APSEC 2025 (series) /
APSEC 2025 Program
Filter Program
Dates
Rooms
Tracks
Badges
Your Program
This program is tentative and subject to change.
Wed 3 DecDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
Wed 3 Dec
Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
09:00 - 09:30 | |||
09:00 30mDay opening | Opening Ceremony Technical Track | ||
09:30 - 10:30 | |||
09:30 60mKeynote | Keynote 1: How to Build AI Agent, How to Build Agentic AI, and How to Build Automatically? Keynotes Yang Liu Nanyang Technological University | ||
10:30 - 11:00 | |||
10:30 30mCoffee break | Coffee Break Technical Track | ||
11:00 - 12:00 | |||
11:00 60mKeynote | Keynote 2: Navigating the Impact of Large Language Models on Software Engineering: Challenges and Opportunities Keynotes Xin Xia Zhejiang University | ||
12:00 - 14:00 | |||
12:00 2hLunch | Lunch Technical Track | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | AutoRCA: A Graph Sequence-based Automatic Root Cause Analysis Method for Microservice Systems Through Multimodal Data Technical Track | ||
14:20 20mFull-paper | CAMUS: Context-Aware Neural Mutation Selection Technical Track Mingda Chen Beijing Jiaotong University, Bo Wang Beijing Jiaotong University, Youfang Lin Beijing Jiaotong University, Jie M. Zhang King's College London | ||
14:40 20mFull-paper | ISA: Test Case Generation based on Improved Simulated Annealing Algorithm Technical Track Shunhui Ji Hohai University, Yu Shi Hohai University, Ji Deng Hohai University, Pengcheng Zhang Hohai University | ||
15:00 20mFull-paper | Trace: Test Repair via Agent-based Context Extraction with LLMs Technical Track Jingxiang Tu , Bo Lin National University of Defense Technology, Yihao Qin , Shangwen Wang National University of Defense Technology, Liqian Chen National University of Defense Technology, Xiaoguang Mao National University of Defense Technology | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | Enhancing Commit Classification for Software Maintenance with Adversarial Learning Technical Track | ||
14:20 20mFull-paper | Reliable Code Generation with Test Case Prioritization and Cognitive Validation Technical Track Lingyun Huang Zhejiang University, Xin Yin Zhejiang University, Xinrui Li School of Software Technology, Zhejiang University, Chao Ni Zhejiang University | ||
14:40 20mFull-paper | SeedOrNot: A Classification-Driven Framework for Efficient Seed Scheduling in Hybrid Fuzzing Technical Track Qian Yan National Key Laboratory of Science and Technology on Information System Security, Minhuan Huang National Key Laboratory of Science and Technology on Information System Security, Huayang Cao National Key Laboratory of Science and Technology on Information System Security | ||
15:00 20mFull-paper | Understanding Commercial Low-code App Bugs Technical Track Hadia Syed Shanghai Jiao Tong University, Zhixing He , Ye Tang Shanghai Jiao Tong University, Jiqing Liu Shanghai Jiao Tong University, Shengjie Chen Inspur, Lixin Sun Inspur, Hao Zhong Shanghai Jiao Tong University | ||
14:00 - 15:30 | |||
14:00 15mFull-paper | An Empirical Analysis of ESLint Information Components and Their Interactions in LLM-based Program Repair Early Research Achievements (ERA) Shinhyuck Kang Sungkyunkwan University, Jinseok Heo Sungkyunkwan University, Eunseok Lee Sungkyunkwan University | ||
14:15 15mFull-paper | Compressing Cell Execution Logs Embedded within Jupyter Notebook Files Early Research Achievements (ERA) Tomoki Nakamaru The University of Tokyo | ||
14:30 15mFull-paper | Developing a Japanese-Localization Code Benchmark for LLMs Early Research Achievements (ERA) Haruka Tsuchida Japan Women's University, Miyu Sato Japan Women's University, Yuha Nishigata Japan Women's University, Ito Waka Japan Women's University, Kimio Kuramitsu Japan Women's University | ||
