Automated Software Engineering

Papers
(The median citation count of Automated Software Engineering is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
BOLD: an ontology-based log debugger for C programs55
Large language models for qualitative research in software engineering: exploring opportunities and challenges52
Predicting the Defects using Stacked Ensemble Learner with Filtered Dataset50
$$AI^{2}$$: the next leap toward native language-based and explainable machine learning framework44
Parallelization of genetic algorithms for software architecture recovery44
Optimized design refactoring (ODR): a generic framework for automated search-based refactoring to optimize object-oriented software architectures41
A study on prompt design, advantages and limitations of ChatGPT for deep learning program repair38
DL4SC: a novel deep learning-based vulnerability detection framework for smart contracts38
On-the-fly unfolding with optimal exploration for linear temporal logic model checking of concurrent software and systems35
Synthetic versus real: an analysis of critical scenarios for autonomous vehicle testing32
Machine learning approach for software defect prediction using multi-core parallel computing32
Enhancing embedded systems development with TS$$^-$$30
Convolutional neural network for stock trading using technical indicators28
SSD based waste separation in smart garbage using augmented clustering NMS27
Detecting non-natural language artifacts for de-noising bug reports27
EmoReflex: an AI-powered emotion-centric developer insights platform23
Structural contrastive learning based automatic bug triaging20
Semantic context based coincidental correct test cases detection for fault localization20
Technology adoption performance evaluation applied to testing industrial REST APIs18
Tips: towards automating patch suggestion for vulnerable smart contracts18
Navigating bug cold start with contextual multi-armed bandits: an enhanced approach to developer assignment in software bug repositories18
A class integration test order generation approach based on Sarsa algorithm18
Reinforcement learning for mutation operator selection in automated program repair17
Which neural network makes more explainable decisions? An approach towards measuring explainability16
Multidimensional modeling driven from a domain language16
A three-valued model abstraction framework for PCTL* stochastic model checking16
Revisiting file context for source code summarization15
Test case selection and prioritization approach for automated regression testing using ontology and COSMIC measurement14
Identification and visualization of variability implementations in object-oriented variability-rich systems: a symmetry-based approach14
Quality assessment framework to rank software projects14
Test-suite-guided discovery of least privilege for cloud infrastructure as code14
A holistic approach to software fault prediction with dynamic classification14
TM-fuzzer: fuzzing autonomous driving systems through traffic management13
Knowledge-enhanced software refinement: leveraging reinforcement learning for search-based quality engineering13
Α tool for requirements engineering using ontologies and boilerplates13
RFMC-CS: a representation fusion based multi-view momentum contrastive learning framework for code search13
Automated test data generation and stubbing method for C/C++ embedded projects12
Sampling configurations from software product lines via probability-aware diversification and SAT solving11
MCL-VD: Multi-modal contrastive learning with LoRA-enhanced GraphCodeBERT for effective vulnerability detection11
Source code change analysis with deep learning based programming model10
Code comment generation based on graph neural network enhanced transformer model for code understanding in open-source software ecosystems10
DICE simulation: a tool for software performance assessment at the design stage10
Detecting question relatedness in programming Q&A communities via bimodal feature fusion9
Automatic recognizing relevant fragments of APIs using API references9
RCM-extractor: an automated NLP-based approach for extracting a semi formal representation model from natural language requirements9
A systematic decision-making framework for tackling quantum software engineering challenges9
Optimizing regression testing with AHP-TOPSIS metric system for effective technical debt evaluation8
Software defect prediction: future directions and challenges8
Genetic algorithms and heuristics hybridized for software architecture recovery8
Leveraging structural properties of source code graphs for just-in-time bug prediction7
SIFT: enhance the performance of vulnerability detection by incorporating structural knowledge and multi-task learning7
A systematic literature review on software security testing using metaheuristics7
Exploring the potential of general purpose LLMs in automated software refactoring: an empirical study6
Energy efficient resource allocation based on virtual network embedding for IoT data generation6
Correction to: A class integration test order generation approach based on Sarsa algorithm6
Automated requirement contradiction detection through formal logic and LLMs6
An empirical study of data sampling techniques for just-in-time software defect prediction6
Freeze-and-mutate: abnormal sample identification for DL applications through model core analysis6
Towards automatic business process redesign: an NLP based approach to extract redesign suggestions6
Coevolutionary scheduling of dynamic software project considering the new skill learning5
How to certify machine learning based safety-critical systems? A systematic literature review5
The impact of feature selection and feature reduction techniques for code smell detection: A comprehensive empirical study5
qaAskeR$$^+$$: a novel testing method for question answering software via asking recursive questions5
