default search action
Justin Smith 0001
Person information
- affiliation: Lafayette College, Easton, PA, USA
- affiliation (PhD 2019): North Carolina State University, Department of Computer Science, Raleigh, NC, USA
Other persons with the same name
- Justin Smith 0002 — Texas Christian University, Computer Science Department, Fort Worth, TX, USA
- Justin Smith 0003 — Miami University, Department of Philosophy, Oxford, OH, USA
- Justin Smith 0004 — Walter P. Moore Inc., Houston, TX, USA
- Justin Smith 0005 — Washington State University, Shelton, WA, USA
- Justin Smith 0006 — University of North Texas, Denton, TX, USA
- Justin Smith 0007 — Direct Supply
- Justin Smith 0008 — University of North Carolina Charlotte, NC, USA
- Justin Smith 0009 — St. Luke's Health System, Boise, ID, USA
Other persons with a similar name
- Justin D. Smith — University of Pennsylvania, PA, USA
- Justin E. H. Smith — Concordia University, Montreal, Canada
- Justin J. Smith — Curtin University of Technology, Perth, WA, Australia
- Justin P. Smith — Confirma, Inc, USA (and 1 more)
- Justin R. Smith
- Justin S. Smith
- Justin T. H. Smith — University of New Mexico, Department of Economics, Albuquerque, NM, USA
- Justin W. Smith — Northern Kentucky University, Computer Science Department, Highland Heights, KY, USA (and 1 more)
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Fairuz Nawer Meem, Justin Smith, Brittany Johnson:
Exploring Experiences with Automated Program Repair in Practice. ICSE 2024: 86:1-86:11 - [c24]Wren McQueary, Sadia Afrin Mim, Md. Nishat Raihan, Justin Smith, Brittany Johnson:
Py-holmes: Causal Testing for Deep Neural Networks in Python. SIGSOFT FSE Companion 2024: 602-606 - [c23]Fairuz Nawer Meem, Justin Smith, Brittany Johnson:
Challenges and Opportunities for Survey Research in the Age of Generative AI: An Experience Report. VL/HCC 2024: 423-428 - [p1]Brittany Johnson, Justin Smith:
The Role of Ethics in Engineering Fair AI (and Beyond). Equity, Diversity, and Inclusion in Software Engineering 2024: 135-149 - 2023
- [c22]Sadia Afrin Mim, Justin Smith, Brittany Johnson:
A Taxonomy of Machine Learning Fairness Tool Specifications, Features and Workflows. VL/HCC 2023: 222-225 - 2021
- [c21]Brittany Johnson, Justin Smith:
Towards Ethical Data-Driven Software: Filling the Gaps in Ethics Research & Practice. SEthics@ICSE 2021: 18-25 - [c20]Gina R. Bai, Justin Smith, Kathryn T. Stolee:
How Students Unit Test: Perceptions, Practices, and Pitfalls. ITiCSE (1) 2021: 248-254 - 2020
- [c19]Thuc Nhi Le, Shokhzodbek Saidov, Justin Smith:
MatchingRef: Matching Variable Names in a Reference Page to Help Introductory CS Students Fix Compiler Errors. ICER 2020: 302 - [c18]Justin Smith, Lisa Nguyen Quang Do, Emerson R. Murphy-Hill:
Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools for Security. SOUPS @ USENIX Security Symposium 2020: 221-238 - [c17]Justin Smith, Christopher Theisen, Titus Barik:
A Case Study of Software Security Red Teams at Microsoft. VL/HCC 2020: 1-10
2010 – 2019
- 2019
- [j1]Justin Smith, Brittany Johnson, Emerson R. Murphy-Hill, Bill Chu, Heather Richter Lipford:
How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool. IEEE Trans. Software Eng. 45(9): 877-897 (2019) - 2018
- [c16]Andrew McNamara, Justin Smith, Emerson R. Murphy-Hill:
Does ACM's code of ethics change ethical decision making in software development? ESEC/SIGSOFT FSE 2018: 729-733 - [c15]Justin Smith:
Supporting Effective Strategies for Resolving Vulnerabilities Reported by Static Analysis Tools. VL/HCC 2018: 267-268 - [e1]Justin Smith, Christopher Bogart, Judith Good, Scott D. Fleming:
2019 IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2019, Memphis, Tennessee, USA, October 14-18, 2019. IEEE Computer Society 2018, ISBN 978-1-7281-0810-0 [contents] - 2017
- [c14]Lisa Nguyen Quang Do, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, Emerson R. Murphy-Hill:
Cheetah: just-in-time taint analysis for Android apps. ICSE (Companion Volume) 2017: 39-42 - [c13]Titus Barik, Justin Smith, Kevin Lubick, Elisabeth Holmes, Jing Feng, Emerson R. Murphy-Hill, Chris Parnin:
Do developers read compiler error messages? ICSE 2017: 575-585 - [c12]Lisa Nguyen Quang Do, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, Emerson R. Murphy-Hill:
Just-in-time static analysis. ISSTA 2017: 307-317 - [c11]Justin Smith, Chris Brown, Emerson R. Murphy-Hill:
Flower: Navigating program flow in the IDE. VL/HCC 2017: 19-23 - [c10]Justin Smith, Justin A. Middleton, Nicholas A. Kraft:
Spreadsheet practices and challenges in a large multinational conglomerate. VL/HCC 2017: 155-163 - 2016
- [c9]Justin Smith:
Identifying successful strategies for resolving static analysis notifications. ICSE (Companion Volume) 2016: 662-664 - [c8]Justin Smith:
Resolving Input Validation Vulnerabilities by Retracing Taint Flow Through Source Code. ICSME 2016: 617 - [c7]Brittany Johnson, Rahul Pandita, Justin Smith, Denae Ford, Sarah Elder, Emerson R. Murphy-Hill, Sarah Heckman, Caitlin Sadowski:
A cross-tool communication study on program analysis tool notifications. SIGSOFT FSE 2016: 73-84 - [c6]Denae Ford, Justin Smith, Philip J. Guo, Chris Parnin:
Paradise unplugged: identifying barriers for female participation on stack overflow. SIGSOFT FSE 2016: 846-857 - [c5]Tyler Thomas, Heather Lipford, Bill Chu, Justin Smith, Emerson R. Murphy-Hill:
What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool. WSIW@SOUPS 2016 - [c4]Justin Smith:
Resolving input validation vulnerabilities by retracing taint flow through source code. VL/HCC 2016: 252-253 - 2015
- [c3]Titus Barik, Kevin Lubick, Justin Smith, John Slankas, Emerson R. Murphy-Hill:
Fuse: A Reproducible, Extendable, Internet-Scale Corpus of Spreadsheets. MSR 2015: 486-489 - [c2]Justin Smith, Brittany Johnson, Emerson R. Murphy-Hill, Bill Chu, Heather Richter Lipford:
Questions developers ask while diagnosing potential security vulnerabilities with static analysis. ESEC/SIGSOFT FSE 2015: 248-259 - [c1]Tyler Thomas, Bill Chu, Heather Richter Lipford, Justin Smith, Emerson R. Murphy-Hill:
A study of interactive code annotation for access control vulnerabilities. VL/HCC 2015: 73-77
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint