APSEC 2025
Tue 2 - Fri 5 December 2025 Macao, China
VenueWynn Palace
Room name(Session B) tulip room
Floor0
Room InformationNo extra information available
Program

You're viewing the program in a time zone which is different from your device's time zone change time zone

Tue 2 Dec

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

09:00 - 09:15
Welcome Speech (Workshop CSESC)Workshops at (Session B) tulip room
09:00
15m
Talk
Welcome –Introduction to Continuous Software Engineering and Compliance
Workshops
Kostas Kontogiannis York University
10:00 - 12:00
Workshop CSESC Session AWorkshops at (Session B) tulip room
10:00
30m
Talk
How Users Employ Workarounds in Software Forms
Workshops
10:30
30m
Coffee break
Coffee break
Workshops

11:00
30m
Talk
Proactive SLO Compliance, from Cloud to Edge
Workshops
Farhoud Jafari Kaleibar York University
11:30
30m
Talk
LLM-assisted Site Reliability Engineering
Workshops
Marios Fokaefs York University

Wed 3 Dec

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

14:00 - 15:20
Session 1B: Low-code and Maintenance (Technical Track) Technical Track at (Session B) tulip room
Chair(s): Deron Liang National Central University
14:00
20m
Full-paper
Enhancing Commit Classification for Software Maintenance with Adversarial Learning
Technical Track
Xinrui Li Zhejiang University, Xin Yin Zhejiang University, Chao Ni Zhejiang University
14:20
20m
Full-paper
Reliable Code Generation with Test Case Prioritization and Cognitive Validation
Technical Track
Lingyun Huang Zhejiang University, Xin Yin Zhejiang University, Xinrui Li Zhejiang University, Chao Ni Zhejiang University
14:40
20m
Full-paper
SeedOrNot: A Classification-Driven Framework for Efficient Seed Scheduling in Hybrid Fuzzing
Technical Track
Qian Yan National Key Laboratory of Science and Technology on Information System Security, Minhuan Huang National Key Laboratory of Science and Technology on Information System Security, Huayang Cao National Key Laboratory of Science and Technology on Information System Security
15:00
20m
Full-paper
Understanding Commercial Low-code App Bugs
Technical Track
Hadia Syed Shanghai Jiao Tong University, Zhixing He , Ye Tang Shanghai Jiao Tong University, Jiqing Liu Shanghai Jiao Tong University, Shengjie Chen Inspur, Lixin Sun Inspur, Hao Zhong Shanghai Jiao Tong University
16:00 - 17:20
Session 2B: Intelligent Systems (Technical Track)Technical Track at (Session B) tulip room
Chair(s): Xiaoning Du Monash University, Xing Hu Zhejiang University
16:00
20m
Full-paper
Human Ants are Beneficial for Team Performance
Technical Track
Iflaah Salman University of Glasgow, Alvaro Francisco Gil Universidad Politécnica de Madrid, Juan Garbajosa Technical University of Madrid, Peter Gloor Massachusetts Institute of Technology SDM
16:20
20m
Full-paper
IPSO: An Improved Particle Swarm Optimization-Based Method for Test Case Generation
Technical Track
Peng Wang Hohai University, Shunhui Ji Hohai University, Yikun Guo Hohai University, Pengcheng Zhang Hohai University
16:40
20m
Full-paper
MTL-CR: A Multitask Learning Approach for Code Representation
Technical Track
Dongxu Yu , Feiqiao Mao , Xingyang Du Shenzhen University, Yifan Bai Shenzhen University
17:00
20m
Full-paper
Testing Deep Learning Libraries with Semantic Equivalent API Patterns
Technical Track
Yan Song Wuhan University, Songqiang Chen The Hong Kong University of Science and Technology, Haoyu Peng Wuhan University, Xiaoyuan Xie Wuhan University

Thu 4 Dec

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

10:30 - 11:50
Session 3B: Smart Contracts & Security (Technical Track)Technical Track at (Session B) tulip room
Chair(s): Zhengyuan Wei The Education University of Hong Kong
10:30
20m
Full-paper
BEGA:A Binary Code Embedding Method Based on Gravity-Model Augmentation Graph Contrastive Learning
Technical Track
Zhenglin Li Northeastern University, Dongqi Wang Northeastern University, Shuyue Zhang Northeastern University, Ruiguo Hu , Dongming Chen Northeastern University
10:50
20m
Full-paper
Conanj: Confidential Data Analysis for Confidential Computing of Java Programs
Technical Track
Xinyuan Miao Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University, Ziyi Lin Alibaba Group
11:10
20m
Full-paper
Empirical assessment of the perception of graphical threat model acceptability
Technical Track
11:30
20m
Full-paper
Smart Contract Vulnerability Detection Based on Residual Dilated Convolution with Multi-Head Attention
Technical Track
Ruoxin Bai , Meng Wang Hebei university, Wanqing Liu Hebei Key Laboratory of High Trusted Information System, Hebei University, Liang Wang Hebei University
14:00 - 15:20
Session 4B: Protocol and Testing (Technical Track) Technical Track at (Session B) tulip room
Chair(s): Hi Kuen Yu City University of Hong Kong
14:00
20m
Full-paper
A First Look at Privacy Risks of Android Task-executable Voice Assistant Applications
Technical Track
Shidong Pan Columbia University & New York University, Yikai Ge Washington University in St. Louis, xiaoyu sun The Australian National University
14:20
20m
Full-paper
Latent Search-Based Boundary Aware Fairness Testing for Deployed Deep Models
Technical Track
Qingyuan Sun , Wentian Zhao Beijing Institute of Technology, Tian Song Beijing Institute of Technology
14:40
20m
Full-paper
Lightweight Attention-based Temporal Modeling of Key Facial Features for Driver Fatigue Detection in Intelligent Driver Monitoring Systems
Technical Track
BaiLing Song Wuhan University of Technology, Lanhao Qin Huazhong University of Science and Technology, Wenhua Hu , Jianwen Xiang , Rui Hao Wuhan University of Technology
15:00
20m
Full-paper
Seed-Adapted Cross-State Protocol Fuzzing
Technical Track
DingchengLi , Shihao Zhu Institute of Software, Chinese Academy of Sciences, Yan Cai Institute of Software at Chinese Academy of Sciences, Long Zhang Institute of Software, Chinese Academy of Sciences; Inspur Cloud Information Technology Co.,Ltd.
16:00 - 17:20
Session 5B: Fairness and Analysis (Technical Track) Technical Track at (Session B) tulip room
Chair(s): Zhenyu Mao City University of Hong Kong
16:00
20m
Full-paper
An empirical comparison of data transformation techniques for clustering-based unsupervised software defect prediction
Technical Track
Zhengxiang Chen Shaanxi Normal University, Zhiqiang Li , Hongyu Zhang Chongqing University, Jie Ren Shaanxi Normal University, Feng Tian Shaanxi Normal University
16:20
20m
Full-paper
Cobweb: Enhanced Generation Diversity for Black-box Fairness Testing
Technical Track
Yingqian Guo , Wentian Zhao Beijing Institute of Technology, Tian Song Beijing Institute of Technology
16:40
20m
Full-paper
Mock Clones in the Wild: An Empirical Investigation Across Six Open-Source Projects
Technical Track
Gengwu Zhao , Lu Xiao Stevens Institute of Technology, Hanbin Qin Stevens Institute of Technology, Eman Abdullah AlOmar Stevens Institute of Technology, USA, Sunny Wong Envestnet
17:00
20m
Full-paper
TraceWalker: Synthesizing Interactive Debugging Progresses via Data- and Control-flow Exploration
Technical Track
Yunrui Pei Shanghai Jiao Tong University, Yuk Kwan Wong Hong Kong University of Science and Technology, Chenyang Zhang Shanghai Jiao Tong University, Hongshu Wang National University of Singapore, Wenjie Zhang National University of Singapore, Yun Lin Shanghai Jiao Tong University

