Submissions from 2024
Escaping saddle points in heterogeneous federated learning via distributed SGD with communication compression, Sijin CHEN, Zhize LI, and Yuejie CHI Conference Proceeding Article
Evaluation of Orca 2 against other LLMs for Retrieval Augmented Generation, Donghao HUANG and Zhaoxia WANG Conference Proceeding Article
Explaining sequences of actions in multi-agent deep reinforcement learning models, Phyo Wai KHAING, Minghong GENG, Shubham PATERIA, Budhitama SUBAGDJA, and Ah-hwee TAN Conference Proceeding Article
Exploring diffusion time-steps for unsupervised representation learning, Zhongqi YUE, Jiankun WANG, Qianru SUN, Lei JI, Eric I-Chao CHANG, and Hanwang ZHANG Conference Proceeding Article
Flipped classroom for linear algebra at undergraduate level, M. THULASIDAS Conference Proceeding Article
From Tweets to token sales: Assessing ICO success through social media sentiments, Donghao HUANG, S. SAMUEL, Quoc Toan HUYNH, and Zhaoxia WANG Conference Proceeding Article
Grasper: A generalist pursuer for pursuit-evasion problems, Pengdeng LI, Shuxin LI, Xinrun WANG, Jakub CERNY, Youzhi ZHANG, Stephen McAleer, Hau CHAN, and Bo AN Conference Proceeding Article
Intriguing properties of data attribution on diffusion models, Xiaosen ZHENG, Tianyu PANG, Chao DU, Jing JIANG, and Min LIN Conference Proceeding Article
Knowledge enhanced multi-intent transformer network for recommendation, Ding ZOU, Wei WEI, Feida ZHU, Chuanyu XU, Tao ZHANG, and Chengfu HUO Conference Proceeding Article
Large language model powered agents in the web, Yang DENG, An ZHANG, Yankai LIN, Xu CHEN, Ji-Rong WEN, and Tat-Seng CHUA Conference Proceeding Article
Large language models for qualitative research in software engineering: exploring opportunities and challenges, Muneera BANO, Rashina HODA, Didar ZOWGHI, and Christoph TREUDE Journal Article
Learning adversarial semantic embeddings for zero-shot recognition in open worlds, Tianqi LI, Guansong PANG, Xiao BAI, Jin ZHENG, Lei ZHOU, and Xin NING Journal Article
Learning multi-faceted prototypical user interests, Nhu Thuat TRAN and Hady W. LAUW Conference Proceeding Article
Learning nighttime semantic segmentation the hard way, Wenxi LIU, Jiaxin CAI, Qi LI, Chenyang LIAO, Jingjing CAO, Shengfeng HE, and Yuanlong YU Journal Article
Make revocation cheaper: Hardware-based revocable attribute-based encryption, Xiaoguo LI, Guomin YANG, Tao XIANG, Shengmin XU, Bowen ZHAO, Robert H. DENG, and Hwee Hwa PANG Conference Proceeding Article
MultiGPrompt for multi-task pre-training and prompting on graphs, Xingtong YU, Chang ZHOU, Yuan FANG, and Xinming ZHAN Conference Proceeding Article
Navigating real-world challenges: A quadruped robot guiding system for visually impaired people in diverse environments, Shaojun CAI, Ashwin RAM, Zhengtai GOU, Mohd Alqama Wasim SHAIKH, Yu-An CHEN, Yingjia WAN, Kotaro HARA, Shengdong ZHAO, and David HSU Conference Proceeding Article
Non-vacuous generalization bounds for adversarial risk in stochastic neural networks, Mustafa WALEED, Liznerski PHILIPP, Antoine LEDENT, Wagner DENNIS, Wang PUYU, and Kloft MARIUS Conference Proceeding Article
On the feasibility of Simple Transformer for dynamic graph modeling, Yuxia WU, Yuan FANG, and Lizi LIAO Conference Proceeding Article
Plug-and-play policy planner for large language model powered dialogue agents, Yang DENG, Wenxuan ZHANG, Wai LAM, See-Kiong NG, and Tat-Seng CHUA Conference Proceeding Article
Q-Learning based framework for solving the stochastic E-waste collection problem, Dang Viet Anh NGUYEN, Aldy GUNAWAN, Mustafa MISIR, and Pieter VANSTEENWEGEN Conference Proceeding Article
