APSEC 2025
Tue 2 - Fri 5 December 2025 Macao, China

The APSEC 2025 technical research track invites high-quality contributions describing original results in the discipline of software engineering. Solicited topics include, but are not limited to:

  • Tools and processes
    ○ Agile processes
    ○ DevOps and Container
    ○ Configuration Management and Deployment
    ○ Software Engineering Process and Standards

  • Requirements and Design
    ○ Service-oriented Computing
    ○ Component-based Software Engineering
    ○ Cooperative, Distributed, and Global Software Engineering
    ○ Software Architecture, Modeling and Design
    ○ Middleware, Frameworks, and APIs
    ○ Software Product-line Engineering

  • Testing and Analysis
    ○ Testing, Verification, and Validation
    ○ Program Analysis
    ○ Program Synthesis
    ○ Program Repairs

  • Formal Aspects of Software Engineering
    ○ Formal Methods
    ○ Model-driven and Domain-specific Engineering

  • Human Factors and Social Aspects of Software Engineering
    ○ Software Comprehension, Visualization, and Traceability
    ○ Software for Green and Sustainable Technologies

  • AI and Software Engineering
    ○ AI for Software Engineering ○ Software Engineering for AI ○ Search-based Software Engineering

  • Dependability, Safety, and Reliability
    ○ Reliability, availability, and safety ○ Performance ○ Vulnerability detection to enhance software security

  • Software Maintenance and Evolution
    ○ Refactoring
    ○ Reverse Engineering
    ○ Software Reuse
    ○ Software Project Management ○ Debugging, Defect Prediction, and Fault Localization

  • Software Repository Mining and Data Analytics

APSEC 2025 welcomes submissions addressing topics in a variety of application domains, including mobile, cloud, blockchains, embedded, and cyber-physical systems.

Dates
Tracks
Plenary
You're viewing the program in a time zone which is different from your device's time zone change time zone

Tue 2 Dec

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

09:00 - 12:30
New Faculty ForumTutorials at (Session A) lotus room
09:00
30m
Talk
Tips and Pitfalls: Lessons Learned as a New Faculty Member
Tutorials
Zhongxin Liu Zhejiang University
09:30
30m
Talk
A New Journey: Navigating the Cold Start in First-Year Learning
Tutorials
Jiayang Song Macau University of Science and Technology
10:00
30m
Talk
Navigating the Early Years: From PhD Candidate to Assistant Professor in Software Engineering
Tutorials
Xiaolei Ren Macau University of Science and Technology
10:30
30m
Coffee break
Coffee break
Tutorials

11:00
30m
Talk
Real-World Challenges in Assuring Safe Cyber-Physical Systems: A Formal Methods Perspective
Tutorials
Jiawan Wang Nanjing University
11:30
30m
Talk
LLM-based Log Analysis for Cloud Reliability Engineering
Tutorials
Zhuangbin Chen School of Software Engineering, Sun Yat-sen University
12:00
30m
Panel
Panel
Tutorials

09:00 - 09:15
Welcome Speech (Workshop CSESC)Workshops at (Session B) tulip room
09:00
15m
Talk
Welcome –Introduction to Continuous Software Engineering and Compliance
Workshops
Kostas Kontogiannis York University
10:00 - 12:00
Workshop CSESC Session AWorkshops at (Session B) tulip room
10:00
30m
Talk
How Users Employ Workarounds in Software Forms
Workshops
10:30
30m
Coffee break
Coffee break
Workshops

11:00
30m
Talk
Proactive SLO Compliance, from Cloud to Edge
Workshops
Farhoud Jafari Kaleibar York University
11:30
30m
Talk
LLM-assisted Site Reliability Engineering
Workshops
Marios Fokaefs York University
13:00 - 14:00
Tutorial ATutorials at (Session A) lotus room
Chair(s): Cuiyun Gao Harbin Institute of Technology, Shenzhen
13:00
60m
Tutorial
Foundations of Software Testing
Tutorials
14:00 - 15:40
Tutorial BTutorials at (Session A) lotus room
Chair(s): Cuiyun Gao Harbin Institute of Technology, Shenzhen
14:00
1h40m
Tutorial
Architecting Large-Scale Explainable AI (XAI) Software: Process, Pipeline, and Framework
Tutorials
Jun Huang Concordia University, Yan Liu Concordia University

Wed 3 Dec

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

09:00 - 09:30
​Opening CeremonyTechnical Track at Theater
09:00
30m
Day opening
Opening Ceremony
Technical Track

09:30 - 10:30
Keynote 1Keynotes at Theater
Chair(s): Xiapu Luo Hong Kong Polytechnic University
09:30
60m
Keynote
​Keynote 1: How to Build AI Agent, How to Build Agentic AI, and How to Build Automatically?​​
Keynotes
Yang Liu Nanyang Technological University
10:30 - 11:00
Coffee breakCatering at Theater
10:30
30m
Coffee break
Break
Catering

11:00 - 12:00
Keynote 2Keynotes at Theater
Chair(s): Xiapu Luo Hong Kong Polytechnic University
11:00
60m
Keynote
Keynote 2: Navigating the Impact of Large Language Models on Software Engineering: Challenges and Opportunities
Keynotes
Xin Xia Zhejiang University
12:00 - 14:00
12:00
2h
Lunch
Lunch
Catering

