidong Ge
, Xiang Chen
, LiGuo Huang
, Bin Luo
:
Improving Source Code Pre-Training via Type-Specific Masking. 80:1-80:34 - Quanjun Zhang

, Weifeng Sun
, Chunrong Fang
, Bowen Yu
, Hongyan Li
, Meng Yan
, Jianyi Zhou
, Zhenyu Chen
:
Exploring Automated Assertion Generation via Large Language Models. 81:1-81:25 - Xinyue Li

, Zhenpeng Chen
, Jie M. Zhang
, Federica Sarro
, Ying Zhang
, Xuanzhe Liu
:
Bias behind the Wheel: Fairness Testing of Autonomous Driving Systems. 82:1-82:24
- Puzhuo Liu

, Chengnian Sun
, Yaowen Zheng
, Xuan Feng
, Chuan Qin
, Yuncheng Wang
, Zhenyang Xu
, Zhi Li
, Peng Di
, Yu Jiang
, Limin Sun
:
LLM-Powered Static Binary Taint Analysis. 83:1-83:36 - Yicheng Zeng

, Zhanwei Song
, Guo Lv
, Yu Zhou
, Hongsong Zhu
, Limin Sun
:
Backsolver: Adapting Preceding Execution Paths to Solve Constraints for Concolic Execution. 84:1-84:30
- Nico Schiller

, Xinyi Xu
, Lukas Bernhard
, Nils Bars
, Moritz Schloegel
, Thorsten Holz
:
Novelty Not Found: Exploring Input Shadowing in Fuzzing through Adaptive Fuzzer Restarts. 85:1-85:32
- Nico Schiller

, Xinyi Xu
, Lukas Bernhard
, Nils Bars
, Moritz Schloegel
, Thorsten Holz
:
Novelty Not Found: Exploring Input Shadowing in Fuzzing through Adaptive Fuzzer Restarts - RCR Report. 86:1-86:3
Volume 34, Number 4, May 2025
- Vahid Majdinasab

, Amin Nikanjam
, Foutse Khomh
:
Trained without My Consent: Detecting Code Inclusion in Language Models Trained on Code. 87:1-87:46 - Jialiang Wei

, Anne-Lise Courbis
, Thomas Lambolais
, Binbin Xu
, Pierre-Louis Bernard
, Gérard Dray
, Walid Maalej
:
GUing: A Mobile GUI Search Engine using a Vision-Language Model. 88:1-88:30 - Yongqian Sun

, Minghan Liang
, Shenglin Zhang
, Zeyu Che
, Zhiyao Luo
, Dongwen Li
, Yuzhi Zhang
, Dan Pei
, Lemeng Pan
, Liping Hou
:
Efficient Multivariate Time Series Anomaly Detection through Transfer Learning for Large-Scale Software Systems. 89:1-89:25 - Azmain Kabir

, Shaowei Wang
, Yuan Tian
, Tse-Hsun (Peter) Chen
, Muhammad Asaduzzaman
, Wenbin Zhang
:
ZS4C: Zero-Shot Synthesis of Compilable Code for Incomplete Code Snippets Using LLMs. 90:1-90:30 - Xiaodan Xu, Chao Ni

, Xinrong Guo, Shaoxuan Liu, Xiaoya Wang, Kui Liu
, Xiaohu Yang:
Distinguishing LLM-Generated from Human-Written Code by Contrastive Learning. 91:1-91:31 - Ruidong Han

, Shangzhi Xu
, Juanru Li
, Elisa Bertino
, David Lo
, Jianfeng Ma
, Siqi Ma
:
Real-time Rectifying Flight Control Misconfiguration Using Intelligent Agent. 92:1-92:29 - Zihan Sha

, Hao Wang
, Zeyu Gao
, Hui Shu
, Bolun Zhang
, Ziqing Wang
, Chao Zhang
:
llasm: Naming Functions in Binaries by Fusing Encoder-only and Decoder-only LLMs. 93:1-93:22 - Yuta Ishimoto

, Masanari Kondo
, Lei Ma
, Naoyasu Ubayashi
, Yasutaka Kamei
:
Repairs and Breaks Prediction for Deep Neural Networks. 94:1-94:42 - Xiaoyu Zhang

, Juan Zhai
, Shiqing Ma
, Xiaohong Guan
, Chao Shen
:
DREAM: Debugging and Repairing AutoML Pipelines. 95:1-95:29 - Lehuan Zhang

, Shikai Guo
, Yi Guo
, Hui Li
, Yu Chai
, Rong Chen
, Xiaochen Li
, He Jiang
:
Context-based Transfer Learning for Structuring Fault Localization and Program Repair Automation. 96:1-96:32 - Ruilin Xie

, Xiang Chen
, Qifan He
, Bixin Li
, Zhanqi Cui
:
IATT: Interpretation Analysis-based Transferable Test Generation for Convolutional Neural Networks. 97:1-97:34
- Tianyu Chen

, Lin Li
, Bingjie Shan
, Guangtai Liang
, Ding Li
, Qianxiang Wang
, Tao Xie
:
Identifying Affected Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and Libraries. 98:1-98:27 - Ruixiang Qian

, Quanjun Zhang
, Chunrong Fang
, Lihua Guo
, Zhenyu Chen
:
FunFuzz: Greybox Fuzzing with Function Significance. 99:1-99:34 - Chong Chen

, Jianzhong Su
, Jiachi Chen
, Tingting Bi
, Jianxing Yu
, Yanlin Wang
, Xingwei Lin
, Ting Chen
, Zibin Zheng
:
When ChatGPT Meets Smart Contract Vulnerability Detection: How Far Are We? 100:1-100:30 - Tiezhu Sun

, Nadia Daoudi
, Weiguo Pian
, Kisub Kim
, Kevin Allix
, Tegawendé F. Bissyandé
, Jacques Klein
:
Temporal-Incremental Learning for Android Malware Detection. 101:1-101:30 - Xiangxiang Chen

, Xingwei Lin
, Jingyi Wang
, Jun Sun
, Jiashui Wang
, Wenhai Wang
:
Scuzer: A Scheduling Optimization Fuzzer for TVM. 102:1-102:28 - Sabine Houy

, Alexandre Bartel
:
Twenty Years Later: Evaluating the Adoption of Control Flow Integrity. 103:1-103:30 - Junan Zhang

, Kaifeng Huang
, Yiheng Huang
, Bihuan Chen
, Ruisi Wang
, Chong Wang
, Xin Peng
:
Killing Two Birds with One Stone: Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence. 104:1-104:28 - Ridwan Shariffdeen

, Christopher Steven Timperley
, Yannic Noller
, Claire Le Goues
, Abhik Roychoudhury
:
Vulnerability Repair via Concolic Execution and Code Mutations. 105:1-105:27 - Ruichao Liang

, Jing Chen
, Cong Wu
, Kun He
, Yueming Wu
, Weisong Sun
, Ruiying Du
, Qingchuan Zhao
, Yang Liu
:
Towards Effective Detection of Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph. 106:1-106:32
- Yonghui Liu

, Xiao Chen
, Pei Liu
, Jordan Samhi
, John C. Grundy
, Chunyang Chen
, Li Li
:
Demystifying React Native Android Apps for Static Analysis. 107:1-107:33 - Simon Foster

, Chung-Kil Hur
, Jim Woodcock
:
Unifying Model Execution and Deductive Verification with Interaction Trees in Isabelle/HOL. 108:1-108:40 - Zhou Yang

, Jieke Shi
, Muhammad Hilmi Asyrofi
, Bowen Xu
, Xin Zhou
, Dong-Gyun Han
, David Lo
:
Prioritizing Speech Test Cases. 109:1-109:27 - Deyun Lyu

, Zhenya Zhang
, Paolo Arcaini
, Xiao-Yi Zhang
, Fuyuki Ishikawa
, Jianjun Zhao
:
SpectAcle: Fault Localisation of AI-Enabled CPS by Exploiting Sequences of DNN Controller Inferences. 110:1-110:35
- Dezhen Kong

, Jiakun Liu
, Lingfeng Bao
, David Lo
:
Toward Better Comprehension of Breaking Changes in the NPM Ecosystem. 111:1-111:23 - Steven P. Reiss

, Xuan Wei
, Jiahao Yuan
, Qi Xin
:
ROSE: An IDE-Based Interactive Repair Framework for Debugging. 112:1-112:39 - Antonio Vitale

, Rocco Oliveto
, Simone Scalabrino
:
A Catalog of Data Smells for Coding Tasks. 113:1-113:32
- Yingjie Jiang

, Ran Mo
, Wenjing Zhan
, Dongyu Wang
, Zengyang Li
, Yutao Ma
:
Leveraging Modular Architecture for Bug Characterization and Analysis in Automated Driving Software. 114:1-114:31
- Michael Fu

, Jirat Pasuksmit
, Chakkrit Tantithamthavorn
:
AI for DevSecOps: A Landscape and Future Opportunities. 115:1-115:61
- Bachir Bendrissou

, Cristian Cadar
, Alastair F. Donaldson
:
Grammar Mutation for Testing Input Parsers. 116:1-116:21
- Bachir Bendrissou

, Cristian Cadar
, Alastair F. Donaldson
:
Grammar Mutation for Testing Input Parsers - RCR Report. 117:1-117:5
Volume 34, Number 5, June 2025
- Mauro Pezzè

, Silvia Abrahão
, Birgit Penzenstadler
, Denys Poshyvanyk
, Abhik Roychoudhury, Tao Yue
:
A 2030 Roadmap for Software Engineering. 118:1-118:55
- Iftekhar Ahmed

, Aldeida Aleti
, Haipeng Cai
, Alexander Chatzigeorgiou
, Pinjia He
, Xing Hu
, Mauro Pezzè
, Denys Poshyvanyk
, Xin Xia
:
Artificial Intelligence for Software Engineering: The Journey So Far and the Road Ahead. 119:1-119:27 - Valerio Terragni

, Annie Vella
, Partha S. Roop
, Kelly Blincoe
:
The Future of AI-Driven Software Engineering. 120:1-120:20 - Ketai Qiu

, Niccolò Puccinelli
, Matteo Ciniselli
, Luca Di Grazia
:
From Today's Code to Tomorrow's Symphony: The AI Transformation of Developer's Routine by 2030. 121:1-121:17 - Lola Burgueño

, Davide Di Ruscio
, Houari A. Sahraoui
, Manuel Wimmer
:
Automation in Model-Driven Engineering: A Look Back, and Ahead. 122:1-122:25 - Marcus Kessel

, Colin Atkinson
:
Morescient GAI for Software Engineering. 123:1-123:17 - Junda He

, Christoph Treude
, David Lo
:
LLM-Based Multi-Agent Systems for Software Engineering: Literature Review, Vision, and the Road Ahead. 124:1-124:30 - Yanjie Zhao

, Xinyi Hou
, Shenao Wang
, Haoyu Wang
:
LLM App Store Analysis: A Vision and Roadmap. 125:1-125:25 - Zhihao Lin

, Wei Ma
, Tao Lin
, Yaowen Zheng
, Jingquan Ge
, Jun Wang
, Jacques Klein
, Tegawendé F. Bissyandé
, Yang Liu
, Li Li
:
Open Source AI-based SE Tools: Opportunities and Challenges of Collaborative Software Learning. 126:1-126:24 - Cuiyun Gao

, Xing Hu
, Shan Gao
, Xin Xia
, Zhi Jin
:
The Current Challenges of Software Engineering in the Era of Large Language Models. 127:1-127:30 - Daihang Chen

, Yonghui Liu
, Mingyi Zhou
, Yanjie Zhao
, Haoyu Wang
, Shuai Wang
, Xiao Chen
, Tegawendé F. Bissyandé
, Jacques Klein
, Li Li
:
LLM for Mobile: An Initial Roadmap. 128:1-128:29
- Silvia Abrahão

, John C. Grundy
, Mauro Pezzè
, Margaret-Anne D. Storey
, Damian A. Tamburri
:
Software Engineering by and for Humans in an AI Era. 129:1-129:46 - Marco Autili

, Martina De Sanctis
, Paola Inverardi
, Patrizio Pelliccione
:
Engineering Digital Systems for Humanity: A Research Roadmap. 130:1-130:33 - Antonio Mastropaolo

, Camilo Escobar-Velásquez
, Mario Linares-Vásquez
:
From Triumph to Uncertainty: The Journey of Software Engineering in the AI Era. 131:1-131:34 - Ronnie de Souza Santos

, Felipe Fronchetti
, Sávio Freire
, Rodrigo O. Spínola
:
Software Fairness Debt: Building a Research Agenda for Addressing Bias in AI Systems. 132:1-132:21 - Victoria Jackson

, Bogdan Vasilescu
, Daniel Russo
, Paul Ralph
, Rafael Prikladnicki
, Maliheh Izadi
, Sarah D'Angelo
, Sarah Inman
, Anielle Severo Lisbôa de Andrade
, André van der Hoek
:
The Impact of Generative AI on Creativity in Software Development: A Research Agenda. 133:1-133:28 - Sonja M. Hyrynsalmi

, Sebastian Baltes
, Chris Brown
, Rafael Prikladnicki
, Gema Rodríguez-Pérez
, Alexander Serebrenik
, Jocelyn Simmonds
, Bianca Trinkenreich
, Yi Wang
, Grischa Liebel
:
Making Software Development More Diverse and Inclusive: Key Themes, Challenges, and Future Directions. 134:1-134:23
- Christoph König

, Daniel J. Lang
, Ina Schaefer
:
Sustainable Software Engineering: Concepts, Challenges, and Vision. 135:1-135:28 - Stefanie Betz

, Birgit Penzenstadler
:
With Great Power Comes Great Responsibility: The Role of Software Engineers. 136:1-136:21 - Jieke Shi

, Zhou Yang
, David Lo
:
Efficient and Green Large Language Models for Software Engineering: Literature Review, Vision, and the Road Ahead. 137:1-137:22 - Luis Cruz

, Xavier Franch
, Silverio Martínez-Fernández
:
Innovating for Tomorrow: The Convergence of Software Engineering and Green AI. 138:1-138:13 - Ana Moreira

, Patricia Lago
, Rogardt Heldal
, Stefanie Betz
, Ian Brooks
, Rafael Capilla
, Vlad C. Coroama
, Leticia Duboc
, João Paulo Fernandes
, Ola Leifler
, Ngoc-Thanh Nguyen
, Shola Oyedeji
, Birgit Penzenstadler
, Anne-Kathrin Peters
, Jari Porras
, Colin C. Venters
:
A Roadmap for Integrating Sustainability into Software Engineering Education. 139:1-139:27
- Michael R. Lyu

, Baishakhi Ray
, Abhik Roychoudhury
, Shin Hwei Tan
, Patanamon Thongtanunam
:
Automatic Programming: Large Language Models and Beyond. 140:1-140:33 - Diana Robinson

, Christian Cabrera
, Andrew D. Gordon
, Neil D. Lawrence
, Lars Mennen
:
Requirements Are All You Need: The Final Frontier for End-User Software Engineering. 141:1-141:22 - Wesley K. G. Assunção

, Luciano Marchezan
, Lawrence Arkoh
, Alexander Egyed
, Rudolf Ramler
:
Contemporary Software Modernization: Strategies, Driving Forces, and Research Opportunities. 142:1-142:35 - Dezhi Ran

, Mengzhou Wu
, Wei Yang
, Tao Xie
:
Foundation Model Engineering: Engineering Foundation Models Just as Engineering Software. 143:1-143:18
- Marcel Böhme

, Eric Bodden
, Tevfik Bultan
, Cristian Cadar
, Yang Liu
, Giuseppe Scanniello
:
Software Security Analysis in 2030 and Beyond: A Research Roadmap. 144:1-144:26 - Xin Zhou

, Sicong Cao
, Xiaobing Sun
, David Lo
:
Large Language Model for Vulnerability Detection and Repair: Literature Review and the Road Ahead. 145:1-145:31 - Laurie A. Williams

, Giacomo Benedetti
, Sivana Hamer
, Ranindya Paramitha
, Imranur Rahman
, Mahzabin Tamanna
, Greg Tystahl
, Nusrat Zahan
, Patrick Morrison
, Yasemin Acar
, Michel Cukier
, Christian Kästner
, Alexandros Kapravelos
, Dominik Wermke
, William Enck
:
Research Directions in Software Supply Chain Security. 146:1-146:38 - Shenao Wang

, Yanjie Zhao
, Xinyi Hou
, Haoyu Wang
:
Large Language Model Supply Chain: A Research Agenda. 147:1-147:46
- Qing Wang

, Junjie Wang
, Mingyang Li
, Yawen Wang
, Zhe Liu
:
A Roadmap for Software Testing in Open-Collaborative and AI-Powered Era. 148:1-148:17 - Rui Li

, Huai Liu
, Pak-Lok Poon
, Dave Towey
, Chang-Ai Sun
, Zheng Zheng
, Zhiquan Zhou
, Tsong Yueh Chen
:
Metamorphic Relation Generation: State of the Art and Research Directions. 149:1-149:25 - Facundo Molina

, Alessandra Gorla
, Marcelo d'Amorim
:
Test Oracle Automation in the Era of LLMs. 150:1-150:24 - Johan Cederbladh

, Antonio Cicchetti
, Robbert Jongeling
:
A Road-Map to Readily Available Early Validation and Verification of System Behaviour in Model-Based Systems Engineering using Software Engineering Best Practices. 151:1-151:30 - Christian Birchler

, Sajad Khatiri
, Pooja Rani
, Timo Kehrer
, Sebastiano Panichella
:
A Roadmap for Simulation-Based Testing of Autonomous Cyber-Physical Systems: Challenges and Future Direction. 152:1-152:9 - Roberto Casadei

, Gianluca Aguzzi
, Giorgio Audrito
, Ferruccio Damiani
, Danilo Pianini
, Giordano Scarso
, Gianluca Torta
, Mirko Viroli
:
Software Engineering for Collective Cyber-Physical Ecosystems. 153:1-153:40
- Juan Manuel Murillo

, José García-Alonso
, Enrique Moguel
, Johanna Barzen
, Frank Leymann
, Shaukat Ali
, Tao Yue
, Paolo Arcaini
, Ricardo Pérez-Castillo
, Ignacio García Rodríguez de Guzmán
, Mario Piattini
, Antonio Ruiz-Cortés
, Antonio Brogi
, Jianjun Zhao
, Andriy V. Miranskyy
, Manuel Wimmer
:
Quantum Software Engineering: Roadmap and Challenges Ahead. 154:1-154:48 - Neilson Carlos Leite Ramalho

, Higor Amario de Souza
, Marcos Lordello Chaim
:
Testing and Debugging Quantum Programs: The Road to 2030. 155:1-155:46
Volume 34, Number 6, July 2025
- Sai Zhang

, Zhenchang Xing
, Ronghui Guo
, Fangzhou Xu
, Lei Chen
, Zhaoyuan Zhang
, Xiaowang Zhang
, Zhiyong Feng
, Zhiqiang Zhuang
:
Empowering Agile-Based Generative Software Development through Human-AI Teamwork. 156:1-156:46 - Ruchira Manke

, Mohammad Wardat
, Foutse Khomh
, Hridesh Rajan
:
Leveraging Data Characteristics for Bug Localization in Deep Learning Programs. 157:1-157:29 - Hassan Sartaj

, Shaukat Ali
, Julie Marie Gjøby
:
MeDeT: Medical Device Digital Twins Creation with Few-shot Meta-learning. 158:1-158:36 - Lishui Fan

, Jiakun Liu
, Zhongxin Liu
, David Lo
, Xin Xia
, Shanping Li
:
Exploring the Capabilities of LLMs for Code-Change-Related Tasks. 159:1-159:36 - Leo Song

, Steven H. H. Ding
, Yuan Tian
, Li Tao Li
, Weihan Ou
, Philippe Charland
, Andrew Walenstein
:
Obfuscated Clone Search in JavaScript based on Reinforcement Subsequence Learning. 160:1-160:28 - Zilong He

