Technical TrackAPSEC 2022
Wed 7 DecDisplayed time zone: Osaka, Sapporo, Tokyo change
10:30 - 11:00 | |||
13:00 - 14:00 | Empirical Studies 1SEIP - Software Engineering in Practice / Technical Track at Room1 Chair(s): Masateru Tsunoda Kindai University | ||
13:00 20mPaper | An Empirical Study on Multi-Source Cross-Project Defect Prediction Models Technical Track Xuanying Liu Beijing Jiaotong University, Zonghao Li Beijing Jiaotong University, Jiaqi Zou Beijing Jiaotong University, Haonan Tong Beijing Jiaotong University | ||
13:35 20mPaper | How Libraries Evolve: A Survey of Two Industrial Companies and an Open-Source Community Technical Track Oleksandr Zaitsev Arolla, Univ. Lille, Inria, CNRS, Centrale Lille, UMR 9189 CRIStAL, F-59000 Lille, France, Stéphane Ducasse Inria; University of Lille; CNRS; Centrale Lille; CRIStAL, Nicolas Anquetil University of Lille, Lille, France, Arnaud Thiefaine Arolla |
13:00 - 14:00 | Machine Learning 1Technical Track at Room2 Chair(s): Syful Islam Nara Institute of Science and Technology | ||
13:00 20mPaper | Catch Me If You Can: Blackbox Adversarial Attacks on Automatic Speech Recognition using Frequency Masking Technical Track | ||
13:20 20mPaper | Code Question Answering via Task-Adaptive Sequence-to-Sequence Pre-training Technical Track Tingrui Yu School of Software, Shanghai Jiao Tong University, Beijun Shen School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University |
13:00 - 14:00 | Model Checking 1Technical Track / ERA - Early Research Achievements at Room3 Chair(s): Hiroyuki Nakagawa Osaka University | ||
13:00 20mPaper | Bisection Value Iteration Technical Track | ||
13:20 20mPaper | Non-Intrusive Annotation-Based Domain-Specific Analysis to Certify Event-B Models Behaviours Technical Track Ismail Mendil INPT-ENSEEIHT/IRIT, Peter Rivière INPT-ENSEEIHT / IRIT, University of Toulouse, France, Yamine Ait Ameur IRIT/INPT-ENSEEIHT, Neeraj Singh INPT-ENSEEIHT / IRIT, University of Toulouse, France, Dominique Mery Université de Lorraine, LORIA, Philippe Palanque ICS-IRIT, Université Toulouse III Paul Sabatier |
14:30 - 15:40 | Migration and VisualizationTechnical Track / SEIP - Software Engineering in Practice / ERA - Early Research Achievements at Room1 Chair(s): Siripen Pongpaichet Mahidol University | ||
14:45 20mPaper | Two-Stage Patch Synthesis for API Migration from Single API Usage Example Technical Track |
14:30 - 15:40 | |||
14:30 20mPaper | SysML Flow Model Technical Track | ||
14:50 20mPaper | Tuning SAT solvers for LTL Model Checking Technical Track Anissa Kheireddine LRDE, Etienne Renault LRDE, Souheib Baarir Université Paris Ouest Nanterre La Défense/LIP6 | ||
15:10 20mPaper | Bounded Model Checking of Synchronous Reactive Models in Ptolemy II Technical Track Xiaozhen Zhang Dalian University of Technology, Zhaoming Yang Dalian University of Technology, Hui Kong Huawei Technologies Co., Ltd., Weiqiang Kong Dalian University of Technology |
14:30 - 15:40 | |||
14:30 20mPaper | Toward a Better Alignment Between the Research and Practice of Code Search Engines Technical Track | ||
14:50 20mPaper | Multi-Perspective Alignment Mechanism for Code Search Technical Track | ||
15:10 20mPaper | Automated Generation of Bug Samples Based on Source Code Analysis Technical Track Tianming Zheng Shanghai Jiao Tong University, Zhixin Tong Shanghai Jiao Tong University, Yi-Ping You National Chiao Tung University, Yue Wu Shanghai Jiao Tong University |
Thu 8 DecDisplayed time zone: Osaka, Sapporo, Tokyo change
13:00 - 14:30 | Smart ContractTechnical Track / ERA - Early Research Achievements at Room2 Chair(s): Yoshiki Higo Osaka University | ||
13:00 20mPaper | Grey-box Fuzzing Based on Execution Feedback for EOSIO Smart Contracts Technical Track Wenyin Li Hebei university, Meng Wang Hebei university, Bin Yu Xidian University, Yuhang Shi Xidian Univeristy, Mingxin Fu Xidian Univeristy, You Shao Xidian Univeristy | ||
