Software Engineering in Practices (SEIP)APSEC 2025
The Software Engineering in Practice (SEIP) track at APSEC 2025 serves as a bridge between industry and academia in the field of software engineering. Established to promote knowledge exchange and collaboration, this track provides a platform for practitioners and researchers to share practical experiences, innovative solutions, and emerging best practices.
APSEC 2025 SEIP focuses on cutting-edge topics including AI-driven software engineering, mobile systems, cyber-physical systems, and software safety. The track welcomes contributions that address real-world challenges and practical implementations of software engineering methodologies.
Papers undergo rigorous evaluation by the Program Committee, with emphasis on industry relevance, practical validation, and quality of presentation. Accepted papers will be published in the conference proceedings and included in the CS Digital Library.
Join us at APSEC 2025 to connect with industry professionals and academic researchers, explore practical innovations, and contribute to advancing the field of software engineering.
For inquiries, please contact our SEIP Co-Chairs: * Xiaoning Du (Monash University) * Li Li (Beihang University)
Key Dates:
- Submission: August 7, 2025
- Notification: September 26, 2025
- Camera Ready: October 23, 2025
This program is tentative and subject to change.
Tue 2 DecDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
09:00 - 12:30 | |||
09:00 3h30mOther | New Faculty Forum Tutorials | ||
09:00 - 10:00 | |||
09:00 60mKeynote | Keynote Workshops | ||
10:00 - 10:30 | |||
10:00 30mTalk | TBD-1 Workshops | ||
11:00 - 11:30 | |||
11:00 30mTalk | TBD-2 Workshops | ||
11:30 - 12:00 | |||
11:30 30mTalk | TBD-3 Workshops | ||
12:00 - 12:30 | |||
12:00 30mTalk | TBD-4 Workshops | ||
14:00 - 15:40 | |||
14:00 1h40mTutorial | Architecting Large-Scale Explainable AI (XAI) Software: Process, Pipeline, and Framework Tutorials | ||
14:00 - 14:30 | |||
14:00 30mTalk | TBD-5 Workshops | ||
14:30 - 15:00 | |||
14:30 30mTalk | TBD-6 Workshops | ||
15:00 - 15:30 | |||
15:00 30mTalk | Discussion Workshops | ||
16:00 - 17:40 | |||
16:00 1h40mTutorial | Foundations of Software Testing Tutorials | ||
16:00 - 17:40 | |||
16:00 20mFull-paper | CIMAS: A Multilingual Semantic-Driven Model for Code Idiom Mining, Abstraction and Synthesis Student Research Competition | ||
16:20 20mFull-paper | Detecting Data Contamination in Code Generation Benchmarks via DiffMIA Student Research Competition | ||
16:40 20mFull-paper | ModelVirtualizer: A Light-weight Virtualization Framework for On-Device Deep Learning Models Student Research Competition | ||
17:00 20mFull-paper | Reasoning Design and Code from Mockup Diagrams Using Vision-LMs Student Research Competition | ||
17:20 20mFull-paper | Software Trustworthiness Assessment Based on Causal Evidence Graph Student Research Competition | ||
Wed 3 DecDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
09:00 - 09:30 | |||
09:00 30mDay opening | Opening Ceremony Technical Track | ||
09:30 - 10:30 | |||
09:30 60mKeynote | Keynote 1: How to Build AI Agent, How to Build Agentic AI, and How to Build Automatically? Keynotes Yang Liu Nanyang Technological University | ||
11:00 - 12:00 | |||
11:00 60mKeynote | Keynote 2: Navigating the Impact of Large Language Models on Software Engineering: Challenges and Opportunities Keynotes Xin Xia Zhejiang University | ||
12:00 - 14:00 | |||
12:00 2hLunch | Lunch Catering | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | AutoRCA: A Graph Sequence-based Automatic Root Cause Analysis Method for Microservice Systems Through Multimodal Data Technical Track | ||
14:20 20mFull-paper | CAMUS: Context-Aware Neural Mutation Selection Technical Track Mingda Chen Beijing Jiaotong University, Bo Wang Beijing Jiaotong University, Youfang Lin Beijing Jiaotong University, Jie M. Zhang King's College London | ||
14:40 20mFull-paper | ISA: Test Case Generation based on Improved Simulated Annealing Algorithm Technical Track Shunhui Ji Hohai University, Yu Shi Hohai University, Ji Deng Hohai University, Pengcheng Zhang Hohai University | ||
15:00 20mFull-paper | Trace: Test Repair via Agent-based Context Extraction with LLMs Technical Track Jingxiang Tu , Bo Lin National University of Defense Technology, Yihao Qin , Shangwen Wang National University of Defense Technology, Liqian Chen National University of Defense Technology, Xiaoguang Mao National University of Defense Technology | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | Enhancing Commit Classification for Software Maintenance with Adversarial Learning Technical Track | ||
14:20 20mFull-paper | Reliable Code Generation with Test Case Prioritization and Cognitive Validation Technical Track Lingyun Huang Zhejiang University, Xin Yin Zhejiang University, Xinrui Li Zhejiang University, Chao Ni Zhejiang University | ||
14:40 20mFull-paper | SeedOrNot: A Classification-Driven Framework for Efficient Seed Scheduling in Hybrid Fuzzing Technical Track Qian Yan National Key Laboratory of Science and Technology on Information System Security, Minhuan Huang National Key Laboratory of Science and Technology on Information System Security, Huayang Cao National Key Laboratory of Science and Technology on Information System Security | ||
15:00 20mFull-paper | Understanding Commercial Low-code App Bugs Technical Track Hadia Syed Shanghai Jiao Tong University, Zhixing He , Ye Tang Shanghai Jiao Tong University, Jiqing Liu Shanghai Jiao Tong University, Shengjie Chen Inspur, Lixin Sun Inspur, Hao Zhong Shanghai Jiao Tong University | ||
14:00 - 15:30 | |||
14:00 15mFull-paper | An Empirical Analysis of ESLint Information Components and Their Interactions in LLM-based Program Repair Early Research Achievements (ERA) Shinhyuck Kang Sungkyunkwan University, Jinseok Heo Sungkyunkwan University, Eunseok Lee Sungkyunkwan University | ||
14:15 15mFull-paper | Compressing Cell Execution Logs Embedded within Jupyter Notebook Files Early Research Achievements (ERA) Tomoki Nakamaru The University of Tokyo | ||
14:30 15mFull-paper | Developing a Japanese-Localization Code Benchmark for LLMs Early Research Achievements (ERA) Haruka Tsuchida Japan Women's University, Miyu Sato Japan Women's University, Yuha Nishigata Japan Women's University, Ito Waka Japan Women's University, Kimio Kuramitsu Japan Women's University | ||
15:00 15mFull-paper | Enhancing Requirement-to-Code Traceability via Chain-of-Thought Prompting in Large Language Models Early Research Achievements (ERA) wang wenqing , Ye Wang Zhejiang Gongshang University, Liping Zhao , Qiao Huang Zhejiang Gongshang University, Bo Jiang Zhejiang Gongshang University | ||
15:15 15mFull-paper | RAG4Test: Retrieving GUI States for Multilingual Bug Report and Test Case Generation via LLMs Early Research Achievements (ERA) Zhiyao Wang The University of Osaka, Xiujing Guo The University of Osaka, Tatsuhiro Tsuchiya Osaka University | ||
14:00 - 15:30 | |||
14:00 15mFull-paper | A Catalog of Participatory Reuse Challenges, Solutions, and Lessons Learned Software Engineering in Practices (SEIP) Xingru Chen , Muhammad Usman Blekinge Institute of Technology, Deepika Badampudi Blekinge Institute of Technology | ||
14:15 15mFull-paper | Constructing and Evaluating Domain-Specific Synthetic QA Datasets for Airborne Software Engineering: An LLM-Based Framework in Practice Software Engineering in Practices (SEIP) Xiyue Ruan Avicas Generic Technology Co., Ltd, Zheng Xu Avicas Generic Technology Co., Ltd, Xu yifan , Yunduo Wang School of Software, Beihang University, Lindong Wang Shanghai Jiao Tong University, Minzhe Li Shanghai Jiao Tong University, Ning Ge School of Software, Beihang University | ||
14:30 15mFull-paper | It Only Gets Worse: Revisiting DL-Based Vulnerability Detectors from a Practical Perspective Software Engineering in Practices (SEIP) Yuqian Wang Tianjin University, Xiaohong Li Tianjin University, Ruitao Feng Southern Cross University, Yao Zhang Tianjin University, Yuekang Li UNSW | ||
14:45 15mFull-paper | Virtualization-based Penetration Testing Study for Detecting Accessibility Abuse Vulnerabilities in Banking Apps in East and Southeast Asia Software Engineering in Practices (SEIP) Wei Minn Singapore Management University, Phong Phan i-Sprint Innovations Pte. Ltd, Vikas K. Malviya Singapore Management University, Benjamin Adolphi Promon, Yan Naing Tun Singapore Management University, Henning Benzon Treichl Promon, Albert Ching i-Sprint Innovations Pte. Ltd, Lwin Khin Shar Singapore Management University, David Lo Singapore Management University | ||
15:00 15mFull-paper | LogExpertSolver: A Multi-Agent Framework for Domain-Specialized Log Parsing Software Engineering in Practices (SEIP) Chenxi Mao Sun Yat-sen University, Yuxin Su Sun Yat-sen University, Yuxin Su Sun Yat-sen University, Dan Li Sun Yat-sen University | ||
15:15 15mFull-paper | Towards Data-Driven Real-Time Performance Monitoring of Platform Ecosystems Software Engineering in Practices (SEIP) Hegazy Shady Siemens Technology, Muhammad Ammar Siemens Technology, Christoph Elsner Siemens Technology, Jan Bosch Chalmers University of Technology, Helena Holmstr√∂m Olsson Malmö University | ||
16:00 - 17:20 | |||
16:00 20mFull-paper | Systematic Mapping Study on Risks and Vulnerabilities in Software Containers Technical Track Maha Sroor University of Jyväskylä, Teerath Das University of Jyväskylä, Rahul Mohanani University of Jyväskylä, Tommi Mikkonen University of Jyvaskyla | ||
16:20 20mFull-paper | A Hierarchical Hybrid-Intelligence Architecture with Consensus, Debate, and Reflection for High-Fidelity NL-to-PPTL Conversion Technical Track | ||
16:40 20mFull-paper | MAAP: A Self-Evolving Multi-Agent Automated Vulnerability Repair Framework for Python Technical Track Junfan Chen Hainan University, Zhiyuan Fu Hainan University, Ting Yang Xidian University, Ruidong Li Kanazawa University, Hongyu Sun Hainan University, Yuqing Zhang University of Chinese Academy of Sciences, Hainan University | ||
17:00 20mFull-paper | An Empirical Study of Reinforcement Learning-based Class Integration Test Order Generation Technical Track Jiayi Wang Shenzhen Technology University, Shuxiang Zheng Shenzhen Technology University, Miao Zhang Shenzhen Technology University, Yan Xiao Sun Yat-sen University, Peihong Chen Shenzhen Technology University, Xiaoxing Yang Shenzhen Technology University | ||
16:00 - 17:20 | |||
16:00 20mFull-paper | Human Ants are Beneficial for Team Performance Technical Track Iflaah Salman Lappeenranta-Lahti University of Technology (LUT), Alvaro Francisco Gil Universidad Politécnica de Madrid, Juan Garbajosa Technical University of Madrid, Peter Gloor Massachusetts Institute of Technology SDM | ||
16:20 20mFull-paper | IPSO: An Improved Particle Swarm Optimization-Based Method for Test Case Generation Technical Track Peng Wang Hohai University, Shunhui Ji Hohai University, Yikun Guo Hohai University, Pengcheng Zhang Hohai University | ||
16:40 20mFull-paper | MTL-CR: A Multitask Learning Approach for Code Representation Technical Track | ||
17:00 20mFull-paper | Testing Deep Learning Libraries with Semantic Equivalent API Patterns Technical Track Yan Song Wuhan University, Songqiang Chen The Hong Kong University of Science and Technology, Haoyu Peng Wuhan University, Xiaoyuan Xie Wuhan University | ||
16:00 - 17:30 | |||
16:00 15mFull-paper | Explainable Software Engineering: From State of the Practice to State of the Art Early Research Achievements (ERA) Zheng Li Queen's University Belfast, UK, Maria Angela Ferrario Queen's University Belfast, Ben Crossey Queen's University Belfast, Austen Rainer Queen's University Belfast | ||
16:15 15mFull-paper | Function-level Optimization Automatic Tuner for Numerical Programs Early Research Achievements (ERA) Xinni Liu National University of Defense Technology, College of Computer Science and Technology, Xinpeng Li National University of Defense Technology, College of Computer Science and Technology, Guangping Yu National University of Defense Technology, College of Computer Science and Technology, Hengbiao Yu , Xin Yi National University of Defense Technology, Chun Huang National University of Defense Technology | ||
16:30 15mFull-paper | How Far Have LLMs Come Toward Automated SATD Taxonomy Construction? Early Research Achievements (ERA) Sota Nakashima Kyushu University, Yuta Ishimoto Kyushu University, Masanari Kondo Kyushu University, Tao Xiao Kyushu University, Yasutaka Kamei Kyushu University | ||
16:45 15mFull-paper | MAJD: Intent-Aware Multi-Agent Framework for Jailbreak Defense Early Research Achievements (ERA) Jigang Xie China Unicom Western Innovation Institute, Zhengfan Wang Xi'an Jiaotong University, Junchao He China Unicom Western Innovation Institute, Wenjing Jiao Xi'an Jiaotong University, Pengfei Dang China Unicom Western Innovation Institute, Yadong Zhou Lanzhou Jiaotong University, Wei Zhang China Unicom Western Innovation Institute, Ming Fan Xi'an Jiaotong University | ||
17:00 15mFull-paper | Resilient Auto-Scaling of Microservice Architectures with Efficient Resource Management Early Research Achievements (ERA) Hussain Ahmad University of Adelaide, Christoph Treude Singapore Management University, Markus Wagner Monash University, Australia, Claudia Szabo The University of Adelaide | ||
17:15 15mFull-paper | Towards Function-Level Correctness Assessment of System Software with LLMs: A Case Study Early Research Achievements (ERA) | ||
Thu 4 DecDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
09:00 - 10:00 | |||
