SERA 2024 Accepted Paper List

Regular Session Papers
1 Marketing Insight Discovery using Approximate Inverse Model Explanations (AIME): Explanatory Derivation of Response Estimates to Campaigns for Marketing Data,  Takafumi Nakanishi
2 What is Asked About Ionic on Stack Overflow (SO) ? An Empirical Study, Fatima Ezzahra Chaabi and Reem Alfayez
3 Automated Theory Substitution: Toward Proof-Driven Software Development, John Scebold, Jared Ziegler, Emily Gray and Eric Bond
4 Analyzing ChatGPT Assistance in Programming, Costain Nachuma, Md Fazle Rabbi, Arifa Champa and Minhaz Zibran
5 Utility-Based Routing in Payment Channel Networks: A Tradeoff Between Utility And Privacy, Suhan Jiang, Fei Zuo and Jie Wu
6 Context Matters: Investigating Its Impact on ChatGPT’s Bug Fixing Performance, Xianshan Qu, Fei Zuo, Xiaopeng Li and Junghwan Rhee
7 Revising the Problem of Partial Labels from the Perspective of CNNs’ Robustness, Xin Zhang, Yuqi Song, Wyatt McCurdy, Xiaofeng Wang and Fei Zuo
8 A Robust Attention-based Convolutional Neural Network for Monocular Depth Estimation, Yuqi Song, Xin Zhang, Bokai Yang, Fei Zuo and Xianshan Qu
9 Revisiting Program Suitability for Fault Localization with Large Dataset and Various Mutation Operators, Hikaru Kubo, Yoshiki Higo and Shinji Kusumoto
10 Improving Accuracy of LLM-based Code Clone Detection Using Functionally Equivalent Methods, Ryutaro Inoue and Yoshiki Higo
11 Performance Analysis of Quantum Computer Simulators across Different Environments, Nozomi Aoki, Masafumi Yamazaki, Akira Hirai, Mari Yamaoka, Naoto Fukumoto, Akihiko Kasagi and Masato Oguchi
12 “Discovering different parties, factions, and close politicians using a word importance derivation method for parliamentary proceedings data”, Shota Tamaru, Ryotaro Okada, Ayako Minematsu and Takafumi Nakanishi
13 Integrated Search Method based on Municipal Attributes and Issue Similarities for MaaS Precedents, Suzuto Kirishima, Ryotaro Okada, Ayako Minematsu and Takafumi Nakanishi
14 A study on ARIMA-based melon size prediction and monitoring system design, Sangmin Lim, Meonghun Lee and Hyun Yoe
15 Design of AI-based Smart Crop  Harvesting System, Seungjae Kim, Hyun Yoe and Meonghun Lee
17 Mapping Cyberattack Patterns and Detection: An Azure Sentinel Approach, Chidozie Odigbo, Hayden Wimmer and Jongyeop Kim
19 INTEGRATED COGNITIVE DETECTION AND ALERT SYSTEM FOR MITIGATING DRIVER DROWSINESS: A COMPREHENSIVE APPROACH TOWARDS ENHANCED  DRIVER SAFETY, Sivaramakrishna Banavathu, Sri Manikanta Surya Vinay Kumar Kukkadapu, Arjun Uddagiri and Renuka Korada”
20 Multi Label Sound Classification using Deep Learning Models, Tasnim Akter Onisha, Jongyeop Kim and Jongho Seol
21 Multi-Class Label Detection and Bounding Box Regression Using Vision Transformer with a Customized Loss Function, Hong Cheng and Rupesh Konduru
22 Estimating the Difficulty of Programming Problems Using Fine-tuned LLM, Chihiro Yoshida, Makoto Matsushita and Yoshiki Higo
23 Improving Reliability in Hybrid Cross-Chain Models through Adaptive Thresholds with a Performance and Adaptability, Jongho Seol, Jongyeop Kim and Abhilash Kancharlar
25 “The Discovery of Aesthetic Notions of the Four Seasons in Sandaishu, the Three Imperial Anthologies of Waka Poetry Using Approximate Inverse Model Explanations (AIME)”, Aiha Ikegami and Takafumi Nakanishi
26 Optimizing Cross-Chain DeFi and Smart Contracts in  Stochastic Integration, Jongho Seol, Jongyeop Kim and Abhilash Kancharlar
27 Leveraging Conditional Generative Adversarial Networks for cosmic microwave background separation, Saurabh Shinde
30 Exploring Flavors Through AI: The Future of Culinary Taste Prediction, Cemil Emre Yavas, Jongyeop Kim and Lei Chen”
32 Hybrid ASCII Art Extraction Algorithm Based on String Distance, Xiujuan Wang, Xiaotong Wu, Haochen Shi and Shuaibing Lu”
33 Adaptive Frequency Cluster-Level Performance Profiler for Multi-Domain Applications, Hoyong Lee, Hayeon Park and Chang-Gun Lee
35 Illustration or Illusion? Reassessing the Use of Machine Learning in Phishing Email Detection, Arifa Islam Champa, Md Fazle Rabbi and Minhaz Zibran
36 Project-based Learning in Software Engineering Education: Integrating Blockchain-Oriented Repositories in SE Curriculum and Coursework, Md Jobair Hossain Faruk, Masrura Tasnim and Jerry Q. Cheng
38 SBOM Challenges for Developers: From Analysis of Stack Overflow Questions, Wataru Otoda, Tetsuya Kanda, Yuki Manabe, Katsuro Inoue and Yoshiki Higo
39 Exploiting CPU Clock Modulation for Covert Communication Channel, Shariful Alam, Jidong Xiao and Nasir Eisty
40 Decade-long Utilization Patterns of ICSE Technical Papers and Associated Artifacts, Sharif Ahmed, Rey Ortiz and Nasir Eisty
41 Preventing Variadic Function Attacks Through Argument Width Counting, Brennan Ward, Kevin Dennis, Gabriel Laverghetta, Parisa Momeni and Jay Ligatti
43 Automatic Configurator to Prevent Attacks for Azure Cloud System, Chijung Jung, Yung Ryn Choe, Junghwan Rhee and Yonghwi Kwon
44 DiffECG: A Versatile Probabilistic Diffusion Model for ECG Signals Synthesis, Nour Neifar, Achraf Ben-Hamadou, Afef Mdhaffar and Mohamed Jmaiel
45 A Model-Driven Approach for Designing and Validation of ABAC Policies, Duc-Hieu Nguyen, Yuichi Sei, Yasuyuki Tahara and Akihiko Ohsuga
46 Securing Against Deception: Exploring Phishing Emails Through ChatGPT and Sentiment Analysis, Shahrzad Sayyafzadeh, Mark Weatherspoon and Hongmei Chi
49 A Method for Word Extraction of Language-Specific Phrases for Lyric Data of Different Languages in the Same Song and Its Application to Decoding Cultural Nuances in Dynamic Equivalence: A Case Study of Let It Go from Frozen, Fan Cheng and Takafumi Nakanishi
50 Detection of Cyber Attacks on Cloud Based Microservices with Distributed Features,  Wonjun Lee and Yung Ryn Choe
51 Reinforcement Learning Architecture for Facial Skin Treatment Recommender, Jennifer Kim Jin, Khalil Dajani, Mira Kim, Soo Dong Kim, Bilal Khan and Daniel Hyun Jin
52 Data Guard: Android Application to Monitor Security Threat in Background Data Transmission, Rifat Ara Tasnim, Farjana Eishita and Minhaz Zibran
53 Leveraging Shared Accelerators in Kubernetes Clusters with rOpenCL, Rui Alves and José Rufino
54 Scalable Applications in Constrained IoT-Cloud Environments, Gara Hellal Yassmine, Lazhar Hamel and Mohamed Graiet
Workshop 1: Fundamental and Innovative Technologies for Next-Generation Software Ecosystems