Fri 5 Dec

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

09:00 - 10:20
Session 6B: Log and Analysis (Technical Track) Technical Track at (Session B) tulip room
Chair(s): Xiaoxue Ma Hong Kong Metropolitan University
09:00
20m
Full-paper
Exploring Developer Departure in Open-Source Software Projects: Prevalence, Reason Taxonomy, and Influencing Factors
Technical Track
Yangyang Zhao Zhejiang Sci-Tech University, Bingzheng Zhao Zhejiang Sci-Tech University, Zanxiang He Shenzhen Technology University, Liming Nie
09:20
20m
Full-paper
LLMs are All You Need? Improving Fuzz Testing for MOJO with Large Language Models
Technical Track
Linghan Huang , Peizhou Zhao The University of Sydney, Huaming Chen The University of Sydney
09:40
20m
Full-paper
Understanding Industrial Log Analysis: A Multi-Dataset Evaluation of Parsing and Anomaly Detection
Technical Track
Yicheng Sun City University of Hong Kong, Jacky Keung City University of Hong Kong, Yihan Liao City University of Hong Kong, Hi Kuen Yu City University of Hong Kong
10:00
20m
Full-paper
SVPrompt-MR: An LLM-Based Metamorphic Relation Identification Method with Self-Verification Mechanism
Technical Track
Jun Huang University of South China, Meng Li University of South China, Xiao Hua Yang University of South China, Jie Liu University of South China, Shi Yu Yan University of South China
11:00 - 12:20
Session 7B: WebAssembly & Optimization (Technical Track) Technical Track at (Session B) tulip room
Chair(s): Jiayang Song Macau University of Science and Technology, Yanlin Wang Sun Yat-sen University
11:00
20m
Full-paper
A Multi-Model Hybrid Framework Leveraging Query Expansion without Fine-Tuning for Zero-Shot Cross-Domain Code Search
Technical Track
Gang Hu School of Information Science & Engineering, Yunnan University, JiaYao Jin School of Information Science&Engineering, Yunnan University, Fan Su School of Information Science&Engineering, Yunnan University, LinHui Geng School of Information Science&Engineering, Yunnan University, Fei Yang , Min Peng
11:20
20m
Full-paper
How Do Developers Use ChatGPT for Software Test Generation? Usage Patterns, Satisfaction, and Code Adoption Analysis
Technical Track
Sicheng He Wuhan University, Wanwei Zhan Wuhan University of Technology, Jijun Wang Wuhan University of Technology, Junjie Dai Zhejiang University, Haoxuan Chen Wuhan University of Technology, Cheng Tan Wuhan University of Technology, Fuyang Li Wuhan University of Technology
11:40
20m
Full-paper
Optimizing Type Duplication in WebAssembly Module Splitting
Technical Track
Xifan Xu , Jun Ma Nanjing University, Chun Cao Nanjing University
12:00
20m
Full-paper
Practical Lossless Recompression of JPEG Images Using Transform Domain Prediction
Technical Track
Long Chen Engineering Research Center of Transportation Information and Safety, ERCTIS, MoE of China. School of Computer Science and Artificial Intelligence, Wuhan University of Technology, Wenhua Hu , Rui Hao Wuhan University of Technology, Junwei Zhou , Jianwen Xiang
14:00 - 15:20
Session 8B: Requirements Engineering (Technical Track) Technical Track at (Session B) tulip room
Chair(s): Yanlin Wang Sun Yat-sen University, Jingyu ZHANG
14:00
20m
Full-paper
A Soft Prompt-Enhanced Device Knowledge Extraction Method for Embedded System Requirements Elicitation
Technical Track
Shengxin Zhao Inner Mongolia Normal University, Chunhui Wang , Zhiguo Liu Inner Mongolia Normal University, Tong Li Beijing University of Technology, Ye Zhai College of Computer Science and Technology,Inner Mongolia Normal University
14:20
20m
Full-paper
Edge4RE: A Novel Edge-Cloud Collaborative Framework for Privacy-Preserving Automated Requirements Documentation
Technical Track
Ben Cheng School of Information Technology, Deakin University, Yi Wang School of Information Technology, Deakin University, Oscar Wu School of Information Technology, Deakin University, Chetan Arora Monash University, Thuong Hoang School of Information Technology, Deakin University, Xiao Liu School of Information Technology, Deakin University
14:40
20m
Full-paper
MSPM: A Multi-Strategy Prompting Method for Goal-Oriented Modeling from User Stories
Technical Track
Yi Wang Inner Mongolia Normal University, Chunhui Wang , Ye Zhai College of Computer Science and Technology,Inner Mongolia Normal University, Tong Li Beijing University of Technology, Zhiguo Liu College of Computer Science and Technology,Inner Mongolia Normal University
15:00
20m
Full-paper
PerProb: Indirectly Evaluating Memorization in Large Language Models
Technical Track
Yihan Liao City University of Hong Kong, Jacky Keung City University of Hong Kong, Xiaoxue Ma Hong Kong Metropolitan University, Jingyu Zhang City University of Hong Kong, Yicheng Sun City University of Hong Kong

Tue 2 Dec

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change