IEEE Transactions on Software Engineering

Papers
(The TQCC of IEEE Transactions on Software Engineering is 12. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Machine Learning Testing: Survey, Landscapes and Horizons305
Smart Contract Development: Challenges and Opportunities279
The Art, Science, and Engineering of Fuzzing: A Survey161
The Impact of Class Rebalancing Techniques on the Performance and Interpretation of Defect Prediction Models157
Deep Semantic Feature Learning for Software Defect Prediction149
Fault Analysis and Debugging of Microservice Systems: Industrial Survey, Benchmark System, and Empirical Study141
Deep Learning Based Vulnerability Detection: Are We There Yet?121
An Empirical Study of Fault Localization Families and Their Combinations118
SEQUENCER: Sequence-to-Sequence Learning for End-to-End Program Repair104
ARJA: Automated Repair of Java Programs via Multi-Objective Genetic Programming93
Perceptions, Expectations, and Challenges in Defect Prediction79
Defining Smart Contract Defects on Ethereum79
Automatic Feature Learning for Predicting Vulnerable Software Components72
RefactoringMiner 2.071
Data Quality Matters: A Case Study on Data Label Correctness for Security Bug Report Prediction66
Metamorphic Relations for Enhancing System Understanding and Use64
Service Candidate Identification from Monolithic Systems Based on Execution Traces60
An Empirical Study of Model-Agnostic Techniques for Defect Prediction Models59
Cognitive Biases in Software Engineering: A Systematic Mapping Study56
Checking Smart Contracts With Structural Code Embedding55
Mining Fix Patterns for FindBugs Violations54
A Survey on Adaptive Random Testing54
Beyond Technical Aspects: How Do Community Smells Influence the Intensity of Code Smells?53
Chaff from the Wheat: Characterizing and Determining Valid Bug Reports52
Finding Faster Configurations Using FLASH51
Comparing Methods for Large-Scale Agile Software Development: A Systematic Literature Review50
The Impact of Mislabeled Changes by SZZ on Just-in-Time Defect Prediction46
The Impact of Correlated Metrics on the Interpretation of Defect Models45
Toxic Code Snippets on Stack Overflow44
Reinforcement-Learning-Guided Source Code Summarization Using Hierarchical Attention43
How Practitioners Perceive Automated Bug Report Management Techniques43
DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode42
Predicting Defective Lines Using a Model-Agnostic Technique41
Deep Learning Based Code Smell Detection40
Automatically Assessing Code Understandability40
Revisiting Supervised and Unsupervised Methods for Effort-Aware Cross-Project Defect Prediction40
Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark40
Today Was a Good Day: The Daily Life of Software Developers39
A Comparison of Natural Language Understanding Platforms for Chatbots in Software Engineering38
An Empirical Study of Boosting Spectrum-Based Fault Localization via PageRank37
ElementRank: Ranking Java Software Classes and Packages using a Multilayer Complex Network-Based Approach37
App Store Effects on Software Engineering Practices37
Automating Intention Mining37
Just-In-Time Defect Identification and Localization: A Two-Phase Framework36
Historical Spectrum Based Fault Localization36
A Systematic Literature Review on Bad Smells–5 W's: Which, When, What, Who, Where35
Methodological Principles for Reproducible Performance Evaluation in Cloud Computing35
Specification Patterns for Robotic Missions35
What Do Package Dependencies Tell Us About Semantic Versioning?35
Exploring Community Smells in Open-Source: An Automated Approach35
The Impact of Feature Importance Methods on the Interpretation of Defect Classifiers34
Socio-Technical Grounded Theory for Software Engineering34
A Qualitative Study of the Benefits and Costs of Logging From Developers’ Perspectives34
RefDiff 2.0: A Multi-Language Refactoring Detection Tool34
An Empirical Study of Obsolete Answers on Stack Overflow33
The Adoption of JavaScript Linters in Practice: A Case Study on ESLint33
A Test Case Prioritization Genetic Algorithm Guided by the Hypervolume Indicator33
CODIT: Code Editing With Tree-Based Neural Models33