09:00 60mKeynote | Keynote 3: Software Supply Chain Security of Web3 Keynotes Martin Monperrus KTH Royal Institute of Technology | ||
10:30 - 12:10 | |||
10:30 20mFull-paper | BDafny: A Formal Execution and Verification Framework of the BPMN 2.0 in Dafny Technical Track Ziqing Su East China Normal University, Sini Chen , Ran Li East China Normal University, Huibiao Zhu , Jiapeng Wang East China Normal University | ||
10:50 20mFull-paper | MicroRacer: Detecting Concurrency Bugs for Cloud Service Systems Technical Track Zhiling Deng School of Software Engineering, Sun Yat-sen University, Zhuangbin Chen Sun Yat-sen University, Juepeng Wang School of Software Engineering, Sun Yat-sen University | ||
11:10 20mFull-paper | MUATC: Multi-Agent Utilization to Augment Test Coverage Technical Track Tiecheng Ma College of Computer Science and Technology, National University of Defense Technology, Sirui Liu , Jiaxin Liu National University of Defense Technology, Yating Zhang National University of Defense Technology, Wei Dong National University of Defense Technology | ||
11:30 20mFull-paper | PyReach: A Multi-Agent Framework for Vulnerability Reachability Analysis in Python Technical Track Yueqin Wang Institute of Software Chinese Academy of Sciences, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Xiang Ling Institute of Software, Chinese Academy of Sciences, Tianyue Luo , Xu Wang Institute of Software, Chinese Academy of Sciences | ||
11:50 20mFull-paper | Recovering Variable Names in The Decompiled Code Based on Multi-Task Learning Technical Track Jiayi Li Nanjing University of Aeronautics and Astronautics, Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, Jian He Shanghai Aerospace Electronic Technology Institute, Jingjing Gu Nanjing University of Aeronautics and Astronautics, Weiqin Zou Nanjing University of Aeronautics and Astronautics | ||
10:30 - 11:50 | |||
10:30 20mFull-paper | BEGA:A Binary Code Embedding Method Based on Gravity-Model Augmentation Graph Contrastive Learning Technical Track Zhenglin Li Northeastern University, Dongqi Wang Northeastern University, Shuyue Zhang Northeastern University, Ruiguo Hu , Dongming Chen Northeastern University | ||
10:50 20mFull-paper | Conanj: Confidential Data Analysis for Confidential Computing of Java Programs Technical Track Xinyuan Miao Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University, Ziyi Lin Alibaba Group | ||
11:10 20mFull-paper | Empirical assessment of the perception of graphical threat model acceptability Technical Track | ||
11:30 20mFull-paper | Smart Contract Vulnerability Detection Based on Residual Dilated Convolution with Multi-Head Attention Technical Track Ruoxin Bai , Meng Wang Hebei university, Wanqing Liu Hebei Key Laboratory of High Trusted Information System, Hebei University, Liang Wang Hebei University | ||
10:30 - 12:00 | |||
10:30 15mFull-paper | Feature-based Transfer Learning in Cross-Project Defect Prediction: A Systematic Review Early Research Achievements (ERA) Wang Yunpeng , Dongcheng Li California State Polytechnic University, Man Zhao China University of Geosciences(Wuhan), W. Eric Wong University of Texas at Dallas | ||
10:45 15mFull-paper | KG-Code: A Knowledge Graph Guided Pre-Training Approach for Code Representation Early Research Achievements (ERA) | ||
11:00 15mFull-paper | MSWT: Multi-Scale Wavelet Transformer for Dynamic Feature-Based Student Program Error Identification Early Research Achievements (ERA) Lingzhong Yu , Qing Zhou College of Computer, Chongqing University, Subo Zhao College of Computer, Chongqing University, Siyuan Wang Chongqing University, China | ||
11:15 15mFull-paper | Multi-Dimensional Metamorphic Testing of Terminology in Machine Translation Early Research Achievements (ERA) | ||
11:30 15mFull-paper | Natural Language Explanation in Code Clone Detection using LLM-based Post Hoc Explainer Early Research Achievements (ERA) Teeradaj Racharak Tohoku University, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Chayanee Junplong Mahidol University, Akara Supratak University College London | ||
11:45 15mFull-paper | Practices and Challenges of Using DeepSeek in SE: An Empirical Study Early Research Achievements (ERA) | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | caSPESC2Vyper: Conformant and Automatic Generation from DeFi SPESC Legal Contract to Vyper Smart Contract Technical Track Yue Yu South-Central Minzu University, Jiahui Wang South-Central Minzu University, Bo Meng South-Central Minzu University, Dejun Wang South-Central Minzu University | ||
