Publications
For a complete list of publications, please visit my Google Scholar or DBLP profile.
2025
2024
-
Unleashing the Power of Clippy in Real-World Rust Projects
ICSE Companion 2024
2023
-
Ownership Guided C to Rust Translation
CAV 2023, pp. 459-482
-
Adaptive Observability for Forensic-Ready Microservice Systems
IEEE Transactions on Services Computing, 16(5): 3196-3209
-
Accounting for Socio-Technical Resilience in Software Engineering
CHASE 2023, pp. 31-36
2022
-
In Rust We Trust: A Transpiler from Unsafe C to Safer Rust
ICSE Companion 2022, pp. 354-355
-
The Case for Zero Trust Digital Forensics
Forensic Science International: Digital Investigation, 40, 301352
2021
-
InferCode: Self-Supervised Learning of Code Representations by Predicting Subtrees
ICSE 2021, pp. 1186-1197
-
TreeCaps: Tree-Based Capsule Networks for Source Code Processing
AAAI 2021
-
On the Generalizability of Neural Program Models with Respect to Semantic-Preserving Program Transformations
Information and Software Technology
2020
-
EUD-MARS: End-User Development of Model-Driven Adaptive Robotics Software Systems
Science of Computer Programming, 200, 102534
2019
-
AutoFocus: Interpreting Attention-Based Neural Networks by Code Perturbation
ASE 2019, pp. 38-41
-
fAST: Flattening Abstract Syntax Trees for Efficiency
ICSE 2019 (Posters), Montreal, Canada
-
SAR: Learning Cross-Language API Mappings with Little Knowledge
ESEC/FSE 2019, pp. 796-806
-
LiveBox: A Self-Adaptive Forensic-Ready Service for Drones
IEEE Access, 7: 148401-148412 - Best Paper of the Week (2020)
2018
-
Requirements and Specifications for Adaptive Security: Concepts and Analysis
SEAMS 2018, pp. 161-171 - Best Paper Award
-
Text Filtering and Ranking for Security Bug Report Prediction
IEEE Transactions on Software Engineering (TSE), 45(6): 615-631 (2019) - Presented at FSE 2018 (Journal-First Track)
2016
-
Engineering Adaptive Model-Driven User Interfaces
IEEE Transactions on Software Engineering (TSE), 42(12): 1118-1147
-
Forensically-Sound Analysis of Security Risks of using Local Password Managers
IEEE REW 2016, pp. 114-121 - Best Paper Award
-
Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations
iRENIC 2016 - Best Vision Paper
2014
-
Adaptive Sharing for Online Social Networks: A Trade-off between Privacy Risk and Social Benefit
IEEE TrustCom 2014, pp. 45-52 - Best Paper Award
2013
-
RBUIS: Simplifying Enterprise Application User Interfaces through Engineering Role-Based Adaptive Behavior
EICS 2013, pp. 3-12 - Best Paper Award
-
Requirements-Driven Adaptive Digital Forensics
RE 2013 - Best Poster Award
2011
-
Risk and Argument: A Risk-Based Argumentation Method for Practical Security
RE 2011, pp. 239-248 - IEEE Distinguished Paper Award
2010
-
Exploring the Influence of Identifier Names on Code Quality: An Empirical Study
CSMR 2010
2009
-
Monitoring and Diagnosing Software Requirements
Automated Software Engineering, 16(1), pp. 3-35 - ACM SIGSOFT Distinguished Paper Award at ASE'07
2008
-
Run-Time Security Traceability for Evolving Systems
BCS 2008 - Best Vision Paper
2006
-
Requirements-Driven Design of Autonomic Application Software
CASCON 2006 - 10 Year Most Influential Paper Award (CASCON'16)
2004
-
From Goals to Aspects: Discovering Aspects from Requirements Goal Models
RE 2004, pp. 38-47
2003
-
Removing False Code Dependencies to Speedup Software Development Processes
CASCON 2003, pp. 288-297
2001
-
Loop Parallelization using the 3D Iteration Space Visualizer
Journal of Visual Languages & Computing, 12(2), pp. 163-181 - Best Paper Award at VMPDP'01