Multi-view adaptive contrastive learning for information retrieval based fault localization Chunying ZhouXiaoyuan XieBing Li OriginalPaper 06 November 2025 Article: 29
MalModel: hiding malicious payload in mobile deep learning models with black-box backdoor attack Jiayi HuaKailong WangHaoyu Wang OriginalPaper 29 October 2025 Article: 28
Predicting software defects using an extreme gradient boosting model tuned with reinforcement learning based spider wasp optimizer Raja OueslatiMohamed Wajdi OuertaniAmit Chhabra OriginalPaper 28 October 2025 Article: 27
Assessing the effectiveness of recent closed-source large language models in fault localization and automated program repair Bo WangMing DengJie M. Zhang OriginalPaper 28 October 2025 Article: 26
LMFuzz: Program repair fuzzing based on large language models Renze LinRan WangXianghua Xu OriginalPaper 28 October 2025 Article: 25
ByteEye: A smart contract vulnerability detection framework at bytecode level with graph neural networks Jinni YangShuang LiuYe Lu OriginalPaper Open access 22 October 2025 Article: 24
Augmenting software quality assurance with AI and automation using PyTest-BDD Xiaofei ZhaoHua WangYing Wang OriginalPaper 22 October 2025 Article: 23
JDExtractor: an automated approach for efficient extraction of defect-related methods in Java projects Tianyang LiuJiawei YeWeixing Ji OriginalPaper 18 October 2025 Article: 22
A systematic exploration of C-to-rust code translation based on large language models: prompt strategies and automated repair Ruxin ZhangShanxin ZhangLinbo Xie OriginalPaper 18 October 2025 Article: 21
Towards integrated dashboards for better management of human-centric issues in software development Liam ToddKashumi MadampeJohn Grundy OriginalPaper 18 October 2025 Article: 20
Automating software size measurement from python code using language models Samet TenekeciHüseyin ÜnlüOnur Demirörs OriginalPaper 18 October 2025 Article: 19
On the role of search budgets in model-based software refactoring optimization J. Andres Diaz-PaceDaniele Di PompeoMichele Tucci OriginalPaper Open access 18 October 2025 Article: 18
Graph neural networks for precise bug localization through structural program analysis Leila YousofvandSeyfollah SoleimaniAmin Nikanjam OriginalPaper Open access 18 October 2025 Article: 17
Decomposition then watermarking: Enhancing code traceability with dual-channel code watermarking Haibo LinZhong LiXuandong Li OriginalPaper 10 October 2025 Article: 16
A sign language to SQL query translation system for enhancing database accessibility Guocang YangDawei YuanZhenghan Chen OriginalPaper 07 October 2025 Article: 15
Toward efficient testing of graph neural networks via test input prioritization Lichen YangQiang WangYu Li OriginalPaper 07 October 2025 Article: 14
Graph based transfer learning with orthogonal tunning for functionality size insights Nevena RankovićDragica RankovićFederico Zamberlan OriginalPaper Open access 06 October 2025 Article: 13
Improving anomaly detection in software logs through hybrid language modeling and reduced reliance on parser Yicheng SunJacky KeungHi Kuen Yu OriginalPaper 29 September 2025 Article: 12
PIONEER: improving the robustness of student models when compressing pre-trained models of code Xiangyue LiuXinwei LiuFeng Zhou OriginalPaper 23 September 2025 Article: 11
BRMDS: an LLM-based multi-dimensional summary generation approach for bug reports Yayun ZhangYuying LiJunwei Du OriginalPaper 23 September 2025 Article: 10
Investigating the bugs in reinforcement learning programs: Insights from Stack Overflow and GitHub Jiayin SongYike LiWenjia Niu OriginalPaper 23 September 2025 Article: 9
Causes and effects of fitness landscapes in system test generation: a replication study Omur SahinMan ZhangAndrea Arcuri OriginalPaper Open access 18 September 2025 Article: 8
Harnessing large language models for virtual reality exploration testing: a case study Zhenyu QiHaotang LiXue Qin OriginalPaper Open access 18 September 2025 Article: 7
Intelligent test case generation method for fuzzing IoT protocols based on LLM Ming ZhongZisheng ZengZhiguo Ding OriginalPaper 18 September 2025 Article: 6
HMF: Enhancing reentrancy vulnerability detection and repair with a hybrid model framework Mengliang LiQiang ShenJianling Sun OriginalPaper Open access 13 September 2025 Article: 5
Automatic Code Generation Techniques: A Systematic Literature Review Maha AlharbiMohammad Alshayeb OriginalPaper 12 September 2025 Article: 4
GPTVD: vulnerability detection and analysis method based on LLM’s chain of thoughts Yinan ChenYuan HuangLei Yun OriginalPaper 09 September 2025 Article: 3
Enhanced neighborhood metric for spreadsheet fault prediction Haitao SunYing WangZhiliang Zhu OriginalPaper 09 September 2025 Article: 2
Enhancing the ability of LLMs for spaceborne equipment code generation via retrieval-augmented generation and contrastive learning Rui HeLiang ZhangChangbin Xue OriginalPaper 29 August 2025 Article: 1
Adaptive and accessible user interfaces for seniors through model-driven engineering Shavindra WickramathilakaJohn GrundyOmar Haggag OriginalPaper Open access 11 August 2025 Article: 74
Automated detection of affected libraries from vulnerability reports Jinwei XuHe ZhangHaifeng Shen OriginalPaper 11 August 2025 Article: 73
Unveiling code clone patterns in open source VR software: an empirical study Huashan ChenZisheng HuangSen He OriginalPaper 07 August 2025 Article: 72
Ethereum fraud smart contract detection using heterogeneous semantic graph Wei ChenXinjun JiangLeyuan Liu OriginalPaper 07 August 2025 Article: 71
Agents in software engineering: survey, landscape, and vision Yanlin WangWanjun ZhongZibin Zheng OriginalPaper 07 August 2025 Article: 70
Envisioning responsible quantum software engineering and quantum artificial intelligence Muneera BanoShaukat AliDidar Zowghi OriginalPaper Open access 01 August 2025 Article: 69
Detection of hidden privilege escalations in android Mohamed A. El-ZawawyAya Hamdy OriginalPaper Open access 01 August 2025 Article: 68
MCL-VD: Multi-modal contrastive learning with LoRA-enhanced GraphCodeBERT for effective vulnerability detection Yi CaoXiaolin JuLina Gong OriginalPaper 28 July 2025 Article: 67
From code to insight: studying code representation techniques for ML-based God class detection to support intelligent IDEs Elmohanad HaroonKhaled Tawfik WassifLamia Abo Zaid OriginalPaper Open access 25 July 2025 Article: 66
DESCG: data encoding scheme classification with GNN in binary analysis Xushu DaiNanqing LuoPeng Liu OriginalPaper Open access 18 July 2025 Article: 65
DPEfficR: a data and parameter efficient approach for training neural API recommendation model Haibo YuXiaohong HanWei Yang OriginalPaper 16 July 2025 Article: 64
Enhancing search-based testing with LLMs for finding bugs in system simulators Aidan DakhamaKarine Even-MendozaJustyna Petke OriginalPaper Open access 10 July 2025 Article: 63
Mobile application review summarization using chain of density prompting Shristi ShresthaAnas Mahmoud OriginalPaper 24 June 2025 Article: 62
DC-GAR: detecting vulnerabilities by utilizing graph properties and random walks to uncover richer features Meng WangXiao HanJiangfan Guo OriginalPaper 14 June 2025 Article: 61
On-the-fly unfolding with optimal exploration for linear temporal logic model checking of concurrent software and systems Shuo LiLi’ao ZhengZhijun Ding OriginalPaper 11 June 2025 Article: 60
NexuSym: Marrying symbolic path finders with large language models Jiayi WangPing YuXiaoxing Ma OriginalPaper 07 June 2025 Article: 59
What information contributes to log-based anomaly detection? Insights from a configurable transformer-based approach Xingfang WuHeng LiFoutse Khomh OriginalPaper 03 June 2025 Article: 58
Semi-supervised software vulnerability assessment via code lexical and structural information fusion Wenlong PeiYilin HuangChao Ni OriginalPaper 03 June 2025 Article: 57
Software testing for extended reality applications: a systematic mapping study Ruizhen GuJosé Miguel RojasDonghwan Shin OriginalPaper Open access 03 June 2025 Article: 56
HGNNLink: recovering requirements-code traceability links with text and dependency-aware heterogeneous graph neural networks Bangchao WangZhiyuan ZouPeng Liang OriginalPaper 31 May 2025 Article: 55
Continuous integration of architectural performance models with parametric dependencies – the CIPM approach Manar MazkatliDavid MonscheinAnne Koziolek OriginalPaper Open access 29 May 2025 Article: 54