ACM Transactions on Software Engineering and Methodology

Papers
(The median citation count of ACM Transactions on Software Engineering and Methodology is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Finding Information Leaks with Information Flow Fuzzing—RCR Report424
Mutant Reduction Evaluation: What is There and What is Missing?214
Automatic Identification of Game Stuttering via Gameplay Videos Analysis154
Test Generation Strategies for Building Failure Models and Explaining Spurious Failures103
I Depended on You and You Broke Me: An Empirical Study of Manifesting Breaking Changes in Client Packages101
Better Supporting Human Aspects in Mobile eHealth Apps: Development and Validation of Enhanced Guidelines101
Bounded Verification of Atomicity Violations for Interrupt-Driven Programs via Lazy Sequentialization100
History-Driven Fuzzing for Deep Learning Libraries95
TestLoop: A Process Model Describing Human-in-the-Loop Software Test Suite Generation90
SPENCER: Self-Adaptive Model Distillation for Efficient Code Retrieval90
KAPE: k NN-based Performance Testing for Deep Code Search88
Communicating Study Design Trade-offs in Software Engineering83
Enhancing Android Malware Detection: The Influence of ChatGPT on Decision-centric Task78
An empirical study on vulnerability disclosure management of open source software systems75
An Empirical Analysis of Machine Learning Model and Dataset Documentation, Supply Chain, and Licensing Challenges on Hugging Face72
FairGenerate: Enhancing Fairness through Synthetic Data Generation and Two-Fold Biased Labels Removal69
Preference-wise Testing of Android Apps via Test Amplification69
Neuron Semantic-Guided Test Generation for Deep Neural Networks Fuzzing64
M2CVD: Enhancing Vulnerability Understanding through Multi-Model Collaboration for Code Vulnerability Detection59
Horus : Accelerating Kernel Fuzzing through Efficient Host-VM Memory Access Procedures59
Deceiving Humans and Machines Alike: Search-based Test Input Generation for DNNs Using Variational Autoencoders58
Reusing d-DNNFs for Efficient Feature-Model Counting57
A Survey on Failure Analysis and Fault Injection in AI Systems57
Assessing the Robustness of Test Selection Methods for Deep Neural Networks57
An Empirical Study of the Non-Determinism of ChatGPT in Code Generation56
Securing the Ethereum from Smart Ponzi Schemes: Identification Using Static Features55
FoC: Figure Out the Cryptographic Functions in Stripped Binaries with LLMs52
Understanding the OSS Communities of Deep Learning Frameworks: A Comparative Case Study of P y T orch and T ensor52
An Empirical Study on Governance in Bitcoin’s Consensus Evolution49
A Comprehensive View on TD Prevention Practices and Reasons for Not Preventing It49
Assessing and Analyzing the Correctness of GitHub Copilot’s Code Suggestions46
Fine-Tuning Large Language Models to Improve Accuracy and Comprehensibility of Automated Code Review45
Storage State Analysis and Extraction of Ethereum Blockchain Smart Contracts44
Single and Multi-objective Test Cases Prioritization for Self-driving Cars in Virtual Environments44
A Survey of Learning-based Automated Program Repair44
FormatFuzzer : Effective Fuzzing of Binary File Formats44
Deep API Sequence Generation via Golden Solution Samples and API Seeds41
Enhancing Security and Acuity of Smart Contract Vulnerability Detection based on Federated Learning and BiLSTM-Attention41
JavaScript SBST Heuristics to Enable Effective Fuzzing of NodeJS Web APIs40
Characterizing Deep Learning Package Supply Chains in PyPI: Domains, Clusters, and Disengagement39
Towards Automating Domain-Specific Data Generation for Text-to-SQL: A Comprehensive Approach39
PVDetector: Pretrained Vulnerability Detection on Vulnerability-enriched Code Semantic Graph39
FAVDisco: Modeling and Discovering File Access Vulnerabilities39
Do Current Language Models Support Code Intelligence for R Programming Language?38
Systematic Literature Review on Software Security Vulnerability Information Extraction38
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks - RCR Report38
HeMiRCA: Fine-Grained Root Cause Analysis for Microservices with Heterogeneous Data Sources35
Help Them Understand: Testing and Improving Voice User Interfaces34
Estimating Uncertainty in Labeled Changes by SZZ Tools on Just-In-Time Defect Prediction33
I Know What You Are Searching for: Code Snippet Recommendation from Stack Overflow Posts33
Supporting Emotional Intelligence, Productivity and Team Goals while Handling Software Requirements Changes33
An Accurate Identifier Renaming Prediction and Suggestion Approach33
Toward Interpretable Graph Tensor Convolution Neural Network for Code Semantics Embedding32
Introducing Interactions in Multi-Objective Optimization of Software Architectures32
Try with Simpler - An Evaluation of Improved Principal Component Analysis in Log-based Anomaly Detection32
Why Do GitHub Actions Workflows Fail? An Empirical Study31
Assessing the Early Bird Heuristic (for Predicting Project Quality)31
When Fine-Tuning LLMs Meets Data Privacy: An Empirical Study of Federated Learning in LLM-Based Program Repair31
On-the-fly Generation-Quality Enhancement of Deep Code Models via Model Collaboration31
A Systematic Literature Review of Multi-Label Learning in Software Engineering30
Vulnerability Repair via Concolic Execution and Code Mutations30
AutoRIC: Automated Neural Network Repairing Based on Constrained Optimization30
Exploring Data-Efficient Adaptation of Large Language Models for Code Generation29
SimClone: Detecting Tabular Data Clones Using Value Similarity28
GIST : Generated Inputs Sets Transferability in Deep Learning28
An Empirical Study on GitHub Pull Requests’ Reactions28
Editorial: Toward the Future with Eight Issues Per Year28
Reinforcement Learning Informed Evolutionary Search for Autonomous Systems Testing27
Mapping the Trust Terrain: LLMs in Software Engineering - Insights and Perspectives26
Editorial: ICSE and the Incredible Contradictions of Software Engineering26
Revisiting the Identification of the Co-evolution of Production and Test Code26
PatchCensor: Patch Robustness Certification for Transformers via Exhaustive Testing26
A Survey of Learning-based Method Name Prediction25
Assessing and Improving an Evaluation Dataset for Detecting Semantic Code Clones via Deep Learning25
ADSDx: Towards Automated Accident Diagnosis for High-level Autonomous Driving Systems25
SimADFuzz: Simulation-Feedback Fuzz Testing for Autonomous Driving Systems25
SCOPE : Performance Testing for Serverless Computing25
Leveraging Reviewer Experience in Code Review Comment Generation25
An Empirical Study of Retrieval-Augmented Code Generation: Challenges and Opportunities25
APIRO: A Framework for Automated Security Tools API Recommendation25
Towards On-the-Fly Code Performance Profiling25
Industry–Academia Research Collaboration and Knowledge Co-creation: Patterns and Anti-patterns24
Contemporary Software Modernization: Strategies, Driving Forces, and Research Opportunities24
SourcererJBF: A Java Build Framework For Large-Scale Compilation23
Learning from Very Little Data: On the Value of Landscape Analysis for Predicting Software Project Health23
Commit Messages Generation Based on Core Changes23
Simulator-based Explanation and Debugging of Hazard-triggering Events in DNN-based Safety-critical Systems23
Security of Language Models for Code: A Systematic Literature Review22
You Don’t Have to Say Where to Edit! jLED—Joint Learning to Localize and Edit Source Code22
Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors22
Automatic Rule Checking for Microservices: Supporting Security Analysis with Explainability22
Towards Learning Generalizable Code Embeddings Using Task-agnostic Graph Convolutional Networks21
Efficient Multivariate Time Series Anomaly Detection through Transfer Learning for Large-Scale Software Systems21
A Comprehensive Empirical Study of Bias Mitigation Methods for Machine Learning Classifiers21
Test Input Prioritization for 3D Point Clouds21
Monitoring data for Anomaly Detection in Cloud-Based Systems: A Systematic Mapping Study21
MR-Scout: Automated Synthesis of Metamorphic Relations from Existing Test Cases21
Exploring Fine-Grained Bug Report Categorization with Large Language Models and Prompt Engineering: An Empirical Study21
Actor-Driven Decomposition of Microservices through Multi-level Scalability Assessment20
Exploring the Capabilities of LLMs for Code-Change-Related Tasks20
Characterizing Installation- and Run-time Compatibility Issues in Android Benign Apps and Malware20
Cleaning Up Confounding: Accounting for Endogeneity Using Instrumental Variables and Two-Stage Models20
Demo2Test: Transfer Testing of Agent in Competitive Environment with Failure Demonstrations20
Demystifying Hidden Sensitive Operations in Android Apps20
A Characterization Study of Merge Conflicts in Java Projects20
Fold2Vec: Towards a Statement-Based Representation of Code for Code Comprehension19
Graphuzz: Data-driven Seed Scheduling for Coverage-guided Greybox Fuzzing19
Generation-based Differential Fuzzing for Deep Learning Libraries19
Fairness Concerns in App Reviews: A Study on AI-Based Mobile Apps19
Evolution-Aware Constraint Derivation Approach for Software Remodularization19
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks19
Improving Deep Assertion Generation via Fine-Tuning Retrieval-Augmented Pre-trained Language Models19
Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers19
Developer Perspectives on Licensing and Copyright Issues Arising from Generative AI for Software Development19
Adaptive Modelling Languages: Abstract Syntax and Model Migration19
Enhancing Task In-Progress Time Predictions through Affective and Personality Factors19
SPOLRE: Semantic Preserving Object Layout Reconstruction for Image Captioning System Testing18
Interpreting Deep Neural Networks via Relative Activation-Deactivation Abstractions18
All in One: Design, Verification, and Implementation of SNOW-optimal Read Atomic Transactions18
MeDeT: Medical Device Digital Twins Creation with Few-shot Meta-learning18
Programming Smart Playtesting18
Bypassing Guardrails: Lessons Learned from Red Teaming ChatGPT18
Certified Cost Bounds for Abstract Programs18
Automating TODO-missed Methods Detection and Patching18
PonziHunter: Hunting Ethereum Ponzi Contract via Static Analysis and Contrastive Learning on the Bytecode Level18
Duplicate Bug Report Detection: How Far Are We?17
Stress Testing Control Loops in Cyber-Physical Systems—RCR Report17
Coverage-directed Differential Testing of X.509 Certificate Validation in SSL/TLS Implementations17
A Roadmap for Integrating Sustainability into Software Engineering Education17
Is It Hard to Generate Holistic Commit Message?17
Autonomous Driving System Testing via Diversity-Oriented Driving Scenario Exploration17
Efficient Management of Containers for Software Defined Vehicles17
Variable Renaming-Based Adversarial Test Generation for Code Model: Benchmark and Enhancement17
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum16
Reputation Gaming in Crowd Technical Knowledge Sharing16
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities16
Measuring and Clustering Heterogeneous Chatbot Designs16
Differentiable Quantum Programming with Unbounded Loops16
Testing Causality in Scientific Modelling Software16
OSS Effort Estimation Using Software Features Similarity and Developer Activity-Based Metrics16
Inferring Input Grammars from Code with Symbolic Parsing15
DiPri : Distance-Based Seed Prioritization for Greybox Fuzzing15
Input Distribution Coverage: Measuring Feature Interaction Adequacy in Neural Network Testing15
Reference-Based Retrieval-Augmented Unit Test Generation15
Visualization Task Taxonomy to Understand the Fuzzing Internals15
Exploring Development Methods for Reactive Synthesis Specifications15
Studying the Impact of TensorFlow and PyTorch Bindings on Machine Learning Software Quality15
A Comparative Study on Method Comment and Inline Comment15
On the Impact of Lower Recall and Precision in Defect Prediction for Guiding Search-based Software Testing15
MORepair: Teaching LLMs to Repair Code via Multi-Objective Fine-Tuning15
CITYWALK : Enhancing LLM-Based C++ Unit Test Generation via Project-Dependency Awareness and Language-Specific Knowledge15
AdaptiveLog: An Adaptive Log Analysis Framework with the Collaboration of Large and Small Language Model14
On the Significance of Category Prediction for Code-Comment Synchronization14
Preparation and Utilization of Mixed States for Testing Quantum Programs14
LogUpdater : Automated Detection and Repair of Specific Defects in Logging Statements14
Can GitHub Issues Help in App Review Classifications?14
The Influence of Human Aspects on Requirements Engineering-related Activities: Software Practitioners’ Perspective14
Assessing and Advancing Benchmarks for Evaluating Large Language Models in Software Engineering Tasks14
AI for DevSecOps: A Landscape and Future Opportunities14
An Interleaving Guided Metamorphic Testing Approach for Concurrent Programs14
Automatic Core-Developer Identification on GitHub: A Validation Study14
Survey of Code Search Based on Deep Learning13
A Hypothesis Testing-based Framework for Software Cross-modal Retrieval in Heterogeneous Semantic Spaces13
Understanding Real-Time Collaborative Programming: A Study of Visual Studio Live Share13
Mitigating Regression Faults Induced by Feature Evolution in Deep Learning Systems13
How Do Successful and Failed Projects Differ? A Socio-Technical Analysis13
PanicFI: An Infrastructure for Fixing Panic Bugs in Real-World Rust Programs13
Refactoring in Computational Notebooks13
Let’s Discover More API Relations: A Large Language Model-Based AI Chain for Unsupervised API Relation Inference13
Software Engineering by and for Humans in an AI Era13
Obfuscated Clone Search in JavaScript based on Reinforcement Subsequence Learning13
Exploring JVM Garbage Collector Testing with Event-Coverage12
Testing RESTful APIs: A Survey12
Large Language Models for Cyber Security: A Systematic Literature Review12
NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing12
Fast, Fine-Grained Equivalence Checking for Neural Decompilers12
Revealing the Unseen: AI Chain on LLMs for Predicting Implicit Dataflows to Generate Dataflow Graphs in Dynamically Typed Code12
Fairness Testing of Machine Translation Systems12
The IDEA of Us: An Identity-Aware Architecture for Autonomous Systems12
Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective12
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis12
Sustainability of Machine Learning-Enabled Systems: The Machine Learning Practitioner’s Perspective12
Towards Robustness of Deep Program Processing Models—Detection, Estimation, and Enhancement12
Some Seeds Are Strong: Seeding Strategies for Search-based Test Case Selection12
What Constitutes the Deployment and Runtime Configuration System? An Empirical Study on OpenStack Projects12
Can Coverage Criteria Guide Failure Discovery for Image Classifiers? An Empirical Study12
Identifying and Explaining Safety-critical Scenarios for Autonomous Vehicles via Key Features12
A Systematic Literature Review on the Use of Deep Learning in Software Engineering Research12
Data Complexity: A New Perspective for Analyzing the Difficulty of Defect Prediction Tasks12
BiRD: Race Detection in Software Binaries under Relaxed Memory Models12
Simulating Software Evolution to Evaluate the Reliability of Early Decision-making among Design Alternatives toward Maintainability12
Analysis of EMF meta-model duplication in open-source repositories11
The Havoc Paradox in Generator-Based Fuzzing—RCR Report11
Verification Witnesses11
Identifying Performance Issues in Cloud Service Systems Based on Relational-Temporal Features11
Test Oracle Generation for REST APIs11
Addressing OSS Community Managers’ Challenges in Contributor Retention11
Representation Learning for Stack Overflow Posts: How Far Are We?11
Automated Abstract Transformer Synthesis for Reduced Product Domains11
Open Problems in Fuzzing RESTful APIs: A Comparison of Tools11
Revisiting Sentiment Analysis for Software Engineering in the Era of Large Language Models11
Toward Better Comprehension of Breaking Changes in the NPM Ecosystem11
Grammar Mutation for Testing Input Parsers11
Divide-and-Conquer: Automating Code Revisions via Localization-and-Revision11
Decision Support Model for Selecting the Optimal Blockchain Oracle Platform: An Evaluation of Key Factors11
An Empirical Study on the Relationship between Defects and Source Code’s Unnaturalness11
Mobile Application Online Cross-Project Just-in-Time Software Defect Prediction Framework10
CCIHunter: Enhancing Smart Contract Code-Comment Inconsistencies Detection via Two-Stage Pre-training10
Editorial: The End of the Journey10
Large Language Model-Aware In-Context Learning for Code Generation10
Making Software Development More Diverse and Inclusive: Key Themes, Challenges, and Future Directions10
VexIR2Vec : An Architecture-Neutral Embedding Framework for Binary Similarity10
SemMT: A Semantic-Based Testing Approach for Machine Translation Systems10
Understanding Vulnerability Inducing Commits of the Linux Kernel10
Model Driven Engineering, Artificial Intelligence, and DevOps for Software and Systems Engineering: A Systematic Mapping Study of Synergies and Challenges10
A Review of Learning-based Smart Contract Vulnerability Detection: A Perspective on Code Representation10
Microservice Security Metrics for Secure Communication, Identity Management, and Observability10
Digital Twin-based Anomaly Detection with Curriculum Learning in Cyber-physical Systems10
Recommending Variable Names for Extract Local Variable Refactorings10
Less Is More: Unlocking Semi-Supervised Deep Learning for Vulnerability Detection10
How the Quality of Maintenance Tasks is Affected by Criteria for Selecting Engineers for Collaboration10
Large Language Model for Vulnerability Detection and Repair: Literature Review and the Road Ahead10
Automated Identification of Toxic Code Reviews Using ToxiCR10
Leveraging Symmetry in GR(1) Synthesis10
DRIVE: Dockerfile Rule Mining and Violation Detection10
My Fuzzers Won’t Build: An Empirical Study of Fuzzing Build Failures9
AceCoder : An Effective Prompting Technique Specialized in Code Generation9
Identifying Affected Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and Libraries9
AcTracer: Active Testing of Large Language Model via Multi-Stage Sampling9
Rise of the Planet of Serverless Computing: A Systematic Review9
Influential Global and Local Contexts Guided Trace Representation for Fault Localization9
The Good, the Bad, and the Missing: Neural Code Generation for Machine Learning Tasks9
NeMo: A Neuron-Level Modularizing-While-Training Approach for Decomposing DNN Models9
Making Sense of the Unknown: How Managers Make Cyber Security Decisions9
Foster the use of Hackathons in Collaborative Research Projects: Methodology, Experience Report and Lesson Learned9
Are Static Analysis Tools Still Working during the Evolution of Smart Contracts? A Comprehensive Empirical Study9
Finding Information Leaks with Information Flow Fuzzing9
Learning Software Bug Reports: A Systematic Literature Review9
Sustainability in the Field of Software Engineering: A Tertiary Study9
Software Security Analysis in 2030 and Beyond: A Research Roadmap9
Finding Near-optimal Configurations in Colossal Spaces with Statistical Guarantees9
An Automated Approach to Constructing STRIDE Threat Rule Model and Updating Rule Base9
FLITSR: Improved Spectrum-Based Localization of Multiple Faults by Iterative Test Suite Reduction – RCR Report9
Prompt-Based Code Completion via Multi-Retrieval Augmented Generation9
Benchmarking and Categorizing the Performance of Neural Program Repair Systems for Java9
From Triumph to Uncertainty: The Journey of Software Engineering in the AI Era9
Enumerating Valid Non-Alpha-Equivalent Programs for Interpreter Testing9
Learning-based Relaxation of Completeness Requirements for Data Entry Forms9
Blindspots in Python and Java APIs Result in Vulnerable Code9
A Comprehensive Study of Governance Issues in Decentralized Finance Applications9
0.73238921165466