14:20 20mFull-paper | FixConsult: Leveraging External Defect Knowledge Driven Natural Language Suggestions Generation for Software Vulnerability Repair Technical Track Gang Hu School of Information Science & Engineering, Yunnan University, LinHui Geng School of Information Science&Engineering, Yunnan University, JiaYao Jin School of Information Science&Engineering, Yunnan University, Xiaoshu Sun School of Information Science&Engineering, Yunnan University, Min Peng | ||
14:40 20mFull-paper | Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks against Binary Code Similarity Detection Technical Track Ran Wei Key Laboratory of Cyberspace Security, Hui Shu , Fei Kang Key Laboratory of Cyberspace Security, Ministry of Education Zhengzhou China, Yuyao Huang Key Laboratory of Cyberspace Security, Ministry of Education Zhengzhou China | ||
15:00 20mFull-paper | Software Defect Prediction Based on Temporal Hypergraph Neural Network Technical Track Peng He Hubei University, Shuai Hu Hubei university, Ju Ma Wuhan university, Haoqing Yang Hubei university, Yifan Wang Hubei university | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | A First Look at Privacy Risks of Android Task-executable Voice Assistant Applications Technical Track Shidong Pan Columbia University & New York University, Yikai Ge Washington University in St. Louis, xiaoyu sun The Australian National University | ||
14:20 20mFull-paper | Latent Search-Based Boundary Aware Fairness Testing for Deployed Deep Models Technical Track Qingyuan Sun , Wentian Zhao Beijing Institute of Technology, Tian Song Beijing Institute of Technology | ||
14:40 20mFull-paper | Lightweight Attention-based Temporal Modeling of Key Facial Features for Driver Fatigue Detection in Intelligent Driver Monitoring Systems Technical Track BaiLing Song Wuhan University of Technology, Lanhao Qin Huazhong University of Science and Technology, Wenhua Hu , Jianwen Xiang , Rui Hao Wuhan University of Technology | ||
15:00 20mFull-paper | Seed-Adapted Cross-State Protocol Fuzzing Technical Track DingchengLi , Shihao Zhu Institute of Software, Chinese Academy of Sciences, Yan Cai Institute of Software at Chinese Academy of Sciences, Long Zhang Institute of Software, Chinese Academy of Sciences; Inspur Cloud Information Technology Co.,Ltd. | ||
14:00 - 15:30 | |||
14:00 15mFull-paper | A Software Architecture Resilience Assessment Method via Dynamic Bayesian Networks Early Research Achievements (ERA) Hao Chen Southeast University, Bixin Li Southeast University, Chunguang Zhang Southeast University, Zixuan Liu Southeast University | ||
14:15 15mFull-paper | Automating Requirements Modelling with LLMs: An Iterative Contrastive Optimisation Approach Early Research Achievements (ERA) Chenxi Lv Southwest University, Shmuel Tyszberowicz , Zhiming Liu Southwest University, Bo Liu Southwest University | ||
14:30 15mFull-paper | BlockAlign: Fair Performance Testing for Blockchains based on Configuration Alignment Early Research Achievements (ERA) Jing shi , Chenglin Xie Peking University, Jianbo Gao Peking University, Peilun Li Shanghai Tree-Graph Blockchain Research Institute, Guoli Yang Advanced Institute of Big Data, Xiaoying Bai Advanced Institute of Big Data | ||
14:45 15mFull-paper | QEC-LLM: Training Query-focused Extractive Compression Model with LLM-guiding for Open Domain QA Early Research Achievements (ERA) Sijia Wang North China University of Technology, Jy Duan , Xin Li , Haoguang Wen , Yizhuo Zhang Hebei University of Engineering, Chunming Liu , Zibo Yi | ||
15:00 15mFull-paper | Cross-Project Defect Prediction Based on Feature Fusion and Local Domain Adaptation Early Research Achievements (ERA) Xianglu Zhou , Xiaoyan Zhu School of Computer Science and Technology, Xi’ an Jiaotong University, Shaan Xi, China, Yu Wang , Jiayin Wang Xi'an Jiaotong University, Xin Lai School of Computer Science and Technology, Xi’ an Jiaotong University, Shaan Xi, China | ||
15:15 15mFull-paper | Towards Engineering Multi-Agent LLMs: A Protocol-Driven Approach Early Research Achievements (ERA) Zhenyu Mao City University of Hong Kong, Jacky Keung City University of Hong Kong, Fengji Zhang , Shuo Liu City University of Hong Kong, Yifei Wang City University of Hong Kong, Jialong Li Waseda University, Japan | ||
16:00 - 17:20 | |||
16:00 20mFull-paper | GATUNER:Genetic Algorithm Applied to Floating-Point Precision Tuning Technical Track zjn_hpc , Jinchen Xu Information Engineering University, Hongru Yang Hunan University, Changsha, China, Tao Zhang Information Engineering University, Shuai Wang Information Engineering University, Bei Zhou Information Engineering University | ||