1 “A Study of Efficient Needs-Based Service Development Using Software Upcycling” , Takuya Nakata, Sinan Chen, Sachio Saiki, and Masahide Nakamura
2 A Preliminary Study on Self Contained Libraries in the NPM Ecosystem, Jaisi Pongchai, Brittany Reid, Raula Gaikovina Kula
3 Porting a Python Application to the Web Using Django: A Case Study of an Archaeological Image Processing System, Hikaru Tomita, Mariko Sasakura, Kinari Nishiura,  Hiroki Inayoshi, Akito Monden
4 An Empirical Study on Ambiguous Words in Software Requirements Specifications of Local Government and Library Systems, Toru Nakamichi,  Kinari Nishiura, Mariko Sasakura, Akito Monden
5 “Long-Term Fine-grained Forecasts of Emergency Demand Using EMS Big Data and Regional Mesh Population Estimates” , Masaki Kaneda_Sinan Chen, Masahide Nakamura, Sachio Saiki
6 “Implementing of a remote task execution service for automated management of hybrid meeting spaces” ,Takeshi Yoshida_Sinan Chen, Masahide Nakamura_Sachio Saiki
7 “Proposal for a Memory Impairment Support Service Integrating Voice Dialogue Agents and ChatGPT” , Hiro Okamoto, Sinan Chen, Masahide Nakamura_Sachio Saiki
8 “Evaluating Recognition AI and Personal Memories Using Time-Series Images in Daily Activities” , Raiki Saito, Sinan Chen, Sachio Saiki, and Masahide Nakamura
9 Characterising Contributions that Coincide with Vulnerability Mitigation in NPM Libraries, Ruksit Rojpaisarnkit, Hathaichanok Damrongsiri, Christoph Treude, Ali Ouni and Raula Gaikovina Kula
10 Contributing Back to the Ecosystem: A User Survey of NPM Developers, Supatsara Wattanakriengkrai, Christoph Treude, Raula Gaikovina Kula
11 Extracting Educational Code Scenarios from Python Textbooks, Hathaichanok Damrongsiri, Ruksit Rojpaisarnkit, Indira Febriyanti, Dong Wang, Christoph Treude and Raula Gaikovina Kula
12 “Should I Drop Everything? An Exploratory Study on Developer Responses to the Log4JShell Vulnerability”, Vittunyuta Maeprasart, Ali Ouni, Raula Gaikovina Kula
Special Session 1: Fundamental and Methodologies of Advanced Software
SS1-01 Need of Public-Private Healthcare Collaboration for managing seasonal Dengue Fever in West Bengal, Anwesha Nag, Takaaki Goto, Subhankar Roy, Partha Ghosh
SS1-02 A machine learning based automated model for managing student dropout, Partha Ghosh, Arnab Charit, Hindol Banerjee, Debanwesa Bandhu, Agniv Ghosh, Ankita Pal, Takaaki Goto, Soumya Sen
SS1-03 A Spatial Data Pipeline for Streaming Smart City Data, Chase Carthen, Araam Zaremehrjardi, Vinh Le, Carlos Cardillo, Alireza Tavakkoli, Sergiu M. Dascalu, Frederick C. Harris Jr
SS1-04 “SpeciServe, a gRPC Infrastructure Concept”, Chase Carthen, Araam Zaremehrjardi, Zachary Estreito, Alireza Tavakkoli, Frederick C. Harris Jr., Sergiu M. Dascalu
SS1-05 AI-Driven Analysis and Prediction of Energy Consumption in NYC’s Municipal Buildings, Hossein Jamali, Sergiu M. Dascalu, Frederick C. Harris, Jr
Special Session 2: Computer Systems Supporting Daily Lives Through Signal Processing and Analysis
SS2-01 Proposal of Automatic Sirocco Fan Washing System, Momoka Shiraishi, Haru Okazaki, Seiichi Serikawa, Yuhki Kitazono
SS2-02 Segmentation Method of Lunchbox Images by Weight Optimization using Color Texture Dissimilarity, Qian YangYang, Koki Hayakawa, Seiji Nishifuji, Shenglin Mu, Shota Nakashima.
