IEEE Transactions on Software Engineering

Papers
(The TQCC of IEEE Transactions on Software Engineering is 14. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Combining Genetic Programming and Model Checking to Generate Environment Assumptions453
Towards Scalable Model Checking of Reflective Systems via Labeled Transition Systems448
50 Years of Transactions on Software Engineering312
Confirmation Bias and Time Pressure: A Family of Experiments in Software Testing271
Answering Uncertain, Under-Specified API Queries Assisted by Knowledge-Aware Human-AI Dialogue134
Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App115
To Do or Not to Do: Semantics and Patterns for Do Activities in UML PSSM State Machines114
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem97
Multi-Granularity Detector for Vulnerability Fixes96
A Retrospective on Whole Test Suite Generation: On the Role of SBST in the Age of LLMs93
DSSDPP: Data Selection and Sampling Based Domain Programming Predictor for Cross-Project Defect Prediction89
Influence of the 1990 IEEE TSE Paper “Automated Software Test Data Generation” on Software Engineering89
Are Your Dependencies Code Reviewed?: Measuring Code Review Coverage in Dependency Updates85
Enhancing Mobile App Bug Reporting via Real-Time Understanding of Reproduction Steps84
Recommending API Function Calls and Code Snippets to Support Software Development82
Question Selection for Multi-Modal Code Search Synthesis using Probabilistic Version Spaces76
Automatic Fairness Testing of Neural Classifiers Through Adversarial Sampling75
The Why, When, What, and How About Predictive Continuous Integration: A Simulation-Based Investigation75
Grammar Based Directed Testing of Machine Learning Systems73
What Leads to a Confirmatory or Disconfirmatory Behavior of Software Testers?71
Metamorphic Robustness Testing: Exposing Hidden Defects in Citation Statistics and Journal Impact Factors70
A Declarative Metamorphic Testing Framework for Autonomous Driving65
Theoretical and Empirical Analyses of the Effectiveness of Metamorphic Relation Composition65
Mission Specification Patterns for Mobile Robots: Providing Support for Quantitative Properties64
Prevent: An Unsupervised Approach to Predict Software Failures in Production63
Review Dynamics and Their Impact on Software Quality61
Socio-Technical Grounded Theory for Software Engineering60
2023 Reviewers List59
Esale: Enhancing Code-Summary Alignment Learning for Source Code Summarization57
Mutation Testing in Practice: Insights From Open-Source Software Developers56
Systematic Evaluation and Usability Analysis of Formal Methods Tools for Railway Signaling System Design56
An Empirical Study of Refactoring Rhythms and Tactics in the Software Development Process55
Automated Code Editing With Search-Generate-Modify55
Mitigating False Positive Static Analysis Warnings: Progress, Challenges, and Opportunities54
Mask–Mediator–Wrapper Architecture as a Data Mesh Driver53
Neural Library Recommendation by Embedding Project-Library Knowledge Graph52
Mole: Efficient Crash Reproduction in Android Applications With Enforcing Necessary UI Events50
Multi-Objective Software Defect Prediction via Multi-Source Uncertain Information Fusion and Multi-Task Multi-View Learning50
Towards a Cognitive Model of Dynamic Debugging: Does Identifier Construction Matter?49
Trace Diagnostics for Signal-Based Temporal Properties49
The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers48
A Theory of Pending Schemas in Combinatorial Testing47
MASTER: Multi-Source Transfer Weighted Ensemble Learning for Multiple Sources Cross-Project Defect Prediction46
T-Evos: A Large-Scale Longitudinal Study on CI Test Execution and Failure45
Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis45
A Systematic Review of IoT Systems Testing: Objectives, Approaches, Tools, and Challenges45
Multimodal Fusion for Android Malware Detection Based on Large Pre-Trained Models44
Enabling Good Work Habits in Software Developers through Reflective Goal-Setting43
Testing with Fewer Resources: An Adaptive Approach to Performance-Aware Test Case Generation43
PerfJIT: Test-Level Just-in-Time Prediction for Performance Regression Introducing Commits43
GenMorph: Automatically Generating Metamorphic Relations via Genetic Programming42
A Wizard of Oz Study Simulating API Usage Dialogues With a Virtual Assistant42
Measuring the Fidelity of a Physical and a Digital Twin Using Trace Alignments41
Program Synthesis for Cyber-Resilience41
Robust Test Selection for Deep Neural Networks41
Improving Vulnerability Inspection Efficiency Using Active Learning41
How Developers Choose Names40
Legion: Massively Composing Rankers for Improved Bug Localization at Adobe40
The ORIS Tool: Quantitative Evaluation of Non-Markovian Systems40
API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification40
CODIT: Code Editing With Tree-Based Neural Models40
