IEEE Transactions on Software Engineering

Papers
(The median citation count of IEEE Transactions on Software Engineering is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-07-01 to 2025-07-01.)
ArticleCitations
Combining Genetic Programming and Model Checking to Generate Environment Assumptions466
Towards Scalable Model Checking of Reflective Systems via Labeled Transition Systems461
50 Years of Transactions on Software Engineering347
Confirmation Bias and Time Pressure: A Family of Experiments in Software Testing290
To Do or Not to Do: Semantics and Patterns for Do Activities in UML PSSM State Machines147
Multi-Granularity Detector for Vulnerability Fixes141
A Retrospective on Whole Test Suite Generation: On the Role of SBST in the Age of LLMs123
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem123
Influence of the 1990 IEEE TSE Paper “Automated Software Test Data Generation” on Software Engineering100
Are Your Dependencies Code Reviewed?: Measuring Code Review Coverage in Dependency Updates97
The Why, When, What, and How About Predictive Continuous Integration: A Simulation-Based Investigation93
Socio-Technical Grounded Theory for Software Engineering91
Mission Specification Patterns for Mobile Robots: Providing Support for Quantitative Properties89
Grammar Based Directed Testing of Machine Learning Systems87
What Leads to a Confirmatory or Disconfirmatory Behavior of Software Testers?86
Review Dynamics and Their Impact on Software Quality84
Prevent: An Unsupervised Approach to Predict Software Failures in Production79
Theoretical and Empirical Analyses of the Effectiveness of Metamorphic Relation Composition78
Automatic Fairness Testing of Neural Classifiers Through Adversarial Sampling76
Enhancing Mobile App Bug Reporting via Real-Time Understanding of Reproduction Steps75
A Declarative Metamorphic Testing Framework for Autonomous Driving71
Recommending API Function Calls and Code Snippets to Support Software Development68
DSSDPP: Data Selection and Sampling Based Domain Programming Predictor for Cross-Project Defect Prediction66
Question Selection for Multimodal Code Search Synthesis Using Probabilistic Version Spaces65
Answering Uncertain, Under-Specified API Queries Assisted by Knowledge-Aware Human-AI Dialogue64
Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App63
2023 Reviewers List62
Measuring the Fidelity of a Physical and a Digital Twin Using Trace Alignments61
Systematic Evaluation and Usability Analysis of Formal Methods Tools for Railway Signaling System Design60
Mask–Mediator–Wrapper Architecture as a Data Mesh Driver59
Mole: Efficient Crash Reproduction in Android Applications With Enforcing Necessary UI Events57
Towards a Cognitive Model of Dynamic Debugging: Does Identifier Construction Matter?57
The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers56
A Theory of Pending Schemas in Combinatorial Testing55
Neural Library Recommendation by Embedding Project-Library Knowledge Graph54
T-Evos: A Large-Scale Longitudinal Study on CI Test Execution and Failure53
Trace Diagnostics for Signal-Based Temporal Properties53
Multi-Objective Software Defect Prediction via Multi-Source Uncertain Information Fusion and Multi-Task Multi-View Learning53
A Wizard of Oz Study Simulating API Usage Dialogues With a Virtual Assistant51
Mitigating False Positive Static Analysis Warnings: Progress, Challenges, and Opportunities50
Multimodal Fusion for Android Malware Detection Based on Large Pre-Trained Models50
Testing with Fewer Resources: An Adaptive Approach to Performance-Aware Test Case Generation48
Automated Code Editing With Search-Generate-Modify48
PerfJIT: Test-Level Just-in-Time Prediction for Performance Regression Introducing Commits48
Esale: Enhancing Code-Summary Alignment Learning for Source Code Summarization48
Enabling Good Work Habits in Software Developers through Reflective Goal-Setting47
Robust Test Selection for Deep Neural Networks46
GenMorph: Automatically Generating Metamorphic Relations via Genetic Programming46