16:20 20mFull-paper | What You See Is Not Always What You Get: Evaluating GPT's Comprehension of Source Code Technical Track | ||
16:40 20mFull-paper | Where Is Self-admitted Code Generated by Large Language Models on GitHub? Technical Track | ||
17:00 20mFull-paper | SMTPRT:Performance Regression Testing and Localization for SMT Solvers Across Multiple Logics Technical Track Ziyang Wang Tianjin University, Xiaohong Li Tianjin University, Lili Quan Tianjin University, Yao Zhang Tianjin University, Ruitao Feng Southern Cross University, Zhiping Zhou | ||
16:00 - 17:20 | |||
16:00 20mFull-paper | An empirical comparison of data transformation techniques for clustering-based unsupervised software defect prediction Technical Track Zhengxiang Chen Shaanxi Normal University, Zhiqiang Li , Hongyu Zhang Chongqing University, Jie Ren Shaanxi Normal University, Feng Tian Shaanxi Normal University | ||
16:20 20mFull-paper | Cobweb: Enhanced Generation Diversity for Black-box Fairness Testing Technical Track Yingqian Guo , Wentian Zhao Beijing Institute of Technology, Tian Song Beijing Institute of Technology | ||
16:40 20mFull-paper | Mock Clones in the Wild: An Empirical Investigation Across Six Open-Source Projects Technical Track Gengwu Zhao , Lu Xiao Stevens Institute of Technology, Hanbin Qin Stevens Institute of Technology, Eman Abdullah AlOmar Stevens Institute of Technology, USA, Sunny Wong Envestnet | ||
17:00 20mFull-paper | TraceWalker: Synthesizing Interactive Debugging Progresses via Data- and Control-flow Exploration Technical Track Yunrui Pei Shanghai Jiao Tong University, Yuk Kwan Wong Hong Kong University of Science and Technology, Chenyang Zhang Shanghai Jiao Tong University, Hongshu Wang National University of Singapore, Wenjie Zhang National University of Singapore, Yun Lin Shanghai Jiao Tong University | ||
16:00 - 17:00 | |||
16:00 15mFull-paper | CSMS: Boosting Class Code Summarization via Transformer Refinement and Method Summary Fusion Early Research Achievements (ERA) Feiqiao Mao , Xingyang Du Shenzhen University, Shaocheng Feng Shenzhen University, Jiafeng Guo Shenzhen University, Yifan Bai Shenzhen University | ||
16:15 15mFull-paper | Retrieval-Augmented Code Generation of Low-Resource Programming Languages Early Research Achievements (ERA) Jianbo Lin Nanjing University, Yuan Zhang Nanjing University, Chuanyi Li Nanjing University, Wentao Zou , Jidong Ge Nanjing University, Bin Luo Nanjing University | ||
16:30 15mFull-paper | TriGraSum: A Tri-level Graph-based Architecture for Source Code Summarization Early Research Achievements (ERA) Ruiguo Hu , Dongqi Wang Northeastern University, Mingzhao Xie Software College, Northeastern University, Zhenglin Li Northeastern University, Dongming Chen Northeastern University | ||
16:45 15mFull-paper | Unified Modelling and Consistency Verification of UML Multi-View Models Using Alloy Early Research Achievements (ERA) Yihui Guo Southwest University, Shmuel Tyszberowicz , Zhiming Liu Southwest University, Bo Liu Southwest University | ||
Fri 5 DecDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
11:00 - 12:20 | |||
11:00 20mFull-paper | Chart2Code-MoLA: Efficient Multi-Modal Code Generation via Adaptive Expert Routing Technical Track Yifei Wang City University of Hong Kong, Jacky Keung City University of Hong Kong, Zhenyu Mao City University of Hong Kong, Jingyu Zhang City University of Hong Kong, CAO YUCHEN | ||
11:20 20mFull-paper | LLM-Based Semantic Modeling and Cooperative Evolutionary Fuzzing for Traffic Violation Scenario Generation Technical Track Liu Yangyang , Xinyu Li Hohai University, Yan Xiao Sun Yat-sen University, Miao Zhang Shenzhen Technology University, Pengcheng Zhang Hohai University | ||
11:40 20mFull-paper | Multi-agent Assisted Automatic Test Generation for Java JSON Libraries Technical Track Sinan Wang Southern University of Science and Technology, Zhiyuan Zhong The University of Utah, Shaojin Wen Alibaba Inc, Yepang Liu Southern University of Science and Technology | ||
12:00 20mFull-paper | Breaking the Curse of High-Dimensionality: A Transformer-Based Approach to Software Configuration Performance Prediction Technical Track ZhengyuePan , Mingjie Tu Hangzhou Dianzi University, Shijie Li China Southern Power Grid Company Limited, Dandan Wang Institute of Software, Chinese Academy of Sciences, Jie Chen Hangzhou Dianzi University | ||
11:00 - 12:20 | |||
