IEEE Transactions on Software Engineering

Papers
(The TQCC of IEEE Transactions on Software Engineering is 14. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Mission Specification Patterns for Mobile Robots: Providing Support for Quantitative Properties444
Combining Genetic Programming and Model Checking to Generate Environment Assumptions436
Towards Scalable Model Checking of Reflective Systems via Labeled Transition Systems302
50 Years of Transactions on Software Engineering265
Confirmation Bias and Time Pressure: A Family of Experiments in Software Testing129
Answering Uncertain, Under-Specified API Queries Assisted by Knowledge-Aware Human-AI Dialogue110
The Why, When, What, and How About Predictive Continuous Integration: A Simulation-Based Investigation95
Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App94
To Do or Not to Do: Semantics and Patterns for Do Activities in UML PSSM State Machines89
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem86
Metamorphic Robustness Testing: Exposing Hidden Defects in Citation Statistics and Journal Impact Factors84
Adaptive Test Case Allocation, Selection and Generation Using Coverage Spectrum and Operational Profile84
Grammar Based Directed Testing of Machine Learning Systems83
Multi-Granularity Detector for Vulnerability Fixes82
Theoretical and Empirical Analyses of the Effectiveness of Metamorphic Relation Composition82
Review Dynamics and Their Impact on Software Quality80
A Retrospective on Whole Test Suite Generation: On the Role of SBST in the Age of LLMs73
Influence of the 1990 IEEE TSE Paper “Automated Software Test Data Generation” on Software Engineering73
DSSDPP: Data Selection and Sampling Based Domain Programming Predictor for Cross-Project Defect Prediction72
What Leads to a Confirmatory or Disconfirmatory Behavior of Software Testers?70
A Declarative Metamorphic Testing Framework for Autonomous Driving69
Prevent: An Unsupervised Approach to Predict Software Failures in Production67
Automatic Fairness Testing of Neural Classifiers Through Adversarial Sampling63
Are Your Dependencies Code Reviewed?: Measuring Code Review Coverage in Dependency Updates62
Enhancing Mobile App Bug Reporting via Real-Time Understanding of Reproduction Steps61
Recommending API Function Calls and Code Snippets to Support Software Development60
Socio-Technical Grounded Theory for Software Engineering59
Question Selection for Multi-Modal Code Search Synthesis using Probabilistic Version Spaces57
2023 Reviewers List55
A Systematic Review of IoT Systems Testing: Objectives, Approaches, Tools, and Challenges54
A Wizard of Oz Study Simulating API Usage Dialogues With a Virtual Assistant54
Measuring the Fidelity of a Physical and a Digital Twin Using Trace Alignments54
Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis54
MASTER: Multi-Source Transfer Weighted Ensemble Learning for Multiple Sources Cross-Project Defect Prediction54
Systematic Evaluation and Usability Analysis of Formal Methods Tools for Railway Signaling System Design54
An Empirical Study of Refactoring Rhythms and Tactics in the Software Development Process52
Automated Code Editing With Search-Generate-Modify52
Mitigating False Positive Static Analysis Warnings: Progress, Challenges, and Opportunities51
Robust Test Selection for Deep Neural Networks50
Mask–Mediator–Wrapper Architecture as a Data Mesh Driver48
Neural Library Recommendation by Embedding Project-Library Knowledge Graph47
GenMorph: Automatically Generating Metamorphic Relations via Genetic Programming47
Multi-Objective Software Defect Prediction via Multi-Source Uncertain Information Fusion and Multi-Task Multi-View Learning47
Mole: Efficient Crash Reproduction in Android Applications With Enforcing Necessary UI Events44
Trace Diagnostics for Signal-Based Temporal Properties43
Towards a Cognitive Model of Dynamic Debugging: Does Identifier Construction Matter?43
PerfJIT: Test-Level Just-in-Time Prediction for Performance Regression Introducing Commits42
The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers42
Enabling Good Work Habits in Software Developers through Reflective Goal-Setting42
Testing with Fewer Resources: An Adaptive Approach to Performance-Aware Test Case Generation42
Mutation Testing in Practice: Insights From Open-Source Software Developers41
T-Evos: A Large-Scale Longitudinal Study on CI Test Execution and Failure41
Esale: Enhancing Code-Summary Alignment Learning for Source Code Summarization41
A Theory of Pending Schemas in Combinatorial Testing41
Multimodal Fusion for Android Malware Detection Based on Large Pre-trained Models41
Improving Vulnerability Inspection Efficiency Using Active Learning40
An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples40
Program Synthesis for Cyber-Resilience39
Decision Support for Selecting Blockchain-Based Application Design Patterns With Layered Taxonomy and Quality Attributes39
Legion: Massively Composing Rankers for Improved Bug Localization at Adobe39
How Should Software Engineering Secondary Studies Include Grey Material?39
On the Understandability of MLOps System Architectures39
Pathidea: Improving Information Retrieval-Based Bug Localization by Re-Constructing Execution Paths Using Logs39
API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification39
Human-in-the-Loop Automatic Program Repair38
LLMorpheus: Mutation Testing using Large Language Models38
CODIT: Code Editing With Tree-Based Neural Models38
How Developers Choose Names38
Discovering Reusable Functional Features in Legacy Object-Oriented Systems37
Generalized Coverage Criteria for Combinatorial Sequence Testing37
EpiTESTER: Testing Autonomous Vehicles With Epigenetic Algorithm and Attention Mechanism37
Evolutionary generation of test suites for multi-path coverage of MPI programs with non-determinism36
TransformCode: A Contrastive Learning Framework for Code Embedding via Subtree Transformation36
Leveraging Large Language Model for Automatic Patch Correctness Assessment36
Annotative Software Product Line Analysis Using Variability-Aware Datalog35
Can Clean New Code Reduce Technical Debt Density?35
A Faceted Taxonomy of Requirements Changes in Agile Contexts34
An Experience Report on Producing Verifiable Builds for Large-Scale Commercial Systems34
Formal Equivalence Checking for Mobile Malware Detection and Family Classification34
Pull Request Decisions Explained: An Empirical Overview33
Automatic Repair of Timestamp Comparisons33
Triple Peak Day: Work Rhythms of Software Developers in Hybrid Work33
The ORIS Tool: Quantitative Evaluation of Non-Markovian Systems33
Context-Aware Personalized Crowdtesting Task Recommendation33
Metric-Based Fault Prediction for Spreadsheets33
Experimental Evaluation of Test-Driven Development With Interns Working on a Real Industrial Project32
Revisiting Test Impact Analysis in Continuous Testing From the Perspective of Code Dependencies32
Studying Ad Library Integration Strategies of Top Free-to-Download Apps32
“Estimating Software Project Effort Using Analogies”: Reflections After 28 Years32
Evaluating and Improving Unified Debugging31
What Drives and Sustains Self-Assignment in Agile Teams31
A Study About the Knowledge and Use of Requirements Engineering Standards in Industry31
SigRec: Automatic Recovery of Function Signatures in Smart Contracts31
Increasing the Confidence of Deep Neural Networks by Coverage Analysis31
A Study of Call Graph Construction for JVM-Hosted Languages31
Specializing Neural Networks for Cryptographic Code Completion Applications30
Automated Refactoring of Non-Idiomatic Python Code With Pythonic Idioms30
Detecting Continuous Integration Skip Commits Using Multi-Objective Evolutionary Search30
Automated Commit Message Generation With Large Language Models: An Empirical Study and Beyond30
Test Flakiness Across Programming Languages29
Quantitative Verification for Monitoring Event-Streaming Systems28
CloudRaid: Detecting Distributed Concurrency Bugs via Log Mining and Enhancement28
Empirical Validation of Automated Vulnerability Curation and Characterization28
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks28
Data Quality Matters: A Case Study on Data Label Correctness for Security Bug Report Prediction28
Watch Out for Extrinsic Bugs! A Case Study of Their Impact in Just-In-Time Bug Prediction Models on the OpenStack Project28
DAppSCAN: Building Large-Scale Datasets for Smart Contract Weaknesses in DApp Projects28
Mind the Gap! A Study on the Transferability of Virtual Versus Physical-World Testing of Autonomous Driving Systems27
Nighthawk: Fully Automated Localizing UI Display Issues via Visual Understanding27
Continuously Managing NFRs: Opportunities and Challenges in Practice27
Retrieval-Augmented Fine-Tuning for Improving Retrieve-and-Edit Based Assertion Generation27
Microservice Extraction Based on a Comprehensive Evaluation of Logical Independence and Performance27
How Do Developers Structure Unit Test Cases? An Empirical Analysis of the AAA Pattern in Open Source Projects27
Exploiting Natural Language Structures in Software Informal Documentation26
Effect of Requirements Analyst Experience on Elicitation Effectiveness: A Family of Quasi-Experiments26
Assessing Evaluation Metrics for Neural Test Oracle Generation26
Line-Level Defect Prediction by Capturing Code Contexts With Graph Convolutional Networks26
FlakyFix: Using Large Language Models for Predicting Flaky Test Fix Categories and Test Code Repair26
Just-In-Time Obsolete Comment Detection and Update26
Cross-Language Taint Analysis: Generating Caller-Sensitive Native Code Specification for Java26