Mutation Testing in Practice: Insights From Open-Source Software Developers46
Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis46
An Empirical Study of Refactoring Rhythms and Tactics in the Software Development Process45
MASTER: Multi-Source Transfer Weighted Ensemble Learning for Multiple Sources Cross-Project Defect Prediction44
A Systematic Review of IoT Systems Testing: Objectives, Approaches, Tools, and Challenges44
Improving Vulnerability Inspection Efficiency Using Active Learning44
MBL-CPDP: A Multi-objective Bilevel Method for Cross-Project Defect Prediction43
Program Synthesis for Cyber-Resilience43
API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification43
EpiTESTER: Testing Autonomous Vehicles With Epigenetic Algorithm and Attention Mechanism43
Decision Support for Selecting Blockchain-Based Application Design Patterns With Layered Taxonomy and Quality Attributes43
Human-in-the-Loop Automatic Program Repair42
Generalized Coverage Criteria for Combinatorial Sequence Testing42
Automatic Repair of Timestamp Comparisons42
TransformCode: A Contrastive Learning Framework for Code Embedding via Subtree Transformation42
Evolutionary generation of test suites for multi-path coverage of MPI programs with non-determinism42
Discovering Reusable Functional Features in Legacy Object-Oriented Systems42
Context-Aware Personalized Crowdtesting Task Recommendation42
An Experience Report on Producing Verifiable Builds for Large-Scale Commercial Systems42
A Faceted Taxonomy of Requirements Changes in Agile Contexts41
Metric-Based Fault Prediction for Spreadsheets41
Triple Peak Day: Work Rhythms of Software Developers in Hybrid Work40
Can Clean New Code Reduce Technical Debt Density?39
On the Understandability of MLOps System Architectures39
How Should Software Engineering Secondary Studies Include Grey Material?38
Legion: Massively Composing Rankers for Improved Bug Localization at Adobe38
Pull Request Decisions Explained: An Empirical Overview38
How Developers Choose Names37
Formal Equivalence Checking for Mobile Malware Detection and Family Classification37
An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples37
Annotative Software Product Line Analysis Using Variability-Aware Datalog37
Leveraging Large Language Model for Automatic Patch Correctness Assessment37
CODIT: Code Editing With Tree-Based Neural Models37
LLMorpheus: Mutation Testing Using Large Language Models36
“Estimating Software Project Effort Using Analogies”: Reflections After 28 Years35
Pathidea: Improving Information Retrieval-Based Bug Localization by Re-Constructing Execution Paths Using Logs35
Revisiting Test Impact Analysis in Continuous Testing From the Perspective of Code Dependencies34
What Drives and Sustains Self-Assignment in Agile Teams34
Automated Commit Message Generation With Large Language Models: An Empirical Study and Beyond33
CloudRaid: Detecting Distributed Concurrency Bugs via Log Mining and Enhancement33
A Study of Call Graph Construction for JVM-Hosted Languages33
Specializing Neural Networks for Cryptographic Code Completion Applications33
Quantitative Verification for Monitoring Event-Streaming Systems33
Detecting Continuous Integration Skip Commits Using Multi-Objective Evolutionary Search33
A Study About the Knowledge and Use of Requirements Engineering Standards in Industry33
How Do Developers Structure Unit Test Cases? An Empirical Analysis of the AAA Pattern in Open Source Projects32
Experimental Evaluation of Test-Driven Development With Interns Working on a Real Industrial Project32
Increasing the Confidence of Deep Neural Networks by Coverage Analysis32
Studying Ad Library Integration Strategies of Top Free-to-Download Apps31
Evaluating and Improving Unified Debugging31
Automated Refactoring of Non-Idiomatic Python Code With Pythonic Idioms30
Nighthawk: Fully Automated Localizing UI Display Issues via Visual Understanding30
Retrieval-Augmented Fine-Tuning for Improving Retrieve-and-Edit Based Assertion Generation30