14:45 15mFull-paper | DTM: Deterministic Approaches for Black-box Test Suite Minimization with Tree-based Similarity Early Research Achievements (ERA) Md Siam , Shartaz Sajid Nahid Institute of Information Technology, University of Dhaka, Md Arif Hasan University of Dhaka, Bangladesh, Nurul Ahad Tawhid Institute of Information Technology, University of Dhaka, Kazi Sakib Institute of Information Technology, University of Dhaka | ||
15:00 15mFull-paper | Enhancing Requirement-to-Code Traceability via Chain-of-Thought Prompting in Large Language Models Early Research Achievements (ERA) wang wenqing , Ye Wang Zhejiang Gongshang University, Liping Zhao , Qiao Huang Zhejiang Gongshang University, Bo Jiang Zhejiang Gongshang University | ||
15:15 15mFull-paper | RAG4Test: Retrieving GUI States for Multilingual Bug Report and Test Case Generation via LLMs Early Research Achievements (ERA) Zhiyao Wang The University of Osaka, Xiujing Guo The University of Osaka, Tatsuhiro Tsuchiya Osaka University | ||
14:00 - 15:00 | |||
14:00 15mFull-paper | A Catalog of Participatory Reuse Challenges, Solutions, and Lessons Learned Software Engineering in Practices (SEIP) Xingru Chen , Muhammad Usman Blekinge Institute of Technology, Deepika Badampudi Blekinge Institute of Technology | ||
14:15 15mFull-paper | Constructing and Evaluating Domain-Specific Synthetic QA Datasets for Airborne Software Engineering: An LLM-Based Framework in Practice Software Engineering in Practices (SEIP) Xiyue Ruan Avicas Generic Technology Co., Ltd, Zheng Xu Avicas Generic Technology Co., Ltd, Xu yifan , Yunduo Wang School of Software, Beihang University, Lindong Wang Shanghai Jiao Tong University, Minzhe Li Shanghai Jiao Tong University, Ning Ge School of Software, Beihang University | ||
14:30 15mFull-paper | It Only Gets Worse: Revisiting DL-Based Vulnerability Detectors from a Practical Perspective Software Engineering in Practices (SEIP) Yuqian Wang Tianjin University, Xiaohong Li Tianjin University, Ruitao Feng Southern Cross University, Yao Zhang Tianjin University, Yuekang Li UNSW | ||
14:45 15mFull-paper | Virtualization-based Penetration Testing Study for Detecting Accessibility Abuse Vulnerabilities in Banking Apps in East and Southeast Asia Software Engineering in Practices (SEIP) Wei Minn Singapore Management University, Phong Phan i-Sprint Innovations Pte. Ltd, Vikas K. Malviya Singapore Management University, Benjamin Adolphi Promon, Yan Naing Tun Singapore Management University, Henning Benzon Treichl Promon, Albert Ching i-Sprint Innovations Pte. Ltd, Lwin Khin Shar Singapore Management University, David Lo Singapore Management University | ||
15:30 - 16:00 | |||
15:30 30mCoffee break | Coffee Break Technical Track | ||
16:00 - 17:20 | |||
16:00 20mFull-paper | Systematic Mapping Study on Risks and Vulnerabilities in Software Containers Technical Track Maha Sroor University of Jyväskylä, Teerath Das University of Jyväskylä, Rahul Mohanani University of Jyväskylä, Tommi Mikkonen University of Jyvaskyla | ||
16:20 20mFull-paper | A Hierarchical Hybrid-Intelligence Architecture with Consensus, Debate, and Reflection for High-Fidelity NL-to-PPTL Conversion Technical Track | ||
16:40 20mFull-paper | MAAP: A Self-Evolving Multi-Agent Automated Vulnerability Repair Framework for Python Technical Track Junfan Chen Hainan University, Zhiyuan Fu Hainan University, Ting Yang Xidian University, Ruidong Li Kanazawa University, Hongyu Sun Hainan University, Yuqing Zhang University of Chinese Academy of Sciences, Hainan University | ||
17:00 20mFull-paper | An Empirical Study of Reinforcement Learning-based Class Integration Test Order Generation Technical Track Jiayi Wang Shenzhen Technology University, Shuxiang Zheng Shenzhen Technology University, Miao Zhang Shenzhen Technology University, Yan Xiao Sun Yat-sen University, Peihong Chen Shenzhen Technology University, Xiaoxing Yang Shenzhen Technology University | ||
16:00 - 17:20 | |||
16:00 20mFull-paper | Human Ants are Beneficial for Team Performance Technical Track Iflaah Salman Lappeenranta-Lahti University of Technology (LUT), Alvaro Francisco Gil Universidad Politécnica de Madrid, Juan Garbajosa Technical University of Madrid, Peter Gloor Massachusetts Institute of Technology SDM | ||
16:20 20mFull-paper | IPSO: An Improved Particle Swarm Optimization-Based Method for Test Case Generation Technical Track Peng Wang Hohai University, Shunhui Ji Hohai University, Yikun Guo Hohai University, Pengcheng Zhang Hohai University | ||
16:40 20mFull-paper | MTL-CR: A Multitask Learning Approach for Code Representation Technical Track | ||
17:00 20mFull-paper | Testing Deep Learning Libraries with Semantic Equivalent API Patterns Technical Track Yan Song Wuhan University, Songqiang Chen The Hong Kong University of Science and Technology, Haoyu Peng Wuhan University, Xiaoyuan Xie Wuhan University | ||
16:00 - 17:30 | |||
16:00 15mFull-paper | Explainable Software Engineering: From State of the Practice to State of the Art Early Research Achievements (ERA) Zheng Li Queen's University Belfast, UK, Maria Angela Ferrario Queen's University Belfast, Ben Crossey Queen's University Belfast, Austen Rainer Queen's University Belfast | ||
16:15 15mFull-paper | Function-level Optimization Automatic Tuner for Numerical Programs Early Research Achievements (ERA) Xinni Liu National University of Defense Technology, College of Computer Science and Technology, Xinpeng Li National University of Defense Technology, College of Computer Science and Technology, Guangping Yu National University of Defense Technology, College of Computer Science and Technology, Hengbiao Yu , Xin Yi National University of Defense Technology, Chun Huang National University of Defense Technology | ||
16:30 15mFull-paper | How Far Have LLMs Come Toward Automated SATD Taxonomy Construction? Early Research Achievements (ERA) Sota Nakashima Kyushu University, Yuta Ishimoto Kyushu University, Masanari Kondo Kyushu University, Tao Xiao Kyushu University, Yasutaka Kamei Kyushu University | ||
16:45 15mFull-paper | MAJD: Intent-Aware Multi-Agent Framework for Jailbreak Defense Early Research Achievements (ERA) Jigang Xie China Unicom Western Innovation Institute, Zhengfan Wang Xi'an Jiaotong University, Junchao He China Unicom Western Innovation Institute, Wenjing Jiao Xi'an Jiaotong University, Pengfei Dang China Unicom Western Innovation Institute, Yadong Zhou Lanzhou Jiaotong University, Wei Zhang China Unicom Western Innovation Institute, Ming Fan Xi'an Jiaotong University | ||
17:00 15mFull-paper | Resilient Auto-Scaling of Microservice Architectures with Efficient Resource Management Early Research Achievements (ERA) Hussain Ahmad University of Adelaide, Christoph Treude Singapore Management University, Markus Wagner Monash University, Australia, Claudia Szabo The University of Adelaide | ||
17:15 15mFull-paper | Towards Function-Level Correctness Assessment of System Software with LLMs: A Case Study Early Research Achievements (ERA) | ||
16:00 - 16:45 | |||
16:00 15mFull-paper | Towards Data-Driven Real-Time Performance Monitoring of Platform Ecosystems Software Engineering in Practices (SEIP) Hegazy Shady Siemens Technology, Muhammad Ammar Siemens Technology, Christoph Elsner Siemens Technology, Jan Bosch Chalmers University of Technology, Helena Holmstr√∂m Olsson Malmö University | ||
16:15 15mFull-paper | LogExpertSolver: A Multi-Agent Framework for Domain-Specialized Log Parsing Software Engineering in Practices (SEIP) Chenxi Mao Sun Yat-sen University, Yuxin Su Sun Yat-sen University, Yuxin Su Sun Yat-sen University, Dan Li Sun Yat-sen University | ||
