Automated Software Engineering

Papers
(The median citation count of Automated Software Engineering is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Predicting the Defects using Stacked Ensemble Learner with Filtered Dataset46
BOLD: an ontology-based log debugger for C programs43
Large language models for qualitative research in software engineering: exploring opportunities and challenges42
$$AI^{2}$$: the next leap toward native language-based and explainable machine learning framework39
Parallelization of genetic algorithms for software architecture recovery35
DL4SC: a novel deep learning-based vulnerability detection framework for smart contracts30
ANCHOR: locating android framework-specific crashing faults30
Optimized design refactoring (ODR): a generic framework for automated search-based refactoring to optimize object-oriented software architectures30
A study on prompt design, advantages and limitations of ChatGPT for deep learning program repair28
Synthetic versus real: an analysis of critical scenarios for autonomous vehicle testing28
Machine learning approach for software defect prediction using multi-core parallel computing25
Enhancing embedded systems development with TS$$^-$$25
SSD based waste separation in smart garbage using augmented clustering NMS22
Convolutional neural network for stock trading using technical indicators21
Semantic context based coincidental correct test cases detection for fault localization20
EmoReflex: an AI-powered emotion-centric developer insights platform19
Detecting non-natural language artifacts for de-noising bug reports19
Technology adoption performance evaluation applied to testing industrial REST APIs15
A class integration test order generation approach based on Sarsa algorithm15
Navigating bug cold start with contextual multi-armed bandits: an enhanced approach to developer assignment in software bug repositories15
Reinforcement learning for mutation operator selection in automated program repair14
A three-valued model abstraction framework for PCTL* stochastic model checking14
Which neural network makes more explainable decisions? An approach towards measuring explainability14
Tips: towards automating patch suggestion for vulnerable smart contracts14
Investigation and prediction of open source software evolution using automated parameter mining for agent-based simulation14
Revisiting file context for source code summarization13
Multidimensional modeling driven from a domain language12
TM-fuzzer: fuzzing autonomous driving systems through traffic management12
Test-suite-guided discovery of least privilege for cloud infrastructure as code12
Identification and visualization of variability implementations in object-oriented variability-rich systems: a symmetry-based approach12
Test case selection and prioritization approach for automated regression testing using ontology and COSMIC measurement12
A holistic approach to software fault prediction with dynamic classification12
Automated test data generation and stubbing method for C/C++ embedded projects11
Knowledge-enhanced software refinement: leveraging reinforcement learning for search-based quality engineering11
Quality assessment framework to rank software projects11
Α tool for requirements engineering using ontologies and boilerplates10
RFMC-CS: a representation fusion based multi-view momentum contrastive learning framework for code search10
Sampling configurations from software product lines via probability-aware diversification and SAT solving9
DICE simulation: a tool for software performance assessment at the design stage9
Code comment generation based on graph neural network enhanced transformer model for code understanding in open-source software ecosystems9
RCM-extractor: an automated NLP-based approach for extracting a semi formal representation model from natural language requirements9
Genetic algorithms and heuristics hybridized for software architecture recovery8
Detecting question relatedness in programming Q&A communities via bimodal feature fusion8
Software defect prediction: future directions and challenges8
Automatic recognizing relevant fragments of APIs using API references8
Leveraging structural properties of source code graphs for just-in-time bug prediction8
A systematic decision-making framework for tackling quantum software engineering challenges8
Source code change analysis with deep learning based programming model8
Optimizing regression testing with AHP-TOPSIS metric system for effective technical debt evaluation7
SIFT: enhance the performance of vulnerability detection by incorporating structural knowledge and multi-task learning7
A systematic literature review on software security testing using metaheuristics7
Automated requirement contradiction detection through formal logic and LLMs7
Angels or demons: investigating and detecting decentralized financial traps on ethereum smart contracts6
An empirical study of automated privacy requirements classification in issue reports6
Towards automatic business process redesign: an NLP based approach to extract redesign suggestions6
Exploring the potential of general purpose LLMs in automated software refactoring: an empirical study6
