KeynotesAPSEC 2025
Software Supply Chain Security of Web3
Abstract: The Web3 paradigm, built on the promise of decentralization and trustless execution, has attracted massive investment and innovation. However, the decentralized applications (dApps) and smart contracts that secure billions of dollars in assets are themselves built upon complex, centralized, and often vulnerable software supply chains. From npm packages to compilers and development frameworks, every component represents a potential attack vector. This talk dissects the software supply chain of the Web3 ecosystem, identifying unique risks that arise at the intersection of traditional software development practices and the high-stakes, immutable nature of blockchain technology. Drawing from foundational research in software engineering, we will explore threat models, analyze recent real-world attacks, and propose solutions to harden Web3 against this growing class of threats. Homepage: https://mab.xyz/

Martin Monperrus is Professor of Software Technology at KTH Royal Institute of Technology, Sweden. His research lies in the field of software engineering. He is the recipient of the ACM SIGSOFT Impact Paper Award (2024) for pioneering the use of machine learning to assist developers in generating code snippets, paving the way for today’s intelligent code assistance tools (such as Github Copilot), the ASE Most Influential Paper Award and the KTH PhD Supervisor award. Martin also likes to build software and companies.
How to Build AI Agent, How to Build Agentic AI, and How to Build Automatically?
Abstract: In this keynote, Professor Yang Liu explores three critical questions in the evolution of intelligent software systems: how to build effective AI agents, how to endow them with advanced agentic capabilities such as memory, reasoning, and higher-order thinking, and how to automate their construction and deployment. To ground these ideas, he will highlight applications in cybersecurity, including automating expertise across the software lifecycle—from vulnerability detection and diagnosis to proof-of-concept generation and automated repair. The talk will conclude with a forward-looking discussion on interdisciplinary strategies toward Artificial General Intelligence, integrating insights from neuroscience, psychology, social sciences, and computer science to develop AI systems that are not only intelligent and agentic, but also secure, reliable, and aligned with human values.

Dr. Yang Liu is currently a full professor at Nanyang Technological University (NTU), Executive Director of Cyber Security Research Centre @ NTU, and Executive Director of CyberSG R&D Programme Office (CRPO). In 2019, he received the University Leadership Forum Chair professorship at NTU, the President’s Chair in 2024. Dr. Liu specializes in software engineering, cybersecurity, and artificial intelligence. His research has bridged the gap between the theory and practical usage of program analysis, data analysis and AI to evaluate the design and implementation of software for high assurance and security. Many of his research has been successfully commercialized. By now, he has more than 600 publications in top tier conferences and journals, and 29 best paper awards and one most influence system award in top software engineering conferences. He is also leading several major research centers and programs including Cysren, CRPO, Trustworthy AI in NTU (TAICeN), and CREATE center with ICL on medical device security. He has received a number of prestigious awards including MSRA Fellowship, TRF Fellowship, Nanyang Assistant Professor, Tan Chin Tuan Fellowship, Nanyang Research Award, ACM Distinguished Speaker, NRF Investigatorship, and NTU Innovator (Entrepreneurship) Award.
Navigating the Impact of Large Language Models on Software Engineering: Challenges and Opportunities
Abstract: Large Language Models (LLMs) have demonstrated considerable potential across a range of software engineering (SE) tasks, yet their integration into broader SE processes introduces distinct challenges. These challenges stem primarily from the models’ limited understanding of SE-specific knowledge and the inherently structured nature of SE data. In this presentation, I will discuss critical lessons and challenges encountered while implementing LLMs in software engineering contexts. This includes the essential task of filtering out noisy data and the advantages of integrating LLMs with program analysis techniques to improve their contextual and structural understanding. Furthermore, I will delve into the transformative impact of LLMs on various SE practices, such as test case generation, vulnerability management, and automated code generation. The talk aims to provide a comprehensive exploration of both the limitations and potential of LLMs within the software engineering domain, shedding light on emerging opportunities and anticipating future trends.

Xin Xia is a Qiushi Distinguished Professor at the College of Computer Science and Technology, Zhejiang University. Prior to joining Zhejiang University, he was the Chief Expert and Director of the Software Engineering Application Technology Lab at Huawei Technologies, China. His research interests encompass AI and SE, and empirical software engineering. Xin has authored over 360 papers and has received 16 best or distinguished paper awards, including nine ACM SIGSOFT Distinguished Paper Awards for his contributions at ASE (2018-2021), ICPC (2018, 2020), FSE (2025), ICSE (2024), and MSR (2024). In recognition of his early career achievements, he was awarded the ACM SIGSOFT Early Career Researcher Award in 2022. Xin is an ACM Distinguished Member for contributions to empirical software engineering and AI for software engineering.
Xin has been a significant role in the software engineering community, serving on the steering committees of several conferences, including MSR, SANER, Internetware, and PROMISE. He has played key roles in organizing major SE conferences such as ICSE (2023-2025) and ASE (2016, 2020-2021, 2025). He serves (served) as Program Co-Chair for ICSME 2026, EASE 2026, SANER 2023, TechDebt 2023, and PROMISE 2021, and as General Co-Chair for Internetware 2023 and FORGE (2024-2025). Additionally, Xin is an Associate Editor for several esteemed SE journals, including TOSEM, EMSE, IEEE Software, ASEJ, and JSEP.
This program is tentative and subject to change.
Tue 2 DecDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
09:00 - 12:30 | |||
09:00 3h30mOther | New Faculty Forum Tutorials | ||
09:00 - 10:00 | |||
09:00 60mKeynote | Keynote Workshops | ||
10:00 - 10:30 | |||
10:00 30mTalk | TBD-1 Workshops | ||
11:00 - 11:30 | |||
11:00 30mTalk | TBD-2 Workshops | ||
11:30 - 12:00 | |||
11:30 30mTalk | TBD-3 Workshops | ||
12:00 - 12:30 | |||
12:00 30mTalk | TBD-4 Workshops | ||
14:00 - 15:40 | |||
14:00 1h40mTutorial | Architecting Large-Scale Explainable AI (XAI) Software: Process, Pipeline, and Framework Tutorials | ||
14:00 - 14:30 | |||
14:00 30mTalk | TBD-5 Workshops | ||
14:30 - 15:00 | |||
14:30 30mTalk | TBD-6 Workshops | ||
15:00 - 15:30 | |||
15:00 30mTalk | Discussion Workshops | ||
16:00 - 17:40 | |||
16:00 1h40mTutorial | Foundations of Software Testing Tutorials | ||
16:00 - 17:40 | |||
16:00 20mFull-paper | CIMAS: A Multilingual Semantic-Driven Model for Code Idiom Mining, Abstraction and Synthesis Student Research Competition | ||
16:20 20mFull-paper | Detecting Data Contamination in Code Generation Benchmarks via DiffMIA Student Research Competition | ||
16:40 20mFull-paper | ModelVirtualizer: A Light-weight Virtualization Framework for On-Device Deep Learning Models Student Research Competition | ||
17:00 20mFull-paper | Reasoning Design and Code from Mockup Diagrams Using Vision-LMs Student Research Competition | ||
17:20 20mFull-paper | Software Trustworthiness Assessment Based on Causal Evidence Graph Student Research Competition | ||
Wed 3 DecDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
09:00 - 09:30 | |||
09:00 30mDay opening | Opening Ceremony Technical Track | ||
09:30 - 10:30 | |||
09:30 60mKeynote | Keynote 1: How to Build AI Agent, How to Build Agentic AI, and How to Build Automatically? Keynotes Yang Liu Nanyang Technological University | ||
11:00 - 12:00 | |||
11:00 60mKeynote | Keynote 2: Navigating the Impact of Large Language Models on Software Engineering: Challenges and Opportunities Keynotes Xin Xia Zhejiang University | ||
12:00 - 14:00 | |||
12:00 2hLunch | Lunch Catering | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | AutoRCA: A Graph Sequence-based Automatic Root Cause Analysis Method for Microservice Systems Through Multimodal Data Technical Track | ||
14:20 20mFull-paper | CAMUS: Context-Aware Neural Mutation Selection Technical Track Mingda Chen Beijing Jiaotong University, Bo Wang Beijing Jiaotong University, Youfang Lin Beijing Jiaotong University, Jie M. Zhang King's College London | ||
14:40 20mFull-paper | ISA: Test Case Generation based on Improved Simulated Annealing Algorithm Technical Track Shunhui Ji Hohai University, Yu Shi Hohai University, Ji Deng Hohai University, Pengcheng Zhang Hohai University | ||
15:00 20mFull-paper | Trace: Test Repair via Agent-based Context Extraction with LLMs Technical Track Jingxiang Tu , Bo Lin National University of Defense Technology, Yihao Qin , Shangwen Wang National University of Defense Technology, Liqian Chen National University of Defense Technology, Xiaoguang Mao National University of Defense Technology | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | Enhancing Commit Classification for Software Maintenance with Adversarial Learning Technical Track | ||
14:20 20mFull-paper | Reliable Code Generation with Test Case Prioritization and Cognitive Validation Technical Track Lingyun Huang Zhejiang University, Xin Yin Zhejiang University, Xinrui Li Zhejiang University, Chao Ni Zhejiang University | ||
14:40 20mFull-paper | SeedOrNot: A Classification-Driven Framework for Efficient Seed Scheduling in Hybrid Fuzzing Technical Track Qian Yan National Key Laboratory of Science and Technology on Information System Security, Minhuan Huang National Key Laboratory of Science and Technology on Information System Security, Huayang Cao National Key Laboratory of Science and Technology on Information System Security | ||
15:00 20mFull-paper | Understanding Commercial Low-code App Bugs Technical Track Hadia Syed Shanghai Jiao Tong University, Zhixing He , Ye Tang Shanghai Jiao Tong University, Jiqing Liu Shanghai Jiao Tong University, Shengjie Chen Inspur, Lixin Sun Inspur, Hao Zhong Shanghai Jiao Tong University | ||
14:00 - 15:30 | |||
14:00 15mFull-paper | An Empirical Analysis of ESLint Information Components and Their Interactions in LLM-based Program Repair Early Research Achievements (ERA) Shinhyuck Kang Sungkyunkwan University, Jinseok Heo Sungkyunkwan University, Eunseok Lee Sungkyunkwan University | ||
14:15 15mFull-paper | Compressing Cell Execution Logs Embedded within Jupyter Notebook Files Early Research Achievements (ERA) Tomoki Nakamaru The University of Tokyo | ||
14:30 15mFull-paper | Developing a Japanese-Localization Code Benchmark for LLMs Early Research Achievements (ERA) Haruka Tsuchida Japan Women's University, Miyu Sato Japan Women's University, Yuha Nishigata Japan Women's University, Ito Waka Japan Women's University, Kimio Kuramitsu Japan Women's University | ||
15:00 15mFull-paper | Enhancing Requirement-to-Code Traceability via Chain-of-Thought Prompting in Large Language Models Early Research Achievements (ERA) wang wenqing , Ye Wang Zhejiang Gongshang University, Liping Zhao , Qiao Huang Zhejiang Gongshang University, Bo Jiang Zhejiang Gongshang University | ||
15:15 15mFull-paper | RAG4Test: Retrieving GUI States for Multilingual Bug Report and Test Case Generation via LLMs Early Research Achievements (ERA) Zhiyao Wang The University of Osaka, Xiujing Guo The University of Osaka, Tatsuhiro Tsuchiya Osaka University | ||
14:00 - 15:30 | |||
14:00 15mFull-paper | A Catalog of Participatory Reuse Challenges, Solutions, and Lessons Learned Software Engineering in Practices (SEIP) Xingru Chen , Muhammad Usman Blekinge Institute of Technology, Deepika Badampudi Blekinge Institute of Technology | ||
14:15 15mFull-paper | Constructing and Evaluating Domain-Specific Synthetic QA Datasets for Airborne Software Engineering: An LLM-Based Framework in Practice Software Engineering in Practices (SEIP) Xiyue Ruan Avicas Generic Technology Co., Ltd, Zheng Xu Avicas Generic Technology Co., Ltd, Xu yifan , Yunduo Wang School of Software, Beihang University, Lindong Wang Shanghai Jiao Tong University, Minzhe Li Shanghai Jiao Tong University, Ning Ge School of Software, Beihang University | ||
14:30 15mFull-paper | It Only Gets Worse: Revisiting DL-Based Vulnerability Detectors from a Practical Perspective Software Engineering in Practices (SEIP) Yuqian Wang Tianjin University, Xiaohong Li Tianjin University, Ruitao Feng Southern Cross University, Yao Zhang Tianjin University, Yuekang Li UNSW | ||
14:45 15mFull-paper | Virtualization-based Penetration Testing Study for Detecting Accessibility Abuse Vulnerabilities in Banking Apps in East and Southeast Asia Software Engineering in Practices (SEIP) Wei Minn Singapore Management University, Phong Phan i-Sprint Innovations Pte. Ltd, Vikas K. Malviya Singapore Management University, Benjamin Adolphi Promon, Yan Naing Tun Singapore Management University, Henning Benzon Treichl Promon, Albert Ching i-Sprint Innovations Pte. Ltd, Lwin Khin Shar Singapore Management University, David Lo Singapore Management University | ||
15:00 15mFull-paper | LogExpertSolver: A Multi-Agent Framework for Domain-Specialized Log Parsing Software Engineering in Practices (SEIP) Chenxi Mao Sun Yat-sen University, Yuxin Su Sun Yat-sen University, Yuxin Su Sun Yat-sen University, Dan Li Sun Yat-sen University | ||
15:15 15mFull-paper | Towards Data-Driven Real-Time Performance Monitoring of Platform Ecosystems Software Engineering in Practices (SEIP) Hegazy Shady Siemens Technology, Muhammad Ammar Siemens Technology, Christoph Elsner Siemens Technology, Jan Bosch Chalmers University of Technology, Helena Holmstr√∂m Olsson Malmö University | ||
16:00 - 17:20 | |||
16:00 20mFull-paper | Systematic Mapping Study on Risks and Vulnerabilities in Software Containers Technical Track Maha Sroor University of Jyväskylä, Teerath Das University of Jyväskylä, Rahul Mohanani University of Jyväskylä, Tommi Mikkonen University of Jyvaskyla | ||
