


default search action
30th WCRE 2023: Taipa, Macao
- Tao Zhang, Xin Xia, Nicole Novielli:

IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2023, Taipa, Macao, March 21-24, 2023. IEEE 2023, ISBN 978-1-6654-5278-6 - Xia Liu, Baojian Hua, Yang Wang, Zhizhong Pan:

An Empirical Study of Smart Contract Decompilers. 1-12 - Xiaoya Xia, Shengyu Zhao, Xinran Zhang, Zehua Lou, Wei Wang, Fenglin Bi:

Understanding the Archived Projects on GitHub. 13-24 - Sigma Jahan, Mohammad Masudur Rahman

:
Towards Understanding the Impacts of Textual Dissimilarity on Duplicate Bug Report Detection. 25-36 - Rrezarta Krasniqi

, Hyunsook Do
:
A Hierarchical Topical Modeling Approach for Recommending Repair of Quality Bugs. 37-48 - Ryan Williams, Anthony Gavazzi, Engin Kirda:

Solder: Retrofitting Legacy Code with Cross-Language Patches. 49-60 - Qianqian Yu, Zhangjin Huang

, Naijie Gu:
Pseudocode to Code Based on Adaptive Global and Local Information. 61-72 - Yuekai Huang, Ye Yang, Junjie Wang, Wei Zheng, Qing Wang:

Identifying Emergent Leadership in Open Source Software Projects Based on Communication Styles. 73-84 - Zhou Tao, Yan Lei, Huan Xie, Jian Hu:

NeuralCCD: Integrating Multiple Features for Neural Coincidental Correctness Detection. 85-96 - Jianchen Zhao

, Yiming Tang
, Sneha Sunil, Weiyi Shang:
Studying and Complementing the Use of Identifiers in Logs. 97-107 - Chao Ni, Cong Tian, Kaiwen Yang, David Lo

, Jiachi Chen
, Xiaohu Yang:
Automatic Identification of Crash-inducing Smart Contracts. 108-119 - Yingwei Ma, Yue Yu, Shanshan Li, Zhouyang Jia, Jun Ma, Rulin Xu, Wei Dong, Xiangke Liao:

MulCS: Towards a Unified Deep Representation for Multilingual Code Search. 120-131 - Xiaowen Zhang, Ying Zhou, Shin Hwei Tan:

Efficient Pattern-based Static Analysis Approach via Regular-Expression Rules. 132-143 - Junye Wen, Tarek Mahmud, Meiru Che, Yan Yan, Guowei Yang

:
Intelligent Constraint Classification for Symbolic Execution. 144-154 - Mingzhe Hu

, Qi Zhao, Yu Zhang
, Yan Xiong:
Cross-Language Call Graph Construction Supporting Different Host Languages. 155-166 - Ratnadira Widyasari, Zhipeng Zhao

, Thanh Le-Cong, Hong Jin Kang
, David Lo
:
Topic Recommendation for GitHub Repositories: How Far Can Extreme Multi-Label Learning Go? 167-178 - Gichan Lee

, Scott Uk-Jin Lee:
An Empirical Comparison of Model-Agnostic Techniques for Defect Prediction Models. 179-189 - Xiaocong Zhou, Yingye Chen, Hanyang Guo, Xiangping Chen, Yuan Huang:

Security Code Recommendations for Smart Contract. 190-200 - Amir M. Mir

, Mehdi Keshani, Sebastian Proksch:
On the Effect of Transitivity and Granularity on Vulnerability Propagation in the Maven Ecosystem. 201-211 - Jinghan Jia, Shashank Srikant, Tamara Mitrovska, Chuang Gan, Shiyu Chang, Sijia Liu, Una-May O'Reilly:

ClawSAT: Towards Both Robust and Accurate Code Models. 212-223 - Hengbiao Yu, Xin Yi

, Banghu Yin, Fa Li, Zhenbang Chen, Chun Huang:
Efficient Generation of Floating-Point Inputs for Compiler-Induced Variability. 224-235 - Zhe Li, Fei Xie:

In-Situ Concolic Testing of JavaScript. 236-247 - Wenhan Wang, Kechi Zhang, Ge Li, Shangqing Liu, Anran Li, Zhi Jin, Yang Liu

:
Learning Program Representations with a Tree-Structured Transformer. 248-259 - Ali Al-Kaswan

, Toufique Ahmed, Maliheh Izadi, Anand Ashok Sawant, Premkumar T. Devanbu, Arie van Deursen
:
Extending Source Code Pre-Trained Language Models to Summarise Decompiled Binarie. 260-271 - Ivana Clairine Irsan, Ting Zhang

, Ferdian Thung, Kisub Kim, David Lo:
Multi-Modal API Recommendation. 272-283 - Gabriela Karoline Michelon, Wesley K. G. Assunção

, Paul Grünbacher, Alexander Egyed:
Analysis and Propagation of Feature Revisions in Preprocessor-based Software Product Lines. 284-295 - Chanathip Pornprasit, Chakkrit Tantithamthavorn, Patanamon Thongtanunam, Chunyang Chen:

D-ACT: Towards Diff-Aware Code Transformation for Code Review Under a Time-Wise Evaluation. 296-307 - Xiaosong Huang, Yifan Wu, Hongyi Liu, Ying Li, Hao Yu, Dadi Guo, Zhonghai Wu:

UDA-DP: Unsupervised Domain Adaptation for Software Defect Prediction. 308-318 - Fengyi Zhang, Bihuan Chen, Yufei Zhao

, Xin Peng:
Slice-Based Code Change Representation Learning. 319-330 - Jiaxing Liu, Chaofeng Sha, Xin Peng:

Improving Fine-tuning Pre-trained Models on Small Source Code Datasets via Variational Information Bottleneck. 331-342 - Hongwei Wei

, Xiaohong Su, Weining Zheng, Wenxin Tao:
Documentation-Guided API Sequence Search without Worrying about the Text-API Semantic Gap. 343-354 - Yue Wang, Zhide Zhou, Zhilei Ren, Dong Liu, He Jiang:

A Comprehensive Study of WebAssembly Runtime Bugs. 355-366 - Mingyue Jiang, Chengjian Tang, Xiao-Yi Zhang, Yangyang Zhao, Zuohua Ding:

Automated Image Reduction for Explaining Black-box Classifiers. 367-378 - Zeming Dong

, Qiang Hu, Yuejun Guo, Maxime Cordy, Mike Papadakis, Zhenya Zhang, Yves Le Traon, Jianjun Zhao:
MixCode: Enhancing Code Classification by Mixup-Based Data Augmentation. 379-390 - Ashwin Prasad Shivarpatna Venkatesh

, Jiawei Wang, Li Li
, Eric Bodden:
Enhancing Comprehension and Navigation in Jupyter Notebooks with Static Analysis. 391-401 - Bo Cai, Yaoxiang Yu, Yi Hu:

CSSAM: Code Search via Attention Matching of Code Semantics and Structures. 402-413 - Xinrong Lin, Baojian Hua, Yang Wang, Zhizhong Pan:

Towards a Large-Scale Empirical Study of Python Static Type Annotations. 414-425 - Zhonghao Pan, Yang Feng, Zhiyuan Li, Yunxin Liu, Yuanchun Li:

Understanding the Impact of Quantum Noise on Quantum Programs. 426-437 - Long Zhang

, Binyi Cui, Zhenyu Zhang:
Optimizing Continuous Integration by Dynamic Test Proportion Selection. 438-449 - Oussama Ben Sghaier, Houari A. Sahraoui:

A Multi-Step Learning Approach to Assist Code Review. 450-460 - Lanxin Yang

, Bohan Liu, Junyu Jia
, Junming Xue, Jinwei Xu
, Alberto Bacchelli, He Zhang:
Evaluating Learning-to-Rank Models for Prioritizing Code Review Requests using Process Simulation. 461-472 - Jianyu Wu, Weiwei Xu, Kai Gao, Jingyue Li

, Minghui Zhou:
Characterize Software Release Notes of GitHub Projects: Structure, Writing Style, and Content. 473-484 - Hiroki Yamamoto, Dong Wang, Gopi Krishnan Rajbahadur, Masanari Kondo, Yasutaka Kamei, Naoyasu Ubayashi:

Towards Privacy Preserving Cross Project Defect Prediction with Federated Learning. 485-496 - Zhijie Jiang, Haixu Xiong, Yingwei Ma, Yao Zhang, Yan Ding, Yun Xiong, Shanshan Li:

Automatic Code Annotation Generation Based on Heterogeneous Graph Structure. 497-508 - Angel Luis Scull Pupo

, Jens Nicolay, Elisa Gonzalez Boix
:
Brigadier: A Datalog-based IAST framework for Node.js Applications. 509-521 - Xincheng He, Xiaojin Liu, Lei Xu, Baowen Xu:

How Dynamic Features Affect API Usages? An Empirical Study of API Misuses in Python Programs. 522-533 - Yao Hao, Zhiqiu Huang, Hongjing Guo, Guohua Shen:

Test Input Selection for Deep Neural Network Enhancement Based on Multiple-Objective Optimization. 534-545 - Zarrin Tasnim Sworna, Muhammad Ali Babar, Anjitha Sreekumar:

IRP2API: Automated Mapping of Cyber Security Incident Response Plan to Security Tools' APIs. 546-557 - Le Chen, Zhide Zhou, Xiaochen Li, He Jiang:

Detecting JavaScript Transpiler Bugs with Grammar-guided Mutation. 558-568 - Ping Yu, Yijian Wu, Jiahan Peng, Jian Zhang, Peicheng Xie:

Towards Understanding Fixes of SonarQube Static Analysis Violations: A Large-Scale Empirical Study. 569-580 - Suyash Shukla

, Sandeep Kumar
:
Self-Adaptive Ensemble-based Approach for Software Effort Estimation. 581-592 - Jiangchang Wu

, Yibiao Yang, Yuming Zhou:
Boosting Compiler Testing via Eliminating Test Programs with Long-Execution-Time. 593-603 - Xiangwei Li, Xiaoning Ren, Yinxing Xue, Zhenchang Xing, Jiamou Sun:

Prediction of Vulnerability Characteristics Based on Vulnerability Description and Prompt Learning. 604-615 - Beiqi Zhang, Tianyang Liu

, Peng Liang, Chong Wang, Mojtaba Shahin, Jiaxin Yu:
Architecture Decisions in AI-based Systems Development: An Empirical Study. 616-626 - Haiqiao Gu, Hao He, Minghui Zhou:

Self-Admitted Library Migrations in Java, JavaScript, and Python Packaging Ecosystems: A Comparative Study. 627-638 - Yakang Li, Yikun Hu, Yizhuo Wang, Yituo He, Haining Lu, Dawu Gu:

RGDroid: Detecting Android Malware with Graph Convolutional Networks against Structural Attacks. 639-650 - Lin Sze Khoo

, Jia Qi Bay, Ming Lee Kimberly Yap, Mei Kuan Lim, Chun Yong Chong, Zhou Yang, David Lo
:
Exploring and Repairing Gender Fairness Violations in Word Embedding-based Sentiment Analysis Model through Adversarial Patches. 651-662 - Alexander Agroskin, Elena Lyulina, Sergey Titov, Vladimir Kovalenko:

Constructing Temporal Networks of OSS Programming Language Ecosystems. 663-667 - Yisheng Xia, Weifeng Sun, Meng Yan

, Lei Xu, Dan Yang:
An Adaptive Partition-Based Approach for Adaptive Random Testing on Real Programs. 668-672 - Elliott Wen, Jens Dietrich

:
WasmSlim: Optimizing WebAssembly Binary Distribution via Automatic Module Splitting. 673-677 - Christos Tsigkanos, Pooja Rani

, Sebastian Müller
, Timo Kehrer:
Large Language Models: The Next Frontier for Variable Discovery within Metamorphic Testing? 678-682 - Junaed Younus Khan

, Gias Uddin:
Combining Contexts from Multiple Sources for Documentation-Specific Code Example Generation. 683-687 - Boyao Ding, Yu Zhang

, Jinbao Chen
, Mingzhe Hu
, Qingwei Li:
CGORewritter: A better way to use C library in G. 688-692 - Daisuke Fukumoto, Yutaro Kashiwa, Toshiki Hirao, Kenji Fujiwara

, Hajimu Iida:
An Empirical Investigation on the Performance of Domain Adaptation for T5 Code Completion. 693-697 - Cezar Sas

, Andrea Capiluppi
:
Weak Labelling for File-level Source Code Classification. 698-702 - Hong Yi Lin, Patanamon Thongtanunam:

Towards Automated Code Reviews: Does Learning Code Structure Help? 703-707 - Rui Zhu, Cunming Zhang:

How Robust Is a Large Pre-trained Language Model for Code Generationƒ A Case on Attacking GPT2. 708-712 - Ajay Kumar Jha, Mohayeminul Islam, Sarah Nadi:

JTestMigBench and JTestMigTax: A benchmark and taxonomy for unit test migration. 713-717 - Yuewei Li, Yan Lu, Jingyu Wang

, Qi Qi, Jing Wang, Yingying Wang, Jianxin Liao:
TADL: Fault Localization with Transformer-based Anomaly Detection for Dynamic Microservice Systems. 718-722 - Lili Bo, Yanchi Yuan, Xiaobing Sun, Hao Xie, Bin Li:

TemLock: A Lightweight Template-based Approach for Fixing Deadlocks Caused by ReentrantLock. 723-727 - Adem Ait

, Javier Luis Cánovas Izquierdo, Jordi Cabot:
HFCommunity: A Tool to Analyze the Hugging Face Hub Community. 728-732 - Rupashree Rangaiyengar, Raghavan Komondoor, Raveendra Kumar Medicherla:

Multi-Layer Observability for Fault Localization in Microservices Based Systems. 733-737 - Xuangan Xiao, Yizhuo Wang, Yikun Hu, Dawu Gu:

xVMP: An LLVM-based Code Virtualization Obfuscator. 738-742 - Mohammad Mehdi Pourhashem Kallehbasti

, Mohammad Ghafari:
Naturalistic Static Program Analysis. 743-747 - José Flora

, Miguel Teixeira, Nuno Antunes:
µDetector: Automated Intrusion Detection for Microservices. 748-752 - Florian Breitfelder, Tobias Roth, Lars Baumgärtner, Mira Mezini:

WasmA: A Static WebAssembly Analysis Framework for Everyone. 753-757 - Wei Zheng, Lidan Lin, Xiang Chen, Guoliang Liu, Hao Huang, Jinjin Shen, Qingqing Xu, Yizeng Gu:

ISTA: Automatic Test Case Generation and Optimization for Intelligent Systems based on Coverage Analysis. 758-762 - Naiyu Zheng, Ting Chen, Chuchu Dong

, Yubo Yang, Yuanzhe Li, Yunxin Liu, Yuanchun Li:
Environment-aware Testing for DNN-based Smart-home WiFi Sensing Systems. 763-767 - Richard Mayer

, Michael Moser, Verena Geist:
Leveraging and Evaluating Automatic Code Summarization for JPA Program Comprehension. 768-772 - Yang Xu, Chao Liu, Yong Li, Qiaoluan Xie, Hyun-Deok Choi:

A Method of Component Prediction for Crash Bug Reports Using Component-Based Features and Machine Learning. 773-777 - Takao Nakagawa, Susumu Tokumoto, Shogo Tokui, Fuyuki Ishikawa:

An Experience Report on Regression-Free Repair of Deep Neural Network Model. 778-782 - Jordan Samhi

, Maria Kober, Abdoul Kader Kaboré, Steven Arzt
, Tegawendé F. Bissyandé, Jacques Klein:
Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods : An Application to the Android Framework for Data Leak Detection. 783-794 - Corentin Latappy, Quentin Perez, Thomas Degueule, Jean-Rémy Falleri, Christelle Urtado, Sylvain Vauttier, Xavier Blanc, Cédric Teyton:

MLinter: Learning Coding Practices from Examples - Dream or Reality? 795-804 - Lena Gregor, Markus Schnappinger, Alexander Pretschner:

Revisiting Inter-Class Maintainability Indicators. 805-814 - Shizuka Tsumita, Shinpei Hayashi, Sousuke Amasaki:

Large-Scale Evaluation of Method-Level Bug Localization with FinerBench4BL. 815-824 - Dario Amoroso d'Aragona, Fabiano Pecorelli, Maria Teresa Baldassarre, Davide Taibi

, Valentina Lenarduzzi
:
Technical Debt Diffuseness in the Apache Ecosystem: A Differentiated Replication. 825-833 - Marcel Ochs, Krishna Narasimhan, Mira Mezini:

Evaluating and improving transformers pre-trained on ASTs for Code Completion. 834-844 - Esteban Parra, Mohammad Alahmadi, Ashley Ellis, Sonia Haiduc:

Extended Abstract of A Comparative Study and Analysis of Developer Communications on Slack and Gitter. 845 - Alvin Jian Jia Tan, Chun Yong Chong, Aldeida Aleti:

Extended Abstract of E-SC4R: Explaining Software Clustering for Remodularisation. 846-847 - Zheng Li, Yonghao Wu, Bin Peng, Xiang Chen, Zeyu Sun, Yong Liu, Deli Yu:

Extended Abstract of SeCNN: A semantic CNN parser for code comment generation. 848-849 - Kunsong Zhao, Jin Liu, Zhou Xu, Xiao Liu, Lei Xue, Zhiwen Xie, Yuxuan Zhou, Xin Wang:

Extended Abstract of Graph4Web: A Relation-Aware Graph Attention Network for Web Service Classification. 850 - Jie Cai, Bin Li, Jiale Zhang, Xiaobing Sun, Bing Chen:

Extended Abstract of Combine Sliced Joint Graph with Graph Neural Networks for Smart Contract Vulnerability Detection. 851-852 - Rubing Huang, Haibo Chen, Weifeng Sun, Dave Towey

:
Extended Abstract of Candidate Test Set Reduction for Adaptive Random Testing: An Overheads Reduction Technique. 853-854 - Manuel Boi, Andrea Pinna

, Maria Ilaria Lunesu:
Blockchain oracles for document certification: A case study. 855-864 - Giacomo Ibba, Matteo Vaccargiu

:
Analysis of Users' Most Discussed Topics and Trends on Blockchain Technologies and Smart Contracts. 865-873 - Anjum Nazir, Michael Singh, Giuseppe Destefanis, Jamsheed Memon, Rumyana Neykova, Mohamad Kassab, Roberto Tonelli:

An Optimized Concurrent Proof of Authority Consensus Protocol. 874-877 - Giuseppe Antonio Pierro, Honore Mahugnon:

An analysis of the Oracles used in Ethereum's blockchain. 878-885 - Petya Hristova Cvitic, Felix Dobslaw, Francisco Gomes de Oliveira Neto:

Investigating Software Testing and Maintenance of Open-Source Distributed Ledger. 886-896 - Florian Maier, Michael Felderer

:
Detection of test smells with basic language analysis methods and its evaluation. 897-904 - Alejandra Duque-Torres

, Dietmar Pfahl
, Claus Klammer, Stefan Fischer:
Bug or not Bug? Analysing the Reasons Behind Metamorphic Relation Violations. 905-912 - Brent van Bladel, Serge Demeyer:

A Comparative Study of Code Clone Genealogies in Test Code and Production Code. 913-920 - Stefan Fischer:

Insights from Building a GUI Testing Tool. 921-924 - Mingrui Yang, Dalin Zhang:

Deep Reinforcement Learning Guided Decision Tree Learning For Program Synthesis. 925-932 - Xiangchen Shen, Haibo Chen, Jinfu Chen, Jiawei Zhang, Shuhui Wang:

EcoDialTest: Adaptive Mutation Schedule for Automated Dialogue Systems Testing. 933-939 - Fengyu Yang, Guangdong Zeng, Fa Zhong, Wei Zheng, Peng Xiao:

Interpretable Software Defect Prediction Incorporating Multiple Rules. 940-947 - Yue Ju, Yixuan Tang, Jinpeng Lan, Xiangbo Mi, Jingxuan Zhang:

A Cross-Language Name Binding Recognition and Discrimination Approach for Identifiers. 948-955 - Rui Zhu, Wenxin Li, Canchang Jin:

TAG: UML Activity Diagram Deeply Supervised Generation from Business Textural Specification. 956-961 - Baolei Wang, Xuan Zhang, Kunpeng Du, Chen Gao, Linyu Li

:
Multimodal Sentiment Analysis under modality deficiency with prototype-Augmentation in software engineering. 962-969 - Shifan Liu, Zhanqi Cui, Ruilin Xie:

SICUP: A Comment Updating Approach based on Structural Information. 970-971 - Chao Zhu, Jing Chen, Rui Zhu, Zhengqiong Wang, Shihan Liu, Jishu Wang

:
ASTHGCN: Adaptive Spatio-Temporal Hypergraph Convolutional Network for Traffic Forecasting. 972-979

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