Freeze-and-mutate: abnormal sample identification for DL applications through model core analysis6
Does sentiment help requirement engineering: exploring sentiments in user comments to discover informative comments5
qaAskeR$$^+$$: a novel testing method for question answering software via asking recursive questions5
Coevolutionary scheduling of dynamic software project considering the new skill learning5
Quantum software engineering and potential of quantum computing in software engineering research: a review5
Mathematical model of social behavior for the allocation of members in software development teams5
Energy efficient resource allocation based on virtual network embedding for IoT data generation5
How to certify machine learning based safety-critical systems? A systematic literature review5
Actor-critic architecture based probabilistic meta-reinforcement learning for load balancing of controllers in software defined networks5
Correction to: A class integration test order generation approach based on Sarsa algorithm5
An empirical study of data sampling techniques for just-in-time software defect prediction5
A model-based DevOps process for development of mathematical database cost models5
Model checking strategy-controlled systems in rewriting logic4
A framework for conditional statement technical debt identification and description4
UI2HTML: utilizing LLM agents with chain of thought to convert UI into HTML code4
$$l-$$PEES-IMP: lightweight proxy re-encryption-based identity management protocol for enhancing privacy over multi-cloud environment4
Correction: Agile meets quantum: a novel genetic algorithm model for predicting the success of quantum software development project4
Data-driven prototyping via natural-language-based GUI retrieval4
Gradient contouring and texture modelling based CAD system for improved TB classification4
SiaLog: detecting anomalies in software execution logs using the siamese network4
Semi-supervised and unsupervised anomaly detection by mining numerical workflow relations from system logs4
Future of software development with generative AI4
Data cleaning and machine learning: a systematic literature review4
Prioritizing refactorings for security-critical code3
Test case prioritization using test case diversification and fault-proneness estimations3
A systematic review of refactoring opportunities by software antipattern detection3
Contractsentry: a static analysis tool for smart contract vulnerability detection3
Towards a behavior tree-based robotic software architecture with adjoint observation schemes for robotic software development3
Sharif-TaaWS: a tool to automate unit testing of web services3
Self-admitted technical debt in R: detection and causes3
Context-aware code summarization with multi-relational graph neural network3
Regression test selection in test-driven development3
Prompt enhance API recommendation: visualize the user’s real intention behind this query3
MP: motion program synthesis with machine learning interpretability and knowledge graph analogy3
WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets3
OneLog: towards end-to-end software log anomaly detection3
MerIt: improving neural program synthesis by merging collective intelligence3
Directed Artificial Bee Colony algorithm with revamped search strategy to solve global numerical optimization problems2
AIDM: artificial intelligent for digital museum autonomous system with mixed reality and software-driven data collection and analysis2
On the documentation of refactoring types2
FLASc: a formal algebra for labeled property graph schema2
QUARE: towards a question-answering model for requirements elicitation2
GenerativeGI: creating generative art with genetic improvement2
Guest Editorial: Deep Learning in Open-Source Software Ecosystems2
Efficient deep-reinforcement learning aware resource allocation in SDN-enabled fog paradigm2
Machine learning based predictive modeling to effectively implement DevOps practices in software organizations2
A study on cross-project fault prediction through resampling and feature reduction along with source projects selection2
HQLgen: deep learning based HQL query generation from program context2
Ladle: a method for unsupervised anomaly detection across log types2
Meta network attention-based feature matching for heterogeneous defect prediction2
Automated verification of concurrent go programs via bounded model checking2
Using model-driven engineering to automate software language translation2
Enhancing multi-objective test case selection through the mutation operator2
Static data-flow analysis for software product lines in C2
AdaComplete: improve DL-based code completion method’s domain adaptability2
Using data mining techniques to generate test cases from graph transformation systems specifications2
UAV surveillance for violence detection and individual identification2
A symbolic execution-based method to perform untargeted attack on feed-forward neural networks2
Exploring the impact of data preprocessing techniques on composite classifier algorithms in cross-project defect prediction2
0.069283008575439