Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
ERD-CQC : Enhanced Rule and Dependency Code Quality Check for Java
Internetware '24: Proceedings of the 15th Asia-Pacific Symposium on InternetwarePages 377–386https://doi.org/10.1145/3671016.3674820In the field of software development, the application of code quality check tools has become a key factor in improving product quality and development efficiency. While many existing tools are effective at detecting common problems in code, there are ...
- research-articleApril 2024
PyAnalyzer: An Effective and Practical Approach for Dependency Extraction from Python Code
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 112, Pages 1–12https://doi.org/10.1145/3597503.3640325Dependency extraction based on static analysis lays the groundwork for a wide range of applications. However, dynamic language features in Python make code behaviors obscure and nondeterministic; consequently, it poses huge challenges for static analyses ...
- research-articleApril 2024
Cross-Inlining Binary Function Similarity Detection
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 223, Pages 1–13https://doi.org/10.1145/3597503.3639080Binary function similarity detection plays an important role in a wide range of security applications. Existing works usually assume that the query function and target function share equal semantics and compare their full semantics to obtain the ...
- research-articleMarch 2024
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 4285–4300https://doi.org/10.1109/TIFS.2024.3376968Deep neural networks (DNNs) and natural language processing (NLP) systems have developed rapidly and have been widely used in various real-world fields. However, they have been shown to be vulnerable to backdoor attacks. Specifically, the adversary ...
- research-articleMay 2023
1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 32, Issue 4Article No.: 87, Pages 1–26https://doi.org/10.1145/3561385Binary similarity analysis is critical to many code-reuse-related issues, where function matching is its fundamental task. “1-to-1” mechanism has been applied in most binary similarity analysis works, in which one function in a binary file is matched ...
Dependency Facade: The Coupling and Conflicts between Android Framework and Its Customization
ICSE '23: Proceedings of the 45th International Conference on Software EngineeringPages 1674–1686https://doi.org/10.1109/ICSE48619.2023.00144Mobile device vendors develop their customized Android OS (termed downstream) based on Google Android (termed upstream) to support new features. During daily independent development, the downstream also periodically merges changes of a new release ...
- research-articleMarch 2023
Evaluating the Impact of Possible Dependencies on Architecture-Level Maintainability
IEEE Transactions on Software Engineering (ISOF), Volume 49, Issue 3Pages 1064–1085https://doi.org/10.1109/TSE.2022.3171288Dependencies among software entities are the foundation for much of the research on software architecture analysis and architecture analysis tools. Dynamically typed languages, such as Python, JavaScript and Ruby, tolerate the lack of explicit type ...
- research-articleJuly 2022
One step further: evaluating interpreters using metamorphic testing
ISSTA 2022: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 327–339https://doi.org/10.1145/3533767.3534225The black-box nature of the Deep Neural Network (DNN) makes it difficult for people to understand why it makes a specific decision, which restricts its applications in critical tasks. Recently, many interpreters (interpretation methods) are proposed to ...
- research-articleJuly 2022
Explanation-guided fairness testing through genetic algorithm
ICSE '22: Proceedings of the 44th International Conference on Software EngineeringPages 871–882https://doi.org/10.1145/3510003.3510137The fairness characteristic is a critical attribute of trusted AI systems. A plethora of research has proposed diverse methods for individual fairness testing. However, they are suffering from three major limitations, i.e., low efficiency, low ...
- research-articleJune 2022
Where to start: studying type annotation practices in python
ASE '21: Proceedings of the 36th IEEE/ACM International Conference on Automated Software EngineeringPages 529–541https://doi.org/10.1109/ASE51524.2021.9678947Dynamic programming languages have been embracing gradual typing, which supports optional type annotations in source code. Type-annotating a complex and long-lasting codebase is indeed a gradual and expensive process, where two issues have troubled ...
- research-articleJanuary 2021
Exploring the architectural impact of possible dependencies in Python software
ASE '20: Proceedings of the 35th IEEE/ACM International Conference on Automated Software EngineeringPages 758–770https://doi.org/10.1145/3324884.3416619Dependencies among software entities are the basis for many software analytic research and architecture analysis tools. Dynamically typed languages, such as Python, JavaScript and Ruby, tolerate the lack of explicit type references, making certain ...
- research-articleMay 2019
Investigating the impact of multiple dependency structures on software defects
ICSE '19: Proceedings of the 41st International Conference on Software EngineeringPages 584–595https://doi.org/10.1109/ICSE.2019.00069Over the past decades, numerous approaches were proposed to help practitioner to predict or locate defective files. These techniques often use syntactic dependency, history co-change relation, or semantic similarity. The problem is that, it remains ...
- research-articleMay 2019
ENRE: a tool framework for extensible eNtity relation extraction
ICSE '19: Proceedings of the 41st International Conference on Software Engineering: Companion ProceedingsPages 67–70https://doi.org/10.1109/ICSE-Companion.2019.00040Understanding the dependencies among code entities is fundamental to many software analysis tools and techniques. However, with the emergence of new programming languages and paradigms, the increasingly common practice of writing systems in multiple ...
- articleSeptember 2018
Dynamic structure measurement for distributed software
Software Quality Journal (KLU-SQJO), Volume 26, Issue 3Pages 1119–1145https://doi.org/10.1007/s11219-017-9369-3With the advent of network technologies and the ultra-fast increasing of computing ability, the distributed architecture has become a necessity for the majority of software systems. However, it is difficult for current architecture measurements to ...
- research-articleSeptember 2016
Dynamic cohesion measurement for distributed system
SCTDCP 2016: Proceedings of the 1st International Workshop on Specification, Comprehension, Testing, and Debugging of Concurrent ProgramsPages 20–26https://doi.org/10.1145/2975954.2975956Instead of developing single-server software system for the powerful computers, the software is turning from large single-server to multi-server system such as distributed system. This change introduces a new challenge for the software quality ...
- ArticleSeptember 2013
Parameter Estimation for Perspective Projection Based on Camera Calibration in Skull-Face Overlay
ICVRV '13: Proceedings of the 2013 International Conference on Virtual Reality and VisualizationPages 317–320https://doi.org/10.1109/ICVRV.2013.62Craniofacial superimposition is a forensic process that aims to identify a missing person from a photograph and an unknown dead's skull. One of the crucial steps is skull-face overlay in consistent with photographic space according to the face photo. ...