- Software Testing and Debugging Techniques
- Software Engineering Research
- Software System Performance and Reliability
- Service-Oriented Architecture and Web Services
- Software Reliability and Analysis Research
- Business Process Modeling and Analysis
- Advanced Software Engineering Methodologies
- Advanced Malware Detection Techniques
- Context-Aware Activity Recognition Systems
- Formal Methods in Verification
- Mobile Agent-Based Network Management
- IoT and Edge/Fog Computing
- Green IT and Sustainability
- Multi-Agent Systems and Negotiation
- Adversarial Robustness in Machine Learning
- Model-Driven Software Engineering Techniques
- Digital Rights Management and Security
- Scientific Computing and Data Management
- Semantic Web and Ontologies
- Multimedia Communication and Technology
- Distributed systems and fault tolerance
- Advanced Database Systems and Queries
- Peer-to-Peer Network Technologies
- Advanced Steganography and Watermarking Techniques
- Distributed and Parallel Computing Systems
Hong Kong University of Science and Technology
2015-2024
University of Hong Kong
2015-2024
University College London
2024
Guangzhou HKUST Fok Ying Tung Research Institute
2022-2024
Wuhan University
2023-2024
Tianjin University
2024
University of Auckland
2023
McGill University
2023
Southern University of Science and Technology
2023
Paderborn University
2021-2023
In software testing, a set of test cases is constructed according to some predefined selection criteria. The then examined against these cases. Three interesting observations have been made on the current artifacts testing. Firstly, an error-revealing case considered useful while successful which does not reveal errors usually further investigated. Whether still contain information for revealing has properly studied. Secondly, no matter how extensive testing conducted in development phase,...
Software defect information, including links between bugs and committed changes, plays an important role in software maintenance such as measuring quality predicting defects. Usually, the are automatically mined from change logs bug reports using heuristics searching for specific keywords IDs logs. However, accuracy of these depends on Bird et al. found that there many missing due to absence references They also lead biased it affects prediction performance. We manually inspected explicit...
The effectiveness of search-based automated program repair is limited in the number correct patches that can be successfully generated. There are two causes such limitation. First, search space does not contain patch. Second, huge and therefore patch cannot generated (i.e., either after incorrect plausible ones or within time budget).
Smartphone applications' performance has a vital impact on user experience. However, many smartphone applications suffer from bugs that cause significant degradation, thereby losing their competitive edge. Unfortunately, people have little understanding of these bugs. They also lack effective techniques to fight with such To bridge this gap, we conducted study 70 real-world collected eight large-scale and popular Android applications. We studied the characteristics (e.g., bug types how they...
Deep learning applications become increasingly popular in important domains such as self-driving systems and facial identity systems. Defective deep may lead to catastrophic consequences. Although recent research efforts were made on testing debugging applications, the characteristics of defects have never been studied. To fill this gap, we studied built top TensorFlow collected program bugs related from StackOverflow QA pages Github projects. We extracted information pages, commit messages,...
Android ecosystem is heavily fragmented. The numerous combinations of different device models and operating system versions make it impossible for app developers to exhaustively test their apps. As a result, various compatibility issues arise, causing poor user experience. However, little known on the characteristics such fragmentation-induced no mature tools exist help quickly diagnose fix these issues. To bridge gap, we conducted an empirical study 191 real-world collected from popular...
Recently, the ChatGPT LLM has received great attention: it can be used as a bot for discussing source code, prompting to suggest changes, provide descriptions or even generate code. Typical demonstrations generally focus on existing benchmarks, which may have been in model training (i.e., data leakage). To assess feasibility of using an useful assistant programmers, we must its realistic capabilities unseen problems well various tasks. In this paper, present empirical study ChatGPT's...
Various information retrieval (IR) based techniques have been proposed recently to locate bugs automatically at the file level. However, their usefulness is often compromised by coarse granularity of files and lack contextual information. To address this, we propose using software changes, which offer finer than provide important clues for bug-fixing. We observe that bug inducing changes can facilitate fixing process. For example, it helps triage task developers who committed or enables fix...
Recent techniques for fault localization leverage code coverage to address the high cost problem of debugging. These exploit correlations between program failures and entities as clue in locating faults. Experimental evidence shows that effectiveness these can be affected adversely by coincidental correctness, which occurs when a is executed but no failure detected. In this paper, we propose an approach problem. We refine test runs using control- data-flow patterns prescribed different...
Software crash is common. When a occurs, software developers can receive report upon user permission. A typically includes call stack at the time of crash. An important step debugging to identify faulty functions, which often tedious and labor-intensive task. In this paper, we propose CrashLocator, method locate functions using information in reports. It deduces possible traces (the failing execution that lead crash) by expanding with static graph. then calculates suspiciousness each...
Smartphone applications' energy efficiency is vital, but many Android applications suffer from serious inefficiency problems. Locating these problems labor-intensive and automated diagnosis highly desirable. However, a key challenge the lack of decidable criterion that facilitates judgment such Our work aims to address this challenge. We conducted an in-depth study 173 open-source 229 commercial applications, observed two common causes problems: missing deactivation sensors or wake locks,...
There are increasing uses of deep learning (DL) compilers to generate optimized code, boosting the runtime performance DL models on specific hardware. Like their traditional counterparts, can incorrect resulting in unexpected model behaviors that may cause catastrophic consequences mission-critical systems. On other hand, processed by differ fundamentally from imperative programs program logic is implicit. As such, various characteristics bugs arising need be revisited context compilers.
ChatGPT has revolutionized many research and industrial fields. shown great potential in software engineering to boost various traditional tasks such as program repair, code understanding, generation. However, whether automatic repair (APR) applies deep learning (DL) programs is still unknown. DL programs, whose decision logic not explicitly encoded the source code, have posed unique challenges APR. While an APR approach needs only parse syntactically but also understand intention. With best...
Automated detection of software failures is an important but challenging engineering task. It involves finding in a vast search space the failure-inducing test cases that contain input triggering fault and oracle asserting incorrect execution. We are motivated to study how far this outstanding challenge can be solved by recent advances large language models (LLMs) such as ChatGPT. However, our reveals ChatGPT has relatively low success rate (28.8%) correct for buggy programs. A possible...
Testing the correctness of services assures functional quality service-oriented applica-tions. A application may bind dynamically to its supportive services. For same service interface, behave differently. also need realize a business strategy, like best pricing, relative behavior counterparts and dynamic market situations. Many existing works ignore these issues address problem identifying failures from test results. This article proposes metamorphic approach for online testing. The...
With the growing number of large scale software projects, development and maintenance demands participation larger groups. Having a thorough understanding group developers is critical for improving quality reducing cost. In contrast to most commercial endeavors, in open source (OSS) projects enjoy more freedom organize contribute project their own working style. Their interactions through various means generate latent developer social network (DSN). We have observed that relationships these...
By examining the comparative experiences of Rohingya who fled in early 1990s to Bangladesh and Malaysia, this paper discusses implications for refugee protection an Asian regional context characterized by generally applicable immigration measures a reluctance offer formal durable solutions. Somewhat secure from refoulement but undifferentiated or even deliberately invisible among larger irregular migrant populations, refugees region develop certain strategies livelihood mechanisms outside...
Concurrency bugs are notoriously difficult to detect because there can be vast combinations of interleavings among concurrent threads, yet only a small fraction reveal them. Atomic-set serializability characterizes wide range concurrency bugs, including data races and atomicity violations. In this paper, we propose two-phase testing technique that effectively atomic-set Phase I, our infers potential violations do not appear in concrete execution prunes those violation-free. II, actively...
Smartphone applications have millions of users. Their energy efficiency is very important. However, we investigated 174 Android and found 33 them suffering serious inefficiency problems. Many these problems are due to ineffective use sensors their data. In this paper, propose a novel approach systematically diagnose in applications. We derive an application execution model from specifications, leverage it realistically simulate application's runtime behavior. Our can automatically analyze...
Intensive dependencies of a Java project on third-party libraries can easily lead to the presence multiple library or class versions its classpath. When this happens, JVM will load one version and shadows others. Dependency conflict (DC) issues occur when loaded fails cover required feature (e.g., method) referenced by project, thus causing runtime exceptions. However, warnings duplicate classes detected existing build tools such as Maven be benign since not all instances duplication induce...
Spectrum-based fault localization (SBFL) techniques are widely studied and have been evaluated to be effective in locating faults. Recent studies also showed that developers from industry value automated SBFL techniques. However, their effectiveness is still limited by two main reasons. First, the test coverage information leveraged construct spectrum does not reflect root cause directly. Second, suffers tie issue so buggy code entities can well differentiated non-buggy ones. To address...
Ethereum smart contracts are programs that can be collectively executed by a network of mutually untrusted nodes. Smart handle and transfer assets values, offering strong incentives for malicious attacks. Intrusion attacks popular type In this article, we propose ContractGuard, the first intrusion detection system (IDS) to defend against such Like IDSs conventional programs, ContractGuard detects attempts as abnormal control flow. However, existing IDS techniques/tools inapplicable due...
The PyPI ecosystem has indexed millions of Python libraries to allow developers automatically download and install dependencies their projects based on the specified version constraints. Despite convenience brought by automation, constraints in can easily conflict, resulting build failures. We refer such conflicts as <u>D</u>ependency <u>C</u>onfict (DC) issues. Although DC issues are common projects, lack tool support gain a comprehensive knowledge for diagnosing root causes these In this...
Behavior analysis of complex distributed systems has led to the search for enhanced reachability techniques which support modularity and control state explosion problem. While been achieved, in still a Indeed, this problem may even be exacerbated, as locally minimized subsystem contain many states transitions forbidden by its environment or context. Context constraints, specified interface processes, are restrictions imposed on behavior. Recent research suggested that can effectively...