16:20 20mFull-paper | A Hierarchical Hybrid-Intelligence Architecture with Consensus, Debate, and Reflection for High-Fidelity NL-to-PPTL Conversion Technical Track | ||
16:40 20mFull-paper | MAAP: A Self-Evolving Multi-Agent Automated Vulnerability Repair Framework for Python Technical Track Junfan Chen Hainan University, Zhiyuan Fu Hainan University, Ting Yang Xidian University, Ruidong Li Kanazawa University, Hongyu Sun Hainan University, Yuqing Zhang University of Chinese Academy of Sciences, Hainan University | ||
17:00 20mFull-paper | An Empirical Study of Reinforcement Learning-based Class Integration Test Order Generation Technical Track Jiayi Wang Shenzhen Technology University, Shuxiang Zheng Shenzhen Technology University, Miao Zhang Shenzhen Technology University, Yan Xiao Sun Yat-sen University, Peihong Chen Shenzhen Technology University, Xiaoxing Yang Shenzhen Technology University | ||
16:00 - 17:20 | |||
16:00 20mFull-paper | Human Ants are Beneficial for Team Performance Technical Track Iflaah Salman Lappeenranta-Lahti University of Technology (LUT), Alvaro Francisco Gil Universidad Politécnica de Madrid, Juan Garbajosa Technical University of Madrid, Peter Gloor Massachusetts Institute of Technology SDM | ||
16:20 20mFull-paper | IPSO: An Improved Particle Swarm Optimization-Based Method for Test Case Generation Technical Track Peng Wang Hohai University, Shunhui Ji Hohai University, Yikun Guo Hohai University, Pengcheng Zhang Hohai University | ||
16:40 20mFull-paper | MTL-CR: A Multitask Learning Approach for Code Representation Technical Track | ||
17:00 20mFull-paper | Testing Deep Learning Libraries with Semantic Equivalent API Patterns Technical Track Yan Song Wuhan University, Songqiang Chen The Hong Kong University of Science and Technology, Haoyu Peng Wuhan University, Xiaoyuan Xie Wuhan University | ||
16:00 - 17:30 | |||
16:00 15mFull-paper | Explainable Software Engineering: From State of the Practice to State of the Art Early Research Achievements (ERA) Zheng Li Queen's University Belfast, UK, Maria Angela Ferrario Queen's University Belfast, Ben Crossey Queen's University Belfast, Austen Rainer Queen's University Belfast | ||
16:15 15mFull-paper | Function-level Optimization Automatic Tuner for Numerical Programs Early Research Achievements (ERA) Xinni Liu National University of Defense Technology, College of Computer Science and Technology, Xinpeng Li National University of Defense Technology, College of Computer Science and Technology, Guangping Yu National University of Defense Technology, College of Computer Science and Technology, Hengbiao Yu , Xin Yi National University of Defense Technology, Chun Huang National University of Defense Technology | ||
16:30 15mFull-paper | How Far Have LLMs Come Toward Automated SATD Taxonomy Construction? Early Research Achievements (ERA) Sota Nakashima Kyushu University, Yuta Ishimoto Kyushu University, Masanari Kondo Kyushu University, Tao Xiao Kyushu University, Yasutaka Kamei Kyushu University | ||
16:45 15mFull-paper | MAJD: Intent-Aware Multi-Agent Framework for Jailbreak Defense Early Research Achievements (ERA) Jigang Xie China Unicom Western Innovation Institute, Zhengfan Wang Xi'an Jiaotong University, Junchao He China Unicom Western Innovation Institute, Wenjing Jiao Xi'an Jiaotong University, Pengfei Dang China Unicom Western Innovation Institute, Yadong Zhou Lanzhou Jiaotong University, Wei Zhang China Unicom Western Innovation Institute, Ming Fan Xi'an Jiaotong University | ||
17:00 15mFull-paper | Resilient Auto-Scaling of Microservice Architectures with Efficient Resource Management Early Research Achievements (ERA) Hussain Ahmad University of Adelaide, Christoph Treude Singapore Management University, Markus Wagner Monash University, Australia, Claudia Szabo The University of Adelaide | ||
17:15 15mFull-paper | Towards Function-Level Correctness Assessment of System Software with LLMs: A Case Study Early Research Achievements (ERA) | ||
Thu 4 DecDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
09:00 - 10:00 | |||
09:00 60mKeynote | Keynote 3: Software Supply Chain Security of Web3 Keynotes Martin Monperrus KTH Royal Institute of Technology | ||
10:30 - 12:10 | |||
10:30 20mFull-paper | BDafny: A Formal Execution and Verification Framework of the BPMN 2.0 in Dafny Technical Track Ziqing Su East China Normal University, Sini Chen , Ran Li East China Normal University, Huibiao Zhu , Jiapeng Wang East China Normal University | ||
10:50 20mFull-paper | MicroRacer: Detecting Concurrency Bugs for Cloud Service Systems Technical Track Zhiling Deng School of Software Engineering, Sun Yat-sen University, Zhuangbin Chen Sun Yat-sen University, Juepeng Wang School of Software Engineering, Sun Yat-sen University | ||
11:10 20mFull-paper | MUATC: Multi-Agent Utilization to Augment Test Coverage Technical Track Tiecheng Ma College of Computer Science and Technology, National University of Defense Technology, Sirui Liu , Jiaxin Liu National University of Defense Technology, Yating Zhang National University of Defense Technology, Wei Dong National University of Defense Technology | ||
11:30 20mFull-paper | PyReach: A Multi-Agent Framework for Vulnerability Reachability Analysis in Python Technical Track Yueqin Wang Institute of Software Chinese Academy of Sciences, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Xiang Ling Institute of Software, Chinese Academy of Sciences, Tianyue Luo , Xu Wang Institute of Software, Chinese Academy of Sciences | ||
11:50 20mFull-paper | Recovering Variable Names in The Decompiled Code Based on Multi-Task Learning Technical Track Jiayi Li Nanjing University of Aeronautics and Astronautics, Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, Jian He Shanghai Aerospace Electronic Technology Institute, Jingjing Gu Nanjing University of Aeronautics and Astronautics, Weiqin Zou Nanjing University of Aeronautics and Astronautics | ||
10:30 - 11:50 | |||
10:30 20mFull-paper | BEGA:A Binary Code Embedding Method Based on Gravity-Model Augmentation Graph Contrastive Learning Technical Track Zhenglin Li Northeastern University, Dongqi Wang Northeastern University, Shuyue Zhang Northeastern University, Ruiguo Hu , Dongming Chen Northeastern University | ||
10:50 20mFull-paper | Conanj: Confidential Data Analysis for Confidential Computing of Java Programs Technical Track Xinyuan Miao Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University, Ziyi Lin Alibaba Group | ||
11:10 20mFull-paper | Empirical assessment of the perception of graphical threat model acceptability Technical Track | ||
11:30 20mFull-paper | Smart Contract Vulnerability Detection Based on Residual Dilated Convolution with Multi-Head Attention Technical Track Ruoxin Bai , Meng Wang Hebei university, Wanqing Liu Hebei Key Laboratory of High Trusted Information System, Hebei University, Liang Wang Hebei University | ||
10:30 - 12:00 | |||
10:30 15mFull-paper | Feature-based Transfer Learning in Cross-Project Defect Prediction: A Systematic Review Early Research Achievements (ERA) Wang Yunpeng , Dongcheng Li California State Polytechnic University, Man Zhao China University of Geosciences(Wuhan), W. Eric Wong University of Texas at Dallas | ||
10:45 15mFull-paper | KG-Code: A Knowledge Graph Guided Pre-Training Approach for Code Representation Early Research Achievements (ERA) | ||
11:00 15mFull-paper | MSWT: Multi-Scale Wavelet Transformer for Dynamic Feature-Based Student Program Error Identification Early Research Achievements (ERA) Lingzhong Yu , Qing Zhou College of Computer, Chongqing University, Subo Zhao College of Computer, Chongqing University, Siyuan Wang Chongqing University, China | ||
11:15 15mFull-paper | Multi-Dimensional Metamorphic Testing of Terminology in Machine Translation Early Research Achievements (ERA) | ||
11:30 15mFull-paper | Natural Language Explanation in Code Clone Detection using LLM-based Post Hoc Explainer Early Research Achievements (ERA) Teeradaj Racharak Tohoku University, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Chayanee Junplong Mahidol University, Akara Supratak University College London | ||
11:45 15mFull-paper | Practices and Challenges of Using DeepSeek in SE: An Empirical Study Early Research Achievements (ERA) | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | caSPESC2Vyper: Conformant and Automatic Generation from DeFi SPESC Legal Contract to Vyper Smart Contract Technical Track Yue Yu South-Central Minzu University, Jiahui Wang South-Central Minzu University, Bo Meng South-Central Minzu University, Dejun Wang South-Central Minzu University | ||
14:20 20mFull-paper | FixConsult: Leveraging External Defect Knowledge Driven Natural Language Suggestions Generation for Software Vulnerability Repair Technical Track Gang Hu School of Information Science & Engineering, Yunnan University, LinHui Geng School of Information Science&Engineering, Yunnan University, JiaYao Jin School of Information Science&Engineering, Yunnan University, Xiaoshu Sun School of Information Science&Engineering, Yunnan University, Min Peng | ||
14:40 20mFull-paper | Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks against Binary Code Similarity Detection Technical Track Ran Wei Key Laboratory of Cyberspace Security, Hui Shu , Fei Kang Key Laboratory of Cyberspace Security, Ministry of Education Zhengzhou China, Yuyao Huang Key Laboratory of Cyberspace Security, Ministry of Education Zhengzhou China | ||
15:00 20mFull-paper | Software Defect Prediction Based on Temporal Hypergraph Neural Network Technical Track Peng He Hubei University, Shuai Hu Hubei university, Ju Ma Wuhan university, Haoqing Yang Hubei university, Yifan Wang Hubei university | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | A First Look at Privacy Risks of Android Task-executable Voice Assistant Applications Technical Track Shidong Pan Columbia University & New York University, Yikai Ge Washington University in St. Louis, xiaoyu sun The Australian National University | ||
14:20 20mFull-paper | Latent Search-Based Boundary Aware Fairness Testing for Deployed Deep Models Technical Track Qingyuan Sun , Wentian Zhao Beijing Institute of Technology, Tian Song Beijing Institute of Technology | ||
14:40 20mFull-paper | Lightweight Attention-based Temporal Modeling of Key Facial Features for Driver Fatigue Detection in Intelligent Driver Monitoring Systems Technical Track BaiLing Song Wuhan University of Technology, Lanhao Qin Huazhong University of Science and Technology, Wenhua Hu , Jianwen Xiang , Rui Hao Wuhan University of Technology | ||
15:00 20mFull-paper | Seed-Adapted Cross-State Protocol Fuzzing Technical Track DingchengLi , Shihao Zhu Institute of Software, Chinese Academy of Sciences, Yan Cai Institute of Software at Chinese Academy of Sciences, Long Zhang Institute of Software, Chinese Academy of Sciences; Inspur Cloud Information Technology Co.,Ltd. | ||
14:00 - 15:30 | |||
14:00 15mFull-paper | A Software Architecture Resilience Assessment Method via Dynamic Bayesian Networks Early Research Achievements (ERA) Hao Chen Southeast University, Bixin Li Southeast University, Chunguang Zhang Southeast University, Zixuan Liu Southeast University | ||
14:15 15mFull-paper | Automating Requirements Modelling with LLMs: An Iterative Contrastive Optimisation Approach Early Research Achievements (ERA) Chenxi Lv Southwest University, Shmuel Tyszberowicz , Zhiming Liu Southwest University, Bo Liu Southwest University | ||
14:30 15mFull-paper | BlockAlign: Fair Performance Testing for Blockchains based on Configuration Alignment Early Research Achievements (ERA) Jing shi , Chenglin Xie Peking University, Jianbo Gao Peking University, Peilun Li Shanghai Tree-Graph Blockchain Research Institute, Guoli Yang Advanced Institute of Big Data, Xiaoying Bai Advanced Institute of Big Data | ||
14:45 15mFull-paper | QEC-LLM: Training Query-focused Extractive Compression Model with LLM-guiding for Open Domain QA Early Research Achievements (ERA) Sijia Wang North China University of Technology, Jy Duan , Xin Li , Haoguang Wen , Yizhuo Zhang Hebei University of Engineering, Chunming Liu , Zibo Yi | ||
15:00 15mFull-paper | Cross-Project Defect Prediction Based on Feature Fusion and Local Domain Adaptation Early Research Achievements (ERA) Xianglu Zhou , Xiaoyan Zhu School of Computer Science and Technology, Xi’ an Jiaotong University, Shaan Xi, China, Yu Wang , Jiayin Wang Xi'an Jiaotong University, Xin Lai School of Computer Science and Technology, Xi’ an Jiaotong University, Shaan Xi, China | ||
15:15 15mFull-paper | Towards Engineering Multi-Agent LLMs: A Protocol-Driven Approach Early Research Achievements (ERA) Zhenyu Mao City University of Hong Kong, Jacky Keung City University of Hong Kong, Fengji Zhang , Shuo Liu City University of Hong Kong, Yifei Wang City University of Hong Kong, Jialong Li Waseda University, Japan | ||
16:00 - 17:20 | |||
16:00 20mFull-paper | GATUNER:Genetic Algorithm Applied to Floating-Point Precision Tuning Technical Track zjn_hpc , Jinchen Xu Information Engineering University, Hongru Yang Hunan University, Changsha, China, Tao Zhang Information Engineering University, Shuai Wang Information Engineering University, Bei Zhou Information Engineering University | ||
16:20 20mFull-paper | What You See Is Not Always What You Get: Evaluating GPT's Comprehension of Source Code Technical Track | ||
16:40 20mFull-paper | Where Is Self-admitted Code Generated by Large Language Models on GitHub? Technical Track | ||
17:00 20mFull-paper | SMTPRT:Performance Regression Testing and Localization for SMT Solvers Across Multiple Logics Technical Track Ziyang Wang Tianjin University, Xiaohong Li Tianjin University, Lili Quan Tianjin University, Yao Zhang Tianjin University, Ruitao Feng Southern Cross University, Zhiping Zhou | ||
16:00 - 17:20 | |||
16:00 20mFull-paper | An empirical comparison of data transformation techniques for clustering-based unsupervised software defect prediction Technical Track Zhengxiang Chen Shaanxi Normal University, Zhiqiang Li , Hongyu Zhang Chongqing University, Jie Ren Shaanxi Normal University, Feng Tian Shaanxi Normal University | ||
16:20 20mFull-paper | Cobweb: Enhanced Generation Diversity for Black-box Fairness Testing Technical Track Yingqian Guo , Wentian Zhao Beijing Institute of Technology, Tian Song Beijing Institute of Technology | ||
16:40 20mFull-paper | Mock Clones in the Wild: An Empirical Investigation Across Six Open-Source Projects Technical Track Gengwu Zhao , Lu Xiao Stevens Institute of Technology, Hanbin Qin Stevens Institute of Technology, Eman Abdullah AlOmar Stevens Institute of Technology, USA, Sunny Wong Envestnet | ||
17:00 20mFull-paper | TraceWalker: Synthesizing Interactive Debugging Progresses via Data- and Control-flow Exploration Technical Track Yunrui Pei Shanghai Jiao Tong University, Yuk Kwan Wong Hong Kong University of Science and Technology, Chenyang Zhang Shanghai Jiao Tong University, Hongshu Wang National University of Singapore, Wenjie Zhang National University of Singapore, Yun Lin Shanghai Jiao Tong University | ||
16:00 - 17:00 | |||
16:00 15mFull-paper | CSMS: Boosting Class Code Summarization via Transformer Refinement and Method Summary Fusion Early Research Achievements (ERA) Feiqiao Mao , Xingyang Du Shenzhen University, Shaocheng Feng Shenzhen University, Jiafeng Guo Shenzhen University, Yifan Bai Shenzhen University | ||
16:15 15mFull-paper | Retrieval-Augmented Code Generation of Low-Resource Programming Languages Early Research Achievements (ERA) Jianbo Lin Nanjing University, Yuan Zhang Nanjing University, Chuanyi Li Nanjing University, Wentao Zou , Jidong Ge Nanjing University, Bin Luo Nanjing University | ||
16:30 15mFull-paper | TriGraSum: A Tri-level Graph-based Architecture for Source Code Summarization Early Research Achievements (ERA) Ruiguo Hu , Dongqi Wang Northeastern University, Mingzhao Xie Software College, Northeastern University, Zhenglin Li Northeastern University, Dongming Chen Northeastern University | ||
16:45 15mFull-paper | Unified Modelling and Consistency Verification of UML Multi-View Models Using Alloy Early Research Achievements (ERA) Yihui Guo Southwest University, Shmuel Tyszberowicz , Zhiming Liu Southwest University, Bo Liu Southwest University | ||
Fri 5 DecDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
11:00 - 12:20 | |||
11:00 20mFull-paper | Chart2Code-MoLA: Efficient Multi-Modal Code Generation via Adaptive Expert Routing Technical Track Yifei Wang City University of Hong Kong, Jacky Keung City University of Hong Kong, Zhenyu Mao City University of Hong Kong, Jingyu Zhang City University of Hong Kong, CAO YUCHEN | ||
11:20 20mFull-paper | LLM-Based Semantic Modeling and Cooperative Evolutionary Fuzzing for Traffic Violation Scenario Generation Technical Track Liu Yangyang , Xinyu Li Hohai University, Yan Xiao Sun Yat-sen University, Miao Zhang Shenzhen Technology University, Pengcheng Zhang Hohai University | ||
11:40 20mFull-paper | Multi-agent Assisted Automatic Test Generation for Java JSON Libraries Technical Track Sinan Wang Southern University of Science and Technology, Zhiyuan Zhong The University of Utah, Shaojin Wen Alibaba Inc, Yepang Liu Southern University of Science and Technology | ||
12:00 20mFull-paper | Breaking the Curse of High-Dimensionality: A Transformer-Based Approach to Software Configuration Performance Prediction Technical Track ZhengyuePan , Mingjie Tu Hangzhou Dianzi University, Shijie Li China Southern Power Grid Company Limited, Dandan Wang Institute of Software, Chinese Academy of Sciences, Jie Chen Hangzhou Dianzi University | ||
11:00 - 12:20 | |||
