ACM Transactions on Software Engineering and Methodology

Papers
(The median citation count of ACM Transactions on Software Engineering and Methodology is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
DeepWukong93
A Tale of Two Cities: Software Developers Working from Home during the COVID-19 Pandemic77
Assessing and Improving Malware Detection Sustainability through App Evolution Studies72
Software Engineering for AI-Based Systems: A Survey62
Practical Accuracy Estimation for Efficient Deep Neural Network Testing49
Test Selection for Deep Learning Systems45
Developing Cost-Effective Blockchain-Powered Applications41
Security Smells in Ansible and Chef Scripts40
A Survey of Flaky Tests39
Monotone Precision and Recall Measures for Comparing Executions and Specifications of Dynamic Systems38
Wireframe-based UI Design Search through Image Autoencoder37
Predicting Node Failures in an Ultra-Large-Scale Cloud Computing Platform36
Generating Question Titles for Stack Overflow from Mined Code Snippets36
Smart Contract Repair35
A Systematic Literature Review on the Use of Deep Learning in Software Engineering Research30
Understanding Software-2.028
Why My Code Summarization Model Does Not Work28
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection28
Why Developers Refactor Source Code27
Why an Android App Is Classified as Malware26
When and How to Make Breaking Changes26
An Empirical Study of the Impact of Hyperparameter Tuning and Model Optimization on the Performance Properties of Deep Neural Networks26
Context-Aware Code Change Embedding for Better Patch Correctness Assessment26
Handling SQL Databases in Automated System Test Generation25
Context-aware Retrieval-based Deep Commit Message Generation25
The Agile Success Model25
Beyond Tests23
In-IDE Code Generation from Natural Language: Promise and Challenges22
Quality Indicators in Search-based Software Engineering21
Opinion Mining for Software Development: A Systematic Literature Review21
Modular Tree Network for Source Code Representation Learning21
Visualizing Distributed System Executions20
Emoji-powered Sentiment and Emotion Detection from Software Developers’ Communication Data20
Deep Reinforcement Learning for Black-box Testing of Android Apps20
Women’s Participation in Open Source Software: A Survey of the Literature20
How Far Have We Progressed in Identifying Self-admitted Technical Debts? A Comprehensive Empirical Study19
How Should I Improve the UI of My App?18
Accessibility in Software Practice: A Practitioner’s Perspective17
Automated Patch Transplantation17
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching16
NPC: N euron P ath C overage via Characterizing Decision Logic of Deep Neural Networks16
An Empirical Study on Data Distribution-Aware Test Selection for Deep Learning Enhancement16
Stateful Serverless Computing with Crucial16
IntDroid16
Practical Constraint Solving for Generating System Test Data16
Memory-Safety Challenge Considered Solved? An In-Depth Study with All Rust CVEs15
Technical Q8A Site Answer Recommendation via Question Boosting15
A Theory of Scrum Team Effectiveness14
Are Multi-Language Design Smells Fault-Prone? An Empirical Study14
History-based Model Repair Recommendations14
psc2code14
Killing Stubborn Mutants with Symbolic Execution14
Adversarial Robustness of Deep Code Comment Generation14
Fine-grained Code Coverage Measurement in Automated Black-box Android Testing13
An Empirical Study of Developer Discussions in the Gitter Platform13
Defining a Knowledge Graph Development Process Through a Systematic Review13
Single and Multi-objective Test Cases Prioritization for Self-driving Cars in Virtual Environments13
Adaptive Hypermutation for Search-Based System Test Generation: A Study on REST APIs with EvoMaster13
Are Comments on Stack Overflow Well Organized for Easy Retrieval by Developers?12
Test Data Generation for Path Coverage of MPI Programs Using SAEO12
SafeDrop: Detecting Memory Deallocation Bugs of Rust Programs via Static Data-flow Analysis12
Enhancing Search-based Testing with Testability Transformations for Existing APIs12
ActivFORMS: A Formally Founded Model-based Approach to Engineer Self-adaptive Systems12
Towards Robustness of Deep Program Processing Models—Detection, Estimation, and Enhancement12
Predicting Performance Anomalies in Software Systems at Run-time11
KLEESpectre11
Taming Reflection11
