Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2024
EpiTESTER: Testing Autonomous Vehicles With Epigenetic Algorithm and Attention Mechanism
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 10Pages 2614–2632https://doi.org/10.1109/TSE.2024.3449429Testing autonomous vehicles (AVs) under various environmental scenarios that lead the vehicles to unsafe situations is challenging. Given the infinite possible environmental scenarios, it is essential to find critical scenarios efficiently. To this end, ...
- research-articleAugust 2024
Learning to Generate Structured Code Summaries From Hybrid Code Context
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 10Pages 2512–2528https://doi.org/10.1109/TSE.2024.3439562Code summarization aims to automatically generate natural language descriptions for code, and has become a rapidly expanding research area in the past decades. Unfortunately, existing approaches mainly focus on the “one-to-one” mapping from ...
- research-articleJuly 2024
Towards Efficient Fine-Tuning of Language Models With Organizational Data for Automated Software Review
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 9Pages 2240–2253https://doi.org/10.1109/TSE.2024.3428324Large language models like BERT and GPT possess significant capabilities and potential impacts across various applications. Software engineers often use these models for code-related tasks, including generating, debugging, and summarizing code. ...
- research-articleJuly 2024
BinCola: Diversity-Sensitive Contrastive Learning for Binary Code Similarity Detection
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 10Pages 2485–2497https://doi.org/10.1109/TSE.2024.3411072Binary Code Similarity Detection (BCSD) is a fundamental binary analysis technique in the area of software security. Recently, advanced deep learning algorithms are integrated into BCSD platforms to achieve superior performance on well-known benchmarks. ...
- research-articleJuly 2024
Esale: <underline>E</underline>nhancing Code-<underline>S</underline>ummary <underline>A</underline>lignment <underline>Le</underline>arning for Source Code Summarization
- Chunrong Fang,
- Weisong Sun,
- Yuchen Chen,
- Xiao Chen,
- Zhao Wei,
- Quanjun Zhang,
- Yudu You,
- Bin Luo,
- Yang Liu,
- Zhenyu Chen
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 8Pages 2077–2095https://doi.org/10.1109/TSE.2024.3422274(Source) code summarization aims to automatically generate succinct natural language summaries for given code snippets. Such summaries play a significant role in promoting developers to understand and maintain code. Inspired by neural machine translation, ...
-
- research-articleJuly 2024
Boundary State Generation for Testing and Improvement of Autonomous Driving Systems
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 8Pages 2040–2053https://doi.org/10.1109/TSE.2024.3420816Recent advances in Deep Neural Networks (DNNs) and sensor technologies are enabling autonomous driving systems (ADSs) with an ever-increasing level of autonomy. However, assessing their dependability remains a critical concern. State-of-the-art ADS ...
- research-articleNovember 2023
Robust Test Selection for Deep Neural Networks
IEEE Transactions on Software Engineering (ISOF), Volume 49, Issue 12Pages 5250–5278https://doi.org/10.1109/TSE.2023.3330982Deep Neural Networks (DNNs) have been widely used in various domains, such as computer vision and software engineering. Although many DNNs have been deployed to assist various tasks in the real world, similar to traditional software, they also suffer from ...
- research-articleSeptember 2023
An Easy Data Augmentation Approach for Application Reviews Event Inference
IEEE Transactions on Software Engineering (ISOF), Volume 49, Issue 10Pages 4751–4772https://doi.org/10.1109/TSE.2023.3313989Application review event inference aims to assess the effectiveness of application problems in response to user actions, which enables application developers to promptly discover and address potential issues in various applications, thereby improving ...
- research-articleSeptember 2023
DexBERT: Effective, Task-Agnostic and Fine-Grained Representation Learning of Android Bytecode
IEEE Transactions on Software Engineering (ISOF), Volume 49, Issue 10Pages 4691–4706https://doi.org/10.1109/TSE.2023.3310874The automation of an increasingly large number of software engineering tasks is becoming possible thanks to Machine Learning (ML). One foundational building block in the application of ML to software artifacts is the <italic>representation</italic> of ...
- research-articleAugust 2023
VulExplainer: A Transformer-Based Hierarchical Distillation for Explaining Vulnerability Types
IEEE Transactions on Software Engineering (ISOF), Volume 49, Issue 10Pages 4550–4565https://doi.org/10.1109/TSE.2023.3305244Deep learning-based vulnerability prediction approaches are proposed to help under-resourced security practitioners to detect vulnerable functions. However, security practitioners still do not know what type of vulnerabilities correspond to a given ...
- research-articleOctober 2022
RNN-Test: Towards Adversarial Testing for Recurrent Neural Network Systems
IEEE Transactions on Software Engineering (ISOF), Volume 48, Issue 10Pages 4167–4180https://doi.org/10.1109/TSE.2021.3114353While massive efforts have been investigated in adversarial testing of convolutional neural networks (CNN), testing for recurrent neural networks (RNN) is still limited and leaves threats for vast sequential application domains. In this paper, we propose ...
- research-articleAugust 2022
On the Value of Oversampling for Deep Learning in Software Defect Prediction
IEEE Transactions on Software Engineering (ISOF), Volume 48, Issue 8Pages 3103–3116https://doi.org/10.1109/TSE.2021.3079841One truism of deep learning is that the automatic feature engineering (seen in the first layers of those networks) excuses data scientists from performing tedious manual feature engineering prior to running DL. For the specific case of deep learning for ...
- research-articleAugust 2022
The Importance of the Correlation in Crossover Experiments
IEEE Transactions on Software Engineering (ISOF), Volume 48, Issue 8Pages 2802–2813https://doi.org/10.1109/TSE.2021.3070480<italic>Context:</italic> In empirical software engineering, crossover designs are popular for experiments comparing software engineering techniques that must be undertaken by human participants. However, their value depends on the correlation (<inline-...
- research-articleMay 2022
Towards Security Threats of Deep Learning Systems: A Survey
IEEE Transactions on Software Engineering (ISOF), Volume 48, Issue 5Pages 1743–1770https://doi.org/10.1109/TSE.2020.3034721Deep learning has gained tremendous success and great popularity in the past few years. However, deep learning systems are suffering several inherent weaknesses, which can threaten the security of learning models. Deep learning’s wide use further ...
- research-articleJanuary 2021
Automatic Feature Learning for Predicting Vulnerable Software Components
IEEE Transactions on Software Engineering (ISOF), Volume 47, Issue 1Pages 67–85https://doi.org/10.1109/TSE.2018.2881961Code flaws or vulnerabilities are prevalent in software systems and can potentially cause a variety of problems including deadlock, hacking, information loss and system failure. A variety of approaches have been developed to try and detect the most likely ...
- research-articleOctober 2013
The Impact of Classifier Configuration and Classifier Combination on Bug Localization
IEEE Transactions on Software Engineering (ISOF), Volume 39, Issue 10Pages 1427–1443https://doi.org/10.1109/TSE.2013.27Bug localization is the task of determining which source code entities are relevant to a bug report. Manual bug localization is labor intensive since developers must consider thousands of source code entities. Current research builds bug localization ...
- research-articleApril 2013
Reducing Features to Improve Code Change-Based Bug Prediction
IEEE Transactions on Software Engineering (ISOF), Volume 39, Issue 4Pages 552–569https://doi.org/10.1109/TSE.2012.43Machine learning classifiers have recently emerged as a way to predict the introduction of bugs in changes made to source code files. The classifier is first trained on software history, and then used to predict if an impending change causes a bug. ...
- research-articleFebruary 2013
Toward Comprehensible Software Fault Prediction Models Using Bayesian Network Classifiers
IEEE Transactions on Software Engineering (ISOF), Volume 39, Issue 2Pages 237–257https://doi.org/10.1109/TSE.2012.20Software testing is a crucial activity during software development and fault prediction models assist practitioners herein by providing an upfront identification of faulty software code by drawing upon the machine learning literature. While especially ...
- articleMay 2011
Does Socio-Technical Congruence Have an Effect on Software Build Success? A Study of Coordination in a Software Project
IEEE Transactions on Software Engineering (ISOF), Volume 37, Issue 3Pages 307–324https://doi.org/10.1109/TSE.2011.29Socio-technical congruence is an approach that measures coordination by examining the alignment between the technical dependencies and the social coordination in the project. We conduct a case study of coordination in the IBM Rational Team Concert ...
- research-articleJanuary 2009
Predicting Project Velocity in XP Using a Learning Dynamic Bayesian Network Model
IEEE Transactions on Software Engineering (ISOF), Volume 35, Issue 1Pages 124–137https://doi.org/10.1109/TSE.2008.76Bayesian networks, which can combine sparse data, prior assumptions and expert judgment into a single causal model, have already been used to build software effort prediction models. We present such a model of an Extreme Programming environment and show ...