


default search action
Alvine Boaye Belle
Person information
- affiliation: York University, Toronto, ON, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j9]Nima Shiri Harzevili
, Alvine Boaye Belle
, Junjie Wang
, Song Wang
, Zhen Ming (Jack) Jiang
, Nachiappan Nagappan
:
A Systematic Literature Review on Automated Software Vulnerability Detection Using Machine Learning. ACM Comput. Surv. 57(3): 55:1-55:36 (2025) - 2024
- [j8]Mithila Sivakumar, Alvine Boaye Belle
, Jinjun Shan, Kimya Khakzad Shahandashti:
Prompting GPT -4 to support automatic safety case generation. Expert Syst. Appl. 255: 124653 (2024) - [j7]Kimya Khakzad Shahandashti, Alvine Boaye Belle, Timothy C. Lethbridge
, Oluwafemi Odu, Mithila Sivakumar:
A PRISMA-driven systematic mapping study on system assurance weakeners. Inf. Softw. Technol. 175: 107526 (2024) - [c17]Mohammad Mahdi Mohajer
, Reem Aleithan
, Nima Shiri Harzevili
, Moshi Wei
, Alvine Boaye Belle
, Hung Viet Pham
, Song Wang
:
Effectiveness of ChatGPT for Static Analysis: How Far Are We? AIware 2024 - [c16]Mohammad Mahdi Mohajer, Alvine Boaye Belle, Nima Shiri Harzevili, Junjie Wang, Hadi Hemmati, Song Wang, Zhen Ming (Jack) Jiang:
Fairness Analysis of Machine Learning-Based Code Reviewer Recommendation. BIAS 2024: 46-63 - [c15]Kimya Khakzad Shahandashti
, Mithila Sivakumar
, Mohammad Mahdi Mohajer
, Alvine Boaye Belle
, Song Wang
, Timothy Lethbridge
:
Assessing the Impact of GPT-4 Turbo in Generating Defeaters for Assurance Cases. FORGE 2024: 52-56 - [c14]Alvine Boaye Belle:
Assuring the emotional and cultural intelligence of intelligent software systems. MO2RE 2024: 22-23 - [c13]Alvine Boaye Belle
:
Assuring the emotional and cultural intelligence of intelligent software systems. MO2RE@ICSE 2024: 22-23 - [c12]Mithila Sivakumar, Alvine Boaye Belle, Jinjun Shan, Kimya Khakzad Shahandashti:
Exploring the Capabilities of Large Language Models for the Generation of Safety Cases: the Case of GPT-4. RE Workshops 2024: 35-45 - [c11]Kimya Khakzad Shahandashti, Alvine Boaye Belle, Mohammad Mahdi Mohajer
, Oluwafemi Odu, Timothy C. Lethbridge, Hadi Hemmati, Song Wang:
Using GPT-4 Turbo to Automatically Identify Defeaters in Assurance Cases. RE Workshops 2024: 46-56 - [c10]Mithila Sivakumar, Alvine B. Belle, Jinjun Shan, Oluwafemi Odu, Mingfeng Yuan:
Design of the Safety Case of the Reinforcement Learning-Enabled Component of a Quanser Autonomous Vehicle. RE Workshops 2024: 57-67 - [c9]Ana Moreira, Gunter Mussbacher, João Araújo, Pablo Sánchez, Alvine Boaye Belle:
Preface. RE Workshops 2024: 260-261 - [i17]Mithila Sivakumar, Alvine Boaye Belle, Kimya Khakzad Shahandashti, Oluwafemi Odu, Hadi Hemmati, Segla Kpodjedo, Song Wang, Opeyemi O. Adesina:
I came, I saw, I certified: some perspectives on the safety assurance of cyber-physical systems. CoRR abs/2401.16633 (2024) - [i16]Kimya Khakzad Shahandashti, Mithila Sivakumar, Mohammad Mahdi Mohajer, Alvine Boaye Belle, Song Wang, Timothy C. Lethbridge:
Evaluating the Effectiveness of GPT-4 Turbo in Creating Defeaters for Assurance Cases. CoRR abs/2401.17991 (2024) - [i15]Oluwafemi Odu, Alvine Boaye Belle, Song Wang, Kimya Khakzad Shahandashti:
A PRISMA-Driven Bibliometric Analysis of the Scientific Literature on Assurance Case Patterns. CoRR abs/2407.04961 (2024) - [i14]Kimya Khakzad Shahandashti, Mohammad Mahdi Mohajer, Alvine Boaye Belle, Song Wang, Hadi Hemmati:
Program Slicing in the Era of Large Language Models. CoRR abs/2409.12369 (2024) - [i13]Karolina Tchilinguirova, Alvine Boaye Belle, Gouled Mahamud:
Biases in gendered citation practices: an exploratory study and some reflections on the Matthew and Matilda effects. CoRR abs/2410.02801 (2024) - [i12]Oluwafemi Odu, Alvine B. Belle, Song Wang, Segla Kpodjedo, Timothy C. Lethbridge, Hadi Hemmati:
Automatic Instantiation of Assurance Cases from Patterns Using Large Language Models. CoRR abs/2410.05488 (2024) - [i11]Oluwafemi Odu, Daniel Méndez Beltrán, Emiliano Berrones Gutiérrez, Alvine B. Belle, Melika Sherafat:
SmartGSN: a generative AI-powered online tool for the management of assurance cases. CoRR abs/2410.16675 (2024) - 2023
- [j6]Alvine Boaye Belle, Yixi Zhao:
Evidence-based decision-making: On the use of systematicity cases to check the compliance of reviews with reporting guidelines such as PRISMA 2020. Expert Syst. Appl. 217: 119569 (2023) - [j5]Alvine Boaye Belle
, Callum Sutherland
, Opeyemi O. Adesina
, Sègla Kpodjedo
, Nathanael Ojong
, Lisa Cole
:
Bolstering the Persistence of Black Students in Undergraduate Computer Science Programs: A Systematic Mapping Study. ACM Trans. Comput. Educ. 23(4): 40:1-40:42 (2023) - [c8]Alvine Boaye Belle, Hadi Hemmati, Timothy C. Lethbridge:
Position Paper: A Vision for the Dynamic Safety Assurance of ML-Enabled Autonomous Driving Systems. REW 2023: 297-301 - [i10]Nima Shiri Harzevili, Alvine Boaye Belle, Junjie Wang, Song Wang, Zhen Ming Jiang, Nachiappan Nagappan:
A Survey on Automated Software Vulnerability Detection Using Machine Learning and Deep Learning. CoRR abs/2306.11673 (2023) - [i9]Mohammad Mahdi Mohajer, Alvine Boaye Belle, Nima Shiri Harzevili, Junjie Wang, Hadi Hemmati, Song Wang, Zhen Ming Jiang:
A First Look at Fairness of Machine Learning Based Code Reviewer Recommendation. CoRR abs/2307.11298 (2023) - [i8]Mohammad Mahdi Mohajer, Reem Aleithan, Nima Shiri Harzevili, Moshi Wei, Alvine Boaye Belle, Hung Viet Pham, Song Wang:
SkipAnalyzer: An Embodied Agent for Code Analysis with Large Language Models. CoRR abs/2310.18532 (2023) - [i7]Mithila Sivakumar, Alvine Boaye Belle, Jinjun Shan, Opeyemi Adesina, Song Wang, Marsha Chechik, Marios Fokaefs, Kimya Khakzad Shahandashti, Oluwafemi Odu:
The Last Decade in Review: Tracing the Evolution of Safety Assurance Cases through a Comprehensive Bibliometric Analysis. CoRR abs/2311.07495 (2023) - [i6]Kimya Khakzad Shahandashti, Alvine Boaye Belle, Timothy C. Lethbridge, Oluwafemi Odu, Mithila Sivakumar:
A PRISMA-driven systematic mapping study on system assurance weakeners. CoRR abs/2311.08328 (2023) - [i5]Alvine Boaye Belle:
Assuring the emotional and cultural intelligence of intelligent software systems. CoRR abs/2311.08431 (2023) - [i4]Mithila Sivakumar, Alvine Boaye Belle, Jinjun Shan, Kimya Khakzad Shahandashti:
GPT-4 and Safety Case Generation: An Exploratory Analysis. CoRR abs/2312.05696 (2023) - [i3]Moshi Wei, Nima Shiri Harzevili, Alvine Boaye Belle, Junjie Wang, Lin Shi, Jinqiu Yang, Song Wang, Zhen Ming Jiang:
A Survey on Query-based API Recommendation. CoRR abs/2312.10623 (2023) - 2022
- [j4]Zakeya Namrud, Sègla Kpodjedo, Chamseddine Talhi, Alvine Boaye Belle:
Probing AndroVul dataset for studies on Android malware classification. J. King Saud Univ. Comput. Inf. Sci. 34(9): 6883-6894 (2022) - [c7]Alvine Boaye Belle, Yixi Zhao:
A checklist-based approach to assess the systematicity of the abstracts of reviews self-identifying as systematic reviews. APSEC 2022: 502-506 - [c6]Alvine Boaye Belle, Yixi Zhao:
A new measure to assess the systematicity of the abstracts of reviews self-identifying as systematic reviews. APSEC 2022: 576-577 - 2021
- [i2]Alvine Boaye Belle, Ghizlane El-Boussaidi, Timothy C. Lethbridge, Segla Kpodjedo, Hafedh Mili, Andrés Paz:
Systematically reviewing the layered architectural pattern principles and their use to reconstruct software architectures. CoRR abs/2112.01644 (2021)
2010 – 2019
- 2019
- [c5]Alvine Boaye Belle, Timothy C. Lethbridge, Sègla Kpodjedo, Opeyemi O. Adesina, Miguel A. Garzón:
A Novel Approach to Measure Confidence and Uncertainty in Assurance Cases. RE Workshops 2019: 24-33 - [i1]Alvine Boaye Belle:
Estimation and Prediction of technical debt: a proposal. CoRR abs/1904.01001 (2019) - 2018
- [j3]Opeyemi O. Adesina, Timothy C. Lethbridge
, Stéphane S. Somé, Vahdat Abdelzad, Alvine Boaye Belle:
Improving formal analysis of state machines with particular emphasis on and-cross transitions. Comput. Lang. Syst. Struct. 54: 544-585 (2018) - [j2]Alvine Boaye Belle, Timothy C. Lethbridge
, Miguel Garzón, Opeyemi O. Adesina:
Design and implementation of distributed expert systems: On a control strategy to manage the execution flow of rule activation. Expert Syst. Appl. 96: 129-148 (2018) - 2016
- [j1]Alvine Boaye Belle
, Ghizlane El-Boussaidi
, Segla Kpodjedo:
Combining lexical and structural information to reconstruct software layers. Inf. Softw. Technol. 74: 1-16 (2016) - 2015
- [c4]Alvine Boaye Belle, Ghizlane El-Boussaidi, Christian Desrosiers, Segla Kpodjedo, Hafedh Mili:
The Layered Architecture Recovery as a Quadratic Assignment Problem. ECSA 2015: 339-354 - 2014
- [c3]Alvine Boaye Belle, Ghizlane El-Boussaidi, Hafedh Mili:
Recovering Software Layers from Object Oriented Systems. ENASE 2014: 78-89 - 2013
- [c2]Alvine Boaye Belle, Ghizlane El-Boussaidi, Christian Desrosiers, Hafedh Mili:
The Layered Architecture revisited: Is it an Optimization Problem? SEKE 2013: 344-349 - 2012
- [c1]Ghizlane El-Boussaidi, Alvine Boaye Belle, Stéphane Vaucher, Hafedh Mili:
Reconstructing Architectural Views from Legacy Systems. WCRE 2012: 345-354
Coauthor Index
aka: Timothy C. Lethbridge

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint