IEEE Transactions on Software Engineering

Papers
(The median citation count of IEEE Transactions on Software Engineering is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
50 Years of Transactions on Software Engineering505
Confirmation Bias and Time Pressure: A Family of Experiments in Software Testing485
To Do or Not to Do: Semantics and Patterns for Do Activities in UML PSSM State Machines262
Combining Genetic Programming and Model Checking to Generate Environment Assumptions194
Towards Scalable Model Checking of Reflective Systems via Labeled Transition Systems159
Efficiently Testing Distributed Systems via Abstract State Space Prioritization146
Multi-Granularity Detector for Vulnerability Fixes127
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem117
Just-in-Time Prediction of Software Architectural Changes Through Commit-Level Analyses114
The Why, When, What, and How About Predictive Continuous Integration: A Simulation-Based Investigation110
Enhancing Project-Specific Code Completion by Inferring Internal API Information109
Automatic Fairness Testing of Neural Classifiers Through Adversarial Sampling108
Computation Tree Logic Guided Program Repair100
Enhancing Protocol Fuzzing via Diverse Seed Corpus Generation100
Question Selection for Multimodal Code Search Synthesis Using Probabilistic Version Spaces99
What Leads to a Confirmatory or Disconfirmatory Behavior of Software Testers?94
Shield Broken: Black-Box Adversarial Attacks on LLM-Based Vulnerability Detectors92
Theoretical and Empirical Analyses of the Effectiveness of Metamorphic Relation Composition91
Mission Specification Patterns for Mobile Robots: Providing Support for Quantitative Properties83
Influence of the 1990 IEEE TSE Paper “Automated Software Test Data Generation” on Software Engineering83
Are Your Dependencies Code Reviewed?: Measuring Code Review Coverage in Dependency Updates78
Advanced Smart Contract Vulnerability Detection via LLM-Powered Multi-Agent Systems77
A Retrospective on Whole Test Suite Generation: On the Role of SBST in the Age of LLMs73
Recommending API Function Calls and Code Snippets to Support Software Development72
Prevent: An Unsupervised Approach to Predict Software Failures in Production70
Enhancing Mobile App Bug Reporting via Real-Time Understanding of Reproduction Steps69
Answering Uncertain, Under-Specified API Queries Assisted by Knowledge-Aware Human-AI Dialogue68
A Declarative Metamorphic Testing Framework for Autonomous Driving67
Socio-Technical Grounded Theory for Software Engineering66
Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App65
DSSDPP: Data Selection and Sampling Based Domain Programming Predictor for Cross-Project Defect Prediction65
Esale: Enhancing Code-Summary Alignment Learning for Source Code Summarization64
2023 Reviewers List64
Mask–Mediator–Wrapper Architecture as a Data Mesh Driver64
Mole: Efficient Crash Reproduction in Android Applications With Enforcing Necessary UI Events63
T-Evos: A Large-Scale Longitudinal Study on CI Test Execution and Failure62
Detecting Malicious Packages in PyPI and npm by Clustering Installation Scripts62
A Theory of Pending Schemas in Combinatorial Testing62
Trace Diagnostics for Signal-Based Temporal Properties59
PerfJIT: Test-Level Just-in-Time Prediction for Performance Regression Introducing Commits59
Measuring the Fidelity of a Physical and a Digital Twin Using Trace Alignments58
The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers57
GenMorph: Automatically Generating Metamorphic Relations via Genetic Programming56
A Wizard of Oz Study Simulating API Usage Dialogues With a Virtual Assistant56
An Empirical Study of Software Refactorings in Real-World Open-Source Java Projects55
Robust Test Selection for Deep Neural Networks53
Efficient State Identification for Finite State Machine-Based Testing53
δ-SCALPEL: Docker Image Slimming Based on Source Code Static Analysis52
Mitigating False Positive Static Analysis Warnings: Progress, Challenges, and Opportunities52
Automated Code Editing With Search-Generate-Modify52
