SUN, T., DAOUDI, N., PIAN, W., KIM, K., ALLIX, K., BISSYANDE, T., & KLEIN, J. (2024). Temporal-Incremental Learning for Android Malware Detection. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3702990 Peer Reviewed verified by ORBi |
KIM, K., Kim, J., Park, B., KIM, D., Chong, C. Y., Wang, Y., SUN, T., Tang, D., KLEIN, J., & BISSYANDE, T. (2024). DataRecipe --- How to Cook the Data for CodeLLM? In DataRecipe --- How to Cook the Data for CodeLLM?New York City, United States: Association for Computing Machinery (ACM). doi:10.1145/3691620.3695593 Peer reviewed |
SUN, T., DAOUDI, N., KIM, K., ALLIX, K., BISSYANDE, T., & KLEIN, J. (2024). DetectBERT: Towards Full App-Level Representation Learning to Detect Android Malware. In DetectBERT: Towards Full App-Level Representation Learning to Detect Android Malware. New York City, United States: Association for Computing Machinery (ACM). doi:10.1145/3674805.3690745 Peer reviewed |
LI, Y., DANG, X., Tian, H., SUN, T., Wang, Z., Ma, L., KLEIN, J., & BISSYANDE, T. F. D. A. (2024). An Empirical Study of AI Techniques in Mobile Applications. Journal of Systems and Software. doi:10.1016/j.jss.2024.112233 Peer Reviewed verified by ORBi |
SAMHI, J., Just, R., BISSYANDE, T. F. D. A., Ernst, M. D., & KLEIN, J. (2024). Call Graph Soundness in Android Static Analysis. In M. Christakis (Ed.), ISSTA 2024 - Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis. Association for Computing Machinery, Inc. doi:10.1145/3650212.3680333 Peer reviewed |
Rebatchi, H., Moha, N., & BISSYANDE, T. F. D. A. (September 2024). Dependabot and security pull requests: large empirical study. Empirical Software Engineering, 29 (5). doi:10.1007/s10664-024-10523-y Peer Reviewed verified by ORBi |
SONG, Y., LOTHRITZ, C., TANG, X., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). Revisiting Code Similarity Evaluation with Abstract Syntax Tree Edit Distance. Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), 38-46. doi:10.18653/v1/2024.acl-short.3 Peer reviewed |
LI, Y., DANG, X., Ma, L., KLEIN, J., & BISSYANDE, T. F. D. A. (22 July 2024). Prioritizing test cases for deep learning-based video classifiers. Empirical Software Engineering, 29 (5), 111. doi:10.1007/s10664-024-10520-1 Peer Reviewed verified by ORBi |
LI, Y., DANG, X., Ma, L., KLEIN, J., LE TRAON, Y., & BISSYANDE, T. F. D. A. (04 June 2024). Test Input Prioritization for 3D Point Clouds. ACM Transactions on Software Engineering and Methodology, 33 (5), 1-44. doi:10.1145/3643676 Peer Reviewed verified by ORBi |
SONG, Y., EZZINI, S., TANG, X., LOTHRITZ, C., KLEIN, J., BISSYANDE, T. F. D. A., BOYTSOV, A., BLE, U., & GOUJON, A. (2024). Enhancing Text-to-SQL Translation for Financial System Design. In ICSE-SEIP '24: Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Practice (pp. 11). New York, United States: Institute of Electrical and Electronics Engineers Inc. doi:10.1145/3639477.3639732 Peer reviewed Dataset: 10.1145/3639477.3639732 |
SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). AndroLibZoo: A Reliable Dataset of Libraries Based on Software Dependency Analysis. In Proceedings - 2024 IEEE/ACM 21st International Conference on Mining Software Repositories, MSR 2024. Institute of Electrical and Electronics Engineers Inc. doi:10.1145/3643991.3644866 Peer reviewed |
ALECCI, M., RUIZ JIMÉNEZ, P. J., Kevin Allix, BISSYANDE, T. F. D. A., & KLEIN, J. (2024). AndroZoo: A Retrospective with a Glimpse into the Future. 2024 IEEE/ACM 21st International Conference on Mining Software Repositories (MSR). doi:10.1145/3643991.3644863 Peer reviewed |
Zhong, W., Li, C., Liu, K., Xu, T., BISSYANDE, T. F. D. A., Ge, J., Luo, B., & Ng, V. (2024). Practical Program Repair via Preference-based Ensemble Strategy. In ICSE'24: Proceedings of the 46th International Conference on Software Engineering (ICSE 2024). Washington, DC, United States: IEEE. doi:10.1145/3597503.3623310 Peer reviewed |
LI, Y., DANG, X., PIAN, W., Habib, A., KLEIN, J., & BISSYANDE, T. F. D. A. (05 April 2024). Test Input Prioritization for Graph Neural Networks. IEEE Transactions on Software Engineering, 50 (6), 1396 - 1424. doi:10.1109/TSE.2024.3385538 Peer Reviewed verified by ORBi |
ALECCI, M., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). Revisiting Android App Categorization. In ICSE '24: Proceedings of the 46th International Conference on Software Engineering. IEEE Press. doi:10.1145/3597503.3639094 Peer reviewed |
PHILIPPY, F., Guo, S., Haddadan, S., LOTHRITZ, C., KLEIN, J., & BISSYANDE, T. F. D. A. (2024). Soft Prompt Tuning for Cross-Lingual Transfer: When Less is More. In R. Vazquez (Ed.), MOOMIN 2024 - Workshop on Modular and Open Multilingual NLP, Proceedings of the Workshop (pp. 7-15). Association for Computational Linguistics (ACL). Peer reviewed |
Yang, D., Liu, K., Lei, Y., Li, L., Xie, H., Liu, C., Wang, Z., Mao, X., & BISSYANDE, T. F. D. A. (March 2024). Demystifying API misuses in deep learning applications. Empirical Software Engineering, 29 (2). doi:10.1007/s10664-023-10413-9 Peer Reviewed verified by ORBi |
DANG, X.* , LI, Y.* , PAPADAKIS, M., KLEIN, J., BISSYANDE, T. F. D. A., & LE TRAON, Y. (05 January 2024). Test Input Prioritization for Machine Learning Classifiers. IEEE Transactions on Software Engineering, 50 (3), 413 - 442. doi:10.1109/TSE.2024.3350019 Peer Reviewed verified by ORBi * These authors have contributed equally to this work. |
ALECCI, M., SAMHI, J., LI, L., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). Improving Logic Bomb Identification in Android Apps via Context-Aware Anomaly Detection. IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2024.3358979 Peer Reviewed verified by ORBi |
Wang, S., Geng, M., Lin, B., Sun, Z., Wen, M., Liu, Y., Li, L., BISSYANDE, T. F. D. A., & Mao, X. (2024). Fusing Code Searchers. IEEE Transactions on Software Engineering, 50 (7), 1852 - 1866. doi:10.1109/TSE.2024.3403042 Peer Reviewed verified by ORBi |
Guo, J., Liu, J., Liu, X., Wan, Y., Zhao, Y., Li, L., Liu, K., KLEIN, J., & BISSYANDE, T. F. D. A. (2023). PyScribe–Learning to describe python code. Software: Practice and Experience, 1-27. doi:10.1002/spe.3291 Peer Reviewed verified by ORBi |
Wang, S., Geng, M., Lin, B., Sun, Z., Wen, M., Liu, Y., Li, L., BISSYANDE, T. F. D. A., & Mao, X. (2023). Natural Language to Code: How Far Are We? In Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (pp. 375–387). Washington, DC, United States: ACM. doi:10.1145/3611643.3616323 Peer reviewed |
Wang, S., Wen, M., Lin, B., Liu, Y., BISSYANDE, T. F. D. A., & Mao, X. (29 September 2023). Pre-implementation Method Name Prediction for Object-oriented Programming. ACM Transactions on Software Engineering and Methodology, 32 (6), 1-35. doi:10.1145/3597203 Peer Reviewed verified by ORBi |
LOTHRITZ, C., EZZINI, S., PURSCHKE, C., BISSYANDE, T. F. D. A., KLEIN, J., Olariu, I., Boytsov, A., Lefebvre, C., & Goujon, A. (2023). Comparing Pre-Training Schemes for Luxembourgish BERT Models. In Proceedings of the 19th Conference on Natural Language Processing (KONVENS 2023). Peer reviewed |
Krishnan, P., Cifuentes, C., Li, L., BISSYANDE, T. F. D. A., & KLEIN, J. (September 2023). Why Is Static Application Security Testing Hard to Learn? IEEE Security and Privacy, 21 (5), 68 - 72. doi:10.1109/MSEC.2023.3287206 Editorial reviewed |
Chen, Q., Zhou, T., Liu, K., Li, L., Ge, C., Liu, Z., KLEIN, J., & BISSYANDE, T. F. D. A. (September 2023). Tips: towards automating patch suggestion for vulnerable smart contracts. Automated Software Engineering, 30 (2). doi:10.1007/s10515-023-00392-y Peer Reviewed verified by ORBi |
Kim, K., Ghatpande, S., Kim, D., Zhou, X., Liu, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (26 August 2023). Big Code Search: A Bibliography. ACM Computing Surveys, 56 (1), 1-49. doi:10.1145/3604905 Peer Reviewed verified by ORBi |
DANG, X., LI, Y., PAPADAKIS, M., KLEIN, J., BISSYANDE, T. F. D. A., & LE TRAON, Y. (2023). GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3607191 Peer Reviewed verified by ORBi |
Yu, Z., Martinez, M., Chen, Z., BISSYANDE, T. F. D. A., & Monperrus, M. (July 2023). Learning the Relation between Code Features and Code Transforms with Structured Prediction. IEEE Transactions on Software Engineering, 49 (7), 3872 - 3900. doi:10.1109/TSE.2023.3275380 Peer Reviewed verified by ORBi |
Kober, M., SAMHI, J., Arzt, S., BISSYANDE, T. F. D. A., & KLEIN, J. (2023). Sensitive and Personal Data: What Exactly Are You Talking About? In 10th International Conference on Mobile Software Engineering and Systems 2023. Peer reviewed |
LOTHRITZ, C., LEBICHOT, B., ALLIX, K., EZZINI, S., BISSYANDE, T. F. D. A., KLEIN, J., Boytsov, A., Lefebvre, C., & Goujon, A. (2023). Evaluating the Impact of Text De-Identification on Downstream NLP Tasks. In Proceedings of the 24th Nordic Conference on Computational Linguistics (NoDaLiDa). Tartu, Estonia: University of Tartu Library. Peer reviewed |
SONG, Y., EZZINI, S., KLEIN, J., BISSYANDE, T. F. D. A., Lefebvre, C., & Goujon, A. (2023). Letz Translate: Low-Resource Machine Translation for Luxembourgish. In Proceedings - 2023 5th International Conference on Natural Language Processing, ICNLP 2023. Institute of Electrical and Electronics Engineers Inc. doi:10.1109/ICNLP58431.2023.00036 Peer reviewed |
SAMHI, J., Kober, K., KABORE, A. K., Arzt, S., BISSYANDE, T. F. D. A., & KLEIN, J. (2023). Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection. In 30th IEEE International Conference on Software Analysis, Evolution and Reengineering. Peer reviewed |
PIAN, W., Peng, H., TANG, X., SUN, T., TIAN, H., Habib, A., KLEIN, J., & BISSYANDE, T. F. D. A. (February 2023). MetaTPTrans: A Meta Learning Approach for Multilingual Code Representation Learning. Proceedings of the AAAI Conference on Artificial Intelligence, 37 (4), 5239-5247. doi:10.1609/aaai.v37i4.25654 Peer reviewed |
Liu, K., Zhang, J., Li, L., Koyuncu, A., Kim, D., Ge, C., Liu, Z., KLEIN, J., & BISSYANDE, T. F. D. A. (2023). Reliable Fix Patterns Inferred from Static Checkers for Automated Program Repair. ACM Transactions on Software Engineering and Methodology, 1-38. Peer Reviewed verified by ORBi |
DAOUDI, N., Allix, K., BISSYANDE, T. F. D. A., & KLEIN, J. (2023). Guided Retraining to Enhance the Detection of Difficult Android Malware. In 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023). doi:10.1145/3597926.3598123 Peer reviewed |
OLARIU, I., LOTHRITZ, C., BISSYANDE, T. F. D. A., & KLEIN, J. (2023). Evaluating Data Augmentation Techniques for the Training of Luxembourgish Language Models. In Conference on Natural Language Processing. KONVENS. Peer reviewed |
OLARIU, I., LOTHRITZ, C., KLEIN, J., BISSYANDE, T. F. D. A., Guo, S., & Haddadan, S. (2023). Evaluating Parameter-Efficient Finetuning Approaches for Pre-trained Models on the Financial Domain. In Empirical Methods in Natural Language Processing. Association for Computational Linguistics. Peer reviewed |
DAOUDI, N., Allix, K., BISSYANDE, T. F. D. A., & KLEIN, J. (December 2022). Assessing the opportunity of combining state-of-the-art Android malware detectors. Empirical Software Engineering, 28. doi:10.1007/s10664-022-10249-9 Peer Reviewed verified by ORBi |
Sun, X., Chen, X., Li, L., Cai, H., Grundy, J., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). Demystifying Hidden Sensitive Operations in Android apps. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3574158 Peer Reviewed verified by ORBi |
Yan, D., Liu, K., Niu, Y., Li, L., Liu, Z., Liu, Z., KLEIN, J., & BISSYANDE, T. F. D. A. (December 2022). Crex: Predicting patch correctness in automated repair of C programs through transfer learning of execution semantics. Information and Software Technology, 152, 1-12. doi:10.1016/j.infsof.2022.107043 Peer Reviewed verified by ORBi |
Nirumand, A., Zamani, B., Tork-Ladani, B., KLEIN, J., & BISSYANDE, T. F. D. A. (2022). A model-based framework for inter-app Vulnerability analysis of Android applications. Software: Practice and Experience, 1-42. doi:10.1002/spe.3171 Peer Reviewed verified by ORBi |
Qin, Y., Wang, S., Liu, K., Lin, B., Wu, H., Li, L., Mao, X., & BISSYANDE, T. F. D. A. (2022). PEELER: Learning to Effectively Predict Flakiness without Running Tests. In Proceedings of the 38th IEEE International Conference on Software Maintenance and Evolution (pp. 1-12). Peer reviewed |
Adjibi, B. V., MBODJI, F. N., Allix, K., KLEIN, J., & BISSYANDE, T. F. D. A. (2022). The Devil is in the Details: Unwrapping the Cryptojacking Malware Ecosystem on Android. 2022 IEEE 22nd International Working Conference on Source Code Analysis and Manipulation (SCAM), 153-163. doi:10.1109/SCAM55253.2022.00023 Peer reviewed |
ARSLAN, Y., LEBICHOT, B., ALLIX, K., VEIBER, L., Lefebvre, C., Boytsov, A., Goujon, A., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). Towards Refined Classifications Driven by SHAP Explanations. In A. Holzinger, P. Kieseberg, A. M. Tjoa, ... E. Weippl (Eds.), Machine Learning and Knowledge Extraction (pp. 68-81). Springer. Peer reviewed |
Sawadogo, D. A., BISSYANDE, T. F. D. A., Moha, N., Allix, K., KLEIN, J., Li, L., & LE TRAON, Y. (August 2022). SSPCATCHER: Learning to catch security patches. Empirical Software Engineering, 27. doi:10.1007/s10664-022-10168-9 Peer Reviewed verified by ORBi |
Kim, K., GHATPANDE, S., Liu, K., Koyuncu, A., Kim, D., BISSYANDE, T. F. D. A., KLEIN, J., & Le Traon, Y. (July 2022). DigBug—Pre/post-processing operator selection for accurate bug localization. Journal of Systems and Software, 189. doi:10.1016/j.jss.2022.111300 Peer Reviewed verified by ORBi |
LOTHRITZ, C., LEBICHOT, B., ALLIX, K., VEIBER, L., BISSYANDE, T. F. D. A., KLEIN, J., Boytsov, A., Goujon, A., & Lefebvre, C. (2022). LuxemBERT: Simple and Practical Data Augmentation in Language Model Pre-Training for Luxembourgish. In Proceedings of the Language Resources and Evaluation Conference, 2022 (pp. 5080-5089). Peer reviewed |
SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs. In 19th International Conference on Mining Software Repositories, Data Showcase, (MSR 2022). doi:10.1145/3524842.3528020 Peer reviewed |
SAMHI, J., GAO, J., DAOUDI, N., Graux, P., Hoyez, H., Sun, X., ALLIX, K., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). JuCify: A Step Towards Android Code Unification for Enhanced Static Analysis. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3512766 Peer reviewed |
SAMHI, J., Li, L., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3510135 Peer reviewed |
KHANFIR, A., Koyuncu, A., PAPADAKIS, M., CORDY, M., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2022). iBiR: Bug Report driven Fault Injection. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3542946 Peer Reviewed verified by ORBi |
DAOUDI, N., ALLIX, K., BISSYANDE, T. F. D. A., & KLEIN, J. (May 2022). A Deep Dive inside DREBIN: An Explorative Analysis beyond Android Malware Detection Scores. ACM Transactions on Privacy and Security, 25 (2). doi:10.1145/3503463 Peer Reviewed verified by ORBi |
ARSLAN, Y., LEBICHOT, B., ALLIX, K., VEIBER, L., Lefebvre, C., BOYTSOV, A., Goujon, A., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). On the Suitability of SHAP Explanations for Refining Classifications. In In Proceedings of the 14th International Conference on Agents and Artificial Intelligence (ICAART 2022). doi:10.5220/0010827700003116 Peer reviewed |
ARSLAN, Y., ALLIX, K., Lefebvre, C., Boytsov, A., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). Exploiting Prototypical Explanations for Undersampling Imbalanced Datasets. In 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA) (pp. 1449-1454). doi:10.1109/ICMLA55696.2022.00228 Peer reviewed |
TIAN, H., Liu, K., LI, Y., KABORE, A. K., KOYUNCU, A., HABIB, A., Li, L., Wen, J., KLEIN, J., & BISSYANDE, T. F. D. A. (2022). The Best of Both Worlds: Combining Learned Embeddings with Engineered Features for Accurate Prediction of Correct Patches. ACM Transactions on Software Engineering and Methodology. Peer Reviewed verified by ORBi |
TIAN, H., LI, Y., PIAN, W., KABORE, A. K., Liu, K., HABIB, A., KLEIN, J., & BISSYANDE, T. F. D. A. (2022). Predicting Patch Correctness Based on the Similarity of Failing Test Cases. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3511096 Peer Reviewed verified by ORBi |
TIAN, H., TANG, X., HABIB, A., Wang, S., Liu, K., Xia, X., KLEIN, J., & BISSYANDE, T. F. D. A. (2022). Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. In Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. Peer reviewed |
TIAN, H., TANG, X., HABIB, A., Wang, S., Liu, K., Xia, X., KLEIN, J., & BISSYANDE, T. F. D. A. (2022). Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. In Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. Peer reviewed |
SUN, T., DAOUDI, N., ALLIX, K., & BISSYANDE, T. F. D. A. (2021). Android Malware Detection: Looking beyond Dalvik Bytecode. In 2021 36th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW). doi:10.1109/ASEW52652.2021.00019 Peer reviewed |
Liu, Y., Li, L., KONG, P., Sun, X., & BISSYANDE, T. F. D. A. (2021). A First Look at Security Risks of Android TV Apps. In A First Look at Security Risks of Android TV Apps. Peer reviewed |
KONG, P., Li, L., GAO, J., RIOM, T., Zhao, Y., BISSYANDE, T. F. D. A., & KLEIN, J. (2021). ANCHOR: locating android framework-specific crashing faults. Automated Software Engineering. doi:10.1007/s10515-021-00290-1 Peer Reviewed verified by ORBi |
