IEEE Transactions on Software Engineering

Papers
(The TQCC of IEEE Transactions on Software Engineering is 13. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
ContractCheck: Checking Ethereum Smart Contracts in Fine-Grained Level435
Making Sense of AI Systems Development427
Dealing with Non-Functional Requirements in Model-Driven Development: A Survey283
Towards Security Threats of Deep Learning Systems: A Survey259
Recommending API Function Calls and Code Snippets to Support Software Development125
ChatGPT vs SBST: A Comparative Assessment of Unit Test Suite Generation106
Software Engineering Research Trends 1994–2024: Stepping Beyond the Lamppost91
The Effect of Feature Characteristics on the Performance of Feature Location Techniques85
An Automated Approach to Discovering Software Refactorings by Comparing Successive Versions84
PATEN: Identifying Unpatched Third-Party APIs via Fine-grained Patch-enhanced AST-level Signature82
Function Call Graph Context Encoding for Neural Source Code Summarization81
Evaluating Spectrum-based Fault Localization on Deep Learning Libraries81
Revisiting Abstractions for Software Architecture and Tools to Support Them78
Does Treatment Adherence Impact Experiment Results in TDD?75
A Context-Aware Clustering Approach for Assisting Operators in Classifying Security Alerts74
On the Influence of Data Resampling for Deep Learning-Based Log Anomaly Detection: Insights and Recommendations72
A Holistic Approach to Design Understanding Through Concept Explanation70
Do Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-Tail Software Through Feature Inference70
Comments on "Using k-core Decomposition on Class Dependency Networks to Improve Bug Prediction Model's Practical Performance"68
50 Years of Transactions on Software Engineering67
Towards More Precise Coincidental Correctness Detection With Deep Semantic Learning66
Why Do Software Developers Use Static Analysis Tools? A User-Centered Study of Developer Needs and Motivations62
Compositional Analysis of Hierarchical UML Statecharts60
Redundancy, Context, and Preference: An Empirical Study of Duplicate Pull Requests in OSS Projects60
Towards Efficient Fine-Tuning of Language Models With Organizational Data for Automated Software Review58
SQLPsdem: A Proxy-Based Mechanism Towards Detecting, Locating and Preventing Second-Order SQL Injections57
To Do or Not to Do: Semantics and Patterns for Do Activities in UML PSSM State Machines55
Mitigating the Uncertainty and Imprecision of Log-Based Code Coverage Without Requiring Additional Logging Statements53
FairBalance: How to Achieve Equalized Odds With Data Pre-Processing53
Evaluating SZZ Implementations: An Empirical Study on the Linux Kernel53
Pearl: A Multi-Derivation Approach to Efficient CFL-Reachability Solving52
Predicting the First Response Latency of Maintainers and Contributors in Pull Requests52
The Effects of Computational Resources on Flaky Tests52
SCAnoGenerator: Automatic Anomaly Injection for Ethereum Smart Contracts51
Qualitative Surveys in Software Engineering Research: Definition, Critical Review, and Guidelines51
A Controlled Experiment in Age and Gender Bias When Reading Technical Articles in Software Engineering51
Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App50
A Comprehensive Study on Static Application Security Testing (SAST) Tools for Android50
Multitask-Based Evaluation of Open-Source LLM on Software Vulnerability49
Clopper-Pearson Algorithms for Efficient Statistical Model Checking Estimation47
Testing Self-Adaptive Software With Probabilistic Guarantees on Performance Metrics: Extended and Comparative Results46
Automatic Fairness Testing of Neural Classifiers Through Adversarial Sampling45
Broken External Links on Stack Overflow44
Combining Genetic Programming and Model Checking to Generate Environment Assumptions44
Modeling Functional Similarity in Source Code With Graph-Based Siamese Networks43
Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review42
Leveraging Structure in Software Merge: An Empirical Study41
AI-Enabled Automation for Completeness Checking of Privacy Policies41
Building Maintainable Software Using Abstraction Layering41
Capabilities and Practices in DevOps: A Multivocal Literature Review40
Selecting Context-Sensitivity Modularly for Accelerating Object-Sensitive Pointer Analysis40
The Human Side of Software Engineering Teams: An Investigation of Contemporary Challenges40
Enhancing Mobile App Bug Reporting via Real-Time Understanding of Reproduction Steps39
VID2XML: Automatic Extraction of a Complete XML Data From Mobile Programming Screencasts39
Towards Scalable Model Checking of Reflective Systems via Labeled Transition Systems39
Learning to Predict User-Defined Types38
Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews38
DSSDPP: Data Selection and Sampling Based Domain Programming Predictor for Cross-Project Defect Prediction38