Boosting Compiler Testing via Compiler Optimization Exploration11
Toward an Objective Measure of Developers’ Cognitive Activities11
A Survey on Automated Driving System Testing: Landscapes and Trends11
Evaluation of Software Architectures under Uncertainty11
The Case for Adaptive Security Interventions11
On the Significance of Category Prediction for Code-Comment Synchronization11
SPI: Automated Identification of Security Patches via Commits11
An Empirical Study of the Impact of Data Splitting Decisions on the Performance of AIOps Solutions11
Rise of the Planet of Serverless Computing: A Systematic Review11
The Weights Can Be Harmful: Pareto Search versus Weighted Search in Multi-objective Search-based Software Engineering11
Uncertainty-aware Prediction Validator in Deep Learning Models for Cyber-physical System Data11
Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum11
Unveiling Elite Developers’ Activities in Open Source Projects11
ReCDroid+: Automated End-to-End Crash Reproduction from Bug Reports for Android Apps10
Predictive Models in Software Engineering: Challenges and Opportunities10
Computing Alignments of Well-Formed Process Models using Local Search10
A Defect Estimator for Source Code10
On the Faults Found in REST APIs by Automated Test Generation10
Psychometrics in Behavioral Software Engineering: A Methodological Introduction with Guidelines10
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum9
Efficient and Effective Feature Space Exploration for Testing Deep Learning Systems9
Context- and Fairness-Aware In-Process Crowdworker Recommendation9
Leveraging Control Flow Knowledge in SMT Solving of Program Verification9
Verifix: Verified Repair of Programming Assignments9
On the Reproducibility and Replicability of Deep Learning in Software Engineering9
What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning9
Just-In-Time Defect Prediction on JavaScript Projects: A Replication Study9
Arachne: Search-Based Repair of Deep Neural Networks8
Monitoring Constraints and Metaconstraints with Temporal Logics on Finite Traces8
Predicting Patch Correctness Based on the Similarity of Failing Test Cases8
The Impact of Dormant Defects on Defect Prediction: A Study of 19 Apache Projects8
L2S: A Framework for Synthesizing the Most Probable Program under a Specification8
Industry–Academia Research Collaboration and Knowledge Co-creation: Patterns and Anti-patterns8
Automatic API Usage Scenario Documentation from Technical Q&A Sites8
Eagle8
A Comprehensive Empirical Study of Bias Mitigation Methods for Machine Learning Classifiers8
Code Structure–Guided Transformer for Source Code Summarization8
deGraphCS : Embedding Variable-based Flow Graph for Neural Code Search8
S EADS7
Applying Bayesian Analysis Guidelines to Empirical Software Engineering Data: The Case of Programming Languages and Code Quality7
Leveraging the Defects Life Cycle to Label Affected Versions and Defective Classes7
Verification Witnesses7
FaaSLight : General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing7
The Influence of Human Aspects on Requirements Engineering-related Activities: Software Practitioners’ Perspective7
Testing Relative to Usage Scope7
Automatic Fault Detection for Deep Learning Programs Using Graph Transformations7
SemMT: A Semantic-Based Testing Approach for Machine Translation Systems7
Open Problems in Fuzzing RESTful APIs: A Comparison of Tools7
Automatically Identifying the Quality of Developer Chats for Post Hoc Use7
Toward a Holistic Approach to Verification and Validation of Autonomous Cognitive Systems7
Using Relative Lines of Code to Guide Automated Test Generation for Python7
Some Seeds Are Strong: Seeding Strategies for Search-based Test Case Selection7
RegionTrack7
Uncertainty-wise Requirements Prioritization with Search6
Feature Matching-based Approaches to Improve the Robustness of Android Visual GUI Testing6
Microservice Security Metrics for Secure Communication, Identity Management, and Observability6
CodeMatcher: Searching Code Based on Sequential Semantics of Important Query Words6
A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs6
Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions6
A Practical Approach for Dynamic Taint Tracking with Control-flow Relationships6
Bug Localization in Model-Based Systems in the Wild6
Guaranteeing Timed Opacity using Parametric Timed Model Checking6
XCoS: Explainable Code Search Based on Query Scoping and Knowledge Graph6