, Pengfei Chen
, Zibin Zheng
:
On the Practicability of Deep Learning Based Anomaly Detection for Modern Online Software Systems: A Pre-Train-and-Align Framework. 161:1-161:42 - Siyu Nan

, Jian Wang
, Neng Zhang
, Duantengchuan Li
, Bing Li
:
DDASR: Deep Diverse API Sequence Recommendation. 162:1-162:39 - Sepehr Sharifi

, Andrea Stocco
, Lionel C. Briand
:
System Safety Monitoring of Learned Components Using Temporal Metric Forecasting. 163:1-163:43 - Weiguo Pian

, Yinghua Li
, Haoye Tian
, Tiezhu Sun
, Yewei Song
, Xunzhu Tang
, Andrew Habib
, Jacques Klein
, Tegawendé F. Bissyandé
:
You Don't Have to Say Where to Edit! jLED - Joint Learning to Localize and Edit Source Code. 164:1-164:27 - Ke Xv

, Shikai Guo
, Hui Li
, Chenchen Li
, Rong Chen
, Xiaochen Li
, He Jiang
:
Making Fault Localization in Online Service Systems More Actionable and Interpretable. 165:1-165:26
- Ding Li

, Ziqi Zhang
, Mengyu Yao
, Yifeng Cai
, Yao Guo
, Xiangqun Chen
:
TEESlice: Protecting Sensitive Neural Network Models in Trusted Execution Environments when Attackers Have Pre-Trained Models. 166:1-166:49 - Shenao Wang

, Yuekang Li
, Kailong Wang
, Yi Liu
, Hui Li
, Yang Liu
, Haoyu Wang
:
MiniScope: Automated UI Exploration and Privacy Inconsistency Detection of MiniApps via Two-phase Iterative Hybrid Analysis. 167:1-167:29
- Hongliang Liang

, Luming Yin
, Wenying Hu
, Yuxiang Li
, Wuwei Shen
:
Unified and Split Symbolic Execution for Exposing Semantic Differences. 168:1-168:27 - Yehong Zhang

, Jun Wu
, Hui Xu
:
RuMono: Fuzz Driver Synthesis for Rust Generic APIs. 169:1-169:28 - Yifan Zhao

, Zeyu Sun
, Guoqing Wang
, Qingyuan Liang
, Yakun Zhang
, Yiling Lou
, Dan Hao
, Lu Zhang
:
Automatically Learning a Precise Measurement for Fault Diagnosis Capability of Test Cases. 170:1-170:28 - Hanmo You

, Zan Wang
, Xuyang Chen
, Junjie Chen
, Jun Sun
, Shuang Liu
, Zishuo Dong
:
Mitigating Regression Faults Induced by Feature Evolution in Deep Learning Systems. 171:1-171:33 - Sijia Gu

, Ali Mesbah
:
Scalable Similarity-Aware Test Suite Minimization with Reinforcement Learning. 172:1-172:23
- Babak Pourasghar

, Habib Izadkhah
, Maryam Akhtari
:
Beyond Cohesion and Coupling: Integrating Control Flow in Software Modularization Process for Better Code Comprehensibility. 173:1-173:29 - Mugeng Liu

, Haiyang Shen
, Yixuan Zhang
, Hong Mei
, Yun Ma
:
WebAssembly for Container Runtime: Are We There Yet? 174:1-174:22 - Dominik Michael Krupke

, Ahmad Moradi
, Michael Perk
, Phillip Keldenich
, Gabriel Gehrke
, Sebastian Krieter
, Thomas Thüm
, Sándor P. Fekete
:
How Low Can We Go? Minimizing Interaction Samples for Configurable Systems. 175:1-175:29
- Giusy Annunziata

, Stefano Lambiase
, Damian A. Tamburri
, Willem-Jan van den Heuvel
, Fabio Palomba
, Gemma Catolino
, Filomena Ferrucci
, Andrea De Lucia
:
Uncovering Community Smells in Machine Learning-Enabled Systems: Causes, Effects, and Mitigation Strategies. 176:1-176:48
- Ratnadira Widyasari

, Ting Zhang
, Abir Bouraffa
, Walid Maalej
, David Lo
:
Explaining Explanations: An Empirical Study of Explanations in Code Reviews. 177:1-177:30 - Kisub Kim

, Xin Zhou
, Dongsun Kim
, Julia Lawall
, Kui Liu
, Tegawendé F. Bissyandé
, Jacques Klein
, Jaekwon Lee
, David Lo
:
How Are We Detecting Inconsistent Method Names? An Empirical Study from Code Review Perspective. 178:1-178:27 - Fu Fan

, Yanjie Jiang
, Tianyi Chen
, Hengshun Zhang
, Yuxia Zhang
, Nan Niu
, Hui Liu
:
An Empirical Study on Common Sense-Violating Bugs in Mobile Apps. 179:1-179:26 - Taiming Wang

, Hui Liu
, Yuxia Zhang
, Yanjie Jiang
:
Recommending Variable Names for Extract Local Variable Refactorings. 180:1-180:38
- Vittorio Cortellessa