13:35 20mPaper | Data Flow Reduction Based Test Case Generation for Smart Contracts Technical Track Shunhui Ji Hohai University, Shaoqing Zhu Hohai University, Pengcheng Zhang Hohai University, Hai Dong RMIT University | ||
13:55 20mPaper | A Reference Architecture for Blockchain-based Traceability Systems Using Domain-Driven Design and Microservices Technical Track Yanze Wang Nanjing University, Shanshan Li Nanjing University, Huikun Liu Nanjing University, He Zhang Nanjing University, Bo Pan Huawei Technologies Co., Ltd. |
13:00 - 14:30 | |||
13:00 20mPaper | Incremental Relational Topic Model for Duplicate Bug Report Detection Technical Track | ||
13:20 20mPaper | Multifaceted Hierarchical Report Identification for Non-Functional Bugs in Deep Learning Frameworks Technical Track Guoming Long Loughborough University, Tao Chen Loughborough University, Georgina Cosma Loughborough University | ||
13:40 20mPaper | Automatic Generation of Metamorphic Relations for a Cyber-Physical System-of-Systems Using Genetic Algorithm Technical Track Esther Cho Korea Advanced Institute of Science and Technology, Yong-Jun Shin Korea Advanced Institute of Science and Technology (KAIST), Sangwon Hyun Korea Advanced Institute of Science and Technology, Hansu Kim Korea Advanced Institute of Science and Technology, Doo-Hwan Bae Korea Advanced Institute of Science and Technology | ||
14:00 20mPaper | An approach for hazard analysis of multiple-cooperative systems considering dynamic configuration uncertainty Technical Track |
15:00 - 16:30 | Agile, Business process, and Human AspectsERA - Early Research Achievements / Technical Track / SEIP - Software Engineering in Practice at Room1 Chair(s): Shahida Sulaiman Universiti Teknologi Malaysia | ||
15:15 20mPaper | Quantifying the Similarity of BPMN Processes Technical Track Gwen Salaün University of Grenoble Alpes | ||
15:50 20mPaper | Incorporating Ethics in Software Engineering: Challenges and Opportunities Technical Track Anna Mitchell University of St Andrews, Dharini Balasubramaniam University of St Andrews, Jade Fletcher University of St Andrews |
15:00 - 16:30 | Empirical Studies 2Technical Track at Room2 Chair(s): Yusuf Sulistyo Nugroho Universitas Muhammadiyah Surakarta | ||
15:00 20mPaper | Exploring Activity and Contributors on GitHub: Who, What, When, and Where Technical Track Xiaoya Xia East China Normal University, Zhenjie Weng East China Normal University, will wang , Shengyu Zhao Tongji University | ||
15:20 20mPaper | The Language of Programming: On the Vocabulary of Names Technical Track | ||
15:40 20mPaper | An Empirical Study of Predicting Fault-prone Components and their Evolution Technical Track | ||
16:00 20mPaper | Empirical Study of Co-Renamed Identifiers Technical Track Yuki Osumi Tokyo Institute of Technology, Naotaka Umekawa Tokyo Institute of Technology, Hitomi Komata Tokyo Institute of Technology, Shinpei Hayashi Tokyo Institute of Technology DOI Pre-print |
15:00 - 16:30 | Machine Learning 2Technical Track at Room3 Chair(s): Morakot Choetkiertikul Mahidol University, Thailand | ||
15:00 20mPaper | Retrieve-Guided Commit Message Generation with Semantic Similarity And Disparity Technical Track Zhihan Li School of Computer Science and Engineering, Central South University, Yi Cheng School of Computer Science and Engineering, Central South University, Haiyang Yang School of Computer Science and Engineering, Central South University, Li Kuang School of Computer Science and Engineering, Central South University, Lingyan Zhang School of Computer Science and Engineering, Central South University | ||
15:20 20mPaper | Systematic Analysis of Defect Specific Code Abstraction for Neural Program Repair Technical Track Kicheol Kim Sungkyunkwan University, Misoo Kim Sungkyunkwan University, Eunseok Lee Sungkyunkwan University | ||
15:40 20mPaper | NEGAR: Network Embedding Guided Architecture Recovery for Software Systems Technical Track Jiayi Chen State Key Lab for Novel Software Technology, Nanjing University, Zhixing Wang State Key Lab for Novel Software Technology, Nanjing University, yuchen jiang , Tian Zhang Nanjing University, Jun Pang University of Luxembourg, Minxue Pan Nanjing University, Nitsan Amit Hebrew University | ||