Multi-Objective Software Defect Prediction via Multi-Source Uncertain Information Fusion and Multi-Task Multi-View Learning51
A Systematic Review of IoT Systems Testing: Objectives, Approaches, Tools, and Challenges51
Systematic Evaluation and Usability Analysis of Formal Methods Tools for Railway Signaling System Design50
Multimodal Fusion for Android Malware Detection Based on Large Pre-Trained Models49
Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis49
An Empirical Study of Refactoring Rhythms and Tactics in the Software Development Process48
Mutation Testing in Practice: Insights From Open-Source Software Developers47
MASTER: Multi-Source Transfer Weighted Ensemble Learning for Multiple Sources Cross-Project Defect Prediction47
Towards a Cognitive Model of Dynamic Debugging: Does Identifier Construction Matter?47
Neural Library Recommendation by Embedding Project-Library Knowledge Graph46
Decision Support for Selecting Blockchain-Based Application Design Patterns With Layered Taxonomy and Quality Attributes46
AC2Next: A novel model that can predict the next animation API by fusing the animation API context and the UI animation task45
On the Understandability of MLOps System Architectures45
Evolutionary generation of test suites for multi-path coverage of MPI programs with non-determinism45
Program Synthesis for Cyber-Resilience44
Leveraging Large Language Model for Automatic Patch Correctness Assessment42
LLMorpheus: Mutation Testing Using Large Language Models42
An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples42
Annotative Software Product Line Analysis Using Variability-Aware Datalog41
Discovering Reusable Functional Features in Legacy Object-Oriented Systems40
MBL-CPDP: A Multi-Objective Bilevel Method for Cross-Project Defect Prediction40
Context-Aware Personalized Crowdtesting Task Recommendation39
Legion: Massively Composing Rankers for Improved Bug Localization at Adobe39
Human-in-the-Loop Automatic Program Repair39
A Faceted Taxonomy of Requirements Changes in Agile Contexts39
Generalized Coverage Criteria for Combinatorial Sequence Testing39
TransformCode: A Contrastive Learning Framework for Code Embedding via Subtree Transformation38
An Experience Report on Producing Verifiable Builds for Large-Scale Commercial Systems38
Pull Request Decisions Explained: An Empirical Overview37
Can Clean New Code Reduce Technical Debt Density?37
Evaluating and Improving GPT-Based Expansion of Abbreviations37
API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification37
An Empirical Study of Parameter-Efficient Fine-Tuning in Code Change Learning and Beyond37
Formal Equivalence Checking for Mobile Malware Detection and Family Classification37
How Developers Choose Names36
How Should Software Engineering Secondary Studies Include Grey Material?36
Triple Peak Day: Work Rhythms of Software Developers in Hybrid Work36
EpiTESTER: Testing Autonomous Vehicles With Epigenetic Algorithm and Attention Mechanism36
CODIT: Code Editing With Tree-Based Neural Models36
Pathidea: Improving Information Retrieval-Based Bug Localization by Re-Constructing Execution Paths Using Logs35
Weighted Community Division for Automated Software Architecture Refactoring35
Evaluating and Improving Unified Debugging35
Specializing Neural Networks for Cryptographic Code Completion Applications34
Microservice Extraction Based on a Comprehensive Evaluation of Logical Independence and Performance34
Detecting Continuous Integration Skip Commits Using Multi-Objective Evolutionary Search33
Revisiting Test Impact Analysis in Continuous Testing From the Perspective of Code Dependencies33
CloudRaid: Detecting Distributed Concurrency Bugs via Log Mining and Enhancement33
Just-In-Time Obsolete Comment Detection and Update33
Quantitative Verification for Monitoring Event-Streaming Systems33
Studying Ad Library Integration Strategies of Top Free-to-Download Apps33
A Study About the Knowledge and Use of Requirements Engineering Standards in Industry33
Retrieval-Augmented Fine-Tuning for Improving Retrieve-and-Edit Based Assertion Generation33
Experimental Evaluation of Test-Driven Development With Interns Working on a Real Industrial Project33
Watch Out for Extrinsic Bugs! A Case Study of Their Impact in Just-In-Time Bug Prediction Models on the OpenStack Project32
Practitioners’ Expectations on Log Anomaly Detection32
DiffGAN: A Test Generation Approach for Differential Testing of Deep Neural Networks for Image Analysis32
SigRec: Automatic Recovery of Function Signatures in Smart Contracts32
Nighthawk: Fully Automated Localizing UI Display Issues via Visual Understanding32
From Tea Leaves to System Maps: A Survey and Framework on Context-Aware Machine Learning Monitoring32
Automated Commit Message Generation With Large Language Models: An Empirical Study and Beyond32
What Drives and Sustains Self-Assignment in Agile Teams31
How Do Developers Structure Unit Test Cases? An Empirical Analysis of the AAA Pattern in Open Source Projects31
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks30
Automated Refactoring of Non-Idiomatic Python Code With Pythonic Idioms30
Increasing the Confidence of Deep Neural Networks by Coverage Analysis29
Exploring and Analyzing Software Architecture Refactoring in Practice29
“Estimating Software Project Effort Using Analogies”: Reflections After 28 Years29
Data Quality Matters: A Case Study on Data Label Correctness for Security Bug Report Prediction29
Test Flakiness Across Programming Languages29
Empirical Validation of Automated Vulnerability Curation and Characterization28
Mind the Gap! A Study on the Transferability of Virtual Versus Physical-World Testing of Autonomous Driving Systems28
The Analysis of Safety Critical Software Systems28
DAppSCAN: Building Large-Scale Datasets for Smart Contract Weaknesses in DApp Projects28
Effect of Requirements Analyst Experience on Elicitation Effectiveness: A Family of Quasi-Experiments28
Continuously Managing NFRs: Opportunities and Challenges in Practice28
From Executable Specifications to Hard-to-Specify Requirements: Challenges in Describing Reactive System Behavior28
Predictive Comment Updating With Heuristics and AST-Path-Based Neural Learning: A Two-Phase Approach27
An Empirical Study of Model-Agnostic Techniques for Defect Prediction Models27
Assessing Evaluation Metrics for Neural Test Oracle Generation27
Why My App Crashes? Understanding and Benchmarking Framework-Specific Exceptions of Android Apps27
Cross-Language Taint Analysis: Generating Caller-Sensitive Native Code Specification for Java27
STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews27
Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing27
ASTRAEA: Grammar-based Fairness Testing27
Improving Cross-Language Code Clone Detection via Code Representation Learning and Graph Neural Networks27
A Systematic Study on Real-World Android App Bundles27
On the Validity of Pre-Trained Transformers for Natural Language Processing in the Software Engineering Domain27
Understanding the Robustness of Transformer-Based Code Intelligence via Code Transformation: Challenges and Opportunities26
Towards Exploring Developers’ Struggles in Developing Upgradeable Smart Contracts26
Reaching Software Quality for Bioinformatics Applications: How Far Are We?26
Are You Still Working on This? An Empirical Study on Pull Request Abandonment26
Efficient Summary Reuse for Software Regression Verification26
Deconstructing the Nature of Collaboration in Organizations Open Source Software Development: The Impact of Developer and Task Characteristics26
FlakyFix: Using Large Language Models for Predicting Flaky Test Fix Categories and Test Code Repair26
CRPWarner: Warning the Risk of Contract-Related Rug Pull in DeFi Smart Contracts26
Optimization of Software Release Planning Considering Architectural Dependencies, Cost, and Value26
A Grounded Theory of Cross-Community SECOs: Feedback Diversity Versus Synchronization25
The Effectiveness of Supervised Machine Learning Algorithms in Predicting Software Refactoring25
Predicting Defective Lines Using a Model-Agnostic Technique25
Line-Level Defect Prediction by Capturing Code Contexts With Graph Convolutional Networks25
The Impact of Prompt Programming on Function-Level Code Generation25
NumScout: Unveiling Numerical Defects in Smart Contracts Using LLM-Pruning Symbolic Execution25
ArchHypo: Managing Software Architecture Uncertainty Using Hypotheses Engineering24
iTCRL: Causal-Intervention-Based Trace Contrastive Representation Learning for Microservice Systems24
Diversity-Oriented Testing for Competitive Game Agent via Constraint-Guided Adversarial Agent Training24
Hashing Fuzzing: Introducing Input Diversity to Improve Crash Detection24
Automated Infrastructure as Code Program Testing24
Sentinel: A Hyper-Heuristic for the Generation of Mutant Reduction Strategies24
Let’s Talk With Developers, Not About Developers: A Review of Automatic Program Repair Research23
Parameterized Verification of Leader/Follower Systems via Arithmetic Constraints23
Beyond Literal Meaning: Uncover and Explain Implicit Knowledge in Code Through Wikipedia-Based Concept Linking23
Causes and Canonicalization of Unreproducible Builds in Java23
Mithra: Anomaly Detection as an Oracle for Cyberphysical Systems23
A Variability Fault Localization Approach for Software Product Lines23
Explaining Static Analysis With Rule Graphs23
Domain-Driven Design for Microservices: An Evidence-Based Investigation23
Automated Use-After-Free Detection and Exploit Mitigation: How Far Have We Gone?23
Stakeholder Preference Extraction From Scenarios23
Beyond the Sum of Parts: Leveraging Entanglement for Bug Inducing Commit Localization23
How Templated Requirements Specifications Inhibit Creativity in Software Engineering23
SmartOracle: Generating Smart Contract Oracle via Fine-Grained Invariant Detection22
FCGHUNTER: Towards Evaluating Robustness of Graph-Based Android Malware Detection22
Range Specification Bug Detection in Flight Control System Through Fuzzing22
Syntactic Versus Semantic Similarity of Artificial and Real Faults in Mutation Testing Studies22
Forecasting the Principal of Code Technical Debt in JavaScript Applications22
The Power of Small LLMs: A Multi-Agent for Code Generation via Dynamic Precaution Tuning22
Unearthing Gas-Wasting Code Smells in Smart Contracts With Large Language Models22
Practical Mutation Testing at Scale: A view from Google21
Misactivation-Aware Stealthy Backdoor Attacks on Neural Code Understanding Models21
RefactoringMiner 2.021
A Survey on the Use of Computer Vision to Improve Software Engineering Tasks21
A Comparison of Natural Language Understanding Platforms for Chatbots in Software Engineering21
Do Pretrained Language Models Indeed Understand Software Engineering Tasks?21
Verification of Fuzzy Decision Trees20
Boosting Generalizable Fairness With Mahalanobis Distances Guided Boltzmann Exploratory Testing20
Learning to Predict User-Defined Types20
Does Treatment Adherence Impact Experiment Results in TDD?20
PopArt: Ranked Testing Efficiency20
Restore: Retrospective Fault Localization Enhancing Automated Program Repair20
Emerging App Issue Identification via Online Joint Sentiment-Topic Tracing20
Translating to a Low-Resource Language with Compiler Feedback: A Case Study on Cangjie20
Retrospective on: Constraint-Based Automatic Test Data Generation20
Towards More Precise Coincidental Correctness Detection With Deep Semantic Learning20
Runtime Evolution of Bitcoin's Consensus Rules20
Do Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-Tail Software Through Feature Inference19
Active Code Learning: Benchmarking Sample-Efficient Training of Code Models19
Accelerating Finite State Machine-Based Testing Using Reinforcement Learning19
Reuse of Similarly Behaving Software Through Polymorphism-Inspired Variability Mechanisms19
TkT: Automatic Inference of Timed and Extended Pushdown Automata19
The “Question Neighbourhood” Approach for Systematic Evaluation of Code-Generating LLMs19
Clopper-Pearson Algorithms for Efficient Statistical Model Checking Estimation18
Dealing With Data Challenges When Delivering Data-Intensive Software Solutions18