14:00 - 15:20
Session 1A: Testing and Mutation (Technical Track)Technical Track at (Session A) lotus room
Chair(s): William Chu TungHai University
14:00
20m
Full-paper
AutoRCA: A Graph Sequence-based Automatic Root Cause Analysis Method for Microservice Systems Through Multimodal Data
Technical Track
Ying Zhou Southeast University, Yingying Sheng Southeast University, Bixin Li Southeast University
14:20
20m
Full-paper
CAMUS: Context-Aware Neural Mutation Selection
Technical Track
Mingda Chen Beijing Jiaotong University, Bo Wang Beijing Jiaotong University, Youfang Lin Beijing Jiaotong University, Jie M. Zhang King's College London
14:40
20m
Full-paper
ISA: Test Case Generation based on Improved Simulated Annealing Algorithm
Technical Track
Shunhui Ji Hohai University, Yu Shi Hohai University, Ji Deng Hohai University, Pengcheng Zhang Hohai University
15:00
20m
Full-paper
Trace: Test Repair via Agent-based Context Extraction with LLMs
Technical Track
Jingxiang Tu , Bo Lin National University of Defense Technology, Yihao Qin , Shangwen Wang National University of Defense Technology, Liqian Chen National University of Defense Technology, Xiaoguang Mao National University of Defense Technology
14:00 - 15:20
Session 1B: Low-code and Maintenance (Technical Track) Technical Track at (Session B) tulip room
Chair(s): Deron Liang National Central University
14:00
20m
Full-paper
Enhancing Commit Classification for Software Maintenance with Adversarial Learning
Technical Track
Xinrui Li Zhejiang University, Xin Yin Zhejiang University, Chao Ni Zhejiang University
14:20
20m
Full-paper
Reliable Code Generation with Test Case Prioritization and Cognitive Validation
Technical Track
Lingyun Huang Zhejiang University, Xin Yin Zhejiang University, Xinrui Li Zhejiang University, Chao Ni Zhejiang University
14:40
20m
Full-paper
SeedOrNot: A Classification-Driven Framework for Efficient Seed Scheduling in Hybrid Fuzzing
Technical Track
Qian Yan National Key Laboratory of Science and Technology on Information System Security, Minhuan Huang National Key Laboratory of Science and Technology on Information System Security, Huayang Cao National Key Laboratory of Science and Technology on Information System Security
15:00
20m
Full-paper
Understanding Commercial Low-code App Bugs
Technical Track
Hadia Syed Shanghai Jiao Tong University, Zhixing He , Ye Tang Shanghai Jiao Tong University, Jiqing Liu Shanghai Jiao Tong University, Shengjie Chen Inspur, Lixin Sun Inspur, Hao Zhong Shanghai Jiao Tong University
14:00 - 15:30
Session 1C: LLM Applications (ERA Track) Early Research Achievements (ERA) at (Session C) orchid room
Chair(s): Xiaoning Du Monash University, Shamsul Sahibuddin Universiti Teknologi Malaysia
14:00
15m
Full-paper
An Empirical Analysis of ESLint Information Components and Their Interactions in LLM-based Program Repair
Early Research Achievements (ERA)
Shinhyuck Kang Sungkyunkwan University, Jinseok Heo Sungkyunkwan University, Eunseok Lee Sungkyunkwan University
14:15
15m
Full-paper
Compressing Cell Execution Logs Embedded within Jupyter Notebook Files
Early Research Achievements (ERA)
Tomoki Nakamaru The University of Tokyo
14:30
15m
Full-paper
Developing a Japanese-Localization Code Benchmark for LLMs
Early Research Achievements (ERA)
Haruka Tsuchida Japan Women's University, Miyu Sato Japan Women's University, Yuha Nishigata Japan Women's University, Ito Waka Japan Women's University, Kimio Kuramitsu Japan Women's University
14:45
15m
Full-paper
Enhancing Requirement-to-Code Traceability via Chain-of-Thought Prompting in Large Language Models
Early Research Achievements (ERA)
wang wenqing , Ye Wang Zhejiang Gongshang University, Liping Zhao , Qiao Huang Zhejiang Gongshang University, Bo Jiang Zhejiang Gongshang University
15:00
15m
Full-paper
RAG4Test: Retrieving GUI States for Multilingual Bug Report and Test Case Generation via LLMs
Early Research Achievements (ERA)
Zhiyao Wang The University of Osaka, Xiujing Guo The University of Osaka, Tatsuhiro Tsuchiya Osaka University
15:15
15m
Full-paper
DTM: Deterministic Approaches for Black-box Test Suite Minimization with Tree-based Similarity
Early Research Achievements (ERA)
Md Siam , Shartaz Sajid Nahid Institute of Information Technology, University of Dhaka, Md Arif Hasan University of Dhaka, Bangladesh, Nurul Ahad Tawhid Institute of Information Technology, University of Dhaka, Kazi Sakib Institute of Information Technology, University of Dhaka
14:00 - 15:30
Session 1D: Industrial Practices (SEIP)Software Engineering in Practices (SEIP) at (Session D) jasmine room
Chair(s): In-Young Ko Korea Advanced Institute of Science and Technology
14:00
15m
Full-paper
A Catalog of Participatory Reuse Challenges, Solutions, and Lessons Learned
Software Engineering in Practices (SEIP)
Xingru Chen , Muhammad Usman Blekinge Institute of Technology, Deepika Badampudi Blekinge Institute of Technology
14:15
15m
Full-paper
Constructing and Evaluating Domain-Specific Synthetic QA Datasets for Airborne Software Engineering: An LLM-Based Framework in Practice
Software Engineering in Practices (SEIP)
Xiyue Ruan Avicas Generic Technology Co., Ltd, Zheng Xu Avicas Generic Technology Co., Ltd, Xu yifan , Yunduo Wang School of Software, Beihang University, Lindong Wang Shanghai Jiao Tong University, Minzhe Li Shanghai Jiao Tong University, Ning Ge School of Software, Beihang University
14:30
15m
Full-paper
It Only Gets Worse: Revisiting DL-Based Vulnerability Detectors from a Practical Perspective
Software Engineering in Practices (SEIP)
Yuqian Wang Tianjin University, Xiaohong Li Tianjin University, Ruitao Feng Southern Cross University, Yao Zhang Tianjin University, Yuekang Li UNSW
14:45
15m
Full-paper
Virtualization-based Penetration Testing Study for Detecting Accessibility Abuse Vulnerabilities in Banking Apps in East and Southeast Asia
Software Engineering in Practices (SEIP)
Wei Minn Singapore Management University, Phong Phan i-Sprint Innovations Pte. Ltd, Vikas K. Malviya Singapore Management University, Benjamin Adolphi Promon, Yan Naing Tun Singapore Management University, Henning Benzon Treichl Promon, Albert Ching i-Sprint Innovations Pte. Ltd, Lwin Khin Shar Singapore Management University, David Lo Singapore Management University
15:00
15m
Full-paper
LogExpertSolver: A Multi-Agent Framework for Domain-Specialized Log Parsing
Software Engineering in Practices (SEIP)
Chenxi Mao Sun Yat-sen University, Yuxin Su Sun Yat-sen University, Yuxin Su Sun Yat-sen University, Dan Li Sun Yat-sen University
15:15
15m
Full-paper
Towards Data-Driven Real-Time Performance Monitoring of Platform Ecosystems
Software Engineering in Practices (SEIP)
Hegazy Shady Siemens Technology, Muhammad Ammar Siemens Technology, Christoph Elsner Siemens Technology, Jan Bosch Chalmers University of Technology, Helena Holmström Olsson Malmö University
15:30 - 16:00
Coffee breakCatering at Theater
15:30
30m
Coffee break
Break
Catering

16:00 - 17:20
Session 2A: Program Analysis (Technical Track)Technical Track at (Session A) lotus room
Chair(s): Xiaolei Ren Macau University of Science and Technology
16:00
20m
Full-paper
Systematic Mapping Study on Risks and Vulnerabilities in Software Containers
Technical Track
Maha Sroor University of Jyväskylä, Teerath Das University of Jyväskylä, Rahul Mohanani University of Jyväskylä, Tommi Mikkonen University of Jyvaskyla
16:20
20m
Full-paper
A Hierarchical Hybrid-Intelligence Architecture with Consensus, Debate, and Reflection for High-Fidelity NL-to-PPTL Conversion
Technical Track
Tianchi Zhang East China Normal University, Jinhui Lyu East China Normal University, Yong Cai East China Normal University
16:40
20m
Full-paper
MAAP: A Self-Evolving Multi-Agent Automated Vulnerability Repair Framework for Python
Technical Track
Junfan Chen Hainan University, Zhiyuan Fu Hainan University, Ting Yang Xidian University, Ruidong Li Kanazawa University, Hongyu Sun Hainan University, Yuqing Zhang University of Chinese Academy of Sciences, Hainan University
17:00
20m
Full-paper
An Empirical Study of Reinforcement Learning-based Class Integration Test Order Generation
Technical Track
Jiayi Wang Shenzhen Technology University, Shuxiang Zheng Shenzhen Technology University, Miao Zhang Shenzhen Technology University, Yan Xiao Sun Yat-sen University, Peihong Chen Shenzhen Technology University, Xiaoxing Yang Shenzhen Technology University
16:00 - 17:20
Session 2B: Intelligent Systems (Technical Track)Technical Track at (Session B) tulip room
Chair(s): Xiaoning Du Monash University, Xing Hu Zhejiang University
16:00
20m
Full-paper
Human Ants are Beneficial for Team Performance
Technical Track
Iflaah Salman University of Glasgow, Alvaro Francisco Gil Universidad Politécnica de Madrid, Juan Garbajosa Technical University of Madrid, Peter Gloor Massachusetts Institute of Technology SDM
16:20
20m
Full-paper
IPSO: An Improved Particle Swarm Optimization-Based Method for Test Case Generation
Technical Track
Peng Wang Hohai University, Shunhui Ji Hohai University, Yikun Guo Hohai University, Pengcheng Zhang Hohai University
16:40
20m
Full-paper
MTL-CR: A Multitask Learning Approach for Code Representation
Technical Track
Dongxu Yu , Feiqiao Mao , Xingyang Du Shenzhen University, Yifan Bai Shenzhen University
17:00
20m
Full-paper
Testing Deep Learning Libraries with Semantic Equivalent API Patterns
Technical Track
Yan Song Wuhan University, Songqiang Chen The Hong Kong University of Science and Technology, Haoyu Peng Wuhan University, Xiaoyuan Xie Wuhan University
16:00 - 17:30
Session 2C: Testing and Defense (ERA Track) Early Research Achievements (ERA) at (Session C) orchid room
Chair(s): Zhengyuan Wei The Education University of Hong Kong
16:00
15m
Full-paper
Explainable Software Engineering: From State of the Practice to State of the Art
Early Research Achievements (ERA)
Zheng Li Queen's University Belfast, UK, Maria Angela Ferrario Queen's University Belfast, Ben Crossey Queen's University Belfast, Austen Rainer Queen's University Belfast
16:15
15m
Full-paper
Function-level Optimization Automatic Tuner for Numerical Programs
Early Research Achievements (ERA)
Xinni Liu National University of Defense Technology, College of Computer Science and Technology, Xinpeng Li National University of Defense Technology, College of Computer Science and Technology, Guangping Yu National University of Defense Technology, College of Computer Science and Technology, Hengbiao Yu , Xin Yi National University of Defense Technology, Chun Huang National University of Defense Technology
16:30
15m
Full-paper
How Far Have LLMs Come Toward Automated SATD Taxonomy Construction?
Early Research Achievements (ERA)
Sota Nakashima Kyushu University, Yuta Ishimoto Kyushu University, Masanari Kondo Kyushu University, Tao Xiao Kyushu University, Yasutaka Kamei Kyushu University
Pre-print
16:45
15m
Full-paper
MAJD: Intent-Aware Multi-Agent Framework for Jailbreak Defense
Early Research Achievements (ERA)
Jigang Xie China Unicom Western Innovation Institute, Zhengfan Wang Xi'an Jiaotong University, Junchao He China Unicom Western Innovation Institute, Wenjing Jiao Xi'an Jiaotong University, Pengfei Dang China Unicom Western Innovation Institute, Yadong Zhou Lanzhou Jiaotong University, Wei Zhang China Unicom Western Innovation Institute, Ming Fan Xi'an Jiaotong University
17:00
15m
Full-paper
Resilient Auto-Scaling of Microservice Architectures with Efficient Resource Management
Early Research Achievements (ERA)
Hussain Ahmad University of Adelaide, Christoph Treude Singapore Management University, Markus Wagner Monash University, Australia, Claudia Szabo The University of Adelaide
17:15
15m
Full-paper
Towards Function-Level Correctness Assessment of System Software with LLMs: A Case Study
Early Research Achievements (ERA)
Zhong Ming Self, Xin Sun School of Electronic Information Engineering, China West Normal University

Thu 4 Dec

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

09:00 - 10:00
Keynote 3Keynotes at Theater
Chair(s): Jacky Keung City University of Hong Kong
09:00
60m
Keynote
Keynote 3: Software Supply Chain Security of Web3​
Keynotes
Martin Monperrus KTH Royal Institute of Technology
10:00 - 10:30
Coffee breakCatering at Theater
10:00
30m
Coffee break
Break
Catering

10:30 - 12:10
Session 3A: Concurrency & Formal Methods (Technical Track)Technical Track at (Session A) lotus room
Chair(s): Karl Leung Hong Kong Institute of Vocational Education
10:30
20m
Full-paper
BDafny: A Formal Execution and Verification Framework of the BPMN 2.0 in Dafny
Technical Track
Ziqing Su East China Normal University, Sini Chen , Ran Li East China Normal University, Huibiao Zhu , Jiapeng Wang East China Normal University
10:50
20m
Full-paper
MicroRacer: Detecting Concurrency Bugs for Cloud Service Systems
Technical Track
Zhiling Deng School of Software Engineering, Sun Yat-sen University, Zhuangbin Chen Sun Yat-sen University, Juepeng Wang School of Software Engineering, Sun Yat-sen University
11:10
20m
Full-paper
MUATC: Multi-Agent Utilization to Augment Test Coverage
Technical Track
Tiecheng Ma College of Computer Science and Technology, National University of Defense Technology, Sirui Liu , Jiaxin Liu National University of Defense Technology, Yating Zhang National University of Defense Technology, Wei Dong National University of Defense Technology
11:30
20m
Full-paper
PyReach: A Multi-Agent Framework for Vulnerability Reachability Analysis in Python
Technical Track
Yueqin Wang Institute of Software Chinese Academy of Sciences, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Xiang Ling Institute of Software, Chinese Academy of Sciences, Tianyue Luo , Xu Wang Institute of Software, Chinese Academy of Sciences
11:50
20m
Full-paper
Recovering Variable Names in The Decompiled Code Based on Multi-Task Learning
Technical Track
Jiayi Li Nanjing University of Aeronautics and Astronautics, Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, Jian He Shanghai Aerospace Electronic Technology Institute, Jingjing Gu Nanjing University of Aeronautics and Astronautics, Weiqin Zou Nanjing University of Aeronautics and Astronautics
10:30 - 11:50
Session 3B: Smart Contracts & Security (Technical Track)Technical Track at (Session B) tulip room
Chair(s): Zhengyuan Wei The Education University of Hong Kong
10:30
20m
Full-paper
BEGA:A Binary Code Embedding Method Based on Gravity-Model Augmentation Graph Contrastive Learning
Technical Track
Zhenglin Li Northeastern University, Dongqi Wang Northeastern University, Shuyue Zhang Northeastern University, Ruiguo Hu , Dongming Chen Northeastern University
10:50
20m
Full-paper
Conanj: Confidential Data Analysis for Confidential Computing of Java Programs
Technical Track
Xinyuan Miao Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University, Ziyi Lin Alibaba Group
11:10
20m
Full-paper
Empirical assessment of the perception of graphical threat model acceptability
Technical Track
11:30
20m
Full-paper
Smart Contract Vulnerability Detection Based on Residual Dilated Convolution with Multi-Head Attention
Technical Track
Ruoxin Bai , Meng Wang Hebei university, Wanqing Liu Hebei Key Laboratory of High Trusted Information System, Hebei University, Liang Wang Hebei University
10:30 - 12:00
Session 3C: AI and Testing (ERA Track) Early Research Achievements (ERA) at (Session C) orchid room
Chair(s): Xiaoxue Ren Zhejiang University
10:30
15m
Full-paper
Feature-based Transfer Learning in Cross-Project Defect Prediction: A Systematic Review
Early Research Achievements (ERA)
Wang Yunpeng , Dongcheng Li California State Polytechnic University, Man Zhao China University of Geosciences(Wuhan), W. Eric Wong University of Texas at Dallas
10:45
15m
Full-paper
KG-Code: A Knowledge Graph Guided Pre-Training Approach for Code Representation
Early Research Achievements (ERA)
hanyu zhang Waseda University, Tomoji Kishi Waseda University
11:00
15m
Full-paper
MSWT: Multi-Scale Wavelet Transformer for Dynamic Feature-Based Student Program Error Identification
Early Research Achievements (ERA)
Lingzhong Yu , Qing Zhou College of Computer, Chongqing University, Subo Zhao College of Computer, Chongqing University, Siyuan Wang Chongqing University, China
11:15
15m
Full-paper
Multi-Dimensional Metamorphic Testing of Terminology in Machine Translation
Early Research Achievements (ERA)
tanzhifang , Chuanqi Tao Nanjing University of Aeronautics and Astronautics
11:30
15m
Full-paper
Natural Language Explanation in Code Clone Detection using LLM-based Post Hoc Explainer
Early Research Achievements (ERA)
Teeradaj Racharak Tohoku University, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Chayanee Junplong Mahidol University, Akara Supratak University College London
11:45
15m
Full-paper
Practices and Challenges of Using DeepSeek in SE: An Empirical Study
Early Research Achievements (ERA)
10:30 - 12:10
Session 3D: AI and ML Tools (Tool Demo Track)Tool Demonstration at (Session D) jasmine room
Chair(s): Yao Li Macau University of Science and Technology (MUST)
10:30
10m
Full-paper
A Block-Based Educational Tool for Novice Understanding of State Machine Representation
Tool Demonstration
Nichika Takasu , Shinpei Ogata Shinshu University, Erina Makihara , Kozo Okano Shinshu University
10:40
10m
Full-paper
AILinkPreviewer: Enhancing Code Reviews with LLM-Powered Link Previews
Tool Demonstration
Panya Trakoolgerntong , Tao Xiao Kyushu University, Masanari Kondo Kyushu University, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Morakot Choetkiertikul Mahidol University, Thailand, Pattaraporn Sangaroonsilp Mahidol University, Yasutaka Kamei Kyushu University
10:50
10m
Full-paper
BiFuzz: A Two-Stage Fuzzing Tool for Open-World Video Games
Tool Demonstration
Pre-print
11:00
10m
Full-paper
GALENE: A Toolkit for Encapsulating Software Engineering Practices in Marine Science AI Applications
Tool Demonstration
Shijia Li , Gaowei Zhang Beijing University of Posts and Telecommunications, Yi Wang Beijing University of Posts and Telecommunications
11:10
10m
Full-paper
Multi-view Leaderboard: Towards Evaluating the Code Intelligence of LLMs From Multiple Views
Tool Demonstration
Mengyuan Liu , Zexun Zhan , Cuiyun Gao Harbin Institute of Technology, Shenzhen, Yujia Chen Harbin Institute of Technology, Shenzhen, Guoai Xu Harbin Institute of Technology, Shenzhen, Chun Yong Chong School of Information Technology, Monash University Malaysia, Shan Gao Hokkaido University, Xin Xia Zhejiang University
11:20
10m
Full-paper
OrchestML: Continuous Integration Tool for Automated Machine Learning Service Compositions
Tool Demonstration
Arogya Kharel KAIST, Xiangchi Song Korea Advanced Institute of Science and Technology (KAIST), In-Young Ko Korea Advanced Institute of Science and Technology
11:30
10m
Full-paper
PATCHOULI: Fine-grained Security Patch Detection Engine
Tool Demonstration
Binchang Li , Qingyuan Li , Cuiyun Gao Harbin Institute of Technology, Shenzhen, Qing Liao Harbin Institute of Technology, LiQingyuan
11:40
10m
Full-paper
PromptOps: Automated Tool for Testing Trustworthiness of LLMs
Tool Demonstration
11:50
10m
Full-paper
SQLWizard: A Tool for Robust Text-to-SQL via Intelligent Selection and Fine-Grained Refinement
Tool Demonstration
Keyu Liang , Chao Xiang , Zhifan Ye Zhejiang University, Zhongxin Liu Zhejiang University, Haoye Wang Hangzhou City University, Hao Guo , Youju Chen
12:00
10m
Full-paper
XRepair - Unifying Retrieval, Repair, and Evaluation for Explainable LLM-Based Vulnerability Fixes
Tool Demonstration
Alfred Asare Amoah , Yan Liu Concordia University
12:30 - 14:00
12:30
90m
Lunch
Lunch
Catering

