![]() ![]() | Zhong, W., Li, C., Liu, K., Xu, T., BISSYANDE, T. F. D. A., Ge, J., Luo, B., & Ng, V. (2024). Practical Program Repair via Preference-based Ensemble Strategy. In Proceedings of the 46th International Conference on Software Engineering (ICSE 2024). Washington, DC, United States: IEEE. doi:10.1145/3597503.3623310 ![]() |
![]() ![]() | ALECCI, M., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). Revisiting Android App Categorization. International Conference on Software Engineering 2024. ![]() |
![]() ![]() | Wang, S., Geng, M., Lin, B., Sun, Z., Wen, M., Liu, Y., Li, L., BISSYANDE, T. F. D. A., & Mao, X. (2023). Natural Language to Code: How Far Are We? In Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (pp. 375–387). Washington, DC, United States: ACM. doi:10.1145/3611643.3616323 ![]() |
![]() ![]() | Lothritz, C., Ezzini, S., Purschke, C., Bissyande, T. F. D. A., Klein, J., Olariu, I., Boytsov, A., Lefebvre, C., & Goujon, A. (2023). Comparing Pre-Training Schemes for Luxembourgish BERT Models. In Proceedings of the 19th Conference on Natural Language Processing (KONVENS 2023). ![]() |
![]() ![]() | Chen, Q., Zhou, T., Liu, K., Li, L., Ge, C., Liu, Z., KLEIN, J., & BISSYANDE, T. F. D. A. (September 2023). Tips: towards automating patch suggestion for vulnerable smart contracts. Automated Software Engineering, 30 (2). doi:10.1007/s10515-023-00392-y ![]() |
![]() ![]() | Krishnan, P., Cifuentes, C., Li, L., BISSYANDE, T. F. D. A., & KLEIN, J. (September 2023). Why Is Static Application Security Testing Hard to Learn? IEEE Security and Privacy, 21 (5), 68 - 72. doi:10.1109/MSEC.2023.3287206 ![]() |
![]() ![]() | Kim, K., Ghatpande, S., Kim, D., Zhou, X., Liu, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (26 August 2023). Big Code Search: A Bibliography. ACM Computing Surveys, 56 (1), 1-49. doi:10.1145/3604905 ![]() |
![]() ![]() | DANG, X., Li, Y., PAPADAKIS, M., KLEIN, J., BISSYANDE, T. F. D. A., & LE TRAON, Y. (2023). GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3607191 ![]() |
![]() ![]() | Kober, M., Samhi, J., Arzt, S., Bissyande, T. F. D. A., & Klein, J. (2023). Sensitive and Personal Data: What Exactly Are You Talking About? In 10th International Conference on Mobile Software Engineering and Systems 2023. ![]() |
![]() ![]() | LOTHRITZ, C., LEBICHOT, B., ALLIX, K., EZZINI, S., BISSYANDE, T. F. D. A., KLEIN, J., Boytsov, A., Lefebvre, C., & Goujon, A. (2023). Evaluating the Impact of Text De-Identification on Downstream NLP Tasks. In Proceedings of the 24th Nordic Conference on Computational Linguistics (NoDaLiDa). Tartu, Estonia: University of Tartu Library. ![]() |
![]() ![]() | SONG, Y., EZZINI, S., KLEIN, J., BISSYANDE, T. F. D. A., Lefebvre, C., & Goujon, A. (2023). Letz Translate: Low-Resource Machine Translation for Luxembourgish. In Proceedings - 2023 5th International Conference on Natural Language Processing, ICNLP 2023. Institute of Electrical and Electronics Engineers Inc. doi:10.1109/ICNLP58431.2023.00036 ![]() |
![]() ![]() | Samhi, J., Kober, K., Kabore, A. K., Arzt, S., Bissyande, T. F. D. A., & Klein, J. (2023). Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection. In 30th IEEE International Conference on Software Analysis, Evolution and Reengineering. ![]() |
![]() ![]() | Liu, K., Zhang, J., Li, L., Koyuncu, A., Kim, D., Ge, C., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (2023). Reliable Fix Patterns Inferred from Static Checkers for Automated Program Repair. ACM Transactions on Software Engineering and Methodology, 1-38. ![]() |
![]() ![]() | Daoudi, N., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2023). Guided Retraining to Enhance the Detection of Difficult Android Malware. In 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023). doi:10.1145/3597926.3598123 ![]() |
![]() ![]() | OLARIU, I., LOTHRITZ, C., BISSYANDE, T. F. D. A., & KLEIN, J. (2023). Evaluating Data Augmentation Techniques for the Training of Luxembourgish Language Models. In Conference on Natural Language Processing. KONVENS. ![]() |
![]() ![]() | OLARIU, I., LOTHRITZ, C., KLEIN, J., BISSYANDE, T. F. D. A., GUO, S., & HADDADAN, S. (2023). Evaluating Parameter-Efficient Finetuning Approaches for Pre-trained Models on the Financial Domain. In Empirical Methods in Natural Language Processing. Association for Computational Linguistics. ![]() |
![]() ![]() | Yan, D., Liu, K., Niu, Y., Li, L., Liu, Z., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (December 2022). Crex: Predicting patch correctness in automated repair of C programs through transfer learning of execution semantics. Information and Software Technology, 152, 1-12. doi:10.1016/j.infsof.2022.107043 ![]() |
![]() ![]() | Sun, X., Chen, X., Li, L., Cai, H., Grundy, J., Samhi, J., Bissyande, T. F. D. A., & Klein, J. (2022). Demystifying Hidden Sensitive Operations in Android apps. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3574158 ![]() |
![]() ![]() | Daoudi, N., Allix, K., Bissyande, T. F. D. A., & Klein, J. (December 2022). Assessing the opportunity of combining state-of-the-art Android malware detectors. Empirical Software Engineering, 28. doi:10.1007/s10664-022-10249-9 ![]() |
![]() ![]() | Nirumand, A., Zamani, B., Tork-Ladani, B., Klein, J., & Bissyande, T. F. D. A. (2022). A model-based framework for inter-app Vulnerability analysis of Android applications. Software: Practice and Experience, 1-42. doi:10.1002/spe.3171 ![]() |
![]() ![]() | Qin, Y., Wang, S., Liu, K., Lin, B., Wu, H., Li, L., Mao, X., & Bissyande, T. F. D. A. (2022). PEELER: Learning to Effectively Predict Flakiness without Running Tests. In Proceedings of the 38th IEEE International Conference on Software Maintenance and Evolution (pp. 1-12). ![]() |
![]() ![]() | Adjibi, B. V., Mbodji, F. N., Allix, K., Klein, J., & Bissyande, T. F. D. A. (2022). The Devil is in the Details: Unwrapping the Cryptojacking Malware Ecosystem on Android. 2022 IEEE 22nd International Working Conference on Source Code Analysis and Manipulation (SCAM), 153-163. doi:10.1109/SCAM55253.2022.00023 ![]() |
![]() ![]() | Arslan, Y., Lebichot, B., Allix, K., Veiber, L., Lefebvre, C., Boytsov, A., Goujon, A., Bissyande, T. F. D. A., & Klein, J. (2022). Towards Refined Classifications Driven by SHAP Explanations. In A. Holzinger, P. Kieseberg, A. M. Tjoa, ... E. Weippl (Eds.), Machine Learning and Knowledge Extraction (pp. 68-81). Springer. ![]() |
![]() ![]() | Sawadogo, D. A., Bissyande, T. F. D. A., Moha, N., Allix, K., Klein, J., Li, L., & Le Traon, Y. (August 2022). SSPCATCHER: Learning to catch security patches. Empirical Software Engineering, 27. doi:10.1007/s10664-022-10168-9 ![]() |
![]() ![]() | Kim, K., Ghatpande, S., Liu, K., Koyuncu, A., Kim, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (July 2022). DigBug—Pre/post-processing operator selection for accurate bug localization. Journal of Systems and Software, 189. doi:10.1016/j.jss.2022.111300 ![]() |
![]() ![]() | Lothritz, C., Lebichot, B., Allix, K., Veiber, L., Bissyande, T. F. D. A., Klein, J., Boytsov, A., Goujon, A., & Lefebvre, C. (2022). LuxemBERT: Simple and Practical Data Augmentation in Language Model Pre-Training for Luxembourgish. In Proceedings of the Language Resources and Evaluation Conference, 2022 (pp. 5080-5089). ![]() |
![]() ![]() | Samhi, J., Bissyande, T. F. D. A., & Klein, J. (2022). TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs. In 19th International Conference on Mining Software Repositories, Data Showcase, (MSR 2022). doi:10.1145/3524842.3528020 ![]() |
![]() ![]() | Samhi, J., Li, L., Bissyande, T. F. D. A., & Klein, J. (2022). Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3510135 ![]() |
![]() ![]() | Samhi, J., Gao, J., Daoudi, N., Graux, P., Hoyez, H., Sun, X., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2022). JuCify: A Step Towards Android Code Unification for Enhanced Static Analysis. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3512766 ![]() |
![]() ![]() | Khanfir, A., Koyuncu, A., Papadakis, M., Cordy, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2022). iBiR: Bug Report driven Fault Injection. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3542946 ![]() |
![]() ![]() | Daoudi, N., Allix, K., Bissyande, T. F. D. A., & Klein, J. (May 2022). A Deep Dive inside DREBIN: An Explorative Analysis beyond Android Malware Detection Scores. ACM Transactions on Privacy and Security, 25 (2). doi:10.1145/3503463 ![]() |
![]() ![]() | Arslan, Y., Lebichot, B., Allix, K., Veiber, L., Lefebvre, C., Boytsov, A., Goujon, A., Bissyande, T. F. D. A., & Klein, J. (2022). On the Suitability of SHAP Explanations for Refining Classifications. In In Proceedings of the 14th International Conference on Agents and Artificial Intelligence (ICAART 2022). ![]() |
![]() ![]() | Tian, H., Liu, K., Li, Y., Kabore, A. K., Koyuncu, A., Habib, A., Li, L., Wen, J., Klein, J., & Bissyande, T. F. D. A. (2022). The Best of Both Worlds: Combining Learned Embeddings with Engineered Features for Accurate Prediction of Correct Patches. ACM Transactions on Software Engineering and Methodology. ![]() |
![]() ![]() | Tian, H., Li, Y., Pian, W., Kabore, A. K., Liu, K., Habib, A., Klein, J., & Bissyande, T. F. D. A. (2022). Predicting Patch Correctness Based on the Similarity of Failing Test Cases. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3511096 ![]() |
![]() ![]() | Tian, H., Tang, X., Habib, A., Wang, S., Liu, K., Xia, X., Klein, J., & Bissyande, T. F. D. A. (2022). Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. In Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. ![]() |
![]() ![]() | Arslan, Y., Allix, K., Lefebvre, C., Boytsov, A., Bissyande, T. F. D. A., & Klein, J. (2022). Exploiting Prototypical Explanations for Undersampling Imbalanced Datasets. In 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA) (pp. 1449-1454). doi:10.1109/ICMLA55696.2022.00228 ![]() |
![]() ![]() | Tian, H., Tang, X., Habib, A., Wang, S., Liu, K., Xia, X., Klein, J., & Bissyande, T. F. D. A. (2022). Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. In Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. ![]() |
![]() ![]() | Sun, T., Daoudi, N., Allix, K., & Bissyande, T. F. D. A. (2021). Android Malware Detection: Looking beyond Dalvik Bytecode. In 2021 36th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW). doi:10.1109/ASEW52652.2021.00019 ![]() |
![]() ![]() | Liu, Y., Li, L., Kong, P., Sun, X., & Bissyande, T. F. D. A. (2021). A First Look at Security Risks of Android TV Apps. In A First Look at Security Risks of Android TV Apps. ![]() |
![]() ![]() | Kong, P., Li, L., Gao, J., Riom, T., Zhao, Y., Bissyande, T. F. D. A., & Klein, J. (2021). ANCHOR: locating android framework-specific crashing faults. Automated Software Engineering. doi:10.1007/s10515-021-00290-1 ![]() |
![]() ![]() | Zhou, T., Liu, K., Li, L., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (2021). SmartGift: Learning to Generate Practical Inputs for Testing Smart Contracts. In IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 1-12). IEEE. doi:10.1109/ICSME52107.2021.00009 ![]() |
![]() ![]() | Zhang, J., Liu, K., Kim, D., Li, L., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (2021). Revisiting Test Cases to Boost Generate-and-Validate Program Repair. In IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 1-12). doi:10.1109/ICSME52107.2021.00010 ![]() |
![]() ![]() | Zhao, Y., Li, L., Wang, H., Cai, H., Bissyande, T. F. D. A., Klein, J., & Grundy, J. (July 2021). On the Impact of Sample Duplication in Machine Learning based Android Malware Detection. ACM Transactions on Software Engineering and Methodology, 30 (3), 1-38. doi:10.1145/3446905 ![]() |
![]() ![]() | Sun, X., Li, L., Bissyande, T. F. D. A., Klein, J., Octeau, D., & Grundy, J. C. (July 2021). Taming Reflection: An Essential Step Toward Whole-program Analysis of Android Apps. ACM Transactions on Software Engineering and Methodology, 30 (3), 1-36. doi:10.1145/3440033 ![]() |
![]() ![]() | Lothritz, C., Allix, K., Lebichot, B., Veiber, L., Bissyande, T. F. D. A., & Klein, J. (2021). Comparing MultiLingual and Multiple MonoLingual Models for Intent Classification and Slot Filling. In 26th International Conference on Applications of Natural Language to Information Systems (pp. 367-375). Springer. doi:10.1007/978-3-030-80599-9_32 ![]() |
Samhi, J., Bissyande, T. F. D. A., & Klein, J. (May 2021). Les dangers de pastebin. Multi-System & Internet Security Cookbook, 115. |
![]() ![]() | Samhi, J., Bartel, A., Bissyande, T. F. D. A., & Klein, J. (2021). RAICC: Revealing Atypical Inter-Component Communication in Android Apps. In 43rd International Conference on Software Engineering (ICSE). doi:10.1109/ICSE43902.2021.00126 ![]() |
![]() ![]() | Arslan, Y., Allix, K., Veiber, L., Lothritz, C., Bissyande, T. F. D. A., Klein, J., & Goujon, A. (2021). A Comparison of Pre-Trained Language Models for Multi-Class Text Classification in the Financial Domain. In Companion Proceedings of the Web Conference 2021 (WWW '21 Companion), April 19--23, 2021, Ljubljana, Slovenia (pp. 260–268). New York, United States: Association for Computing Machinery. doi:10.1145/3442442.3451375 ![]() |
![]() ![]() | Riom, T., Sawadogo, D. D. A., Allix, K., Bissyande, T. F. D. A., Moha, N., & Klein, J. (29 March 2021). Revisiting the VCCFinder approach for the identification of vulnerability-contributing commits. Empirical Software Engineering, 26. doi:10.1007/s10664-021-09944-w ![]() |
![]() ![]() | Qin, Y., Wang, S., Liu, K., Mao, X., & Bissyande, T. F. D. A. (2021). On the Impact of Flaky Tests in Automated Program Repair. In 28th IEEE International Conference on Software Analysis, Evolution and Reengineering, Hawaii 9-12 March 2021 (pp. 295-306). doi:10.1109/SANER50967.2021.00035 ![]() |
![]() ![]() | Daoudi, N., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2021). Lessons Learnt on Reproducibility in Machine Learning Based Android Malware Detection. Empirical Software Engineering, 26. doi:10.1007/s10664-021-09955-7 ![]() |
![]() ![]() | Kui, L., Li, L., Koyuncu, A., Dongsun, K., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (2021). A critical review on the evaluation of automated program repair systems. Journal of Systems and Software. doi:10.1016/j.jss.2020.110817 ![]() |
![]() ![]() | Yang, D., Liu, K., Kim, D., Koyuncu, A., Kim, K., Tian, H., Lei, Y., Mao, X., Klein, J., & Bissyande, T. F. D. A. (2021). Where were the repair ingredients for Defects4j bugs? Empirical Software Engineering, 26 (6), 1--33. doi:10.1007/s10664-021-10003-7 ![]() |
