Cited By
View all- Liu BLiu HLi GNiu NXu ZWang YXia YZhang YJiang YChandra SBlincoe KTonella P(2023)Deep Learning Based Feature Envy Detection Boosted by Real-World ExamplesProceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3611643.3616353(908-920)Online publication date: 30-Nov-2023
- Iannone ECodabux ZLenarduzzi VDe Lucia APalomba F(2023)Rubbing salt in the wound? A large-scale investigation into the effects of refactoring on securityEmpirical Software Engineering10.1007/s10664-023-10287-x28:4Online publication date: 24-May-2023
- Ikegami AKula RChinthanet BMaeprasart VOuni AIshio TMatsumoto K(2022)On the Use of Refactoring in Security Vulnerability Fixes: An Exploratory Study on Maven LibrariesProceedings of the 26th International Conference on Evaluation and Assessment in Software Engineering10.1145/3530019.3535304(288-293)Online publication date: 13-Jun-2022
- Show More Cited By