ACM Transactions on Software Engineering and Methodology

Papers
(The TQCC of ACM Transactions on Software Engineering and Methodology is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Finding Information Leaks with Information Flow Fuzzing—RCR Report581
Automatic Identification of Game Stuttering via Gameplay Videos Analysis164
SPENCER: Self-Adaptive Model Distillation for Efficient Code Retrieval137
TestLoop: A Process Model Describing Human-in-the-Loop Software Test Suite Generation131
KAPE: k NN-based Performance Testing for Deep Code Search115
History-Driven Fuzzing for Deep Learning Libraries115
Bounded Verification of Atomicity Violations for Interrupt-Driven Programs via Lazy Sequentialization112
An Empirical Analysis of Machine Learning Model and Dataset Documentation, Supply Chain, and Licensing Challenges on Hugging Face106
FairGenerate: Enhancing Fairness through Synthetic Data Generation and Two-Fold Biased Labels Removal100
An empirical study on vulnerability disclosure management of open source software systems98
Mutant Reduction Evaluation: What is There and What is Missing?94
A Survey on Failure Analysis and Fault Injection in AI Systems93
Antidote or Placebo? Unraveling the Efficacy of Neuron Coverage Criteria on Testing Transformer-based Language Models86
Assessing the Robustness of Test Selection Methods for Deep Neural Networks82
Horus : Accelerating Kernel Fuzzing through Efficient Host-VM Memory Access Procedures79
Preference-wise Testing of Android Apps via Test Amplification77
Understanding the OSS Communities of Deep Learning Frameworks: A Comparative Case Study of P y T orch and T ensor75
M2CVD: Enhancing Vulnerability Understanding through Multi-Model Collaboration for Code Vulnerability Detection73
Test Generation Strategies for Building Failure Models and Explaining Spurious Failures70
FoC: Figure Out the Cryptographic Functions in Stripped Binaries with LLMs70
Enhancing Android Malware Detection: The Influence of ChatGPT on Decision-centric Task69
I Depended on You and You Broke Me: An Empirical Study of Manifesting Breaking Changes in Client Packages69
Unraveling the Key of Machine Learning-based Android Malware Detection68
Communicating Study Design Trade-offs in Software Engineering68
Neuron Semantic-Guided Test Generation for Deep Neural Networks Fuzzing67
Deceiving Humans and Machines Alike: Search-based Test Input Generation for DNNs Using Variational Autoencoders65
An Empirical Study of the Non-Determinism of ChatGPT in Code Generation59
Towards Reliable Generation of Executable Workflows by Foundation Models59
A Systematic Literature Review on Large Language Models for Automated Program Repair57
Securing the Ethereum from Smart Ponzi Schemes: Identification Using Static Features56
Reusing d-DNNFs for Efficient Feature-Model Counting54
Better Supporting Human Aspects in Mobile eHealth Apps: Development and Validation of Enhanced Guidelines54
An Empirical Study on Governance in Bitcoin’s Consensus Evolution53
Actionable Framework for Understanding and Improving Social and Human Factors that Influence the Requirements Management in Software Ecosystems52
Storage State Analysis and Extraction of Ethereum Blockchain Smart Contracts50
FormatFuzzer : Effective Fuzzing of Binary File Formats49
Characterizing Deep Learning Package Supply Chains in PyPI: Domains, Clusters, and Disengagement46
Deep API Sequence Generation via Golden Solution Samples and API Seeds45
Toward Interpretable Graph Tensor Convolution Neural Network for Code Semantics Embedding44
Fine-Tuning Large Language Models to Improve Accuracy and Comprehensibility of Automated Code Review44
I Know What You Are Searching for: Code Snippet Recommendation from Stack Overflow Posts44
Do Current Language Models Support Code Intelligence for R Programming Language?44
Supporting Emotional Intelligence, Productivity and Team Goals while Handling Software Requirements Changes43
HeMiRCA: Fine-Grained Root Cause Analysis for Microservices with Heterogeneous Data Sources43
Stakeholder Value Criteria for Technical Debt Acquisition Decisions: An Empirical Analysis41
