ACM Transactions on Software Engineering and Methodology

Papers
(The median citation count of ACM Transactions on Software Engineering and Methodology is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
DeepWukong109
A Tale of Two Cities: Software Developers Working from Home during the COVID-19 Pandemic82
Software Engineering for AI-Based Systems: A Survey70
Practical Accuracy Estimation for Efficient Deep Neural Network Testing52
Test Selection for Deep Learning Systems47
Developing Cost-Effective Blockchain-Powered Applications41
Wireframe-based UI Design Search through Image Autoencoder40
Security Smells in Ansible and Chef Scripts40
Generating Question Titles for Stack Overflow from Mined Code Snippets39
A Survey of Flaky Tests39
Monotone Precision and Recall Measures for Comparing Executions and Specifications of Dynamic Systems39
Smart Contract Repair35
A Systematic Literature Review on the Use of Deep Learning in Software Engineering Research34
Understanding Software-2.033
An Empirical Study of the Impact of Hyperparameter Tuning and Model Optimization on the Performance Properties of Deep Neural Networks32
Why Developers Refactor Source Code31
Why My Code Summarization Model Does Not Work30
Why an Android App Is Classified as Malware29
In-IDE Code Generation from Natural Language: Promise and Challenges29
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection29
The Agile Success Model27
Handling SQL Databases in Automated System Test Generation26
Context-Aware Code Change Embedding for Better Patch Correctness Assessment26
Context-aware Retrieval-based Deep Commit Message Generation26
Opinion Mining for Software Development: A Systematic Literature Review26
When and How to Make Breaking Changes26
Beyond Tests23
Women’s Participation in Open Source Software: A Survey of the Literature22
Deep Reinforcement Learning for Black-box Testing of Android Apps22
Modular Tree Network for Source Code Representation Learning21
Emoji-powered Sentiment and Emotion Detection from Software Developers’ Communication Data21
NPC: N euron P ath C overage via Characterizing Decision Logic of Deep Neural Networks20
Rise of the Planet of Serverless Computing: A Systematic Review20
How Far Have We Progressed in Identifying Self-admitted Technical Debts? A Comprehensive Empirical Study19
How Should I Improve the UI of My App?19
Accessibility in Software Practice: A Practitioner’s Perspective19
Stateful Serverless Computing with Crucial18
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching18
SPI: Automated Identification of Security Patches via Commits17
An Empirical Study on Data Distribution-Aware Test Selection for Deep Learning Enhancement17
Memory-Safety Challenge Considered Solved? An In-Depth Study with All Rust CVEs17
IntDroid17
Technical Q8A Site Answer Recommendation via Question Boosting17
Automated Patch Transplantation17
Are Multi-Language Design Smells Fault-Prone? An Empirical Study16
Defining a Knowledge Graph Development Process Through a Systematic Review16
Enhancing Search-based Testing with Testability Transformations for Existing APIs16
psc2code15
Killing Stubborn Mutants with Symbolic Execution15
History-based Model Repair Recommendations15
Fine-grained Code Coverage Measurement in Automated Black-box Android Testing14
A Survey on Automated Driving System Testing: Landscapes and Trends14
Predictive Models in Software Engineering: Challenges and Opportunities14
Unveiling Elite Developers’ Activities in Open Source Projects14
Adversarial Robustness of Deep Code Comment Generation14
A Theory of Scrum Team Effectiveness14
Test Data Generation for Path Coverage of MPI Programs Using SAEO14
Adaptive Hypermutation for Search-Based System Test Generation: A Study on REST APIs with EvoMaster13
SafeDrop: Detecting Memory Deallocation Bugs of Rust Programs via Static Data-flow Analysis13
An Empirical Study of Developer Discussions in the Gitter Platform13
Are Comments on Stack Overflow Well Organized for Easy Retrieval by Developers?13
Single and Multi-objective Test Cases Prioritization for Self-driving Cars in Virtual Environments13
An Empirical Study of the Impact of Data Splitting Decisions on the Performance of AIOps Solutions13
KLEESpectre13
ActivFORMS: A Formally Founded Model-based Approach to Engineer Self-adaptive Systems13
Verifix: Verified Repair of Programming Assignments12
Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum12
