Profil

BISSYANDE Tegawendé François d Assise

University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX

ORCID
0000-0001-7270-9869
Main Referenced Co-authors
KLEIN, Jacques  (130)
LE TRAON, Yves  (61)
Li, Li (33)
ALLIX, Kevin  (25)
LI, Li  (24)
Main Referenced Keywords
Android (23); malware (7); Android Security (6); Machine learning (5); Program repair (5);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Security Design and Validation Research Group (SerVal) (12)
SnT (11)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Trustworthy Software Engineering (TruX) (6)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > TruX - Trustworthy Software Engineering (4)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Other (3)
Main Referenced Disciplines
Computer science (156)
Aerospace & aeronautics engineering (1)

Publications (total 157)

The most downloaded
4595 downloads
Li, L., BARTEL, A., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015). https://hdl.handle.net/10993/20058

The most cited

639 citations (Scopus®)

Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). AndroZoo: Collecting Millions of Android Apps for the Research Community. In Proceedings of the 13th International Workshop on Mining Software Repositories (pp. 468--471). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2901739.2903508 https://hdl.handle.net/10993/27396

SONG, Y., EZZINI, S., TANG, X., LOTHRITZ, C., KLEIN, J., BISSYANDE, T. F. D. A., BOYTSOV, A., BLE, U., & GOUJON, A. (In press). Enhancing Text-to-SQL Translation for Financial System Design. In ICSE-SEIP '24: Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Practice (pp. 11). New York, United States: Institute of Electrical and Electronics Engineers Inc.
Peer reviewed

ALECCI, M., RUIZ JIMÉNEZ, P. J., Kevin Allix, BISSYANDE, T. F. D. A., & KLEIN, J. (2024). AndroZoo: A Retrospective with a Glimpse into the Future. 2024 IEEE/ACM 21st International Conference on Mining Software Repositories (MSR).
Peer reviewed

Zhong, W., Li, C., Liu, K., Xu, T., BISSYANDE, T. F. D. A., Ge, J., Luo, B., & Ng, V. (2024). Practical Program Repair via Preference-based Ensemble Strategy. In ICSE'24: Proceedings of the 46th International Conference on Software Engineering (ICSE 2024). Washington, DC, United States: IEEE. doi:10.1145/3597503.3623310
Peer reviewed

ALECCI, M., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). Revisiting Android App Categorization. In ICSE '24: Proceedings of the 46th International Conference on Software Engineering. IEEE Press.
Peer reviewed

ALECCI, M., SAMHI, J., LI, L., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). Improving Logic Bomb Identification in Android Apps via Context-Aware Anomaly Detection. IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2024.3358979
Peer Reviewed verified by ORBi

Guo, J., Liu, J., Liu, X., Wan, Y., Zhao, Y., Li, L., Liu, K., KLEIN, J., & BISSYANDE, T. F. D. A. (2023). PyScribe–Learning to describe python code. Software: Practice and Experience, 1-27. doi:10.1002/spe.3291
Peer Reviewed verified by ORBi

Wang, S., Geng, M., Lin, B., Sun, Z., Wen, M., Liu, Y., Li, L., BISSYANDE, T. F. D. A., & Mao, X. (2023). Natural Language to Code: How Far Are We? In Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (pp. 375–387). Washington, DC, United States: ACM. doi:10.1145/3611643.3616323
Peer reviewed

Lothritz, C., Ezzini, S., Purschke, C., Bissyande, T. F. D. A., Klein, J., Olariu, I., Boytsov, A., Lefebvre, C., & Goujon, A. (2023). Comparing Pre-Training Schemes for Luxembourgish BERT Models. In Proceedings of the 19th Conference on Natural Language Processing (KONVENS 2023).
Peer reviewed

Chen, Q., Zhou, T., Liu, K., Li, L., Ge, C., Liu, Z., KLEIN, J., & BISSYANDE, T. F. D. A. (September 2023). Tips: towards automating patch suggestion for vulnerable smart contracts. Automated Software Engineering, 30 (2). doi:10.1007/s10515-023-00392-y
Peer Reviewed verified by ORBi

Krishnan, P., Cifuentes, C., Li, L., BISSYANDE, T. F. D. A., & KLEIN, J. (September 2023). Why Is Static Application Security Testing Hard to Learn? IEEE Security and Privacy, 21 (5), 68 - 72. doi:10.1109/MSEC.2023.3287206
Editorial reviewed

Kim, K., Ghatpande, S., Kim, D., Zhou, X., Liu, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (26 August 2023). Big Code Search: A Bibliography. ACM Computing Surveys, 56 (1), 1-49. doi:10.1145/3604905
Peer Reviewed verified by ORBi

DANG, X., Li, Y., PAPADAKIS, M., KLEIN, J., BISSYANDE, T. F. D. A., & LE TRAON, Y. (2023). GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3607191
Peer Reviewed verified by ORBi

Kober, M., Samhi, J., Arzt, S., Bissyande, T. F. D. A., & Klein, J. (2023). Sensitive and Personal Data: What Exactly Are You Talking About? In 10th International Conference on Mobile Software Engineering and Systems 2023.
Peer reviewed

LOTHRITZ, C., LEBICHOT, B., ALLIX, K., EZZINI, S., BISSYANDE, T. F. D. A., KLEIN, J., Boytsov, A., Lefebvre, C., & Goujon, A. (2023). Evaluating the Impact of Text De-Identification on Downstream NLP Tasks. In Proceedings of the 24th Nordic Conference on Computational Linguistics (NoDaLiDa). Tartu, Estonia: University of Tartu Library.
Peer reviewed

SONG, Y., EZZINI, S., KLEIN, J., BISSYANDE, T. F. D. A., Lefebvre, C., & Goujon, A. (2023). Letz Translate: Low-Resource Machine Translation for Luxembourgish. In Proceedings - 2023 5th International Conference on Natural Language Processing, ICNLP 2023. Institute of Electrical and Electronics Engineers Inc. doi:10.1109/ICNLP58431.2023.00036
Peer reviewed

Samhi, J., Kober, K., Kabore, A. K., Arzt, S., Bissyande, T. F. D. A., & Klein, J. (2023). Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection. In 30th IEEE International Conference on Software Analysis, Evolution and Reengineering.
Peer reviewed

PIAN, W., Peng, H., TANG, X., SUN, T., TIAN, H., Habib, A., KLEIN, J., & BISSYANDE, T. F. D. A. (February 2023). MetaTPTrans: A Meta Learning Approach for Multilingual Code Representation Learning. Proceedings of the AAAI Conference on Artificial Intelligence, 37 (4), 5239-5247. doi:10.1609/aaai.v37i4.25654
Peer reviewed

Liu, K., Zhang, J., Li, L., Koyuncu, A., Kim, D., Ge, C., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (2023). Reliable Fix Patterns Inferred from Static Checkers for Automated Program Repair. ACM Transactions on Software Engineering and Methodology, 1-38.
Peer Reviewed verified by ORBi

Daoudi, N., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2023). Guided Retraining to Enhance the Detection of Difficult Android Malware. In 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023). doi:10.1145/3597926.3598123
Peer reviewed

OLARIU, I., LOTHRITZ, C., BISSYANDE, T. F. D. A., & KLEIN, J. (2023). Evaluating Data Augmentation Techniques for the Training of Luxembourgish Language Models. In Conference on Natural Language Processing. KONVENS.
Peer reviewed

OLARIU, I., LOTHRITZ, C., KLEIN, J., BISSYANDE, T. F. D. A., Guo, S., & Haddadan, S. (2023). Evaluating Parameter-Efficient Finetuning Approaches for Pre-trained Models on the Financial Domain. In Empirical Methods in Natural Language Processing. Association for Computational Linguistics.
Peer reviewed

Sun, X., Chen, X., Li, L., Cai, H., Grundy, J., Samhi, J., Bissyande, T. F. D. A., & Klein, J. (2022). Demystifying Hidden Sensitive Operations in Android apps. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3574158
Peer Reviewed verified by ORBi

Yan, D., Liu, K., Niu, Y., Li, L., Liu, Z., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (December 2022). Crex: Predicting patch correctness in automated repair of C programs through transfer learning of execution semantics. Information and Software Technology, 152, 1-12. doi:10.1016/j.infsof.2022.107043
Peer Reviewed verified by ORBi

Daoudi, N., Allix, K., Bissyande, T. F. D. A., & Klein, J. (December 2022). Assessing the opportunity of combining state-of-the-art Android malware detectors. Empirical Software Engineering, 28. doi:10.1007/s10664-022-10249-9
Peer Reviewed verified by ORBi

Nirumand, A., Zamani, B., Tork-Ladani, B., Klein, J., & Bissyande, T. F. D. A. (2022). A model-based framework for inter-app Vulnerability analysis of Android applications. Software: Practice and Experience, 1-42. doi:10.1002/spe.3171
Peer Reviewed verified by ORBi

Adjibi, B. V., Mbodji, F. N., Allix, K., Klein, J., & Bissyande, T. F. D. A. (2022). The Devil is in the Details: Unwrapping the Cryptojacking Malware Ecosystem on Android. 2022 IEEE 22nd International Working Conference on Source Code Analysis and Manipulation (SCAM), 153-163. doi:10.1109/SCAM55253.2022.00023
Peer reviewed

Qin, Y., Wang, S., Liu, K., Lin, B., Wu, H., Li, L., Mao, X., & Bissyande, T. F. D. A. (2022). PEELER: Learning to Effectively Predict Flakiness without Running Tests. In Proceedings of the 38th IEEE International Conference on Software Maintenance and Evolution (pp. 1-12).
Peer reviewed

Arslan, Y., Lebichot, B., Allix, K., Veiber, L., Lefebvre, C., Boytsov, A., Goujon, A., Bissyande, T. F. D. A., & Klein, J. (2022). Towards Refined Classifications Driven by SHAP Explanations. In A. Holzinger, P. Kieseberg, A. M. Tjoa, ... E. Weippl (Eds.), Machine Learning and Knowledge Extraction (pp. 68-81). Springer.
Peer reviewed

Sawadogo, D. A., Bissyande, T. F. D. A., Moha, N., Allix, K., Klein, J., Li, L., & Le Traon, Y. (August 2022). SSPCATCHER: Learning to catch security patches. Empirical Software Engineering, 27. doi:10.1007/s10664-022-10168-9
Peer Reviewed verified by ORBi

Kim, K., Ghatpande, S., Liu, K., Koyuncu, A., Kim, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (July 2022). DigBug—Pre/post-processing operator selection for accurate bug localization. Journal of Systems and Software, 189. doi:10.1016/j.jss.2022.111300
Peer Reviewed verified by ORBi

Lothritz, C., Lebichot, B., Allix, K., Veiber, L., Bissyande, T. F. D. A., Klein, J., Boytsov, A., Goujon, A., & Lefebvre, C. (2022). LuxemBERT: Simple and Practical Data Augmentation in Language Model Pre-Training for Luxembourgish. In Proceedings of the Language Resources and Evaluation Conference, 2022 (pp. 5080-5089).
Peer reviewed

Samhi, J., Bissyande, T. F. D. A., & Klein, J. (2022). TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs. In 19th International Conference on Mining Software Repositories, Data Showcase, (MSR 2022). doi:10.1145/3524842.3528020
Peer reviewed

Samhi, J., Gao, J., Daoudi, N., Graux, P., Hoyez, H., Sun, X., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2022). JuCify: A Step Towards Android Code Unification for Enhanced Static Analysis. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3512766
Peer reviewed

Samhi, J., Li, L., Bissyande, T. F. D. A., & Klein, J. (2022). Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3510135
Peer reviewed

Khanfir, A., Koyuncu, A., Papadakis, M., Cordy, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2022). iBiR: Bug Report driven Fault Injection. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3542946
Peer Reviewed verified by ORBi

Daoudi, N., Allix, K., Bissyande, T. F. D. A., & Klein, J. (May 2022). A Deep Dive inside DREBIN: An Explorative Analysis beyond Android Malware Detection Scores. ACM Transactions on Privacy and Security, 25 (2). doi:10.1145/3503463
Peer reviewed

Arslan, Y., Lebichot, B., Allix, K., Veiber, L., Lefebvre, C., Boytsov, A., Goujon, A., Bissyande, T. F. D. A., & Klein, J. (2022). On the Suitability of SHAP Explanations for Refining Classifications. In In Proceedings of the 14th International Conference on Agents and Artificial Intelligence (ICAART 2022). doi:10.5220/0010827700003116
Peer reviewed

Arslan, Y., Allix, K., Lefebvre, C., Boytsov, A., Bissyande, T. F. D. A., & Klein, J. (2022). Exploiting Prototypical Explanations for Undersampling Imbalanced Datasets. In 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA) (pp. 1449-1454). doi:10.1109/ICMLA55696.2022.00228
Peer reviewed

Tian, H., Liu, K., Li, Y., Kabore, A. K., Koyuncu, A., Habib, A., Li, L., Wen, J., Klein, J., & Bissyande, T. F. D. A. (2022). The Best of Both Worlds: Combining Learned Embeddings with Engineered Features for Accurate Prediction of Correct Patches. ACM Transactions on Software Engineering and Methodology.
Peer reviewed

Tian, H., Tang, X., Habib, A., Wang, S., Liu, K., Xia, X., Klein, J., & Bissyande, T. F. D. A. (2022). Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. In Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness.
Peer reviewed

Tian, H., Li, Y., Pian, W., Kabore, A. K., Liu, K., Habib, A., Klein, J., & Bissyande, T. F. D. A. (2022). Predicting Patch Correctness Based on the Similarity of Failing Test Cases. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3511096
Peer Reviewed verified by ORBi

Tian, H., Tang, X., Habib, A., Wang, S., Liu, K., Xia, X., Klein, J., & Bissyande, T. F. D. A. (2022). Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. In Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness.
Peer reviewed

Liu, Y., Li, L., Kong, P., Sun, X., & Bissyande, T. F. D. A. (2021). A First Look at Security Risks of Android TV Apps. In A First Look at Security Risks of Android TV Apps.
Peer reviewed

Sun, T., Daoudi, N., Allix, K., & Bissyande, T. F. D. A. (2021). Android Malware Detection: Looking beyond Dalvik Bytecode. In 2021 36th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW). doi:10.1109/ASEW52652.2021.00019
Peer reviewed

Kong, P., Li, L., Gao, J., Riom, T., Zhao, Y., Bissyande, T. F. D. A., & Klein, J. (2021). ANCHOR: locating android framework-specific crashing faults. Automated Software Engineering. doi:10.1007/s10515-021-00290-1
Peer Reviewed verified by ORBi

Zhang, J., Liu, K., Kim, D., Li, L., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (2021). Revisiting Test Cases to Boost Generate-and-Validate Program Repair. In IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 1-12). doi:10.1109/ICSME52107.2021.00010
Peer reviewed

Zhou, T., Liu, K., Li, L., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (2021). SmartGift: Learning to Generate Practical Inputs for Testing Smart Contracts. In IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 1-12). IEEE. doi:10.1109/ICSME52107.2021.00009
Peer reviewed

Sun, X., Li, L., Bissyande, T. F. D. A., Klein, J., Octeau, D., & Grundy, J. C. (July 2021). Taming Reflection: An Essential Step Toward Whole-program Analysis of Android Apps. ACM Transactions on Software Engineering and Methodology, 30 (3), 1-36. doi:10.1145/3440033
Peer Reviewed verified by ORBi

Zhao, Y., Li, L., Wang, H., Cai, H., Bissyande, T. F. D. A., Klein, J., & Grundy, J. (July 2021). On the Impact of Sample Duplication in Machine Learning based Android Malware Detection. ACM Transactions on Software Engineering and Methodology, 30 (3), 1-38. doi:10.1145/3446905
Peer Reviewed verified by ORBi

Lothritz, C., Allix, K., Lebichot, B., Veiber, L., Bissyande, T. F. D. A., & Klein, J. (2021). Comparing MultiLingual and Multiple MonoLingual Models for Intent Classification and Slot Filling. In 26th International Conference on Applications of Natural Language to Information Systems (pp. 367-375). Springer. doi:10.1007/978-3-030-80599-9_32
Peer reviewed

Samhi, J., Bissyande, T. F. D. A., & Klein, J. (May 2021). Les dangers de pastebin. Multi-System & Internet Security Cookbook, 115.