![]() ![]() | Keller, P., Kabore, A. K., Plein, L., Klein, J., Le Traon, Y., & Bissyande, T. F. D. A. (2021). What You See is What it Means! Semantic Representation Learning of Code based on Visualization. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3485135 ![]() |
![]() ![]() | Samhi, J., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2021). A First Look at Android Applications in Google Play related to Covid-19. Empirical Software Engineering. doi:10.1007/s10664-021-09943-x ![]() |
![]() ![]() | Daoudi, N., Samhi, J., Kabore, A. K., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2021). DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode. In Communications in Computer and Information Science. Springer. doi:10.1007/978-3-030-87839-9_4 ![]() |
![]() ![]() | Lothritz, C., Allix, K., Veiber, L., Klein, J., & Bissyande, T. F. D. A. (2020). Evaluating Pretrained Transformer-based Models on the Task of Fine-Grained Named Entity Recognition. In Proceedings of the 28th International Conference on Computational Linguistics (pp. 3750–3760). ![]() |
![]() ![]() | Gao, J., li, L., Kong, P., Bissyande, T. F. D. A., & Klein, J. (2020). Borrowing your enemy's arrows: the case of code reuse in android via direct inter-app code invocation. ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. doi:10.1145/3368089.3409745 ![]() |
![]() ![]() | Li, L., Gao, J., Kong, P., Wang, H., Huang, M., Li, Y., & Bissyande, T. F. D. A. (2020). Knowledgezooclient: Constructing knowledge graph for android. The 3rd International Workshop on Advances in Mobile App Analysis. doi:10.1145/3417113.3422187 ![]() |
![]() ![]() | Ghamizi, S., Rwemalika, R., Cordy, M., Veiber, L., Bissyande, T. F. D. A., Papadakis, M., Klein, J., & Le Traon, Y. (2020). Data-driven simulation and optimization for covid-19 exit strategies. In S. Ghamizi, R. Rwemalika, M. Cordy, L. Veiber, T. F. D. A. Bissyande, M. Papadakis, J. Klein, ... Y. Le Traon, Data-driven simulation and optimization for covid-19 exit strategies (pp. 3434-3442). New York, NY, United States: Association for Computing Machinery. doi:10.1145/3394486.3412863 ![]() |
![]() ![]() | Veiber, L., Allix, K., Arslan, Y., Bissyande, T. F. D. A., & Klein, J. (2020). Challenges Towards Production-Ready Explainable Machine Learning. In L. Veiber, K. Allix, Y. Arslan, T. F. D. A. Bissyande, ... J. Klein, Proceedings of the 2020 USENIX Conference on Operational Machine Learning (OpML 20). USENIX Association. ![]() |
![]() ![]() | Liu, K., Wang, S., Koyuncu, A., Kim, K., Bissyande, T. F. D. A., Kim, D., Wu, P., Klein, J., Mao, X., & Le Traon, Y. (2020). On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs. In 42nd ACM/IEEE International Conference on Software Engineering (ICSE). doi:10.1145/3377811.3380338 ![]() |
![]() ![]() | Liu, T., Wang, H., Li, L., Luo, X., Dong, F., Guo, Y., Wang, L., Bissyande, T. F. D. A., & Klein, J. (2020). MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps. In Proceedings of The Web Conference 2020 (pp. 1715–1726). New York, NY, USA, Unknown/unspecified: Association for Computing Machinery. doi:10.1145/3366423.3380242 ![]() |
![]() ![]() | Koyuncu, A., Liu, K., Bissyande, T. F. D. A., Kim, D., Klein, J., Monperrus, M., & Le Traon, Y. (2020). FixMiner: Mining relevant fix patterns for automated program repair. Empirical Software Engineering. doi:10.1007/s10664-019-09780-z ![]() |
![]() ![]() | li, L., Gao, J., Bissyande, T. F. D. A., Ma, L., Xia, X., & Klein, J. (11 January 2020). CDA: Characterising Deprecated Android APIs. Empirical Software Engineering, 24 (118), 1-41. doi:10.1007/s10664-019-09764-z ![]() |
![]() ![]() | Gao, J., li, L., Bissyande, T. F. D. A., & Klein, J. (2020). Understanding the Evolution of Android App Vulnerabilities. IEEE Transactions on Reliability. doi:10.1109/TR.2019.2956690 ![]() |
![]() ![]() | Tian, H., Liu, K., Kabore, A. K., Koyuncu, A., Li, L., Klein, J., & Bissyande, T. F. D. A. (2020). Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair. In H. Tian, 35th IEEE/ACM International Conference on Automated Software Engineering, September 21-25, 2020, Melbourne, Australia. doi:10.1145/3324884.3416532 ![]() |
![]() ![]() | Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., Le Traon, Y., & Sen, K. (2019). Selecting fault revealing mutants. Empirical Software Engineering, 1-54. doi:10.1007/s10664-019-09778-7 ![]() |
![]() ![]() | Kang, H. J., Bissyande, T. F. D. A., & David, L. (2019). Assessing the Generalizability of code2vec Token Embeddings. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (pp. 1-12). doi:10.1109/ASE.2019.00011 ![]() |
![]() ![]() | Oumaziz, M., Falleri, J.-R., Blanc, X., Bissyande, T. F. D. A., & Klein, J. (2019). Handling duplicates in Dockerfiles families: Learning from experts. In 35th IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 524-535). IEEE. ![]() |
![]() ![]() | Li, L., Riom, T., Bissyande, T. F. D. A., Wang, H., Klein, J., & Le Traon, Y. (August 2019). Revisiting the impact of common libraries for android-related investigations. Journal of Systems and Software, 154, 157-175. doi:10.1016/j.jss.2019.04.065 ![]() |
![]() ![]() | Koyuncu, A., Liu, K., Bissyande, T. F. D. A., Kim, D., Monperrus, M., Klein, J., & Le Traon, Y. (2019). iFixR: bug report driven program repair. In ESEC/FSE 2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. doi:10.1145/3338906.3338935 ![]() |
![]() ![]() | Kong, P., li, L., Gao, J., Bissyande, T. F. D. A., & Klein, J. (15 July 2019). Mining Android Crash Fixes in the Absence of Issue- and Change-Tracking Systems [Paper presentation]. The 28th International Symposium on Software Testing and Analysis, Beijing, China. doi:10.1145/3293882.3330572 |
![]() ![]() | Liu, K., Koyuncu, A., Kim, D., & Bissyande, T. F. D. A. (2019). TBar: Revisiting Template-based Automated Program Repair. In 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). doi:10.1145/3293882.3330577 ![]() |
![]() ![]() | Liu, K., Kim, D., Bissyande, T. F. D. A., Kim, T., Kim, K., Koyuncu, A., Kim, S., & Le Traon, Y. (2019). Learning to Spot and Refactor Inconsistent Method Names. In 41st ACM/IEEE International Conference on Software Engineering (ICSE). Montreal, Canada: IEEE. ![]() |
![]() ![]() | Liu, K., Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., & Le Traon, Y. (2019). You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems. In The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019). Xi'an, China: IEEE. doi:10.1109/ICST.2019.00020 ![]() |
![]() ![]() | Li, D., Li, L., Kim, D., Bissyande, T. F. D. A., Lo, D., & Le Traon, Y. (2019). Watch out for This Commit! A Study of Influential Software Changes. Journal of Software: Evolution and Process. doi:10.1002/smr.2181 ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Wang, H., & Klein, J. (March 2019). On Identifying and Explaining Similarities in Android Apps. Journal of Computer Science and Technology, 34 (2), 437-455. doi:10.1007/s11390-019-1918-8 ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., & Klein, J. (2019). Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2019.2901679 ![]() |
![]() ![]() | Gao, J., Li, L., Kong, P., Bissyande, T. F. D. A., & Klein, J. (2019). Should You Consider Adware as Malware in Your Study? In 26th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering. ![]() |
![]() ![]() | Liu, K., Koyuncu, A., Dongsun, K., & Bissyande, T. F. D. A. (2019). AVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations. In The 26th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER-2019). Hangzhou, China: IEEE. doi:10.1109/SANER.2019.8667970 ![]() |
![]() ![]() | Gao, J., Li, Bissyande, T. F. D. A., & Klein, J. (2019). On the Evolution of Mobile App Complexity. Proceedings of 2019 24th International Conference on Engineering of Complex Computer Systems. ![]() |
![]() ![]() | Gao, J., Kong, P., Li, L., Bissyande, T. F. D. A., & Klein, J. (2019). Negative Results on Mining Crypto-API Usage Rules in Android Apps. Proceedings of the 16th International Conference on Mining Software Repositories. doi:10.1109/MSR.2019.00065 ![]() |
![]() ![]() | Liu, K., Koyuncu, A., Kim, K., Kim, D., & Bissyande, T. F. D. A. (2018). LSRepair: Live Search of Fix Ingredients for Automated Program Repair. In 25th Asia-Pacific Software Engineering Conference (APSEC). ![]() |
![]() ![]() | Dong, F., Wang, H., Li, L., Guo, Y., Bissyande, T. F. D. A., Liu, T., Xu, G., & Klein, J. (2018). FraudDroid: Automated Ad Fraud Detection for Android Apps. In ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018) (pp. 257-268). doi:10.1145/3236024.3236045 ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., & Klein, J. (2018). MoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsistencies. In 29th IEEE International Symposium on Software Reliability Engineering (ISSRE) (pp. 212-223). ![]() |
![]() ![]() | Kong, P., Li, L., Gao, J., Liu, K., Bissyande, T. F. D. A., & Klein, J. (2018). Automated Testing of Android Apps: A Systematic Literature Review. IEEE Transactions on Reliability, 1-22. doi:10.1109/TR.2018.2865733 ![]() |
![]() ![]() | Liu, K., Kim, D., Koyuncu, A., Li, L., Bissyande, T. F. D. A., & Le Traon, Y. (2018). A Closer Look at Real-World Patches. In 34th IEEE International Conference on Software Maintenance and Evolution (ICSME). doi:10.1109/ICSME.2018.00037 ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Wang, H., & Klein, J. (2018). CiD: Automating the Detection of API-related Compatibility Issues in Android Apps. In International Symposium on Software Testing and Analysis (ISSTA) (pp. 153-163). ACM. doi:10.1145/3213846.3213857 ![]() |
![]() ![]() | Kim, K., Kim, D., Bissyande, T. F. D. A., Choi, E., Li, L., Klein, J., & Le Traon, Y. (2018). FaCoY - A Code-to-Code Search Engine. In International Conference on Software Engineering (ICSE 2018). ![]() |