16:00 20mPaper | Goal-oriented Knowledge Reuse via Curriculum Evolution for Reinforcement Learning-based Adaptation Technical Track Jialong Li Waseda University, Japan, Mingyue Zhang Peking University, China, Zhenyu Mao Waseda University, Haiyan Zhao Peking University, Zhi Jin Peking University, Shinichi Honiden Waseda University / National Institute of Informatics, Japan, Kenji Tei Waseda University |
Fri 9 DecDisplayed time zone: Osaka, Sapporo, Tokyo change
09:20 - 10:30 | Review and Natural Language ProcessingTechnical Track / ERA - Early Research Achievements at Room1 Chair(s): Renuka Sindhgatta IBM Research AI | ||
09:50 20mPaper | Reducing Syntactic Complexity for Information Extraction from Japanese Requirement Specifications Technical Track Maiko Onishi Ochanomizu University, Shinpei Ogata Shinshu University, Kozo Okano Shinshu University, Daisuke Bekki Ochanomizu University |
09:20 - 10:30 | Microservices and WebERA - Early Research Achievements / Technical Track at Room2 Chair(s): Norihiro Yoshida Ritsumeikan University | ||
10:05 20mPaper | UTCache: Updatable Transactional Cache For Database-Driven Applications Technical Track |
09:20 - 10:30 | TestingERA - Early Research Achievements / SEIP - Software Engineering in Practice / Technical Track at Room3 Chair(s): Jihyun Lee Jeonbuk National University | ||
09:50 20mPaper | NumFuzz: A Floating-Point Format Aware Fuzzer for Numerical Programs Technical Track Chenghu Ma National University of Defense Technology, Liqian Chen National University of Defense Technology, China, Xin Yi National University of Defense Technology, Guangsheng Fan National University of Defense Technology, Ji Wang College of Computer, National University of Defense Technology | ||
10:10 20mPaper | Detecting High Floating-Point Errors via Ranking Analysis Technical Track Zheng Wang National University of Defense Technology, Xin Yi National University of Defense Technology, Hengbiao Yu National University of Defense Technology, Banghu Yin National University of Defense Technology |
13:00 - 14:00 | Source Code Analysis 2Technical Track / ERA - Early Research Achievements at Room1 Chair(s): Yoshiki Higo Osaka University | ||
13:00 20mPaper | Diff Feature Matching Network in Refactoring DetectionBest Paper Award Technical Track | ||
13:35 20mPaper | An Experimental Comparison of Clone Detection Techniques using Java Bytecode Technical Track |
13:00 - 14:00 | Machine Learning 3Technical Track at Room2 Chair(s): Atul Gupta Indian Institute of Information Technology, Design and Manufacturing (IIITDM) | ||
13:00 20mPaper | Efficient Reinforcement Learning with Generalized-Reactivity Specifications Technical Track Chenyang Zhu , Yujie Cai Changzhou University, Can Hu changzhou university, Jia Bi University of Southampton | ||
13:20 20mPaper | Adversarial Deep Reinforcement Learning for Improving the Robustness of Multi-agent Autonomous Driving Policies Technical Track | ||
13:40 20mPaper | DronLomaly: Runtime Detection of Anomalous Drone Behaviors via Log Analysis and Deep Learning Technical Track Lwin Khin Shar Singapore Management University, Wei Minn Singapore Management University, Duong Ta Singapore Management University, Jiani Fan Nanyang Technological University, Lingxiao Jiang Singapore Management University, Daniel Lim Wai Kiat Singapore Management University |
13:00 - 14:00 | |||
13:00 20mPaper | Symbolic Execution of Floating-point Programs: How far are we? Technical Track Guofeng Zhang National University of Defense Technology, Zhenbang Chen National University of Defense Technology, Ziqi Shuai National University of Defense Technology | ||
13:20 20mPaper | Optimal Refinement-based Array Constraint Solving for Symbolic Execution Technical Track Meixi Liu National University of Defense Technology, Changsha, China, Ziqi Shuai National University of Defense Technology, Luyao Liu National University of Defense Technology, Kelin Ma National University of Defense Technology, Ke Ma | ||
