Select Publications
Conference Papers
2024, 'Trust in Software Supply Chains: Blockchain-Enabled SBOM and the AIBOM Future', in Proceedings - 2024 IEEE/ACM 4th International Workshop on Engineering and Cybersecurity of Critical Systems and 2024 IEEE/ACM 2nd International Workshop on Software Vulnerability, EnCyCriS/SVM 2024, pp. 12 - 19, http://dx.doi.org/10.1145/3643662.3643957
,2024, 'A Taxonomy of foundation model based systems through the lens of software architecture', in Proceedings - 2024 IEEE/ACM 3rd International Conference on AI Engineering - Software Engineering for AI, CAIN 2024, pp. 1 - 6, http://dx.doi.org/10.1145/3644815.3644956
,2024, 'Privacy and copyright protection in generative ai: A lifecycle perspective', in Proceedings - 2024 IEEE/ACM 3rd International Conference on AI Engineering - Software Engineering for AI, CAIN 2024, pp. 92 - 97, http://dx.doi.org/10.1145/3644815.3644952
,2024, 'Towards a responsible ai metrics catalogue: A collection of metrics for ai accountability', in Proceedings - 2024 IEEE/ACM 3rd International Conference on AI Engineering - Software Engineering for AI, CAIN 2024, pp. 100 - 111, http://dx.doi.org/10.1145/3644815.3644959
,2024, 'Hard to Read and Understand Pythonic Idioms? Deldiom and Explain Them in Non-Idiomatic Equivalent Code', in Proceedings - International Conference on Software Engineering, pp. 2808 - 2819, http://dx.doi.org/10.1145/3597503.3639101
,2024, 'Local Differential Privacy for Smart Meter Data Sharing with Energy Disaggregation', in Proceedings - 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, DCOSS-IoT 2024, pp. 1 - 10, http://dx.doi.org/10.1109/DCOSS-IoT61029.2024.00012
,2024, 'Towards Responsible Generative AI: A Reference Architecture for Designing Foundation Model Based Agents', in Proceedings - IEEE 21st International Conference on Software Architecture Companion, ICSA-C 2024, pp. 119 - 126, http://dx.doi.org/10.1109/ICSA-C63560.2024.00028
,2024, 'Where is it? Tracing the Vulnerability-Relevant Files from Vulnerability Reports', in Proceedings - International Conference on Software Engineering, pp. 2469 - 2481, http://dx.doi.org/10.1145/3597503.3639202
,2023, 'Contrastive Counterfactual Learning for Causality-aware Interpretable Recommender Systems', in International Conference on Information and Knowledge Management, Proceedings, pp. 3564 - 3573, http://dx.doi.org/10.1145/3583780.3614823
,2023, 'A Multi-faceted Vulnerability Searching Website Powered by Aspect-level Vulnerability Knowledge Graph', in Proceedings - International Conference on Software Engineering, pp. 60 - 63, http://dx.doi.org/10.1109/ICSE-Companion58688.2023.00025
,2023, 'A Pattern-Oriented Reference Architecture for Governance-Driven Blockchain Systems', in Proceedings - IEEE 20th International Conference on Software Architecture, ICSA 2023, pp. 23 - 34, http://dx.doi.org/10.1109/ICSA56044.2023.00011
,2023, 'A Selection Model of Privacy Patterns', in Proceedings - IEEE 20th International Conference on Software Architecture, ICSA 2023, pp. 1 - 11, http://dx.doi.org/10.1109/ICSA56044.2023.00009
,2023, 'An Empirical Study on Software Bill of Materials: Where We Stand and the Road Ahead', in Proceedings - International Conference on Software Engineering, pp. 2630 - 2642, http://dx.doi.org/10.1109/ICSE48619.2023.00219
,2023, 'Decision Models for Selecting Patterns in Governance-driven Blockchain Systems', in Proceedings - 2023 IEEE International Conference on Blockchain, Blockchain 2023, pp. 307 - 314, http://dx.doi.org/10.1109/Blockchain60715.2023.00055
,2023, 'Faster or Slower? Performance Mystery of Python Idioms Unveiled with Empirical Evidence', in Proceedings - International Conference on Software Engineering, pp. 1495 - 1507, http://dx.doi.org/10.1109/ICSE48619.2023.00130