![]() ![]() | Li, L., Gao, J., Bissyande, T. F. D. A., Ma, L., Xia, X., & Klein, J. (2018). Characterising Deprecated Android APIs. In 15th International Conference on Mining Software Repositories (MSR 2018) (pp. 254-264). ACM. ![]() |
![]() ![]() | Martinez, J., Sottet, J.-S., Garcia-Frey, A., Bissyande, T. F. D. A., Ziadi, T., Klein, J., Temple, P., Mathieu, A., & Le Traon, Y. (2018). Towards Estimating and Predicting User Perception on Software Product Variants. In 17th International Conference on Software Reuse (ICSR) (pp. 23-40). Springer, LNCS. ![]() |
![]() ![]() | Li, D., Lin, J., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification. In 21st International Conference on Extending Database Technology. ![]() |
![]() ![]() | Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., & Le Traon, Y. (2018). Predicting the Fault Revelation Utility of Mutants. In 40th International Conference on Software Engineering, Gothenburg, Sweden, May 27 - 3 June 2018. ![]() |
![]() ![]() | Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants. Information and Software Technology. doi:10.1016/j.infsof.2018.07.005 ![]() |
![]() ![]() | Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (January 2018). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search. Empirical Software Engineering, 90, 27-39. doi:10.1007/s10664-017-9544-y ![]() |
![]() ![]() | Liu, K., Kim, D., Bissyande, T. F. D. A., Yoo, S., & Le Traon, Y. (2018). Mining Fix Patterns for FindBugs Violations. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2018.2884955 ![]() |
![]() ![]() | Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017). On Locating Malicious Code in Piggybacked Android Apps. Journal of Computer Science and Technology. doi:10.1007/s11390-017-1786-z ![]() |
![]() ![]() | Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Schummer, P., Muller, B., & Solvi, A.-M. (2017). Towards a Plug-and-Play and Holistic Data Mining Framework for Understanding and Facilitating Operations in Smart Buildings. (TR-SNT-2017-5). SnT. |
![]() ![]() | Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., Monperrus, M., & Le Traon, Y. (July 2017). Impact of Tool Support in Patch Construction [Paper presentation]. 2017 International Symposium on Software Testing & Analysis (ISSTA). doi:10.1145/3092703.3092713 |
![]() ![]() | Hurier, M., Suarez-Tangil, G., Dash, S. K., Bissyande, T. F. D. A., Le Traon, Y., Klein, J., & Cavallaro, L. (2017). Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware. In MSR 2017. ![]() |
![]() ![]() | Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017). Automatically Locating Malicious Packages in Piggybacked Android Apps. Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017). doi:10.1007/s11390-017-1786-z ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Bartel, A., Klein, J., & Le Traon, Y. (May 2017). The Multi-Generation Repackaging Hypothesis [Poster presentation]. The 39th International Conference on Software Engineering. |
![]() ![]() | Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (May 2017). Understanding Android App Piggybacking [Poster presentation]. The 39th International Conference on Software Engineering. |
![]() ![]() | Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2017). Sensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements. In The 32nd ACM Symposium on Applied Computing (SAC 2017). doi:10.1145/3019612.3019699 ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., & Klein, J. (2017). SimiDroid: Identifying and Explaining Similarities in Android Apps. Abstract book of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.230 ![]() |
![]() ![]() | Yang, X., Lo, D., Li, L., Xia, X., Bissyande, T. F. D. A., & Klein, J. (2017). Comprehending Malicious Android Apps By Mining Topic-Specific Data Flow Signatures. Information and Software Technology. doi:10.1016/j.infsof.2017.04.007 ![]() |
![]() ![]() | Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (2017). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search. |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Papadakis, M., Rasthofer, S., Bartel, A., Octeau, D., Klein, J., & Le Traon, Y. (2017). Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology. doi:10.1016/j.infsof.2017.04.001 ![]() |
![]() ![]() | Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (2017). Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2017.2656460 ![]() |
![]() ![]() | Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo-NG: A Practical Language Modeling Approach for Time Series Classification. In The 15th International Symposium on Intelligent Data Analysis. ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Le Traon, Y., & Klein, J. (2016). Accessing Inaccessible Android APIs: An Empirical Study. In The 32nd International Conference on Software Maintenance and Evolution (ICSME) (pp. 12). ![]() |