Generalized Coverage Criteria for Combinatorial Sequence Testing40
Decision Support for Selecting Blockchain-Based Application Design Patterns With Layered Taxonomy and Quality Attributes40
LLMorpheus: Mutation Testing using Large Language Models40
Annotative Software Product Line Analysis Using Variability-Aware Datalog39
Discovering Reusable Functional Features in Legacy Object-Oriented Systems39
Evolutionary generation of test suites for multi-path coverage of MPI programs with non-determinism39
Leveraging Large Language Model for Automatic Patch Correctness Assessment39
Automatic Repair of Timestamp Comparisons38
An Experience Report on Producing Verifiable Builds for Large-Scale Commercial Systems38
Metric-Based Fault Prediction for Spreadsheets38
Formal Equivalence Checking for Mobile Malware Detection and Family Classification38
Context-Aware Personalized Crowdtesting Task Recommendation37
Triple Peak Day: Work Rhythms of Software Developers in Hybrid Work37
How Should Software Engineering Secondary Studies Include Grey Material?37
A Faceted Taxonomy of Requirements Changes in Agile Contexts37
Pathidea: Improving Information Retrieval-Based Bug Localization by Re-Constructing Execution Paths Using Logs35
On the Understandability of MLOps System Architectures35
Can Clean New Code Reduce Technical Debt Density?35
Human-in-the-Loop Automatic Program Repair35
An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples34
EpiTESTER: Testing Autonomous Vehicles With Epigenetic Algorithm and Attention Mechanism34
Pull Request Decisions Explained: An Empirical Overview34
“Estimating Software Project Effort Using Analogies”: Reflections After 28 Years33
TransformCode: A Contrastive Learning Framework for Code Embedding via Subtree Transformation33
Studying Ad Library Integration Strategies of Top Free-to-Download Apps32
What Drives and Sustains Self-Assignment in Agile Teams32
Experimental Evaluation of Test-Driven Development With Interns Working on a Real Industrial Project32
Revisiting Test Impact Analysis in Continuous Testing From the Perspective of Code Dependencies32
A Study of Call Graph Construction for JVM-Hosted Languages32
A Study About the Knowledge and Use of Requirements Engineering Standards in Industry31
Detecting Continuous Integration Skip Commits Using Multi-Objective Evolutionary Search31
Evaluating and Improving Unified Debugging31
Empirical Validation of Automated Vulnerability Curation and Characterization30
Specializing Neural Networks for Cryptographic Code Completion Applications30
Automated Refactoring of Non-Idiomatic Python Code With Pythonic Idioms30
Automated Commit Message Generation With Large Language Models: An Empirical Study and Beyond30
CloudRaid: Detecting Distributed Concurrency Bugs via Log Mining and Enhancement29
DAppSCAN: Building Large-Scale Datasets for Smart Contract Weaknesses in DApp Projects29
Quantitative Verification for Monitoring Event-Streaming Systems29
Microservice Extraction Based on a Comprehensive Evaluation of Logical Independence and Performance29
How Do Developers Structure Unit Test Cases? An Empirical Analysis of the AAA Pattern in Open Source Projects29
Continuously Managing NFRs: Opportunities and Challenges in Practice29
Increasing the Confidence of Deep Neural Networks by Coverage Analysis28
Just-In-Time Obsolete Comment Detection and Update28
Nighthawk: Fully Automated Localizing UI Display Issues via Visual Understanding28
Retrieval-Augmented Fine-Tuning for Improving Retrieve-and-Edit Based Assertion Generation28
Test Flakiness Across Programming Languages28
Mind the Gap! A Study on the Transferability of Virtual Versus Physical-World Testing of Autonomous Driving Systems28
Watch Out for Extrinsic Bugs! A Case Study of Their Impact in Just-In-Time Bug Prediction Models on the OpenStack Project28
SigRec: Automatic Recovery of Function Signatures in Smart Contracts27
Effect of Requirements Analyst Experience on Elicitation Effectiveness: A Family of Quasi-Experiments27
Data Quality Matters: A Case Study on Data Label Correctness for Security Bug Report Prediction27
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks27
Efficient Summary Reuse for Software Regression Verification26
ASTRAEA: Grammar-based Fairness Testing26
Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing26
The Analysis of Safety Critical Software Systems26
Understanding the Robustness of Transformer-Based Code Intelligence via Code Transformation: Challenges and Opportunities26
Exploiting Natural Language Structures in Software Informal Documentation26
Optimization of Software Release Planning Considering Architectural Dependencies, Cost, and Value26
From Executable Specifications to Hard-to-Specify Requirements: Challenges in Describing Reactive System Behavior26
Why My App Crashes? Understanding and Benchmarking Framework-Specific Exceptions of Android Apps26
