Profil

KLEIN Jacques

University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX

Main Referenced Co-authors
BISSYANDE, Tegawendé  (130)
LE TRAON, Yves  (107)
LI, Li  (30)
BARTEL, Alexandre  (29)
Li, Li (28)
Main Referenced Keywords
Android (23); Android Security (7); malware (7); Model-Driven Engineering (6); Static Analysis (6);
Main Referenced Unit & Research Centers
SnT (18)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Trustworthy Software Engineering (TruX) (6)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Security Design and Validation Research Group (SerVal) (5)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > TruX - Trustworthy Software Engineering (4)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Other (3)
Main Referenced Disciplines
Computer science (204)
Arts & humanities: Multidisciplinary, general & others (1)
Aerospace & aeronautics engineering (1)

Publications (total 205)

The most downloaded
6696 downloads
Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., & McDaniel, P. (June 2014). FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps [Paper presentation]. ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI 2014). https://hdl.handle.net/10993/20223

The most cited

637 citations (Scopus®)

Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). AndroZoo: Collecting Millions of Android Apps for the Research Community. In Proceedings of the 13th International Workshop on Mining Software Repositories (pp. 468--471). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2901739.2903508 https://hdl.handle.net/10993/27396

SONG, Y., EZZINI, S., TANG, X., LOTHRITZ, C., KLEIN, J., BISSYANDE, T. F. D. A., BOYTSOV, A., BLE, U., & GOUJON, A. (In press). Enhancing Text-to-SQL Translation for Financial System Design. In ICSE-SEIP '24: Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Practice (pp. 11). New York, United States: Institute of Electrical and Electronics Engineers Inc.
Peer reviewed

ALECCI, M., RUIZ JIMÉNEZ, P. J., Kevin Allix, BISSYANDE, T. F. D. A., & KLEIN, J. (2024). AndroZoo: A Retrospective with a Glimpse into the Future. 2024 IEEE/ACM 21st International Conference on Mining Software Repositories (MSR).
Peer reviewed

ALECCI, M., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). Revisiting Android App Categorization. In ICSE '24: Proceedings of the 46th International Conference on Software Engineering. IEEE Press.
Peer reviewed

ALECCI, M., SAMHI, J., LI, L., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). Improving Logic Bomb Identification in Android Apps via Context-Aware Anomaly Detection. IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2024.3358979
Peer Reviewed verified by ORBi

Guo, J., Liu, J., Liu, X., Wan, Y., Zhao, Y., Li, L., Liu, K., KLEIN, J., & BISSYANDE, T. F. D. A. (2023). PyScribe–Learning to describe python code. Software: Practice and Experience, 1-27. doi:10.1002/spe.3291
Peer Reviewed verified by ORBi

SUN, T., ALLIX, K., KIM, K., Zhou, X., KIM, D., Lo, D., Bissyande, T. F., & KLEIN, J. (01 September 2023). DexBERT: Effective, Task-Agnostic and Fine-Grained Representation Learning of Android Bytecode. IEEE Transactions on Software Engineering, 49 (10), 4691 - 4706. doi:10.1109/TSE.2023.3310874
Peer Reviewed verified by ORBi

Krishnan, P., Cifuentes, C., Li, L., BISSYANDE, T. F. D. A., & KLEIN, J. (September 2023). Why Is Static Application Security Testing Hard to Learn? IEEE Security and Privacy, 21 (5), 68 - 72. doi:10.1109/MSEC.2023.3287206
Editorial reviewed

Chen, Q., Zhou, T., Liu, K., Li, L., Ge, C., Liu, Z., KLEIN, J., & BISSYANDE, T. F. D. A. (September 2023). Tips: towards automating patch suggestion for vulnerable smart contracts. Automated Software Engineering, 30 (2). doi:10.1007/s10515-023-00392-y
Peer Reviewed verified by ORBi

Lothritz, C., Ezzini, S., Purschke, C., Bissyande, T. F. D. A., Klein, J., Olariu, I., Boytsov, A., Lefebvre, C., & Goujon, A. (2023). Comparing Pre-Training Schemes for Luxembourgish BERT Models. In Proceedings of the 19th Conference on Natural Language Processing (KONVENS 2023).
Peer reviewed

Kim, K., Ghatpande, S., Kim, D., Zhou, X., Liu, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (26 August 2023). Big Code Search: A Bibliography. ACM Computing Surveys, 56 (1), 1-49. doi:10.1145/3604905
Peer Reviewed verified by ORBi

KABORE, A. K., Barr, E. T., KLEIN, J., & Bissyandé, T. F. (2023). CodeGrid: A Grid Representation of Code. In R. Just (Ed.), ISSTA 2023 - Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. Association for Computing Machinery, Inc. doi:10.1145/3597926.3598141
Peer reviewed

DANG, X., Li, Y., PAPADAKIS, M., KLEIN, J., BISSYANDE, T. F. D. A., & LE TRAON, Y. (2023). GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3607191
Peer Reviewed verified by ORBi

Kober, M., Samhi, J., Arzt, S., Bissyande, T. F. D. A., & Klein, J. (2023). Sensitive and Personal Data: What Exactly Are You Talking About? In 10th International Conference on Mobile Software Engineering and Systems 2023.
Peer reviewed

LOTHRITZ, C., LEBICHOT, B., ALLIX, K., EZZINI, S., BISSYANDE, T. F. D. A., KLEIN, J., Boytsov, A., Lefebvre, C., & Goujon, A. (2023). Evaluating the Impact of Text De-Identification on Downstream NLP Tasks. In Proceedings of the 24th Nordic Conference on Computational Linguistics (NoDaLiDa). Tartu, Estonia: University of Tartu Library.
Peer reviewed

SONG, Y., EZZINI, S., KLEIN, J., BISSYANDE, T. F. D. A., Lefebvre, C., & Goujon, A. (2023). Letz Translate: Low-Resource Machine Translation for Luxembourgish. In Proceedings - 2023 5th International Conference on Natural Language Processing, ICNLP 2023. Institute of Electrical and Electronics Engineers Inc. doi:10.1109/ICNLP58431.2023.00036
Peer reviewed

Samhi, J., Kober, K., Kabore, A. K., Arzt, S., Bissyande, T. F. D. A., & Klein, J. (2023). Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection. In 30th IEEE International Conference on Software Analysis, Evolution and Reengineering.
Peer reviewed

PIAN, W., Peng, H., TANG, X., SUN, T., TIAN, H., Habib, A., KLEIN, J., & BISSYANDE, T. F. D. A. (February 2023). MetaTPTrans: A Meta Learning Approach for Multilingual Code Representation Learning. Proceedings of the AAAI Conference on Artificial Intelligence, 37 (4), 5239-5247. doi:10.1609/aaai.v37i4.25654
Peer reviewed

Liu, K., Zhang, J., Li, L., Koyuncu, A., Kim, D., Ge, C., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (2023). Reliable Fix Patterns Inferred from Static Checkers for Automated Program Repair. ACM Transactions on Software Engineering and Methodology, 1-38.
Peer Reviewed verified by ORBi

OLARIU, I., LOTHRITZ, C., BISSYANDE, T. F. D. A., & KLEIN, J. (2023). Evaluating Data Augmentation Techniques for the Training of Luxembourgish Language Models. In Conference on Natural Language Processing. KONVENS.
Peer reviewed

OLARIU, I., LOTHRITZ, C., KLEIN, J., BISSYANDE, T. F. D. A., Guo, S., & Haddadan, S. (2023). Evaluating Parameter-Efficient Finetuning Approaches for Pre-trained Models on the Financial Domain. In Empirical Methods in Natural Language Processing. Association for Computational Linguistics.
Peer reviewed

Daoudi, N., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2023). Guided Retraining to Enhance the Detection of Difficult Android Malware. In 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023). doi:10.1145/3597926.3598123
Peer reviewed

Daoudi, N., Allix, K., Bissyande, T. F. D. A., & Klein, J. (December 2022). Assessing the opportunity of combining state-of-the-art Android malware detectors. Empirical Software Engineering, 28. doi:10.1007/s10664-022-10249-9
Peer Reviewed verified by ORBi

Sun, X., Chen, X., Li, L., Cai, H., Grundy, J., Samhi, J., Bissyande, T. F. D. A., & Klein, J. (2022). Demystifying Hidden Sensitive Operations in Android apps. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3574158
Peer Reviewed verified by ORBi

Yan, D., Liu, K., Niu, Y., Li, L., Liu, Z., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (December 2022). Crex: Predicting patch correctness in automated repair of C programs through transfer learning of execution semantics. Information and Software Technology, 152, 1-12. doi:10.1016/j.infsof.2022.107043
Peer Reviewed verified by ORBi

Nirumand, A., Zamani, B., Tork-Ladani, B., Klein, J., & Bissyande, T. F. D. A. (2022). A model-based framework for inter-app Vulnerability analysis of Android applications. Software: Practice and Experience, 1-42. doi:10.1002/spe.3171
Peer Reviewed verified by ORBi

Adjibi, B. V., Mbodji, F. N., Allix, K., Klein, J., & Bissyande, T. F. D. A. (2022). The Devil is in the Details: Unwrapping the Cryptojacking Malware Ecosystem on Android. 2022 IEEE 22nd International Working Conference on Source Code Analysis and Manipulation (SCAM), 153-163. doi:10.1109/SCAM55253.2022.00023
Peer reviewed

Arslan, Y., Lebichot, B., Allix, K., Veiber, L., Lefebvre, C., Boytsov, A., Goujon, A., Bissyande, T. F. D. A., & Klein, J. (2022). Towards Refined Classifications Driven by SHAP Explanations. In A. Holzinger, P. Kieseberg, A. M. Tjoa, ... E. Weippl (Eds.), Machine Learning and Knowledge Extraction (pp. 68-81). Springer.
Peer reviewed

Sawadogo, D. A., Bissyande, T. F. D. A., Moha, N., Allix, K., Klein, J., Li, L., & Le Traon, Y. (August 2022). SSPCATCHER: Learning to catch security patches. Empirical Software Engineering, 27. doi:10.1007/s10664-022-10168-9
Peer Reviewed verified by ORBi

Kim, K., Ghatpande, S., Liu, K., Koyuncu, A., Kim, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (July 2022). DigBug—Pre/post-processing operator selection for accurate bug localization. Journal of Systems and Software, 189. doi:10.1016/j.jss.2022.111300
Peer Reviewed verified by ORBi

Lothritz, C., Lebichot, B., Allix, K., Veiber, L., Bissyande, T. F. D. A., Klein, J., Boytsov, A., Goujon, A., & Lefebvre, C. (2022). LuxemBERT: Simple and Practical Data Augmentation in Language Model Pre-Training for Luxembourgish. In Proceedings of the Language Resources and Evaluation Conference, 2022 (pp. 5080-5089).
Peer reviewed

Samhi, J., Bissyande, T. F. D. A., & Klein, J. (2022). TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs. In 19th International Conference on Mining Software Repositories, Data Showcase, (MSR 2022). doi:10.1145/3524842.3528020
Peer reviewed

Samhi, J., Gao, J., Daoudi, N., Graux, P., Hoyez, H., Sun, X., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2022). JuCify: A Step Towards Android Code Unification for Enhanced Static Analysis. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3512766
Peer reviewed

Samhi, J., Li, L., Bissyande, T. F. D. A., & Klein, J. (2022). Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3510135
Peer reviewed

Khanfir, A., Koyuncu, A., Papadakis, M., Cordy, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2022). iBiR: Bug Report driven Fault Injection. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3542946
Peer Reviewed verified by ORBi

Daoudi, N., Allix, K., Bissyande, T. F. D. A., & Klein, J. (May 2022). A Deep Dive inside DREBIN: An Explorative Analysis beyond Android Malware Detection Scores. ACM Transactions on Privacy and Security, 25 (2). doi:10.1145/3503463
Peer reviewed

Arslan, Y., Lebichot, B., Allix, K., Veiber, L., Lefebvre, C., Boytsov, A., Goujon, A., Bissyande, T. F. D. A., & Klein, J. (2022). On the Suitability of SHAP Explanations for Refining Classifications. In In Proceedings of the 14th International Conference on Agents and Artificial Intelligence (ICAART 2022). doi:10.5220/0010827700003116
Peer reviewed