![]() ![]() | Manukyan, A., Olivares Mendez, M. A., Bissyande, T. F. D. A., Voos, H., & Le Traon, Y. (2016). UAV degradation identification for pilot notification using machine learning techniques. Proceedings of 21st IEEE International Conference on Emerging Technologies and Factory Automation ETFA 2016. doi:10.1109/ETFA.2016.7733537 ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Octeau, D., & Klein, J. (2016). Reflection-Aware Static Analysis of Android Apps. In The 31st IEEE/ACM International Conference on Automated Software (ASE) (pp. 6). doi:10.1145/2970276.2970277 ![]() |
![]() ![]() | Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (September 2016). Time Series Classification with Discrete Wavelet Transformed Data. International Journal of Software Engineering and Knowledge Engineering, 26 (9&10), 1361–1377. doi:10.1142/S0218194016400088 ![]() |
![]() ![]() | Jimenez, M., Papadakis, M., Bissyande, T. F. D. A., & Klein, J. (2016). Profiling Android Vulnerabilities. In 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS 2016) (pp. 222-229). IEEE Computer Society. doi:10.1109/QRS.2016.34 ![]() |
![]() ![]() | Li, D., Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo: A Language Modeling Approach for Time Series Classification. In 12th International Conference on Machine Learning and Data Mining (MLDM 2016). ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Octeau, D., & Klein, J. (2016). DroidRA: Taming Reflection to Support Whole-Program Analysis of Android Apps. In The 2016 International Symposium on Software Testing and Analysis. doi:10.1145/2931037.2931044 ![]() |
![]() ![]() | Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study. In The 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016). ![]() |
![]() ![]() | Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). AndroZoo: Collecting Millions of Android Apps for the Research Community. In Proceedings of the 13th International Workshop on Mining Software Repositories (pp. 468--471). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2901739.2903508 ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Papadakis, M., Rasthofer, S., Bartel, A., Octeau, D., Klein, J., & Le Traon, Y. (2016). Static Analysis of Android Apps: A Systematic Literature Review. SnT. |
![]() ![]() | Li, L., Li, D., Bissyande, T. F. D. A., Lo, D., Klein, J., & Le Traon, Y. (2016). Ungrafting Malicious Code from Piggybacked Android Apps. SnT. |
![]() ![]() | Li, L., Li, D., Bartel, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Towards a Generic Framework for Automating Extensive Analysis of Android Applications. In The 31st ACM/SIGAPP Symposium on Applied Computing (SAC 2016). ![]() |
![]() ![]() | Li, D., Bissyande, T. F. D. A., Kubler, S., Klein, J., & Le Traon, Y. (2016). Profiling household appliance electricity usage with n-gram language modeling. In The 2016 IEEE International Conference on Industrial Technology (ICIT 2016). ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). An Investigation into the Use of Common Libraries in Android Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 12). doi:10.1109/SANER.2016.52 ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Parameter Values of Android APIs: A Preliminary Study on 100,000 Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 5). doi:10.1109/SANER.2016.51 ![]() |
![]() ![]() | Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Feature Location Benchmark for Software Families using Eclipse Community Releases. In Software Reuse: Bridging with Social-Awareness, ICSR 2016 Proceedings. doi:10.1007/978-3-319-35122-3_18 ![]() |
![]() ![]() | Li, L., Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Mining Families of Android Applications for Extractive SPL Adoption. In The 20th International Systems and Software Product Line Conference (SPLC 2016). ![]() |
![]() ![]() | Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Name Suggestions during Feature Identification: The VariClouds Approach. In 20th International Systems and Software Product Line Conference (SPLC 2016) proceedings. ![]() |
![]() ![]() | Hurier, M., Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. In Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference (pp. 142--162). Springer. doi:10.1007/978-3-319-40667-1_8 ![]() |
![]() ![]() | Olivares Mendez, M. A., Fu, C., Ludivig, P., Bissyande, T. F. D. A., Kannan, S., Zurad, M., Annaiyan, A., Voos, H., & Campoy, P. (12 December 2015). Towards an Autonomous Vision-Based Unmanned Aerial System against Wildlife Poachers. Sensors, 15 (12), 29861. doi:10.3390/s151229861 ![]() |
![]() ![]() | Bissyande, T. F. D. A., Ouoba, J., Ahmat, D., Ouédraogo, F., Béré, C., Bikienga, M., Sere, A., Dandjinou, M., & Sié, O. (2015). Vulnerabilities of Government Websites in a Developing Country – The Case of Burkina Faso. In 7th International Conference on e‐Infrastructure and e‐Services for Developing Countries. ![]() |