Samhi, J., Bartel, A., Bissyande, T. F. D. A., & Klein, J. (2021). RAICC: Revealing Atypical Inter-Component Communication in Android Apps. In 43rd International Conference on Software Engineering (ICSE). doi:10.1109/ICSE43902.2021.00126
Peer reviewed

Arslan, Y., Allix, K., Veiber, L., Lothritz, C., Bissyande, T. F. D. A., Klein, J., & Goujon, A. (2021). A Comparison of Pre-Trained Language Models for Multi-Class Text Classification in the Financial Domain. In Companion Proceedings of the Web Conference 2021 (WWW '21 Companion), April 19--23, 2021, Ljubljana, Slovenia (pp. 260–268). New York, United States: Association for Computing Machinery. doi:10.1145/3442442.3451375
Peer reviewed

Riom, T., Sawadogo, D. D. A., Allix, K., Bissyande, T. F. D. A., Moha, N., & Klein, J. (29 March 2021). Revisiting the VCCFinder approach for the identification of vulnerability-contributing commits. Empirical Software Engineering, 26. doi:10.1007/s10664-021-09944-w
Peer Reviewed verified by ORBi

Qin, Y., Wang, S., Liu, K., Mao, X., & Bissyande, T. F. D. A. (2021). On the Impact of Flaky Tests in Automated Program Repair. In 28th IEEE International Conference on Software Analysis, Evolution and Reengineering, Hawaii 9-12 March 2021 (pp. 295-306). doi:10.1109/SANER50967.2021.00035
Peer reviewed

Daoudi, N., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2021). Lessons Learnt on Reproducibility in Machine Learning Based Android Malware Detection. Empirical Software Engineering, 26. doi:10.1007/s10664-021-09955-7
Peer Reviewed verified by ORBi

Kui, L., Li, L., Koyuncu, A., Dongsun, K., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (2021). A critical review on the evaluation of automated program repair systems. Journal of Systems and Software. doi:10.1016/j.jss.2020.110817
Peer Reviewed verified by ORBi

Yang, D., Liu, K., Kim, D., Koyuncu, A., Kim, K., Tian, H., Lei, Y., Mao, X., Klein, J., & Bissyande, T. F. D. A. (2021). Where were the repair ingredients for Defects4j bugs? Empirical Software Engineering, 26 (6), 1--33. doi:10.1007/s10664-021-10003-7
Peer reviewed

Keller, P., Kabore, A. K., Plein, L., Klein, J., Le Traon, Y., & Bissyande, T. F. D. A. (2021). What You See is What it Means! Semantic Representation Learning of Code based on Visualization. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3485135
Peer Reviewed verified by ORBi

Samhi, J., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2021). A First Look at Android Applications in Google Play related to Covid-19. Empirical Software Engineering. doi:10.1007/s10664-021-09943-x
Peer Reviewed verified by ORBi

Daoudi, N., Samhi, J., Kabore, A. K., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2021). DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode. In Communications in Computer and Information Science. Springer. doi:10.1007/978-3-030-87839-9_4
Peer reviewed

Lothritz, C., Allix, K., Veiber, L., Klein, J., & Bissyande, T. F. D. A. (2020). Evaluating Pretrained Transformer-based Models on the Task of Fine-Grained Named Entity Recognition. In Proceedings of the 28th International Conference on Computational Linguistics (pp. 3750–3760).
Peer reviewed

Gao, J., li, L., Kong, P., Bissyande, T. F. D. A., & Klein, J. (2020). Borrowing your enemy's arrows: the case of code reuse in android via direct inter-app code invocation. ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. doi:10.1145/3368089.3409745
Peer reviewed

Li, L., Gao, J., Kong, P., Wang, H., Huang, M., Li, Y., & Bissyande, T. F. D. A. (2020). Knowledgezooclient: Constructing knowledge graph for android. The 3rd International Workshop on Advances in Mobile App Analysis. doi:10.1145/3417113.3422187
Peer reviewed

Ghamizi, S., Rwemalika, R., Cordy, M., Veiber, L., Bissyande, T. F. D. A., Papadakis, M., Klein, J., & Le Traon, Y. (2020). Data-driven simulation and optimization for covid-19 exit strategies. In S. Ghamizi, R. Rwemalika, M. Cordy, L. Veiber, T. F. D. A. Bissyande, M. Papadakis, J. Klein, ... Y. Le Traon, Data-driven simulation and optimization for covid-19 exit strategies (pp. 3434-3442). New York, NY, United States: Association for Computing Machinery. doi:10.1145/3394486.3412863
Peer reviewed

Veiber, L., Allix, K., Arslan, Y., Bissyande, T. F. D. A., & Klein, J. (2020). Challenges Towards Production-Ready Explainable Machine Learning. In L. Veiber, K. Allix, Y. Arslan, T. F. D. A. Bissyande, ... J. Klein, Proceedings of the 2020 USENIX Conference on Operational Machine Learning (OpML 20). USENIX Association.
Peer reviewed