Zhou, T., Liu, K., Li, L., Liu, Z., KLEIN, J., & BISSYANDE, T. F. D. A. (2021). SmartGift: Learning to Generate Practical Inputs for Testing Smart Contracts. In IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 1-12). IEEE. doi:10.1109/ICSME52107.2021.00009 Peer reviewed |
Zhang, J., Liu, K., Kim, D., Li, L., Liu, Z., KLEIN, J., & BISSYANDE, T. F. D. A. (2021). Revisiting Test Cases to Boost Generate-and-Validate Program Repair. In IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 1-12). doi:10.1109/ICSME52107.2021.00010 Peer reviewed |
Zhao, Y., Li, L., Wang, H., Cai, H., BISSYANDE, T. F. D. A., KLEIN, J., & Grundy, J. (July 2021). On the Impact of Sample Duplication in Machine Learning based Android Malware Detection. ACM Transactions on Software Engineering and Methodology, 30 (3), 1-38. doi:10.1145/3446905 Peer Reviewed verified by ORBi |
Sun, X., Li, L., BISSYANDE, T. F. D. A., KLEIN, J., Octeau, D., & Grundy, J. C. (July 2021). Taming Reflection: An Essential Step Toward Whole-program Analysis of Android Apps. ACM Transactions on Software Engineering and Methodology, 30 (3), 1-36. doi:10.1145/3440033 Peer Reviewed verified by ORBi |
LOTHRITZ, C., ALLIX, K., LEBICHOT, B., VEIBER, L., BISSYANDE, T. F. D. A., & KLEIN, J. (2021). Comparing MultiLingual and Multiple MonoLingual Models for Intent Classification and Slot Filling. In 26th International Conference on Applications of Natural Language to Information Systems (pp. 367-375). Springer. doi:10.1007/978-3-030-80599-9_32 Peer reviewed |
SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (May 2021). Les dangers de pastebin. Multi-System & Internet Security Cookbook, 115. |
SAMHI, J., BARTEL, A., BISSYANDE, T. F. D. A., & KLEIN, J. (2021). RAICC: Revealing Atypical Inter-Component Communication in Android Apps. In 43rd International Conference on Software Engineering (ICSE). doi:10.1109/ICSE43902.2021.00126 Peer reviewed |
ARSLAN, Y., ALLIX, K., VEIBER, L., LOTHRITZ, C., BISSYANDE, T. F. D. A., KLEIN, J., & Goujon, A. (2021). A Comparison of Pre-Trained Language Models for Multi-Class Text Classification in the Financial Domain. In Companion Proceedings of the Web Conference 2021 (WWW '21 Companion), April 19--23, 2021, Ljubljana, Slovenia (pp. 260–268). New York, United States: Association for Computing Machinery. doi:10.1145/3442442.3451375 Peer reviewed |
RIOM, T., SAWADOGO, D. D. A., ALLIX, K., BISSYANDE, T. F. D. A., MOHA, N., & KLEIN, J. (29 March 2021). Revisiting the VCCFinder approach for the identification of vulnerability-contributing commits. Empirical Software Engineering, 26. doi:10.1007/s10664-021-09944-w Peer Reviewed verified by ORBi |
Qin, Y., Wang, S., LIU, K., Mao, X., & BISSYANDE, T. F. D. A. (2021). On the Impact of Flaky Tests in Automated Program Repair. In 28th IEEE International Conference on Software Analysis, Evolution and Reengineering, Hawaii 9-12 March 2021 (pp. 295-306). doi:10.1109/SANER50967.2021.00035 Peer reviewed |
DAOUDI, N., ALLIX, K., BISSYANDE, T. F. D. A., & KLEIN, J. (2021). Lessons Learnt on Reproducibility in Machine Learning Based Android Malware Detection. Empirical Software Engineering, 26. doi:10.1007/s10664-021-09955-7 Peer Reviewed verified by ORBi |
Kui, L., Li, L., KOYUNCU, A., Dongsun, K., Liu, Z., KLEIN, J., & BISSYANDE, T. F. D. A. (2021). A critical review on the evaluation of automated program repair systems. Journal of Systems and Software. doi:10.1016/j.jss.2020.110817 Peer Reviewed verified by ORBi |
SAMHI, J., ALLIX, K., BISSYANDE, T. F. D. A., & KLEIN, J. (2021). A First Look at Android Applications in Google Play related to Covid-19. Empirical Software Engineering. doi:10.1007/s10664-021-09943-x Peer Reviewed verified by ORBi |
KELLER, P., KABORE, A. K., Plein, L., KLEIN, J., LE TRAON, Y., & BISSYANDE, T. F. D. A. (2021). What You See is What it Means! Semantic Representation Learning of Code based on Visualization. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3485135 Peer Reviewed verified by ORBi |
Yang, D., Liu, K., Kim, D., Koyuncu, A., KIM, K., TIAN, H., Lei, Y., Mao, X., KLEIN, J., & BISSYANDE, T. F. D. A. (2021). Where were the repair ingredients for Defects4j bugs? Empirical Software Engineering, 26 (6), 1--33. doi:10.1007/s10664-021-10003-7 Peer Reviewed verified by ORBi |
DAOUDI, N., SAMHI, J., KABORE, A. K., ALLIX, K., BISSYANDE, T. F. D. A., & KLEIN, J. (2021). DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode. In Communications in Computer and Information Science. Springer. doi:10.1007/978-3-030-87839-9_4 Peer reviewed |
LOTHRITZ, C., ALLIX, K., VEIBER, L., KLEIN, J., & BISSYANDE, T. F. D. A. (2020). Evaluating Pretrained Transformer-based Models on the Task of Fine-Grained Named Entity Recognition. In Proceedings of the 28th International Conference on Computational Linguistics (pp. 3750–3760). Peer reviewed |
GAO, J., li, L., KONG, P., BISSYANDE, T. F. D. A., & KLEIN, J. (2020). Borrowing your enemy's arrows: the case of code reuse in android via direct inter-app code invocation. ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. doi:10.1145/3368089.3409745 Peer reviewed |
Li, L., GAO, J., KONG, P., Wang, H., Huang, M., Li, Y., & BISSYANDE, T. F. D. A. (2020). Knowledgezooclient: Constructing knowledge graph for android. The 3rd International Workshop on Advances in Mobile App Analysis. doi:10.1145/3417113.3422187 Peer reviewed |
GHAMIZI, S., RWEMALIKA, R., CORDY, M., VEIBER, L., BISSYANDE, T. F. D. A., PAPADAKIS, M., KLEIN, J., & LE TRAON, Y. (2020). Data-driven simulation and optimization for covid-19 exit strategies. In S. GHAMIZI, R. RWEMALIKA, M. CORDY, L. VEIBER, T. F. D. A. BISSYANDE, M. PAPADAKIS, J. KLEIN, ... Y. LE TRAON, Data-driven simulation and optimization for covid-19 exit strategies (pp. 3434-3442). New York, NY, United States: Association for Computing Machinery. doi:10.1145/3394486.3412863 Peer reviewed |
VEIBER, L., ALLIX, K., ARSLAN, Y., BISSYANDE, T. F. D. A., & KLEIN, J. (2020). Challenges Towards Production-Ready Explainable Machine Learning. In L. VEIBER, K. ALLIX, Y. ARSLAN, T. F. D. A. BISSYANDE, ... J. KLEIN, Proceedings of the 2020 USENIX Conference on Operational Machine Learning (OpML 20). USENIX Association. Peer reviewed |
LIU, K., Wang, S., KOYUNCU, A., KIM, K., BISSYANDE, T. F. D. A., Kim, D., Wu, P., KLEIN, J., Mao, X., & LE TRAON, Y. (2020). On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs. In 42nd ACM/IEEE International Conference on Software Engineering (ICSE). doi:10.1145/3377811.3380338 Peer reviewed |
Liu, T., Wang, H., Li, L., Luo, X., Dong, F., Guo, Y., Wang, L., BISSYANDE, T. F. D. A., & KLEIN, J. (2020). MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps. In Proceedings of The Web Conference 2020 (pp. 1715–1726). New York, NY, USA, Unknown/unspecified: Association for Computing Machinery. doi:10.1145/3366423.3380242 Peer reviewed |
KOYUNCU, A., LIU, K., BISSYANDE, T. F. D. A., KIM, D., KLEIN, J., Monperrus, M., & LE TRAON, Y. (2020). FixMiner: Mining relevant fix patterns for automated program repair. Empirical Software Engineering. doi:10.1007/s10664-019-09780-z Peer Reviewed verified by ORBi |
li, L., GAO, J., BISSYANDE, T. F. D. A., Ma, L., Xia, X., & KLEIN, J. (11 January 2020). CDA: Characterising Deprecated Android APIs. Empirical Software Engineering, 24 (118), 1-41. doi:10.1007/s10664-019-09764-z Peer Reviewed verified by ORBi |
GAO, J., li, L., BISSYANDE, T. F. D. A., & KLEIN, J. (2020). Understanding the Evolution of Android App Vulnerabilities. IEEE Transactions on Reliability. doi:10.1109/TR.2019.2956690 Peer Reviewed verified by ORBi |
TIAN, H., LIU, K., KABORE, A. K., KOYUNCU, A., Li, L., KLEIN, J., & BISSYANDE, T. F. D. A. (2020). Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair. In H. TIAN, 35th IEEE/ACM International Conference on Automated Software Engineering, September 21-25, 2020, Melbourne, Australia. doi:10.1145/3324884.3416532 Peer reviewed |
TITCHEU CHEKAM, T., PAPADAKIS, M., BISSYANDE, T. F. D. A., LE TRAON, Y., & Sen, K. (2019). Selecting fault revealing mutants. Empirical Software Engineering, 1-54. doi:10.1007/s10664-019-09778-7 Peer Reviewed verified by ORBi |
Kang, H. J., BISSYANDE, T. F. D. A., & David, L. (2019). Assessing the Generalizability of code2vec Token Embeddings. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (pp. 1-12). doi:10.1109/ASE.2019.00011 Peer reviewed |
Oumaziz, M., Falleri, J.-R., Blanc, X., BISSYANDE, T. F. D. A., & KLEIN, J. (2019). Handling duplicates in Dockerfiles families: Learning from experts. In 35th IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 524-535). IEEE. Peer reviewed |
KOYUNCU, A., LIU, K., BISSYANDE, T. F. D. A., Kim, D., Monperrus, M., KLEIN, J., & LE TRAON, Y. (2019). iFixR: bug report driven program repair. In ESEC/FSE 2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. doi:10.1145/3338906.3338935 Peer reviewed |
Li, L., RIOM, T., BISSYANDE, T. F. D. A., Wang, H., KLEIN, J., & LE TRAON, Y. (August 2019). Revisiting the impact of common libraries for android-related investigations. Journal of Systems and Software, 154, 157-175. doi:10.1016/j.jss.2019.04.065 Peer Reviewed verified by ORBi |
KONG, P., li, L., Gao, J., BISSYANDE, T. F. D. A., & KLEIN, J. (15 July 2019). Mining Android Crash Fixes in the Absence of Issue- and Change-Tracking Systems [Paper presentation]. The 28th International Symposium on Software Testing and Analysis, Beijing, China. doi:10.1145/3293882.3330572 |
LIU, K., KOYUNCU, A., Kim, D., & BISSYANDE, T. F. D. A. (2019). TBar: Revisiting Template-based Automated Program Repair. In 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). doi:10.1145/3293882.3330577 Peer reviewed |
LIU, K., Kim, D., BISSYANDE, T. F. D. A., Kim, T., KIM, K., KOYUNCU, A., Kim, S., & LE TRAON, Y. (2019). Learning to Spot and Refactor Inconsistent Method Names. In 41st ACM/IEEE International Conference on Software Engineering (ICSE). Montreal, Canada: IEEE. Peer reviewed |
LIU, K., KOYUNCU, A., BISSYANDE, T. F. D. A., Kim, D., KLEIN, J., & LE TRAON, Y. (2019). You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems. In The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019). Xi'an, China: IEEE. doi:10.1109/ICST.2019.00020 Peer reviewed |
LI, D., LI, L., KIM, D., BISSYANDE, T. F. D. A., Lo, D., & LE TRAON, Y. (2019). Watch out for This Commit! A Study of Influential Software Changes. Journal of Software: Evolution and Process. doi:10.1002/smr.2181 Peer Reviewed verified by ORBi |
Li, L., BISSYANDE, T. F. D. A., Wang, H., & KLEIN, J. (March 2019). On Identifying and Explaining Similarities in Android Apps. Journal of Computer Science and Technology, 34 (2), 437-455. doi:10.1007/s11390-019-1918-8 Peer Reviewed verified by ORBi |
Li, L., BISSYANDE, T. F. D. A., & KLEIN, J. (2019). Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2019.2901679 Peer Reviewed verified by ORBi |
LIU, K., KOYUNCU, A., Dongsun, K., & BISSYANDE, T. F. D. A. (2019). AVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations. In The 26th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER-2019). Hangzhou, China: IEEE. doi:10.1109/SANER.2019.8667970 Peer reviewed |
GAO, J., Li, L., KONG, P., BISSYANDE, T. F. D. A., & KLEIN, J. (2019). Should You Consider Adware as Malware in Your Study? In 26th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering. Peer reviewed |
GAO, J., Li, BISSYANDE, T. F. D. A., & KLEIN, J. (2019). On the Evolution of Mobile App Complexity. Proceedings of 2019 24th International Conference on Engineering of Complex Computer Systems. Peer reviewed |
GAO, J., KONG, P., Li, L., BISSYANDE, T. F. D. A., & KLEIN, J. (2019). Negative Results on Mining Crypto-API Usage Rules in Android Apps. Proceedings of the 16th International Conference on Mining Software Repositories. doi:10.1109/MSR.2019.00065 Peer reviewed |
LIU, K., KOYUNCU, A., KIM, K., Kim, D., & BISSYANDE, T. F. D. A. (2018). LSRepair: Live Search of Fix Ingredients for Automated Program Repair. In 25th Asia-Pacific Software Engineering Conference (APSEC). Peer reviewed |
Dong, F., Wang, H., Li, L., Guo, Y., BISSYANDE, T. F. D. A., Liu, T., Xu, G., & KLEIN, J. (2018). FraudDroid: Automated Ad Fraud Detection for Android Apps. In ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018) (pp. 257-268). doi:10.1145/3236024.3236045 Peer reviewed |
Li, L., BISSYANDE, T. F. D. A., & KLEIN, J. (2018). MoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsistencies. In 29th IEEE International Symposium on Software Reliability Engineering (ISSRE) (pp. 212-223). Peer reviewed |
KONG, P., Li, L., GAO, J., LIU, K., BISSYANDE, T. F. D. A., & KLEIN, J. (2018). Automated Testing of Android Apps: A Systematic Literature Review. IEEE Transactions on Reliability, 1-22. doi:10.1109/TR.2018.2865733 Peer Reviewed verified by ORBi |
LIU, K., KIM, D., KOYUNCU, A., Li, L., BISSYANDE, T. F. D. A., & LE TRAON, Y. (2018). A Closer Look at Real-World Patches. In 34th IEEE International Conference on Software Maintenance and Evolution (ICSME). doi:10.1109/ICSME.2018.00037 Peer reviewed |
Li, L., BISSYANDE, T. F. D. A., Wang, H., & KLEIN, J. (2018). CiD: Automating the Detection of API-related Compatibility Issues in Android Apps. In International Symposium on Software Testing and Analysis (ISSTA) (pp. 153-163). ACM. doi:10.1145/3213846.3213857 Peer reviewed |
KIM, K., KIM, D., BISSYANDE, T. F. D. A., Choi, E., Li, L., KLEIN, J., & LE TRAON, Y. (2018). FaCoY - A Code-to-Code Search Engine. In International Conference on Software Engineering (ICSE 2018). Peer reviewed |
Martinez, J., Sottet, J.-S., Garcia-Frey, A., BISSYANDE, T. F. D. A., Ziadi, T., KLEIN, J., Temple, P., Mathieu, A., & LE TRAON, Y. (2018). Towards Estimating and Predicting User Perception on Software Product Variants. In 17th International Conference on Software Reuse (ICSR) (pp. 23-40). Springer, LNCS. Peer reviewed |
Li, L., GAO, J., BISSYANDE, T. F. D. A., Ma, L., Xia, X., & KLEIN, J. (2018). Characterising Deprecated Android APIs. In 15th International Conference on Mining Software Repositories (MSR 2018) (pp. 254-264). ACM. Peer reviewed |
LI, D., Lin, J., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2018). Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification. In 21st International Conference on Extending Database Technology. Peer reviewed |
LIU, K., Kim, D., BISSYANDE, T. F. D. A., Yoo, S., & LE TRAON, Y. (2018). Mining Fix Patterns for FindBugs Violations. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2018.2884955 Peer Reviewed verified by ORBi |
TITCHEU CHEKAM, T., PAPADAKIS, M., BISSYANDE, T. F. D. A., & LE TRAON, Y. (2018). Predicting the Fault Revelation Utility of Mutants. In 40th International Conference on Software Engineering, Gothenburg, Sweden, May 27 - 3 June 2018. Peer reviewed |
Martinez, J., Ziadi, T., PAPADAKIS, M., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2018). Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants. Information and Software Technology. doi:10.1016/j.infsof.2018.07.005 Peer Reviewed verified by ORBi |
Sirres, R., BISSYANDE, T. F. D. A., Kim, D., Lo, D., KLEIN, J., & LE TRAON, Y. (January 2018). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search. Empirical Software Engineering, 90, 27-39. doi:10.1007/s10664-017-9544-y Peer Reviewed verified by ORBi |
LI, L., LI, D., BISSYANDE, T. F. D. A., KLEIN, J., Cai, H., Lo, D., & LE TRAON, Y. (2017). On Locating Malicious Code in Piggybacked Android Apps. Journal of Computer Science and Technology. doi:10.1007/s11390-017-1786-z Peer reviewed |
LI, D., BISSYANDE, T. F. D. A., KLEIN, J., LE TRAON, Y., Schummer, P., Muller, B., & Solvi, A.-M. (2017). Towards a Plug-and-Play and Holistic Data Mining Framework for Understanding and Facilitating Operations in Smart Buildings. (TR-SNT-2017-5). SnT. https://orbilu.uni.lu/handle/10993/32961 |
KOYUNCU, A., BISSYANDE, T. F. D. A., KIM, D., KLEIN, J., Monperrus, M., & LE TRAON, Y. (July 2017). Impact of Tool Support in Patch Construction [Paper presentation]. 2017 International Symposium on Software Testing & Analysis (ISSTA). doi:10.1145/3092703.3092713 |
HURIER, M., Suarez-Tangil, G., Dash, S. K., BISSYANDE, T. F. D. A., LE TRAON, Y., KLEIN, J., & Cavallaro, L. (2017). Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware. In MSR 2017. Peer reviewed |
LI, L., LI, D., BISSYANDE, T. F. D. A., KLEIN, J., LE TRAON, Y., Lo, D., & Cavallaro, L. (May 2017). Understanding Android App Piggybacking [Poster presentation]. The 39th International Conference on Software Engineering. |
LI, L., BISSYANDE, T. F. D. A., BARTEL, A., KLEIN, J., & LE TRAON, Y. (May 2017). The Multi-Generation Repackaging Hypothesis [Poster presentation]. The 39th International Conference on Software Engineering. |
LI, L., LI, D., BISSYANDE, T. F. D. A., KLEIN, J., Cai, H., Lo, D., & LE TRAON, Y. (2017). Automatically Locating Malicious Packages in Piggybacked Android Apps. Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017). Peer reviewed |
LI, D., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2017). Sensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements. In The 32nd ACM Symposium on Applied Computing (SAC 2017). doi:10.1145/3019612.3019699 Peer reviewed |
Yang, X., Lo, D., LI, L., Xia, X., BISSYANDE, T. F. D. A., & KLEIN, J. (2017). Comprehending Malicious Android Apps By Mining Topic-Specific Data Flow Signatures. Information and Software Technology. doi:10.1016/j.infsof.2017.04.007 Peer Reviewed verified by ORBi |
LI, L., BISSYANDE, T. F. D. A., & KLEIN, J. (2017). SimiDroid: Identifying and Explaining Similarities in Android Apps. Abstract book of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.230 Peer reviewed |
Sirres, R., BISSYANDE, T. F. D. A., KIM, D., Lo, D., KLEIN, J., & LE TRAON, Y. (2017). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search. https://orbilu.uni.lu/handle/10993/30408 |
LI, L., BISSYANDE, T. F. D. A., PAPADAKIS, M., Rasthofer, S., BARTEL, A., Octeau, D., KLEIN, J., & LE TRAON, Y. (2017). Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology. doi:10.1016/j.infsof.2017.04.001 Peer Reviewed verified by ORBi |
LI, L., LI, D., BISSYANDE, T. F. D. A., KLEIN, J., LE TRAON, Y., Lo, D., & Cavallaro, L. (2017). Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2017.2656460 Peer Reviewed verified by ORBi |
LI, L., BISSYANDE, T. F. D. A., LE TRAON, Y., & KLEIN, J. (2016). Accessing Inaccessible Android APIs: An Empirical Study. In The 32nd International Conference on Software Maintenance and Evolution (ICSME) (pp. 12). Peer reviewed |
LI, D., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). DSCo-NG: A Practical Language Modeling Approach for Time Series Classification. In The 15th International Symposium on Intelligent Data Analysis. Peer reviewed |
MANUKYAN, A., OLIVARES MENDEZ, M. A., BISSYANDE, T. F. D. A., VOOS, H., & LE TRAON, Y. (2016). UAV degradation identification for pilot notification using machine learning techniques. Proceedings of 21st IEEE International Conference on Emerging Technologies and Factory Automation ETFA 2016. doi:10.1109/ETFA.2016.7733537 Peer reviewed |
LI, L., BISSYANDE, T. F. D. A., Octeau, D., & KLEIN, J. (2016). Reflection-Aware Static Analysis of Android Apps. In The 31st IEEE/ACM International Conference on Automated Software (ASE) (pp. 6). doi:10.1145/2970276.2970277 Peer reviewed |
LI, D., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (September 2016). Time Series Classification with Discrete Wavelet Transformed Data. International Journal of Software Engineering and Knowledge Engineering, 26 (9&10), 1361–1377. doi:10.1142/S0218194016400088 Peer Reviewed verified by ORBi |
JIMENEZ, M., PAPADAKIS, M., BISSYANDE, T. F. D. A., & KLEIN, J. (2016). Profiling Android Vulnerabilities. In 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS 2016) (pp. 222-229). IEEE Computer Society. doi:10.1109/QRS.2016.34 Peer reviewed |
LI, D., LI, L., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). DSCo: A Language Modeling Approach for Time Series Classification. In 12th International Conference on Machine Learning and Data Mining (MLDM 2016). Peer reviewed |
LI, L., BISSYANDE, T. F. D. A., Octeau, D., & KLEIN, J. (2016). DroidRA: Taming Reflection to Support Whole-Program Analysis of Android Apps. In The 2016 International Symposium on Software Testing and Analysis. doi:10.1145/2931037.2931044 Peer reviewed |
LI, D., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study. In The 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016). Peer reviewed |
ALLIX, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). AndroZoo: Collecting Millions of Android Apps for the Research Community. In Proceedings of the 13th International Workshop on Mining Software Repositories (pp. 468--471). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2901739.2903508 Peer reviewed |
LI, L., BISSYANDE, T. F. D. A., PAPADAKIS, M., Rasthofer, S., BARTEL, A., Octeau, D., KLEIN, J., & LE TRAON, Y. (2016). Static Analysis of Android Apps: A Systematic Literature Review. SnT. https://orbilu.uni.lu/handle/10993/26879 |
LI, L., LI, D., BISSYANDE, T. F. D. A., Lo, D., KLEIN, J., & LE TRAON, Y. (2016). Ungrafting Malicious Code from Piggybacked Android Apps. SnT. https://orbilu.uni.lu/handle/10993/26880 |
LI, L., LI, D., BARTEL, A., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Towards a Generic Framework for Automating Extensive Analysis of Android Applications. In The 31st ACM/SIGAPP Symposium on Applied Computing (SAC 2016). Peer reviewed |
LI, L., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). An Investigation into the Use of Common Libraries in Android Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 12). doi:10.1109/SANER.2016.52 Peer reviewed |
LI, L., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Parameter Values of Android APIs: A Preliminary Study on 100,000 Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 5). doi:10.1109/SANER.2016.51 Peer reviewed |
LI, D., BISSYANDE, T. F. D. A., KUBLER, S., KLEIN, J., & LE TRAON, Y. (2016). Profiling household appliance electricity usage with n-gram language modeling. In The 2016 IEEE International Conference on Industrial Technology (ICIT 2016). Peer reviewed |
MARTINEZ, J., Ziadi, T., PAPADAKIS, M., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Feature Location Benchmark for Software Families using Eclipse Community Releases. In Software Reuse: Bridging with Social-Awareness, ICSR 2016 Proceedings. doi:10.1007/978-3-319-35122-3_18 Peer reviewed |
LI, L., MARTINEZ, J., Ziadi, T., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Mining Families of Android Applications for Extractive SPL Adoption. In The 20th International Systems and Software Product Line Conference (SPLC 2016). Peer reviewed |
MARTINEZ, J., Ziadi, T., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Name Suggestions during Feature Identification: The VariClouds Approach. In 20th International Systems and Software Product Line Conference (SPLC 2016) proceedings. Peer reviewed |
HURIER, M., ALLIX, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. In Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference (pp. 142--162). Springer. doi:10.1007/978-3-319-40667-1_8 Peer reviewed |
