ACM Transactions on Software Engineering and Methodology

Papers
(The median citation count of ACM Transactions on Software Engineering and Methodology is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
DeepWukong148
A Tale of Two Cities: Software Developers Working from Home during the COVID-19 Pandemic99
Software Engineering for AI-Based Systems: A Survey98
Test Selection for Deep Learning Systems63
A Survey of Flaky Tests56
Developing Cost-Effective Blockchain-Powered Applications51
In-IDE Code Generation from Natural Language: Promise and Challenges50
A Systematic Literature Review on the Use of Deep Learning in Software Engineering Research47
Understanding Software-2.047
An Empirical Study of the Impact of Hyperparameter Tuning and Model Optimization on the Performance Properties of Deep Neural Networks47
Security Smells in Ansible and Chef Scripts46
Why an Android App Is Classified as Malware38
Deep Reinforcement Learning for Black-box Testing of Android Apps36
Why My Code Summarization Model Does Not Work35
Women’s Participation in Open Source Software: A Survey of the Literature34
Context-Aware Code Change Embedding for Better Patch Correctness Assessment34
Context-aware Retrieval-based Deep Commit Message Generation34
When and How to Make Breaking Changes34
Opinion Mining for Software Development: A Systematic Literature Review33
Accessibility in Software Practice: A Practitioner’s Perspective32
Beyond Tests31
NPC: N euron P ath C overage via Characterizing Decision Logic of Deep Neural Networks30
Defining a Knowledge Graph Development Process Through a Systematic Review30
The Agile Success Model30
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection30
Rise of the Planet of Serverless Computing: A Systematic Review28
A Survey on Automated Driving System Testing: Landscapes and Trends27
Code Structure–Guided Transformer for Source Code Summarization26
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching26
SPI: Automated Identification of Security Patches via Commits25
Stateful Serverless Computing with Crucial25
An Empirical Study on Data Distribution-Aware Test Selection for Deep Learning Enhancement25
How Should I Improve the UI of My App?25
Efficient and Effective Feature Space Exploration for Testing Deep Learning Systems24
Arachne: Search-Based Repair of Deep Neural Networks24
IntDroid24
Adversarial Robustness of Deep Code Comment Generation23
Memory-Safety Challenge Considered Solved? An In-Depth Study with All Rust CVEs23
A Comprehensive Empirical Study of Bias Mitigation Methods for Machine Learning Classifiers23
Emoji-powered Sentiment and Emotion Detection from Software Developers’ Communication Data22
An Empirical Study of the Impact of Data Splitting Decisions on the Performance of AIOps Solutions22
Single and Multi-objective Test Cases Prioritization for Self-driving Cars in Virtual Environments21
Are Multi-Language Design Smells Fault-Prone? An Empirical Study21
A Theory of Scrum Team Effectiveness21
How Far Have We Progressed in Identifying Self-admitted Technical Debts? A Comprehensive Empirical Study20
Towards Robustness of Deep Program Processing Models—Detection, Estimation, and Enhancement20
Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms19
SafeDrop: Detecting Memory Deallocation Bugs of Rust Programs via Static Data-flow Analysis19
Automated Patch Transplantation19
Enhancing Search-based Testing with Testability Transformations for Existing APIs19
Technical Q8A Site Answer Recommendation via Question Boosting19
History-based Model Repair Recommendations19
FaaSLight : General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing19
Verification Witnesses18
The Weights Can Be Harmful: Pareto Search versus Weighted Search in Multi-objective Search-based Software Engineering18
ActivFORMS: A Formally Founded Model-based Approach to Engineer Self-adaptive Systems18
deGraphCS : Embedding Variable-based Flow Graph for Neural Code Search18
A Survey of Learning-based Automated Program Repair18
ReCDroid+: Automated End-to-End Crash Reproduction from Bug Reports for Android Apps18
On the Significance of Category Prediction for Code-Comment Synchronization17
Verifix: Verified Repair of Programming Assignments17
The Influence of Human Aspects on Requirements Engineering-related Activities: Software Practitioners’ Perspective17
Killing Stubborn Mutants with Symbolic Execution17
Test Data Generation for Path Coverage of MPI Programs Using SAEO16
Psychometrics in Behavioral Software Engineering: A Methodological Introduction with Guidelines16
Predictive Models in Software Engineering: Challenges and Opportunities16
Testing, Validation, and Verification of Robotic and Autonomous Systems: A Systematic Review16
Just-In-Time Defect Prediction on JavaScript Projects: A Replication Study16
Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions15
Toward an Objective Measure of Developers’ Cognitive Activities15
Securing the Ethereum from Smart Ponzi Schemes: Identification Using Static Features15
The Impact of Dormant Defects on Defect Prediction: A Study of 19 Apache Projects15
Adaptive Hypermutation for Search-Based System Test Generation: A Study on REST APIs with EvoMaster15
Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum15
How Software Refactoring Impacts Execution Time15
Boosting Compiler Testing via Compiler Optimization Exploration14
Predicting Performance Anomalies in Software Systems at Run-time14
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum14
An Empirical Study of Developer Discussions in the Gitter Platform14
On the Reproducibility and Replicability of Deep Learning in Software Engineering14
On the Faults Found in REST APIs by Automated Test Generation14
Evaluation of Software Architectures under Uncertainty14
Predicting Patch Correctness Based on the Similarity of Failing Test Cases13
Are Comments on Stack Overflow Well Organized for Easy Retrieval by Developers?13
Self-Collaboration Code Generation via ChatGPT13
The Case for Adaptive Security Interventions13
Testing RESTful APIs: A Survey12
L2S: A Framework for Synthesizing the Most Probable Program under a Specification12
Pied-Piper: Revealing the Backdoor Threats in Ethereum ERC Token Contracts12
Uncertainty-aware Prediction Validator in Deep Learning Models for Cyber-physical System Data12
Refining ChatGPT-Generated Code: Characterizing and Mitigating Code Quality Issues12
Industry–Academia Research Collaboration and Knowledge Co-creation: Patterns and Anti-patterns12
SemMT: A Semantic-Based Testing Approach for Machine Translation Systems12
Ethics in the Age of AI: An Analysis of AI Practitioners’ Awareness and Challenges12
Applying Bayesian Analysis Guidelines to Empirical Software Engineering Data: The Case of Programming Languages and Code Quality12
Automated Identification of Toxic Code Reviews Using ToxiCR12
Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study11
Taming Reflection11
Leveraging Control Flow Knowledge in SMT Solving of Program Verification11
Automatic Fault Detection for Deep Learning Programs Using Graph Transformations11
CodeEditor : Learning to Edit Source Code with Pre-trained Models11
Context- and Fairness-Aware In-Process Crowdworker Recommendation11
White-Box Fuzzing RPC-Based APIs with EvoMaster: An Industrial Case Study11
Monitoring Constraints and Metaconstraints with Temporal Logics on Finite Traces11
Open Problems in Fuzzing RESTful APIs: A Comparison of Tools11
Toward Understanding Deep Learning Framework Bugs11
Black-box Safety Analysis and Retraining of DNNs based on Feature Extraction and Clustering10
Automatically Identifying the Quality of Developer Chats for Post Hoc Use10
Microservice Security Metrics for Secure Communication, Identity Management, and Observability10
Automatic API Usage Scenario Documentation from Technical Q&A Sites10
Testing the Plasticity of Reinforcement Learning-based Systems10
Dissecting American Fuzzy Lop: A FuzzBench Evaluation10
Is My Transaction Done Yet? An Empirical Study of Transaction Processing Times in the Ethereum Blockchain Platform10
APIRO: A Framework for Automated Security Tools API Recommendation10
Some Seeds Are Strong: Seeding Strategies for Search-based Test Case Selection10
Eagle9
Digital Twin-based Anomaly Detection with Curriculum Learning in Cyber-physical Systems9
Similarity-based Web Element Localization for Robust Test Automation9
Input Distribution Coverage: Measuring Feature Interaction Adequacy in Neural Network Testing9
Actor-Driven Decomposition of Microservices through Multi-level Scalability Assessment9
Towards a Consistent Interpretation of AIOps Models9
What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning9
S EADS9
Turnover of Companies in OpenStack: Prevalence and Rationale9
Leveraging the Defects Life Cycle to Label Affected Versions and Defective Classes9
Correlating Automated and Human Evaluation of Code Documentation Generation Quality9
Adversarial Specification Mining8
How Do Successful and Failed Projects Differ? A Socio-Technical Analysis8
Evaluating Surprise Adequacy for Deep Learning System Testing8
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities8
Self-Planning Code Generation with Large Language Models8
Fair Enough: Searching for Sufficient Measures of Fairness8
An Empirical Study of the Effectiveness of an Ensemble of Stand-alone Sentiment Detection Tools for Software Engineering Datasets8
NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing8
Parameter Coverage for Testing of Autonomous Driving Systems under Uncertainty8
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge8
Automating App Review Response Generation Based on Contextual Knowledge8
Guaranteeing Timed Opacity using Parametric Timed Model Checking8
HybridCISave : A Combined Build and Test Selection Approach in Continuous Integration8
Diversifying Focused Testing for Unit Testing8
Toward a Holistic Approach to Verification and Validation of Autonomous Cognitive Systems8
Uncertainty-wise Requirements Prioritization with Search8
Dealing with Belief Uncertainty in Domain Models8
A Comparative Study on Method Comment and Inline Comment7
Duplicate Bug Report Detection: How Far Are We?7
A Practical Approach for Dynamic Taint Tracking with Control-flow Relationships7
Early Validation and Verification of System Behaviour in Model-based Systems Engineering: A Systematic Literature Review7
Mutation Testing in Evolving Systems: Studying the Relevance of Mutants to Code Evolution7
XCoS: Explainable Code Search Based on Query Scoping and Knowledge Graph7
GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks7
Do Performance Aspirations Matter for Guiding Software Configuration Tuning? An Empirical Investigation under Dual Performance Objectives7
Classifying Mobile Applications Using Word Embeddings7
Continuous Integration and Delivery Practices for Cyber-Physical Systems: An Interview-Based Study7
An Empirical Study on Type Annotations7
Feature Matching-based Approaches to Improve the Robustness of Android Visual GUI Testing7
Model Transformation Development Using Automated Requirements Analysis, Metamodel Matching, and Transformation by Example7
Predictive Mutation Analysis via the Natural Language Channel in Source Code7
Characterizing and Detecting WebAssembly Runtime Bugs7
Exploring Better Black-Box Test Case Prioritization via Log Analysis7
Automated, Cost-effective, and Update-driven App Testing7
Using Personality Detection Tools for Software Engineering Research: How Far Can We Go?7
1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis7
Influential Global and Local Contexts Guided Trace Representation for Fault Localization7
CodeMatcher: Searching Code Based on Sequential Semantics of Important Query Words7
Navigating the Complexity of Generative AI Adoption in Software Engineering7
A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs7
Measuring and Modeling Group Dynamics in Open-Source Software Development: A Tensor Decomposition Approach6
Prompt Sapper: A LLM-Empowered Production Tool for Building AI Chains6
Structured Chain-of-Thought Prompting for Code Generation6
Bug Localization in Model-Based Systems in the Wild6
Towards Learning Generalizable Code Embeddings Using Task-agnostic Graph Convolutional Networks6
Super-optimization of Smart Contracts6
MICOSE4aPS: Industrially Applicable Maturity Metric to Improve Systematic Reuse of Control Software6
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis6
Fold2Vec: Towards a Statement-Based Representation of Code for Code Comprehension6
Katana : Dual Slicing Based Context for Learning Bug Fixes6
Nudge: Accelerating Overdue Pull Requests toward Completion6
Making Sense of the Unknown: How Managers Make Cyber Security Decisions6
The Best of Both Worlds: Combining Learned Embeddings with Engineered Features for Accurate Prediction of Correct Patches6
RegionTrack6
Video Game Bad Smells: What They Are and How Developers Perceive Them6
iBiR : Bug-report-driven Fault Injection6
Verification of Distributed Systems via Sequential Emulation6
TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts6
What Is the Intended Usage Context of This Model? An Exploratory Study of Pre-Trained Models on Various Model Repositories6
What’s (Not) Working in Programmer User Studies?6
Coverage-Based Debloating for Java Bytecode5
Modern Code Reviews—Survey of Literature and Practice5
Code-line-level Bugginess Identification: How Far have We Come, and How Far have We Yet to Go?5
Examining Penetration Tester Behavior in the Collegiate Penetration Testing Competition5