, Jorge Andrés Díaz Pace
, Daniele Di Pompeo
, Sebastian Frank
, Pooyan Jamshidi
, Michele Tucci
, André van Hoorn:
Introducing Interactions in Multi-Objective Optimization of Software Architectures. 181:1-181:39
- Canh Minh Do

, Tsubasa Takagi
, Kazuhiro Ogata
:
Automated Quantum Protocol Verification Based on Concurrent Dynamic Quantum Logic. 182:1-182:36
- Joonas Hämäläinen, Teerath Das

, Tommi Mikkonen
:
A Systematic Literature Review of Multi-Label Learning in Software Engineering. 183:1-183:48
- Bernd Gruner

, Clemens-Alexander Brust
, Andreas Zeller
:
Finding Information Leaks with Information Flow Fuzzing. 184:1-184:18
- Bernd Gruner

, Clemens-Alexander Brust
, Andreas Zeller
:
Finding Information Leaks with Information Flow Fuzzing - RCR Report. 185:1-185:4
Volume 34, Number 7, September 2025
- Wentao Zou

, Zongwen Shen
, Qi Li
, Jidong Ge
, Chuanyi Li
, Xiang Chen
, Xiaoyu Shen
, Liguo Huang
, Bin Luo
:
Experimental Evaluation of Parameter-Efficient Fine-Tuning for Software Engineering Tasks. 186:1-186:34
- Hao Yu

, Bo Shen
, Jiaxin Zhang
, Shaoxin Lin
, Lin Li
, Guangtai Liang
, Ying Li
, Qianxiang Wang
, Tao Xie
:
Wenwang: Toward Effectively Generating Code Beyond Standalone Functions via Generative Pre-trained Models. 187:1-187:27 - Zezhou Yang

, Sirong Chen
, Cuiyun Gao
, Zhenhao Li
, Xing Hu
, Kui Liu
, Xin Xia
:
An Empirical Study of Retrieval-Augmented Code Generation: Challenges and Opportunities. 188:1-188:28 - Jie JW Wu

, Fatemeh H. Fard
:
HumanEvalComm: Benchmarking the Communication Competence of Code Generation for LLMs and LLM Agents. 189:1-189:42 - Jia Li, Chongyang Tao, Jia Li Male, Ge Li, Zhi Jin

, Huangzhao Zhang
, Zheng Fang, Fang Liu:
Large Language Model-Aware In-Context Learning for Code Generation. 190:1-190:33 - Chong Wang

, Jian Zhang
, Yebo Feng
, Tianlin Li
, Weisong Sun
, Yang Liu
, Xin Peng
:
Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation. 191:1-191:27 - Wenjie Xu

, Yanhui Li
, Mingliang Ma
, Lin Chen
, Yuming Zhou
:
Weighted Suspiciousness and Balanced Aggregation to Boost Spectrum-based Fault Localization of Deep Learning Models. 192:1-192:28 - Daniel Blasco

, Antonio Iglesias
, Jorge Echeverría
, Francisca Pérez, Carlos Cetina
:
Introducing Phylogenetics in Search-based Software Engineering: Phylogenetics-aware SBSE. 193:1-193:38 - Ran Mo

, Dongyu Wang
, Wenjing Zhan
, Yingjie Jiang
, Yepeng Wang
, Yuqi Zhao
, Zengyang Li
, Yutao Ma
:
Assessing and Analyzing the Correctness of GitHub Copilot's Code Suggestions. 194:1-194:32 - Qiang Hu

, Yuejun Guo
, Xiaofei Xie
, Maxime Cordy
, Wei Ma
, Mike Papadakis
, Lei Ma
, Yves Le Traon
:
Assessing the Robustness of Test Selection Methods for Deep Neural Networks. 195:1-195:26
- Chunlian Wu

, Sen Chen
, Jiaming Li
, Renchao Chai
, Lingling Fan
, Xiaofei Xie
, Ruitao Feng
:
Beyond Decision: Android Malware Description Generation through Profiling Malicious Behavior Trajectory. 196:1-196:39 - Tianyu Chen

, Ding Li
, Ying Zhang
, Tao Xie
:
JSimpo: Structural Deobfuscation of JavaScript Programs. 197:1-197:28
- Noah Oldfield

, Christoph Laaber
, Tao Yue
, Shaukat Ali
:
Faster and Better Quantum Software Testing through Specification Reduction and Projective Measurements. 198:1-198:39 - Ezio Bartocci

, Leonardo Mariani
, Dejan Nickovic
, Drishti Yadav
:
Signal Feature Coverage and Testing for CPS Dataflow Models. 199:1-199:37 - Shunhui Ji

, Changrong Huang
, Bin Ren
, Hai Dong
, Lars Grunske
, Yan Xiao
, Pengcheng Zhang
:
TAEFuzz: Automatic Fuzzing for Image-based Deep Learning Systems via Transferable Adversarial Examples. 200:1-200:31 - Xinyu Ji

, Lei Xue
, Zhijian He
, Xiapu Luo
:
Autonomous Driving System Testing via Diversity-Oriented Driving Scenario Exploration. 201:1-201:28 - Fengjie Li

