Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025JUST ACCEPTED
TAEFuzz: Automatic Fuzzing for Image-based Deep Learning Systems via Transferable Adversarial Examples
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3714463Deep learning (DL) components have been broadly applied in diverse applications. Similar to traditional software engineering, effective test case generation methods are needed by industry to enhance the quality and robustness of these deep learning ...
- research-articleJanuary 2025JUST ACCEPTED
Making Fault Localization in Online Service Systems More Actionable and Interpretable
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3714466Online service systems struggle with accurately and quickly pinpointing and resolving failures within their intricate systems, and it therefore emerges the solutions for fault localization in the code. However, the previous fault localization models ...
- research-articleJanuary 2025JUST ACCEPTED
Exploring Parameter-Efficient Fine-Tuning Techniques for Code Generation with Large Language Models
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3714461Large language models (LLMs) demonstrate impressive capabilities to generate accurate code snippets given natural language intents in a zero-shot manner, i.e., without the need for specific fine-tuning. While prior studies have highlighted the advantages ...
- research-articleJanuary 2025JUST ACCEPTED
DDASR: Deep Diverse API Sequence Recommendation
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3712188Recommending API sequences is crucial in software development, saving developers time and effort. While previous studies primarily focus on accuracy, often recommending popular APIs, they tend to overlook less frequent, or ‘tail,’ APIs. This oversight, ...
- research-articleJanuary 2025
-
- research-articleJanuary 2025
QuanTest: Entanglement-Guided Testing of Quantum Neural Network Systems
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 34, Issue 2Article No.: 48, Pages 1–32https://doi.org/10.1145/3688840Quantum Neural Network (QNN) combines the deep learning (DL) principle with the fundamental theory of quantum mechanics to achieve machine learning tasks with quantum acceleration. Recently, QNN systems have been found to manifest robustness issues ...
A Machine Learning Approach for Automated Filling of Categorical Fields in Data Entry Forms—RCR Report
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 34, Issue 2Article No.: 56, Pages 1–7https://doi.org/10.1145/3702985This article represents the Replicated Computational Results (RCR) related to our TOSEM paper “A Machine Learning Approach for Automated Filling of Categorical Fields in Data Entry Forms,” where we proposed LAFF, an approach to automatically suggest ...
- research-articleJanuary 2025
- research-articleJanuary 2025
AutoRIC: Automated Neural Network Repairing Based on Constrained Optimization
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 34, Issue 2Article No.: 50, Pages 1–29https://doi.org/10.1145/3690634Neural networks are important computational models used in the domains of artificial intelligence and software engineering. Parameters of a neural network are obtained via training it against a specific dataset with a standard process, which guarantees ...
- research-articleJanuary 2025JUST ACCEPTED
On the Practicability of Deep Learning based Anomaly Detection for Modern Online Software Systems: A Pre-Train-and-Align Framework
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3712195Operation and maintenance are critical activities in the whole life cycle of modern online software systems, and anomaly detection is a crucial step of these activities. Recent studies mainly develop deep learning techniques to complete this task. Notably,...
- research-articleDecember 2024
Studying the Impact of TensorFlow and PyTorch Bindings on Machine Learning Software Quality
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 34, Issue 1Article No.: 20, Pages 1–31https://doi.org/10.1145/3678168Bindings for machine learning frameworks (such as TensorFlow and PyTorch) allow developers to integrate a framework’s functionality using a programming language different from the framework’s default language (usually Python). In this article, we study ...
- research-articleDecember 2024
- research-articleDecember 2024JUST ACCEPTED
A Systematic Literature Review of Multi-Label Learning in Software Engineering
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3708532In this paper, we provide the first systematic literature review of the intersection of two research areas, Multi-Label Learning (MLL) and Software Engineering (SE). We refer to this intersection as MLL4SE. In recent years, MLL problems have increased in ...
- research-articleDecember 2024JUST ACCEPTED
TEESlice: Protecting Sensitive Neural Network Models in Trusted Execution Environments When Attackers have Pre-Trained Models
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3707453Trusted Execution Environments (TEE) are used to safeguard on-device models. However, directly employing TEEs to secure the entire DNN model is challenging due to the limited computational speed. Utilizing GPU can accelerate DNN's computation speed but ...
- research-articleDecember 2024JUST ACCEPTED
- research-articleDecember 2024JUST ACCEPTED
Beyond Cohesion and Coupling: Integrating Control Flow in Software Modularization Process for Better Code Comprehensibility
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3707452As software systems evolve to meet the changing needs of users, understanding the source code becomes a critical step in the process. Clustering techniques, also known as modularization techniques, offer a solution to breaking down complex source code ...
- research-articleDecember 2024
Neural Solving Uninterpreted Predicates with Abstract Gradient Descent
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 33, Issue 8Article No.: 215, Pages 1–47https://doi.org/10.1145/3675394Uninterpreted predicate solving is a fundamental problem in formal verification, including loop invariant and constrained horn clauses predicate solving. Existing approaches have been mostly in symbolic ways. While achieving sustainable progress, they ...
- research-articleDecember 2024
GIST: Generated Inputs Sets Transferability in Deep Learning
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 33, Issue 8Article No.: 214, Pages 1–38https://doi.org/10.1145/3672457To foster the verifiability and testability of deep neural networks (DNN), an increasing number of methods for test case generation techniques are being developed.
When confronted with testing DNN models, the user can apply any existing test generation ...
- research-articleNovember 2024