Tian, H., Tang, X., Habib, A., Wang, S., Liu, K., Xia, X., Klein, J., & Bissyande, T. F. D. A. (2022). Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. In Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness.
Peer reviewed

Tian, H., Li, Y., Pian, W., Kabore, A. K., Liu, K., Habib, A., Klein, J., & Bissyande, T. F. D. A. (2022). Predicting Patch Correctness Based on the Similarity of Failing Test Cases. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3511096
Peer Reviewed verified by ORBi

Tian, H., Liu, K., Li, Y., Kabore, A. K., Koyuncu, A., Habib, A., Li, L., Wen, J., Klein, J., & Bissyande, T. F. D. A. (2022). The Best of Both Worlds: Combining Learned Embeddings with Engineered Features for Accurate Prediction of Correct Patches. ACM Transactions on Software Engineering and Methodology.
Peer reviewed

Arslan, Y., Allix, K., Lefebvre, C., Boytsov, A., Bissyande, T. F. D. A., & Klein, J. (2022). Exploiting Prototypical Explanations for Undersampling Imbalanced Datasets. In 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA) (pp. 1449-1454). doi:10.1109/ICMLA55696.2022.00228
Peer reviewed

Tian, H., Tang, X., Habib, A., Wang, S., Liu, K., Xia, X., Klein, J., & Bissyande, T. F. D. A. (2022). Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. In Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness.
Peer reviewed

Kong, P., Li, L., Gao, J., Riom, T., Zhao, Y., Bissyande, T. F. D. A., & Klein, J. (2021). ANCHOR: locating android framework-specific crashing faults. Automated Software Engineering. doi:10.1007/s10515-021-00290-1
Peer Reviewed verified by ORBi

Zhou, T., Liu, K., Li, L., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (2021). SmartGift: Learning to Generate Practical Inputs for Testing Smart Contracts. In IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 1-12). IEEE. doi:10.1109/ICSME52107.2021.00009
Peer reviewed

Zhang, J., Liu, K., Kim, D., Li, L., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (2021). Revisiting Test Cases to Boost Generate-and-Validate Program Repair. In IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 1-12). doi:10.1109/ICSME52107.2021.00010
Peer reviewed

Zhao, Y., Li, L., Wang, H., Cai, H., Bissyande, T. F. D. A., Klein, J., & Grundy, J. (July 2021). On the Impact of Sample Duplication in Machine Learning based Android Malware Detection. ACM Transactions on Software Engineering and Methodology, 30 (3), 1-38. doi:10.1145/3446905
Peer Reviewed verified by ORBi

Sun, X., Li, L., Bissyande, T. F. D. A., Klein, J., Octeau, D., & Grundy, J. C. (July 2021). Taming Reflection: An Essential Step Toward Whole-program Analysis of Android Apps. ACM Transactions on Software Engineering and Methodology, 30 (3), 1-36. doi:10.1145/3440033
Peer Reviewed verified by ORBi

Lothritz, C., Allix, K., Lebichot, B., Veiber, L., Bissyande, T. F. D. A., & Klein, J. (2021). Comparing MultiLingual and Multiple MonoLingual Models for Intent Classification and Slot Filling. In 26th International Conference on Applications of Natural Language to Information Systems (pp. 367-375). Springer. doi:10.1007/978-3-030-80599-9_32
Peer reviewed

Klein, J. (2021). A Journey Through Android App Analysis: Solutions and Open Challenges. In International Symposium on Advanced Security on Software and Systems (pp. 1-6). ACM. doi:10.1145/3457340.3458298

Samhi, J., Bissyande, T. F. D. A., & Klein, J. (May 2021). Les dangers de pastebin. Multi-System & Internet Security Cookbook, 115.