, Jiajun Jiang
, Jiajun Sun
, Hongyu Zhang
:
Hybrid Automated Program Repair by Combining Large Language Models and Program Analysis. 202:1-202:28 - Jiawei Liu

, Xufan Zhang
, Lurong Xu
, Chunrong Fang
, Mingzheng Gu
, Weisi Luo
, Dong Chai
, Jiang Wang
, Zhihong Zhao
, Zhenyu Chen
:
Automated Detection and Repair of Floating-point Precision Problems in Convolutional Neural Network Operators. 203:1-203:32 - Martin Weyssow

, Xin Zhou
, Kisub Kim
, David Lo
, Houari A. Sahraoui
:
Exploring Parameter-Efficient Fine-Tuning Techniques for Code Generation with Large Language Models. 204:1-204:25 - Xiang Chen

, Chaoyang Gao
, Chunyang Chen
, Guangbei Zhang
, Yong Liu
:
An Empirical Study on Challenges for LLM Application Developers. 205:1-205:37 - Jieke Shi

, Zhou Yang
, Junda He
, Bowen Xu
, Dongsun Kim
, DongGyun Han
, David Lo
:
Finding Safety Violations of AI-Enabled Control Systems through the Lens of Synthesized Proxy Programs. 206:1-206:35 - Yi Zhang

, He Jiang
, Shikai Guo
, Xiaochen Li
, Hui Liu
, Chongyang Shi
:
Toward Understanding FPGA Synthesis Tool Bugs. 207:1-207:37 - Wei Ma

, Chenguang Zhu
, Ye Liu
, Xiaofei Xie
, Yi Li
:
A Comprehensive Study of Governance Issues in Decentralized Finance Applications. 208:1-208:31 - Quanjun Zhang

, Chunrong Fang
, Yi Zheng
, Yaxin Zhang
, Yuan Zhao
, Rubing Huang
, Jianyi Zhou
, Yun Yang
, Tao Zheng
, Zhenyu Chen
:
Improving Deep Assertion Generation via Fine-Tuning Retrieval-Augmented Pre-Trained Language Models. 209:1-209:23
- Xiangping Chen

, Ziang Qian
, Peiyong Liao
, Yuan Huang
, Changlin Yang
, Zibin Zheng
:
Characterizing Smart Contract Evolution. 210:1-210:22
- Audris Mockus

, Rui Abreu
, Peter C. Rigby
, David Amsallem
, Parveen Bansal
, Kaavya Chinniah
, Brian Ellis
, Peng Fan
, Jun Ge
, Bingjie He
, Kelly Hirano
, Sahil Kumar
, Ajay Lingapuram
, Andrew Loe
, Megh Mehta
, Venus Montes
, Maher Saba
, Gursharan Singh
, Matt Steiner
, Weiyan Sun
, Siri Uppalapati
, Nachiappan Nagappan
:
Leveraging Risk Models to Improve Productivity for Effective Code Un-Freeze at Scale. 211:1-211:24 - Shaiful Alam Chowdhury

:
The Good, the Bad, and the Monstrous: Predicting Highly Change-Prone Source Code Methods at Their Inception. 212:1-212:29 - Thanh Le-Cong

, Dat Nguyen
, Bach Le
, Toby Murray
:
Towards Reliable Evaluation of Neural Program Repair with Natural Robustness Testing. 213:1-213:44 - Shuhan Liu

, Jiayuan Zhou
, Xing Hu
, Filipe Roseiro Côgo
, Xin Xia
, Xiaohu Yang
:
An Empirical Study on Vulnerability Disclosure Management of Open Source Software Systems. 214:1-214:31
- Geovana Ramos Sousa Silva

, Edna Dias Canedo
:
Privacy in Chatbot Conversation-Driven Development: A Comprehensive Review and Requirements Proposal. 215:1-215:44
Volume 34, Number 8, November 2025
- Jiaolong Kong

, Xiaofei Xie
, Mingfei Cheng
, Shangqing Liu
, Xiaoning Du
, Qi Guo
:
ContrastRepair: Enhancing Conversation-Based Automated Program Repair via Contrastive Test Case Pairs. 216:1-216:31 - Zongwen Shen

, Yuning Li
, Jidong Ge
, Xiang Chen
, Chuanyi Li
, LiGuo Huang
, Bin Luo
:
An Empirical Study of Code Simplification Methods in Code Intelligence Tasks. 217:1-217:31 - Yujia Fu

, Peng Liang
, Amjed Tahir
, Zengyang Li
, Mojtaba Shahin
, Jiaxin Yu
, Jinfu Chen
:
Security Weaknesses of Copilot-Generated Code in GitHub Projects: An Empirical Study. 218:1-218:34 - S. VenkataKeerthy

, Soumya Banerjee
, Sayan Dey
, Yashas Andaluri
, Raghul P. S.
, Subrahmanyam Kalyanasundaram
, Fernando Magno Quintão Pereira
, Ramakrishna Upadrasta
:
VexIR2Vec: An Architecture-Neutral Embedding Framework for Binary Similarity. 219:1-219:54 - Jiapeng Li