11:00 20mFull-paper | A Multi-Model Hybrid Framework Leveraging Query Expansion without Fine-Tuning for Zero-Shot Cross-Domain Code Search Technical Track Gang Hu School of Information Science & Engineering, Yunnan University, JiaYao Jin School of Information Science&Engineering, Yunnan University, Fan Su School of Information Science&Engineering, Yunnan University, LinHui Geng School of Information Science&Engineering, Yunnan University, Fei Yang , Min Peng | ||
11:20 20mFull-paper | How Do Developers Use ChatGPT for Software Test Generation? Usage Patterns, Satisfaction, and Code Adoption Analysis Technical Track Sicheng He Wuhan University, Wanwei Zhan Wuhan University of Technology, Jijun Wang Wuhan University of Technology, Junjie Dai Zhejiang University, Haoxuan Chen Wuhan University of Technology, Cheng Tan Wuhan University of Technology, Fuyang Li Wuhan University of Technology | ||
11:40 20mFull-paper | Optimizing Type Duplication in WebAssembly Module Splitting Technical Track | ||
12:00 20mFull-paper | Practical Lossless Recompression of JPEG Images Using Transform Domain Prediction Technical Track Long Chen Engineering Research Center of Transportation Information and Safety, ERCTIS, MoE of China. School of Computer Science and Artificial Intelligence, Wuhan University of Technology, Wenhua Hu , Rui Hao Wuhan University of Technology, Junwei Zhou , Jianwen Xiang | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | A Packing-Insensitive Detection Method for Android Malware Based on Image Representation Technical Track Siyuan Ma , Shihao Zhu State Key Laboratory of Computer Science,Institute of Software,Chinese Academy of Sciences,China, Yan Cai Institute of Software at Chinese Academy of Sciences, Long Zhang Institute of Software, Chinese Academy of Sciences; Inspur Cloud Information Technology Co.,Ltd. | ||
14:20 20mFull-paper | Enhancing Diffusion-Driven Test Input Generation using Large Language Model Technical Track | ||
14:40 20mFull-paper | HGTRTracer: Advancing Requirements-Code Traceability with LLM-Augmented Attribution Reasoning and Heterogeneous Graph Transformer Technical Track Huan Jin School of Computer Science and Artificial Intelligence, Wuhan Textile University, Yingkai Yuan School of Computer Science and Artificial Intelligence, Wuhan Textile University, Bangchao Wang Wuhan Textile University, Hongyan Wan School of Computer Science and Artificial Intelligence, Wuhan Textile University, Zhiyuan Zou The School of Computer Science and Artificial Intelligence, Wuhan Textile University, Wuhan, China | ||
15:00 20mFull-paper | Multi-Stage Generation of Rust Unit Tests with LLMs Technical Track Yongqian Chen Zhejiang University, Junwei Zhang Zhejiang University, Xing Hu Zhejiang University, Xin Xia Zhejiang University | ||
14:00 - 15:20 | |||
14:00 20mFull-paper | A Soft Prompt-Enhanced Device Knowledge Extraction Method for Embedded System Requirements Elicitation Technical Track Shengxin Zhao Inner Mongolia Normal University, Chunhui Wang , Zhiguo Liu Inner Mongolia Normal University, Tong Li Beijing University of Technology, Ye Zhai College of Computer Science and Technology,Inner Mongolia Normal University | ||
14:20 20mFull-paper | Edge4RE: A Novel Edge-Cloud Collaborative Framework for Privacy-Preserving Automated Requirements Documentation Technical Track Ben Cheng School of Information Technology, Deakin University, Yi Wang School of Information Technology, Deakin University, Oscar Wu School of Information Technology, Deakin University, Chetan Arora Monash University, Thuong Hoang School of Information Technology, Deakin University, Xiao Liu School of Information Technology, Deakin University | ||
14:40 20mFull-paper | MSPM: A Multi-Strategy Prompting Method for Goal-Oriented Modeling from User Stories Technical Track Yi Wang Inner Mongolia Normal University, Chunhui Wang , Ye Zhai College of Computer Science and Technology,Inner Mongolia Normal University, Tong Li Beijing University of Technology, Zhiguo Liu College of Computer Science and Technology,Inner Mongolia Normal University | ||
15:00 20mFull-paper | PerProb: Indirectly Evaluating Memorization in Large Language Models Technical Track Yihan Liao City University of Hong Kong, Jacky Keung City University of Hong Kong, Xiaoxue Ma Hong Kong Metropolitan University, Jingyu Zhang City University of Hong Kong, Yicheng Sun City University of Hong Kong | ||
15:30 - 16:00 | |||
15:30 30mDay closing | Closing Ceremony Technical Track | ||
Unscheduled Events