Cross-Language Taint Analysis: Generating Caller-Sensitive Native Code Specification for Java26
STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews25
A Qualitative Study of the Benefits and Costs of Logging From Developers’ Perspectives25
CRPWarner: Warning the Risk of Contract-Related Rug Pull in DeFi Smart Contracts25
NumScout: Unveiling Numerical Defects in Smart Contracts Using LLM-Pruning Symbolic Execution25
FlakyFix: Using Large Language Models for Predicting Flaky Test Fix Categories and Test Code Repair25
Improving Cross-Language Code Clone Detection via Code Representation Learning and Graph Neural Networks25
Line-Level Defect Prediction by Capturing Code Contexts With Graph Convolutional Networks25
A Systematic Study on Real-World Android App Bundles25
Predictive Comment Updating With Heuristics and AST-Path-Based Neural Learning: A Two-Phase Approach25
Explaining Static Analysis With Rule Graphs24
The Effectiveness of Supervised Machine Learning Algorithms in Predicting Software Refactoring24
Predicting Defective Lines Using a Model-Agnostic Technique24
Beyond Literal Meaning: Uncover and Explain Implicit Knowledge in Code Through Wikipedia-Based Concept Linking24
On the Validity of Pre-Trained Transformers for Natural Language Processing in the Software Engineering Domain24
Assessing Evaluation Metrics for Neural Test Oracle Generation24
Deconstructing the Nature of Collaboration in Organizations Open Source Software Development: The Impact of Developer and Task Characteristics24
Are You Still Working on This? An Empirical Study on Pull Request Abandonment24
A Chaos Engineering System for Live Analysis and Falsification of Exception-Handling in the JVM24
An Empirical Study of Model-Agnostic Techniques for Defect Prediction Models24
Scrutinizing Implementations of Smart Home Integrations24
iTCRL: Causal-Intervention-Based Trace Contrastive Representation Learning for Microservice Systems23
Diversity-Oriented Testing for Competitive Game Agent via Constraint-Guided Adversarial Agent Training23
A Grounded Theory of Cross-Community SECOs: Feedback Diversity Versus Synchronization23
Stakeholder Preference Extraction From Scenarios23
Sentinel: A Hyper-Heuristic for the Generation of Mutant Reduction Strategies23
Parameterized Verification of Leader/Follower Systems via Arithmetic Constraints23
A Variability Fault Localization Approach for Software Product Lines23
Automated Infrastructure as Code Program Testing23
Range Specification Bug Detection in Flight Control System Through Fuzzing22
Unearthing Gas-Wasting Code Smells in Smart Contracts With Large Language Models22
Mithra: Anomaly Detection as an Oracle for Cyberphysical Systems22
SmartOracle: Generating Smart Contract Oracle via Fine-Grained Invariant Detection22
A Survey on the Use of Computer Vision to Improve Software Engineering Tasks22
Automated Use-After-Free Detection and Exploit Mitigation: How Far Have We Gone?22
Forecasting the Principal of Code Technical Debt in JavaScript Applications21
Syntactic Versus Semantic Similarity of Artificial and Real Faults in Mutation Testing Studies21
Domain-Driven Design for Microservices: An Evidence-Based Investigation21
Practical Mutation Testing at Scale: A view from Google21
How Templated Requirements Specifications Inhibit Creativity in Software Engineering21
Let’s Talk With Developers, Not About Developers: A Review of Automatic Program Repair Research20
RefactoringMiner 2.020
Do Pretrained Language Models Indeed Understand Software Engineering Tasks?20
Verification of Fuzzy Decision Trees20
Restore: Retrospective Fault Localization Enhancing Automated Program Repair20
Retrospective on: Constraint-Based Automatic Test Data Generation20
A Comparison of Natural Language Understanding Platforms for Chatbots in Software Engineering20
Hashing Fuzzing: Introducing Input Diversity to Improve Crash Detection20
Towards More Precise Coincidental Correctness Detection With Deep Semantic Learning20
TkT: Automatic Inference of Timed and Extended Pushdown Automata20
ArchHypo: Managing Software Architecture Uncertainty Using Hypotheses Engineering20
PopArt: Ranked Testing Efficiency20
Comparative Analysis of Constraint Handling Techniques for Constrained Combinatorial Testing20
Reuse of Similarly Behaving Software Through Polymorphism-Inspired Variability Mechanisms20
Studying the Influence and Distribution of the Human Effort in a Hybrid Fitness Function for Search-Based Model-Driven Engineering19
Does Treatment Adherence Impact Experiment Results in TDD?19
Evaluating SZZ Implementations: An Empirical Study on the Linux Kernel19
Emerging App Issue Identification via Online Joint Sentiment-Topic Tracing19
SCAnoGenerator: Automatic Anomaly Injection for Ethereum Smart Contracts19
Accelerating Finite State Machine-Based Testing Using Reinforcement Learning19
Do Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-Tail Software Through Feature Inference19
