


Остановите войну!
for scientists:


default search action
45th ICSE 2023: Melbourne, Australia
- 45th IEEE/ACM International Conference on Software Engineering, ICSE 2023, Melbourne, Australia, May 14-20, 2023. IEEE 2023, ISBN 978-1-6654-5701-9
- Lori L. Pollock, Massimiliano Di Penta:
Message from the ICSE 2023 Program Co-Chairs. xl - Gennaro Laudato, Simone Scalabrino, Nicole Novielli, Filippo Lanubile, Rocco Oliveto:
Predicting Bugs by Monitoring Developers During Task Execution. 1-13 - Sarah Pink:
Future Software for Life in Trusted Futures. 1 - Paolo Tonella:
The Road Toward Dependable AI Based Systems. 2 - Liming Zhu:
Software Engineering as the Linchpin of Responsible AI. 3-4 - Deze Wang, Boxing Chen, Shanshan Li, Wei Luo, Shaoliang Peng, Wei Dong, Xiangke Liao:
One Adapter for All Programming Languages? Adapter Tuning for Code Search and Summarization. 5-16 - Zhongxin Liu, Zhijie Tang, Xin Xia, Xiaohu Yang:
CCRep: Learning Code Change Representations via Pre-Trained Code Model and Query Back. 17-29 - Shuzheng Gao, Hongyu Zhang, Cuiyun Gao, Chaozheng Wang:
Keeping Pace with Ever-Increasing Data: Towards Continual Learning of Code Intelligence Models. 30-42 - Haoxiang Jia, Ming Wen, Zifan Xie, Xiaochen Guo, Rongxin Wu, Maolin Sun
, Kang Chen, Hai Jin:
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces. 43-55 - Mingyuan Wu, Minghai Lu, Heming Cui, Junjie Chen, Yuqun Zhang, Lingming Zhang:
JITfuzz: Coverage-guided Fuzzing for JVM Just-in-Time Compilers. 56-68 - Maolin Sun
, Yibiao Yang
, Ming Wen, Yongcong Wang, Yuming Zhou, Hai Jin:
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs. 69-81 - Hanmo You, Zan Wang, Junjie Chen, Shuang Liu, Shuochuan Li:
Regression Fuzzing for Deep Learning Systems. 82-94 - Suyue Guo, Xinyu Wan, Wei You, Bin Liang, Wenchang Shi, Yiwei Zhang, Jianjun Huang, Jian Zhang:
Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers. 95-107 - Daniel Oliveira, Wesley K. G. Assunção, Alessandro F. Garcia, Ana Carla Bibiano, Márcio Ribeiro, Rohit Gheyi, Baldoino Fonseca:
The untold story of code refactoring customizations in practice. 108-120 - Roland Croft, Muhammad Ali Babar, M. Mehdi Kholoosi:
Data Quality for Software Vulnerability Datasets. 121-133 - André Oliveira, Vânia Neves, Alexandre Plastino, Ana Carla Bibiano, Alessandro F. Garcia, Leonardo Murta:
Do code refactorings influence the merge effort? 134-146 - Hao Guan, Ying Xiao, Jiaying Li, Yepang Liu, Guangdong Bai:
A Comprehensive Study of Real-World Bugs in Machine Learning Model Optimization. 147-158 - Ezekiel O. Soremekun, Lukas Kirschner, Marcel Böhme, Mike Papadakis:
Evaluating the Impact of Experimental Assumptions in Automated Fault Localization. 159-171 - Jiwei Yan, Miaomiao Wang, Yepang Liu, Jun Yan, Long Zhang:
Locating Framework-specific Crashing Faults with Compact and Explainable Candidate Set. 172-183 - Sunzhou Huang, Xiaoyin Wang:
PExReport: Automatic Creation of Pruned Executable Cross-Project Failure Reports. 184-195 - Feifei Niu, Wesley K. G. Assunção, LiGuo Huang, Christoph Mayr-Dorn, Jidong Ge, Bin Luo, Alexander Egyed:
RAT: A Refactoring-Aware Traceability Model for Bug Localization. 196-207 - Hammad Ahmad, Zachary Karas, Kimberly Diaz, Amir Kamil, Jean-Baptiste Jeannin, Westley Weimer:
How Do We Read Formal Claims? Eye-Tracking and the Cognition of Proofs about Algorithms. 208-220 - Rafi Shalom, Shahar Maoz:
Which of My Assumptions are Unnecessary for Realizability and Why Should I Care? 221-232 - Andreas Dann, Ben Hermann
, Eric Bodden:
UPCY: Safely Updating Outdated Dependencies. 233-244 - Xiaoke Wang, Lei Zhao:
APICAD: Augmenting API Misuse Detection through Specifications from Code and Documents. 245-256 - Sen Yang, Sen Chen, Lingling Fan, Sihan Xu, Zhanwei Hui, Song Huang:
Compatibility Issue Detection for Android Apps Based on Path-Sensitive Semantic Analysis. 257-269 - Jiahui Wu, Zhengzi Xu, Wei Tang, Lyuye Zhang, Yueming Wu
, Chengyue Liu, Kairan Sun, Lida Zhao, Yang Liu:
OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions. 270-282 - Taeyoung Kim, Yunhee Jang, Chanjong Lee, Hyungjoon Koo, Hyoungshick Kim:
Smartmark: Software Watermarking Scheme for Smart Contracts. 283-294 - Zibin Zheng, Neng Zhang, Jianzhong Su, Zhijie Zhong, Mingxi Ye, Jiachi Chen:
Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on Ethereum. 295-306 - Peilin Zheng, Xiapu Luo, Zibin Zheng:
BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts. 307-318 - Bianca Trinkenreich, Klaas-Jan Stol, Anita Sarma, Daniel M. Germán, Marco Aurélio Gerosa, Igor Steinmacher:
Do I Belong? Modeling Sense of Virtual Community Among Linux Kernel Contributors. 319-331 - Yuekun Wang, Yuhang Ye, Yueming Wu
, Weiwei Zhang, Yinxing Xue, Yang Liu:
Comparison and Evaluation of Clone Detection Techniques with Different Code Representations. 332-344 - Jiahao Liu, Jun Zeng, Xiang Wang, Zhenkai Liang:
Learning Graph-based Code Representations for Source-level Functional Similarity Detection. 345-357 - Qihong Chen, Rúben Câmara, José Campos
, André Souto, Iftekhar Ahmed:
The Smelly Eight: An Empirical Study on the Prevalence of Code Smells in Quantum Computing. 358-370 - Danushka Liyanage, Marcel Böhme, Chakkrit Tantithamthavorn, Stephan Lipp:
Reachable Coverage: Estimating Saturation in Fuzzing. 371-383 - Myungho Lee, Sooyoung Cha, Hakjoo Oh:
Learning Seed-Adaptive Mutation Strategies for Greybox Fuzzing. 384-396 - Sicong Cao
, Xiaobing Sun, Xiaoxue Wu, Lili Bo, Bin Li, Rongxin Wu, Wei Liu, Biao He, Yu Ouyang, Jiajia Li:
Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation. 397-409 - Ling Jiang, Hengchen Yuan, Mingyuan Wu, Lingming Zhang, Yuqun Zhang:
Evaluating and Improving Hybrid Fuzzing. 410-422 - Changjian Zhang, Tarang Saluja, Rômulo Meira-Góes, Matthew L. Bolton, David Garlan, Eunsuk Kang:
Robustification of Behavioral Designs against Environmental Deviations. 423-434 - Jenny T. Liang, Maryam Arab, Minhyuk Ko, Amy J. Ko, Thomas D. LaToza:
A Qualitative Study on the Implementation Design Decisions of Developers. 435-447 - I Luk Kim, Weihang Wang, Yonghwi Kwon, Xiangyu Zhang:
BFTDETECTOR: Automatic Detection of Business Flow Tampering for Digital Content Service. 448-459 - Ziqi Zhang, Yuanchun Li, Bingyan Liu, Yifeng Cai, Ding Li, Yao Guo, Xiangqun Chen:
FedSlice: Protecting Federated Learning Models from Malicious Participants with Model Slicing. 460-472 - Zeya Tan, Wei Song:
PTPDroid: Detecting Violated User Privacy Disclosures to Third-Parties of Android Apps. 473-485 - Yutian Yan, Yunhui Zheng, Xinyue Liu, Nenad Medvidovic, Weihang Wang:
Adhere: Automated Detection and Repair of Intrusive Ads. 486-498 - Duc-Ly Vu, Zachary Newman, John Speed Meyers:
Bad Snakes: Understanding and Improving Python Package Index Malware Scanning. 499-511 - Waris Gill, Ali Anwar, Muhammad Ali Gulzar:
FedDebug: Systematic Debugging for Federated Learning Applications. 512-523 - Weibin Wu, Jianping Zhang, Victor Junqiu Wei, Xixian Chen, Zibin Zheng, Irwin King, Michael R. Lyu:
Practical and Efficient Model Extraction of Sentiment Analysis APIs. 524-536 - Changan Niu, Chuanyi Li, Vincent Ng, Bin Luo:
CrossCodeBench: Benchmarking Cross-Task Generalization of Source Code Models. 537-549 - Austin Mordahl, Zenong Zhang, Dakota Soles, Shiyi Wei:
ECSTATIC: An Extensible Framework for Testing and Debugging Configurable Static Analysis. 550-562 - Sahar Badihi, Khaled Ahmed, Yi Li, Julia Rubin:
Responsibility in Context: On Applicability of Slicing in Semantic Regression Analysis. 563-575 - Jan Reichl, Stefan Hanenberg, Volker Gruhn:
Does the Stream API Benefit from Special Debugging Facilities? A Controlled Experiment on Loops and Streams with Specific Debuggers. 576-588 - Gabin An, Jingun Hong, Naryeong Kim, Shin Yoo:
Fonte: Finding Bug Inducing Commits from Failures. 589-601 - Sen Fang, Tao Zhang, Youshuai Tan, He Jiang, Xin Xia, Xiaobing Sun:
RepresentThemAll: A Universal Learning Representation of Bug Reports. 602-614 - Zhuo Zhang
, Brian Zhang, Wen Xu, Zhiqiang Lin:
Demystifying Exploitable Bugs in Smart Contracts. 615-627 - Teng Wang
, Zhouyang Jia, Shanshan Li, Si Zheng, Yue Yu, Erci Xu, Shaoliang Peng, Xiangke Liao:
Understanding and Detecting On-The-Fly Configuration Bugs. 628-639 - Parvez Mahbub, Ohiduzzaman Shuvo, Mohammad Masudur Rahman:
Explaining Software Bugs Leveraging Code Structures in Neural Machine Translation. 640-652 - Xin Tan, Yiran Chen, Haohua Wu, Minghui Zhou, Li Zhang:
Is It Enough to Recommend Tasks to Newcomers? Understanding Mentoring on Good First Issues. 653-664 - Kaia Newman, Madeline Endres, Westley Weimer, Brittany Johnson:
From Organizations to Individuals: Psychoactive Substance Use By Professional Programmers. 665-677 - Likang Yin, Xiyu Zhang, Vladimir Filkov:
On the Self-Governance and Episodic Changes in Apache Incubator Projects: An Empirical Study. 678-689 - Alina Mailach, Norbert Siegmund:
Socio-Technical Anti-Patterns in Building ML-Enabled Software: Insights from Leaders on the Forefront. 690-702 - Patrícia G. F. Matsubara, Igor Steinmacher, Bruno Gadelha, Tayana Conte:
Moving on from the Software Engineers' Gambit: An Approach to Support the Defense of Software Effort Estimates. 703-715 - Jaemin Hong, Sukyoung Ryu:
Concrat: An Automatic C-to-Rust Lock API Translator for Concurrent Programs. 716-728 - Gal Amram, Dor Ma'ayan
, Shahar Maoz, Or Pistiner, Jan Oliver Ringert:
Triggers for Reactive Synthesis Specifications. 729-741 - Dor Ma'ayan
, Shahar Maoz:
Using Reactive Synthesis: An End-to-End Exploratory Case Study. 742-754 - Fang Liu, Jia Li, Li Zhang:
Syntax and Domain Aware Model for Unsupervised Program Translation. 755-767 - Fangwen Mu, Xiao Chen, Lin Shi, Song Wang, Qing Wang:
Developer-Intent Driven Code Comment Generation. 768-780 - Shengbin Xu, Yuan Yao, Feng Xu, Tianxiao Gu, Jingwei Xu, Xiaoxing Ma:
Data Quality Matters: A Case Study of Obsolete Comment Detection. 781-793 - Jinhao Dong, Yiling Lou, Dan Hao, Lin Tan:
Revisiting Learning-based Commit Message Generation. 794-805 - Jiawei Li, Iftekhar Ahmed:
Commit Message Matters: Investigating Impact and Evolution of Commit Message Quality. 806-817 - Hetong Dai, Yiming Tang
, Heng Li, Weiyi Shang:
PILAR: Studying and Mitigating the Influence of Configurations on Log Parsing. 818-829 - Zhenhao Li, Chuan Luo, Tse-Hsun Chen, Weiyi Shang, Shilin He, Qingwei Lin, Dongmei Zhang:
Did We Miss Something Important? Studying and Exploring Variable-Aware Log Abstraction. 830-842 - Zishuo Ding, Yiming Tang
, Yang Li, Heng Li, Weiyi Shang:
On the Temporal Relations between Logging and Code. 843-854 - Guoping Rong, Shenghui Gu, Haifeng Shen, He Zhang, Hongyu Kuang:
How Do Developers' Profiles and Experiences Influence their Logging Practices? An Empirical Study of Industrial Practitioners. 855-867 - Islem Bouzenia, Michael Pradel:
When to Say What: Learning to Find Condition-Message Inconsistencies. 868-880 - Yintong Huo, Yuxin Su, Cheryl Lee, Michael R. Lyu:
SemParser: A Semantic Parser for Log Analytics. 881-893 - Dezhi Ran, Hao Wang, Wenyu Wang, Tao Xie:
Badge: Prioritizing UI Events with Hierarchical Multi-Armed Bandits for Automated UI Testing. 894-905 - Sidong Feng, Mulong Xie, Chunyang Chen:
Efficiency Matters: Speeding Up Automated Testing with GUI Rendering Inference. 906-918 - Caroline Lemieux, Jeevana Priya Inala, Shuvendu K. Lahiri, Siddhartha Sen:
CodaMosa: Escaping Coverage Plateaus in Test Generation with Pre-trained Large Language Models. 919-931 - Chao Wang, Ronny Ko, Yue Zhang, Yuqing Yang, Zhiqiang Lin:
Taintmini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis. 932-944 - Asem Ghaleb, Julia Rubin, Karthik Pattabiraman:
AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities. 945-956 - Shengyi Pan, Lingfeng Bao, Xin Xia, David Lo, Shanping Li:
Fine-grained Commit-level Vulnerability Type Prediction by CWE Tree Structure. 957-969 - Jiamou Sun, Zhenchang Xing, Qinghua Lu, Xiwei Xu, Liming Zhu, Thong Hoang, Dehai Zhao:
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation. 970-982 - Binhang Qi, Hailong Sun, Xiang Gao, Hongyu Zhang, Zhaotian Li, Xudong Liu:
Reusing Deep Neural Network Models through Model Re-engineering. 983-994 - Malinda Dilhara, Danny Dig, Ameya Ketkar:
PYEVOLVE: Automating Frequent Code Changes in Python ML Systems. 995-1007 - Xiaoning Ren, Yun Lin, Yinxing Xue, Ruofan Liu, Jun Sun, Zhiyong Feng, Jin Song Dong:
DeepArc: Modularizing Neural Networks for the Model Maintenance. 1008-1019 - Sayem Mohammad Imtiaz, Fraol Batole, Astha Singh, Rangeet Pan, Breno Dantas Cruz, Hridesh Rajan:
Decomposing a Recurrent Neural Network into Modules for Enabling Reusability and Replacement. 1020-1032 - Yunbo Lyu, Thanh Le-Cong, Hong Jin Kang, Ratnadira Widyasari, Zhipeng Zhao
, Xuan-Bach Dinh Le, Ming Li, David Lo:
CHRONOS: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports. 1033-1045 - Yulun Wu, Zeliang Yu, Ming Wen, Qiang Li, Deqing Zou, Hai Jin:
Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem. 1046-1058 - Masudul Hasan Masud Bhuiyan, Adithya Srinivas Parthasarathy, Nikos Vasilakis, Michael Pradel, Cristian-Alexandru Staicu:
SecBench.js: An Executable Security Benchmark Suite for Server-Side JavaScript. 1059-1070 - Pattaraporn Sangaroonsilp, Hoa Khanh Dam, Aditya Ghose:
On Privacy Weaknesses and Vulnerabilities in Software Systems. 1071-1083 - Hao Zhang, Ji Luo, Mengze Hu, Jun Yan, Jian Zhang, Zongyan Qiu:
Detecting Exception Handling Bugs in C++ Programs. 1084-1095 - Yoonseok Ko, Hakjoo Oh:
Learning to Boost Disjunctive Static Bug-Finders. 1097-1109 - Wensheng Dou, Ziyu Cui, Qianwang Dai, Jiansen Song, Dong Wang, Yu Gao, Wei Wang, Jun Wei, Lei Chen, Hanmo Wang, Hua Zhong, Tao Huang:
Detecting Isolation Bugs via Transaction Oracle Construction. 1123-1135 - Siwei Cui, Yifei Gao, Rainer Unterguggenberger, Wilfried Pichler, Sean Livingstone, Jeff Huang:
SmallRace: Static Race Detection for Dynamic Languages - A Case on Smalltalk. 1136-1147 - Sterre van Breukelen, Ann Barcomb, Sebastian Baltes, Alexander Serebrenik:
"STILL AROUND": Experiences and Survival Strategies of Veteran Women Software Developers. 1148-1160 - Vincenzo Riccio
, Paolo Tonella
:
When and Why Test Generators for Deep Learning Produce Invalid Inputs: an Empirical Study. 1161-1173 - Chenyuan Yang, Yinlin Deng, Jiayi Yao, Yuxing Tu, Hanchi Li, Lingming Zhang:
Fuzzing Automatic Differentiation in Deep-Learning Libraries. 1174-1186 - Zenan Li, Maorun Zhang, Jingwei Xu, Yuan Yao, Chun Cao, Taolue Chen, Xiaoxing Ma, Jian Lu:
Lightweight Approaches to DNN Regression Error Reduction: An Uncertainty Alignment Perspective. 1187-1199 - Yuanyuan Yuan, Qi Pang, Shuai Wang:
Revisiting Neuron Coverage for DNN Testing: A Layer-Wise and Distribution-Aware Criterion. 1200-1212 - Mahtab Nejati, Mahmoud Alfadel, Shane McIntosh:
Code Review of Build System Specifications: Prevalence, Purposes, Patterns, and Perceptions. 1213-1224 - Manish Motwani, Yuriy Brun:
Better Automatic Program Repair by Using Bug Reports and Tests Together. 1225-1237 - Zongjie Li, Chaozheng Wang, Zhibo Liu, Haoxuan Wang, Dong Chen, Shuai Wang, Cuiyun Gao:
CCTEST: Testing and Repairing Code Completion Systems. 1238-1250 - Nan Jiang, Thibaud Lutellier, Yiling Lou, Lin Tan, Dan Goldwasser, Xiangyu Zhang:
KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair. 1251-1263 - Nikhil Parasaram, Earl T. Barr, Sergey Mechtaev:
Rete: Learning Namespace Representation for Program Repair. 1264-1276 - Saad Ezzini, Sallam Abualhaija, Chetan Arora, Mehrdad Sabetzadeh:
AI-based Question Answering Assistance for Analyzing Natural-language Requirements. 1277-1289 - Alessio Ferrari, Paola Spoletini:
Strategies, Benefits and Challenges of App Store-inspired Requirements Elicitation. 1290-1302 - Zhilei Han, Fei He:
Data-driven Recurrent Set Learning For Non-termination Analysis. 1303-1315 - Guannan Wei, Songlin Jia, Ruiqi Gao, Haotian Deng, Shangyin Tan, Oliver Bracevac
, Tiark Rompf:
Compiling Parallel Symbolic Execution with Continuations. 1316-1328 - Chengpeng Wang, Gang Fan, Peisen Yao, Fuxiong Pan, Charles Zhang:
Verifying Data Constraint Equivalence in FinTech Systems. 1329-1341 - Shihao Zhu, Yuqi Guo, Long Zhang, Yan Cai:
Tolerate Control-Flow Changes for Sound Data Race Prediction. 1342-1354 - Zhe Liu, Chunyang Chen, Junjie Wang, Xing Che, Yuekai Huang, Jun Hu, Qing Wang:
Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing. 1355-1367 - Paul T. Chiou, Ali S. Alotaibi, William G. J. Halfond:
Detecting Dialog-Related Keyboard Navigation Failures in Web Applications. 1368-1380 - Priyanka Bose, Dipanjan Das, Saastha Vasan, Sebastiano Mariani, Ilya Grishchenko, Andrea Continella, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Columbus: Android App Testing Through Systematic Callback Exploration. 1381-1392 - Jiongchi Yu
, Yuechen Wu, Xiaofei Xie
, Wei Le, Lei Ma, Yingfeng Chen, Jingyu Hu, Fan Zhang:
GameRTS: A Regression Testing Framework for Video Games. 1393-1404