Defining Smart Contract Defects on Ethereum18
Multitask-Based Evaluation of Open-Source LLM on Software Vulnerability18
Evaluating SZZ Implementations: An Empirical Study on the Linux Kernel18
PATEN: Identifying Unpatched Third-Party APIs via Fine-Grained Patch-Enhanced AST-Level Signature18
Stealthy Backdoor Attack for Code Models18
A Little Help Goes a Long Way: Tutoring LLMs in Solving Competitive Programming Through Hints18
The Human Side of Software Engineering Teams: An Investigation of Contemporary Challenges18
Concretization of Abstract Traffic Scene Specifications Using Metaheuristic Search18
SCAnoGenerator: Automatic Anomaly Injection for Ethereum Smart Contracts18
Studying the Influence and Distribution of the Human Effort in a Hybrid Fitness Function for Search-Based Model-Driven Engineering17
An Assessment of Rules of Thumb for Software Phase Management, and the Relationship Between Phase Effort and Schedule Success17
On the Workflows and Smells of Leaderboard Operations (LBOps): An Exploratory Study of Foundation Model Leaderboards17
Isolating Compiler Faults Through Differentiated Compilation Configurations17
Engineering Within Boundaries When Software Has None17
Software Testing With Large Language Models: Survey, Landscape, and Vision17
Comparing Block-Based Programming Models for Two-Armed Robots17
Examiner-Pro: Testing Arm Emulators Across Different Privileges17
Static Profiling of Alloy Models17
Generating Structurally Realistic Models With Deep Autoregressive Networks17
A Retrospective of Proving the Correctness of Multiprocess Programs17
Utilizing Automatic Query Reformulations as Genetic Operations to Improve Feature Location in Software Models17
Finding Trends in Software Research17
A Search-Based Testing Approach for Deep Reinforcement Learning Agents17
RNN-Test: Towards Adversarial Testing for Recurrent Neural Network Systems16
Factors Affecting On-Time Delivery in Large-Scale Agile Software Development16
Darcy: Automatic Architectural Inconsistency Resolution in Java16
Active Learning of Discriminative Subgraph Patterns for API Misuse Detection16
How Toxic Can You Get? Search-Based Toxicity Testing for Large Language Models16
A Procedure to Continuously Evaluate Predictive Performance of Just-In-Time Software Defect Prediction Models During Software Development16
FlexFL: Flexible and Effective Fault Localization With Open-Source Large Language Models16
DaNuoYi: Evolutionary Multitask Injection Testing on Web Application Firewalls16
Heuristic and Neural Network Based Prediction of Project-Specific API Member Access16
How Software Developers Mitigate Their Errors When Developing Code16
A Framework for Emotion-Oriented Requirements Change Handling in Agile Software Engineering16
Malo in the Code Jungle: Explainable Fault Localization for Decentralized Applications16
A Theory of Value for Value-Based Feature Selection in Software Engineering16
AddressWatcher: Sanitizer-Based Localization of Memory Leak Fixes16
Let's Go to the Whiteboard (Again): Perceptions From Software Architects on Whiteboard Architecture Meetings15
VERCATION: Precise Vulnerable Open-source Software Version Identification based on Static Analysis and LLM15
Obstacle Analysis in Requirements Engineering: Retrospective and Emerging Challenges15
Retrospective: Data Mining Static Code Attributes to Learn Defect Predictors15
Automatic Generation of Acceptance Test Cases From Use Case Specifications: An NLP-Based Approach15
Safety and Performance, Why Not Both? Bi-Objective Optimized Model Compression Against Heterogeneous Attacks Toward AI Software Deployment15
A Systematical Study on Application Performance Management Libraries for Apps15
Fast and Precise Static Null Exception Analysis With Synergistic Preprocessing15
A Retrospective on Mining Version Histories to Guide Software Changes15
Robotic Visual GUI Testing for Truly Non-Intrusive Test Automation of Touch Screen Applications15
ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking15
0.065274000167847