Testing Feedforward Neural Networks Training Programs5
IFDS-based Context Debloating for Object-Sensitive Pointer Analysis5
Uncertainty-Aware Robustness Assessment of Industrial Elevator Systems5
COMET: Coverage-guided Model Generation For Deep Learning Library Testing5
Reliable Fix Patterns Inferred from Static Checkers for Automated Program Repair5
A Study on Blockchain Architecture Design Decisions and Their Security Attacks and Threats5
Recommending Faulty Configurations for Interacting Systems Under Test Using Multi-objective Search5
Representation Learning for Stack Overflow Posts: How Far Are We?5
I Depended on You and You Broke Me: An Empirical Study of Manifesting Breaking Changes in Client Packages5
Testing of Deep Reinforcement Learning Agents with Surrogate Models5
TestSGD : Interpretable Testing of Neural Networks against Subtle Group Discrimination5
QuoTe : Quality-oriented Testing for Deep Learning Systems5
Storage State Analysis and Extraction of Ethereum Blockchain Smart Contracts5
A Characterization Study of Merge Conflicts in Java Projects4
Precise Quantitative Analysis of Binarized Neural Networks: A BDD-based Approach4
Client-Specific Upgrade Compatibility Checking via Knowledge-Guided Discovery4
NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing - RCR Report4
sem2vec : Semantics-aware Assembly Tracelet Embedding4
Automated Mapping of Adaptive App GUIs from Phones to TVs4
Anchor : Fast and Precise Value-flow Analysis for Containers via Memory Orientation4
Parallel Test Prioritization4
The Human Side of Fuzzing: Challenges Faced by Developers during Fuzzing Activities4
Simulator-based Explanation and Debugging of Hazard-triggering Events in DNN-based Safety-critical Systems4
Method-level Bug Prediction: Problems and Promises4
Assessing and Improving an Evaluation Dataset for Detecting Semantic Code Clones via Deep Learning4
Retrieving API Knowledge from Tutorials and Stack Overflow Based on Natural Language Queries4
ArchRepair : Block-Level Architecture-Oriented Repairing for Deep Neural Networks4
Architecting Internet of Things Systems with Blockchain4
Dependency Update Strategies and Package Characteristics4
Parametric Timed Pattern Matching4
Finding Near-optimal Configurations in Colossal Spaces with Statistical Guarantees4
Hierarchical Distribution-aware Testing of Deep Learning4
PatchCensor: Patch Robustness Certification for Transformers via Exhaustive Testing4
I Know What You Are Searching for: Code Snippet Recommendation from Stack Overflow Posts4
Do Developers Really Know How to Use Git Commands? A Large-scale Study Using Stack Overflow4
Preference-wise Testing of Android Apps via Test Amplification4
Buddy Stacks: Protecting Return Addresses with Efficient Thread-Local Storage and Runtime Re-Randomization4
On the Reliability and Explainability of Language Models for Program Generation4
OSS Effort Estimation Using Software Features Similarity and Developer Activity-Based Metrics4
A Machine Learning Approach for Automated Filling of Categorical Fields in Data Entry Forms4
Estimating Probabilistic Safe WCET Ranges of Real-Time Systems at Design Stages3
Testing Multi-Subroutine Quantum Programs: From Unit Testing to Integration Testing3
Vision Transformer Inspired Automated Vulnerability Repair3
How Are Multilingual Systems Constructed: Characterizing Language Use and Selection in Open-Source Multilingual Software3
Guided Feature Identification and Removal for Resource-constrained Firmware3
Fairness Testing: A Comprehensive Survey and Analysis of Trends3
Security Responses in Software Development3
An Accurate Identifier Renaming Prediction and Suggestion Approach3
Causality-driven Testing of Autonomous Driving Systems3
A Taxonomy of Information Attributes for Test Case Prioritisation: Applicability, Machine Learning3
DeepGD: A Multi-Objective Black-Box Test Selection Approach for Deep Neural Networks3
On Wasted Contributions: Understanding the Dynamics of Contributor-Abandoned Pull Requests–A Mixed-Methods Study of 10 Large Open-Source Projects3
Open Source License Inconsistencies on GitHub3
Fine-grained Coverage-based Fuzzing3
Seed Selection for Testing Deep Neural Networks3
Enablers and Barriers of Empathy in Software Developer and User Interactions: A Mixed Methods Case Study3
Facet-oriented Modelling3
What Constitutes the Deployment and Runtime Configuration System? An Empirical Study on OpenStack Projects3
StubCoder : Automated Generation and Repair of Stub Code for Mock Objects3
StreamGen3
0.032270908355713