The Analysis of Safety Critical Software Systems25
Optimization of Software Release Planning Considering Architectural Dependencies, Cost, and Value25
Understanding the Robustness of Transformer-Based Code Intelligence via Code Transformation: Challenges and Opportunities25
From Executable Specifications to Hard-to-Specify Requirements: Challenges in Describing Reactive System Behavior25
Efficient Summary Reuse for Software Regression Verification25
A Chaos Engineering System for Live Analysis and Falsification of Exception-Handling in the JVM24
A Systematic Study on Real-world Android App Bundles24
STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews24
Predictive Comment Updating With Heuristics and AST-Path-Based Neural Learning: A Two-Phase Approach24
CRPWarner: Warning the Risk of Contract-Related Rug Pull in DeFi Smart Contracts24
ASTRAEA: Grammar-based Fairness Testing24
Why My App Crashes? Understanding and Benchmarking Framework-Specific Exceptions of Android Apps24
Improving Cross-Language Code Clone Detection via Code Representation Learning and Graph Neural Networks24
Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing24
Scrutinizing Implementations of Smart Home Integrations23
A Qualitative Study of the Benefits and Costs of Logging From Developers’ Perspectives23
NumScout: Unveiling Numerical Defects in Smart Contracts using LLM-Pruning Symbolic Execution23
Forecasting the Principal of Code Technical Debt in JavaScript Applications23
On the Validity of Pre-Trained Transformers for Natural Language Processing in the Software Engineering Domain23
An Empirical Study of Model-Agnostic Techniques for Defect Prediction Models23
Deconstructing the Nature of Collaboration in Organizations Open Source Software Development: The Impact of Developer and Task Characteristics23
Beyond Literal Meaning: Uncover and Explain Implicit Knowledge in Code Through Wikipedia-Based Concept Linking23
The Effectiveness of Supervised Machine Learning Algorithms in Predicting Software Refactoring23
Predicting Defective Lines Using a Model-Agnostic Technique23
ArchHypo: Managing Software Architecture Uncertainty Using Hypotheses Engineering23
Are You Still Working on This? An Empirical Study on Pull Request Abandonment23
Hashing Fuzzing: Introducing Input Diversity to Improve Crash Detection22
A Variability Fault Localization Approach for Software Product Lines22
A Grounded Theory of Cross-Community SECOs: Feedback Diversity Versus Synchronization22
Explaining Static Analysis With Rule Graphs22
A Survey on the Use of Computer Vision to Improve Software Engineering Tasks22
Parameterized Verification of Leader/Follower Systems via Arithmetic Constraints22
How Templated Requirements Specifications Inhibit Creativity in Software Engineering22
iTCRL: Causal-Intervention-Based Trace Contrastive Representation Learning for Microservice Systems22
Stakeholder Preference Extraction From Scenarios22
RefactoringMiner 2.021
Let’s Talk With Developers, Not About Developers: A Review of Automatic Program Repair Research21
Do Pretrained Language Models Indeed Understand Software Engineering Tasks?21
Domain-Driven Design for Microservices: An Evidence-Based Investigation21
Automated Infrastructure as Code Program Testing21
Automated Use-After-Free Detection and Exploit Mitigation: How Far Have We Gone?21
Diversity-Oriented Testing for Competitive Game Agent via Constraint-Guided Adversarial Agent Training21
Mithra: Anomaly Detection as an Oracle for Cyberphysical Systems20
Syntactic Versus Semantic Similarity of Artificial and Real Faults in Mutation Testing Studies20
Unearthing Gas-Wasting Code Smells in Smart Contracts With Large Language Models20
Range Specification Bug Detection in Flight Control System Through Fuzzing20
Practical Mutation Testing at Scale: A view from Google20
SmartOracle: Generating Smart Contract Oracle via Fine-Grained Invariant Detection20
Sentinel: A Hyper-Heuristic for the Generation of Mutant Reduction Strategies20
A Comparison of Natural Language Understanding Platforms for Chatbots in Software Engineering20
Architecture Anti-Patterns: Automatically Detectable Violations of Design Principles19
Restore: Retrospective Fault Localization Enhancing Automated Program Repair19
Verification of Fuzzy Decision Trees19
The Human Side of Software Engineering Teams: An Investigation of Contemporary Challenges19
PopArt: Ranked Testing Efficiency19
TkT: Automatic Inference of Timed and Extended Pushdown Automata19
Runtime Evolution of Bitcoin's Consensus Rules19
Retrospective on: Constraint-Based Automatic Test Data Generation19
Comparative Analysis of Constraint Handling Techniques for Constrained Combinatorial Testing19
Towards More Precise Coincidental Correctness Detection With Deep Semantic Learning19