A Comprehensive View on TD Prevention Practices and Reasons for Not Preventing It40
Try with Simpler - An Evaluation of Improved Principal Component Analysis in Log-based Anomaly Detection38
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks - RCR Report38
PVDetector: Pretrained Vulnerability Detection on Vulnerability-enriched Code Semantic Graph38
JavaScript SBST Heuristics to Enable Effective Fuzzing of NodeJS Web APIs36
Introducing Interactions in Multi-Objective Optimization of Software Architectures35
Help Them Understand: Testing and Improving Voice User Interfaces35
Assessing and Analyzing the Correctness of GitHub Copilot’s Code Suggestions35
Enhancing Security and Acuity of Smart Contract Vulnerability Detection Based on Federated Learning and BiLSTM-Attention34
Estimating Uncertainty in Labeled Changes by SZZ Tools on Just-In-Time Defect Prediction33
Systematic Literature Review on Software Security Vulnerability Information Extraction32
FAVDisco : Modeling and Discovering File Access Vulnerabilities32
Surveying the Benchmarking Landscape of Large Language Models in Code Intelligence32
JIT-DCK: A KAN Multi-Task Model for Just-In-Time Code Defect Prediction and Localization32
Towards Automating Domain-Specific Data Generation for Text-to-SQL: A Comprehensive Approach32
Can LLMs Hack Enterprise Networks? — RCR Report32
Towards an Oracle for Binary Decomposition Under Compilation Variance31
On-the-fly Generation-Quality Enhancement of Deep Code Models via Model Collaboration31
Reinforcement Learning Informed Evolutionary Search for Autonomous Systems Testing31
A Survey of Learning-based Automated Program Repair31
An Accurate Identifier Renaming Prediction and Suggestion Approach31
Assessing the Early Bird Heuristic (for Predicting Project Quality)31
Single and Multi-objective Test Cases Prioritization for Self-driving Cars in Virtual Environments31
JIT-MTL: Just-in-Time Defect Localization and Prediction with Multi-Task Learning31
ADSDx: Towards Automated Accident Diagnosis for High-level Autonomous Driving Systems30
GIST : Generated Inputs Sets Transferability in Deep Learning30
Editorial: Toward the Future with Eight Issues Per Year30
Code-Enhanced Cross-Perspective Bug Question Retrieval29
Editorial: ICSE and the Incredible Contradictions of Software Engineering29
PatchCensor: Patch Robustness Certification for Transformers via Exhaustive Testing29
Assessing and Improving an Evaluation Dataset for Detecting Semantic Code Clones via Deep Learning29
AutoRIC: Automated Neural Network Repairing Based on Constrained Optimization29
SimClone: Detecting Tabular Data Clones Using Value Similarity28
Vulnerability Repair via Concolic Execution and Code Mutations28
Towards On-the-Fly Code Performance Profiling28
A Survey of Learning-based Method Name Prediction28
APIRO: A Framework for Automated Security Tools API Recommendation27
Contemporary Software Modernization: Strategies, Driving Forces, and Research Opportunities27
Exploring Data-Efficient Adaptation of Large Language Models for Code Generation27
Mapping the Trust Terrain: LLMs in Software Engineering - Insights and Perspectives27
Revisiting the Identification of the Co-evolution of Production and Test Code27
SCOPE : Performance Testing for Serverless Computing26
Towards AI-Native Software Engineering (SE 3.0): A Vision and a Challenge Roadmap26
SimADFuzz: Simulation-Feedback Fuzz Testing for Autonomous Driving Systems26
A Systematic Literature Review of Multi-Label Learning in Software Engineering26
An Empirical Study on GitHub Pull Requests’ Reactions26
Detection of Technical Debt in Java Source Code26
Why Do GitHub Actions Workflows Fail? An Empirical Study25
Leveraging Reviewer Experience in Code Review Comment Generation25
When Fine-Tuning LLMs Meets Data Privacy: An Empirical Study of Federated Learning in LLM-Based Program Repair25
An Empirical Study of Retrieval-Augmented Code Generation: Challenges and Opportunities25
Actor-Driven Decomposition of Microservices through Multi-level Scalability Assessment24