![]() ![]() | Li, L., Allix, K., Li, D., Bartel, A., Bissyande, T. F. D. A., & Klein, J. (2015). Potential Component Leaks in Android Apps: An Investigation into a new Feature Set for Malware Detection. In The 2015 IEEE International Conference on Software Quality, Reliability and Security (QRS 2015). doi:10.1109/QRS.2015.36 ![]() |
![]() ![]() | Bissyande, T. F. D. A. (2015). Harvesting Fix Hints in the History of Bugs. (TR-SNT-2015-6). SnT, University of Luxembourg. |
![]() ![]() | Li, L., Allix, K., Li, D., Bartel, A., Bissyande, T. F. D. A., & Klein, J. (2015). A Study of Potential Component Leaks in Android Apps. SnT Centre - University of Luxembourg. |
![]() ![]() | Li, L., Bartel, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. In International Conference on ICT Systems Security and Privacy Protection (SEC 2015). ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (March 2015). Using An Instrumentation based Approach to Detect Inter-Component Leaks in Android Apps [Paper presentation]. Grande Region Security and Reliability Day 2015. |
![]() ![]() | Li, L., Bartel, A., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015). ![]() |
![]() ![]() | Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Automating the Extraction of Model-based Software Product Lines from Model Variants. In 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015). doi:10.1109/ASE.2015.44 ![]() |
![]() ![]() | Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. In Engineering Secure Software and Systems - 7th International Symposium ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings (pp. 51-67). Springer International Publishing. doi:10.1007/978-3-319-15618-7_5 ![]() |
![]() ![]() | Allix, K., Bissyande, T. F. D. A., Jerome, Q., Klein, J., State, R., & Le Traon, Y. (2014). Empirical assessment of machine learning-based malware detectors for Android: Measuring the Gap between In-the-Lab and In-the-Wild Validation Scenarios. Empirical Software Engineering, 1-29. doi:10.1007/s10664-014-9352-6 ![]() |
![]() ![]() | Ouoba, J., & Bissyande, T. F. D. A. (2014). Sensing in the Urban Technological Deserts-A Position Paper for Smart Cities in Least Developed Countries. In International Workshop on Web Intelligence and Smart Sensing. doi:10.1145/2637064.2637097 ![]() |
![]() ![]() | Allix, K., Jerome, Q., Bissyande, T. F. D. A., Klein, J., State, R., & Le Traon, Y. (2014). A Forensic Analysis of Android Malware -- How is Malware Written and How It Could Be Detected? In Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference (pp. 384--393). Washington, DC, USA, Unknown/unspecified: IEEE Computer Society. doi:10.1109/COMPSAC.2014.61 ![]() |
![]() ![]() | Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2014). Machine Learning-Based Malware Detection for Android Applications: History Matters! Luxembourg, Luxembourg: University of Luxembourg, SnT. |
![]() ![]() | Bissyande, T. F. D. A., Réveillère, L., Lawall, J., & Muller, G. (2014). Ahead of time static analysis for automatic generation of debugging interfaces to the Linux kernel. Automated Software Engineering, 1-39. doi:10.1007/s10515-014-0152-4 ![]() |
![]() ![]() | Allix, K., Bissyande, T. F. D. A., Jerome, Q., Klein, J., State, R., & Le Traon, Y. (2014). Large-scale Machine Learning-based Malware Detection: Confronting the "10-fold Cross Validation" Scheme with Reality. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (pp. 163--166). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2557547.2557587 ![]() |
Bissyande, T. F. D. A., & van Stam, G. (Eds.). (2014). e-Infrastructure and e-Services for Developing Countries. Springer. doi:10.1007/978-3-319-08368-1 |
![]() ![]() | Bissyande, T. F. D. A., Lo, D., Jiang, L., Reveillere, L., Klein, J., & Le Traon, Y. (2013). Got Issues? Who Cares About It? A Large Scale Investigation of Issue Trackers from GitHub. In Proceedings of the 24th International Symposium on Software Reliability Engineering (ISSRE 2013). doi:10.1109/ISSRE.2013.6698918 ![]() |
![]() ![]() | Bissyande, T. F. D. A., Réveillère, L., Lawall, J., Bromberg, D., & Muller, G. (2013). Implementing an Embedded Compiler using Program Transformation Rules. Software: Practice and Experience, 1..20. doi:10.1002/spe.2225 ![]() |
![]() ![]() | Bissyande, T. F. D. A., Ahmat, D., Ouoba, J., van Stam, G., Klein, J., & Le Traon, Y. (2013). Sustainable ICT4D in Africa: Where Do We Go From Here? In EAI International Conference on e-Infrastructure and e-Services for Developing Countries. ![]() |
![]() ![]() | Pavneet Singh, K., Bissyande, T. F. D. A., Lo, D., & Jiang, L. (2013). An Empirical Study of Adoption of Software Testing in Open Source Projects. In Proceedings of the 13th International Conference on Quality Software (QSIC 2013). ![]() |
![]() ![]() | Ahmat, D., Bissyande, T. F. D. A., & Magoni, D. (2013). Towards Securing Communications in Infrastructure-poor Areas. In Proceedings of the 5th EAI International Conference on e-Infrastructure and e-Services for Developing Countries. ![]() |