Continuously Managing NFRs: Opportunities and Challenges in Practice30
Test Flakiness Across Programming Languages30
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks30
SigRec: Automatic Recovery of Function Signatures in Smart Contracts30
Mind the Gap! A Study on the Transferability of Virtual Versus Physical-World Testing of Autonomous Driving Systems29
DAppSCAN: Building Large-Scale Datasets for Smart Contract Weaknesses in DApp Projects29
Data Quality Matters: A Case Study on Data Label Correctness for Security Bug Report Prediction29
Microservice Extraction Based on a Comprehensive Evaluation of Logical Independence and Performance29
Watch Out for Extrinsic Bugs! A Case Study of Their Impact in Just-In-Time Bug Prediction Models on the OpenStack Project29
Empirical Validation of Automated Vulnerability Curation and Characterization29
Effect of Requirements Analyst Experience on Elicitation Effectiveness: A Family of Quasi-Experiments28
Just-In-Time Obsolete Comment Detection and Update28
Optimization of Software Release Planning Considering Architectural Dependencies, Cost, and Value28
From Executable Specifications to Hard-to-Specify Requirements: Challenges in Describing Reactive System Behavior28
Understanding the Robustness of Transformer-Based Code Intelligence via Code Transformation: Challenges and Opportunities28
The Analysis of Safety Critical Software Systems28
Exploiting Natural Language Structures in Software Informal Documentation27
A Systematic Study on Real-World Android App Bundles27
An Empirical Study of Model-Agnostic Techniques for Defect Prediction Models27
NumScout: Unveiling Numerical Defects in Smart Contracts Using LLM-Pruning Symbolic Execution27
Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing27
CRPWarner: Warning the Risk of Contract-Related Rug Pull in DeFi Smart Contracts26
Line-Level Defect Prediction by Capturing Code Contexts With Graph Convolutional Networks26
Cross-Language Taint Analysis: Generating Caller-Sensitive Native Code Specification for Java26
FlakyFix: Using Large Language Models for Predicting Flaky Test Fix Categories and Test Code Repair26
Scrutinizing Implementations of Smart Home Integrations26
Are You Still Working on This? An Empirical Study on Pull Request Abandonment26
STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews26
Assessing Evaluation Metrics for Neural Test Oracle Generation26
A Chaos Engineering System for Live Analysis and Falsification of Exception-Handling in the JVM26
ASTRAEA: Grammar-based Fairness Testing26
A Qualitative Study of the Benefits and Costs of Logging From Developers’ Perspectives26
The Effectiveness of Supervised Machine Learning Algorithms in Predicting Software Refactoring26
Efficient Summary Reuse for Software Regression Verification26
Why My App Crashes? Understanding and Benchmarking Framework-Specific Exceptions of Android Apps25
Deconstructing the Nature of Collaboration in Organizations Open Source Software Development: The Impact of Developer and Task Characteristics25
Explaining Static Analysis With Rule Graphs25
Improving Cross-Language Code Clone Detection via Code Representation Learning and Graph Neural Networks25
Predicting Defective Lines Using a Model-Agnostic Technique25
Predictive Comment Updating With Heuristics and AST-Path-Based Neural Learning: A Two-Phase Approach25
On the Validity of Pre-Trained Transformers for Natural Language Processing in the Software Engineering Domain25
Sentinel: A Hyper-Heuristic for the Generation of Mutant Reduction Strategies24
SmartOracle: Generating Smart Contract Oracle via Fine-Grained Invariant Detection24
Diversity-Oriented Testing for Competitive Game Agent via Constraint-Guided Adversarial Agent Training24
iTCRL: Causal-Intervention-Based Trace Contrastive Representation Learning for Microservice Systems24
A Survey on the Use of Computer Vision to Improve Software Engineering Tasks24
Automated Use-After-Free Detection and Exploit Mitigation: How Far Have We Gone?24
Hashing Fuzzing: Introducing Input Diversity to Improve Crash Detection24