14:00 - 15:00
Session 4A: Defect Prediction & Repair (Technical Track)Technical Track at (Session A) lotus room
Chair(s): Xiao Yu Zhejiang University
14:00
20m
Full-paper
caSPESC2Vyper: Conformant and Automatic Generation from DeFi SPESC Legal Contract to Vyper Smart Contract
Technical Track
Yue Yu South-Central Minzu University, Jiahui Wang South-Central Minzu University, Bo Meng South-Central Minzu University, Dejun Wang South-Central Minzu University
14:20
20m
Full-paper
FixConsult: Leveraging External Defect Knowledge Driven Natural Language Suggestions Generation for Software Vulnerability Repair
Technical Track
Gang Hu School of Information Science & Engineering, Yunnan University, LinHui Geng School of Information Science&Engineering, Yunnan University, JiaYao Jin School of Information Science&Engineering, Yunnan University, Xiaoshu Sun School of Information Science&Engineering, Yunnan University, Min Peng
14:40
20m
Full-paper
Software Defect Prediction Based on Temporal Hypergraph Neural Network
Technical Track
Peng He Hubei University, Shuai Hu Hubei university, Ju Ma Wuhan university, Haoqing Yang Hubei university, Yifan Wang Hubei university
14:00 - 15:20
Session 4B: Protocol and Testing (Technical Track) Technical Track at (Session B) tulip room
Chair(s): Hi Kuen Yu City University of Hong Kong
14:00
20m
Full-paper
A First Look at Privacy Risks of Android Task-executable Voice Assistant Applications
Technical Track
Shidong Pan Columbia University & New York University, Yikai Ge Washington University in St. Louis, xiaoyu sun The Australian National University
14:20
20m
Full-paper
Latent Search-Based Boundary Aware Fairness Testing for Deployed Deep Models
Technical Track
Qingyuan Sun , Wentian Zhao Beijing Institute of Technology, Tian Song Beijing Institute of Technology
14:40
20m
Full-paper
Lightweight Attention-based Temporal Modeling of Key Facial Features for Driver Fatigue Detection in Intelligent Driver Monitoring Systems
Technical Track
BaiLing Song Wuhan University of Technology, Lanhao Qin Huazhong University of Science and Technology, Wenhua Hu , Jianwen Xiang , Rui Hao Wuhan University of Technology
15:00
20m
Full-paper
Seed-Adapted Cross-State Protocol Fuzzing
Technical Track
DingchengLi , Shihao Zhu Institute of Software, Chinese Academy of Sciences, Yan Cai Institute of Software at Chinese Academy of Sciences, Long Zhang Institute of Software, Chinese Academy of Sciences; Inspur Cloud Information Technology Co.,Ltd.
14:00 - 15:30
Session 4C: Requirements and Code (ERA Track) Early Research Achievements (ERA) at (Session C) orchid room
Chair(s): Ian Gorton Northeastern University – Seattle, USA
14:00
15m
Full-paper
A Software Architecture Resilience Assessment Method via Dynamic Bayesian Networks
Early Research Achievements (ERA)
Hao Chen Southeast University, Bixin Li Southeast University, Chunguang Zhang Southeast University, Zixuan Liu Southeast University
14:15
15m
Full-paper
Automating Requirements Modelling with LLMs: An Iterative Contrastive Optimisation Approach
Early Research Achievements (ERA)
Chenxi Lv Southwest University, Shmuel Tyszberowicz , Zhiming Liu Southwest University, Bo Liu Southwest University
14:30
15m
Full-paper
BlockAlign: Fair Performance Testing for Blockchains based on Configuration Alignment
Early Research Achievements (ERA)
Jing shi , Chenglin Xie Peking University, Jianbo Gao Peking University, Peilun Li Shanghai Tree-Graph Blockchain Research Institute, Guoli Yang Advanced Institute of Big Data, Xiaoying Bai Advanced Institute of Big Data
14:45
15m
Full-paper
QEC-LLM: Training Query-focused Extractive Compression Model with LLM-guiding for Open Domain QA
Early Research Achievements (ERA)
Sijia Wang North China University of Technology, Jy Duan , Xin Li , Haoguang Wen , Yizhuo Zhang Hebei University of Engineering, Chunming Liu , Zibo Yi
15:00
15m
Full-paper
Cross-Project Defect Prediction Based on Feature Fusion and Local Domain Adaptation
Early Research Achievements (ERA)
Xianglu Zhou , Xiaoyan Zhu School of Computer Science and Technology, Xi’ an Jiaotong University, Shaan Xi, China, Yu Wang , Jiayin Wang Xi'an Jiaotong University, Xin Lai School of Computer Science and Technology, Xi’ an Jiaotong University, Shaan Xi, China
15:15
15m
Full-paper
Towards Engineering Multi-Agent LLMs: A Protocol-Driven Approach
Early Research Achievements (ERA)
Zhenyu Mao City University of Hong Kong, Jacky Keung City University of Hong Kong, Fengji Zhang , Shuo Liu City University of Hong Kong, Yifei Wang City University of Hong Kong, Jialong Li Waseda University, Japan
15:30 - 16:00
Coffee breakCatering at Theater
15:30
30m
Coffee break
Break
Catering

16:00 - 17:20
Session 5A: Precision & Code Quality (Technical Track)Technical Track at (Session A) lotus room
Chair(s): Yihan Liao City University of Hong Kong
16:00
20m
Full-paper
GATUNER:Genetic Algorithm Applied to Floating-Point Precision Tuning
Technical Track
zjn_hpc , Jinchen Xu Information Engineering University, Hongru Yang Hunan University, Changsha, China, Tao Zhang Information Engineering University, Shuai Wang Information Engineering University, Bei Zhou Information Engineering University
16:20
20m
Full-paper
What You See Is Not Always What You Get: Evaluating GPT's Comprehension of Source Code
Technical Track
Jiawen wen , Bangshuo Zhu The University of Sydney, Huaming Chen The University of Sydney
16:40
20m
Full-paper
Where Is Self-admitted Code Generated by Large Language Models on GitHub?
Technical Track
Xiao Yu Zhejiang University, Lei Liu Xi’an Jiaotong University, Xing Hu Zhejiang University, Jin Liu Wuhan University, Xin Xia Zhejiang University
17:00
20m
Full-paper
SMTPRT:Performance Regression Testing and Localization for SMT Solvers Across Multiple Logics
Technical Track
Ziyang Wang Tianjin University, Xiaohong Li Tianjin University, Lili Quan Tianjin University, Yao Zhang Tianjin University, Ruitao Feng Southern Cross University, Zhiping Zhou
16:00 - 17:20
Session 5B: Fairness and Analysis (Technical Track) Technical Track at (Session B) tulip room
Chair(s): Zhenyu Mao City University of Hong Kong
16:00
20m
Full-paper
An empirical comparison of data transformation techniques for clustering-based unsupervised software defect prediction
Technical Track
Zhengxiang Chen Shaanxi Normal University, Zhiqiang Li , Hongyu Zhang Chongqing University, Jie Ren Shaanxi Normal University, Feng Tian Shaanxi Normal University
16:20
20m
Full-paper
Cobweb: Enhanced Generation Diversity for Black-box Fairness Testing
Technical Track
Yingqian Guo , Wentian Zhao Beijing Institute of Technology, Tian Song Beijing Institute of Technology
16:40
20m
Full-paper
Mock Clones in the Wild: An Empirical Investigation Across Six Open-Source Projects
Technical Track
Gengwu Zhao , Lu Xiao Stevens Institute of Technology, Hanbin Qin Stevens Institute of Technology, Eman Abdullah AlOmar Stevens Institute of Technology, USA, Sunny Wong Envestnet
17:00
20m
Full-paper
TraceWalker: Synthesizing Interactive Debugging Progresses via Data- and Control-flow Exploration
Technical Track
Yunrui Pei Shanghai Jiao Tong University, Yuk Kwan Wong Hong Kong University of Science and Technology, Chenyang Zhang Shanghai Jiao Tong University, Hongshu Wang National University of Singapore, Wenjie Zhang National University of Singapore, Yun Lin Shanghai Jiao Tong University
16:00 - 17:00
Session 5C: Code Summarization (ERA Track) Early Research Achievements (ERA) at (Session C) orchid room
Chair(s): Zhen Yang Shandong University
16:00
15m
Full-paper
CSMS: Boosting Class Code Summarization via Transformer Refinement and Method Summary Fusion
Early Research Achievements (ERA)
Feiqiao Mao , Xingyang Du Shenzhen University, Shaocheng Feng Shenzhen University, Jiafeng Guo Shenzhen University, Yifan Bai Shenzhen University
16:15
15m
Full-paper
Retrieval-Augmented Code Generation of Low-Resource Programming Languages
Early Research Achievements (ERA)
Jianbo Lin Nanjing University, Yuan Zhang Nanjing University, Chuanyi Li Nanjing University, Wentao Zou , Jidong Ge Nanjing University, Bin Luo Nanjing University
16:30
15m
Full-paper
TriGraSum: A Tri-level Graph-based Architecture for Source Code Summarization
Early Research Achievements (ERA)
Ruiguo Hu , Dongqi Wang Northeastern University, Mingzhao Xie Software College, Northeastern University, Zhenglin Li Northeastern University, Dongming Chen Northeastern University
16:45
15m
Full-paper
Unified Modelling and Consistency Verification of UML Multi-View Models Using Alloy
Early Research Achievements (ERA)
Yihui Guo Southwest University, Shmuel Tyszberowicz , Zhiming Liu Southwest University, Bo Liu Southwest University
18:00 - 20:00
BanquetCatering at Theater
18:00
2h
Dinner
Dinner
Catering

Fri 5 Dec

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

09:00 - 10:20
Session 6A: Requirements and Testing (Technical Track) Technical Track at (Session A) lotus room
Chair(s): Yishu Li Hong Kong Metropolitan University
09:00
20m
Full-paper
AgentTCP: A Collaborative Multi-Agent Framework for Change-Aware Test Case Prioritization
Technical Track
Junyu Chen Chongqing University, Xiuhua Li Sichuan International Studies University, Jinping Wang Chonqing University, Huan Xie Chongqing University, Chunyan Liu Chongqing University, Zhenyu Wu , Yan Lei Chongqing University
09:20
20m
Full-paper
ChatNRC: A Non-functional Requirement Classification Framework Based on a Generative and Discriminative Mechanism
Technical Track
Yuman Qin School of Computer Science, Wuhan University, Wuhan, Hubei 430072, China., Rong Peng School of Computer Science, Wuhan University, Wuhan, Hubei 430072, China.
09:40
20m
Full-paper
Dialogue Framework for Bug Issue Types Classification in Deep Learning-oriented Projects Based on Large Language Model
Technical Track
Yu Zhao , Zixuan Zeng , Zhiqiu Huang Nanjing University of Aeronautics and Astronautics, Lina Gong Nanjing University of Aeronautics and Astronautic
10:00
20m
Full-paper
Dynamic Variance Reduction-Based Reusable Test Case Generation for Image Classification
Technical Track
Changrong Huang Hohai University, Shunhui Ji Hohai University, Yu Shi Hohai University, Pengcheng Zhang Hohai University
09:00 - 10:20
Session 6B: Log and Analysis (Technical Track) Technical Track at (Session B) tulip room
Chair(s): Xiaoxue Ma Hong Kong Metropolitan University
09:00
20m
Full-paper
Exploring Developer Departure in Open-Source Software Projects: Prevalence, Reason Taxonomy, and Influencing Factors
Technical Track
Yangyang Zhao Zhejiang Sci-Tech University, Bingzheng Zhao Zhejiang Sci-Tech University, Zanxiang He Shenzhen Technology University, Liming Nie
09:20
20m
Full-paper
LLMs are All You Need? Improving Fuzz Testing for MOJO with Large Language Models
Technical Track
Linghan Huang , Peizhou Zhao The University of Sydney, Huaming Chen The University of Sydney
09:40
20m
Full-paper
Understanding Industrial Log Analysis: A Multi-Dataset Evaluation of Parsing and Anomaly Detection
Technical Track
Yicheng Sun City University of Hong Kong, Jacky Keung City University of Hong Kong, Yihan Liao City University of Hong Kong, Hi Kuen Yu City University of Hong Kong
10:00
20m
Full-paper
SVPrompt-MR: An LLM-Based Metamorphic Relation Identification Method with Self-Verification Mechanism
Technical Track
Jun Huang University of South China, Meng Li University of South China, Xiao Hua Yang University of South China, Jie Liu University of South China, Shi Yu Yan University of South China
09:00 - 10:20
Session 6C: Security and Architecture (Technical Track) Technical Track at (Session C) orchid room
Chair(s): Jingyu ZHANG
09:00
20m
Full-paper
A Comparative Study Towards Designing a Hybrid Architecture of Microservices and LLM-based Multi-Agent Systems
Technical Track
Peyman Yazdanian Concordia University, Canada, Yan Liu Concordia University, Zheng Li Queen's University Belfast, UK
09:20
20m
Full-paper
Chain of Command: Context-Aware Android Malware Detection via Permission-to-API Call Chains and Graph Representation Learning
Technical Track
Zhichao Shi , Qiang Han North Minzu University, Zihao Zhang North Minzu University
09:40
20m
Full-paper
Exposing and Defending Membership Leakage in Vulnerability Prediction Models
Technical Track
Yihan Liao City University of Hong Kong, Jacky Keung City University of Hong Kong, Xiaoxue Ma Hong Kong Metropolitan University, Jingyu Zhang City University of Hong Kong, Yicheng Sun City University of Hong Kong
10:00
20m
Full-paper
Towards Lightweight LLM Software Solutions for InsurTech: A Framework for Scalable Question Answering Systems
Technical Track
Hi Kuen Yu City University of Hong Kong, Jacky Keung City University of Hong Kong, Yicheng Sun City University of Hong Kong, Yihan Liao City University of Hong Kong, Richard Suen Shenzhen MSU-BIT University
10:30 - 11:00
Coffee breakCatering at Theater
10:30
30m
Coffee break
Break
Catering