,2023, 'Meta-learning for Estimating Multiple Treatment Effects with Imbalance', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 886 - 895, http://dx.doi.org/10.1007/978-981-99-7254-8_69
,2023, 'Review-Incorporated Model-Agnostic Profile Injection Attacks on Recommender Systems', in Proceedings - IEEE International Conference on Data Mining, ICDM, pp. 1481 - 1486, http://dx.doi.org/10.1109/ICDM58522.2023.00195
,2023, 'RIdiom: Automatically Refactoring Non-Idiomatic Python Code with Pythonic Idioms', in Proceedings - International Conference on Software Engineering, pp. 102 - 106, http://dx.doi.org/10.1109/ICSE-Companion58688.2023.00034
,2023, 'SeeHow: Workflow Extraction from Programming Screencasts through Action-Aware Video Analytics', in Proceedings - International Conference on Software Engineering, pp. 1946 - 1957, http://dx.doi.org/10.1109/ICSE48619.2023.00165
,2023, 'Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation', in Proceedings - International Conference on Software Engineering, pp. 970 - 982, http://dx.doi.org/10.1109/ICSE48619.2023.00089
,2023, 'SoapOperaTG: A Tool for System Knowledge Graph Based Soap Opera Test Generation', in Proceedings - International Conference on Software Engineering, pp. 51 - 54, http://dx.doi.org/10.1109/ICSE-Companion58688.2023.00023
,2023, 'Software Engineering as the Linchpin of Responsible AI', in Proceedings - International Conference on Software Engineering, pp. 3 - 4, http://dx.doi.org/10.1109/ICSE48619.2023.00012
,2023, 'Towards Concrete and Connected AI Risk Assessment (C2AIRA): A Systematic Mapping Study', in Proceedings - 2023 IEEE/ACM 2nd International Conference on AI Engineering - Software Engineering for AI, CAIN 2023, pp. 104 - 116, http://dx.doi.org/10.1109/CAIN58948.2023.00027
,2022, 'Making Python code idiomatic by automatic refactoring non-idiomatic Python code with pythonic idioms', in ESEC/FSE 2022 - Proceedings of the 30th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 696 - 708, http://dx.doi.org/10.1145/3540250.3549143
,2022, 'Psychologically-inspired, unsupervised inference of perceptual groups of GUI widgets from GUI images', in ESEC/FSE 2022 - Proceedings of the 30th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 332 - 343, http://dx.doi.org/10.1145/3540250.3549138
,2022, 'Constructing a System Knowledge Graph of User Tasks and Failures from Bug Reports to Support Soap Opera Testing', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3551349.3556967
,2022, 'Prompt-tuned Code Language Model as a Neural Knowledge Base for Type Inference in Statically-Typed Partial Code', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3551349.3556912
,2022, 'A Pattern Language for Blockchain Governance', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3551902.3564802
,2022, 'Dependency tracking for risk mitigation in machine learning (ML) systems', in Proceedings of the 44th International Conference on Software Engineering: Software Engineering in Practice, ACM, pp. 145 - 146, presented at ICSE '22: 44th International Conference on Software Engineering, http://dx.doi.org/10.1145/3510457.3513058
,2022, 'Software engineering for responsible AI', in Proceedings of the 44th International Conference on Software Engineering: Software Engineering in Practice, ACM, presented at ICSE '22: 44th International Conference on Software Engineering, http://dx.doi.org/10.1145/3510457.3513063
,2022, 'Analysis of Privacy Patterns from An Architectural Perspective', in 2022 IEEE 19th International Conference on Software Architecture Companion, ICSA-C 2022, pp. 60 - 67, http://dx.doi.org/10.1109/ICSA-C54293.2022.00056
