IEEE Transactions on Software Engineering

Papers
(The median citation count of IEEE Transactions on Software Engineering is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
50 Years of Transactions on Software Engineering572
Enhancing Protocol Fuzzing via Diverse Seed Corpus Generation351
Question Selection for Multimodal Code Search Synthesis Using Probabilistic Version Spaces250
Computation Tree Logic Guided Program Repair138
Confirmation Bias and Time Pressure: A Family of Experiments in Software Testing132
Shield Broken: Black-Box Adversarial Attacks on LLM-Based Vulnerability Detectors128
Towards Scalable Model Checking of Reflective Systems via Labeled Transition Systems126
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem125
Just-in-Time Prediction of Software Architectural Changes Through Commit-Level Analyses124
Influence of the 1990 IEEE TSE Paper “Automated Software Test Data Generation” on Software Engineering112
Enhancing Mobile App Bug Reporting via Real-Time Understanding of Reproduction Steps108
The Why, When, What, and How About Predictive Continuous Integration: A Simulation-Based Investigation106
Prevent: An Unsupervised Approach to Predict Software Failures in Production106
A Retrospective on Whole Test Suite Generation: On the Role of SBST in the Age of LLMs100
Enhancing Project-Specific Code Completion by Inferring Internal API Information99
Deobfuscation of Control Flow Flattening Based on Abstract Interpretation96
Combining Genetic Programming and Model Checking to Generate Environment Assumptions85
Are Your Dependencies Code Reviewed?: Measuring Code Review Coverage in Dependency Updates84
To Do or Not to Do: Semantics and Patterns for Do Activities in UML PSSM State Machines82
Answering Uncertain, Under-Specified API Queries Assisted by Knowledge-Aware Human-AI Dialogue80
Recommending API Function Calls and Code Snippets to Support Software Development78
Mission Specification Patterns for Mobile Robots: Providing Support for Quantitative Properties78
Efficiently Testing Distributed Systems via Abstract State Space Prioritization76
Visibility of Domain Elements in the Elicitation Process Interviews: A Family of Empirical Studies75
DSSDPP: Data Selection and Sampling Based Domain Programming Predictor for Cross-Project Defect Prediction75
How Composite Metamorphic Relations Enhance Test Effectiveness of DNN Testing: An Empirical Study74
A Declarative Metamorphic Testing Framework for Autonomous Driving73
Multi-Granularity Detector for Vulnerability Fixes73
Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App72
Advanced Smart Contract Vulnerability Detection via LLM-Powered Multi-Agent Systems71
Automatic Fairness Testing of Neural Classifiers Through Adversarial Sampling71
Socio-Technical Grounded Theory for Software Engineering70
2023 Reviewers List66
Multimodal Fusion for Android Malware Detection Based on Large Pre-Trained Models65
Towards a Cognitive Model of Dynamic Debugging: Does Identifier Construction Matter?65
Mutation Testing in Practice: Insights From Open-Source Software Developers64
Mitigating False Positive Static Analysis Warnings: Progress, Challenges, and Opportunities63
Neural Library Recommendation by Embedding Project-Library Knowledge Graph62
Esale: Enhancing Code-Summary Alignment Learning for Source Code Summarization60
A Wizard of Oz Study Simulating API Usage Dialogues With a Virtual Assistant59
Mask–Mediator–Wrapper Architecture as a Data Mesh Driver58
T-Evos: A Large-Scale Longitudinal Study on CI Test Execution and Failure56
Mole: Efficient Crash Reproduction in Android Applications With Enforcing Necessary UI Events56
Detecting Malicious Packages in PyPI and NPM by Clustering Installation Scripts55
PerfJIT: Test-Level Just-in-Time Prediction for Performance Regression Introducing Commits55
An Empirical Study of Software Refactorings in Real-World Open-Source Java Projects55
Efficient State Identification for Finite State Machine-Based Testing54
Automated Code Editing With Search-Generate-Modify53
δ-SCALPEL: Docker Image Slimming Based on Source Code Static Analysis53
Systematic Evaluation and Usability Analysis of Formal Methods Tools for Railway Signaling System Design52
A Systematic Review of IoT Systems Testing: Objectives, Approaches, Tools, and Challenges52
Trace Diagnostics for Signal-Based Temporal Properties51
Measuring the Fidelity of a Physical and a Digital Twin Using Trace Alignments51
MASTER: Multi-Source Transfer Weighted Ensemble Learning for Multiple Sources Cross-Project Defect Prediction51
Robust Test Selection for Deep Neural Networks50
An Empirical Study of Refactoring Rhythms and Tactics in the Software Development Process49
A Theory of Pending Schemas in Combinatorial Testing48
Boosting Compiler Fault Localization: Getting the Best of Both Worlds by Fusing Dynamic and Historical Data47
P-NPR: Practical Neural Program Repair via Learning to Ensemble46
GenMorph: Automatically Generating Metamorphic Relations via Genetic Programming45
Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis45
Multi-Objective Software Defect Prediction via Multi-Source Uncertain Information Fusion and Multi-Task Multi-View Learning45
A Faceted Taxonomy of Requirements Changes in Agile Contexts44
Annotative Software Product Line Analysis Using Variability-Aware Datalog43
Program Synthesis for Cyber-Resilience43
Discovering Reusable Functional Features in Legacy Object-Oriented Systems43
Evaluating and Improving GPT-Based Expansion of Abbreviations42
Legion: Massively Composing Rankers for Improved Bug Localization at Adobe42
Human-in-the-Loop Automatic Program Repair42
MBL-CPDP: A Multi-Objective Bilevel Method for Cross-Project Defect Prediction41
An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples41
Evolutionary generation of test suites for multi-path coverage of MPI programs with non-determinism41
An Experience Report on Producing Verifiable Builds for Large-Scale Commercial Systems41
TransformCode: A Contrastive Learning Framework for Code Embedding via Subtree Transformation41
AC2Next: A Novel Model That Can Predict the Next Animation API by Fusing the Animation API Context and the UI Animation Task40
Generalized Coverage Criteria for Combinatorial Sequence Testing40
An Empirical Study of Parameter-Efficient Fine-Tuning in Code Change Learning and Beyond40
Context-Aware Personalized Crowdtesting Task Recommendation40
API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification39
Weighted Community Division for Automated Software Architecture Refactoring39
Pull Request Decisions Explained: An Empirical Overview39
Formal Equivalence Checking for Mobile Malware Detection and Family Classification39
Leveraging Large Language Model for Automatic Patch Correctness Assessment39
Decision Support for Selecting Blockchain-Based Application Design Patterns With Layered Taxonomy and Quality Attributes38
Triple Peak Day: Work Rhythms of Software Developers in Hybrid Work38
EpiTESTER: Testing Autonomous Vehicles With Epigenetic Algorithm and Attention Mechanism38
LLMorpheus: Mutation Testing Using Large Language Models38
How Should Software Engineering Secondary Studies Include Grey Material?37
On the Understandability of MLOps System Architectures37
Can Clean New Code Reduce Technical Debt Density?37
Pathidea: Improving Information Retrieval-Based Bug Localization by Re-Constructing Execution Paths Using Logs37
Specializing Neural Networks for Cryptographic Code Completion Applications36
From Tea Leaves to System Maps: A Survey and Framework on Context-Aware Machine Learning Monitoring36
Microservice Extraction Based on a Comprehensive Evaluation of Logical Independence and Performance35
DiffGAN: A Test Generation Approach for Differential Testing of Deep Neural Networks for Image Analysis35
Typestate-Based Fault Localization of API Usage Violations in a Deep Learning Program35
Retrieval-Augmented Fine-Tuning for Improving Retrieve-and-Edit Based Assertion Generation34
What Drives and Sustains Self-Assignment in Agile Teams34
Test Flakiness Across Programming Languages34
When Voice Meets Touch: Conflict Analysis in Mobile Applications34
“Estimating Software Project Effort Using Analogies”: Reflections After 28 Years34
Automated Refactoring of Non-Idiomatic Python Code With Pythonic Idioms34
Experimental Evaluation of Test-Driven Development With Interns Working on a Real Industrial Project33
Continuously Managing NFRs: Opportunities and Challenges in Practice33
SigRec: Automatic Recovery of Function Signatures in Smart Contracts33
Exploring and Analyzing Software Architecture Refactoring in Practice33
Revisiting Test Impact Analysis in Continuous Testing From the Perspective of Code Dependencies32
Increasing the Confidence of Deep Neural Networks by Coverage Analysis32
Evaluating and Improving Unified Debugging32
Self-Admitted GenAI Usage in Open-Source Software32
Just-In-Time Obsolete Comment Detection and Update32
A Study About the Knowledge and Use of Requirements Engineering Standards in Industry32
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks32
Automated Commit Message Generation With Large Language Models: An Empirical Study and Beyond31
Nighthawk: Fully Automated Localizing UI Display Issues via Visual Understanding31
Data Quality Matters: A Case Study on Data Label Correctness for Security Bug Report Prediction31
Cost-Effective Adversarial Attacks Against Code LLM With Model Attention31
Beyond Functional Correctness: Exploring Hallucinations in LLM-Generated Code31
Mind the Gap! A Study on the Transferability of Virtual Versus Physical-World Testing of Autonomous Driving Systems30
How Do Developers Structure Unit Test Cases? An Empirical Analysis of the AAA Pattern in Open Source Projects30
Empirical Validation of Automated Vulnerability Curation and Characterization30
DAppSCAN: Building Large-Scale Datasets for Smart Contract Weaknesses in DApp Projects30
Detecting Continuous Integration Skip Commits Using Multi-Objective Evolutionary Search30
Improving Cross-Language Code Clone Detection via Code Representation Learning and Graph Neural Networks29
Practitioners’ Expectations on Log Anomaly Detection29
Towards Exploring Developers’ Struggles in Developing Upgradeable Smart Contracts29
The Analysis of Safety Critical Software Systems29
Reaching Software Quality for Bioinformatics Applications: How Far Are We?28
Understanding the Robustness of Transformer-Based Code Intelligence via Code Transformation: Challenges and Opportunities28
From Executable Specifications to Hard-to-Specify Requirements: Challenges in Describing Reactive System Behavior28
Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing28
A Systematic Study on Real-World Android App Bundles27
FlakyFix: Using Large Language Models for Predicting Flaky Test Fix Categories and Test Code Repair27
Are You Still Working on This? An Empirical Study on Pull Request Abandonment27
Predictive Comment Updating With Heuristics and AST-Path-Based Neural Learning: A Two-Phase Approach27
STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews26
The Impact of Prompt Programming on Function-Level Code Generation26
Causality-Aware Safety Testing for Autonomous Driving Systems26
Large-Scale Empirical Analysis of Continuous Fuzzing: Insights from 1 Million Fuzzing Sessions26
CRPWarner: Warning the Risk of Contract-Related Rug Pull in DeFi Smart Contracts25
Deconstructing the Nature of Collaboration in Organizations Open Source Software Development: The Impact of Developer and Task Characteristics25
Assessing Evaluation Metrics for Neural Test Oracle Generation25
Cross-Language Taint Analysis: Generating Caller-Sensitive Native Code Specification for Java25
Effect of Requirements Analyst Experience on Elicitation Effectiveness: A Family of Quasi-Experiments25
Line-Level Defect Prediction by Capturing Code Contexts With Graph Convolutional Networks24
A Variability Fault Localization Approach for Software Product Lines24
On the Validity of Pre-Trained Transformers for Natural Language Processing in the Software Engineering Domain24
Misactivation-Aware Stealthy Backdoor Attacks on Neural Code Understanding Models24
NumScout: Unveiling Numerical Defects in Smart Contracts Using LLM-Pruning Symbolic Execution24
Predicting Defective Lines Using a Model-Agnostic Technique24
Diversity-Oriented Testing for Competitive Game Agent via Constraint-Guided Adversarial Agent Training24
Causes and Canonicalization of Unreproducible Builds in Java23
Subgraph-Oriented Testing for Deep Learning Libraries23
Stakeholder Preference Extraction From Scenarios23
The Power of Small LLMs: A Multi-Agent for Code Generation via Dynamic Precaution Tuning23
iTCRL: Causal-Intervention-Based Trace Contrastive Representation Learning for Microservice Systems23
Domain-Driven Design for Microservices: An Evidence-Based Investigation23
Parameterized Verification of Leader/Follower Systems via Arithmetic Constraints23
Unearthing Gas-Wasting Code Smells in Smart Contracts With Large Language Models23
Automated Use-After-Free Detection and Exploit Mitigation: How Far Have We Gone?23
Mithra: Anomaly Detection as an Oracle for Cyberphysical Systems22
A Grounded Theory of Cross-Community SECOs: Feedback Diversity Versus Synchronization22
ArchHypo: Managing Software Architecture Uncertainty Using Hypotheses Engineering22
A Comparison of Natural Language Understanding Platforms for Chatbots in Software Engineering22
Beyond the Sum of Parts: Leveraging Entanglement for Bug Inducing Commit Localization22
SmartOracle: Generating Smart Contract Oracle via Fine-Grained Invariant Detection22
FCGHunter: Towards Evaluating Robustness of Graph-Based Android Malware Detection22
Range Specification Bug Detection in Flight Control System Through Fuzzing22
Towards Robust Detection for Malicious Injection Variants22
Do Pretrained Language Models Indeed Understand Software Engineering Tasks?22
Forecasting the Principal of Code Technical Debt in JavaScript Applications22
Beyond Literal Meaning: Uncover and Explain Implicit Knowledge in Code Through Wikipedia-Based Concept Linking22
DyCITO+: Scalable Deep Reinforcement Learning for Generating Class Integration Test Orders of Java Programs22
Hashing Fuzzing: Introducing Input Diversity to Improve Crash Detection22
Automated Infrastructure as Code Program Testing21
Practical Mutation Testing at Scale: A view from Google21
Does Treatment Adherence Impact Experiment Results in TDD?21
Retrospective on: Constraint-Based Automatic Test Data Generation21
Syntactic Versus Semantic Similarity of Artificial and Real Faults in Mutation Testing Studies21
CodeS+: Towards Assessing the Generalization Ability of Code Models Under Distribution Shift21
How Templated Requirements Specifications Inhibit Creativity in Software Engineering21
Boosting Generalizable Fairness With Mahalanobis Distances Guided Boltzmann Exploratory Testing21
Let’s Talk With Developers, Not About Developers: A Review of Automatic Program Repair Research21
A Survey on the Use of Computer Vision to Improve Software Engineering Tasks21
PopArt: Ranked Testing Efficiency21
PATEN: Identifying Unpatched Third-Party APIs via Fine-Grained Patch-Enhanced AST-Level Signature20
Clopper-Pearson Algorithms for Efficient Statistical Model Checking Estimation20
Engineering Within Boundaries When Software Has None20
Do Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-Tail Software Through Feature Inference20
Translating to a Low-Resource Language with Compiler Feedback: A Case Study on Cangjie20
Evaluating SZZ Implementations: An Empirical Study on the Linux Kernel20
A Little Help Goes a Long Way: Tutoring LLMs in Solving Competitive Programming Through Hints20
Concretization of Abstract Traffic Scene Specifications Using Metaheuristic Search20
Studying the Influence and Distribution of the Human Effort in a Hybrid Fitness Function for Search-Based Model-Driven Engineering20
Emerging App Issue Identification via Online Joint Sentiment-Topic Tracing20
Runtime Evolution of Bitcoin's Consensus Rules20
Accelerating Finite State Machine-Based Testing Using Reinforcement Learning20
The “Question Neighbourhood” Approach for Systematic Evaluation of Code-Generating LLMs20
Bridging Bug Localization and Issue Fixing: A Hierarchical Localization Framework Leveraging Large Language Models19
Generating Structurally Realistic Models With Deep Autoregressive Networks19
The Human Side of Software Engineering Teams: An Investigation of Contemporary Challenges19
Learning to Predict User-Defined Types19
Multitask-Based Evaluation of Open-Source LLM on Software Vulnerability19
Dealing With Data Challenges When Delivering Data-Intensive Software Solutions19
SCAnoGenerator: Automatic Anomaly Injection for Ethereum Smart Contracts19
Stealthy Backdoor Attack for Code Models19
Towards More Precise Coincidental Correctness Detection With Deep Semantic Learning19
Active Code Learning: Benchmarking Sample-Efficient Training of Code Models19
Verification of Fuzzy Decision Trees18
Darcy: Automatic Architectural Inconsistency Resolution in Java18
An Assessment of Rules of Thumb for Software Phase Management, and the Relationship Between Phase Effort and Schedule Success18
Investigating the Feasibility of Conducting Webcam-Based Eye-Tracking Studies in Code Comprehension18
How Software Developers Mitigate Their Errors When Developing Code18
A Retrospective of Proving the Correctness of Multiprocess Programs18
Finding Trends in Software Research18
A Search-Based Testing Approach for Deep Reinforcement Learning Agents18
RNN-Test: Towards Adversarial Testing for Recurrent Neural Network Systems18
Malo in the Code Jungle: Explainable Fault Localization for Decentralized Applications18
Software Testing With Large Language Models: Survey, Landscape, and Vision18
Examiner-Pro: Testing Arm Emulators Across Different Privileges18
MultiPL-E: A Scalable and Polyglot Approach to Benchmarking Neural Code Generation18
Fast and Precise Static Null Exception Analysis With Synergistic Preprocessing18
FlexFL: Flexible and Effective Fault Localization With Open-Source Large Language Models18
AddressWatcher: Sanitizer-Based Localization of Memory Leak Fixes17
Active Learning of Discriminative Subgraph Patterns for API Misuse Detection17
Isolating Compiler Faults Through Differentiated Compilation Configurations17
How Toxic Can You Get? Search-Based Toxicity Testing for Large Language Models17
A Procedure to Continuously Evaluate Predictive Performance of Just-In-Time Software Defect Prediction Models During Software Development17
Enforcing Correctness of Collaborative Business Processes Using Plans17
On the Workflows and Smells of Leaderboard Operations (LBOps): An Exploratory Study of Foundation Model Leaderboards17
DaNuoYi: Evolutionary Multitask Injection Testing on Web Application Firewalls17
Factors Affecting On-Time Delivery in Large-Scale Agile Software Development17
Comparing Block-Based Programming Models for Two-Armed Robots17
A Framework for Emotion-Oriented Requirements Change Handling in Agile Software Engineering17
Static Profiling of Alloy Models17
Neural Transfer Learning for Repairing Security Vulnerabilities in C Code17
OpCodeBERT: A Method for Python Code Representation Learning by BERT With Opcode16
Let's Go to the Whiteboard (Again): Perceptions From Software Architects on Whiteboard Architecture Meetings16
State of the Journal16
Consistent Local-First Software: Enforcing Safety and Invariants for Local-First Applications16
Robotic Visual GUI Testing for Truly Non-Intrusive Test Automation of Touch Screen Applications16
Using Symbolic States to Infer Numerical Invariants16
A Retrospective on Mining Version Histories to Guide Software Changes16
A Systematical Study on Application Performance Management Libraries for Apps16
Retrospective: Data Mining Static Code Attributes to Learn Defect Predictors16
Obstacle Analysis in Requirements Engineering: Retrospective and Emerging Challenges16
PackHunter: Recovering Missing Packages for C/C++ Projects16
Vercation: Precise Vulnerable Open-Source Software Version Identification Based on Static Analysis and LLM16
Safety and Performance, Why Not Both? Bi-Objective Optimized Model Compression Against Heterogeneous Attacks Toward AI Software Deployment16
Distilling Quality Enhancing Comments From Code Reviews to Underpin Reviewer Recommendation16
0.24811911582947