Cleaning Up Confounding: Accounting for Endogeneity Using Instrumental Variables and Two-Stage Models24
Security of Language Models for Code: A Systematic Literature Review24
Automatic Rule Checking for Microservices: Supporting Security Analysis with Explainability24
SourcererJBF: A Java Build Framework For Large-Scale Compilation24
A Characterization Study of Merge Conflicts in Java Projects24
You Don’t Have to Say Where to Edit! jLED—Joint Learning to Localize and Edit Source Code23
Learning from Very Little Data: On the Value of Landscape Analysis for Predicting Software Project Health23
Exploring Fine-Grained Bug Report Categorization with Large Language Models and Prompt Engineering: An Empirical Study23
Towards Learning Generalizable Code Embeddings Using Task-agnostic Graph Convolutional Networks23
Simulator-based Explanation and Debugging of Hazard-triggering Events in DNN-based Safety-critical Systems22
Test Input Prioritization for 3D Point Clouds22
Ethical Prompt Engineering for AI-driven SE: Evidence-informed Interaction-time Governance Roadmap to 203022
Demo2Test: Transfer Testing of Agent in Competitive Environment with Failure Demonstrations21
Monitoring Data for Anomaly Detection in Cloud-Based Systems: A Systematic Mapping Study21
Commit Messages Generation Based on Core Changes21
Graphuzz: Data-driven Seed Scheduling for Coverage-guided Greybox Fuzzing21
MR-Scout: Automated Synthesis of Metamorphic Relations from Existing Test Cases21
Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors21
Characterizing Installation- and Run-time Compatibility Issues in Android Benign Apps and Malware21
Demystifying Hidden Sensitive Operations in Android Apps21
MeDeT: Medical Device Digital Twins Creation with Few-shot Meta-learning20
A Comprehensive Empirical Study of Bias Mitigation Methods for Machine Learning Classifiers20
Certified Cost Bounds for Abstract Programs20
Programming Smart Playtesting20
Exploring the Capabilities of LLMs for Code-Change-Related Tasks20
Automating TODO-missed Methods Detection and Patching20
Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers20
Efficient Multivariate Time Series Anomaly Detection through Transfer Learning for Large-Scale Software Systems20
PonziHunter: Hunting Ethereum Ponzi Contract via Static Analysis and Contrastive Learning on the Bytecode Level19
A Roadmap for Integrating Sustainability into Software Engineering Education19
Efficient Management of Containers for Software Defined Vehicles19
Adaptive Modelling Languages: Abstract Syntax and Model Migration19
Evolution-Aware Constraint Derivation Approach for Software Remodularization19
Coverage-directed Differential Testing of X.509 Certificate Validation in SSL/TLS Implementations19
Stress Testing Control Loops in Cyber-Physical Systems—RCR Report19
Interpreting Deep Neural Networks via Relative Activation-Deactivation Abstractions19
Variable Renaming-Based Adversarial Test Generation for Code Model: Benchmark and Enhancement19
Is It Hard to Generate Holistic Commit Message?19
Duplicate Bug Report Detection: How Far Are We?19
Measuring and Clustering Heterogeneous Chatbot Designs18
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks18
Generation-based Differential Fuzzing for Deep Learning Libraries18
Developer Perspectives on Licensing and Copyright Issues Arising from Generative AI for Software Development18
Automatically Checking Semantic Equivalence between Versions of Large-Scale C Projects18
Fold2Vec: Towards a Statement-Based Representation of Code for Code Comprehension18
Improving Deep Assertion Generation via Fine-Tuning Retrieval-Augmented Pre-trained Language Models18
Fairness Concerns in App Reviews: A Study on AI-Based Mobile Apps18
Autonomous Driving System Testing via Diversity-Oriented Driving Scenario Exploration18
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities18
Testing Causality in Scientific Modelling Software18
Bypassing Guardrails: Lessons Learned from Red Teaming ChatGPT17
Exploring Development Methods for Reactive Synthesis Specifications17
A Comparative Study on Method Comment and Inline Comment17