An Empirical Study on Heterogeneous Defect Prediction Approaches33
Mining Likely Analogical APIs Across Third-Party Libraries via Large-Scale Unsupervised API Semantics Embedding33
A Large Scale Study of Long-Time Contributor Prediction for GitHub Projects33
Deep Transfer Bug Localization32
Understanding and Detecting Fragmentation-Induced Compatibility Issues for Android Apps32
On the Nature of Merge Conflicts: A Study of 2,731 Open Source Java Projects Hosted by GitHub31
Too Many User-Reviews! What Should App Developers Look at First?31
Using K-core Decomposition on Class Dependency Networks to Improve Bug Prediction Model's Practical Performance31
Search-Based Crash Reproduction and Its Impact on Debugging30
Finding Critical Scenarios for Automated Driving Systems: A Systematic Mapping Study30
A Look into Programmers’ Heads30
What Predicts Software Developers’ Productivity?30
What Do Programmers Discuss About Blockchain? A Case Study on the Use of Balanced LDA and the Reference Architecture of a Domain to Capture Online Discussions About Blockchain Platforms Across Stack E29
The Effectiveness of Supervised Machine Learning Algorithms in Predicting Software Refactoring28
Bridging Semantic Gaps between Natural Languages and APIs with Word Embedding28
A Longitudinal Study of Application Structure and Behaviors in Android28
A Combinatorial Testing-Based Approach to Fault Localization28
Companies’ Participation in OSS Development–An Empirical Study of OpenStack28
Why My App Crashes? Understanding and Benchmarking Framework-Specific Exceptions of Android Apps28
Towards Security Threats of Deep Learning Systems: A Survey28
ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking27
Automatic Mining of Opinions Expressed About APIs in Stack Overflow27
An Interactive and Dynamic Search-Based Approach to Software Refactoring Recommendations27
What's Wrong with My Benchmark Results? Studying Bad Practices in JMH Benchmarks26
A Progression Model of Software Engineering Goals, Challenges, and Practices in Start-Ups26
Towards a Theory of Software Developer Job Satisfaction and Perceived Productivity26
Automatic Detection and Repair Recommendation of Directive Defects in Java API Documentation25
How Do Users Revise Answers on Technical Q&A Websites? A Case Study on Stack Overflow25
DeepLineDP: Towards a Deep Learning Approach for Line-Level Defect Prediction25
How to “DODGE” Complex Software Analytics24
Diversified Third-Party Library Prediction for Mobile App Development24
Why Do Software Developers Use Static Analysis Tools? A User-Centered Study of Developer Needs and Motivations24
The State of Serverless Applications: Collection, Characterization, and Community Consensus24
Human Values in Software Engineering: Contrasting Case Studies of Practice24
Lightweight Assessment of Test-Case Effectiveness Using Source-Code-Quality Indicators24
Architecture Anti-Patterns: Automatically Detectable Violations of Design Principles24
Easy-to-Deploy API Extraction by Multi-Level Feature Embedding and Transfer Learning24
Quality of Automated Program Repair on Real-World Defects24
Reinforcement Learning for Test Case Prioritization24
Dealing with Non-Functional Requirements in Model-Driven Development: A Survey24
An Empirical Study on the Usage of Transformer Models for Code Completion24
Platform-Independent Dynamic Taint Analysis for JavaScript23
Software Configuration Engineering in Practice Interviews, Survey, and Systematic Literature Review23
Analyzing Families of Experiments in SE: A Systematic Mapping Study23
Automated Classification of Overfitting Patches With Statically Extracted Code Features23
On Scheduling Constraint Abstraction for Multi-Threaded Program Verification23
What Makes Agile Software Development Agile?22
Neural Transfer Learning for Repairing Security Vulnerabilities in C Code22
Review Dynamics and Their Impact on Software Quality22
A Taxonomy of Inter-Team Coordination Mechanisms in Large-Scale Agile22
How to Evaluate Solutions in Pareto-Based Search-Based Software Engineering: A Critical Review and Methodological Guidance22
Gender Differences in Personality Traits of Software Engineers22
Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning22
Automatic Generation of Acceptance Test Cases From Use Case Specifications: An NLP-Based Approach22
How Well Do Change Sequences Predict Defects? Sequence Learning from Software Changes22
SEGRESS: Software Engineering Guidelines for REporting Secondary Studies21
Accessible or Not? An Empirical Investigation of Android App Accessibility21
The Effect of Work Environments on Productivity and Satisfaction of Software Engineers21
An Empirical Study of Dependency Downgrades in the npm Ecosystem21
The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study21
Effects of Personality Traits on Pull Request Acceptance21
Characterizing Crowds to Better Optimize Worker Recommendation in Crowdsourced Testing21
Which Commits Can Be CI Skipped?21
Coverage Prediction for Accelerating Compiler Testing21
A Machine Learning Approach to Improve the Detection of CI Skip Commits21
Within-Project Defect Prediction of Infrastructure-as-Code Using Product and Process Metrics20
Emotions and Perceived Productivity of Software Developers at the Workplace20
Codee: A Tensor Embedding Scheme for Binary Code Search20
Value-Flow-Based Demand-Driven Pointer Analysis for C and C++20
Boosting API Recommendation With Implicit Feedback20
Mind the Gap! A Study on the Transferability of Virtual Versus Physical-World Testing of Autonomous Driving Systems20
Understanding How and Why Developers Seek and Analyze API-Related Opinions20
On the Costs and Profit of Software Defect Prediction19
SOSRepair: Expressive Semantic Search for Real-World Program Repair19
Metamorphic Robustness Testing: Exposing Hidden Defects in Citation Statistics and Journal Impact Factors19
Does Reviewer Recommendation Help Developers?19
A Survey of Performance Optimization for Mobile Applications19
oo7: Low-Overhead Defense Against Spectre Attacks via Program Analysis19
Real World Scrum A Grounded Theory of Variations in Practice19
Holistic Combination of Structural and Textual Code Information for Context Based API Recommendation19
On the Value of Oversampling for Deep Learning in Software Defect Prediction19
Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies19
Modeling Functional Similarity in Source Code With Graph-Based Siamese Networks19
Requirements Engineering for Safety-Critical Systems: An Interview Study with Industry Practitioners18
CBGA-ES+: A Cluster-Based Genetic Algorithm with Non-Dominated Elitist Selection for Supporting Multi-Objective Test Optimization18
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs18
The ORIS Tool: Quantitative Evaluation of Non-Markovian Systems18
SQAPlanner: Generating Data-Informed Software Quality Improvement Plans18
How Gender-Biased Tools Shape Newcomer Experiences in OSS Projects18
BiasFinder: Metamorphic Test Generation to Uncover Bias for Sentiment Analysis Systems18
User Review-Based Change File Localization for Mobile Applications17
Uncovering the Periphery: A Qualitative Survey of Episodic Volunteering in Free/Libre and Open Source Software Communities17
Dependency Smells in JavaScript Projects17
A Fast Clustering Algorithm for Modularization of Large-Scale Software Systems17
Uncovering the Benefits and Challenges of Continuous Integration Practices17
The Effects of Human Aspects on the Requirements Engineering Process: A Systematic Literature Review16
PPChecker: Towards Accessing the Trustworthiness of Android Apps’ Privacy Policies16
Reading Answers on Stack Overflow: Not Enough!16
Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned16
Improving Vulnerability Inspection Efficiency Using Active Learning16
Systematic Evaluation and Usability Analysis of Formal Methods Tools for Railway Signaling System Design16
Studying Bad Updates of Top Free-to-Download Apps in the Google Play Store16
Identifying Self-Admitted Technical Debts With Jitterbug: A Two-Step Approach16
GPT2SP: A Transformer-Based Agile Story Point Estimation Approach16
Chatbot4QR: Interactive Query Refinement for Technical Question Retrieval16
PerfJIT: Test-Level Just-in-Time Prediction for Performance Regression Introducing Commits16