13:40 20mPaper | Synergizing Symbolic Execution and Fuzzing By Function-level Selective Symbolization Technical Track Guofeng Zhang National University of Defense Technology, Zhenbang Chen National University of Defense Technology, Ziqi Shuai National University of Defense Technology, Yufeng Zhang Hunan University, Ji Wang College of Computer, National University of Defense Technology |
14:00 - 14:30 | |||
Accepted Papers
Call for Technical Research papers
The APSEC 2022 technical research track invites high quality submissions of papers describing original research studies and results in the discipline of software engineering. All accepted papers will be submitted to the IEEE-CS Digital Library in the APSEC 2022 conference proceedings.
For your paper to be published in the APSEC 2022 conference proceedings, at least one of the authors of the paper must register for the conference and confirm that she/he will present the paper online.
Topics relate to any aspect of software engineering that include, but are not limited to:
- Agile methodologies
- Cloud and Service-oriented Computing
- Component-based Software Engineering
- Configuration Management and Deployment
- Cooperative, Distributed, and Global Software Engineering
- Cyber-physical Systems and Internet of Things
- Debugging, Defect Prediction and Fault Localization
- DevOps and Container
- Embedded Real-time Systems
- Empirical Software Engineering
- Formal Methods
- Human Factors and Social Aspects of Software Engineering
- Middleware, Frameworks, and APIs
- Mobile and Ubiquitous Systems
- Model-driven and Domain-specific Engineering
- Open Source Development
- Parallel, Distributed, and Concurrent Systems
- Programming Languages and Systems
- Refactoring
- Requirements Engineering
- Reverse Engineering
- Search-based Software Engineering
- Security, Reliability, and Privacy
- Software Architecture, Modeling and Design
- Software Comprehension, Visualization, and Traceability
- Software Engineering Education
- Software Engineering Process and Standards
- Software Engineering for Smart Manufacturing
- Software Engineering Tools and Environments
- Software for Green and Sustainable Technologies
- Software Maintenance and Evolution
- Software Product-line Engineering
- Software Project Management
- Software Reuse
- Software Repository Mining and Data Analytics
- Testing, Verification, and Validation
- Web-based Software Engineering
Evaluation Criteria
Technical research papers must not be more than 10 pages. Submissions will be evaluated by at least three program committee members. The evaluation will focus on the novelty, originality, importance to the field, proper use of research methods, and presentation of the submissions.
Submission Instructions
Submitted papers must have been neither previously accepted for publication nor concurrently submitted for review in another journal, book, conference, or workshop.
All submissions must be in English, and must come in A4 paper size PDF format and conform, at time of submission, to the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt font, LaTeX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf option). Also, papers must comply with the IEEE Policy on Authorship. Submissions must be submitted electronically in PDF before the due date via EasyChair. The Chairs reserve the right to reject submissions (without reviews) that are not in compliance or out of scope for the conference.
IMPORTANT: The APSEC 2022 technical research track will use a double-blind reviewing process, which means that submissions must not reveal the authors’ identities. The authors must make every effort to honor the double-blind reviewing process. Submissions must adhere to the following rules (largely reused from ASE 2017 double-blind instructions and SANER 2022 double-blind instructions). Please read carefully the APSEC 2022 double-blind instructions before preparing your paper.