OLIVARES MENDEZ, M. A., Fu, C., Ludivig, P., BISSYANDE, T. F. D. A., KANNAN, S., ZURAD, M., ANNAIYAN, A., VOOS, H., & Campoy, P. (12 December 2015). Towards an Autonomous Vision-Based Unmanned Aerial System against Wildlife Poachers. Sensors, 15 (12), 29861. doi:10.3390/s151229861 Peer reviewed |
BISSYANDE, T. F. D. A., Ouoba, J., Ahmat, D., Ouédraogo, F., Béré, C., Bikienga, M., Sere, A., Dandjinou, M., & Sié, O. (2015). Vulnerabilities of Government Websites in a Developing Country – The Case of Burkina Faso. In 7th International Conference on e‐Infrastructure and e‐Services for Developing Countries. Peer reviewed |
LI, L., ALLIX, K., LI, D., BARTEL, A., BISSYANDE, T. F. D. A., & KLEIN, J. (2015). Potential Component Leaks in Android Apps: An Investigation into a new Feature Set for Malware Detection. In The 2015 IEEE International Conference on Software Quality, Reliability and Security (QRS 2015). doi:10.1109/QRS.2015.36 Peer reviewed |
BISSYANDE, T. F. D. A. (2015). Harvesting Fix Hints in the History of Bugs. (TR-SNT-2015-6). SnT, University of Luxembourg. https://orbilu.uni.lu/handle/10993/30244 |
LI, L., ALLIX, K., LI, D., BARTEL, A., BISSYANDE, T. F. D. A., & KLEIN, J. (2015). A Study of Potential Component Leaks in Android Apps. SnT Centre - University of Luxembourg. https://orbilu.uni.lu/handle/10993/25337 |
LI, L., BARTEL, A., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2015). ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. In International Conference on ICT Systems Security and Privacy Protection (SEC 2015). Peer reviewed |
LI, L., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (March 2015). Using An Instrumentation based Approach to Detect Inter-Component Leaks in Android Apps [Paper presentation]. Grande Region Security and Reliability Day 2015. |
MARTINEZ, J., Ziadi, T., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2015). Automating the Extraction of Model-based Software Product Lines from Model Variants. In 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015). doi:10.1109/ASE.2015.44 Peer reviewed |
LI, L., BARTEL, A., BISSYANDE, T. F. D. A., KLEIN, J., LE TRAON, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015). Peer reviewed |
ALLIX, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2015). Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. In Engineering Secure Software and Systems - 7th International Symposium ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings (pp. 51-67). Springer International Publishing. doi:10.1007/978-3-319-15618-7_5 Peer reviewed |
ALLIX, K., BISSYANDE, T. F. D. A., JEROME, Q., KLEIN, J., STATE, R., & LE TRAON, Y. (2014). Empirical assessment of machine learning-based malware detectors for Android: Measuring the Gap between In-the-Lab and In-the-Wild Validation Scenarios. Empirical Software Engineering, 1-29. doi:10.1007/s10664-014-9352-6 Peer Reviewed verified by ORBi |
Ouoba, J., & BISSYANDE, T. F. D. A. (2014). Sensing in the Urban Technological Deserts-A Position Paper for Smart Cities in Least Developed Countries. In International Workshop on Web Intelligence and Smart Sensing. doi:10.1145/2637064.2637097 Peer reviewed |
ALLIX, K., JEROME, Q., BISSYANDE, T. F. D. A., KLEIN, J., STATE, R., & LE TRAON, Y. (2014). A Forensic Analysis of Android Malware -- How is Malware Written and How It Could Be Detected? In Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference (pp. 384--393). Washington, DC, USA, Unknown/unspecified: IEEE Computer Society. doi:10.1109/COMPSAC.2014.61 Peer reviewed |
ALLIX, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2014). Machine Learning-Based Malware Detection for Android Applications: History Matters! Luxembourg, Luxembourg: University of Luxembourg, SnT. https://orbilu.uni.lu/handle/10993/17251 |
BISSYANDE, T. F. D. A., Réveillère, L., Lawall, J., & Muller, G. (2014). Ahead of time static analysis for automatic generation of debugging interfaces to the Linux kernel. Automated Software Engineering, 1-39. doi:10.1007/s10515-014-0152-4 Peer Reviewed verified by ORBi |
ALLIX, K., BISSYANDE, T. F. D. A., JEROME, Q., KLEIN, J., STATE, R., & LE TRAON, Y. (2014). Large-scale Machine Learning-based Malware Detection: Confronting the "10-fold Cross Validation" Scheme with Reality. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (pp. 163--166). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2557547.2557587 Peer reviewed |
BISSYANDE, T. F. D. A., & van Stam, G. (Eds.). (2014). e-Infrastructure and e-Services for Developing Countries. Springer. doi:10.1007/978-3-319-08368-1 |
BISSYANDE, T. F. D. A., Lo, D., Jiang, L., Reveillere, L., KLEIN, J., & LE TRAON, Y. (2013). Got Issues? Who Cares About It? A Large Scale Investigation of Issue Trackers from GitHub. In Proceedings of the 24th International Symposium on Software Reliability Engineering (ISSRE 2013). doi:10.1109/ISSRE.2013.6698918 Peer reviewed |
BISSYANDE, T. F. D. A., Réveillère, L., Lawall, J., Bromberg, D., & Muller, G. (2013). Implementing an Embedded Compiler using Program Transformation Rules. Software: Practice and Experience, 1..20. doi:10.1002/spe.2225 Peer Reviewed verified by ORBi |
Pavneet Singh, K., BISSYANDE, T. F. D. A., Lo, D., & Jiang, L. (2013). An Empirical Study of Adoption of Software Testing in Open Source Projects. In Proceedings of the 13th International Conference on Quality Software (QSIC 2013). Peer reviewed |
Ahmat, D., BISSYANDE, T. F. D. A., & Magoni, D. (2013). Towards Securing Communications in Infrastructure-poor Areas. In Proceedings of the 5th EAI International Conference on e-Infrastructure and e-Services for Developing Countries. Peer reviewed |
BISSYANDE, T. F. D. A., Ahmat, D., Ouoba, J., van Stam, G., KLEIN, J., & LE TRAON, Y. (2013). Sustainable ICT4D in Africa: Where Do We Go From Here? In EAI International Conference on e-Infrastructure and e-Services for Developing Countries. Peer reviewed |