| Not scheduled Coffee break | Coffee Break Software Engineering in Practices (SEIP) |
Accepted Papers
| Title | |
|---|---|
| A Catalog of Participatory Reuse Challenges, Solutions, and Lessons Learned Software Engineering in Practices (SEIP) | |
| Constructing and Evaluating Domain-Specific Synthetic QA Datasets for Airborne Software Engineering: An LLM-Based Framework in Practice Software Engineering in Practices (SEIP) | |
| It Only Gets Worse: Revisiting DL-Based Vulnerability Detectors from a Practical Perspective Software Engineering in Practices (SEIP) | |
| LogExpertSolver: A Multi-Agent Framework for Domain-Specialized Log Parsing Software Engineering in Practices (SEIP) | |
| Towards Data-Driven Real-Time Performance Monitoring of Platform Ecosystems Software Engineering in Practices (SEIP) | |
| Virtualization-based Penetration Testing Study for Detecting Accessibility Abuse Vulnerabilities in Banking Apps in East and Southeast Asia Software Engineering in Practices (SEIP) |
Call for Papers: Software Engineering in Practice Track
The purpose of SEIP (Software Engineering in Practice) track offers a unique opportunity for practitioners from industry and academia to share their valuable experiences, insights, pragmatic research issues and best practices in the software engineering community. As part of the APSEC 2025 conference, the SEIP Track aims to foster collaboration and mutual learning between these two vital sectors. We welcome submissions from industrial practitioners and academic researchers that align with the general topics outlined in the technical research track, as well as emerging technical topics such as AI, mobile systems, safety, autonomous systems and SoS (System of Systems).
Topics of Interest
The major topics of SEIP 2025 include the following, but are not limited to:
- Verification and validation of machine learning systems
- Software engineering in mobile systems such as Android, iOS, and OpenHarmony, etc.
- Software engineering in cyber-physical systems, such as SoS and autonomous vehicles
- Software safety in traditional software and intelligent software
- Generative AI and software engineering
- Emerging methodology in software engineering
- Difficulties, issues, and challenges from SE in practice
- Introduction of new standards in SE
- Best practices in traditional software engineering
Evaluation Criteria
Each submission will be meticulously reviewed by a minimum of three members of the SEIP Program Committee. The evaluation process will consider industry relevance, originality, soundness, empirical and/or practical validation, as well as the quality and coherence of the presentation. Please note that, unlike the technical research track, the SEIP track does NOT require double-anonymous reviews.
Submission Guideline
Submitted papers must have been neither previously accepted for publication nor concurrently submitted for review in another journal, book, conference, or workshop.
All submissions must be in English and must come in A4 paper size PDF format and conform, at the time of submission, to the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt font, LaTeX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf option). Also, papers must comply with the IEEE Policy on Authorship. Submissions must be submitted electronically in PDF before the due date via HotCRP.
An SEIP paper must not exceed 10 pages for the main text, including appendices, figures, tables, and references (short papers around 5 pages are also welcome). The Chairs reserve the right to reject submissions (without reviews) that are not in compliance or out of scope for the conference.
Important Dates
- Submission Deadline: 7 Aug 2025
- Author Notification: 26 Sep 2025
- Camera Ready Deadline: 23 Oct 2025
Submission Link
Papers must be submitted through HotCRP:
https://apsec25-seip.hotcrp.com
Accepted Papers and Attendance Expectation
All accepted papers will be submitted to the CS Digital Library as the APSEC 2025 conference proceedings. If a submission is accepted, at least one author of the paper is required to register for and attend the conference to present the paper. The presentation is expected to be delivered in person, unless this is impossible due to travel restrictions (related to, e.g., health, visa, etc.). If an accepted paper is not presented, the paper is removed from the proceedings.
Contacts
For more information, please contact the APSEC SEIP 2025 Co-Chairs:
- Xiaoning Du, Monash University, xiaoning.du@monash.edu
- Li Li, Beihang University, lilicoding@ieee.org