Quantum machine learning for credit scoring, Nikolaos SCHETAKIS, Davit AGHAMALYAN, Micheael BOGUSLAVSKY, Agnieszka REES, Marc RAKOTOMALALA, and Paul Robert GRIFFIN Journal Article
Regret-based defense in adversarial reinforcement learning, Roman BELAIRE, Pradeep VARAKANTHAM, Thanh Hong NGUYEN, and David LO Conference Proceeding Article
Reinforcement learning with maskable stock representation for portfolio management in customizable stock pools, Wentao ZHANG, Yilei ZHAO, Shuo SUN, Jie YING, Yonggang XIE, Zitao SONG, Xinrun WANG, and Bo AN Conference Proceeding Article
Reinforcement Nash Equilibrium Solver, Xinrun WANG, Chang YANG, Shuxin LI, Pengdeng LI, Xiao HUANG, Hau CHAN, and Bo AN Conference Proceeding Article
Scaling up cooperative multi-agent reinforcement learning systems, Minghong GENG Conference Proceeding Article
Social balance on networks: Local minima and best-edge dynamics, Krishnendu CHATTERJEE, Jakub SVOBODA, Dorde ZIKELIC, Andreas PAVLOGIANNIS, and Josef TKADLEC Journal Article
SwapVid: Integrating video viewing and document exploration with direct manipulation, Taichi MURAKAMI, Kazuyuki FUJITA, Kotaro HARA, Kazuki TAKASHIMA, and Yoshifumi KITAMURA Conference Proceeding Article
The Grader: A grading assistant for lab tests and a teaching tool, M. THULASIDAS and David LO Conference Proceeding Article
The impact of avatar completeness on embodiment and the detectability of hand redirection in virtual reality, Martin FEICK, Andre ZENNER, Simon SEIBERT, Anthony TANG, and Antonio Krüger Conference Proceeding Article
Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud, Yinbin MIAO; Feng LI; Xinghua LI; Zhiquan LIU; Jianting NING; Hongwei LI; Kim-Kwang Raymond CHOO; and DENG, Robert H. Journal Article
uBlade: efficient batch processing for uncertainty graph queries, Siyuan YAO, Yuchen LI, Shixuan SUN, Jiaxin JIANG, and Bingsheng HE Conference Proceeding Article
Unraveling the ‘anomaly’ in time series anomaly detection: A self-supervised tri-domain solution, Yuting SUN, Guansong PANG, Guanhua YE, Tong CHEN, Xia HU, and Hongzhi YIN Conference Proceeding Article
Unveiling code pre-trained models: Investigating syntax and semantics capacities, Wei MA, Shangqing LIU, Mengjie ZHAO, Xiaofei XIE, Wenhang WANG, Qiang HU, Jie ZHANG, and Liu YANG Journal Article
VAID: Indexing view designs in visual analytics system, Lu YING, Aoyu WU, Haotian LI, Zikun DENG, Ji LAN, Jiang WU, Yong WANG, Huamin QU, Dazhen DENG, and Yingcai WU Conference Proceeding Article
FAIR: Flow type-aware pre-training of compiler intermediate representations, Changan NIU, Chuanyi LI, Vincent NG, David LO, and Bin LUO Conference Proceeding Article
Towards benchmarking the coverage of automated testing tools in Android against manual testing, Ferdian THUNG, Ivana Clairine IRSAN, Jiakun LIU, and David LO Conference Proceeding Article
Modeling route representation with mixed-scale hierarchical transformer, Hanyuan ZHANG, Yuqi CHEN, Xinyu ZHANG, Qize JIANG, Liang LI, Baihua ZHENG, and Weiwei SUN Conference Proceeding Article
Trajectory set empowered hypergraph transformer for mobile sensor based traffic prediction, Hanyuan ZHANG, Xinyu \ZHANG, Qize JIANG, Liang LI, Baihua ZHENG, and Weiwei SUN Conference Proceeding Article
FlGan: GAN-based unbiased federated learning under non-IID settings, Zhuoran MA, Yang LIU, Yinbin MIAO, Guowen XU, Ximeng LIU, Jianfeng MA, and Robert H. DENG Journal Article