SCS-Gan: Learning Functionality-Agnostic Stylometric Representations for Source Code Authorship Verification38
PopArt: Ranked Testing Efficiency37
Supporting Developers in Addressing Human-Centric Issues in Mobile Apps37
From Inheritance to Mockito: An Automatic Refactoring Approach37
A Comprehensive Investigation of the Impact of Class Overlap on Software Defect Prediction37
Managing Technical Debt Using Intelligent Techniques - A Systematic Mapping Study37
BEQAIN: An Effective and Efficient Identifier Normalization Approach With BERT and the Question Answering System36
Generating Structurally Realistic Models With Deep Autoregressive Networks36
Verification of Fuzzy Decision Trees36
Black-Box Testing of Deep Neural Networks through Test Case Diversity35
JavaScript Dead Code Identification, Elimination, and Empirical Assessment35
Mission Specification Patterns for Mobile Robots: Providing Support for Quantitative Properties35
Plumber: Boosting the Propagation of Vulnerability Fixes in the npm Ecosystem35
Runtime Evolution of Bitcoin's Consensus Rules34
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem34
Task-Oriented ML/DL Library Recommendation Based on a Knowledge Graph34
scenoRITA: Generating Diverse, Fully Mutable, Test Scenarios for Autonomous Vehicle Planning33
Are Your Dependencies Code Reviewed?: Measuring Code Review Coverage in Dependency Updates33
Studying the Influence and Distribution of the Human Effort in a Hybrid Fitness Function for Search-Based Model-Driven Engineering33
Identifying the Hazard Boundary of ML-Enabled Autonomous Systems Using Cooperative Coevolutionary Search33
Concretization of Abstract Traffic Scene Specifications Using Metaheuristic Search32
The Why, When, What, and How About Predictive Continuous Integration: A Simulation-Based Investigation32
Confirmation Bias and Time Pressure: A Family of Experiments in Software Testing32
Prevent: An Unsupervised Approach to Predict Software Failures in Production32
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks32
FeatRacer: Locating Features Through Assisted Traceability32
Accelerating Finite State Machine-Based Testing Using Reinforcement Learning31
Answering Uncertain, Under-Specified API Queries Assisted by Knowledge-Aware Human-AI Dialogue31
Active Code Learning: Benchmarking Sample-Efficient Training of Code Models31
Neural Density Estimation of Response Times in Layered Software Systems31
Factoring Expertise, Workload, and Turnover Into Code Review Recommendation31
Automatic Debugging of Design Faults in MapReduce Applications31
Accelerating Patch Validation for Program Repair With Interception-Based Execution Scheduling31
Grammar Based Directed Testing of Machine Learning Systems30
Enabling Mutant Generation for Open- and Closed-Source Android Apps30
An Empirical Study of Dependency Downgrades in the npm Ecosystem30
Comparative Analysis of Constraint Handling Techniques for Constrained Combinatorial Testing30
Review Dynamics and Their Impact on Software Quality30
TkT: Automatic Inference of Timed and Extended Pushdown Automata29
Contextual Documentation Referencing on Stack Overflow29
ConEx: Efficient Exploration of Big-Data System Configurations for Better Performance29
Clustering Crowdsourced Test Reports of Mobile Applications Using Image Understanding28
What Leads to a Confirmatory or Disconfirmatory Behavior of Software Testers?28
Orderly Generation of Test Data via Sorting Mutant Branches Based on Their Dominance Degrees for Weak Mutation Testing28
Conditional Quantitative Program Analysis28
Effects of Mindfulness on Conceptual Modeling Performance: A Series of Experiments28
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups27
Theoretical and Empirical Analyses of the Effectiveness of Metamorphic Relation Composition27
Reuse of Similarly Behaving Software Through Polymorphism-Inspired Variability Mechanisms27
Restore: Retrospective Fault Localization Enhancing Automated Program Repair27
Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies26
SQAPlanner: Generating Data-Informed Software Quality Improvement Plans26
The Impact of Code Review on Architectural Changes26
Learning From Mistakes: Machine Learning Enhanced Human Expert Effort Estimates26
Mining Similar Methods for Test Adaptation26
Adaptive Test Case Allocation, Selection and Generation Using Coverage Spectrum and Operational Profile26
Requirements Framing Affects Design Creativity26
How do Practitioners Perceive the Relevance of Requirements Engineering Research?26
In Search of Socio-Technical Congruence: A Large-Scale Longitudinal Study26
Reusing Solutions Modulo Theories26
Enhancing Trustability of Android Applications via User-Centric Flexible Permissions25
Code Reviews With Divergent Review Scores: An Empirical Study of the OpenStack and Qt Communities25
FutureWare: Designing a Middleware for Anticipatory Mobile Computing25
