ACM Transactions on Software Engineering and Methodology

Papers
(The median citation count of ACM Transactions on Software Engineering and Methodology is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Preference-wise Testing of Android Apps via Test Amplification251
Mutant Reduction Evaluation: What is There and What is Missing?178
Bounded Verification of Atomicity Violations for Interrupt-Driven Programs via Lazy Sequentialization121
Reusing d-DNNFs for Efficient Feature-Model Counting113
Test Generation Strategies for Building Failure Models and Explaining Spurious Failures95
Automatic Identification of Game Stuttering via Gameplay Videos Analysis83
Deceiving Humans and Machines Alike: Search-based Test Input Generation for DNNs Using Variational Autoencoders82
Understanding the OSS Communities of Deep Learning Frameworks: A Comparative Case Study of P y T orch and T ensor68
I Depended on You and You Broke Me: An Empirical Study of Manifesting Breaking Changes in Client Packages63
KAPE: k NN-based Performance Testing for Deep Code Search61
History-Driven Fuzzing for Deep Learning Libraries59
Communicating Study Design Trade-offs in Software Engineering59
Horus : Accelerating Kernel Fuzzing through Efficient Host-VM Memory Access Procedures58
Securing the Ethereum from Smart Ponzi Schemes: Identification Using Static Features57
An Empirical Study of the Non-Determinism of ChatGPT in Code Generation56
An empirical study on vulnerability disclosure management of open source software systems55
FoC: Figure out the Cryptographic Functions in Stripped Binaries with LLMs53
FairGenerate: Enhancing Fairness Through Synthetic Data Generation and Two-Fold Biased Labels Removal51
A Survey on Failure Analysis and Fault Injection in AI Systems51
Assessing the Robustness of Test Selection Methods for Deep Neural Networks49
Enhancing Android Malware Detection: The Influence of ChatGPT on Decision-centric Task49
Finding Information Leaks with Information Flow Fuzzing—RCR Report47
Better Supporting Human Aspects in Mobile eHealth Apps: Development and Validation of Enhanced Guidelines47
Neuron Semantic-Guided Test Generation for Deep Neural Networks Fuzzing43
Storage State Analysis and Extraction of Ethereum Blockchain Smart Contracts41
Model Transformation Development Using Automated Requirements Analysis, Metamodel Matching, and Transformation by Example41
Introducing Interactions in Multi-Objective Optimization of Software Architectures41
Enhancing Search-based Testing with Testability Transformations for Existing APIs40
Toward Interpretable Graph Tensor Convolution Neural Network for Code Semantics Embedding40
JavaScript SBST Heuristics to Enable Effective Fuzzing of NodeJS Web APIs37
Why Do Developers Reject Refactorings in Open-Source Projects?37
Fine-Tuning Large Language Models to Improve Accuracy and Comprehensibility of Automated Code Review36
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks - RCR Report36
Supporting Emotional Intelligence, Productivity and Team Goals while Handling Software Requirements Changes35
Estimating Uncertainty in Labeled Changes by SZZ Tools on Just-In-Time Defect Prediction35
An Empirical Study on Governance in Bitcoin’s Consensus Evolution35
A Comprehensive View on TD Prevention Practices and Reasons for Not Preventing It34
HeMiRCA: Fine-Grained Root Cause Analysis for Microservices with Heterogeneous Data Sources34
Help Them Understand: Testing and Improving Voice User Interfaces34
I Know What You Are Searching for: Code Snippet Recommendation from Stack Overflow Posts33
Deep API Sequence Generation via Golden Solution Samples and API Seeds32
Characterizing Deep Learning Package Supply Chains in PyPI: Domains, Clusters, and Disengagement32
An Accurate Identifier Renaming Prediction and Suggestion Approach31
FAVDisco: Modeling and Discovering File Access Vulnerabilities29
Assessing and Analyzing the Correctness of GitHub Copilot’s Code Suggestions29
Enhancing Security and Acuity of Smart Contract Vulnerability Detection based on Federated Learning and BiLSTM-Attention28
Systematic Literature Review on Software Security Vulnerability Information Extraction28
Towards Automating Domain-Specific Data Generation for Text-to-SQL: A Comprehensive Approach28
FormatFuzzer : Effective Fuzzing of Binary File Formats27
A Survey of Learning-based Automated Program Repair27
Single and Multi-objective Test Cases Prioritization for Self-driving Cars in Virtual Environments27
Do Current Language Models Support Code Intelligence for R Programming Language?26
Try with Simpler - An Evaluation of Improved Principal Component Analysis in Log-based Anomaly Detection26
An Empirical Study on GitHub Pull Requests’ Reactions26
Industry–Academia Research Collaboration and Knowledge Co-creation: Patterns and Anti-patterns26
Revisiting the Identification of the Co-evolution of Production and Test Code26
Editorial: Toward the Future with Eight Issues Per Year25
GIST : Generated Inputs Sets Transferability in Deep Learning25
Editorial: ICSE and the Incredible Contradictions of Software Engineering25
Reinforcement Learning Informed Evolutionary Search for Autonomous Systems Testing24
SimClone: Detecting Tabular Data Clones Using Value Similarity24
Evaluation of Software Architectures under Uncertainty23
Assessing the Early Bird Heuristic (for Predicting Project Quality)23
Contemporary Software Modernization: Strategies, Driving Forces, and Research Opportunities23
Vulnerability Repair via Concolic Execution and Code Mutations23
Assessing and Improving an Evaluation Dataset for Detecting Semantic Code Clones via Deep Learning23
PatchCensor: Patch Robustness Certification for Transformers via Exhaustive Testing23
AutoRIC: Automated Neural Network Repairing Based on Constrained Optimization22
An Empirical Study of Retrieval-Augmented Code Generation: Challenges and Opportunities22
APIRO: A Framework for Automated Security Tools API Recommendation22
A Systematic Literature Review of Multi-Label Learning in Software Engineering22
A Characterization Study of Merge Conflicts in Java Projects21
SimADFuzz: Simulation-Feedback Fuzz Testing for Autonomous Driving Systems21
Cleaning Up Confounding: Accounting for Endogeneity Using Instrumental Variables and Two-Stage Models21
SCOPE : Performance Testing for Serverless Computing21
When Fine-Tuning LLMs Meets Data Privacy: An Empirical Study of Federated Learning in LLM-Based Program Repair21
Towards On-The-Fly Code Performance Profiling21
Adaptive Hypermutation for Search-Based System Test Generation: A Study on REST APIs with EvoMaster20
Feature Matching-based Approaches to Improve the Robustness of Android Visual GUI Testing20
Exploring the Capabilities of LLMs for Code-Change-Related Tasks20
Demo2Test: Transfer Testing of Agent in Competitive Environment with Failure Demonstrations20
Towards Learning Generalizable Code Embeddings Using Task-agnostic Graph Convolutional Networks20
Simulator-based Explanation and Debugging of Hazard-triggering Events in DNN-based Safety-critical Systems20
MR-Scout: Automated Synthesis of Metamorphic Relations from Existing Test Cases20
Test Input Prioritization for 3D Point Clouds20
SourcererJBF: A Java Build Framework For Large-Scale Compilation20
Learning from Very Little Data: On the Value of Landscape Analysis for Predicting Software Project Health20
Graphuzz: Data-driven Seed Scheduling for Coverage-guided Greybox Fuzzing20
Efficient Multivariate Time Series Anomaly Detection through Transfer Learning for Large-Scale Software Systems20
Demystifying Hidden Sensitive Operations in Android Apps20
Actor-Driven Decomposition of Microservices through Multi-level Scalability Assessment19
Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors19
Characterizing Installation- and Run-Time Compatibility Issues in Android Benign Apps and Malware19
Commit Messages Generation Based on Core Changes19
You Don’t Have to Say Where to Edit! jLED—Joint Learning to Localize and Edit Source Code18
