ACM Transactions on Software Engineering and Methodology

Papers
(The median citation count of ACM Transactions on Software Engineering and Methodology is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Horus : Accelerating Kernel Fuzzing through Efficient Host-VM Memory Access Procedures144
Neuron Semantic-Guided Test Generation for Deep Neural Networks Fuzzing121
Automatic Identification of Game Stuttering via Gameplay Videos Analysis113
KAPE: k NN-based Performance Testing for Deep Code Search92
Test Generation Strategies for Building Failure Models and Explaining Spurious Failures76
History-Driven Fuzzing for Deep Learning Libraries74
Preference-wise Testing of Android Apps via Test Amplification73
Mutant Reduction Evaluation: What is There and What is Missing?57
Understanding the OSS Communities of Deep Learning Frameworks: A Comparative Case Study of P y T orch and T ensor55
Bounded Verification of Atomicity Violations for Interrupt-Driven Programs via Lazy Sequentialization52
Enhancing Android Malware Detection: The Influence of ChatGPT on Decision-centric Task52
Better Supporting Human Aspects in Mobile eHealth Apps: Development and Validation of Enhanced Guidelines51
An empirical study on vulnerability disclosure management of open source software systems50
Assessing the Robustness of Test Selection Methods for Deep Neural Networks48
Finding Information Leaks with Information Flow Fuzzing - RCR Report45
Reusing d-DNNFs for Efficient Feature-Model Counting45
FoC: Figure out the Cryptographic Functions in Stripped Binaries with LLMs44
Deceiving Humans and Machines Alike: Search-based Test Input Generation for DNNs Using Variational Autoencoders43
FairGenerate: Enhancing Fairness Through Synthetic Data Generation and Two-Fold Biased Labels Removal42
An Empirical Study of the Non-Determinism of ChatGPT in Code Generation42
I Depended on You and You Broke Me: An Empirical Study of Manifesting Breaking Changes in Client Packages40
Securing the Ethereum from Smart Ponzi Schemes: Identification Using Static Features39
Communicating Study Design Trade-offs in Software Engineering36
Supporting Emotional Intelligence, Productivity and Team Goals while Handling Software Requirements Changes35
Toward Interpretable Graph Tensor Convolution Neural Network for Code Semantics Embedding35
Fine-Tuning Large Language Models to Improve Accuracy and Comprehensibility of Automated Code Review35
Storage State Analysis and Extraction of Ethereum Blockchain Smart Contracts34
An Accurate Identifier Renaming Prediction and Suggestion Approach34
I Know What You Are Searching for: Code Snippet Recommendation from Stack Overflow Posts33
Model Transformation Development Using Automated Requirements Analysis, Metamodel Matching, and Transformation by Example32
Introducing Interactions in Multi-Objective Optimization of Software Architectures31
Assessing and Analyzing the Correctness of GitHub Copilot’s Code Suggestions31
HeMiRCA: Fine-Grained Root Cause Analysis for Microservices with Heterogeneous Data Sources31
JavaScript SBST Heuristics to Enable Effective Fuzzing of NodeJS Web APIs31
FormatFuzzer : Effective Fuzzing of Binary File Formats31
An Empirical Study on Governance in Bitcoin’s Consensus Evolution31
Estimating Uncertainty in Labeled Changes by SZZ Tools on Just-In-Time Defect Prediction30
Characterizing Deep Learning Package Supply Chains in PyPI: Domains, Clusters, and Disengagement30
Help Them Understand: Testing and Improving Voice User Interfaces30
A Comprehensive View on TD Prevention Practices and Reasons for Not Preventing It30
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks - RCR Report29
Why Do Developers Reject Refactorings in Open-Source Projects?29
Deep API Sequence Generation via Golden Solution Samples and API Seeds28
Single and Multi-objective Test Cases Prioritization for Self-driving Cars in Virtual Environments28
Try with Simpler - An Evaluation of Improved Principal Component Analysis in Log-based Anomaly Detection28
Enhancing Search-based Testing with Testability Transformations for Existing APIs28
A Survey of Learning-based Automated Program Repair27
Assessing the Early Bird Heuristic (for Predicting Project Quality)26
PatchCensor: Patch Robustness Certification for Transformers via Exhaustive Testing26
An Empirical Study on GitHub Pull Requests’ Reactions26
Revisiting the Identification of the Co-evolution of Production and Test Code26
Evaluation of Software Architectures under Uncertainty25
Vulnerability Repair via Concolic Execution and Code Mutations25
Contemporary Software Modernization: Strategies, Driving Forces, and Research Opportunities24
GIST : Generated Inputs Sets Transferability in Deep Learning23
Reinforcement Learning Informed Evolutionary Search for Autonomous Systems Testing23
Editorial: Toward the Future with Eight Issues Per Year23
A Systematic Literature Review of Multi-Label Learning in Software Engineering23