Reuse of Similarly Behaving Software Through Polymorphism-Inspired Variability Mechanisms19
Generating Structurally Realistic Models With Deep Autoregressive Networks19
Evaluating SZZ Implementations: An Empirical Study on the Linux Kernel18
Studying the Influence and Distribution of the Human Effort in a Hybrid Fitness Function for Search-Based Model-Driven Engineering18
SCAnoGenerator: Automatic Anomaly Injection for Ethereum Smart Contracts18
Concretization of Abstract Traffic Scene Specifications Using Metaheuristic Search18
Emerging App Issue Identification via Online Joint Sentiment-Topic Tracing18
Accelerating Finite State Machine-Based Testing Using Reinforcement Learning18
Engineering Within Boundaries When Software Has None17
Active Code Learning: Benchmarking Sample-Efficient Training of Code Models17
Multitask-Based Evaluation of Open-Source LLM on Software Vulnerability17
Does Treatment Adherence Impact Experiment Results in TDD?17
A Large Scale Study of Long-Time Contributor Prediction for GitHub Projects17
Easy-to-Deploy API Extraction by Multi-Level Feature Embedding and Transfer Learning17
Dealing With Data Challenges When Delivering Data-Intensive Software Solutions17
Do Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-Tail Software Through Feature Inference17
PATEN: Identifying Unpatched Third-Party APIs via Fine-Grained Patch-Enhanced AST-Level Signature17
Enhancing Trustability of Android Applications via User-Centric Flexible Permissions17
Clopper-Pearson Algorithms for Efficient Statistical Model Checking Estimation16
Examiner-Pro: Testing Arm Emulators Across Different Privileges16
Static Profiling of Alloy Models16
Heuristic and Neural Network Based Prediction of Project-Specific API Member Access16
AddressWatcher: Sanitizer-Based Localization of Memory Leak Fixes16
Darcy: Automatic Architectural Inconsistency Resolution in Java16
Software Testing With Large Language Models: Survey, Landscape, and Vision16
Finding Trends in Software Research16
An Assessment of Rules of Thumb for Software Phase Management, and the Relationship Between Phase Effort and Schedule Success16
A Framework for Emotion-Oriented Requirements Change Handling in Agile Software Engineering16
Utilizing Automatic Query Reformulations as Genetic Operations to Improve Feature Location in Software Models16
FlexFL: Flexible and Effective Fault Localization with Open-Source Large Language Models16
Learning to Predict User-Defined Types16
Stealthy Backdoor Attack for Code Models16
Fast and Precise Static Null Exception Analysis With Synergistic Preprocessing16
Recommending Participants for Collaborative Merge Sessions16
How Software Developers Mitigate Their Errors When Developing Code16
Defining Smart Contract Defects on Ethereum16
DaNuoYi: Evolutionary Multi-Task Injection Testing on Web Application Firewalls15
A Theory of Value for Value-Based Feature Selection in Software Engineering15
MultiPL-E: A Scalable and Polyglot Approach to Benchmarking Neural Code Generation15
Factors Affecting On-Time Delivery in Large-Scale Agile Software Development15
RNN-Test: Towards Adversarial Testing for Recurrent Neural Network Systems15
A Procedure to Continuously Evaluate Predictive Performance of Just-In-Time Software Defect Prediction Models During Software Development15
Automatic Generation of Acceptance Test Cases From Use Case Specifications: An NLP-Based Approach15
Characterizing Crowds to Better Optimize Worker Recommendation in Crowdsourced Testing15
A Search-Based Testing Approach for Deep Reinforcement Learning Agents15
On the Workflows and Smells of Leaderboard Operations (LBOps): An Exploratory Study of Foundation Model Leaderboards15
Reading Answers on Stack Overflow: Not Enough!15
A Retrospective of Proving the Correctness of Multiprocess Programs15
IntRepair: Informed Repairing of Integer Overflows14
IoTCom: Dissecting Interaction Threats in IoT Systems14
Distilling Quality Enhancing Comments From Code Reviews to Underpin Reviewer Recommendation14
Active Learning of Discriminative Subgraph Patterns for API Misuse Detection14
Neural Transfer Learning for Repairing Security Vulnerabilities in C Code14
Let's Go to the Whiteboard (Again): Perceptions From Software Architects on Whiteboard Architecture Meetings14
Pride: Prioritizing Documentation Effort Based on a PageRank-Like Algorithm and Simple Filtering Rules14
Enforcing Correctness of Collaborative Business Processes Using Plans14
Comparing Block-Based Programming Models for Two-Armed Robots14
TrinityRCL: Multi-Granular and Code-Level Root Cause Localization Using Multiple Types of Telemetry Data in Microservice Systems14
Safety and Performance, Why Not Both? Bi-Objective Optimized Model Compression Against Heterogeneous Attacks Toward AI Software Deployment14
0.20273303985596