default search action
38th ASE 2023: Luxembourg
- 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, Luxembourg, September 11-15, 2023. IEEE 2023, ISBN 979-8-3503-2996-4
- Tegawendé F. Bissyandé, Jacques Klein, Christian Bird, Federica Sarro:
Message from the Chairs: ASE 2023. xxxii-xxxv - Haibin Zheng, Jinyin Chen, Haibo Jin:
CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature Space. 1-13 - Tsz On Li, Wenxi Zong, Yibo Wang, Haoye Tian, Ying Wang, Shing-Chi Cheung, Jeff Kramer:
Nuances are the Key: Unlocking ChatGPT to Find Failure-Inducing Tests with Differential Prompting. 14-26 - Zhen Li, Ruqian Zhang, Deqing Zou, Ning Wang, Yating Li, Shouhuai Xu, Chen Chen, Hai Jin:
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers. 27-39 - Xin Zhou, Kisub Kim, Bowen Xu, Jiakun Liu, DongGyun Han, David Lo:
The Devil is in the Tails: How Long-Tailed Code Distributions Impact Large Language Models. 40-52 - Chunyang Meng, Shijie Song, Haogang Tong, Maolin Pan, Yang Yu:
DeepScaler: Holistic Autoscaling for Microservices Based on Spatiotemporal GNN with Adaptive Graph Learning. 53-65 - Jun Huang, Yang Yang, Hang Yu, Jianguo Li, Xiao Zheng:
Twin Graph-Based Anomaly Detection via Attentive Multi-Modal Learning for Microservice System. 66-78 - Yiru Chen, Chenxi Zhang, Zhen Dong, Dingyu Yang, Xin Peng, Jiayu Ou, Hong Yang, Zheshun Wu, Xiaojun Qu, Wei Li:
Dynamic Graph Neural Networks-Based Alert Link Prediction for Online Service Systems. 79-90 - Shangshu Qian, Wen Fan, Lin Tan, Yongle Zhang:
Vicious Cycles in Distributed Software Systems. 91-103 - Yang Hu, Wenxi Wang, Sarfraz Khurshid, Kenneth L. McMillan, Mohit Tiwari:
Fixing Privilege Escalations in Cloud Access Control with MaxSAT and Graph Neural Networks. 104-115 - Cheryl Lee, Tianyi Yang, Zhuangbin Chen, Yuxin Su, Michael R. Lyu:
Maat: Performance Metric Anomaly Anticipation for Cloud Services with Conditional Diffusion. 116-128 - Zhenhao Li, An Ran Chen, Xing Hu, Xin Xia, Tse-Hsun Chen, Weiyi Shang:
Are They All Good? Studying Practitioners' Expectations on the Readability of Log Messages. 129-140 - Xuheng Wang, Jiaxing Song, Xu Zhang, Junshu Tang, Weihe Gao, Qingwei Lin:
LogOnline: A Semi-Supervised Log-Based Anomaly Detector Aided with Online Learning Mechanism. 141-152 - Rungroj Maipradit, Dong Wang, Patanamon Thongtanunam, Raula Gaikovina Kula, Yasutaka Kamei, Shane McIntosh:
Repeated Builds During Code Review: An Empirical Study of the OpenStack Community. 153-165 - Wenbo Guo, Zhengzi Xu, Chengwei Liu, Cheng Huang, Yong Fang, Yang Liu:
An Empirical Study of Malicious Code In PyPI Ecosystem. 166-177 - Weiwei Xu, Hao He, Kai Gao, Minghui Zhou:
Understanding and Remediating Open-Source License Incompatibilities in the PyPI Ecosystem. 178-190 - Lyuye Zhang, Chengwei Liu, Sen Chen, Zhengzi Xu, Lingling Fan, Lida Zhao, Yiran Zhang, Yang Liu:
Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem. 191-203 - Liang Wang, Zhiwen Zheng, Xiangchen Wu, Baihui Sang, Jierui Zhang, Xianping Tao:
Fork Entropy: Assessing the Diversity of Open Source Software Projects' Forks. 204-216 - Chenyuan Zhang, Yanlin Wang, Zhao Wei, Yong Xu, Juhong Wang, Hui Li, Rongrong Ji:
EALink: An Efficient and Accurate Pre-Trained Framework for Issue-Commit Link Recovery. 217-229 - Shengyou Hu, Huayao Wu, Peng Wang, Jing Chang, Yongjun Tu, Xiu Jiang, Xintao Niu, Changhai Nie:
ATOM: Automated Black-Box Testing of Multi-Label Image Classification Systems. 230-242 - Zhuo Li, Xiongfei Wu, Derui Zhu, Mingfei Cheng, Siyuan Chen, Fuyuan Zhang, Xiaofei Xie, Lei Ma, Jianjun Zhao:
Generative Model-Based Testing on Decision-Making Policies. 243-254 - Sarthak Chakraborty, Shubham Agarwal, Shaddy Garg, Abhimanyu Sethia, Udit Narayan Pandey, Videh Aggarwal, Shiv Kumar Saini:
ESRO: Experience Assisted Service Reliability against Outages. 255-267 - Jinyang Liu, Zhihan Jiang, Jiazhen Gu, Junjie Huang, Zhuangbin Chen, Cong Feng, Zengyin Yang, Yongqiang Yang, Michael R. Lyu:
Prism: Revealing Hidden Functional Clusters from Massive Instances in Cloud Systems. 268-280 - Alessandro Tundo, Marco Mobilio, Shashikant Ilager, Ivona Brandic, Ezio Bartocci, Leonardo Mariani:
An Energy-Aware Approach to Design Self-Adaptive AI-based Applications on the Edge. 281-293 - Sicheng Hao, Yuhong Nan, Zibin Zheng, Xiaohui Liu:
SmartCoCo: Checking Comment-Code Inconsistency in Smart Contracts via Constraint Propagation and Binding. 294-306 - Wentao Liang, Xiang Ling, Jingzheng Wu, Tianyue Luo, Yanjun Wu:
A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering. 307-318 - Yujiang Gui, Dongjie He, Jingling Xue:
Merge-Replay: Efficient IFDS-Based Taint Analysis by Consolidating Equivalent Value Flows. 319-331 - Jian Zhang, Shangqing Liu, Xu Wang, Tianlin Li, Yang Liu:
Learning to Locate and Describe Vulnerabilities. 332-344 - Xin-Cheng Wen, Xinchen Wang, Cuiyun Gao, Shaohua Wang, Yang Liu, Zhaoquan Gu:
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection. 345-357 - Ziyou Jiang, Lin Shi, Guowei Yang, Qing Wang:
SCPatcher: Mining Crowd Security Discussions to Enrich Secure Coding Practices. 358-370 - Zhenlan Ji, Pingchuan Ma, Shuai Wang, Yanhui Li:
Causality-Aided Trade-Off Analysis for Machine Learning Fairness. 371-383 - Tamal Mondal, Scott Barnett, Akash Lal, Jyothi Vedurada:
Cell2Doc: ML Pipeline for Generating Documentation in Computational Notebooks. 384-396 - Jiaxing Liu, Chaofeng Sha, Xin Peng:
An Empirical Study of Parameter-Efficient Fine-Tuning Methods for Pre-Trained Code Models. 397-408 - Nikitha Rao, Kush Jain, Uri Alon, Claire Le Goues, Vincent J. Hellendoorn:
CAT-LM Training Language Models on Aligned Code And Tests. 409-420 - Ze Tang, Jidong Ge, Shangqing Liu, Tingwei Zhu, Tongtong Xu, Liguo Huang, Bin Luo:
Domain Adaptive Code Completion via Language Models and Decoupled Domain Databases. 421-433 - Mingwei Liu, Tianyong Yang, Yiling Lou, Xueying Du, Ying Wang, Xin Peng:
CodeGen4Libs: A Two-Stage Approach for Library-Oriented Code Generation. 434-445 - Myeongsoo Kim, Saurabh Sinha, Alessandro Orso:
Adaptive REST API Testing with Reinforcement Learning. 446-458 - Alexi Turcotte, Satyajit Gokhale, Frank Tip:
Increasing the Responsiveness of Web Applications by Introducing Lazy Loading. 459-470 - Qing Huang, Zhenyu Wan, Zhenchang Xing, Changjing Wang, Jieshan Chen, Xiwei Xu, Qinghua Lu:
Let's Chat to Find the APIs: Connecting Human, LLM and Knowledge Graph through AI Chain. 471-483 - Tai Nguyen, Yifeng Di, Joohan Lee, Muhao Chen, Tianyi Zhang:
Software Entity Recognition with Noise-Robust Learning. 484-496 - Yintong Huo, Yichen Li, Yuxin Su, Pinjia He, Zifan Xie, Michael R. Lyu:
AutoLog: A Log Sequence Synthesis Framework for Anomaly Detection. 497-509 - Yi Liu, Yuekang Li, Gelei Deng, Felix Juefei-Xu, Yao Du, Cen Zhang, Chengwei Liu, Yeting Li, Lei Ma, Yang Liu:
ASTER: Automatic Speech Recognition System Accessibility Testing for Stutterers. 510-521 - Chunqiu Steven Xia, Yifeng Ding, Lingming Zhang:
The Plastic Surgery Hypothesis in the Era of Large Language Models. 522-534 - Quanjun Zhang, Chunrong Fang, Tongke Zhang, Bowen Yu, Weisong Sun, Zhenyu Chen:
Gamma: Revisiting Template-Based Automated Program Repair Via Mask Prediction. 535-547 - Yi Li, Shaohua Wang, Tien N. Nguyen:
Contextuality of Code Representation Learning. 548-559 - Zhao Tian, Junjie Chen, Xiangyu Zhang:
On-the-fly Improving Performance of Deep Code Models via Input Denoising. 560-572 - Antonio Vitale, Valentina Piantadosi, Simone Scalabrino, Rocco Oliveto:
Using Deep Learning to Automatically Improve Code Readability. 573-584 - Antonio Mastropaolo, Massimiliano Di Penta, Gabriele Bavota:
Towards Automatically Addressing Self-Admitted Technical Debt: How Far Are We? 585-597 - Prantik Chatterjee, Pankaj Kumar Kalita, Sumit Lahiri, Sujit Kumar Muduli, Vishal Singh, Gourav Takhar, Subhajit Roy:
An Integrated Program Analysis Framework for Graduate Courses in Programming Languages and Software Engineering. 598-610 - Nikhil Parasaram, Earl T. Barr, Sergey Mechtaev, Marcel Böhme:
Precise Data-Driven Approximation for Program Analysis via Fuzzing. 611-623 - Chenghang Shi, Haofeng Li, Yulei Sui, Jie Lu, Lian Li, Jingling Xue:
Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis. 624-636 - G. M. Shahariar, Tahmid Hasan, Anindya Iqbal, Gias Uddin:
Contrastive Learning for API Aspect Analysis. 637-648 - Xinyue Liu, Lukasz Ziarek:
PTDETECTOR: An Automated JavaScript Front-end Library Detector. 649-660 - Shuyao Jiang, Ruiying Zeng, Zihao Rao, Jiazhen Gu, Yangfan Zhou, Michael R. Lyu:
Revealing Performance Issues in Server-Side WebAssembly Runtimes Via Differential Testing. 661-672 - Peisen Yao, Jingyu Ke, Jiahui Sun, Hongfei Fu, Rongxin Wu, Kui Ren:
Demystifying Template-Based Invariant Generation for Bit-Vector Programs. 673-685 - Yao Zhang, Xiaofei Xie, Yi Li, Sen Chen, Cen Zhang, Xiaohong Li:
EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software. 686-697 - Stanly Samuel, Deepak D'Souza, Raghavan Komondoor:
Symbolic Fixpoint Algorithms for Logical LTL Games. 698-709 - Liran Wang, Xunzhu Tang, Yichen He, Changyu Ren, Shuhua Shi, Chaoran Yan, Zhoujun Li:
Delving into Commit-Issue Correlation to Enhance Commit Message Generation Models. 710-722 - Aleksandra Eliseeva, Yaroslav Sokolov, Egor Bogomolov, Yaroslav Golubev, Danny Dig, Timofey Bryksin:
From Commit Message Generation to History-Aware Commit Message Completion. 723-735 - Jingbo Lu, Dongjie He, Wei Li, Yaoqing Gao, Jingling Xue:
Automatic Generation and Reuse of Precise Library Summaries for Object-Sensitive Pointer Analysis. 736-747 - Chong Wang, Yiling Lou, Junwei Liu, Xin Peng:
Generating Variable Explanations via Zero-shot Prompt Learning. 748-760 - Shuzheng Gao, Xin-Cheng Wen, Cuiyun Gao, Wenxuan Wang, Hongyu Zhang, Michael R. Lyu:
What Makes Good In-Context Demonstrations for Code Intelligence Tasks with LLMs? 761-773 - Jiaqi Xiong, Guoqiang Chen, Kejiang Chen, Han Gao, Shaoyin Cheng, Weiming Zhang:
HexT5: Unified Pre-Training for Stripped Binary Code Information Inference. 774-786 - Linyu Li, Sihan Xu, Yang Liu, Ya Gao, Xiangrui Cai, Jiarun Wu, Wenli Song, Zheli Liu:
LiSum: Open Source Software License Summarization with Multi-Task Learning. 787-799 - Wenxin Xiao, Jingyue Li, Hao He, Ruiqiao Qiu, Minghui Zhou:
Personalized First Issue Recommender for Newcomers in Open Source Projects. 800-812 - Yingying He, Wenhua Yang, Minxue Pan, Yasir Hussain, Yu Zhou:
Understanding and Enhancing Issue Prioritization in GitHub. 813-824 - Yuqiang Sun, Zhengzi Xu, Chengwei Liu, Yiran Zhang, Yang Liu:
Who is the Real Hero? Measuring Developer Contribution via Multi-Dimensional Data Integration. 825-836 - Mukelabai Mukelabai, Christoph Derks, Jacob Krüger, Thorsten Berger:
To Share, or Not to Share: Exploring Test-Case Reusability in Fork Ecosystems. 837-849 - Zhao Tian, Junjie Chen, Zhi Jin:
Code Difference Guided Adversarial Example Generation for Deep Code Models. 850-862 - Neng Zhang, Qinde Chen, Zibin Zheng, Ying Zou:
iASTMapper: An Iterative Similarity-Based Abstract Syntax Tree Mapping Algorithm. 863-874 - Jia Li, Chongyang Tao, Zhi Jin, Fang Liu, Jia Li, Ge Li:
ZC3: Zero-Shot Cross-Language Code Clone Detection. 875-887 - Johannes Düsing, Ben Hermann:
Persisting and Reusing Results of Static Program Analyses on a Large Scale. 888-900 - Talank Baral, Shanto Rahman, Bala Naren Chanumolu, Basak Balci, Tuna Tuncer, August Shi, Wing Lam:
Optimizing Continuous Development by Detecting and Preventing Unnecessary Content Generation. 901-913 - Wensheng Tang, Chengpeng Wang, Peisen Yao, Rongxin Wu, Xianjin Fu, Gang Fan, Charles Zhang:
DCLINK: Bridging Data Constraint Changes and Implementations in FinTech Systems. 914-925 - Paschal C. Amusuo, Ricardo Andrés Calvo Méndez, Zhongwei Xu, Aravind Machiry, James C. Davis:
Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks. 926-938 - Shiyao Zhou, Muhui Jiang, Weimin Chen, Hao Zhou, Haoyu Wang, Xiapu Luo:
WADIFF: A Differential Testing Framework for WebAssembly Runtimes. 939-950 - Xiaoyin Wang, Tahmid Rafi, Na Meng:
VRGuide: Efficient Testing of Virtual Reality Scenes via Dynamic Cut Coverage. 951-962 - Yanju Chen, Chenglong Wang, Xinyu Wang, Osbert Bastani, Yu Feng:
Fast and Reliable Program Synthesis via User Interaction. 963-975 - Xiaoxue Ren, Xinyuan Ye, Dehai Zhao, Zhenchang Xing, Xiaohu Yang:
From Misuse to Mastery: Enhancing Code Generation with Knowledge-Driven AI Chaining. 976-987 - Yun Peng, Chaozheng Wang, Wenxuan Wang, Cuiyun Gao, Michael R. Lyu:
Generative Type Inference for Python. 988-999 - Mingxuan Zhu, Dan Hao:
Compiler Auto-Tuning via Critical Flag Selection. 1000-1011 - Atish Kumar Dipongkor, Kevin Moran:
A Comparative Study of Transformer-Based Neural Text Representation Techniques on Bug Triaging. 1012-1023 - Lingxiao Tang, Lingfeng Bao, Xin Xia, Zhongdong Huang:
Neural SZZ Algorithm. 1024-1035 - Cedric Richter, Heike Wehrheim:
How to Train Your Neural Bug Detector: Artificial vs Real Bugs. 1036-1048 - Baoquan Cui, Miaomiao Wang, Chi Zhang, Jiwei Yan, Jun Yan, Jian Zhang:
Detection of Java Basic Thread Misuses Based on Static Event Analysis. 1049-1060 - Eric Liu, Shengjie Xu, David Lie:
FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers. 1061-1072 - Ran Mo, Yingjie Jiang, Wenjing Zhan, Dongyu Wang, Zengyang Li:
A Comprehensive Study on Code Clones in Automated Driving Software. 1073-1085 - Tao Wang, Wei Chen, Liwei Liu, Guoquan Wu, Jun Wei, Tao Huang:
Detecting Smart Home Automation Application Interferences with Domain Knowledge. 1086-1097 - Szymon Stradowski, Lech Madeyski:
Bridging the Gap Between Academia and Industry in Machine Learning Software Defect Prediction: Thirteen Considerations. 1098-1110 - Xing Hu, Zhuang Liu, Xin Xia, Zhongxin Liu, Tongtong Xu, Xiaohu Yang:
Identify and Update Test Cases When Production Code Changes: A Transformer-Based Approach. 1111-1122 - Weifeng Sun, Hongyan Li, Meng Yan, Yan Lei, Hongyu Zhang:
Revisiting and Improving Retrieval-Augmented Deep Assertion Generation. 1123-1135 - Mingxuan Xiao, Yan Xiao, Hai Dong, Shunhui Ji, Pengcheng Zhang:
LEAP: Efficient and Automated Test Method for NLP Software. 1136-1148 - Jiaming Ye, Shangzhou Xia, Fuyuan Zhang, Paolo Arcaini, Lei Ma, Jianjun Zhao, Fuyuki Ishikawa:
QuraTest: Integrating Quantum Specific Features in Quantum Program Testing. 1149-1161 - Kai Huang, Xiangxin Meng, Jian Zhang, Yang Liu, Wenjie Wang, Shuhao Li, Yuqing Zhang:
An Empirical Study on Fine-Tuning Large Language Models of Code for Automated Program Repair. 1162-1174 - Arooba Shahoor, Askar Yeltayuly Khamit, Jooyong Yi, Dongsun Kim:
Leakpair: Proactive Repairing of Memory Leaks in Single Page Web Applications. 1175-1187 - Yuanzhang Lin, Guoyao Wen, Xiang Gao:
Automated Fixing of Web UI Tests via Iterative Element Matching. 1188-1199 - Wenjie Zhang, Guancheng Wang, Junjie Chen, Yingfei Xiong, Yong Liu, Lu Zhang:
OrdinalFix: Fixing Compilation Errors via Shortest-Path CFL Reachability. 1200-1211 - Zhijie Liu, Liang Feng Zhang, Yutian Tang:
Enhancing Malware Detection for Android Apps: Detecting Fine-Granularity Malicious Components. 1212-1224 - Vikas Kumar Malviya, Yan Naing Tun, Chee Wei Leow, Ailys Tee Xynyn, Lwin Khin Shar, Lingxiao Jiang:
Fine-Grained In-Context Permission Classification for Android Apps Using Control-Flow Graph Embedding. 1225-1237 - Shaokun Zhang, Hanwen Lei, Yuanpeng Wang, Ding Li, Yao Guo, Xiangqun Chen:
How Android Apps Break the Data Minimization Principle: An Empirical Study. 1238-1250 - Xiangyu Zhang, Lingling Fan, Sen Chen, Yucheng Su, Boyuan Li:
Scene-Driven Exploration and GUI Modeling for Android Apps. 1251-1262 - Yuyi Zhong, Ruiwei Wang, Siau-Cheng Khoo:
Expediting Neural Network Verification via Network Reduction. 1263-1275 - Jingyang Li, Guoqiang Li:
HOBAT: Batch Verification for Homogeneous Structural Neural Networks. 1276-1287 - Maolin Sun, Yibiao Yang, Yang Wang, Ming Wen, Haoxiang Jia, Yuming Zhou:
SMT Solver Validation Empowered by Large Pre-Trained Language Models. 1288-1300 - Ali Ghanbari, Deepak-George Thomas, Muhammad Arbab Arshad, Hridesh Rajan:
Mutation-based Fault Localization of Deep Neural Networks. 1301-1313 - Ahmed Haj Yahmed, Rached Bouchoucha, Houssem Ben Braiek, Foutse Khomh:
An Intentional Forgetting-Driven Self-Healing Method for Deep Reinforcement Learning Systems. 1314-1325 - Lwin Khin Shar, Arda Goknil, Erik Johannes Husom, Sagar Sen, Yan Naing Tun, Kisub Kim:
AutoConf: Automated Configuration of Unsupervised Learning Systems Using Metamorphic Testing and Bayesian Optimization. 1326-1338 - Wenxuan Wang, Jingyuan Huang, Jen-tse Huang, Chang Chen, Jiazhen Gu, Pinjia He, Michael R. Lyu:
An Image is Worth a Thousand Toxic Words: A Metamorphic Testing Framework for Content Moderation Software. 1339-1351 - Yuanjie Xia, Zishuo Ding, Weiyi Shang:
CoMSA: A Modeling-Driven Sampling Approach for Configuration Performance Testing. 1352-1363 - Zongze Jiang, Ming Wen, Yixin Yang, Chao Peng, Ping Yang, Hai Jin:
Effective Concurrency Testing for Go via Directional Primitive-Constrained Interleaving Exploration. 1364-1376 - Jaekwon Lee, Enrico Viganò, Oscar Cornejo, Fabrizio Pastore, Lionel C. Briand:
Fuzzing for CPS Mutation Testing. 1377-1389 - Yonghui Liu, Xiao Chen, Pei Liu, John Grundy, Chunyang Chen, Li Li:
ReuNify: A Step Towards Whole Program Analysis for React Native Android Apps. 1390-1402 - Shi Meng, Liu Wang, Shenao Wang, Kailong Wang, Xusheng Xiao, Guangdong Bai, Haoyu Wang:
Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs. 1403-1415