SS2-03 Observation and Evaluation for Individual Student using Learning Analytics of Software Programing and Functional Questionnaire, Motoi Nakao, Yuhei Oomachi
SS2-04 Extraction and Application of Introspection using LegoR Serious PlayR Combined with Software Method, Motoi Nakao, Yuhei Oomachi, Michiko Matsuda
Special Session 3: Software and Information Management for Web Information, Big Data, and Human Behaviors
SS3-01 Using 2-gram to Detect Potential Appropriate Respondents to Questions at Q&A Sites, Yuya Yokoyama
SS3-02 Revised Transition Method in Impression Spaces for Multimedia Positive Computing, Teruhisa Hochin
SS3-03 Applying Impression Evaluation Method by Space to Multimedia Data Retrieval Using Impression Words, Teruhisa Hochin, Tran Thi Bich Lien
SS3-04 Clarifying Specification Semantics of Impression Evaluation Method by Space Based on Peaks, Teruhisa Hochin
Special Session 4: Cross-Chain DeFi and Smart Contracts 2.0 Summit: Navigating Tomorrow’s Interconnected Finance Landscape and Technology
SS4-01 Optimizing Cross-Chain DeFi and Smart Contracts in Stochastic Integration, Jongho Seol, Jongyeop Kim and Abhilash Abhilash
SS4-02 Improving Reliability in Hybrid Cross-Chain Models through Adaptive Thresholds with a Performance and Adaptability, Jongho Seol, Jongyeop Kim and Abhilash Kancharlar
Special Session 5: Next-generation Software Engineering for Efficient Software Development and Quality Assurance
SS5-01 “Identifying Security Bugs in Issue Reports: Comparison of BERT, N-gram IDF and ChatGPT”, Daiki Yokoyama, Kinari Nishiura, and Akito Monden
SS5-02 Global Alignment Learning For Code Search, Juntong Hong, Eunjong Choi, Kinari Nishiura, and Osamu Mizuno
SS5-03 Analyzing the Impact of Formal Methods on Issue Trends Using BERTopic, Soshi Inoue, Kinari Nishiura, Eunjong Choi, and Osamu Mizuno
SS5-04 A Comparative Study on COSMIC FP approximation with Deep Learning and Conventional Machine Learning, Kaoru Yokogawa, Masashi Hiroishi, Sousuke Amasaki, Hirohisa Aman, and Tomoyuki Yokogawa
SS5-05 A Multi-Aspect Evaluation of DL-based SQLi Attack Detection Models, Pattara Leelaprute, Yuki Kase, Sousuke Amasaki, Hirohisa Aman, and Tomoyuki Yokogawa
SS5-06 An Application of Program Slicing and CodeBERT to Distill Variables With Inappropriate Names, Yahiro Mori, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara
Special Session 6: Bioinstrumentation, Affective Computing, Humanware Engineering, and Emerging Technologies
SS6-1 “Quantitative Analysis of Conversational Response Nuances Using Visual Analog Scale, Data Visualization, and Cluster”, Naruki Shirahama, Shinichi Kondo, Keiji Matsumoto, Kenji Moriya,  Naofumi Nakaya, Kazuhiro Koshi, Satoshi Watanabe
SS6-02 “A Study of the Distribution Between Visual Analog Scale and Likert Scale for Subjective Evaluation of  “Like-Dislike”, Satoshi Watanabe, Naofumi Nakaya, Yuji Matsumoto, Naruki Shirahama
SS6-03 A Study on Generation of Spectrogram for Detection of Venous Needle Dislodgement by Image Recognition Using Machine Learning, Naofumi Nakaya, Mutsuki Koizumi, Satoshi Watanabe, Naruki Shirahama, Takayuki Abe, Akihiro Watanabe
SS6-04 “Evaluation of Machine Tool Operating State Estimation using Channel State Information”, Takanori MATSUZAKI, Shinjo
KATO, Yoshihiro ASANO, Yuga SAKO, Kozo HORIUCHI, Hiroshi SHIRATSUCHI