Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- keynoteMay 2024
Trustworthy by Design
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 3, Pages 1–4https://doi.org/10.1145/3597503.3649400The relatively recent public release of generative artificial intelligence (AI) systems has ignited a significant leap in awareness of the capabilities of AI. In parallel, there has been a recognition of AI system limitations and the bias inherent in ...
- keynoteMay 2024
Software Engineering Research in a World with Generative Artificial Intelligence
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 2, Pages 1–5https://doi.org/10.1145/3597503.3649399Generative artificial intelligence systems such as large language models (LLMs) exhibit powerful capabilities that many see as the kind of flexible and adaptive intelligence that previously only humans could exhibit. I address directions and implications ...
Lost in Translation: A Study of Bugs Introduced by Large Language Models while Translating Code
- Rangeet Pan,
- Ali Reza Ibrahimzada,
- Rahul Krishna,
- Divya Sankar,
- Lambert Pouguem Wassi,
- Michele Merler,
- Boris Sobolev,
- Raju Pavuluri,
- Saurabh Sinha,
- Reyhaneh Jabbarvand
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 82, Pages 1–13https://doi.org/10.1145/3597503.3639226Code translation aims to convert source code from one programming language (PL) to another. Given the promising abilities of large language models (LLMs) in code synthesis, researchers are exploring their potential to automate code translation. The ...
- research-articleApril 2024
DSFM: Enhancing Functional Code Clone Detection with Deep Subtree Interactions
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 221, Pages 1–12https://doi.org/10.1145/3597503.3639215Functional code clone detection is important for software maintenance. In recent years, deep learning techniques are introduced to improve the performance of functional code clone detectors. By representing each code snippet as a vector containing its ...
Fast Deterministic Black-box Context-free Grammar Inference
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 117, Pages 1–12https://doi.org/10.1145/3597503.3639214Black-box context-free grammar inference is a hard problem as in many practical settings it only has access to a limited number of example programs. The state-of-the-art approach Arvada heuristically generalizes grammar rules starting from flat parse ...
-
Combining Structured Static Code Information and Dynamic Symbolic Traces for Software Vulnerability Prediction
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 169, Pages 1–13https://doi.org/10.1145/3597503.3639212Deep learning (DL) has emerged as a viable means for identifying software bugs and vulnerabilities. The success of DL relies on having a suitable representation of the problem domain. However, existing DL-based solutions for learning program ...
- research-articleApril 2024
Mining Pull Requests to Detect Process Anomalies in Open Source Software Development
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 194, Pages 1–13https://doi.org/10.1145/3597503.3639196Trustworthy Open Source Software (OSS) development processes are the basis that secures the long-term trustworthiness of software projects and products. With the aim to investigate the trustworthiness of the Pull Request (PR) process, the common model of ...
- research-articleApril 2024
ChatGPT Incorrectness Detection in Software Reviews
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 180, Pages 1–12https://doi.org/10.1145/3597503.3639194We conducted a survey of 135 software engineering (SE) practitioners to understand how they use Generative AI-based chatbots like ChatGPT for SE tasks. We find that they want to use ChatGPT for SE tasks like software library selection but often worry ...
- research-articleApril 2024
Programming Assistant for Exception Handling with CodeBERT
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 94, Pages 1–13https://doi.org/10.1145/3597503.3639188With practical code reuse, the code fragments from developers' forums often migrate to applications. Owing to the incomplete nature of such fragments, they often lack the details on exception handling. The adaptation for exception handling to the ...
MAFT: Efficient Model-Agnostic Fairness Testing for Deep Neural Networks via Zero-Order Gradient Search
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 121, Pages 1–12https://doi.org/10.1145/3597503.3639181Deep neural networks (DNNs) have shown powerful performance in various applications and are increasingly being used in decisionmaking systems. However, concerns about fairness in DNNs always persist. Some efficient white-box fairness testing methods ...
S3C: Spatial Semantic Scene Coverage for Autonomous Vehicles
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 141, Pages 1–13https://doi.org/10.1145/3597503.3639178Autonomous vehicles (AVs) must be able to operate in a wide range of scenarios including those in the long tail distribution that include rare but safety-critical events. The collection of sensor input and expected output datasets from such scenarios is ...
- research-articleApril 2024
Demystifying and Detecting Misuses of Deep Learning APIs
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 201, Pages 1–12https://doi.org/10.1145/3597503.3639177Deep Learning (DL) libraries have significantly impacted various domains in computer science over the last decade. However, developers often face challenges when using the DL APIs, as the development paradigm of DL applications differs greatly from ...
Are Prompt Engineering and TODO Comments Friends or Foes? An Evaluation on GitHub Copilot
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 219, Pages 1–13https://doi.org/10.1145/3597503.3639176Code intelligence tools such as GitHub Copilot have begun to bridge the gap between natural language and programming language. A frequent software development task is the management of technical debts, which are suboptimal solutions or unaddressed issues ...
- research-articleApril 2024
Improving Smart Contract Security with Contrastive Learning-based Vulnerability Detection
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 156, Pages 1–11https://doi.org/10.1145/3597503.3639173Currently, smart contract vulnerabilities (SCVs) have emerged as a major factor threatening the transaction security of blockchain. Existing state-of-the-art methods rely on deep learning to mitigate this threat. They treat each input contract as an ...
- research-articleApril 2024
A User-centered Security Evaluation of Copilot
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 158, Pages 1–11https://doi.org/10.1145/3597503.3639154Code generation tools driven by artificial intelligence have recently become more popular due to advancements in deep learning and natural language processing that have increased their capabilities. The proliferation of these tools may be a double-edged ...
- research-articleApril 2024
Curiosity-Driven Testing for Sequential Decision-Making Process
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 165, Pages 1–14https://doi.org/10.1145/3597503.3639149Sequential decision-making processes (SDPs) are fundamental for complex real-world challenges, such as autonomous driving, robotic control, and traffic management. While recent advances in Deep Learning (DL) have led to mature solutions for solving these ...
- research-articleApril 2024
DeepLSH: Deep Locality-Sensitive Hash Learning for Fast and Efficient Near-Duplicate Crash Report Detection
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 198, Pages 1–12https://doi.org/10.1145/3597503.3639146Automatic crash bucketing is a crucial phase in the software development process for efficiently triaging bug reports. It generally consists in grouping similar reports through clustering techniques. However, with real-time streaming bug collection, ...
- research-articleApril 2024
Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 151, Pages 1–13https://doi.org/10.1145/3597503.3639142Vulnerability analysis is crucial for software security. Inspired by the success of pre-trained models on software engineering tasks, this work focuses on using pre-training techniques to enhance the understanding of vulnerable code and boost ...
- research-articleApril 2024
Traces of Memorisation in Large Language Models for Code
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 78, Pages 1–12https://doi.org/10.1145/3597503.3639133Large language models have gained significant popularity because of their ability to generate human-like text and potential applications in various fields, such as Software Engineering. Large language models for code are commonly trained on large ...
Recovering Trace Links Between Software Documentation And Code
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 215, Pages 1–13https://doi.org/10.1145/3597503.3639130Introduction Software development involves creating various artifacts at different levels of abstraction and establishing relationships between them is essential. Traceability link recovery (TLR) automates this process, enhancing software quality by ...