Liu, K., Wang, S., Koyuncu, A., Kim, K., Bissyande, T. F. D. A., Kim, D., Wu, P., Klein, J., Mao, X., & Le Traon, Y. (2020). On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs. In 42nd ACM/IEEE International Conference on Software Engineering (ICSE). doi:10.1145/3377811.3380338
Peer reviewed

Liu, T., Wang, H., Li, L., Luo, X., Dong, F., Guo, Y., Wang, L., Bissyande, T. F. D. A., & Klein, J. (2020). MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps. In Proceedings of The Web Conference 2020 (pp. 1715–1726). New York, NY, USA, Unknown/unspecified: Association for Computing Machinery. doi:10.1145/3366423.3380242
Peer reviewed

Koyuncu, A., Liu, K., Bissyande, T. F. D. A., Kim, D., Klein, J., Monperrus, M., & Le Traon, Y. (2020). FixMiner: Mining relevant fix patterns for automated program repair. Empirical Software Engineering. doi:10.1007/s10664-019-09780-z
Peer Reviewed verified by ORBi

li, L., Gao, J., Bissyande, T. F. D. A., Ma, L., Xia, X., & Klein, J. (11 January 2020). CDA: Characterising Deprecated Android APIs. Empirical Software Engineering, 24 (118), 1-41. doi:10.1007/s10664-019-09764-z
Peer Reviewed verified by ORBi

Gao, J., li, L., Bissyande, T. F. D. A., & Klein, J. (2020). Understanding the Evolution of Android App Vulnerabilities. IEEE Transactions on Reliability. doi:10.1109/TR.2019.2956690
Peer Reviewed verified by ORBi

Tian, H., Liu, K., Kabore, A. K., Koyuncu, A., Li, L., Klein, J., & Bissyande, T. F. D. A. (2020). Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair. In H. Tian, 35th IEEE/ACM International Conference on Automated Software Engineering, September 21-25, 2020, Melbourne, Australia. doi:10.1145/3324884.3416532
Peer reviewed

Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., Le Traon, Y., & Sen, K. (2019). Selecting fault revealing mutants. Empirical Software Engineering, 1-54. doi:10.1007/s10664-019-09778-7
Peer Reviewed verified by ORBi

Kang, H. J., Bissyande, T. F. D. A., & David, L. (2019). Assessing the Generalizability of code2vec Token Embeddings. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (pp. 1-12). doi:10.1109/ASE.2019.00011
Peer reviewed

Oumaziz, M., Falleri, J.-R., Blanc, X., Bissyande, T. F. D. A., & Klein, J. (2019). Handling duplicates in Dockerfiles families: Learning from experts. In 35th IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 524-535). IEEE.
Peer reviewed

Koyuncu, A., Liu, K., Bissyande, T. F. D. A., Kim, D., Monperrus, M., Klein, J., & Le Traon, Y. (2019). iFixR: bug report driven program repair. In ESEC/FSE 2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. doi:10.1145/3338906.3338935
Peer reviewed

Li, L., Riom, T., Bissyande, T. F. D. A., Wang, H., Klein, J., & Le Traon, Y. (August 2019). Revisiting the impact of common libraries for android-related investigations. Journal of Systems and Software, 154, 157-175. doi:10.1016/j.jss.2019.04.065
Peer Reviewed verified by ORBi

Kong, P., li, L., Gao, J., Bissyande, T. F. D. A., & Klein, J. (15 July 2019). Mining Android Crash Fixes in the Absence of Issue- and Change-Tracking Systems [Paper presentation]. The 28th International Symposium on Software Testing and Analysis, Beijing, China. doi:10.1145/3293882.3330572

Liu, K., Koyuncu, A., Kim, D., & Bissyande, T. F. D. A. (2019). TBar: Revisiting Template-based Automated Program Repair. In 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). doi:10.1145/3293882.3330577
Peer reviewed

Liu, K., Kim, D., Bissyande, T. F. D. A., Kim, T., Kim, K., Koyuncu, A., Kim, S., & Le Traon, Y. (2019). Learning to Spot and Refactor Inconsistent Method Names. In 41st ACM/IEEE International Conference on Software Engineering (ICSE). Montreal, Canada: IEEE.
Peer reviewed

Liu, K., Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., & Le Traon, Y. (2019). You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems. In The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019). Xi'an, China: IEEE. doi:10.1109/ICST.2019.00020
Peer reviewed

Li, D., Li, L., Kim, D., Bissyande, T. F. D. A., Lo, D., & Le Traon, Y. (2019). Watch out for This Commit! A Study of Influential Software Changes. Journal of Software: Evolution and Process. doi:10.1002/smr.2181
Peer Reviewed verified by ORBi

Li, L., Bissyande, T. F. D. A., Wang, H., & Klein, J. (March 2019). On Identifying and Explaining Similarities in Android Apps. Journal of Computer Science and Technology, 34 (2), 437-455. doi:10.1007/s11390-019-1918-8
Peer reviewed

Li, L., Bissyande, T. F. D. A., & Klein, J. (2019). Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2019.2901679
Peer reviewed

Gao, J., Li, L., Kong, P., Bissyande, T. F. D. A., & Klein, J. (2019). Should You Consider Adware as Malware in Your Study? In 26th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering.
Peer reviewed

Liu, K., Koyuncu, A., Dongsun, K., & Bissyande, T. F. D. A. (2019). AVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations. In The 26th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER-2019). Hangzhou, China: IEEE. doi:10.1109/SANER.2019.8667970
Peer reviewed

Gao, J., Li, Bissyande, T. F. D. A., & Klein, J. (2019). On the Evolution of Mobile App Complexity. Proceedings of 2019 24th International Conference on Engineering of Complex Computer Systems.
Peer reviewed

Gao, J., Kong, P., Li, L., Bissyande, T. F. D. A., & Klein, J. (2019). Negative Results on Mining Crypto-API Usage Rules in Android Apps. Proceedings of the 16th International Conference on Mining Software Repositories. doi:10.1109/MSR.2019.00065
Peer reviewed

Liu, K., Koyuncu, A., Kim, K., Kim, D., & Bissyande, T. F. D. A. (2018). LSRepair: Live Search of Fix Ingredients for Automated Program Repair. In 25th Asia-Pacific Software Engineering Conference (APSEC).
Peer reviewed

Dong, F., Wang, H., Li, L., Guo, Y., Bissyande, T. F. D. A., Liu, T., Xu, G., & Klein, J. (2018). FraudDroid: Automated Ad Fraud Detection for Android Apps. In ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018) (pp. 257-268). doi:10.1145/3236024.3236045
Peer reviewed

Li, L., Bissyande, T. F. D. A., & Klein, J. (2018). MoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsistencies. In 29th IEEE International Symposium on Software Reliability Engineering (ISSRE) (pp. 212-223).
Peer reviewed

Kong, P., Li, L., Gao, J., Liu, K., Bissyande, T. F. D. A., & Klein, J. (2018). Automated Testing of Android Apps: A Systematic Literature Review. IEEE Transactions on Reliability, 1-22. doi:10.1109/TR.2018.2865733
Peer Reviewed verified by ORBi

Liu, K., Kim, D., Koyuncu, A., Li, L., Bissyande, T. F. D. A., & Le Traon, Y. (2018). A Closer Look at Real-World Patches. In 34th IEEE International Conference on Software Maintenance and Evolution (ICSME). doi:10.1109/ICSME.2018.00037
Peer reviewed

Li, L., Bissyande, T. F. D. A., Wang, H., & Klein, J. (2018). CiD: Automating the Detection of API-related Compatibility Issues in Android Apps. In International Symposium on Software Testing and Analysis (ISSTA) (pp. 153-163). ACM. doi:10.1145/3213846.3213857
Peer reviewed

Kim, K., Kim, D., Bissyande, T. F. D. A., Choi, E., Li, L., Klein, J., & Le Traon, Y. (2018). FaCoY - A Code-to-Code Search Engine. In International Conference on Software Engineering (ICSE 2018).
Peer reviewed

Li, L., Gao, J., Bissyande, T. F. D. A., Ma, L., Xia, X., & Klein, J. (2018). Characterising Deprecated Android APIs. In 15th International Conference on Mining Software Repositories (MSR 2018) (pp. 254-264). ACM.
Peer reviewed

Martinez, J., Sottet, J.-S., Garcia-Frey, A., Bissyande, T. F. D. A., Ziadi, T., Klein, J., Temple, P., Mathieu, A., & Le Traon, Y. (2018). Towards Estimating and Predicting User Perception on Software Product Variants. In 17th International Conference on Software Reuse (ICSR) (pp. 23-40). Springer, LNCS.
Peer reviewed

Li, D., Lin, J., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification. In 21st International Conference on Extending Database Technology.
Peer reviewed

Liu, K., Kim, D., Bissyande, T. F. D. A., Yoo, S., & Le Traon, Y. (2018). Mining Fix Patterns for FindBugs Violations. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2018.2884955
Peer reviewed

Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., & Le Traon, Y. (2018). Predicting the Fault Revelation Utility of Mutants. In 40th International Conference on Software Engineering, Gothenburg, Sweden, May 27 - 3 June 2018.
Peer reviewed

Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants. Information and Software Technology. doi:10.1016/j.infsof.2018.07.005
Peer Reviewed verified by ORBi

Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (January 2018). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search. Empirical Software Engineering, 90, 27-39. doi:10.1007/s10664-017-9544-y
Peer Reviewed verified by ORBi

Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017). On Locating Malicious Code in Piggybacked Android Apps. Journal of Computer Science and Technology. doi:10.1007/s11390-017-1786-z
Peer reviewed

Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Schummer, P., Muller, B., & Solvi, A.-M. (2017). Towards a Plug-and-Play and Holistic Data Mining Framework for Understanding and Facilitating Operations in Smart Buildings. (TR-SNT-2017-5). SnT.

Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., Monperrus, M., & Le Traon, Y. (July 2017). Impact of Tool Support in Patch Construction [Paper presentation]. 2017 International Symposium on Software Testing & Analysis (ISSTA). doi:10.1145/3092703.3092713

Hurier, M., Suarez-Tangil, G., Dash, S. K., Bissyande, T. F. D. A., Le Traon, Y., Klein, J., & Cavallaro, L. (2017). Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware. In MSR 2017.
Peer reviewed

Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (May 2017). Understanding Android App Piggybacking [Poster presentation]. The 39th International Conference on Software Engineering.

Li, L., Bissyande, T. F. D. A., Bartel, A., Klein, J., & Le Traon, Y. (May 2017). The Multi-Generation Repackaging Hypothesis [Poster presentation]. The 39th International Conference on Software Engineering.

Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017). Automatically Locating Malicious Packages in Piggybacked Android Apps. Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017).
Peer reviewed

Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2017). Sensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements. In The 32nd ACM Symposium on Applied Computing (SAC 2017). doi:10.1145/3019612.3019699
Peer reviewed

Yang, X., Lo, D., Li, L., Xia, X., Bissyande, T. F. D. A., & Klein, J. (2017). Comprehending Malicious Android Apps By Mining Topic-Specific Data Flow Signatures. Information and Software Technology. doi:10.1016/j.infsof.2017.04.007
Peer reviewed

Li, L., Bissyande, T. F. D. A., & Klein, J. (2017). SimiDroid: Identifying and Explaining Similarities in Android Apps. Abstract book of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.230
Peer reviewed

Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (2017). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search.

Li, L., Bissyande, T. F. D. A., Papadakis, M., Rasthofer, S., Bartel, A., Octeau, D., Klein, J., & Le Traon, Y. (2017). Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology. doi:10.1016/j.infsof.2017.04.001
Peer reviewed

Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (2017). Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2017.2656460
Peer reviewed

Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo-NG: A Practical Language Modeling Approach for Time Series Classification. In The 15th International Symposium on Intelligent Data Analysis.
Peer reviewed

Li, L., Bissyande, T. F. D. A., Le Traon, Y., & Klein, J. (2016). Accessing Inaccessible Android APIs: An Empirical Study. In The 32nd International Conference on Software Maintenance and Evolution (ICSME) (pp. 12).
Peer reviewed

Manukyan, A., Olivares Mendez, M. A., Bissyande, T. F. D. A., Voos, H., & Le Traon, Y. (2016). UAV degradation identification for pilot notification using machine learning techniques. Proceedings of 21st IEEE International Conference on Emerging Technologies and Factory Automation ETFA 2016. doi:10.1109/ETFA.2016.7733537
Peer reviewed

Li, L., Bissyande, T. F. D. A., Octeau, D., & Klein, J. (2016). Reflection-Aware Static Analysis of Android Apps. In The 31st IEEE/ACM International Conference on Automated Software (ASE) (pp. 6). doi:10.1145/2970276.2970277
Peer reviewed

Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (September 2016). Time Series Classification with Discrete Wavelet Transformed Data. International Journal of Software Engineering and Knowledge Engineering, 26 (9&10), 1361–1377. doi:10.1142/S0218194016400088
Peer Reviewed verified by ORBi

Jimenez, M., Papadakis, M., Bissyande, T. F. D. A., & Klein, J. (2016). Profiling Android Vulnerabilities. In 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS 2016) (pp. 222-229). IEEE Computer Society. doi:10.1109/QRS.2016.34
Peer reviewed

Li, D., Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo: A Language Modeling Approach for Time Series Classification. In 12th International Conference on Machine Learning and Data Mining (MLDM 2016).
Peer reviewed

Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study. In The 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016).
Peer reviewed

Li, L., Bissyande, T. F. D. A., Octeau, D., & Klein, J. (2016). DroidRA: Taming Reflection to Support Whole-Program Analysis of Android Apps. In The 2016 International Symposium on Software Testing and Analysis. doi:10.1145/2931037.2931044
Peer reviewed

Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). AndroZoo: Collecting Millions of Android Apps for the Research Community. In Proceedings of the 13th International Workshop on Mining Software Repositories (pp. 468--471). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2901739.2903508
Peer reviewed

Li, L., Bissyande, T. F. D. A., Papadakis, M., Rasthofer, S., BARTEL, A., Octeau, D., Klein, J., & Le Traon, Y. (2016). Static Analysis of Android Apps: A Systematic Literature Review. SnT.

Li, L., Li, D., Bissyande, T. F. D. A., Lo, D., Klein, J., & Le Traon, Y. (2016). Ungrafting Malicious Code from Piggybacked Android Apps. SnT.

Li, L., Li, D., BARTEL, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Towards a Generic Framework for Automating Extensive Analysis of Android Applications. In The 31st ACM/SIGAPP Symposium on Applied Computing (SAC 2016).
Peer reviewed

Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). An Investigation into the Use of Common Libraries in Android Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 12). doi:10.1109/SANER.2016.52
Peer reviewed

Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Parameter Values of Android APIs: A Preliminary Study on 100,000 Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 5). doi:10.1109/SANER.2016.51
Peer reviewed

Li, D., Bissyande, T. F. D. A., Kubler, S., Klein, J., & Le Traon, Y. (2016). Profiling household appliance electricity usage with n-gram language modeling. In The 2016 IEEE International Conference on Industrial Technology (ICIT 2016).
Peer reviewed

Hurier, M., Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. In Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference (pp. 142--162). Springer. doi:10.1007/978-3-319-40667-1_8
Peer reviewed

Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Feature Location Benchmark for Software Families using Eclipse Community Releases. In Software Reuse: Bridging with Social-Awareness, ICSR 2016 Proceedings. doi:10.1007/978-3-319-35122-3_18
Peer reviewed

Li, L., Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Mining Families of Android Applications for Extractive SPL Adoption. In The 20th International Systems and Software Product Line Conference (SPLC 2016).
Peer reviewed

Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Name Suggestions during Feature Identification: The VariClouds Approach. In 20th International Systems and Software Product Line Conference (SPLC 2016) proceedings.
Peer reviewed

Olivares Mendez, M. A., Fu, C., Ludivig, P., Bissyande, T. F. D. A., Kannan, S., Zurad, M., Annaiyan, A., Voos, H., & Campoy, P. (12 December 2015). Towards an Autonomous Vision-Based Unmanned Aerial System against Wildlife Poachers. Sensors, 15 (12), 29861. doi:10.3390/s151229861
Peer reviewed