What information contributes to log-based anomaly detection? Insights from a configurable transformer-based approach5
A model-based DevOps process for development of mathematical database cost models5
Correction: Agile meets quantum: a novel genetic algorithm model for predicting the success of quantum software development project5
Angels or demons: investigating and detecting decentralized financial traps on ethereum smart contracts5
An empirical study of automated privacy requirements classification in issue reports5
Quantum software engineering and potential of quantum computing in software engineering research: a review5
Mathematical model of social behavior for the allocation of members in software development teams5
Actor-critic architecture based probabilistic meta-reinforcement learning for load balancing of controllers in software defined networks4
Model checking strategy-controlled systems in rewriting logic4
$$l-$$PEES-IMP: lightweight proxy re-encryption-based identity management protocol for enhancing privacy over multi-cloud environment4
MerIt: improving neural program synthesis by merging collective intelligence4
UI2HTML: utilizing LLM agents with chain of thought to convert UI into HTML code4
Does sentiment help requirement engineering: exploring sentiments in user comments to discover informative comments4
Data-driven prototyping via natural-language-based GUI retrieval4
Gradient contouring and texture modelling based CAD system for improved TB classification4
SiaLog: detecting anomalies in software execution logs using the siamese network4
Towards a behavior tree-based robotic software architecture with adjoint observation schemes for robotic software development4
A framework for conditional statement technical debt identification and description4
Semi-supervised and unsupervised anomaly detection by mining numerical workflow relations from system logs4
Prompt enhance API recommendation: visualize the user’s real intention behind this query4
Data cleaning and machine learning: a systematic literature review4
Regression test selection in test-driven development4
Future of software development with generative AI4
Knowledge-guided large language models are trustworthy API recommenders3
NexuSym: Marrying symbolic path finders with large language models3
Machine learning based predictive modeling to effectively implement DevOps practices in software organizations3
Detection of hidden privilege escalations in android3
Mobile application review summarization using chain of density prompting3
Understanding the privacy-realisticness dilemma of the metaverse3
Continuous integration of architectural performance models with parametric dependencies – the CIPM approach3
Context-aware code summarization with multi-relational graph neural network3
A systematic review of refactoring opportunities by software antipattern detection3
Contractsentry: a static analysis tool for smart contract vulnerability detection3
Sharif-TaaWS: a tool to automate unit testing of web services3
WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets3
OneLog: towards end-to-end software log anomaly detection3
On the documentation of refactoring types3
Enhancing multi-objective test case selection through the mutation operator3
Self-admitted technical debt in R: detection and causes3
Test case prioritization using test case diversification and fault-proneness estimations3
MP: motion program synthesis with machine learning interpretability and knowledge graph analogy3
FLASc: a formal algebra for labeled property graph schema2
Efficient deep-reinforcement learning aware resource allocation in SDN-enabled fog paradigm2
AdaComplete: improve DL-based code completion method’s domain adaptability2
Guest Editorial: Deep Learning in Open-Source Software Ecosystems2
Mining crowd sourcing repositories for open innovation in software engineering2
HGNNLink: recovering requirements-code traceability links with text and dependency-aware heterogeneous graph neural networks2
Ladle: a method for unsupervised anomaly detection across log types2
A symbolic execution-based method to perform untargeted attack on feed-forward neural networks2
Using data mining techniques to generate test cases from graph transformation systems specifications2
iALBMAD: an improved agile-based layered approach for mobile app development2
AIDM: artificial intelligent for digital museum autonomous system with mixed reality and software-driven data collection and analysis2
Automated verification of concurrent go programs via bounded model checking2
Measuring the impact of predictive models on the software project: A cost, service time, and risk evaluation of a metric-based defect severity prediction model2
An extensive study of the effects of different deep learning models on code vulnerability detection in Python code2
QUARE: towards a question-answering model for requirements elicitation2
UAV surveillance for violence detection and individual identification2
HQLgen: deep learning based HQL query generation from program context2
Directed Artificial Bee Colony algorithm with revamped search strategy to solve global numerical optimization problems2
Meta network attention-based feature matching for heterogeneous defect prediction2
Static data-flow analysis for software product lines in C2
A study on cross-project fault prediction through resampling and feature reduction along with source projects selection2
Exploring the impact of data preprocessing techniques on composite classifier algorithms in cross-project defect prediction2
A survey on robustness attacks for deep code models2
Intelligent software-driven immersive environment for online political guiding based on brain-computer interface and autonomous systems2
GenerativeGI: creating generative art with genetic improvement2
Using model-driven engineering to automate software language translation2
0.043844938278198