A Roadmap for Integrating Sustainability into Software Engineering Education17
Exploring Fine-Grained Bug Report Categorization with Large Language Models and Prompt Engineering: An Empirical Study17
Efficient Management of Containers for Software Defined Vehicles17
A Comprehensive Empirical Study of Bias Mitigation Methods for Machine Learning Classifiers17
Duplicate Bug Report Detection: How Far Are We?17
Monitoring data for Anomaly Detection in Cloud-Based Systems: A Systematic Mapping Study17
Developer Perspectives on Licensing and Copyright Issues Arising from Generative AI for Software Development16
Coverage-directed Differential Testing of X.509 Certificate Validation in SSL/TLS Implementations16
Measuring and Clustering Heterogeneous Chatbot Designs16
Bypassing Guardrails: Lessons Learned from Red Teaming ChatGPT16
Variable Renaming-Based Adversarial Test Generation for Code Model: Benchmark and Enhancement16
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks16
SPOLRE: Semantic Preserving Object Layout Reconstruction for Image Captioning System Testing16
Generation-based Differential Fuzzing for Deep Learning Libraries16
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum16
Fold2Vec: Towards a Statement-Based Representation of Code for Code Comprehension16
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities16
Is It Hard to Generate Holistic Commit Message?15
All in One: Design, Verification, and Implementation of SNOW-optimal Read Atomic Transactions15
Fairness Concerns in App Reviews: A Study on AI-Based Mobile Apps15
Adaptive Modelling Languages: Abstract Syntax and Model Migration15
Evolution-Aware Constraint Derivation Approach for Software Remodularization15
Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers15
Certified Cost Bounds for Abstract Programs15
Testing Causality in Scientific Modelling Software15
Programming Smart Playtesting14
Improving Deep Assertion Generation via Fine-Tuning Retrieval-Augmented Pre-trained Language Models14
Autonomous Driving System Testing via Diversity-Oriented Driving Scenario Exploration14
Automating TODO-missed Methods Detection and Patching14
MeDeT: Medical Device Digital Twins Creation with Few-shot Meta-learning14
Stress Testing Control Loops in Cyber-Physical Systems - RCR Report14
Enhancing Task In-Progress Time Predictions through Affective and Personality Factors13
OSS Effort Estimation Using Software Features Similarity and Developer Activity-Based Metrics13
On the Impact of Lower Recall and Precision in Defect Prediction for Guiding Search-based Software Testing13
On the Significance of Category Prediction for Code-Comment Synchronization13
AI for DevSecOps: A Landscape and Future Opportunities13
Differentiable Quantum Programming with Unbounded Loops13
Can GitHub Issues Help in App Review Classifications?13
An Interleaving Guided Metamorphic Testing Approach for Concurrent Programs13
PonziHunter: Hunting Ethereum Ponzi Contract via Static Analysis and Contrastive Learning on the Bytecode Level13
Automatic Core-Developer Identification on GitHub: A Validation Study13
DiPri : Distance-Based Seed Prioritization for Greybox Fuzzing13
Reputation Gaming in Crowd Technical Knowledge Sharing13
Can Coverage Criteria Guide Failure Discovery for Image Classifiers? An Empirical Study12
A Hypothesis Testing-based Framework for Software Cross-modal Retrieval in Heterogeneous Semantic Spaces12
Refactoring in Computational Notebooks12
Preparation and Utilization of Mixed States for Testing Quantum Programs12
Visualization Task Taxonomy to Understand the Fuzzing Internals12
Understanding Real-Time Collaborative Programming: A Study of Visual Studio Live Share12
How Do Successful and Failed Projects Differ? A Socio-Technical Analysis12
The Influence of Human Aspects on Requirements Engineering-related Activities: Software Practitioners’ Perspective12
Survey of Code Search Based on Deep Learning12
Studying the Impact of TensorFlow and PyTorch Bindings on Machine Learning Software Quality12
MORepair: Teaching LLMs to Repair Code via Multi-Objective Fine-Tuning12
Data Complexity: A New Perspective for Analyzing the Difficulty of Defect Prediction Tasks12
Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective12
A Comparative Study on Method Comment and Inline Comment12
AdaptiveLog: An Adaptive Log Analysis Framework with the Collaboration of Large and Small Language Model12
LogUpdater: Automated Detection and Repair of Specific Defects in Logging Statements12
Input Distribution Coverage: Measuring Feature Interaction Adequacy in Neural Network Testing12
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis11
Towards Robustness of Deep Program Processing Models—Detection, Estimation, and Enhancement11
Software Engineering by and for Humans in an AI Era11
The IDEA of Us: An Identity-Aware Architecture for Autonomous Systems11
Verification Witnesses11
Testing RESTful APIs: A Survey11
Let’s Discover More API Relations: A Large Language Model-Based AI Chain for Unsupervised API Relation Inference11
NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing11
Some Seeds Are Strong: Seeding Strategies for Search-based Test Case Selection11
Obfuscated Clone Search in JavaScript based on Reinforcement Subsequence Learning11
A Systematic Literature Review on the Use of Deep Learning in Software Engineering Research11
Mitigating Regression Faults Induced by Feature Evolution in Deep Learning Systems11
Identifying and Explaining Safety-critical Scenarios for Autonomous Vehicles via Key Features11
Identifying Performance Issues in Cloud Service Systems Based on Relational-Temporal Features11
Fairness Testing of Machine Translation Systems10
BiRD: Race Detection in Software Binaries under Relaxed Memory Models10
What Constitutes the Deployment and Runtime Configuration System? An Empirical Study on OpenStack Projects10
Revealing the Unseen: AI Chain on LLMs for Predicting Implicit Dataflows to Generate Dataflow Graphs in Dynamically Typed Code10
Toward Better Comprehension of Breaking Changes in the NPM Ecosystem10
Large Language Model for Vulnerability Detection and Repair: Literature Review and the Road Ahead10
The Case for Adaptive Security Interventions10
Guided Feature Identification and Removal for Resource-constrained Firmware10
Decision Support Model for Selecting the Optimal Blockchain Oracle Platform: An Evaluation of Key Factors10
Less Is More: Unlocking Semi-Supervised Deep Learning for Vulnerability Detection10
Open Problems in Fuzzing RESTful APIs: A Comparison of Tools10
Mobile Application Online Cross-Project Just-in-Time Software Defect Prediction Framework10
Simulating Software Evolution to Evaluate the Reliability of Early Decision-making among Design Alternatives toward Maintainability10
Representation Learning for Stack Overflow Posts: How Far Are We?9
Understanding Vulnerability Inducing Commits of the Linux Kernel9
Automated Identification of Toxic Code Reviews Using ToxiCR9
Digital Twin-based Anomaly Detection with Curriculum Learning in Cyber-physical Systems9
Editorial: The End of the Journey9
What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning9
Grammar Mutation for Testing Input Parsers9
Automated Abstract Transformer Synthesis for Reduced Product Domains9
Influential Global and Local Contexts Guided Trace Representation for Fault Localization9
From Triumph to Uncertainty: The Journey of Software Engineering in the AI Era9
Recommending Variable Names for Extract Local Variable Refactorings9
Making Software Development More Diverse and Inclusive: Key Themes, Challenges, and Future Directions9
Revisiting Sentiment Analysis for Software Engineering in the Era of Large Language Models9
SemMT: A Semantic-Based Testing Approach for Machine Translation Systems9
Exploring JVM Garbage Collector Testing with Event-Coverage9
Test Oracle Generation for REST APIs9
Learning Software Bug Reports: A Systematic Literature Review9
DRIVE: Dockerfile Rule Mining and Violation Detection9
Benchmarking and Categorizing the Performance of Neural Program Repair Systems for Java9
Microservice Security Metrics for Secure Communication, Identity Management, and Observability9
Divide-and-Conquer: Automating Code Revisions via Localization-and-Revision9
An Empirical Study on the Relationship Between Defects and Source Code’s Unnaturalness9
V ex IR2V ec : An Architecture-Neutral Embedding Framework for Binary Similarity8
Identifying Affected Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and Libraries8
Finding Information Leaks with Information Flow Fuzzing8
AceCoder : An Effective Prompting Technique Specialized in Code Generation8
Challenges of Working from Home in Software Development During Covid-19 Lockdowns8
Enumerating Valid Non-Alpha-Equivalent Programs for Interpreter Testing8
Snippet Comment Generation Based on Code Context Expansion8
Blindspots in Python and Java APIs Result in Vulnerable Code8
Large Language Model-Aware In-Context Learning for Code Generation8
Rise of the Planet of Serverless Computing: A Systematic Review8
Sustainability in the Field of Software Engineering: A Tertiary Study8
FQN Inference in Partial Code by Prompt-tuned Language Model of Code8
Exploring Automated Assertion Generation via Large Language Models8
Software Security Analysis in 2030 and Beyond: A Research Roadmap8
A Road-Map to Readily Available Early Validation and Verification of System Behaviour in Model-Based Systems Engineering using Software Engineering Best Practices8
Temporal-Incremental Learning for Android Malware Detection8
Prompt-based Code Completion via Multi-Retrieval Augmented Generation8
A Review of Learning-based Smart Contract Vulnerability Detection: A Perspective on Code Representation8
How the Quality of Maintenance Tasks is Affected by Criteria for Selecting Engineers for Collaboration8
AcTracer: Active Testing of Large Language Model via Multi-Stage Sampling8
My Fuzzers Won’t Build: An Empirical Study of Fuzzing Build Failures8
Improving Automated Program Repair with Domain Adaptation8
Learning-based Relaxation of Completeness Requirements for Data Entry Forms8
Making Sense of the Unknown: How Managers Make Cyber Security Decisions8
A Comprehensive Study of Governance Issues in Decentralized Finance Applications7
µOpTime: Statically Reducing the Execution Time of Microbenchmark Suites Using Stability Metrics7
Poracle: Testing Patches under Preservation Conditions to Combat the Overfitting Problem of Program Repair7
Using Personality Detection Tools for Software Engineering Research: How Far Can We Go?7
On the Faults Found in REST APIs by Automated Test Generation7
S pectre : Automated Aliasing Specifications Generation for Library APIs with Fuzzing7
Bias Testing and Mitigation in LLM-based Code Generation7
Poison Attack and Poison Detection on Deep Source Code Processing Models7
The Good, the Bad, and the Missing: Neural Code Generation for Machine Learning Tasks7
Accountability in Code Review: The Role of Intrinsic Drivers and the Impact of LLMs7
A Machine Learning Approach for Automated Filling of Categorical Fields in Data Entry Forms7
A Closer Look at the Security Risks in the Rust Ecosystem7
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge7
Automatic Repair of Quantum Programs via Unitary Operation7
An Empirical Study of the Impact of Hyperparameter Tuning and Model Optimization on the Performance Properties of Deep Neural Networks7
Improving Code Reviewer Recommendation: Accuracy, Latency, Workload, and Bystanders7
ReCDroid+: Automated End-to-End Crash Reproduction from Bug Reports for Android Apps7
Finding Near-optimal Configurations in Colossal Spaces with Statistical Guarantees7
deGraphCS : Embedding Variable-based Flow Graph for Neural Code Search7
OptRCA: A More Efficient and Accurate Approach for Automated Root Cause Analysis and Explanation7
Privacy in Chatbot Conversation-Driven Development: A Comprehensive Review and Requirements Proposal7
Exploring Better Black-Box Test Case Prioritization via Log Analysis7
0.56010913848877