API misuses refer to incorrect usages that violate the usage constraints of API elements, potentially leading to issues such as runtime errors, exceptions, program crashes, and security vulnerabilities. Existing mining-based approaches for API misuse detection face challenges in accuracy, particularly in distinguishing infrequent from invalid usage. This limitation stems from the necessity to set pre-defined thresholds for frequent API usage patterns, resulting in potential misclassification of alternative usages. This paper introduces Poirot, a learning-based approach that mitigates the need for predefined thresholds. Leveraging Labeled, Graph-based Convolutional Networks, Poirot learns embeddings for API usages, capturing key features and enhancing API misuse detection. Preliminary evaluation on an API misuse benchmark demonstrates that our model achieves a relative improvement of 1.37–10.36X in F-score compared to state-of-the-art API misuse detection techniques.
Wed 17 AprDisplayed time zone: Lisbon change
15:30 - 16:00 | |||
15:30 30mPoster | Graph Neural Networks based Log Anomaly Detection and Explanation Posters | ||
15:30 30mPoster | Unleashing the Giants: Enabling Advanced Testing for Infrastructure as Code Posters Daniel Sokolowski University of St. Gallen, David Spielmann University of St. Gallen, Guido Salvaneschi University of St. Gallen Link to publication DOI Pre-print | ||
15:30 30mPoster | Engineering Industry-Ready Anomaly Detection Algorithms Posters Ngoc-Thanh Nguyen Western Norway University of Applied Sciences, Rogardt Heldal , Patrizio Pelliccione Gran Sasso Science Institute, L'Aquila, Italy File Attached | ||
15:30 30mPoster | Behavior Trees with Dataflow: Coordinating Reactive Tasks in Lingua Franca Posters Alexander Schulz-Rosengarten Kiel University, Department of Computer Science, Akash Ahmad Kiel University, Department of Computer Science, Malte Clement Kiel University, Department of Computer Science, Reinhard von Hanxleden Kiel University, Benjamin Asch University of California, Berkeley, Marten Lohstroh University of California, Berkeley, Edward Lee University of California at Berkeley, Gustavo Quiros Siemens Technology, Ankit Shukla Siemens Technology | ||
15:30 30mPoster | A Study of Backporting Code in Open-Source Software for Characterizing Changesets Posters Debasish Chakroborti University of Saskatchewan, Chanchal K. Roy University of Saskatchewan, Canada, Kevin Schneider University of Saskatchewan | ||
15:30 30mPoster | Domain Knowledge is All You Need: A Field Deployment of LLM-Powered Test Case Generation in FinTech Domain Posters Zhiyi Xue East China Normal University, Liangguo Li East China Normal University, Senyue Tian East China Normal University, Xiaohong Chen ECNU, Pingping Li Guotai Junan Securities Co., Ltd, Liangyu Chen East China Normal University, Tingting Jiang Guotai Junan Securities Co., Ltd, Min Zhang East China Normal University | ||
15:30 30mPoster | A Transformer-based Model for Assisting Dockerfile Revising Posters Yiwen Wu National University of Defense Technology, Yang Zhang National University of Defense Technology, China, Tao Wang National University of Defense Technology, Huaimin Wang | ||
15:30 30mPoster | Poirot: Deep Learning for API Misuse Detection Posters Yi Li New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas, Shaohua Wang Central University of Finance and Economics, Aashish Yadavally University of Texas at Dallas | ||
15:30 30mPoster | Going Viral: Case Studies on the Impact of Protestware Posters Youmei Fan Nara Institute of Science and Technology, Dong Wang Kyushu University, Japan, Supatsara Wattanakriengkrai Nara Institute of Science and Technology, Hathaichanok Damrongsiri Nara Institute of Science and Technology, Christoph Treude Singapore Management University, Hideaki Hata Shinshu University, Raula Gaikovina Kula Nara Institute of Science and Technology Pre-print File Attached | ||
15:30 30mPoster | Neural Exception Handling Recommender Posters Yi Li New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas, Yuchen Cai University of Texas at Dallas, Aashish Yadavally University of Texas at Dallas, Abhishek Mishra University of Texas at Dallas, Genesis Montejo University of Texas at Dallas | ||
15:30 30mPoster | Towards Leveraging Fine-Grained Dependencies to Check Requirements Traceability Correctness Posters Anamaria-Roberta Hartl Johannes Kepler University Linz, Christoph Mayr-Dorn JOHANNES KEPLER UNIVERSITY LINZ, Atif Mashkoor Johannes Kepler University Linz, Wesley Assunção North Carolina State University, Alexander Egyed Johannes Kepler University Linz | ||
15:30 30mPoster | Imperfect Code Generation: Uncovering Weaknesses in Automatic Code Generation by Large Language Models Posters Xiaoli Lian Beihang University, China, Shuaisong Wang Beihang University, Jieping Ma Beihang University, Xin Tan Beihang University, Fang Liu Beihang University, Lin Shi Beihang University, Cuiyun Gao Harbin Institute of Technology, Li Zhang Beihang University | ||
15:30 30mPoster | Understanding the Strategies Used by Employees to Cope with Technostress in the Software Industry Posters Valtteri Siitonen University of Jyväskylä, Saima Ritonummi University of Jyväskylä, Markus Salo University of Jyväskylä, Henri Pirkkalainen Tampere University, Saija Mauno University of Jyväskylä | ||
15:30 30mPoster | Programmable and Semantic Connector for DNN Component Integration: a Software Engineering Perspective Posters |