Visualization Task Taxonomy to Understand the Fuzzing Internals17
SPOLRE: Semantic Preserving Object Layout Reconstruction for Image Captioning System Testing17
Inferring Input Grammars from Code with Symbolic Parsing17
MORepair : Teaching LLMs to Repair Code via Multi-Objective Fine-Tuning17
The Influence of Human Aspects on Requirements Engineering-related Activities: Software Practitioners’ Perspective17
Can GitHub Issues Help in App Review Classifications?17
Enhancing Task In-Progress Time Predictions through Affective and Personality Factors17
LogUpdater : Automated Detection and Repair of Specific Defects in Logging Statements17
On the Significance of Category Prediction for Code-Comment Synchronization17
On the Impact of Lower Recall and Precision in Defect Prediction for Guiding Search-based Software Testing17
Differentiable Quantum Programming with Unbounded Loops16
C2|Q>: A Robust Framework for Bridging Classical and Quantum Software Development16
Reference-Based Retrieval-Augmented Unit Test Generation16
Reputation Gaming in Crowd Technical Knowledge Sharing16
Software Vulnerabilities as Cognitive Blindspots; Assessing the Suitability of a Dual Processing Theory of Decision Making for Secure Coding16
On the Reruns of GitHub Actions Workflows16
AI for DevSecOps: A Landscape and Future Opportunities16
Assessing and Advancing Benchmarks for Evaluating Large Language Models in Software Engineering Tasks15
DiPri : Distance-Based Seed Prioritization for Greybox Fuzzing15
NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing15
Studying the Impact of TensorFlow and PyTorch Bindings on Machine Learning Software Quality15
Survey of Code Search Based on Deep Learning15
A Comprehensive Multi-Vocal Empirical Study of ML Cloud Service Misuses15
Automatic Core-Developer Identification on GitHub: A Validation Study15
Understanding the Fundamental Design Decisions of Retrieval-Augmented Generation Systems15
AdaptiveLog: An Adaptive Log Analysis Framework with the Collaboration of Large and Small Language Model15
Complete, Sound, and Scalable Identification of Minimal Failure-Causing Schema15
Input Distribution Coverage: Measuring Feature Interaction Adequacy in Neural Network Testing15
CITYWALK : Enhancing LLM-Based C++ Unit Test Generation via Project-Dependency Awareness and Language-Specific Knowledge15
Revisiting Vulnerability Patch Identification on Data in the Wild15
An Interleaving Guided Metamorphic Testing Approach for Concurrent Programs15
Refactoring in Computational Notebooks15
Preparation and Utilization of Mixed States for Testing Quantum Programs15
Challenges in Testing Large Language Model Based Software: A Faceted Taxonomy15
Understanding Real-Time Collaborative Programming: A Study of Visual Studio Live Share14
A Large-Scale Empirical Evaluation of LLMs for Automated Self-Admitted Technical Debt Repayment14
Sustainability of Machine Learning-Enabled Systems: The Machine Learning Practitioner’s Perspective14
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis14
The IDEA of Us: An Identity-Aware Architecture for Autonomous Systems14
Obfuscated Clone Search in JavaScript based on Reinforcement Subsequence Learning14
Can Coverage Criteria Guide Failure Discovery for Image Classifiers? An Empirical Study14
Identifying and Explaining Safety-critical Scenarios for Autonomous Vehicles via Key Features14
Mitigating Regression Faults Induced by Feature Evolution in Deep Learning Systems14
PanicFI: An Infrastructure for Fixing Panic Bugs in Real-World Rust Programs14
VulDeNoise: Outlier Detection to Reduce Label Noises for Effective Vulnerability Detection14
Data Complexity: A New Perspective for Analyzing the Difficulty of Defect Prediction Tasks13
Fast, Fine-Grained Equivalence Checking for Neural Decompilers13
What Constitutes the Deployment and Runtime Configuration System? An Empirical Study on OpenStack Projects13
Test Oracle Generation for REST APIs13
How Do Successful and Failed Projects Differ? A Socio-Technical Analysis13