, Zheng Zheng
, Xiaoting Du
, Haoyu Wang
, Yanwen Liu
:
DRLMutation: A Comprehensive Framework for Mutation Testing in Deep Reinforcement Learning Systems. 220:1-220:32 - Junlin Liu

, Mengyu Yao
, Shaofei Li
, Dingyu Yang
, Zheshun Wu
, Xiaojun Qu
, Ziqi Zhang
, Ding Li
, Yao Guo
, Xiangqun Chen
:
Not All Exceptions Are Created Equal: Triaging Error Logs in Real-World Enterprises. 221:1-221:28 - Mengxi Zhang

, Huaxiao Liu
, Changhao Du
, Tengmei Wang
, Han Li
, Pei Huang
, Chunyang Chen
:
Distinguishing GUI Component States for Blind Users Using Large Language Models. 222:1-222:35 - Zhao Tian

, Junjie Chen
, Dong Wang
, Qihao Zhu
, Xingyu Fan
, Lingming Zhang
:
LEAM++: Learning for Selective Mutation Fault Construction. 223:1-223:41
- Jianzhong Liu

, Yuheng Shen
, Yiru Xu
, Hao Sun
, Yu Jiang
:
SnapCC: Effective File System Consistency Testing Using Systematic State Exploration. 224:1-224:24 - Catherine Tony

, Nicolás E. Díaz Ferreyra
, Markus Mutas
, Salem Dhif
, Riccardo Scandariato
:
Prompting Techniques for Secure Code Generation: A Systematic Investigation. 225:1-225:53 - Yao Li

, Sen Fang
, Tao Zhang
, Haipeng Cai
:
Enhancing Android Malware Detection: The Influence of ChatGPT on Decision-centric Task. 226:1-226:30
- Jinfeng Wen

, Zhenpeng Chen
, Jianshu Zhao
, Federica Sarro
, Haodi Ping
, Ying Zhang
, Shangguang Wang
, Xuanzhe Liu
:
SCOPE: Performance Testing for Serverless Computing. 227:1-227:30 - Md. Shamsujjoha

, John Grundy
, Qinghua Lu
, Hourieh Khalajzadeh
, Li Li
:
Better Supporting Human Aspects in Mobile eHealth Apps: Development and Validation of Enhanced Guidelines. 228:1-228:43 - Jiayi Wang

, Yu Wang, Ke Wang, Linzhang Wang
:
SILVA: A Scalable Incremental Layered Sparse Value-Flow Analysis. 229:1-229:40
- Yanjie Jiang

, Xiaye Chi
, Yuxia Zhang
, Weixing Ji
, Guangjie Li
, Weixiao Wang
, Yunni Xia
, Lu Zhang
, Hui Liu
:
Automated Recommendation of Extracting Local Variable Refactorings. 230:1-230:42 - Nils Japke

, Martin Grambow
, Christoph Laaber
, David Bermbach
:
µOpTime: Statically Reducing the Execution Time of Microbenchmark Suites Using Stability Metrics. 231:1-231:26 - Maram Assi

, Safwat Hassan
, Ying Zou
:
Unraveling Code Clone Dynamics in Deep Learning Frameworks. 232:1-232:39
- Adam Alami

, Victor Vadmand Jensen
, Neil A. Ernst
:
Accountability in Code Review: The Role of Intrinsic Drivers and the Impact of LLMs. 233:1-233:44 - Hanouf Al Ghanmi

, Sabreen Ahmadjee
, Rami Bahsoon
:
Evaluating the Need for Explanations in Blockchain Smart Contracts to Reconcile Surprises. 234:1-234:35
- Mahmoud Jahanshahi

, David Reid
, Audris Mockus
:
Beyond Dependencies: The Role of Copy-Based Reuse in Open Source Software Development. 235:1-235:49 - Yanjie Jiang

, Hui Liu
, Jinyan Liu
, Yuxia Zhang
, Weixing Ji
, Hao Zhong
, Lu Zhang
:
An Empirical Study on the Relationship between Defects and Source Code's Unnaturalness. 236:1-236:30
- Matias Martinez

, Silverio Martínez-Fernández
, Xavier Franch
:
The Sustainability Face of Automated Program Repair Tools. 237:1-237:37
- Yuechen Li

, Kai-Yuan Cai
, Beibei Yin
:
Preparation and Utilization of Mixed States for Testing Quantum Programs. 238:1-238:44
- Yixuan Zhang

, Mugeng Liu
, Haoyu Wang
, Yun Ma
, Gang Huang
, Xuanzhe Liu
:
Research on WebAssembly Runtimes: A Survey. 239:1-239:47
- Zixiao Zhao

, Fatemeh H. Fard
:
Do Current Language Models Support Code Intelligence for R Programming Language? 240:1-240:39
- Claudio Mandrioli

, Seung Yeob Shin
, Martina Maggio
, Domenico Bianculli
, Lionel C. Briand
:
Stress Testing Control Loops in Cyber-Physical Systems - RCR Report. 241:1-241:6 - Zixiao Zhao

, Fatemeh H. Fard
:
Do Current Language Models Support Code Intelligence for R Programming Language? RCR Report. 242:1-242:2

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