,2022, 'Cycle-Balanced Representation Learning For Counterfactual Inference', in Proceedings of the 2022 SIAM International Conference on Data Mining, SDM 2022, pp. 442 - 450
,2022, 'Dependency Tracking for Risk Mitigation in Machine Learning (ML) Systems', in Proceedings - International Conference on Software Engineering, pp. 145 - 146, http://dx.doi.org/10.1109/ICSE-SEIP55303.2022.9794111
,2022, 'EvAnGCN: Evolving Graph Deep Neural Network Based Anomaly Detection in Blockchain', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 444 - 456, http://dx.doi.org/10.1007/978-3-031-22064-7_32
,2022, 'Heterogeneous Vulnerability Report Traceability Recovery by Vulnerability Aspect Matching', in Proceedings - 2022 IEEE International Conference on Software Maintenance and Evolution, ICSME 2022, pp. 175 - 186, http://dx.doi.org/10.1109/ICSME55016.2022.00024
,2022, 'Software engineering for Responsible AI: An empirical study and operationalised patterns', in Proceedings - International Conference on Software Engineering, pp. 241 - 242, http://dx.doi.org/10.1109/ICSE-SEIP55303.2022.9793864
,2022, 'Towards a Roadmap on Software Engineering for Responsible AI', in Proceedings - 1st International Conference on AI Engineering - Software Engineering for AI, CAIN 2022, pp. 101 - 112, http://dx.doi.org/10.1145/3522664.3528607
,2022, 'Towards a Taxonomy of Approaches to Modern Complex Systems', in 2022 17th Annual System of Systems Engineering Conference, SOSE 2022, pp. 410 - 415, http://dx.doi.org/10.1109/SOSE55472.2022.9812661
,2022, 'Towards Implementing Responsible AI', in Proceedings - 2022 IEEE International Conference on Big Data, Big Data 2022, pp. 5076 - 5081, http://dx.doi.org/10.1109/BigData55660.2022.10021121
,2021, 'Generative Inverse Deep Reinforcement Learning for Online Recommendation', in International Conference on Information and Knowledge Management, Proceedings, pp. 201 - 210, http://dx.doi.org/10.1145/3459637.3482347
,2021, 'KGAMD: An API-misuse detector driven by fine-grained API-constraint knowledge graph', in ESEC/FSE 2021 - Proceedings of the 29th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1515 - 1519, http://dx.doi.org/10.1145/3468264.3473112
,2021, 'Visual analytics for large networks: Theory, art and practice', in ACM SIGGRAPH 2021 Courses, SIGGRAPH 2021, http://dx.doi.org/10.1145/3450508.3464558
,2021, 'Patterns for Blockchain-Based Payment Applications', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3489449.3490006
,2021, 'A process adaptation framework for blockchain-based supply chain management', in IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2021
,2021, 'Analysing and extending privacy patterns with architectural context', in Proceedings of the ACM Symposium on Applied Computing, pp. 1390 - 1398, http://dx.doi.org/10.1145/3412841.3442014
,2021, 'Towards Automated Data Sharing in Personal Data Stores', in 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2021, pp. 328 - 331, http://dx.doi.org/10.1109/PerComWorkshops51409.2021.9431001
,2021, 'A Decision Model for Choosing Patterns in Blockchain-Based Applications', in Proceedings - IEEE 18th International Conference on Software Architecture, ICSA 2021, pp. 47 - 57, http://dx.doi.org/10.1109/ICSA51549.2021.00013
,2021, 'A Blockchain-Enabled Federated Learning Model for Privacy Preservation: System Design', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 473 - 489, http://dx.doi.org/10.1007/978-3-030-90567-5_24
,2021, 'CO-PILOT: COllaborative Planning and reInforcement Learning On sub-Task curriculum', in Advances in Neural Information Processing Systems, pp. 10444 - 10456
,2021, 'FLRA: A Reference Architecture for Federated Learning Systems', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 83 - 98, http://dx.doi.org/10.1007/978-3-030-86044-8_6
,