16:30 15mFull-paper | Pipelined Zero-Copy Architecture in Edge Stream Processing Software Engineering in Practices (SEIP) Yu Su Southeast University, Hui Xue Southeast University, Junyi Zhang The 54th Research Institute of CETC | ||
Thu 4 DecDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
Thu 4 Dec
Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
09:00 - 10:00 | |||
09:00 60mKeynote | Keynote 3: Software Supply Chain Security of Web3 Keynotes Martin Monperrus KTH Royal Institute of Technology | ||
10:00 - 10:30 | |||
10:00 30mCoffee break | Coffee Break Technical Track | ||
10:30 - 12:10 | |||
10:30 20mFull-paper | BDafny: A Formal Execution and Verification Framework of the BPMN 2.0 in Dafny Technical Track Ziqing Su East China Normal University, Sini Chen , Ran Li East China Normal University, Huibiao Zhu , Jiapeng Wang East China Normal University | ||
10:50 20mFull-paper | MicroRacer: Detecting Concurrency Bugs for Cloud Service Systems Technical Track Zhiling Deng School of Software Engineering, Sun Yat-sen University, Zhuangbin Chen Sun Yat-sen University, Juepeng Wang School of Software Engineering, Sun Yat-sen University | ||
11:10 20mFull-paper | MUATC: Multi-Agent Utilization to Augment Test Coverage Technical Track Tiecheng Ma College of Computer Science and Technology, National University of Defense Technology, Sirui Liu , Jiaxin Liu National University of Defense Technology, Yating Zhang National University of Defense Technology, Wei Dong National University of Defense Technology | ||
11:30 20mFull-paper | PyReach: A Multi-Agent Framework for Vulnerability Reachability Analysis in Python Technical Track Yueqin Wang Institute of Software Chinese Academy of Sciences, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Xiang Ling Institute of Software, Chinese Academy of Sciences, Tianyue Luo , Xu Wang Institute of Software, Chinese Academy of Sciences | ||
11:50 20mFull-paper | Recovering Variable Names in The Decompiled Code Based on Multi-Task Learning Technical Track Jiayi Li Nanjing University of Aeronautics and Astronautics, Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, Jian He Shanghai Aerospace Electronic Technology Institute, Jingjing Gu Nanjing University of Aeronautics and Astronautics, Weiqin Zou Nanjing University of Aeronautics and Astronautics | ||
10:30 - 11:50 | |||
10:30 20mFull-paper | BEGA:A Binary Code Embedding Method Based on Gravity-Model Augmentation Graph Contrastive Learning Technical Track Zhenglin Li Northeastern University, Dongqi Wang Northeastern University, Shuyue Zhang Northeastern University, Ruiguo Hu , Dongming Chen Northeastern University | ||
10:50 20mFull-paper | Conanj: Confidential Data Analysis for Confidential Computing of Java Programs Technical Track Xinyuan Miao Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University, Ziyi Lin Alibaba Group | ||
11:10 20mFull-paper | Empirical assessment of the perception of graphical threat model acceptability Technical Track | ||
11:30 20mFull-paper | Smart Contract Vulnerability Detection Based on Residual Dilated Convolution with Multi-Head Attention Technical Track Ruoxin Bai , Meng Wang Hebei university, Wanqing Liu Hebei Key Laboratory of High Trusted Information System, Hebei University, Liang Wang Hebei University | ||
10:30 - 12:00 | |||
10:30 15mFull-paper | Feature-based Transfer Learning in Cross-Project Defect Prediction: A Systematic Review Early Research Achievements (ERA) Wang Yunpeng , Dongcheng Li California State Polytechnic University, Man Zhao China University of Geosciences(Wuhan), W. Eric Wong University of Texas at Dallas | ||
10:45 15mFull-paper | KG-Code: A Knowledge Graph Guided Pre-Training Approach for Code Representation Early Research Achievements (ERA) | ||
11:00 15mFull-paper | MSWT: Multi-Scale Wavelet Transformer for Dynamic Feature-Based Student Program Error Identification Early Research Achievements (ERA) YU LINGZHONG , Qing Zhou College of Computer, Chongqing University, Subo Zhao College of Computer, Chongqing University, Siyuan Wang Chongqing University, China | ||
11:15 15mFull-paper | Multi-Dimensional Metamorphic Testing of Terminology in Machine Translation Early Research Achievements (ERA) | ||
11:30 15mFull-paper | Natural Language Explanation in Code Clone Detection using LLM-based Post Hoc Explainer Early Research Achievements (ERA) Teeradaj Racharak Tohoku University, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Chayanee Junplong Mahidol University, Akara Supratak University College London | ||
11:45 15mFull-paper | Practices and Challenges of Using DeepSeek in SE: An Empirical Study Early Research Achievements (ERA) | ||
12:30 - 14:00 | |||
12:30 90mLunch | Lunch Technical Track | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | caSPESC2Vyper: Conformant and Automatic Generation from DeFi SPESC Legal Contract to Vyper Smart Contract Technical Track Yue Yu South-Central Minzu University, Jiahui Wang South-Central Minzu University, Bo Meng South-Central Minzu University, Dejun Wang South-Central Minzu University | ||
14:20 20mFull-paper | FixConsult: Leveraging External Defect Knowledge Driven Natural Language Suggestions Generation for Software Vulnerability Repair Technical Track Gang Hu School of Information Science & Engineering, Yunnan University, LinHui Geng School of Information Science&Engineering, Yunnan University, JiaYao Jin School of Information Science&Engineering, Yunnan University, Xiaoshu Sun School of Information Science&Engineering, Yunnan University, Min Peng | ||
14:40 20mFull-paper | Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks against Binary Code Similarity Detection Technical Track Ran Wei Key Laboratory of Cyberspace Security, Hui Shu , Fei Kang Key Laboratory of Cyberspace Security, Ministry of Education Zhengzhou China, Yuyao Huang Key Laboratory of Cyberspace Security, Ministry of Education Zhengzhou China | ||
15:00 20mFull-paper | Software Defect Prediction Based on Temporal Hypergraph Neural Network Technical Track Peng He Hubei University, Shuai Hu Hubei university, Ju Ma Wuhan university, Haoqing Yang Hubei university, Yifan Wang Hubei university | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | A First Look at Privacy Risks of Android Task-executable Voice Assistant Applications Technical Track Shidong Pan Columbia University & New York University, Yikai Ge Washington University in St. Louis, xiaoyu sun The Australian National University | ||
14:20 20mFull-paper | Latent Search-Based Boundary Aware Fairness Testing for Deployed Deep Models Technical Track Qingyuan Sun , Wentian Zhao Beijing Institute of Technology, Tian Song Beijing Institute of Technology | ||
14:40 20mFull-paper | Lightweight Attention-based Temporal Modeling of Key Facial Features for Driver Fatigue Detection in Intelligent Driver Monitoring Systems Technical Track BaiLing Song Wuhan University of Technology, Lanhao Qin Huazhong University of Science and Technology, Wenhua Hu , Jianwen Xiang , Rui Hao Wuhan University of Technology | ||
15:00 20mFull-paper | Seed-Adapted Cross-State Protocol Fuzzing Technical Track DingchengLi , Shihao Zhu Institute of Software, Chinese Academy of Sciences, Yan Cai Institute of Software at Chinese Academy of Sciences, Long Zhang Institute of Software, Chinese Academy of Sciences | ||
14:00 - 15:30 | |||
14:00 15mFull-paper | A Software Architecture Resilience Assessment Method via Dynamic Bayesian Networks Early Research Achievements (ERA) Hao Chen Southeast University, Bixin Li Southeast University, Chunguang Zhang Southeast University, Zixuan Liu Southeast University | ||
14:15 15mFull-paper | Automating Requirements Modelling with LLMs: An Iterative Contrastive Optimisation Approach Early Research Achievements (ERA) | ||
14:30 15mFull-paper | BlockAlign: Fair Performance Testing for Blockchains based on Configuration Alignment Early Research Achievements (ERA) Jing shi , Chenglin Xie Peking University, Jianbo Gao Peking University, Peilun Li Shanghai Tree-Graph Blockchain Research Institute, Guoli Yang Advanced Institute of Big Data, Xiaoying Bai Advanced Institute of Big Data | ||
14:45 15mFull-paper | QEC-LLM: Training Query-focused Extractive Compression Model with LLM-guiding for Open Domain QA Early Research Achievements (ERA) Sijia Wang North China University of Technology, Jy Duan , Xin Li , Haoguang Wen , Yizhuo Zhang Hebei University of Engineering, Chunming Liu , Zibo Yi | ||
15:00 15mFull-paper | Cross-Project Defect Prediction Based on Feature Fusion and Local Domain Adaptation Early Research Achievements (ERA) Xianglu Zhou , Xiaoyan Zhu School of Computer Science and Technology, Xi’ an Jiaotong University, Shaan Xi, China, Yu Wang , Jiayin Wang Xi'an Jiaotong University, Xin Lai School of Computer Science and Technology, Xi’ an Jiaotong University, Shaan Xi, China | ||
15:15 15mFull-paper | Towards Engineering Multi-Agent LLMs: A Protocol-Driven Approach Early Research Achievements (ERA) Zhenyu Mao City University of Hong Kong, Jacky Keung City University of Hong Kong, Fengji Zhang , Shuo Liu City University of Hong Kong, Yifei Wang City University of Hong Kong, Jialong Li Waseda University, Japan | ||
15:30 - 16:00 | |||
15:30 30mCoffee break | Coffee Break Technical Track | ||
16:00 - 17:20 | |||
16:00 20mFull-paper | GATUNER:Genetic Algorithm Applied to Floating-Point Precision Tuning Technical Track zjn_hpc , Jinchen Xu Information Engineering University, Hongru Yang Hunan University, Changsha, China, Tao Zhang Information Engineering University, Shuai Wang Information Engineering University, Bei Zhou Information Engineering University | ||
16:20 20mFull-paper | Multi-Stage Generation of Rust Unit Tests with LLMs Technical Track Yongqian Chen Zhejiang University, Junwei Zhang Zhejiang University, Xing Hu Zhejiang University, Xin Xia Zhejiang University | ||
16:40 20mFull-paper | What You See Is Not Always What You Get: Evaluating GPT's Comprehension of Source Code Technical Track | ||
17:00 20mFull-paper | Where Is Self-admitted Code Generated by Large Language Models on GitHub? Technical Track | ||
16:00 - 17:20 | |||
16:00 20mFull-paper | An empirical comparison of data transformation techniques for clustering-based unsupervised software defect prediction Technical Track Zhengxiang Chen Shaanxi Normal University, Zhiqiang Li , Hongyu Zhang Chongqing University, Jie Ren Shaanxi Normal University, Feng Tian Shaanxi Normal University | ||
16:20 20mFull-paper | Cobweb: Enhanced Generation Diversity for Black-box Fairness Testing Technical Track Yingqian Guo , Wentian Zhao Beijing Institute of Technology, Tian Song Beijing Institute of Technology | ||
16:40 20mFull-paper | Mock Clones in the Wild: An Empirical Investigation Across Six Open-Source Projects Technical Track Gengwu Zhao , Lu Xiao Stevens Institute of Technology, Hanbin Qin Stevens Institute of Technology, Eman Abdullah AlOmar Stevens Institute of Technology, USA, Sunny Wong Envestnet | ||
17:00 20mFull-paper | TraceWalker: Synthesizing Interactive Debugging Progresses via Data- and Control-flow Exploration Technical Track Yunrui Pei Shanghai Jiao Tong University, Yuk Kwan Wong Hong Kong University of Science and Technology, Chenyang Zhang Shanghai Jiao Tong University, Hongshu Wang National University of Singapore, Wenjie Zhang National University of Singapore, Yun Lin Shanghai Jiao Tong University | ||
16:00 - 17:20 | |||
16:00 20mFull-paper | CSMS: Boosting Class Code Summarization via Transformer Refinement and Method Summary Fusion Early Research Achievements (ERA) Feiqiao Mao , Xingyang Du Shenzhen University, Shaocheng Feng Shenzhen University, Jiafeng Guo Shenzhen University, Yifan Bai Shenzhen University | ||
16:20 20mFull-paper | Retrieval-Augmented Code Generation of Low-Resource Programming Languages Early Research Achievements (ERA) Jianbo Lin Nanjing University, Yuan Zhang Nanjing University, Chuanyi Li Nanjing University, Wentao Zou , Jidong Ge Nanjing University, Bin Luo Nanjing University | ||
16:40 20mFull-paper | TriGraSum: A Tri-level Graph-based Architecture for Source Code Summarization Early Research Achievements (ERA) Ruiguo Hu , Dongqi Wang Northeastern University, Mingzhao Xie Software College, Northeastern University, Zhenglin Li Northeastern University, Dongming Chen Northeastern University | ||
17:00 20mFull-paper | Unified Modelling and Consistency Verification of UML Multi-View Models Using Alloy Early Research Achievements (ERA) Yihui Guo Southwest University, Shmuel Tyszberowicz , Zhiming Liu Southwest University, Bo Liu Southwest University | ||
18:00 - 21:00 | |||
18:00 3hDinner | Banquet Technical Track | ||
Fri 5 DecDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
Fri 5 Dec
Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
10:30 - 11:00 | |||
10:30 30mCoffee break | Coffee Break Technical Track | ||
11:00 - 12:20 | |||
11:00 20mFull-paper | AgentTCP: A Collaborative Multi-Agent Framework for Change-Aware Test Case Prioritization Technical Track Junyu Chen Chongqing University, Xiuhua Li Sichuan International Studies University, Jinping Wang Chonqing University, Huan Xie Chongqing University, Chunyan Liu Chongqing University, Zhenyu Wu , Yan Lei Chongqing University | ||
11:20 20mFull-paper | Chart2Code-MoLA: Efficient Multi-Modal Code Generation via Adaptive Expert Routing Technical Track Yifei Wang City University of Hong Kong, Jacky Keung City University of Hong Kong, Zhenyu Mao City University of Hong Kong, Jingyu Zhang City University of Hong Kong, CAO YUCHEN | ||
11:40 20mFull-paper | LLM-Based Semantic Modeling and Cooperative Evolutionary Fuzzing for Traffic Violation Scenario Generation Technical Track Liu Yangyang , Xinyu Li Hohai University, Yan Xiao Sun Yat-sen University, Miao Zhang Shenzhen Technology University, Pengcheng Zhang Hohai University | ||
12:00 20mFull-paper | Multi-agent Assisted Automatic Test Generation for Java JSON Libraries Technical Track Sinan Wang Southern University of Science and Technology, Zhiyuan Zhong The University of Utah, Shaojin Wen Alibaba Inc, Yepang Liu Southern University of Science and Technology | ||
11:00 - 12:20 | |||
11:00 20mFull-paper | A Multi-Model Hybrid Framework Leveraging Query Expansion without Fine-Tuning for Zero-Shot Cross-Domain Code Search Technical Track Gang Hu School of Information Science & Engineering, Yunnan University, JiaYao Jin School of Information Science&Engineering, Yunnan University, Fan Su School of Information Science&Engineering, Yunnan University, LinHui Geng School of Information Science&Engineering, Yunnan University, Fei Yang , Min Peng | ||
11:20 20mFull-paper | How Do Developers Use ChatGPT for Software Test Generation? Usage Patterns, Satisfaction, and Code Adoption Analysis Technical Track Sicheng He , Wanwei Zhan Wuhan University of Technology, Jijun Wang Wuhan University of Technology, Junjie Dai Zhejiang University, Haoxuan Chen Wuhan University of Technology, Cheng Tan Wuhan University of Technology, Fuyang Li Wuhan University of Technology | ||
11:40 20mFull-paper | Optimizing Type Duplication in WebAssembly Module Splitting Technical Track | ||
12:00 20mFull-paper | Practical Lossless Recompression of JPEG Images Using Transform Domain Prediction Technical Track Long Chen Engineering Research Center of Transportation Information and Safety, ERCTIS, MoE of China. School of Computer Science and Artificial Intelligence, Wuhan University of Technology, Wenhua Hu , Rui Hao Wuhan University of Technology, Junwei Zhou , Jianwen Xiang | ||
12:30 - 14:00 | |||
12:30 90mLunch | Lunch Technical Track | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | A Packing-Insensitive Detection Method for Android Malware Based on Image Representation Technical Track Siyuan Ma , Shihao Zhu State Key Laboratory of Computer Science,Institute of Software,Chinese Academy of Sciences,China, Yan Cai Institute of Software at Chinese Academy of Sciences, Long Zhang Institute of Software, Chinese Academy of Sciences | ||
14:20 20mFull-paper | Enhancing Diffusion-Driven Test Input Generation using Large Language Model Technical Track | ||
14:40 20mFull-paper | HGTRTracer: Advancing Requirements-Code Traceability with LLM-Augmented Attribution Reasoning and Heterogeneous Graph Transformer Technical Track Huan Jin School of Computer Science and Artificial Intelligence, Wuhan Textile University, Yingkai Yuan School of Computer Science and Artificial Intelligence, Wuhan Textile University, Bangchao Wang Wuhan Textile University, Hongyan Wan School of Computer Science and Artificial Intelligence, Wuhan Textile University, Zhiyuan Zou The School of Computer Science and Artificial Intelligence, Wuhan Textile University, Wuhan, China | ||
15:00 20mFull-paper | SMTPRT:Performance Regression Testing and Localization for SMT Solvers Across Multiple Logics Technical Track Ziyang Wang Tianjin University, Xiaohong Li Tianjin University, Lili Quan Tianjin University, Yao Zhang Tianjin University, Ruitao Feng Southern Cross University, Zhiping Zhou | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | A Soft Prompt-Enhanced Device Knowledge Extraction Method for Embedded System Requirements Elicitation Technical Track Shengxin Zhao Inner Mongolia Normal University, Chunhui Wang , Zhiguo Liu Inner Mongolia Normal University, Tong Li Beijing University of Technology, Ye Zhai College of Computer Science and Technology,Inner Mongolia Normal University | ||
14:20 20mFull-paper | Edge4RE: A Novel Edge-Cloud Collaborative Framework for Privacy-Preserving Automated Requirements Documentation Technical Track Ben Cheng School of Information Technology, Deakin University, Yi Wang School of Information Technology, Deakin University, Oscar Wu School of Information Technology, Deakin University, Chetan Arora Monash University, Thuong Hoang School of Information Technology, Deakin University, Xiao Liu School of Information Technology, Deakin University | ||
14:40 20mFull-paper | MSPM: A Multi-Strategy Prompting Method for Goal-Oriented Modeling from User Stories Technical Track Yi Wang Inner Mongolia Normal University, Chunhui Wang , Ye Zhai College of Computer Science and Technology,Inner Mongolia Normal University, Tong Li Beijing University of Technology, Zhiguo Liu College of Computer Science and Technology,Inner Mongolia Normal University | ||
15:00 20mFull-paper | PerProb: Indirectly Evaluating Memorization in Large Language Models Technical Track Yihan Liao City University of Hong Kong, Jacky Keung City University of Hong Kong, Xiaoxue Ma Hong Kong Metropolitan University, Jingyu Zhang City University of Hong Kong, Yicheng Sun City University of Hong Kong | ||
15:30 - 16:00 | |||
15:30 30mDay closing | Closing Ceremony Technical Track | ||