White-Box Fuzzing RPC-Based APIs with EvoMaster: An Industrial Case Study6
Testing the Plasticity of Reinforcement Learning-based Systems6
Dealing with Belief Uncertainty in Domain Models6
How Software Refactoring Impacts Execution Time6
Diversifying Focused Testing for Unit Testing6
Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms6
Black-box Safety Analysis and Retraining of DNNs based on Feature Extraction and Clustering5
An Empirical Study on Type Annotations5
Influential Global and Local Contexts Guided Trace Representation for Fault Localization5
Automating App Review Response Generation Based on Contextual Knowledge5
Testing, Validation, and Verification of Robotic and Autonomous Systems: A Systematic Review5
Correlating Automated and Human Evaluation of Code Documentation Generation Quality5
Reliable Fix Patterns Inferred from Static Checkers for Automated Program Repair5
Verification of Distributed Systems via Sequential Emulation5
Towards a Consistent Interpretation of AIOps Models5
Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study5
Model Transformation Development Using Automated Requirements Analysis, Metamodel Matching, and Transformation by Example5
Securing the Ethereum from Smart Ponzi Schemes: Identification Using Static Features5
Classifying Mobile Applications Using Word Embeddings5
Digital Twin-based Anomaly Detection with Curriculum Learning in Cyber-physical Systems5
Multi-objective Integer Programming Approaches for Solving the Multi-criteria Test-suite Minimization Problem5
A Survey of Learning-based Automated Program Repair5
Adversarial Specification Mining5
Simulator-based Explanation and Debugging of Hazard-triggering Events in DNN-based Safety-critical Systems4
APIRO: A Framework for Automated Security Tools API Recommendation4
The Best of Both Worlds: Combining Learned Embeddings with Engineered Features for Accurate Prediction of Correct Patches4
Characterizing and Detecting WebAssembly Runtime Bugs4
Automated, Cost-effective, and Update-driven App Testing4
Parallel Test Prioritization4
iBiR : Bug-report-driven Fault Injection4
Towards Learning Generalizable Code Embeddings Using Task-agnostic Graph Convolutional Networks4
Pied-Piper: Revealing the Backdoor Threats in Ethereum ERC Token Contracts4
Mutation Testing in Evolving Systems: Studying the Relevance of Mutants to Code Evolution4
MICOSE4aPS: Industrially Applicable Maturity Metric to Improve Systematic Reuse of Control Software4
iSENSE2.04
Parameter Coverage for Testing of Autonomous Driving Systems under Uncertainty4
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities4
Examining Penetration Tester Behavior in the Collegiate Penetration Testing Competition4
Making Sense of the Unknown: How Managers Make Cyber Security Decisions4
Super-optimization of Smart Contracts4
Assessing and Improving an Evaluation Dataset for Detecting Semantic Code Clones via Deep Learning4
Predictive Mutation Analysis via the Natural Language Channel in Source Code4
Testing RESTful APIs: A Survey4
Input Distribution Coverage: Measuring Feature Interaction Adequacy in Neural Network Testing4
Toward Understanding Deep Learning Framework Bugs4
Turnover of Companies in OpenStack: Prevalence and Rationale4
Is My Transaction Done Yet? An Empirical Study of Transaction Processing Times in the Ethereum Blockchain Platform3
Using Personality Detection Tools for Software Engineering Research: How Far Can We Go?3
There’s no Such Thing as a Free Lunch: Lessons Learned from Exploring the Overhead Introduced by the Greenkeeper Dependency Bot in Npm3
Hierarchical Distribution-aware Testing of Deep Learning3
Automated Identification of Toxic Code Reviews Using ToxiCR3
I Know What You Are Searching for: Code Snippet Recommendation from Stack Overflow Posts3
IFDS-based Context Debloating for Object-Sensitive Pointer Analysis3
An Empirical Study of the Effectiveness of an Ensemble of Stand-alone Sentiment Detection Tools for Software Engineering Datasets3
Exploring Better Black-Box Test Case Prioritization via Log Analysis3
Evaluating Surprise Adequacy for Deep Learning System Testing3
OSS Effort Estimation Using Software Features Similarity and Developer Activity-Based Metrics3
Measuring Task Conflict and Person Conflict in Software Testing3
Parametric Timed Pattern Matching3