SimClone: Detecting Tabular Data Clones Using Value Similarity23
Towards On-The-Fly Code Performance Profiling22
Assessing and Improving an Evaluation Dataset for Detecting Semantic Code Clones via Deep Learning22
Editorial: ICSE and the Incredible Contradictions of Software Engineering22
AutoRIC: Automated Neural Network Repairing Based on Constrained Optimization22
An Empirical Study of Retrieval-Augmented Code Generation: Challenges and Opportunities21
Graphuzz: Data-driven Seed Scheduling for Coverage-guided Greybox Fuzzing20
APIRO: A Framework for Automated Security Tools API Recommendation20
You Don’t Have to Say Where to Edit! jLED – Joint Learning to Localize and Edit Source Code20
SCOPE : Performance Testing for Serverless Computing20
A Characterization Study of Merge Conflicts in Java Projects20
Industry–Academia Research Collaboration and Knowledge Co-creation: Patterns and Anti-patterns20
MR-Scout: Automated Synthesis of Metamorphic Relations from Existing Test Cases19
Cleaning Up Confounding: Accounting for Endogeneity Using Instrumental Variables and Two-Stage Models19
Learning from Very Little Data: On the Value of Landscape Analysis for Predicting Software Project Health19
Actor-Driven Decomposition of Microservices through Multi-level Scalability Assessment19
Demo2Test: Transfer Testing of Agent in Competitive Environment with Failure Demonstrations19
Characterizing Installation- and Run-Time Compatibility Issues in Android Benign Apps and Malware19
SourcererJBF: A Java Build Framework For Large-Scale Compilation19
Towards Learning Generalizable Code Embeddings Using Task-agnostic Graph Convolutional Networks19
Simulator-based Explanation and Debugging of Hazard-triggering Events in DNN-based Safety-critical Systems18
Adaptive Hypermutation for Search-Based System Test Generation: A Study on REST APIs with EvoMaster18
Exploring the Capabilities of LLMs for Code Change Related Tasks18
Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors18
Eagle17
Test Input Prioritization for 3D Point Clouds17
A Comprehensive Empirical Study of Bias Mitigation Methods for Machine Learning Classifiers17
Feature Matching-based Approaches to Improve the Robustness of Android Visual GUI Testing17
MeDeT: Medical Device Digital Twins Creation with Few-shot Meta-learning17
Efficient Multivariate Time Series Anomaly Detection through Transfer Learning for Large-Scale Software Systems17
Demystifying Hidden Sensitive Operations in Android Apps17
Generation-based Differential Fuzzing for Deep Learning Libraries16
Coverage-directed Differential Testing of X.509 Certificate Validation in SSL/TLS Implementations16
Fairness Concerns in App Reviews: A Study on AI-Based Mobile Apps16
Testing Causality in Scientific Modelling Software16
Evolution-Aware Constraint Derivation Approach for Software Remodularization16
Is It Hard to Generate Holistic Commit Message?16
Automating TODO-missed Methods Detection and Patching16
Fold2Vec: Towards a Statement-Based Representation of Code for Code Comprehension15
Improving Deep Assertion Generation via Fine-Tuning Retrieval-Augmented Pre-trained Language Models15
Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers15
Variable Renaming-Based Adversarial Test Generation for Code Model: Benchmark and Enhancement15
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks15
Adaptive Modelling Languages: Abstract Syntax and Model Migration14
Efficient Management of Containers for Software Defined Vehicles14
Certified Cost Bounds for Abstract Programs14
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities14
Measuring and Clustering Heterogeneous Chatbot Designs14
Duplicate Bug Report Detection: How Far Are We?13
A Roadmap for Integrating Sustainability into Software Engineering Education13
Refactoring in Computational Notebooks13
All in One: Design, Verification, and Implementation of SNOW-optimal Read Atomic Transactions13
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum13
OSS Effort Estimation Using Software Features Similarity and Developer Activity-Based Metrics13
Autonomous Driving System Testing via Diversity-Oriented Driving Scenario Exploration13
An Interleaving Guided Metamorphic Testing Approach for Concurrent Programs12
Can GitHub Issues Help in App Review Classifications?12
DiPri : Distance-Based Seed Prioritization for Greybox Fuzzing12
Input Distribution Coverage: Measuring Feature Interaction Adequacy in Neural Network Testing12
On the Impact of Lower Recall and Precision in Defect Prediction for Guiding Search-based Software Testing12
Survey of Code Search Based on Deep Learning12
Automatic Core-Developer Identification on GitHub: A Validation Study12
A Comparative Study on Method Comment and Inline Comment12
Reputation Gaming in Crowd Technical Knowledge Sharing12
Understanding Software-2.012
Studying the Impact of TensorFlow and PyTorch Bindings on Machine Learning Software Quality12
On the Significance of Category Prediction for Code-Comment Synchronization11
Differentiable Quantum Programming with Unbounded Loops11
A Hypothesis Testing-based Framework for Software Cross-modal Retrieval in Heterogeneous Semantic Spaces11
LogUpdater: Automated Detection and Repair of Specific Defects in Logging Statements11
The Influence of Human Aspects on Requirements Engineering-related Activities: Software Practitioners’ Perspective11
AI for DevSecOps: A Landscape and Future Opportunities11
Identifying and Explaining Safety-critical Scenarios for Autonomous Vehicles via Key Features11
Obfuscated Clone Search in JavaScript based on Reinforcement Subsequence Learning10
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis10
Towards Robustness of Deep Program Processing Models—Detection, Estimation, and Enhancement10
The IDEA of Us: An Identity-Aware Architecture for Autonomous Systems10
Data Complexity: A New Perspective for Analyzing the Difficulty of Defect Prediction Tasks10
Mitigating Regression Faults Induced by Feature Evolution in Deep Learning Systems10
NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing10
Testing RESTful APIs: A Survey10
A Systematic Literature Review on the Use of Deep Learning in Software Engineering Research10
How Do Successful and Failed Projects Differ? A Socio-Technical Analysis10
Software Engineering by and for Humans in an AI Era10
Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective10
Can Coverage Criteria Guide Failure Discovery for Image Classifiers? An Empirical Study10
Understanding Real-Time Collaborative Programming: A Study of Visual Studio Live Share10
Revealing the Unseen: AI Chain on LLMs for Predicting Implicit Dataflows to Generate Dataflow Graphs in Dynamically Typed Code9
Fairness Testing of Machine Translation Systems9
An Empirical Study on the Relationship Between Defects and Source Code’s Unnaturalness9
What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning9
Decision Support Model for Selecting the Optimal Blockchain Oracle Platform: An Evaluation of Key Factors9
Identifying Performance Issues in Cloud Service Systems Based on Relational-Temporal Features9
Less Is More: Unlocking Semi-Supervised Deep Learning for Vulnerability Detection9
Open Problems in Fuzzing RESTful APIs: A Comparison of Tools9
Guided Feature Identification and Removal for Resource-constrained Firmware9
Representation Learning for Stack Overflow Posts: How Far Are We?9
Let’s Discover More API Relations: A Large Language Model-Based AI Chain for Unsupervised API Relation Inference9
Divide-and-Conquer: Automating Code Revisions via Localization-and-Revision9
Simulating Software Evolution to Evaluate the Reliability of Early Decision-making among Design Alternatives toward Maintainability9
Mobile Application Online Cross-Project Just-in-Time Software Defect Prediction Framework9
Test Oracle Generation for REST APIs9
The Agile Success Model9
Revisiting Sentiment Analysis for Software Engineering in the Era of Large Language Models9
The Case for Adaptive Security Interventions9
BiRD: Race Detection in Software Binaries under Relaxed Memory Models8
SemMT: A Semantic-Based Testing Approach for Machine Translation Systems8
Prompt-based Code Completion via Multi-Retrieval Augmented Generation8
Verification Witnesses8
What Constitutes the Deployment and Runtime Configuration System? An Empirical Study on OpenStack Projects8
Some Seeds Are Strong: Seeding Strategies for Search-based Test Case Selection8
Large Language Model-Aware In-Context Learning for Code Generation8
Large Language Model for Vulnerability Detection and Repair: Literature Review and the Road Ahead8
Toward Better Comprehension of Breaking Changes in the NPM Ecosystem8
V ex IR2V ec : An Architecture-Neutral Embedding Framework for Binary Similarity8
Grammar Mutation for Testing Input Parsers8
How the Quality of Maintenance Tasks is Affected by Criteria for Selecting Engineers for Collaboration7
Making Software Development More Diverse and Inclusive: Key Themes, Challenges, and Future Directions7
Blindspots in Python and Java APIs Result in Vulnerable Code7
From Triumph to Uncertainty: The Journey of Software Engineering in the AI Era7
DRIVE: Dockerfile Rule Mining and Violation Detection7
Rise of the Planet of Serverless Computing: A Systematic Review7
Software Security Analysis in 2030 and Beyond: A Research Roadmap7
My Fuzzers Won’t Build: An Empirical Study of Fuzzing Build Failures7
Snippet Comment Generation Based on Code Context Expansion7
Finding Information Leaks with Information Flow Fuzzing7
AceCoder : An Effective Prompting Technique Specialized in Code Generation7
Microservice Security Metrics for Secure Communication, Identity Management, and Observability7
Understanding Vulnerability Inducing Commits of the Linux Kernel7
Identifying Affected Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and Libraries7
Automated Identification of Toxic Code Reviews Using ToxiCR7
Learning-based Relaxation of Completeness Requirements for Data Entry Forms7
A road-map to Readily Available Early Validation & Verification of System Behaviour in Model-Based Systems Engineering using Software Engineering Best Practices7
Enumerating Valid Non-Alpha-Equivalent Programs for Interpreter Testing7
Digital Twin-based Anomaly Detection with Curriculum Learning in Cyber-physical Systems7
Recommending Variable Names for Extract Local Variable Refactorings7
Poracle: Testing Patches under Preservation Conditions to Combat the Overfitting Problem of Program Repair7
Editorial: The End of the Journey7
Benchmarking and Categorizing the Performance of Neural Program Repair Systems for Java7
Influential Global and Local Contexts Guided Trace Representation for Fault Localization7
Finding Near-optimal Configurations in Colossal Spaces with Statistical Guarantees7
The Good, the Bad, and the Missing: Neural Code Generation for Machine Learning Tasks7
Challenges of Working from Home in Software Development During Covid-19 Lockdowns7
Poison Attack and Poison Detection on Deep Source Code Processing Models6
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge6
A Machine Learning Approach for Automated Filling of Categorical Fields in Data Entry Forms6
Temporal-Incremental Learning for Android Malware Detection6
A Comprehensive Study of Governance Issues in Decentralized Finance Applications6
Making Sense of the Unknown: How Managers Make Cyber Security Decisions6
Non-Linear Software Documentation with Interactive Code Examples6
Understanding Test Convention Consistency as a Dimension of Test Quality6
Novelty Not Found: Exploring Input Shadowing in Fuzzing through Adaptive Fuzzer Restarts—RCR Report6
On Estimating the Feasible Solution Space of Multi-objective Testing Resource Allocation6
deGraphCS : Embedding Variable-based Flow Graph for Neural Code Search6
A Closer Look at the Security Risks in the Rust Ecosystem6
Using Personality Detection Tools for Software Engineering Research: How Far Can We Go?6
Accountability in Code Review: The Role of Intrinsic Drivers and the Impact of LLMs6
ReCDroid+: Automated End-to-End Crash Reproduction from Bug Reports for Android Apps6
Automatic Repair of Quantum Programs via Unitary Operation6
Consent Verification Monitoring6
A Systematic Mapping Study Exploring Quantification Approaches to Code, Design, and Architecture Technical Debt6
Validity-Preserving Delta Debugging via Generator Trace Reduction6
IntDroid6
On the Faults Found in REST APIs by Automated Test Generation6
ConE: A Concurrent Edit Detection Tool for Large-scale Software Development6
Improving Automated Program Repair with Domain Adaptation6
FQN Inference in Partial Code by Prompt-tuned Language Model of Code6
Exploring Automated Assertion Generation via Large Language Models6
µOpTime: Statically Reducing the Execution Time of Microbenchmark Suites Using Stability Metrics6
Privacy in Chatbot Conversation-Driven Development: A Comprehensive Review and Requirements Proposal6
Bias Testing and Mitigation in LLM-based Code Generation6
An Empirical Study of the Impact of Hyperparameter Tuning and Model Optimization on the Performance Properties of Deep Neural Networks6
GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks5
Fine-grained Coverage-based Fuzzing5
Hierarchical and Hybrid Organizational Structures in Open-source Software Projects: A Longitudinal Study5
Towards Causal Analysis of Empirical Software Engineering Data: The Impact of Programming Languages on Coding Competitions5
Context-based Transfer Learning for Structuring Fault Localization and Program Repair Automation5
Leveraging Data Characteristics for Bug Localization in Deep Learning Programs5
Automated Testing Linguistic Capabilities of NLP Models5
Technical Debt Monitoring Decision Making with Skin in the Game5
DistMeasure : A Framework for Runtime Characterization and Quality Assessment of Distributed Software via Interprocess Communications5
Classifying Mobile Applications Using Word Embeddings5
Route : Roads Not Taken in UI Testing5
Stateful Serverless Computing with Crucial5
Improving Fault Localization with External Oracle by Using Counterfactual Execution5
A Smart Status Based Monitoring Algorithm for the Dynamic Analysis of Memory Safety5
What’s (Not) Working in Programmer User Studies?5
Why Personalizing Deep Learning-Based Code Completion Tools Matters5
How Far Have We Progressed in Identifying Self-admitted Technical Debts? A Comprehensive Empirical Study5
Incorporating Signal Awareness in Source Code Modeling: An Application to Vulnerability Detection5
Fairness Testing: A Comprehensive Survey and Analysis of Trends5
A Large-Scale Study of IoT Security Weaknesses and Vulnerabilities in the Wild5
0.053893804550171