Metamorphic Robustness Testing: Exposing Hidden Defects in Citation Statistics and Journal Impact Factors25
Easy-to-Deploy API Extraction by Multi-Level Feature Embedding and Transfer Learning25
Architecture Anti-Patterns: Automatically Detectable Violations of Design Principles25
A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison25
Semantic Learning and Emulation Based Cross-Platform Binary Vulnerability Seeker25
Completeness and Consistency of Tabular Requirements: An SMT-Based Verification Approach24
Real World Scrum A Grounded Theory of Variations in Practice24
A Study of Bug Resolution Characteristics in Popular Programming Languages24
Detecting Compiler Error Recovery Defects via Program Mutation Exploration24
Accuracy Can Lie: On the Impact of Surrogate Model in Configuration Tuning24
Multi-Granularity Detector for Vulnerability Fixes24
Automated co-evolution of metamodels and code24
Isolating Compiler Bugs by Generating Effective Witness Programs With Large Language Models24
Better Data Labelling With EMBLEM (and how that Impacts Defect Prediction)24
Improved Management of Issue Dependencies in Issue Trackers of Large Collaborative Projects23
XPro: A Model to Explain the Limited Adoption and Implementation of Experimentation in Software Startups23
Socio-Technical Grounded Theory for Software Engineering23
A Large Scale Study of Long-Time Contributor Prediction for GitHub Projects23
Engineering Within Boundaries When Software Has None23
A Declarative Metamorphic Testing Framework for Autonomous Driving23
Pull Request Governance in Open Source Communities23
NLP-Based Automated Compliance Checking of Data Processing Agreements Against GDPR22
Stealthy Backdoor Attack for Code Models22
A Retrospective on Whole Test Suite Generation: On the Role of SBST in the Age of LLMs22
Software Testing With Large Language Models: Survey, Landscape, and Vision22
Dealing With Data Challenges When Delivering Data-Intensive Software Solutions22
Emerging App Issue Identification via Online Joint Sentiment-Topic Tracing22
Program Slicing: A Brief Retrospective22
Retrospective on: Constraint-Based Automatic Test Data Generation22
ARTE: Automated Generation of Realistic Test Inputs for Web APIs22
Machine Learning Testing: Survey, Landscapes and Horizons22
Influence of the 1990 IEEE TSE Paper “Automated Software Test Data Generation” on Software Engineering22
Comparing Methods for Large-Scale Agile Software Development: A Systematic Literature Review21
Factors Affecting On-Time Delivery in Large-Scale Agile Software Development21
Defining Smart Contract Defects on Ethereum21
ErrHunter: Detecting Error-Handling Bugs in the Linux Kernel Through Systematic Static Analysis21
Automated Expansion of Abbreviations Based on Semantic Relation and Transfer Expansion21
A Systematic Literature Review of Anti-Discrimination Design Strategies in the Digital Sharing Economy20
Understanding How and Why Developers Seek and Analyze API-Related Opinions20
RNN-Test: Towards Adversarial Testing for Recurrent Neural Network Systems20
Bringing Open Source Communication and Development Together: A Cross-Platform Study on Gitter and GitHub20
Coverage Goal Selector for Combining Multiple Criteria in Search-Based Unit Test Generation20
2023 Reviewers List20
D3: Differential Testing of Distributed Deep Learning With Model Generation20
Specification Patterns for Robotic Missions20
Neural Transfer Learning for Repairing Security Vulnerabilities in C Code20
A Machine Learning Approach to Improve the Detection of CI Skip Commits19
On the Workflows and Smells of Leaderboard Operations (LBOps): An Exploratory Study of Foundation Model Leaderboards19
A Systematic Review of IoT Systems Testing: Objectives, Approaches, Tools, and Challenges19
Enabling Good Work Habits in Software Developers through Reflective Goal-Setting19
An Empirical Study on Correlations Between Deep Neural Network Fairness and Neuron Coverage Criteria19
MultiPL-E: A Scalable and Polyglot Approach to Benchmarking Neural Code Generation19
Measuring the Fidelity of a Physical and a Digital Twin Using Trace Alignments19
Automatic Generation of Acceptance Test Cases From Use Case Specifications: An NLP-Based Approach19
A Retrospective of ChangeDistiller: Tree Differencing for Fine-Grained Source Code Change Extraction18
Characterizing Timeout Builds in Continuous Integration18
Reflections of a Former Editor-in-Chief of TSE18
FlexFL: Flexible and Effective Fault Localization with Open-Source Large Language Models18
Object-Oriented Development, Revisited18
A Retrospective of Proving the Correctness of Multiprocess Programs18
The Mutation and Injection Framework: Evaluating Clone Detection Tools with Mutation Analysis18
Looking Back on Recovery Blocks and Conversations18
Simplifying and Isolating Failure-Inducing Input: A Retrospective on Delta Debugging18
Evolution of the Unix System Architecture: An Exploratory Case Study17