11:00 - 12:20
Session 7A: LLM Code Generation (Technical Track) Technical Track at (Session A) lotus room
Chair(s): Yifei Wang
11:00
20m
Full-paper
Chart2Code-MoLA: Efficient Multi-Modal Code Generation via Adaptive Expert Routing
Technical Track
Yifei Wang City University of Hong Kong, Jacky Keung City University of Hong Kong, Zhenyu Mao City University of Hong Kong, Jingyu Zhang City University of Hong Kong, CAO YUCHEN
11:20
20m
Full-paper
LLM-Based Semantic Modeling and Cooperative Evolutionary Fuzzing for Traffic Violation Scenario Generation
Technical Track
Liu Yangyang , Xinyu Li Hohai University, Yan Xiao Sun Yat-sen University, Miao Zhang Shenzhen Technology University, Pengcheng Zhang Hohai University
11:40
20m
Full-paper
Multi-agent Assisted Automatic Test Generation for Java JSON Libraries
Technical Track
Sinan Wang Southern University of Science and Technology, Zhiyuan Zhong The University of Utah, Shaojin Wen Alibaba Inc, Yepang Liu Southern University of Science and Technology
12:00
20m
Full-paper
Breaking the Curse of High-Dimensionality: A Transformer-Based Approach to Software Configuration Performance Prediction
Technical Track
ZhengyuePan Hangzhou Dianzi University, Mingjie Tu Hangzhou Dianzi University, Shijie Li China Southern Power Grid Company Limited, Dandan Wang Institute of Software, Chinese Academy of Sciences, Jie Chen Hangzhou Dianzi University
11:00 - 12:20
Session 7B: WebAssembly & Optimization (Technical Track) Technical Track at (Session B) tulip room
Chair(s): Jiayang Song Macau University of Science and Technology, Yanlin Wang Sun Yat-sen University
11:00
20m
Full-paper
A Multi-Model Hybrid Framework Leveraging Query Expansion without Fine-Tuning for Zero-Shot Cross-Domain Code Search
Technical Track
Gang Hu School of Information Science & Engineering, Yunnan University, JiaYao Jin School of Information Science&Engineering, Yunnan University, Fan Su School of Information Science&Engineering, Yunnan University, LinHui Geng School of Information Science&Engineering, Yunnan University, Fei Yang , Min Peng
11:20
20m
Full-paper
How Do Developers Use ChatGPT for Software Test Generation? Usage Patterns, Satisfaction, and Code Adoption Analysis
Technical Track
Sicheng He Wuhan University, Wanwei Zhan Wuhan University of Technology, Jijun Wang Wuhan University of Technology, Junjie Dai Zhejiang University, Haoxuan Chen Wuhan University of Technology, Cheng Tan Wuhan University of Technology, Fuyang Li Wuhan University of Technology
11:40
20m
Full-paper
Optimizing Type Duplication in WebAssembly Module Splitting
Technical Track
Xifan Xu , Jun Ma Nanjing University, Chun Cao Nanjing University
12:00
20m
Full-paper
Practical Lossless Recompression of JPEG Images Using Transform Domain Prediction
Technical Track
Long Chen Engineering Research Center of Transportation Information and Safety, ERCTIS, MoE of China. School of Computer Science and Artificial Intelligence, Wuhan University of Technology, Wenhua Hu , Rui Hao Wuhan University of Technology, Junwei Zhou , Jianwen Xiang
12:30 - 14:00
12:30
90m
Lunch
Lunch
Catering

14:00 - 15:20
Session 8A: Testing and Regression (Technical Track)Technical Track at (Session A) lotus room
Chair(s): Jiayang Song Macau University of Science and Technology, Xuan Xie Macau University of Science and Technology
14:00
20m
Full-paper
A Packing-Insensitive Detection Method for Android Malware Based on Image Representation
Technical Track
Siyuan Ma , Shihao Zhu State Key Laboratory of Computer Science,Institute of Software,Chinese Academy of Sciences,China, Yan Cai Institute of Software at Chinese Academy of Sciences, Long Zhang Institute of Software, Chinese Academy of Sciences; Inspur Cloud Information Technology Co.,Ltd.
14:20
20m
Full-paper
Enhancing Diffusion-Driven Test Input Generation using Large Language Model
Technical Track
Joonwoo Lee Hanyang University, Seungho Kim Hanyang University, Scott Uk-Jin Lee Hanyang University
14:40
20m
Full-paper
HGTRTracer: Advancing Requirements-Code Traceability with LLM-Augmented Attribution Reasoning and Heterogeneous Graph Transformer
Technical Track
Huan Jin School of Computer Science and Artificial Intelligence, Wuhan Textile University, Yingkai Yuan School of Computer Science and Artificial Intelligence, Wuhan Textile University, Bangchao Wang Wuhan Textile University, Hongyan Wan School of Computer Science and Artificial Intelligence, Wuhan Textile University, Zhiyuan Zou The School of Computer Science and Artificial Intelligence, Wuhan Textile University, Wuhan, China
15:00
20m
Full-paper
Multi-Stage Generation of Rust Unit Tests with LLMs
Technical Track
Yongqian Chen Zhejiang University, Junwei Zhang Zhejiang University, Xing Hu Zhejiang University, Xin Xia Zhejiang University
14:00 - 15:20
Session 8B: Requirements Engineering (Technical Track) Technical Track at (Session B) tulip room
Chair(s): Yanlin Wang Sun Yat-sen University, Jingyu ZHANG
14:00
20m
Full-paper
A Soft Prompt-Enhanced Device Knowledge Extraction Method for Embedded System Requirements Elicitation
Technical Track
Shengxin Zhao Inner Mongolia Normal University, Chunhui Wang , Zhiguo Liu Inner Mongolia Normal University, Tong Li Beijing University of Technology, Ye Zhai College of Computer Science and Technology,Inner Mongolia Normal University
14:20
20m
Full-paper
Edge4RE: A Novel Edge-Cloud Collaborative Framework for Privacy-Preserving Automated Requirements Documentation
Technical Track
Ben Cheng School of Information Technology, Deakin University, Yi Wang School of Information Technology, Deakin University, Oscar Wu School of Information Technology, Deakin University, Chetan Arora Monash University, Thuong Hoang School of Information Technology, Deakin University, Xiao Liu School of Information Technology, Deakin University
14:40
20m
Full-paper
MSPM: A Multi-Strategy Prompting Method for Goal-Oriented Modeling from User Stories
Technical Track
Yi Wang Inner Mongolia Normal University, Chunhui Wang , Ye Zhai College of Computer Science and Technology,Inner Mongolia Normal University, Tong Li Beijing University of Technology, Zhiguo Liu College of Computer Science and Technology,Inner Mongolia Normal University
15:00
20m
Full-paper
PerProb: Indirectly Evaluating Memorization in Large Language Models
Technical Track
Yihan Liao City University of Hong Kong, Jacky Keung City University of Hong Kong, Xiaoxue Ma Hong Kong Metropolitan University, Jingyu Zhang City University of Hong Kong, Yicheng Sun City University of Hong Kong
15:30 - 16:00
Closing CeremonyTechnical Track at Theater
15:30
30m
Day closing
Closing Ceremony
Technical Track

