


default search action
15th Internetware 2024: Macao, SAR, China
- Hong Mei, Jian Lv, Abdelsalam Helal, Xiaoxing Ma, Shing-Chi Cheung, Jie Zhang, Tao Zhang:
Proceedings of the 15th Asia-Pacific Symposium on Internetware, Internetware 2024, Macau, SAR, China, July 24-26, 2024. ACM 2024
Session 1: AI for Software Engineering
- Senrong Xu
, Jiamei Shen
, Yunfan Li
, Yuan Yao
, Ping Yu
, Feng Xu
, Xiaoxing Ma
:
On the Heterophily of Program Graphs: A Case Study of Graph-based Type Inference. - Yuhong Feng
, Haoran Li
, Yixuan Cao
, Yufeng Wang
, Haiyue Feng
:
CRABS-former: CRoss-Architecture Binary Code Similarity Detection based on Transformer. - Xingpeng Liu
, Hengzhu Liu
, Xiaodong Yi
, Ji Wang
:
LLM-Enhanced Theorem Proving with Term Explanation and Tactic Parameter Repair✱. - Wenjun Liang
, Guanping Xiao
:
An Exploratory Evaluation of Large Language Models Using Empirical Software Engineering Tasks. - Kuo Chi
, Chuanyi Li
, Jidong Ge
, Bin Luo
:
An Empirical Study on Code Search Pre-trained Models: Academic Progresses vs. Industry Requirements.
Session 2: Software Testing and Quality Assurance
- Ruihua Ji
, Zhengxuan Qian
, Zhong Li
, Xiaoqing Zhu
, Yu Pei
, Minxue Pan
, Tian Zhang
:
Repairing Obsolete GUI Test Scripts for Android Applications with Exploration and Backtracking. - Zixi Liu
, Yang Feng
, Jiali Xu
, Baowen Xu
:
ObjTest: Object-Level Mutation for Testing Object Detection Systems. - Danni Xiao
, Yimeng Guo
, Yanhui Li
, Lin Chen
:
Optimizing Search-Based Unit Test Generation with Large Language Models: An Empirical Study. - Yin Wang
, Ming Fan
, Xicheng Zhang
, Jifei Shi
, Zhaoyu Qiu
, Haijun Wang
, Ting Liu
:
LIReDroid: LLM-Enhanced Test Case Generation for Static Sensitive Behavior Replication.
Session 3: Software Vulnerability and Security
- Yanzhong He
, Guancheng Lin
, Xiaoxue Ma
, Jacky Wai Keung
, Cheng Tan
, Wenhua Hu
, Fuyang Li
:
Enhancing Deep Learning Vulnerability Detection through Imbalance Loss Functions: An Empirical Study. - Zhonghao Jiang
, Weifeng Sun
, Xiaoyan Gu
, Jiaxin Wu
, Tao Wen
, Haibo Hu
, Meng Yan
:
DFEPT: Data Flow Embedding for Enhancing Pre-Trained Model Based Vulnerability Detection. - Pei Liu
, Bo Lin
, Yihao Qin
, Cheng Weng
, Liqian Chen
:
T-RAP: A Template-guided Retrieval-Augmented Vulnerability Patch Generation Approach. - Cheng Weng
, Yihao Qin
, Bo Lin
, Pei Liu
, Liqian Chen
:
MatsVD: Boosting Statement-Level Vulnerability Detection via Dependency-Based Attention. - Junwei Zhang
, Zhongxin Liu
, Lingfeng Bao
, Zhenchang Xing
, Xing Hu
, Xin Xia
:
Inside Bug Report Templates: An Empirical Study on Bug Report Templates in Open-Source Software.
Session 4: Code Analysis and Optimization
- Rulin Xu
, Luohui Chen
, Ruyi Zhang
, Yuanliang Zhang
, Wei Xiao
, Haifang Zhou
, Xiaoguang Mao
:
Accelerating Static Null Pointer Dereference Detection with Parallel Computing. - Junwei Zeng
, Yixuan Tang
, Jingxuan Zhang
, Weiwei Li
, Zhiqiu Huang
:
Detecting Optimizing Compiler Bugs via History-Driven Test Program Mutation. - Xun An
, Xiaoqi Jia
, Haichao Du
, Yamin Xie
:
Structure-Sensitive Pointer Analysis for Multi-structure Objects. - Lianying He
, Dalin Zhang
, Dongqing Zhu
, Junwen Zhang
, Rui Wang
, Jiqiang Liu
:
Path Exploration Strategy for Symbolic Execution based on Multi-strategy Active Learning.
