ACM Transactions on Software Engineering and Methodology

Papers
(The TQCC of ACM Transactions on Software Engineering and Methodology is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
DeepWukong148
A Tale of Two Cities: Software Developers Working from Home during the COVID-19 Pandemic99
Software Engineering for AI-Based Systems: A Survey98
Test Selection for Deep Learning Systems63
A Survey of Flaky Tests56
Developing Cost-Effective Blockchain-Powered Applications51
In-IDE Code Generation from Natural Language: Promise and Challenges50
An Empirical Study of the Impact of Hyperparameter Tuning and Model Optimization on the Performance Properties of Deep Neural Networks47
A Systematic Literature Review on the Use of Deep Learning in Software Engineering Research47
Understanding Software-2.047
Security Smells in Ansible and Chef Scripts46
Why an Android App Is Classified as Malware38
Deep Reinforcement Learning for Black-box Testing of Android Apps36
Why My Code Summarization Model Does Not Work35
When and How to Make Breaking Changes34
Women’s Participation in Open Source Software: A Survey of the Literature34
Context-Aware Code Change Embedding for Better Patch Correctness Assessment34
Context-aware Retrieval-based Deep Commit Message Generation34
Opinion Mining for Software Development: A Systematic Literature Review33
Accessibility in Software Practice: A Practitioner’s Perspective32
Beyond Tests31
NPC: N euron P ath C overage via Characterizing Decision Logic of Deep Neural Networks30
Defining a Knowledge Graph Development Process Through a Systematic Review30
The Agile Success Model30
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection30
Rise of the Planet of Serverless Computing: A Systematic Review28
A Survey on Automated Driving System Testing: Landscapes and Trends27
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching26
Code Structure–Guided Transformer for Source Code Summarization26
How Should I Improve the UI of My App?25
SPI: Automated Identification of Security Patches via Commits25
Stateful Serverless Computing with Crucial25
An Empirical Study on Data Distribution-Aware Test Selection for Deep Learning Enhancement25
IntDroid24
Efficient and Effective Feature Space Exploration for Testing Deep Learning Systems24
Arachne: Search-Based Repair of Deep Neural Networks24
A Comprehensive Empirical Study of Bias Mitigation Methods for Machine Learning Classifiers23
Adversarial Robustness of Deep Code Comment Generation23
Memory-Safety Challenge Considered Solved? An In-Depth Study with All Rust CVEs23
An Empirical Study of the Impact of Data Splitting Decisions on the Performance of AIOps Solutions22
Emoji-powered Sentiment and Emotion Detection from Software Developers’ Communication Data22
A Theory of Scrum Team Effectiveness21
Single and Multi-objective Test Cases Prioritization for Self-driving Cars in Virtual Environments21
Are Multi-Language Design Smells Fault-Prone? An Empirical Study21
How Far Have We Progressed in Identifying Self-admitted Technical Debts? A Comprehensive Empirical Study20
Towards Robustness of Deep Program Processing Models—Detection, Estimation, and Enhancement20
FaaSLight : General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing19
Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms19
SafeDrop: Detecting Memory Deallocation Bugs of Rust Programs via Static Data-flow Analysis19
Automated Patch Transplantation19
Enhancing Search-based Testing with Testability Transformations for Existing APIs19
Technical Q8A Site Answer Recommendation via Question Boosting19
History-based Model Repair Recommendations19
ReCDroid+: Automated End-to-End Crash Reproduction from Bug Reports for Android Apps18
Verification Witnesses18
The Weights Can Be Harmful: Pareto Search versus Weighted Search in Multi-objective Search-based Software Engineering18
ActivFORMS: A Formally Founded Model-based Approach to Engineer Self-adaptive Systems18
deGraphCS : Embedding Variable-based Flow Graph for Neural Code Search18
A Survey of Learning-based Automated Program Repair18
Killing Stubborn Mutants with Symbolic Execution17
On the Significance of Category Prediction for Code-Comment Synchronization17
Verifix: Verified Repair of Programming Assignments17
The Influence of Human Aspects on Requirements Engineering-related Activities: Software Practitioners’ Perspective17
Testing, Validation, and Verification of Robotic and Autonomous Systems: A Systematic Review16
Just-In-Time Defect Prediction on JavaScript Projects: A Replication Study16
Test Data Generation for Path Coverage of MPI Programs Using SAEO16
Psychometrics in Behavioral Software Engineering: A Methodological Introduction with Guidelines16
Predictive Models in Software Engineering: Challenges and Opportunities16
Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum15
How Software Refactoring Impacts Execution Time15
Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions15
Toward an Objective Measure of Developers’ Cognitive Activities15
Securing the Ethereum from Smart Ponzi Schemes: Identification Using Static Features15
The Impact of Dormant Defects on Defect Prediction: A Study of 19 Apache Projects15
Adaptive Hypermutation for Search-Based System Test Generation: A Study on REST APIs with EvoMaster15
On the Faults Found in REST APIs by Automated Test Generation14
Evaluation of Software Architectures under Uncertainty14
Boosting Compiler Testing via Compiler Optimization Exploration14
Predicting Performance Anomalies in Software Systems at Run-time14
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum14
An Empirical Study of Developer Discussions in the Gitter Platform14
On the Reproducibility and Replicability of Deep Learning in Software Engineering14
Predicting Patch Correctness Based on the Similarity of Failing Test Cases13
Are Comments on Stack Overflow Well Organized for Easy Retrieval by Developers?13
Self-Collaboration Code Generation via ChatGPT13
The Case for Adaptive Security Interventions13
L2S: A Framework for Synthesizing the Most Probable Program under a Specification12
Pied-Piper: Revealing the Backdoor Threats in Ethereum ERC Token Contracts12
Testing RESTful APIs: A Survey12
Uncertainty-aware Prediction Validator in Deep Learning Models for Cyber-physical System Data12
Refining ChatGPT-Generated Code: Characterizing and Mitigating Code Quality Issues12
Industry–Academia Research Collaboration and Knowledge Co-creation: Patterns and Anti-patterns12
Ethics in the Age of AI: An Analysis of AI Practitioners’ Awareness and Challenges12
Applying Bayesian Analysis Guidelines to Empirical Software Engineering Data: The Case of Programming Languages and Code Quality12
SemMT: A Semantic-Based Testing Approach for Machine Translation Systems12
Automated Identification of Toxic Code Reviews Using ToxiCR12
Toward Understanding Deep Learning Framework Bugs11
Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study11
Taming Reflection11
Leveraging Control Flow Knowledge in SMT Solving of Program Verification11
Automatic Fault Detection for Deep Learning Programs Using Graph Transformations11
CodeEditor : Learning to Edit Source Code with Pre-trained Models11
Context- and Fairness-Aware In-Process Crowdworker Recommendation11
White-Box Fuzzing RPC-Based APIs with EvoMaster: An Industrial Case Study11
Monitoring Constraints and Metaconstraints with Temporal Logics on Finite Traces11
Open Problems in Fuzzing RESTful APIs: A Comparison of Tools11
Is My Transaction Done Yet? An Empirical Study of Transaction Processing Times in the Ethereum Blockchain Platform10
APIRO: A Framework for Automated Security Tools API Recommendation10
Some Seeds Are Strong: Seeding Strategies for Search-based Test Case Selection10
Black-box Safety Analysis and Retraining of DNNs based on Feature Extraction and Clustering10
Automatically Identifying the Quality of Developer Chats for Post Hoc Use10
Microservice Security Metrics for Secure Communication, Identity Management, and Observability10
Automatic API Usage Scenario Documentation from Technical Q&A Sites10
Testing the Plasticity of Reinforcement Learning-based Systems10
Dissecting American Fuzzy Lop: A FuzzBench Evaluation10
Eagle9
Digital Twin-based Anomaly Detection with Curriculum Learning in Cyber-physical Systems9
Similarity-based Web Element Localization for Robust Test Automation9
Input Distribution Coverage: Measuring Feature Interaction Adequacy in Neural Network Testing9
Actor-Driven Decomposition of Microservices through Multi-level Scalability Assessment9
Towards a Consistent Interpretation of AIOps Models9
What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning9
S EADS9
Turnover of Companies in OpenStack: Prevalence and Rationale9
Leveraging the Defects Life Cycle to Label Affected Versions and Defective Classes9
Correlating Automated and Human Evaluation of Code Documentation Generation Quality9
Toward a Holistic Approach to Verification and Validation of Autonomous Cognitive Systems8
Uncertainty-wise Requirements Prioritization with Search8
Dealing with Belief Uncertainty in Domain Models8
Adversarial Specification Mining8
How Do Successful and Failed Projects Differ? A Socio-Technical Analysis8
Evaluating Surprise Adequacy for Deep Learning System Testing8
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities8
Self-Planning Code Generation with Large Language Models8
Fair Enough: Searching for Sufficient Measures of Fairness8
An Empirical Study of the Effectiveness of an Ensemble of Stand-alone Sentiment Detection Tools for Software Engineering Datasets8
NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing8
Parameter Coverage for Testing of Autonomous Driving Systems under Uncertainty8
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge8
Automating App Review Response Generation Based on Contextual Knowledge8
Guaranteeing Timed Opacity using Parametric Timed Model Checking8
HybridCISave : A Combined Build and Test Selection Approach in Continuous Integration8
Diversifying Focused Testing for Unit Testing8
A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs7
A Comparative Study on Method Comment and Inline Comment7
Duplicate Bug Report Detection: How Far Are We?7
A Practical Approach for Dynamic Taint Tracking with Control-flow Relationships7
Early Validation and Verification of System Behaviour in Model-based Systems Engineering: A Systematic Literature Review7
Mutation Testing in Evolving Systems: Studying the Relevance of Mutants to Code Evolution7
XCoS: Explainable Code Search Based on Query Scoping and Knowledge Graph7
GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks7
Do Performance Aspirations Matter for Guiding Software Configuration Tuning? An Empirical Investigation under Dual Performance Objectives7
Classifying Mobile Applications Using Word Embeddings7
Continuous Integration and Delivery Practices for Cyber-Physical Systems: An Interview-Based Study7
An Empirical Study on Type Annotations7
Feature Matching-based Approaches to Improve the Robustness of Android Visual GUI Testing7
Model Transformation Development Using Automated Requirements Analysis, Metamodel Matching, and Transformation by Example7
Predictive Mutation Analysis via the Natural Language Channel in Source Code7
Characterizing and Detecting WebAssembly Runtime Bugs7
Exploring Better Black-Box Test Case Prioritization via Log Analysis7
Automated, Cost-effective, and Update-driven App Testing7
Using Personality Detection Tools for Software Engineering Research: How Far Can We Go?7
1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis7
Influential Global and Local Contexts Guided Trace Representation for Fault Localization7
CodeMatcher: Searching Code Based on Sequential Semantics of Important Query Words7
Navigating the Complexity of Generative AI Adoption in Software Engineering7
0.029134035110474