A Hypothesis Testing-based Framework for Software Cross-modal Retrieval in Heterogeneous Semantic Spaces13
Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective13
Large Language Models for Cyber Security: A Systematic Literature Review13
Mobile Application Online Cross-Project Just-in-Time Software Defect Prediction Framework13
Software Engineering by and for Humans in an AI Era13
Let’s Discover More API Relations: A Large Language Model-Based AI Chain for Unsupervised API Relation Inference13
Testing RESTful APIs: A Survey13
Booster: Effective and Efficient Web GUI Trace Reduction Based on Multi-Level State Abstraction and Time-Guided Hierarchical Delta Debugging13
BiRD: Race Detection in Software Binaries under Relaxed Memory Models13
Revisiting Sentiment Analysis for Software Engineering in the Era of Large Language Models13
Theory of Troubleshooting: The Developer’s Cognitive Experience of Overcoming Confusion13
Understanding Inconsistent State Update Vulnerabilities in Smart Contracts13
Grammar Mutation for Testing Input Parsers12
Analysis of EMF meta-model duplication in open-source repositories12
An Empirical Study on the Relationship between Defects and Source Code’s Unnaturalness12
Toward Better Comprehension of Breaking Changes in the NPM Ecosystem12
Identifying Performance Issues in Cloud Service Systems Based on Relational-Temporal Features12
CCIHunter: Enhancing Smart Contract Code-Comment Inconsistencies Detection via Two-Stage Pre-training12
Revealing the Unseen: AI Chain on LLMs for Predicting Implicit Dataflows to Generate Dataflow Graphs in Dynamically Typed Code12
Decision Support Model for Selecting the Optimal Blockchain Oracle Platform: An Evaluation of Key Factors12
Open Problems in Fuzzing RESTful APIs: A Comparison of Tools12
Representation Learning for Stack Overflow Posts: How Far Are We?12
Exploring JVM Garbage Collector Testing with Event-Coverage12
Automated Abstract Transformer Synthesis for Reduced Product Domains12
Divide-and-Conquer: Automating Code Revisions via Localization-and-Revision12
Verification Witnesses12
Large Language Model for Vulnerability Detection and Repair: Literature Review and the Road Ahead12
Simulating Software Evolution to Evaluate the Reliability of Early Decision-making among Design Alternatives toward Maintainability12
Fairness Testing of Machine Translation Systems12
Addressing OSS Community Managers’ Challenges in Contributor Retention12
The Havoc Paradox in Generator-Based Fuzzing—RCR Report12
Less Is More: Unlocking Semi-Supervised Deep Learning for Vulnerability Detection12
How the Quality of Maintenance Tasks is Affected by Criteria for Selecting Engineers for Collaboration12
Editorial: The End of the Journey12
Some Seeds Are Strong: Seeding Strategies for Search-based Test Case Selection12
Influential Global and Local Contexts Guided Trace Representation for Fault Localization11
Digital Twin-based Anomaly Detection with Curriculum Learning in Cyber-physical Systems11
DRIVE: Dockerfile Rule Mining and Violation Detection11
As Long As I See It - OSVHunter: Understanding and Detecting Open-Secret Vulnerabilities in Smart Contracts11
AceCoder : An Effective Prompting Technique Specialized in Code Generation11
From Triumph to Uncertainty: The Journey of Software Engineering in the AI Era11
Recommending Variable Names for Extract Local Variable Refactorings11
Finding Information Leaks with Information Flow Fuzzing11
Making Software Development More Diverse and Inclusive: Key Themes, Challenges, and Future Directions11
Prompt-Based Code Completion via Multi-Retrieval Augmented Generation11
Benchmarking and Categorizing the Performance of Neural Program Repair Systems for Java11
Identifying Affected Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and Libraries11
A Review of Learning-based Smart Contract Vulnerability Detection: A Perspective on Code Representation11
Automated Identification of Toxic Code Reviews Using ToxiCR11
Model Driven Engineering, Artificial Intelligence, and DevOps for Software and Systems Engineering: A Systematic Mapping Study of Synergies and Challenges11
0.063326120376587