Submission Link
Papers must be submitted through EasyChair:
https://easychair.org/my/conference?conf=apsec2022
Important Dates
Abstract Deadline: June 29, 2022- Abstract Deadline: July 13, 2022
Paper Deadline: July 6, 2022- Paper Deadline: July 20, 2022
Author Notification: Aug 15, 2022- Author Notification: Aug 25, 2022
- Camera Ready Deadline: Late October, 2022
Accepted Papers and Attendance Expectation
Accepted papers will not be permitted any additional page of content. But, we hope that the authors will reflect the reviewers’ comments as much as possible in the camera-ready version. After acceptance, the list of paper authors can not be changed under any circumstances, and the list of authors on camera-ready papers must be identical to those on submitted papers. After acceptance, paper titles can not be changed except by permission of the Program Co-Chairs, and only then when referees recommend a change for clarity or accuracy with paper content. If a submission is accepted, at least one author of the paper must register for APSEC 2022 and present the paper at the conference. If an accepted paper is not presented, the paper is removed from the proceedings.
Contact
Yoshiki Higo and Yunja Choi
APSEC 2022 Program Co-Chairs
APSEC 2022 Double-blind Instructions
IMPORTANT: The APSEC 2022 technical research track will use a double-blind reviewing process, which means that submissions must not reveal the authors’ identities. The authors must make every effort to honor the double-blind reviewing process. Submissions must adhere to the following rules (largely reused from ASE 2017 double-blind instructions and SANER 2022 double-blind instructions).
- Omit authors’ names and institutions from your title page.
- References to authors’ own related work must be in the third person. (For example, not “We build on our previous work…” but rather “We build on the work of…”)
- There may be cases in which the current submission is a clear follow up of one of your previous work, and despite what recommended in the previous point, reviewers will clearly associate authorship of such a previous work to the current submission. In this case, you may decide to anonymize the reference itself at submission time. For example: “based on previous results [10]” .. where the reference is reported as “[10] Anonymous Authors. Omitted for double blind reviewing.” In doing so, however, please make sure that the APSEC 2022 submission is self-contained and its content can be reviewed and understood without accessing the previous paper.
- Do not include acknowledgements of people, grants, organizations, etc. that would give away your identity. You may, of course, add these acknowledgements in the camera-ready version.
- In general, aim to reduce the risk of accidental unblinding. For example, if you use an identifiable naming convention for your work, such as a project name, use a different name for your submission, which you may indicate has been changed for the purposes of double-blind reviewing. This includes names that may unblind individual authors and their institutions. For example, if your project is called GoogleDeveloperHelper, which makes it clear the work was done at Google, for the submission version, use the name DeveloperHelper or BigCompanyDeveloperHelper instead.
- Avoid revealing the institution affiliations of authors or at which the work was performed. For example, if the evaluation includes a user study conducted with undergraduates from the CS 101 class that you teach, you might say “The study participants consist of 200 students in an introductory CS course.” You can of course add the institutional information in the camera-ready. Similar suggestions apply for work conducted in specific organizations (e.g., industrial studies). In such cases, avoid mentioning the organization’s name. Instead, you may just refer to the organization as “Org” or “Company”, etc. When appropriate and when this does not help too much in revealing the company’s name, you might mention the context (e.g., financial organization, video game development company, etc.).
- APSEC 2022 believes in open science and that open science aids reproducibility and replicability. To improve these factors we encourage authors to consider disclosing the source code and datasets used within their paper, including extractors, survey data, etc. By sharing this information your contribution will be more impactful because others can follow up on your work and of course cite it. But please avoid linking directly to code repositories or tool deployments which can reveal your identity. Instead of doing so, please consider using Zenodo, Figshare, or other services that provide DOIs and allowing anonymous and semi-anonymous methods of archiving software and datasets. Archive.org is recommended for the dissemination of larger datasets. These datasets, anonymized through Zenodo and other services, should be linked within the paper itself. Instructions for double-blind friendly uploading of datasets is available here:
https://ineed.coffee/post/how-to-disclose-data-for-double-blind-review-and-make-it-archived-open-data-upon-acceptance.html