Session 5: Software Modeling and Development
- Jie Hu
, Yaozhong Zhang
, Xiujuan Qin
, Lvlun Wei
, Fangwei Chen
, Shmuel S. Tyszberowicz
, Mingyue Zhang
, Bo Liu
:
DSL-MoLab: supporting model-based development of TDL-specific systems enabled by DSL. - Yunwei Dong
, Zeshan Li
, Ruiheng Zhang
, Rubing Huang
, Tao Wang
:
A Scenario Model-driven Task Planning Method for Unmanned Aerial Vehicle Swarm. - Fanyi Meng
, Ying Wang
, Chun Yong Chong
, Hai Yu
, Zhiliang Zhu
:
CLUE: Customizing clustering techniques using machine learning for software modularization. - Dong Yang
, Hao Shi
, Wei Dong
, Yanqi Dong
, Yong Zhang
:
Synthesizing Controller for Unsynthesizable Specification Based on Criticality Levels.
Session 6: Code Generation and Transformation
- Zhenghai Cai
, Yongjian Li
, Yongxin Zhao
:
Murphi2Chisel: A Protocol Compiler from Murphi to Chisel. - Wentao Zou
, Zongwen Shen
, JiDong Ge
, Chuanyi Li
, Bin Luo
:
CCAF: Learning Code Change via AdapterFusion. - Yifan Li
, Ensheng Shi
, Dewu Zheng
, Kefeng Duan
, Jiachi Chen
, Yanlin Wang
:
RepoMinCoder: Improving Repository-Level Code Generation Based on Information Loss Screening. - Yang Zhang
, Yuan Xue
:
ExceRef: Automatically Refactoring for Exception Handling.
Session 7: Software Architecture and Microservices
- Xiaojun Xu
, Chenghao Cai
, Xiuqi Yang
, Zhuofan Xu
, Jingjing Hu
, Jing Sun
:
A Service-oriented Scheduling Combination Strategy on Cloud Platforms Based on A Dual-Layer QoS Evaluation Model. - Geng Chen
, Chenlin Li
, Shmuel S. Tyszberowicz
, Zhiming Liu
, Bo Liu
:
Mono2MS: Deep Fusion of Multi-Source Features for Partitioning Monolith into Microservices. - Genting Mai
, Zilong He
, Guangba Yu
, Zhiming Chen
, Pengfei Chen
:
CTuner: Automatic NoSQL Database Tuning with Causal Reinforcement Learning. - Ming Quan Fu
, Minjie Wei
, Minglang Qiao
, Peng Ji
, Zhihao Deng
, Di Cui
, Yutong Zhao
:
HGNN4Perf: Detecting Performance Optimization Opportunities via Hypergraph Neural Network.
Session 8: IoT and Edge Computing
- Dongchao Ma
, Xiaohe Zhao
, Sitian Huang
, Yu Zhang
, Ruiqi Wang
:
A Lightweight Dynamic QoS Optimization Strategy for Satellite IoT Networks. - Jiahua Huang
, Chun Cao
, Jun Ma
, Xiaoxing Ma
:
NEST: Node with Statistics Tree for IoT Data Persistence and Real-time Queries. - Yijie Chen
, Qiyang Zhang
, Ruolin Xing
, Yuanzhe Li
, Xiao Ma
, Chaoxin Yu
, Yiran Zhang
, Ao Zhou
, Shangguang Wang
:
Energy-Aware Satellite-Ground Co-Inference via Layer-Wise Processing Schedule Optimization. - Xiaodong Wang
, Long Wen
, Jijing Cai
, Kai Fang
:
Intelligent Interference Information Fusion for Security of UAV Forest Remote Sensing Image Detection.