Bissyande, T. F. D. A., Ouoba, J., Ahmat, D., Ouédraogo, F., Béré, C., Bikienga, M., Sere, A., Dandjinou, M., & Sié, O. (2015). Vulnerabilities of Government Websites in a Developing Country – The Case of Burkina Faso. In 7th International Conference on e‐Infrastructure and e‐Services for Developing Countries.
Peer reviewed

Li, L., Allix, K., Li, D., BARTEL, A., Bissyande, T. F. D. A., & Klein, J. (2015). Potential Component Leaks in Android Apps: An Investigation into a new Feature Set for Malware Detection. In The 2015 IEEE International Conference on Software Quality, Reliability and Security (QRS 2015). doi:10.1109/QRS.2015.36
Peer reviewed

Bissyande, T. F. D. A. (2015). Harvesting Fix Hints in the History of Bugs. (TR-SNT-2015-6). SnT, University of Luxembourg.

Li, L., Allix, K., Li, D., BARTEL, A., Bissyande, T. F. D. A., & Klein, J. (2015). A Study of Potential Component Leaks in Android Apps. SnT Centre - University of Luxembourg.

Li, L., BARTEL, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. In International Conference on ICT Systems Security and Privacy Protection (SEC 2015).
Peer reviewed

Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (March 2015). Using An Instrumentation based Approach to Detect Inter-Component Leaks in Android Apps [Paper presentation]. Grande Region Security and Reliability Day 2015.

Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. In Engineering Secure Software and Systems - 7th International Symposium ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings (pp. 51-67). Springer International Publishing. doi:10.1007/978-3-319-15618-7_5
Peer reviewed

Li, L., BARTEL, A., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015).
Peer reviewed

Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Automating the Extraction of Model-based Software Product Lines from Model Variants. In 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015). doi:10.1109/ASE.2015.44
Peer reviewed

Allix, K., Bissyande, T. F. D. A., Jerome, Q., Klein, J., State, R., & Le Traon, Y. (2014). Empirical assessment of machine learning-based malware detectors for Android: Measuring the Gap between In-the-Lab and In-the-Wild Validation Scenarios. Empirical Software Engineering, 1-29. doi:10.1007/s10664-014-9352-6
Peer reviewed

Ouoba, J., & Bissyande, T. F. D. A. (2014). Sensing in the Urban Technological Deserts-A Position Paper for Smart Cities in Least Developed Countries. In International Workshop on Web Intelligence and Smart Sensing. doi:10.1145/2637064.2637097
Peer reviewed

Allix, K., Jerome, Q., Bissyande, T. F. D. A., Klein, J., State, R., & Le Traon, Y. (2014). A Forensic Analysis of Android Malware -- How is Malware Written and How It Could Be Detected? In Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference (pp. 384--393). Washington, DC, USA, Unknown/unspecified: IEEE Computer Society. doi:10.1109/COMPSAC.2014.61
Peer reviewed

Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2014). Machine Learning-Based Malware Detection for Android Applications: History Matters! Luxembourg, Luxembourg: University of Luxembourg, SnT.

Bissyande, T. F. D. A., Réveillère, L., Lawall, J., & Muller, G. (2014). Ahead of time static analysis for automatic generation of debugging interfaces to the Linux kernel. Automated Software Engineering, 1-39. doi:10.1007/s10515-014-0152-4
Peer Reviewed verified by ORBi

Allix, K., Bissyande, T. F. D. A., Jerome, Q., Klein, J., State, R., & Le Traon, Y. (2014). Large-scale Machine Learning-based Malware Detection: Confronting the "10-fold Cross Validation" Scheme with Reality. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (pp. 163--166). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2557547.2557587
Peer reviewed

Bissyande, T. F. D. A., & van Stam, G. (Eds.). (2014). e-Infrastructure and e-Services for Developing Countries. Springer. doi:10.1007/978-3-319-08368-1

Bissyande, T. F. D. A., Lo, D., Jiang, L., Reveillere, L., Klein, J., & Le Traon, Y. (2013). Got Issues? Who Cares About It? A Large Scale Investigation of Issue Trackers from GitHub. In Proceedings of the 24th International Symposium on Software Reliability Engineering (ISSRE 2013). doi:10.1109/ISSRE.2013.6698918
Peer reviewed

Bissyande, T. F. D. A., Réveillère, L., Lawall, J., Bromberg, D., & Muller, G. (2013). Implementing an Embedded Compiler using Program Transformation Rules. Software: Practice and Experience, 1..20. doi:10.1002/spe.2225
Peer reviewed

Pavneet Singh, K., Bissyande, T. F. D. A., Lo, D., & Jiang, L. (2013). An Empirical Study of Adoption of Software Testing in Open Source Projects. In Proceedings of the 13th International Conference on Quality Software (QSIC 2013).
Peer reviewed

Ahmat, D., Bissyande, T. F. D. A., & Magoni, D. (2013). Towards Securing Communications in Infrastructure-poor Areas. In Proceedings of the 5th EAI International Conference on e-Infrastructure and e-Services for Developing Countries.
Peer reviewed

Bissyande, T. F. D. A., Ahmat, D., Ouoba, J., van Stam, G., Klein, J., & Le Traon, Y. (2013). Sustainable ICT4D in Africa: Where Do We Go From Here? In EAI International Conference on e-Infrastructure and e-Services for Developing Countries.
Peer reviewed

Contact ORBilu