Accepted Papers

Title
A Comparative Study Towards Designing a Hybrid Architecture of Microservices and LLM-based Multi-Agent Systems
Technical Track
A First Look at Privacy Risks of Android Task-executable Voice Assistant Applications
Technical Track
AgentTCP: A Collaborative Multi-Agent Framework for Change-Aware Test Case Prioritization
Technical Track
A Hierarchical Hybrid-Intelligence Architecture with Consensus, Debate, and Reflection for High-Fidelity NL-to-PPTL Conversion
Technical Track
A Multi-Model Hybrid Framework Leveraging Query Expansion without Fine-Tuning for Zero-Shot Cross-Domain Code Search
Technical Track
An empirical comparison of data transformation techniques for clustering-based unsupervised software defect prediction
Technical Track
An Empirical Study of Reinforcement Learning-based Class Integration Test Order Generation
Technical Track
A Packing-Insensitive Detection Method for Android Malware Based on Image Representation
Technical Track
A Soft Prompt-Enhanced Device Knowledge Extraction Method for Embedded System Requirements Elicitation
Technical Track
AutoRCA: A Graph Sequence-based Automatic Root Cause Analysis Method for Microservice Systems Through Multimodal Data
Technical Track
BDafny: A Formal Execution and Verification Framework of the BPMN 2.0 in Dafny
Technical Track
BEGA:A Binary Code Embedding Method Based on Gravity-Model Augmentation Graph Contrastive Learning
Technical Track
Breaking the Curse of High-Dimensionality: A Transformer-Based Approach to Software Configuration Performance Prediction
Technical Track
CAMUS: Context-Aware Neural Mutation Selection
Technical Track
caSPESC2Vyper: Conformant and Automatic Generation from DeFi SPESC Legal Contract to Vyper Smart Contract
Technical Track
Chain of Command: Context-Aware Android Malware Detection via Permission-to-API Call Chains and Graph Representation Learning
Technical Track
Chart2Code-MoLA: Efficient Multi-Modal Code Generation via Adaptive Expert Routing
Technical Track
ChatNRC: A Non-functional Requirement Classification Framework Based on a Generative and Discriminative Mechanism
Technical Track
Cobweb: Enhanced Generation Diversity for Black-box Fairness Testing
Technical Track
Conanj: Confidential Data Analysis for Confidential Computing of Java Programs
Technical Track
Dialogue Framework for Bug Issue Types Classification in Deep Learning-oriented Projects Based on Large Language Model
Technical Track
Dynamic Variance Reduction-Based Reusable Test Case Generation for Image Classification
Technical Track
Edge4RE: A Novel Edge-Cloud Collaborative Framework for Privacy-Preserving Automated Requirements Documentation
Technical Track
Empirical assessment of the perception of graphical threat model acceptability
Technical Track
Enhancing Commit Classification for Software Maintenance with Adversarial Learning
Technical Track
Enhancing Diffusion-Driven Test Input Generation using Large Language Model
Technical Track
Exploring Developer Departure in Open-Source Software Projects: Prevalence, Reason Taxonomy, and Influencing Factors
Technical Track
Exposing and Defending Membership Leakage in Vulnerability Prediction Models
Technical Track
FixConsult: Leveraging External Defect Knowledge Driven Natural Language Suggestions Generation for Software Vulnerability Repair
Technical Track
GATUNER:Genetic Algorithm Applied to Floating-Point Precision Tuning
Technical Track
HGTRTracer: Advancing Requirements-Code Traceability with LLM-Augmented Attribution Reasoning and Heterogeneous Graph Transformer
Technical Track
How Do Developers Use ChatGPT for Software Test Generation? Usage Patterns, Satisfaction, and Code Adoption Analysis
Technical Track
Human Ants are Beneficial for Team Performance
Technical Track
IPSO: An Improved Particle Swarm Optimization-Based Method for Test Case Generation
Technical Track
ISA: Test Case Generation based on Improved Simulated Annealing Algorithm
Technical Track
Latent Search-Based Boundary Aware Fairness Testing for Deployed Deep Models
Technical Track
Lightweight Attention-based Temporal Modeling of Key Facial Features for Driver Fatigue Detection in Intelligent Driver Monitoring Systems
Technical Track
LLM-Based Semantic Modeling and Cooperative Evolutionary Fuzzing for Traffic Violation Scenario Generation
Technical Track
LLMs are All You Need? Improving Fuzz Testing for MOJO with Large Language Models
Technical Track
MAAP: A Self-Evolving Multi-Agent Automated Vulnerability Repair Framework for Python
Technical Track
MicroRacer: Detecting Concurrency Bugs for Cloud Service Systems
Technical Track
Mock Clones in the Wild: An Empirical Investigation Across Six Open-Source Projects
Technical Track
MSPM: A Multi-Strategy Prompting Method for Goal-Oriented Modeling from User Stories
Technical Track
MTL-CR: A Multitask Learning Approach for Code Representation
Technical Track
MUATC: Multi-Agent Utilization to Augment Test Coverage
Technical Track
Multi-agent Assisted Automatic Test Generation for Java JSON Libraries
Technical Track
Multi-Stage Generation of Rust Unit Tests with LLMs
Technical Track
Optimizing Type Duplication in WebAssembly Module Splitting
Technical Track
PerProb: Indirectly Evaluating Memorization in Large Language Models
Technical Track
Practical Lossless Recompression of JPEG Images Using Transform Domain Prediction
Technical Track
PyReach: A Multi-Agent Framework for Vulnerability Reachability Analysis in Python
Technical Track
Recovering Variable Names in The Decompiled Code Based on Multi-Task Learning
Technical Track
Reliable Code Generation with Test Case Prioritization and Cognitive Validation
Technical Track
Seed-Adapted Cross-State Protocol Fuzzing
Technical Track
SeedOrNot: A Classification-Driven Framework for Efficient Seed Scheduling in Hybrid Fuzzing
Technical Track
Smart Contract Vulnerability Detection Based on Residual Dilated Convolution with Multi-Head Attention
Technical Track
SMTPRT:Performance Regression Testing and Localization for SMT Solvers Across Multiple Logics
Technical Track
Software Defect Prediction Based on Temporal Hypergraph Neural Network
Technical Track
SVPrompt-MR: An LLM-Based Metamorphic Relation Identification Method with Self-Verification Mechanism
Technical Track
Systematic Mapping Study on Risks and Vulnerabilities in Software Containers
Technical Track
Testing Deep Learning Libraries with Semantic Equivalent API Patterns
Technical Track
Towards Lightweight LLM Software Solutions for InsurTech: A Framework for Scalable Question Answering Systems
Technical Track
Trace: Test Repair via Agent-based Context Extraction with LLMs
Technical Track
TraceWalker: Synthesizing Interactive Debugging Progresses via Data- and Control-flow Exploration
Technical Track
Understanding Commercial Low-code App Bugs
Technical Track
Understanding Industrial Log Analysis: A Multi-Dataset Evaluation of Parsing and Anomaly Detection
Technical Track
What You See Is Not Always What You Get: Evaluating GPT's Comprehension of Source Code
Technical Track
Where Is Self-admitted Code Generated by Large Language Models on GitHub?
Technical Track

Double Blind Policy

IMPORTANT: The APSEC 2025 technical research track will use a double-blind reviewing process, which means that submissions must not reveal the authors’ identities. The authors must make every effort to honor the double-blind reviewing process. Submissions must adhere to the following rules (largely reused from APSEC 2024 double-blind instructions).