Session 9: System Performance and Resource Management
- Jianguo Liu
, Zhibin Yu
:
Global-State Aware Automatic NUMA Balancing. - Ruoxian Su
, Hanzhi Xu
, Jieyu Jiang
, Shuai Zhao
:
Resource-Aware Task Allocation on Mixed-Criticality Systems: a Task-Splitting Approach. - Yiyuan Dong
, Zeyu Mi
:
IOGuard: Software-Based I/O Page Fault Handling with One CPU Core. - Yifan Zhao
, Tong Xin
, Mingkai Dong
:
Parer: Boosting EROFS Image Creation With Parallelism and Reproducibility.
Session 10: Software Reliability and Maintenance
- Daohan Qu
, Chaoyi Zhao
, Yanyan Jiang
, Chang Xu
:
Towards Life-long Software Self-validation in Production. - Di Liu
, Yanyan Yan
, Hongcheng Fan
, Yang Feng
:
Mining Fix Patterns for System Interaction Bugs. - Yi Hou, Wuxia Jin
, Zhijun Wang, Liuming Wang, Shuguang Chen, Yihan Wang
, Lei Sang, Haijun Wang, Ting Liu
:
ERD-CQC : Enhanced Rule and Dependency Code Quality Check for Java. - Sheng Han
, Qiang Han
, Yixin Qiao
, Kehan Xue
, Zhichao Shi
:
Developing Burr-XII NHPP-based software reliability growth model using Expectation Conditional Maximization Algorithm.
Session 11: Anomaly Detection and Security
- Haoyang Zeng
, Ningjiang Chen
, Tao Deng
:
LSTD-MTS: Anomaly Detection with Capturing Long-Term Spatio-Temporal Dependence for Multi-dimensional Time Series. - Chen Wang
, Tao Huang
, Min Li
, Pengfei Chen
, Zhiwen Chen
:
A Bayesian LSTM Based Active Anomaly Detection Service for Large Online Systems. - Jianwen Xiang
, Xuemin Zhang
, Qianrong Zheng
, Longmin Deng
, Dongdong Zhao
, Junwei Zhou
:
CIDF: Combined Intrusion Detection Framework in Industrial Control Systems based on Packet Signature and Enhanced FSFDP. - Xiaoyu Yi
, Gaolei Li, Wenkai Huang
, Xi Lin
, Jianhua Li
, Yuchen Liu
:
LateBA: Latent Backdoor Attack on Deep Bug Search via Infrequent Execution Codes.
Session 12: Emerging Technologies and Applications
- Jianxin Xue
, Husheng Chen
, Yaohua Hu
, Minyu Chen
, Ling-I Wu
, Xi Chang
:
Reduce Detection Latency of YOLOv5 to Prevent Real-Time Tracking Failures for Lightweight Robots. - Shijian Chen
, Jiachi Chen
, Jiangshan Yu
, Xiapu Luo
, Yanlin Wang
:
The Dark Side of NFTs: A Large-Scale Empirical Study of Wash Trading. - Kai Ma
, Zhuo Wang
, Yanjie Zhao
, Haoyu Wang
:
Decoding Web3: In-depth Analysis of the Third-Party Package Supply Chain. - Jiale Hao
, Meng Wang
, Hong Zhang
:
Efficient Deadlock Detection in MPI Programs with Path Compression and Focus Matching. - Yue Wang
, Wenhui Chang
, Yanzhen Zou
, Bing Xie
:
An Exploratory Study on God Header Files in Open-Source C Projects.
Session 13: Software Tools and Demonstrations
- Yihui Jian
, Yilong Yang
, Shaohong Zhu
, Zhi Li
, Li Zhang
:
RM2EIS: A Tool for Auto-Generation of EIS from Requirements Model. - Yuqi Zhao
, Shiyu He
, Qibo Li
, Yuchen Pei
, Yutao Ma
:
MobileEdgeSim: A Tool for Simulating Microservice-Oriented Mobile Edge Computing. - Yudan Long
, Yuxin Su
, Zigui Jiang
:
WACP: A Performance Profiling Tool for WebAssembly-Python Interoperability. - Xiaoqi Yue
, Chao Liu
, Neng Zhang
, Haibo Hu
, Xiaohong Zhang
:
VisRepo: A Visual Retrieval Tool for Large-Scale Open-Source Projects. - Bei Deng
, Bingkun Sun
, Liwei Shen
:
laTAPE: Location-Aware Programming and Executing Trigger-Action Rules.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.