PATEN: Identifying Unpatched Third-Party APIs via Fine-Grained Patch-Enhanced AST-Level Signature18
Engineering Within Boundaries When Software Has None18
Clopper-Pearson Algorithms for Efficient Statistical Model Checking Estimation18
Learning to Predict User-Defined Types18
Easy-to-Deploy API Extraction by Multi-Level Feature Embedding and Transfer Learning18
Enhancing Trustability of Android Applications via User-Centric Flexible Permissions17
The Human Side of Software Engineering Teams: An Investigation of Contemporary Challenges17
Dealing With Data Challenges When Delivering Data-Intensive Software Solutions17
Stealthy Backdoor Attack for Code Models17
Darcy: Automatic Architectural Inconsistency Resolution in Java17
Concretization of Abstract Traffic Scene Specifications Using Metaheuristic Search17
Runtime Evolution of Bitcoin's Consensus Rules17
Active Code Learning: Benchmarking Sample-Efficient Training of Code Models17
Software Testing With Large Language Models: Survey, Landscape, and Vision17
Generating Structurally Realistic Models With Deep Autoregressive Networks17
Multitask-Based Evaluation of Open-Source LLM on Software Vulnerability17
A Large Scale Study of Long-Time Contributor Prediction for GitHub Projects17
Defining Smart Contract Defects on Ethereum17
An Assessment of Rules of Thumb for Software Phase Management, and the Relationship Between Phase Effort and Schedule Success17
Utilizing Automatic Query Reformulations as Genetic Operations to Improve Feature Location in Software Models16
Recommending Participants for Collaborative Merge Sessions16
Characterizing Crowds to Better Optimize Worker Recommendation in Crowdsourced Testing16
On the Workflows and Smells of Leaderboard Operations (LBOps): An Exploratory Study of Foundation Model Leaderboards16
Finding Trends in Software Research16
Static Profiling of Alloy Models16
How Software Developers Mitigate Their Errors When Developing Code16
Active Learning of Discriminative Subgraph Patterns for API Misuse Detection16
Reading Answers on Stack Overflow: Not Enough!16
IntRepair: Informed Repairing of Integer Overflows16
Examiner-Pro: Testing Arm Emulators Across Different Privileges16
Heuristic and Neural Network Based Prediction of Project-Specific API Member Access16
DaNuoYi: Evolutionary Multi-Task Injection Testing on Web Application Firewalls16
MultiPL-E: A Scalable and Polyglot Approach to Benchmarking Neural Code Generation16
A Search-Based Testing Approach for Deep Reinforcement Learning Agents16
Automatic Generation of Acceptance Test Cases From Use Case Specifications: An NLP-Based Approach16
A Retrospective of Proving the Correctness of Multiprocess Programs16
Fast and Precise Static Null Exception Analysis With Synergistic Preprocessing16
Isolating Compiler Faults through Differentiated Compilation Configurations15
Comparing Block-Based Programming Models for Two-Armed Robots15
A Procedure to Continuously Evaluate Predictive Performance of Just-In-Time Software Defect Prediction Models During Software Development15
AddressWatcher: Sanitizer-Based Localization of Memory Leak Fixes15
FlexFL: Flexible and Effective Fault Localization With Open-Source Large Language Models15
A Framework for Emotion-Oriented Requirements Change Handling in Agile Software Engineering15
Factors Affecting On-Time Delivery in Large-Scale Agile Software Development15
Enforcing Correctness of Collaborative Business Processes Using Plans15
A Theory of Value for Value-Based Feature Selection in Software Engineering15
Neural Transfer Learning for Repairing Security Vulnerabilities in C Code15
IoTCom: Dissecting Interaction Threats in IoT Systems14
Safety and Performance, Why Not Both? Bi-Objective Optimized Model Compression Against Heterogeneous Attacks Toward AI Software Deployment14
RNN-Test: Towards Adversarial Testing for Recurrent Neural Network Systems14
Software Architecture Description Revisited14
Inferring Bug Signatures to Detect Real Bugs14
Consistent Local-First Software: Enforcing Safety and Invariants for Local-First Applications14
Pride: Prioritizing Documentation Effort Based on a PageRank-Like Algorithm and Simple Filtering Rules14
Distilling Quality Enhancing Comments From Code Reviews to Underpin Reviewer Recommendation14
Retrospective: Data Mining Static Code Attributes to Learn Defect Predictors14
ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking14
A Retrospective on Mining Version Histories to Guide Software Changes14
Empirical Assessment of Multimorphic Testing14
Let's Go to the Whiteboard (Again): Perceptions From Software Architects on Whiteboard Architecture Meetings14
Using Symbolic States to Infer Numerical Invariants14
Obstacle Analysis in Requirements Engineering: Retrospective and Emerging Challenges14
SOSRepair: Expressive Semantic Search for Real-World Program Repair14
PackHunter: Recovering Missing Packages for C/C++ Projects14
0.041043996810913