  • Omit authors’ names and institutions from your title page.
  • References to authors’ own related work must be in the third person. (For example, not “We build on our previous work…” but rather “We build on the work of…”)
  • There may be cases in which the current submission is a clear follow up of one of your previous work, and despite what recommended in the previous point, reviewers will clearly associate authorship of such a previous work to the current submission. In this case, you may decide to anonymize the reference itself at submission time. For example: “based on previous results [10]” .. where the reference is reported as “[10] Anonymous Authors. Omitted for double blind reviewing.” In doing so, however, please make sure that the APSEC 2025 submission is self-contained and its content can be reviewed and understood without accessing the previous paper.
  • Do not include acknowledgements of people, grants, organizations, etc. that would give away your identity. You may, of course, add these acknowledgements in the camera-ready version.
  • In general, aim to reduce the risk of accidental unblinding. For example, if you use an identifiable naming convention for your work, such as a project name, use a different name for your submission, which you may indicate has been changed for the purposes of double-blind reviewing. This includes names that may unblind individual authors and their institutions. For example, if your project is called GoogleDeveloperHelper, which makes it clear the work was done at Google, for the submission version, use the name DeveloperHelper or BigCompanyDeveloperHelper instead.
  • Avoid revealing the institution affiliations of authors or at which the work was performed. For example, if the evaluation includes a user study conducted with undergraduates from the CS 101 class that you teach, you might say “The study participants consist of 200 students in an introductory CS course.” You can of course add the institutional information in the camera-ready. Similar suggestions apply for work conducted in specific organizations (e.g., industrial studies). In such cases, avoid mentioning the organization’s name. Instead, you may just refer to the organization as “Org” or “Company”, etc. When appropriate and when this does not help too much in revealing the company’s name, you might mention the context (e.g., financial organization, video game development company, etc.).
  • APSEC 2025 believes in open science and that open science aids reproducibility and replicability. To improve these factors we encourage authors to consider disclosing the source code and datasets used within their paper, including extractors, survey data, etc. By sharing this information your contribution will be more impactful because others can follow up on your work and of course cite it. But please avoid linking directly to code repositories or tool deployments which can reveal your identity. Instead of doing so, please consider using services such as zenodo.org, figshare.com, which provide DOIs and support anonymous and semi-anonymous methods of archiving software and datasets. Archive.org is also recommended for the dissemination of larger datasets. These archived and anonymized datasets should be linked within the paper itself.

Call for Papers: Technical Track

It has been 32 years since the establishment of the Asia-Pacific Software Engineering Conference (APSEC) as a leading regional conference that gathers researchers and practitioners from academia, industry, and government to exchange knowledge and best practices in software engineering, and to address emerging challenges and solutions in software engineering innovation. This year’s APSEC will be held on December 2-5, 2025 in Macao, China. APSEC 2025 will continue in the tradition of previous editions of this regional conference. As in past APSEC series, the main research track features the most recent and significant innovations in the field of software engineering and all its sub-disciplines.

The APSEC 2025 technical research track invites high-quality contributions describing original results in the discipline of software engineering. Solicited topics include, but are not limited to:

  • Tools and processes
    ○ Agile processes
    ○ DevOps and Container
    ○ Configuration Management and Deployment
    ○ Software Engineering Process and Standards

  • Requirements and Design
    ○ Service-oriented Computing
    ○ Component-based Software Engineering
    ○ Cooperative, Distributed, and Global Software Engineering
    ○ Software Architecture, Modeling and Design
    ○ Middleware, Frameworks, and APIs
    ○ Software Product-line Engineering

  • Testing and Analysis
    ○ Testing, Verification, and Validation
    ○ Program Analysis
    ○ Program Synthesis
    ○ Program Repairs

  • Formal Aspects of Software Engineering
    ○ Formal Methods
    ○ Model-driven and Domain-specific Engineering

  • Human Factors and Social Aspects of Software Engineering
    ○ Software Comprehension, Visualization, and Traceability
    ○ Software for Green and Sustainable Technologies

  • AI and Software Engineering
    ○ AI for Software Engineering ○ Software Engineering for AI ○ Search-based Software Engineering

  • Dependability, Safety, and Reliability
    ○ Reliability, availability, and safety ○ Performance ○ Vulnerability detection to enhance software security

  • Software Maintenance and Evolution
    ○ Refactoring
    ○ Reverse Engineering
    ○ Software Reuse
    ○ Software Project Management ○ Debugging, Defect Prediction, and Fault Localization

  • Software Repository Mining and Data Analytics

APSEC 2025 welcomes submissions addressing topics in a variety of application domains, including mobile, cloud, blockchains, embedded, and cyber-physical systems.


Evaluation Criteria

Technical research papers must not exceed 12 pages (including references). Submissions will be evaluated by at least three program committee members. The evaluation will focus on the novelty, originality, importance to the field, proper use of research methods, and presentation of the submissions.


Submission Instructions

Submitted papers must have been neither previously accepted for publication nor concurrently submitted for review in another journal, book, conference, or workshop.

All submissions must be in English and must come in A4 paper size PDF format and conform, at the time of submission, to the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt font, LaTeX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf option). Also, papers must comply with the IEEE Policy on Authorship. Submissions must be submitted electronically in PDF before the due date via HotCRP.

The Chairs reserve the right to reject submissions (without reviews) that are not in compliance or out of scope for the conference.

IMPORTANT: The APSEC 2025 technical research track will use a double-blind reviewing process, which means that submissions must not reveal the authors’ identities. The authors must make every effort to honor the double-blind reviewing process. Please read the APSEC 2025 double-blind instructions carefully before preparing your paper.

Submission Link

Papers must be submitted through HotCRP: https://apsec25.hotcrp.com


Important Dates

  • Abstract Deadline (Optional): July 13, 2025 (Extended)
  • Paper Deadline: July 20, 2025 (Extended)
  • Author Notification: September 20, 2025 (Extended)
  • Camera Ready Deadline: October 20, 2025

Accepted Papers

All accepted papers will be included in the IEEE Digital Library as the APSEC 2025 conference proceedings. Accepted papers will not be permitted any additional page of content. But, we hope that the authors will reflect the reviewers’ comments as much as possible in the camera-ready version. After acceptance, the list of paper authors can not be changed under any circumstances, and the list of authors on camera-ready papers must be identical to those on submitted papers. After acceptance, paper titles can not be changed except by permission of the Program Co-Chairs, and only then when referees recommend a change for clarity or accuracy with paper content.

Conference Attendance Expectation

If a submission is accepted, at least one author of the paper must register for APSEC 2025 and present the paper at the conference. If an accepted paper is not presented, the paper will be removed from the proceedings.

Contact

  • Jacky Keung and Eunjong Choi
    APSEC 2025 Program Co-Chairs

Preprint Policy

To ensure a fair and unbiased double-blind review process, authors submitting papers to APSEC 2025 must comply with the following guidelines regarding the handling of non-anonymized versions. A non-anonymized version is considered any publicly available document (e.g., on arXiv) that contains essentially the same scientific content as the submitted paper, even if it differs in minor ways such as the title, paper structure or organization, length or formatting.

Preprints Posted Before the Anonymity Period

Authors are permitted to make a non-anonymized version of their paper publicly available before the anonymity period. The anonymity period starts one month before the submission deadline and ends when the paper is accepted, rejected, or withdrawn. However, in such cases, authors are responsible for minimizing the risk that reviewers can trivially link the submitted paper to a public version.

Specifically, authors must:

  • Take care to prevent the submitted manuscript from being associated with the non-anonymized version.
  • Not make the non-anonymized version easily discoverable via search engines by reusing distinctive phrases (e.g., title, keywords) from the submitted manuscript.
  • Not update the non-anonymized version during the anonymity period.
  • Not actively promote the non-anonymized version (e.g., via social media, blogs, or mailing lists).
  • Not reference, cite, or link to any non-anonymized version within the submitted manuscript.

Post-Publication Preprint Policy According to IEEE Guidelines

Upon acceptance and publication of a paper by IEEE, authors must update any publicly available non-anonymized version of the paper in one of the following ways:

  • Replace it with the full IEEE citation, including the Digital Object Identifier (DOI), or
  • Post the accepted version of the paper (i.e., the author’s final version prior to IEEE formatting), along with the DOI. The IEEE-published version must not be posted.

IEEE will provide each author with a preprint version of the article that includes the DOI, the IEEE copyright notice, and a statement confirming that the article has been accepted for publication by IEEE. Authors may post this preprint version in accordance with IEEE’s posting guidelines. For more details, please refer to:
Post Your Paper - IEEE Author Center Conferences