Challenges and Common Solutions in Smart Contract Development16
Enriching API Documentation with Code Samples and Usage Scenarios from Crowd Knowledge15
Evaluating Automatic Program Repair Capabilities to Repair API Misuses15
Better Data Labelling With EMBLEM (and how that Impacts Defect Prediction)15
On the Validity of Pre-Trained Transformers for Natural Language Processing in the Software Engineering Domain15
Key Stakeholders’ Value Propositions for Feature Selection in Software-Intensive Products: An Industrial Case Study15
An Interleaving Approach to Combinatorial Testing and Failure-Inducing Interaction Identification15
A Study of Feature Scattering in the Linux Kernel15
Finding Trends in Software Research15
Deep Learning Based Program Generation From Requirements Text: Are We There Yet?14
Impact of Discretization Noise of the Dependent Variable on Machine Learning Classifiers in Software Engineering14
Can Clean New Code Reduce Technical Debt Density?14
Context-Aware Personalized Crowdtesting Task Recommendation14
PackerGrind: An Adaptive Unpacking System for Android Apps14
Characterizing the Usage, Evolution and Impact of Java Annotations in Practice14
Construct Validity in Software Engineering14
Multi-Objective Software Effort Estimation: A Replication Study14
How Developers Choose Names14
The Mutation and Injection Framework: Evaluating Clone Detection Tools with Mutation Analysis14
On Company Contributions to Community Open Source Software Projects14
Are You Still Working on This? An Empirical Study on Pull Request Abandonment14
Will Dependency Conflicts Affect My Program's Semantics?14
Software Module Clustering: An In-Depth Literature Analysis14
IntRepair: Informed Repairing of Integer Overflows14
How Software Developers Mitigate Their Errors When Developing Code13
Recommending API Function Calls and Code Snippets to Support Software Development13
A Chaos Engineering System for Live Analysis and Falsification of Exception-Handling in the JVM13
Nighthawk: Fully Automated Localizing UI Display Issues via Visual Understanding13
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks13
A Deep Dive into the Impact of COVID-19 on Software Development13
The Impact of Code Review on Architectural Changes13
Practical Mutation Testing at Scale: A view from Google13
A3: Assisting Android API Migrations Using Code Examples13
Continuously Managing NFRs: Opportunities and Challenges in Practice13
PatchNet: Hierarchical Deep Learning-Based Stable Patch Identification for the Linux Kernel13
Redundancy, Context, and Preference: An Empirical Study of Duplicate Pull Requests in OSS Projects13
Exploiting Natural Language Structures in Software Informal Documentation13
Watch Out for Extrinsic Bugs! A Case Study of Their Impact in Just-In-Time Bug Prediction Models on the OpenStack Project13
A Multi-Armed Bandit Approach for Test Case Prioritization in Continuous Integration Environments13
Where2Change: Change Request Localization for App Reviews12
Including Everyone, Everywhere: Understanding Opportunities and Challenges of Geographic Gender-Inclusion in OSS12
Pathidea: Improving Information Retrieval-Based Bug Localization by Re-Constructing Execution Paths Using Logs12
Automatic Test Case and Test Oracle Generation Based on Functional Scenarios in Formal Specifications for Conformance Testing12
Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review12
Interlocking Safety Cases for Unmanned Autonomous Systems in Shared Airspaces12
Managing Episodic Volunteers in Free/Libre/Open Source Software Communities12
An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples12
Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis12
Comments on "Using k-core Decomposition on Class Dependency Networks to Improve Bug Prediction Model's Practical Performance"12
Neural Network Guided Evolutionary Fuzzing for Finding Traffic Violations of Autonomous Vehicles12
How Developers Engineer Test Cases: An Observational Study12
Simpler Hyperparameter Optimization for Software Analytics: Why, How, When?12
Dynamic Update of Discrete Event Controllers12
In Search of Socio-Technical Congruence: A Large-Scale Longitudinal Study12
0.032850027084351