11:00 20mFull-paper | A Multi-Model Hybrid Framework Leveraging Query Expansion without Fine-Tuning for Zero-Shot Cross-Domain Code Search Technical Track Gang Hu School of Information Science & Engineering, Yunnan University, JiaYao Jin School of Information Science&Engineering, Yunnan University, Fan Su School of Information Science&Engineering, Yunnan University, LinHui Geng School of Information Science&Engineering, Yunnan University, Fei Yang , Min Peng | ||
11:20 20mFull-paper | How Do Developers Use ChatGPT for Software Test Generation? Usage Patterns, Satisfaction, and Code Adoption Analysis Technical Track Sicheng He Wuhan University, Wanwei Zhan Wuhan University of Technology, Jijun Wang Wuhan University of Technology, Junjie Dai Zhejiang University, Haoxuan Chen Wuhan University of Technology, Cheng Tan Wuhan University of Technology, Fuyang Li Wuhan University of Technology | ||
11:40 20mFull-paper | Optimizing Type Duplication in WebAssembly Module Splitting Technical Track | ||
12:00 20mFull-paper | Practical Lossless Recompression of JPEG Images Using Transform Domain Prediction Technical Track Long Chen Engineering Research Center of Transportation Information and Safety, ERCTIS, MoE of China. School of Computer Science and Artificial Intelligence, Wuhan University of Technology, Wenhua Hu , Rui Hao Wuhan University of Technology, Junwei Zhou , Jianwen Xiang | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | A Packing-Insensitive Detection Method for Android Malware Based on Image Representation Technical Track Siyuan Ma , Shihao Zhu State Key Laboratory of Computer Science,Institute of Software,Chinese Academy of Sciences,China, Yan Cai Institute of Software at Chinese Academy of Sciences, Long Zhang Institute of Software, Chinese Academy of Sciences; Inspur Cloud Information Technology Co.,Ltd. | ||
14:20 20mFull-paper | Enhancing Diffusion-Driven Test Input Generation using Large Language Model Technical Track | ||
14:40 20mFull-paper | HGTRTracer: Advancing Requirements-Code Traceability with LLM-Augmented Attribution Reasoning and Heterogeneous Graph Transformer Technical Track Huan Jin School of Computer Science and Artificial Intelligence, Wuhan Textile University, Yingkai Yuan School of Computer Science and Artificial Intelligence, Wuhan Textile University, Bangchao Wang Wuhan Textile University, Hongyan Wan School of Computer Science and Artificial Intelligence, Wuhan Textile University, Zhiyuan Zou The School of Computer Science and Artificial Intelligence, Wuhan Textile University, Wuhan, China | ||
15:00 20mFull-paper | Multi-Stage Generation of Rust Unit Tests with LLMs Technical Track Yongqian Chen Zhejiang University, Junwei Zhang Zhejiang University, Xing Hu Zhejiang University, Xin Xia Zhejiang University | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | A Soft Prompt-Enhanced Device Knowledge Extraction Method for Embedded System Requirements Elicitation Technical Track Shengxin Zhao Inner Mongolia Normal University, Chunhui Wang , Zhiguo Liu Inner Mongolia Normal University, Tong Li Beijing University of Technology, Ye Zhai College of Computer Science and Technology,Inner Mongolia Normal University | ||
14:20 20mFull-paper | Edge4RE: A Novel Edge-Cloud Collaborative Framework for Privacy-Preserving Automated Requirements Documentation Technical Track Ben Cheng School of Information Technology, Deakin University, Yi Wang School of Information Technology, Deakin University, Oscar Wu School of Information Technology, Deakin University, Chetan Arora Monash University, Thuong Hoang School of Information Technology, Deakin University, Xiao Liu School of Information Technology, Deakin University | ||
14:40 20mFull-paper | MSPM: A Multi-Strategy Prompting Method for Goal-Oriented Modeling from User Stories Technical Track Yi Wang Inner Mongolia Normal University, Chunhui Wang , Ye Zhai College of Computer Science and Technology,Inner Mongolia Normal University, Tong Li Beijing University of Technology, Zhiguo Liu College of Computer Science and Technology,Inner Mongolia Normal University | ||
15:00 20mFull-paper | PerProb: Indirectly Evaluating Memorization in Large Language Models Technical Track Yihan Liao City University of Hong Kong, Jacky Keung City University of Hong Kong, Xiaoxue Ma Hong Kong Metropolitan University, Jingyu Zhang City University of Hong Kong, Yicheng Sun City University of Hong Kong | ||
15:30 - 16:00 | |||
15:30 30mDay closing | Closing Ceremony Technical Track | ||