Do Performance Aspirations Matter for Guiding Software Configuration Tuning? An Empirical Investigation under Dual Performance Objectives3
A Machine Learning Approach for Automated Filling of Categorical Fields in Data Entry Forms3
Katana : Dual Slicing Based Context for Learning Bug Fixes3
A Formal Framework of Software Product Line Analyses3
A Study on Blockchain Architecture Design Decisions and Their Security Attacks and Threats3
Software Architectural Migration3
Guided Feature Identification and Removal for Resource-constrained Firmware3
Do Developers Really Know How to Use Git Commands? A Large-scale Study Using Stack Overflow3
A Taxonomy of Information Attributes for Test Case Prioritisation: Applicability, Machine Learning3
Automatic Core-Developer Identification on GitHub: A Validation Study3
How Do Successful and Failed Projects Differ? A Socio-Technical Analysis3
Measuring and Modeling Group Dynamics in Open-Source Software Development: A Tensor Decomposition Approach3
Coverage-Based Debloating for Java Bytecode3
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge3
Fold2Vec: Towards a Statement-Based Representation of Code for Code Comprehension3
TestSGD : Interpretable Testing of Neural Networks against Subtle Group Discrimination3
Nudge: Accelerating Overdue Pull Requests toward Completion3
TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts3
Fair Enough: Searching for Sufficient Measures of Fairness3
Similarity-based Web Element Localization for Robust Test Automation3
Facet-oriented Modelling3
Recommending Faulty Configurations for Interacting Systems Under Test Using Multi-objective Search3
A Comparative Study on Method Comment and Inline Comment3
Architecting Internet of Things Systems with Blockchain3
COMET: Coverage-guided Model Generation For Deep Learning Library Testing3
Buddy Stacks: Protecting Return Addresses with Efficient Thread-Local Storage and Runtime Re-Randomization3
Actor-Driven Decomposition of Microservices through Multi-level Scalability Assessment2
XCode : Towards Cross-Language Code Representation with Large-Scale Pre-Training2
LaF: Labeling-free Model Selection for Automated Deep Neural Network Reusing2
Client-Specific Upgrade Compatibility Checking via Knowledge-Guided Discovery2
Storage State Analysis and Extraction of Ethereum Blockchain Smart Contracts2
Fine-Grained Coverage-Based Fuzzing2
On Wasted Contributions: Understanding the Dynamics of Contributor-Abandoned Pull Requests–A Mixed-Methods Study of 10 Large Open-Source Projects2
ConE: A Concurrent Edit Detection Tool for Large-scale Software Development2
Mutant Reduction Evaluation: What is There and What is Missing?2
All in One: Design, Verification, and Implementation of SNOW-optimal Read Atomic Transactions2
Challenges of Working from Home in Software Development During Covid-19 Lockdowns2
Mastering Variation in Human Studies2
A Characterization Study of Merge Conflicts in Java Projects2
Dissecting American Fuzzy Lop: A FuzzBench Evaluation2
Speeding Up Data Manipulation Tasks with Alternative Implementations2
Retrieving API Knowledge from Tutorials and Stack Overflow Based on Natural Language Queries2
CodeEditor : Learning to Edit Source Code with Pre-trained Models2
NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing2
GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks2
LibAM: An Area Matching Framework for Detecting Third-Party Libraries in Binaries2
Preference-wise Testing of Android Apps via Test Amplification2
Duplicate Bug Report Detection: How Far Are We?2
On the Discoverability of npm Vulnerabilities in Node.js Projects2
Finding Near-optimal Configurations in Colossal Spaces with Statistical Guarantees2
HINNPerf: Hierarchical Interaction Neural Network for Performance Prediction of Configurable Systems2
QuoTe : Quality-oriented Testing for Deep Learning Systems2
Testing Feedforward Neural Networks Training Programs2
HybridCISave : A Combined Build and Test Selection Approach in Continuous Integration2
What Constitutes the Deployment and Runtime Configuration System? An Empirical Study on OpenStack Projects2
What’s (Not) Working in Programmer User Studies?2
Testing Abstractions for Cyber-Physical Control Systems2
Video Game Bad Smells: What They Are and How Developers Perceive Them2
Security Responses in Software Development2
A Systematic Review of Automated Query Reformulations in Source Code Search2
1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis2
0.032524824142456