The Case for Adaptive Security Interventions12
Predicting Performance Anomalies in Software Systems at Run-time12
Towards Robustness of Deep Program Processing Models—Detection, Estimation, and Enhancement12
Toward an Objective Measure of Developers’ Cognitive Activities11
The Weights Can Be Harmful: Pareto Search versus Weighted Search in Multi-objective Search-based Software Engineering11
Uncertainty-aware Prediction Validator in Deep Learning Models for Cyber-physical System Data11
On the Significance of Category Prediction for Code-Comment Synchronization11
A Comprehensive Empirical Study of Bias Mitigation Methods for Machine Learning Classifiers11
Taming Reflection11
Boosting Compiler Testing via Compiler Optimization Exploration11
Evaluation of Software Architectures under Uncertainty11
Verification Witnesses11
On the Faults Found in REST APIs by Automated Test Generation10
Psychometrics in Behavioral Software Engineering: A Methodological Introduction with Guidelines10
Code Structure–Guided Transformer for Source Code Summarization10
deGraphCS : Embedding Variable-based Flow Graph for Neural Code Search10
Computing Alignments of Well-Formed Process Models using Local Search10
ReCDroid+: Automated End-to-End Crash Reproduction from Bug Reports for Android Apps10
Just-In-Time Defect Prediction on JavaScript Projects: A Replication Study10
On the Reproducibility and Replicability of Deep Learning in Software Engineering10
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum10
Efficient and Effective Feature Space Exploration for Testing Deep Learning Systems10
Predicting Patch Correctness Based on the Similarity of Failing Test Cases10
L2S: A Framework for Synthesizing the Most Probable Program under a Specification10
Automatic API Usage Scenario Documentation from Technical Q&A Sites9
Automatic Fault Detection for Deep Learning Programs Using Graph Transformations9
Open Problems in Fuzzing RESTful APIs: A Comparison of Tools9
Context- and Fairness-Aware In-Process Crowdworker Recommendation9
Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions9
The Impact of Dormant Defects on Defect Prediction: A Study of 19 Apache Projects9
Industry–Academia Research Collaboration and Knowledge Co-creation: Patterns and Anti-patterns9
What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning9
Leveraging Control Flow Knowledge in SMT Solving of Program Verification9
Monitoring Constraints and Metaconstraints with Temporal Logics on Finite Traces9
Microservice Security Metrics for Secure Communication, Identity Management, and Observability9
FaaSLight : General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing9
Eagle8
Leveraging the Defects Life Cycle to Label Affected Versions and Defective Classes8
Securing the Ethereum from Smart Ponzi Schemes: Identification Using Static Features8
S EADS8
SemMT: A Semantic-Based Testing Approach for Machine Translation Systems8
Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms8
Arachne: Search-Based Repair of Deep Neural Networks8
How Software Refactoring Impacts Execution Time8
Toward a Holistic Approach to Verification and Validation of Autonomous Cognitive Systems7
Using Relative Lines of Code to Guide Automated Test Generation for Python7
CodeMatcher: Searching Code Based on Sequential Semantics of Important Query Words7
Input Distribution Coverage: Measuring Feature Interaction Adequacy in Neural Network Testing7
Automatically Identifying the Quality of Developer Chats for Post Hoc Use7
Testing the Plasticity of Reinforcement Learning-based Systems7
Dealing with Belief Uncertainty in Domain Models7
RegionTrack7
The Influence of Human Aspects on Requirements Engineering-related Activities: Software Practitioners’ Perspective7
Testing Relative to Usage Scope7
Applying Bayesian Analysis Guidelines to Empirical Software Engineering Data: The Case of Programming Languages and Code Quality7
Some Seeds Are Strong: Seeding Strategies for Search-based Test Case Selection7
A Practical Approach for Dynamic Taint Tracking with Control-flow Relationships7
Black-box Safety Analysis and Retraining of DNNs based on Feature Extraction and Clustering6
Uncertainty-wise Requirements Prioritization with Search6
Feature Matching-based Approaches to Improve the Robustness of Android Visual GUI Testing6
APIRO: A Framework for Automated Security Tools API Recommendation6
Digital Twin-based Anomaly Detection with Curriculum Learning in Cyber-physical Systems6
Adversarial Specification Mining6
Testing RESTful APIs: A Survey6
Parameter Coverage for Testing of Autonomous Driving Systems under Uncertainty6
Automated, Cost-effective, and Update-driven App Testing6
Bug Localization in Model-Based Systems in the Wild6
Automating App Review Response Generation Based on Contextual Knowledge6
Towards a Consistent Interpretation of AIOps Models6
A Survey of Learning-based Automated Program Repair6
Guaranteeing Timed Opacity using Parametric Timed Model Checking6
A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs6
Classifying Mobile Applications Using Word Embeddings6
White-Box Fuzzing RPC-Based APIs with EvoMaster: An Industrial Case Study6
Turnover of Companies in OpenStack: Prevalence and Rationale6
Multi-objective Integer Programming Approaches for Solving the Multi-criteria Test-suite Minimization Problem6
Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study6
Testing, Validation, and Verification of Robotic and Autonomous Systems: A Systematic Review6
XCoS: Explainable Code Search Based on Query Scoping and Knowledge Graph6
Diversifying Focused Testing for Unit Testing6
Model Transformation Development Using Automated Requirements Analysis, Metamodel Matching, and Transformation by Example5
Correlating Automated and Human Evaluation of Code Documentation Generation Quality5
Reliable Fix Patterns Inferred from Static Checkers for Automated Program Repair5
Making Sense of the Unknown: How Managers Make Cyber Security Decisions5
Influential Global and Local Contexts Guided Trace Representation for Fault Localization5
Fair Enough: Searching for Sufficient Measures of Fairness5
Predictive Mutation Analysis via the Natural Language Channel in Source Code5
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge5
Verification of Distributed Systems via Sequential Emulation5
TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts5
The Best of Both Worlds: Combining Learned Embeddings with Engineered Features for Accurate Prediction of Correct Patches5
Characterizing and Detecting WebAssembly Runtime Bugs5
An Empirical Study on Type Annotations5
Automated Identification of Toxic Code Reviews Using ToxiCR5
Pied-Piper: Revealing the Backdoor Threats in Ethereum ERC Token Contracts5
OSS Effort Estimation Using Software Features Similarity and Developer Activity-Based Metrics4
Mutation Testing in Evolving Systems: Studying the Relevance of Mutants to Code Evolution4
I Know What You Are Searching for: Code Snippet Recommendation from Stack Overflow Posts4
Toward Understanding Deep Learning Framework Bugs4
MICOSE4aPS: Industrially Applicable Maturity Metric to Improve Systematic Reuse of Control Software4
A Study on Blockchain Architecture Design Decisions and Their Security Attacks and Threats4
Measuring Task Conflict and Person Conflict in Software Testing4
Towards Learning Generalizable Code Embeddings Using Task-agnostic Graph Convolutional Networks4
Nudge: Accelerating Overdue Pull Requests toward Completion4
Super-optimization of Smart Contracts4
TestSGD : Interpretable Testing of Neural Networks against Subtle Group Discrimination4
CodeEditor : Learning to Edit Source Code with Pre-trained Models4
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities4
Do Developers Really Know How to Use Git Commands? A Large-scale Study Using Stack Overflow4
iBiR : Bug-report-driven Fault Injection4
Architecting Internet of Things Systems with Blockchain4
Measuring and Modeling Group Dynamics in Open-Source Software Development: A Tensor Decomposition Approach4
Simulator-based Explanation and Debugging of Hazard-triggering Events in DNN-based Safety-critical Systems4
Assessing and Improving an Evaluation Dataset for Detecting Semantic Code Clones via Deep Learning4
Using Personality Detection Tools for Software Engineering Research: How Far Can We Go?4
Recommending Faulty Configurations for Interacting Systems Under Test Using Multi-objective Search4
Parallel Test Prioritization4
Buddy Stacks: Protecting Return Addresses with Efficient Thread-Local Storage and Runtime Re-Randomization4
Examining Penetration Tester Behavior in the Collegiate Penetration Testing Competition4
iSENSE2.04
An Empirical Study of the Effectiveness of an Ensemble of Stand-alone Sentiment Detection Tools for Software Engineering Datasets3
Do Performance Aspirations Matter for Guiding Software Configuration Tuning? An Empirical Investigation under Dual Performance Objectives3
What’s (Not) Working in Programmer User Studies?3
An Adaptive Search Budget Allocation Approach for Search-Based Test Case Generation3
A Comparative Study on Method Comment and Inline Comment3
Duplicate Bug Report Detection: How Far Are We?3
All in One: Design, Verification, and Implementation of SNOW-optimal Read Atomic Transactions3
Katana : Dual Slicing Based Context for Learning Bug Fixes3
A Formal Framework of Software Product Line Analyses3
Testing Feedforward Neural Networks Training Programs3
Representation Learning for Stack Overflow Posts: How Far Are We?3
IFDS-based Context Debloating for Object-Sensitive Pointer Analysis3
Coverage-Based Debloating for Java Bytecode3
Evaluating Surprise Adequacy for Deep Learning System Testing3
How Do Successful and Failed Projects Differ? A Socio-Technical Analysis3
Automatic Core-Developer Identification on GitHub: A Validation Study3
Exploring Better Black-Box Test Case Prioritization via Log Analysis3
Is My Transaction Done Yet? An Empirical Study of Transaction Processing Times in the Ethereum Blockchain Platform3
Parametric Timed Pattern Matching3
1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis3
Hierarchical Distribution-aware Testing of Deep Learning3
Software Architectural Migration3
A Taxonomy of Information Attributes for Test Case Prioritisation: Applicability, Machine Learning3
Facet-oriented Modelling3
Preference-wise Testing of Android Apps via Test Amplification3
GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks3
On the Reliability and Explainability of Language Models for Program Generation3
Anchor : Fast and Precise Value-flow Analysis for Containers via Memory Orientation3
COMET: Coverage-guided Model Generation For Deep Learning Library Testing3
Fold2Vec: Towards a Statement-Based Representation of Code for Code Comprehension3
A Machine Learning Approach for Automated Filling of Categorical Fields in Data Entry Forms3
There’s no Such Thing as a Free Lunch: Lessons Learned from Exploring the Overhead Introduced by the Greenkeeper Dependency Bot in Npm3
A Characterization Study of Merge Conflicts in Java Projects3
Similarity-based Web Element Localization for Robust Test Automation3
Guided Feature Identification and Removal for Resource-constrained Firmware3
On Wasted Contributions: Understanding the Dynamics of Contributor-Abandoned Pull Requests–A Mixed-Methods Study of 10 Large Open-Source Projects2
Security Responses in Software Development2
On the Discoverability of npm Vulnerabilities in Node.js Projects2
XCode : Towards Cross-Language Code Representation with Large-Scale Pre-Training2
QuoTe : Quality-oriented Testing for Deep Learning Systems2
Why Do Developers Reject Refactorings in Open-Source Projects?2
Storage State Analysis and Extraction of Ethereum Blockchain Smart Contracts2
How Are Multilingual Systems Constructed: Characterizing Language Use and Selection in Open-Source Multilingual Software2
HybridCISave : A Combined Build and Test Selection Approach in Continuous Integration2
Open Source License Inconsistencies on GitHub2
Mutant Reduction Evaluation: What is There and What is Missing?2
Testing Abstractions for Cyber-Physical Control Systems2
Actor-Driven Decomposition of Microservices through Multi-level Scalability Assessment2
HINNPerf: Hierarchical Interaction Neural Network for Performance Prediction of Configurable Systems2
Dissecting American Fuzzy Lop: A FuzzBench Evaluation2
NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing - RCR Report2
An Accurate Identifier Renaming Prediction and Suggestion Approach2
A First Look at Dark Mode in Real-world Android Apps2
Structured Theorem for Quantum Programs and its Applications2
Uncertainty-Aware Robustness Assessment of Industrial Elevator Systems2
Fine-Grained Coverage-Based Fuzzing2
Client-Specific Upgrade Compatibility Checking via Knowledge-Guided Discovery2
LaF: Labeling-free Model Selection for Automated Deep Neural Network Reusing2
Speeding Up Data Manipulation Tasks with Alternative Implementations2
Retrieving API Knowledge from Tutorials and Stack Overflow Based on Natural Language Queries2
What Is the Intended Usage Context of This Model? An Exploratory Study of Pre-Trained Models on Various Model Repositories2
What Constitutes the Deployment and Runtime Configuration System? An Empirical Study on OpenStack Projects2
NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing2
0.029548168182373