A Cost-Efficient Auto-Scaling Algorithm for Large-Scale Graph Processing in Cloud Environments with Heterogeneous Resources17
An Empirical Validation of Oracle Improvement17
Evolving JavaScript Code to Reduce Load Time17
Recommending Participants for Collaborative Merge Sessions17
Lightweight Assessment of Test-Case Effectiveness Using Source-Code-Quality Indicators17
Automatic Detection, Validation, and Repair of Race Conditions in Interrupt-Driven Embedded Software16
A Framework for Emotion-Oriented Requirements Change Handling in Agile Software Engineering16
Metamorphic Testing for Web System Security16
DeLag: Using Multi-Objective Optimization to Enhance the Detection of Latency Degradation Patterns in Service-Based Systems16
IntRepair: Informed Repairing of Integer Overflows16
Using Docker to Assist Q&A Forum Users16
GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search16
Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem16
A Search-Based Testing Approach for Deep Reinforcement Learning Agents16
Self-Supervised Learning to Prove Equivalence Between Straight-Line Programs via Rewrite Rules16
Reading Answers on Stack Overflow: Not Enough!16
Testing with Fewer Resources: An Adaptive Approach to Performance-Aware Test Case Generation16
Trace Diagnostics for Signal-Based Temporal Properties16
CoSS: leveraging statement semantics for code summarization16
Designing, Modeling and Analysis of GALS Software Systems16
A Software Requirements Ecosystem: Linking Forum, Issue Tracker, and FAQs for Requirements Management16
Integrating Provenance Capture and UML With UML2PROV: Principles and Experience16
K-ST: A Formal Executable Semantics of the Structured Text Language for PLCs15
Mitigating False Positive Static Analysis Warnings: Progress, Challenges, and Opportunities15
Identifying Similar Test Cases That Are Specified in Natural Language15
Dynamic Human-in-the-Loop Assertion Generation15
UMLsecRT: Reactive Security Monitoring of Java Applications With Round-Trip Engineering15
Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters15
Cross-Instance Regulatory Compliance Checking of Business Process Event Logs15
Augmenting Diffs With Runtime Information15
What Petri Nets Oblige us to Say Comparing Approaches for Behavior Composition15
Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection15
DexBERT: Effective, Task-Agnostic and Fine-Grained Representation Learning of Android Bytecode15
The Duality in Computing SSA Programs and Control Dependency15
T-Evos: A Large-Scale Longitudinal Study on CI Test Execution and Failure15
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning15
GenMorph: Automatically Generating Metamorphic Relations via Genetic Programming14
A Theory of Value for Value-Based Feature Selection in Software Engineering14
Heuristic and Neural Network Based Prediction of Project-Specific API Member Access14
Finding Trends in Software Research14
Gender Differences in Personality Traits of Software Engineers14
The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers14
Multi-Objective Software Defect Prediction via Multi-Source Uncertain Information Fusion and Multi-Task Multi-View Learning14
Mutation Testing in Practice: Insights From Open-Source Software Developers14
Pegasus: Performance Engineering for Software Applications Targeting HPC Systems14
PackerGrind: An Adaptive Unpacking System for Android Apps14
Empowering the Human as the Fitness Function in Search-Based Model-Driven Engineering13
CTOS: Compiler Testing for Optimization Sequences of LLVM13
How Software Developers Mitigate Their Errors When Developing Code13
Code Review Knowledge Perception: Fusing Multi-Features for Salient-Class Location13
Erratum to “Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search With Emulation”13
Emotions and Perceived Productivity of Software Developers at the Workplace13
Exploring the Use of Chatrooms by Developers: An Empirical Study on Slack and Gitter13
A Deep Dive into the Impact of COVID-19 on Software Development13
Enhancement of Mutation Testing via Fuzzy Clustering and Multi-Population Genetic Algorithm13
Utilizing Automatic Query Reformulations as Genetic Operations to Improve Feature Location in Software Models13
Active Learning of Discriminative Subgraph Patterns for API Misuse Detection13
Enhancing Dynamic Symbolic Execution by Automatically Learning Search Heuristics13
Colosseum: Regression Test Prioritization by Delta Displacement in Test Coverage13
Verification and Synthesis of Responsive Symmetric Uni-Rings13
A Wizard of Oz Study Simulating API Usage Dialogues With a Virtual Assistant13
Integrating an Ensemble Surrogate Model’s Estimation into Test Data Generation13
PerfJIT: Test-Level Just-in-Time Prediction for Performance Regression Introducing Commits13
Assisting Example-Based API Misuse Detection via Complementary Artificial Examples13
A Theory of Pending Schemas in Combinatorial Testing13
0.24867105484009