A Grounded Theory of Cross-Community SECOs: Feedback Diversity Versus Synchronization24
A Comparison of Natural Language Understanding Platforms for Chatbots in Software Engineering24
A Variability Fault Localization Approach for Software Product Lines23
Automated Infrastructure as Code Program Testing23
Domain-Driven Design for Microservices: An Evidence-Based Investigation23
Beyond Literal Meaning: Uncover and Explain Implicit Knowledge in Code Through Wikipedia-Based Concept Linking23
Range Specification Bug Detection in Flight Control System Through Fuzzing23
Mithra: Anomaly Detection as an Oracle for Cyberphysical Systems23
Parameterized Verification of Leader/Follower Systems via Arithmetic Constraints22
Let’s Talk With Developers, Not About Developers: A Review of Automatic Program Repair Research22
Forecasting the Principal of Code Technical Debt in JavaScript Applications22
Syntactic Versus Semantic Similarity of Artificial and Real Faults in Mutation Testing Studies22
ArchHypo: Managing Software Architecture Uncertainty Using Hypotheses Engineering22
Practical Mutation Testing at Scale: A view from Google22
How Templated Requirements Specifications Inhibit Creativity in Software Engineering22
Unearthing Gas-Wasting Code Smells in Smart Contracts With Large Language Models22
Restore: Retrospective Fault Localization Enhancing Automated Program Repair21
PopArt: Ranked Testing Efficiency21
Do Pretrained Language Models Indeed Understand Software Engineering Tasks?21
Towards More Precise Coincidental Correctness Detection With Deep Semantic Learning21
RefactoringMiner 2.021
Retrospective on: Constraint-Based Automatic Test Data Generation21
Stakeholder Preference Extraction From Scenarios21
Accelerating Finite State Machine-Based Testing Using Reinforcement Learning20
Verification of Fuzzy Decision Trees20
Clopper-Pearson Algorithms for Efficient Statistical Model Checking Estimation20
Reuse of Similarly Behaving Software Through Polymorphism-Inspired Variability Mechanisms20
SCAnoGenerator: Automatic Anomaly Injection for Ethereum Smart Contracts20
Engineering Within Boundaries When Software Has None20
PATEN: Identifying Unpatched Third-Party APIs via Fine-Grained Patch-Enhanced AST-Level Signature20
Studying the Influence and Distribution of the Human Effort in a Hybrid Fitness Function for Search-Based Model-Driven Engineering20
Evaluating SZZ Implementations: An Empirical Study on the Linux Kernel20
Easy-to-Deploy API Extraction by Multi-Level Feature Embedding and Transfer Learning20
Do Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-Tail Software Through Feature Inference20
TkT: Automatic Inference of Timed and Extended Pushdown Automata20
Learning to Predict User-Defined Types19
Does Treatment Adherence Impact Experiment Results in TDD?19
Boosting Generalizable Fairness with Mahalanobis Distances Guided Boltzmann Exploratory Testing19
Enhancing Trustability of Android Applications via User-Centric Flexible Permissions19
Comparative Analysis of Constraint Handling Techniques for Constrained Combinatorial Testing19
Emerging App Issue Identification via Online Joint Sentiment-Topic Tracing19
The Human Side of Software Engineering Teams: An Investigation of Contemporary Challenges19
Multitask-Based Evaluation of Open-Source LLM on Software Vulnerability19
Active Code Learning: Benchmarking Sample-Efficient Training of Code Models18
Software Testing With Large Language Models: Survey, Landscape, and Vision18
Concretization of Abstract Traffic Scene Specifications Using Metaheuristic Search18
Examiner-Pro: Testing Arm Emulators Across Different Privileges18
Utilizing Automatic Query Reformulations as Genetic Operations to Improve Feature Location in Software Models18
Generating Structurally Realistic Models With Deep Autoregressive Networks18
Defining Smart Contract Defects on Ethereum18
Dealing With Data Challenges When Delivering Data-Intensive Software Solutions18
Fast and Precise Static Null Exception Analysis With Synergistic Preprocessing18
How Software Developers Mitigate Their Errors When Developing Code18
Runtime Evolution of Bitcoin's Consensus Rules18
Stealthy Backdoor Attack for Code Models18
Darcy: Automatic Architectural Inconsistency Resolution in Java18
Heuristic and Neural Network Based Prediction of Project-Specific API Member Access18
An Assessment of Rules of Thumb for Software Phase Management, and the Relationship Between Phase Effort and Schedule Success18
AddressWatcher: Sanitizer-Based Localization of Memory Leak Fixes17
A Theory of Value for Value-Based Feature Selection in Software Engineering17
A Procedure to Continuously Evaluate Predictive Performance of Just-In-Time Software Defect Prediction Models During Software Development17
IntRepair: Informed Repairing of Integer Overflows17
Static Profiling of Alloy Models17
A Retrospective of Proving the Correctness of Multiprocess Programs17
On the Workflows and Smells of Leaderboard Operations (LBOps): An Exploratory Study of Foundation Model Leaderboards17
Enforcing Correctness of Collaborative Business Processes Using Plans17
Comparing Block-Based Programming Models for Two-Armed Robots17
DaNuoYi: Evolutionary Multi-Task Injection Testing on Web Application Firewalls17
Malo in the Code Jungle: Explainable Fault Localization for Decentralized Applications16
Reading Answers on Stack Overflow: Not Enough!16
Factors Affecting On-Time Delivery in Large-Scale Agile Software Development16
Active Learning of Discriminative Subgraph Patterns for API Misuse Detection16
A Search-Based Testing Approach for Deep Reinforcement Learning Agents16
FlexFL: Flexible and Effective Fault Localization With Open-Source Large Language Models16
MultiPL-E: A Scalable and Polyglot Approach to Benchmarking Neural Code Generation16
Automatic Generation of Acceptance Test Cases From Use Case Specifications: An NLP-Based Approach16
A Framework for Emotion-Oriented Requirements Change Handling in Agile Software Engineering16
RNN-Test: Towards Adversarial Testing for Recurrent Neural Network Systems16
Isolating Compiler Faults Through Differentiated Compilation Configurations16
Finding Trends in Software Research16
Empirical Assessment of Multimorphic Testing15
Obstacle Analysis in Requirements Engineering: Retrospective and Emerging Challenges15
Software Architecture Description Revisited15
Let's Go to the Whiteboard (Again): Perceptions From Software Architects on Whiteboard Architecture Meetings15
Robotic Visual GUI Testing for Truly Non-Intrusive Test Automation of Touch Screen Applications15
IoTCom: Dissecting Interaction Threats in IoT Systems15
Distilling Quality Enhancing Comments From Code Reviews to Underpin Reviewer Recommendation15
Retrospective: Data Mining Static Code Attributes to Learn Defect Predictors15
PackHunter: Recovering Missing Packages for C/C++ Projects15
What Do Programmers Discuss About Blockchain? A Case Study on the Use of Balanced LDA and the Reference Architecture of a Domain to Capture Online Discussions About Blockchain Platforms Across Stack E15
FairMask: Better Fairness via Model-Based Rebalancing of Protected Attributes15
Stability in Software Engineering: Survey of the State-of-the-Art and Research Directions15
Neural Transfer Learning for Repairing Security Vulnerabilities in C Code15
Using Symbolic States to Infer Numerical Invariants15
A Retrospective on Mining Version Histories to Guide Software Changes15
Consistent Local-First Software: Enforcing Safety and Invariants for Local-First Applications15
TrinityRCL: Multi-Granular and Code-Level Root Cause Localization Using Multiple Types of Telemetry Data in Microservice Systems15
Inferring Bug Signatures to Detect Real Bugs15
Pride: Prioritizing Documentation Effort Based on a PageRank-Like Algorithm and Simple Filtering Rules15
Safety and Performance, Why Not Both? Bi-Objective Optimized Model Compression Against Heterogeneous Attacks Toward AI Software Deployment15
Taming Android Fragmentation through Lightweight Crowdsourced Testing14
0.11343908309937