ACAV: A framework for automatic causality analysis in autonomous vehicle accident recordings, Huijia SUN, Christopher M. POSKITT, Yang SUN, Jun SUN, and Yuqi CHEN Conference Proceeding Article
Assessing AI detectors in identifying AI-generated code: Implications for education, Wei Hung PAN, Ming Jie CHOK, Jonathan Leong Shan WONG, Yung Xin SHIN, Yeong Shian POON, Zhou YANG, Chun Yong CHONG, David LO, and Mei Kuan LIM Conference Proceeding Article
Beyond a joke: Dead Code Elimination can delete live code, Haoxin TU, Lingxiao JIANG, Debin GAO, and He JIANG Conference Proceeding Article
Bidirectional paper-repository tracing in software engineering, Daniel GARIJO, Miguel ARROYO, Esteban GONZÁLEZ GUARDIA, Christoph TREUDE, and Nicola TAROCCO Conference Proceeding Article
Classifying source code: How far can compressor-based classifiers go?, Zhou YANG Conference Proceeding Article
Coca: Improving and explaining graph neural network-based vulnerability detection systems, Sicong CAO, Xiaobing SUN, Xiaoxue WU, David LO, Lili BO, Bin LI, and Wei LIU Conference Proceeding Article
Code search is all you need? Improving code suggestions with code search, Junkai CHEN, Xing HU, Zhenhao LI, Cuiyun GAO, Xin XIA, and David LO Conference Proceeding Article
Context-Aware REpresentation: Jointly learning item features and selection from triplets, Rodrigo ALVES and Antoine LEDENT Journal Article
Creative and correct: Requesting diverse code solutions from AI, Scott BLYTH, Markus WAGNER, and Christoph TREUDE Conference Proceeding Article
Curiosity-driven testing for sequential decision-making process, Junda HE, Zhou YANG, Jieke SHI, Chengran YANG, Kisub KIM, Bowen XU, Xin ZHOU, and David LO Conference Proceeding Article
Deep reinforcement learning for dynamic algorithm selection: A proof-of-principle study on differential evolution, Hongshu GUO, Yining MA, Zeyuan MA, Jiacheng CHEN, Xinglin ZHANG, Zhiguang CAO, Jun ZHANG, and Yue-Jiao GONG Journal Article
DronLomaly: Runtime log-based anomaly detector for DJI drones, Wei MINN, Naing Tun YAN, Lwin Khin SHAR, and Lingxiao JIANG Conference Proceeding Article
Editorial: Emerging on-demand passenger and logistics systems: Modelling, optimization, and data analytics, Jintao KE, Hai WANG, Neda MASOUD, Maximilian SCHIFFER, and Goncalo H. A. CORREIA Editorial
Encoding version history context for better code representation, Huy NGUYEN, Christoph TREUDE, and Patanamon THONGTANUNAM Conference Proceeding Article
Enhancing source code representations for deep learning with static analysis, Xueting GUAN and Christoph TREUDE Conference Proceeding Article
Environmental, social, and governance (ESG) and artificial intelligence in finance: State-of-the-art and research takeaways, Tristan LIM Journal Article
Experience Report: Identifying common misconceptions and errors of novice programmers with ChatGPT, Hua Leong FWA Conference Proceeding Article
Exploiting library vulnerability via migration-based automated test generation, Zirui CHEN, Xing HU, Xin XIA, Yi GAO, Tongtong XU, David LO, and Xiaohu YANG Conference Proceeding Article
Exploring the potential of ChatGPT in automated code refinement: An empirical study, Qi GUO, Shangqing LIU, Junming CAO, Xiaohong LI, Xin PENG, Xiaofei XIE, and Bihuan CHEN Conference Proceeding Article
Exploring the potential of ChatGPT in automated code refinement: An empirical study, Guo QI, Junming CAO, Xiaofei XIE, Shangqing LIU, Xiaohong LI, Bihuan CHEN, and Xin PENG Conference Proceeding Article
Extracting relevant test inputs from bug reports for automatic test case generation, Wendkuuni C. Ouédraogo, Laura Plein, Kader Kaboré, Andrew Habib, Jacques Klein, David LO, and Tegawende F. Bissyandé Conference Proceeding Article
FlGan: GAN-based unbiased federated learning under non-IID settings, Zhuoran MA, Yang LIU, Yinbin MIAO, Guowen XU, Ximeng LIU, Jianfeng MA, and Robert H. DENG Journal Article
GitHubInclusifier: Finding and fixing non-inclusive language in GitHub repositories, Liam TODD, John GRUNDY, and Christoph TREUDE Conference Proceeding Article
Going viral: Case studies on the impact of protestware, Youmei FAN, Dong WANG, Supastsara WATTANAKRIENGKRAI, Hathaichanok DAMRONGSIRI, Christoph TREUDE, Hideaki HATA, and Raula Gaikovina KULA Conference Proceeding Article
Greening large language models of code, Jieke SHI, Zhou YANG, Hong Jin KANG, Bowen XU, Junda HE, and David LO Conference Proceeding Article
Impact of government outsourcing contracts on high-tech vendors: An empirical study, Yi DONG, Nan HU, Yonghua JI, Chenkai NI, and Jing XIE Journal Article
Improving automated code reviews: Learning from experience, Hong Yi LIN, Patanamon THONGTANUNAM, Christoph TREUDE, and Wachiraphan CHAROENWET Conference Proceeding Article
Large language model for vulnerability detection: Emerging results and future directions, Xin ZHOU, Ting ZHANG, and David LO Conference Proceeding Article
Marco: A stochastic asynchronous concolic explorer, Jie HU, Yue DUAN, and Heng YIN Conference Proceeding Article
MiniMon: Minimizing Android applications with intelligent monitoring-based debloating, Jiakun LIU, Zicheng ZHANG, Xing HU, Thung Ferdian, Shahar MAOZ, Debin GAO, Eran TOCH, Zhipeng ZHAO, and David LO Conference Proceeding Article
MUT: Human-in-the-loop unit test migration, Yi GAO, Xing HU, Tongtong XU, Xin XIA, David LO, and Xiaohu YANG Conference Proceeding Article
My GitHub Sponsors profile is live!": Investigating the impact of Twitter/X mentions on GitHub Sponsors, Youmei FAN, Tao XIAO, Hideaki HATA, Christoph TREUDE, and Kenichi MATSUMOTO Conference Proceeding Article
Out of sight, out of mind: Better automatic vulnerability repair by broadening input ranges and sources, Xin ZHOU, Kisub KIM, Bowen XU, DongGyun HAN, and David LO Conference Proceeding Article
PPT4J: Patch presence test for Java binaries, Zhiyuan PAN, Xing HU, Xin XIA, Xian ZHAN, David LO, and Xiaohu YANG Conference Proceeding Article
PS3: Precise patch presence test based on semantic symbolic signature, Qi ZHAN, Xing HU, Zhiyang LI, Xin XIA, David LO, and Shanping LI Conference Proceeding Article
REDriver: Runtime enforcement for autonomous vehicles, Yang SUN, Christopher M. POSKITT, Xiaodong ZHANG, and Jun SUN Conference Proceeding Article
sFuzz2.0: Storage-access pattern guided smart contract fuzzing, Haoyu WANG, Zan WANG, Shuang LIU, Jun SUN, Yingquan ZHAO, Yan WAN, and Duy Tai NGUYEN Journal Article
Streamlining Java programming: uncovering well-formed idioms with IdioMine, Yanming YANG, Xing HU, Xin XIA, David LO, and Xiaohu YANG Conference Proceeding Article
Teaching software development for real-world problems using a microservice-based collaborative problem-solving approach, Yi Meng LAU, Christian Michael KOH, and Lingxiao JIANG Conference Proceeding Article
Test optimization in DNN testing: A survey, Qiang HU, Yuejun GUO, Xiaofei XIE, Maxime CORDY, Lei MA, Mike PAPADAKIS, and Yves LE TRAON Journal Article
The impact of bug localization based on crash report mining: A developers' perspective, Marcos MEDEIROS, Uirá KULESZA, Roberta COELHO, Rodrigo BONIFACIO, Christoph TREUDE, and Eiji Adachi BARBOSA Conference Proceeding Article
The important role of system dynamics investigation on business model, industry and performance management, Lina GOZALI, Teuku Yuri M. ZAGLOEL, Togar Mangihut SIMATUPANG, Wahyudi SUTOPO, Aldy GUNAWAN, Yun-Chia LIANG, Bernardo Nugroho YAHYA, Jose Arturo GARZA-REYES, Agustinus Purna IRAWAN, and Yuliani SUSENO Journal Article
Towards low-resource rumor detection: Unified contrastive transfer with propagation structure, Hongzhan LIN, Jing MA, Ruichao YANG, Zhiwei YANG, and Mingfei CHENG Journal Article
Towards speedy permission-based debloating for Android apps, Thung Ferdian, Jiakun LIU, Pattarakrit RATTANUKUL, Shahar MAOZ, Eran TOCH, Debin GAO, and David LO Conference Proceeding Article
Unleashing the power of Clippy in real-world Rust projects, Chunmiao LI, Yijun YU, Haitao WU, Luca CARLIG, Shijie NIE, and Lingxiao JIANG Conference Proceeding Article
Unveiling memorization in code models, Zhou YANG, Zhipeng ZHAO, Chenyu WANG, Jieke SHI, Dongsun KIM, DongGyun HAN, and David LO Conference Proceeding Article
W4-Groups: Modeling the who, what, when and where of group behavior via mobility sensing, Akansha ATREY, Camellia ZAKARIA, Rajesh Krishna BALAN, and Prashant SHENOY Journal Article
Range specification bug detection in flight control systems through fuzzing, Ruidong HAN, Siqi MA, Juanru LI, Surya NEPAL, David LO, Zhuo MA, and Jianfeng MA Journal Article
Deep reinforcement learning for solving vehicle routing problems with backhauls, Conghui WANG, Zhiguang CAO, Yaoxin WU, Long TENG, and Guohua WU Journal Article
Publicly verifiable and secure SVM classification for cloud-based health monitoring services, Dian LEI, Jinwen LIANG, Chuan ZHANG, Ximeng LIU, Daojing HE, Liehuang ZHU, and Song GUO Journal Article
Self-admitted technical debts identification: How far are we?, Hao GU, Shichao ZHANG, Qiao HUANG, Zhifang LIAO, Jiakun LIU, and David LO Conference Proceeding Article
Sustainability forecasting for deep learning packages, Junxiao HAN, Yunkun WANG, Zhongxin LIU, Lingfeng BAO, Jiakun LIU, David LO, and Shuiguang DENG Conference Proceeding Article
Efficient verifiably encrypted ECDSA schemes from Castagnos-Laguillaumie and Joye-Libert encryptions, Xiao YANG, Chengru ZHANG, Haiyang XUE, and Ho Man AU Journal Article
Adversarial learning for coordinate regression through k-layer penetrating representation, Mengxi JIANG, Yulei SUI, Yunqi. LEI, Xiaofei XIE, Cuihua LI, Yang LIU, and Ivor W. TSANG Journal Article
Application of collaborative learning paradigms within software engineering education: A systematic mapping study, Rita GARCIA, Christoph TREUDE, and Andrew VALENTINE Conference Proceeding Article
A simulated annealing with variable neighborhood descent approach for the heterogeneous fleet vehicle routing problem with multiple forward/reverse cross-docks, Vincent F. YU, Pham Tuan ANH, Aldy GUNAWAN, and Hsun HAN Journal Article
Attack as detection: Using adversarial attack methods to detect abnormal examples, Zhe ZHAO, Guangke CHEN, Tong LIU, Taishan LI, Fu SONG, Jingyi WANG, and Jun SUN Journal Article
Community similarity based on user profile joins, Konstantinos THEOCHARIDIS and Hady Wirawan LAUW Conference Proceeding Article
Conditional neural heuristic for multiobjective vehicle routing problems, Mingfeng FAN, Yaoxin WU, Zhiguang CAO, Wen SONG, Guillaume SARTORETTI, Huan LIU, and Guohua WU Journal Article
DDoS family: A novel perspective for massive types of DDoS attacks, Ziming ZHAO, Zhaoxuan LI, Zhihao ZHOU, Jiongchi YU, Zhuoxue SONG, Xiaofei XIE, Fan ZHANG, and Rui ZHANG Journal Article