Samhi, J., Bartel, A., Bissyande, T. F. D. A., & Klein, J. (2021). RAICC: Revealing Atypical Inter-Component Communication in Android Apps. In 43rd International Conference on Software Engineering (ICSE). doi:10.1109/ICSE43902.2021.00126
Peer reviewed

Arslan, Y., Allix, K., Veiber, L., Lothritz, C., Bissyande, T. F. D. A., Klein, J., & Goujon, A. (2021). A Comparison of Pre-Trained Language Models for Multi-Class Text Classification in the Financial Domain. In Companion Proceedings of the Web Conference 2021 (WWW '21 Companion), April 19--23, 2021, Ljubljana, Slovenia (pp. 260–268). New York, United States: Association for Computing Machinery. doi:10.1145/3442442.3451375
Peer reviewed

Riom, T., Sawadogo, D. D. A., Allix, K., Bissyande, T. F. D. A., Moha, N., & Klein, J. (29 March 2021). Revisiting the VCCFinder approach for the identification of vulnerability-contributing commits. Empirical Software Engineering, 26. doi:10.1007/s10664-021-09944-w
Peer Reviewed verified by ORBi

Kui, L., Li, L., Koyuncu, A., Dongsun, K., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (2021). A critical review on the evaluation of automated program repair systems. Journal of Systems and Software. doi:10.1016/j.jss.2020.110817
Peer Reviewed verified by ORBi

Daoudi, N., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2021). Lessons Learnt on Reproducibility in Machine Learning Based Android Malware Detection. Empirical Software Engineering, 26. doi:10.1007/s10664-021-09955-7
Peer Reviewed verified by ORBi

Keller, P., Kabore, A. K., Plein, L., Klein, J., Le Traon, Y., & Bissyande, T. F. D. A. (2021). What You See is What it Means! Semantic Representation Learning of Code based on Visualization. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3485135
Peer Reviewed verified by ORBi

Yang, D., Liu, K., Kim, D., Koyuncu, A., Kim, K., Tian, H., Lei, Y., Mao, X., Klein, J., & Bissyande, T. F. D. A. (2021). Where were the repair ingredients for Defects4j bugs? Empirical Software Engineering, 26 (6), 1--33. doi:10.1007/s10664-021-10003-7
Peer reviewed

Daoudi, N., Samhi, J., Kabore, A. K., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2021). DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode. In Communications in Computer and Information Science. Springer. doi:10.1007/978-3-030-87839-9_4
Peer reviewed

Samhi, J., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2021). A First Look at Android Applications in Google Play related to Covid-19. Empirical Software Engineering. doi:10.1007/s10664-021-09943-x
Peer Reviewed verified by ORBi

Lothritz, C., Allix, K., Veiber, L., Klein, J., & Bissyande, T. F. D. A. (2020). Evaluating Pretrained Transformer-based Models on the Task of Fine-Grained Named Entity Recognition. In Proceedings of the 28th International Conference on Computational Linguistics (pp. 3750–3760).
Peer reviewed

Gao, J., li, L., Kong, P., Bissyande, T. F. D. A., & Klein, J. (2020). Borrowing your enemy's arrows: the case of code reuse in android via direct inter-app code invocation. ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. doi:10.1145/3368089.3409745
Peer reviewed

Ghamizi, S., Rwemalika, R., Cordy, M., Veiber, L., Bissyande, T. F. D. A., Papadakis, M., Klein, J., & Le Traon, Y. (2020). Data-driven simulation and optimization for covid-19 exit strategies. In S. Ghamizi, R. Rwemalika, M. Cordy, L. Veiber, T. F. D. A. Bissyande, M. Papadakis, J. Klein, ... Y. Le Traon, Data-driven simulation and optimization for covid-19 exit strategies (pp. 3434-3442). New York, NY, United States: Association for Computing Machinery. doi:10.1145/3394486.3412863
Peer reviewed

Veiber, L., Allix, K., Arslan, Y., Bissyande, T. F. D. A., & Klein, J. (2020). Challenges Towards Production-Ready Explainable Machine Learning. In L. Veiber, K. Allix, Y. Arslan, T. F. D. A. Bissyande, ... J. Klein, Proceedings of the 2020 USENIX Conference on Operational Machine Learning (OpML 20). USENIX Association.
Peer reviewed

Liu, K., Wang, S., Koyuncu, A., Kim, K., Bissyande, T. F. D. A., Kim, D., Wu, P., Klein, J., Mao, X., & Le Traon, Y. (2020). On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs. In 42nd ACM/IEEE International Conference on Software Engineering (ICSE). doi:10.1145/3377811.3380338
Peer reviewed

Liu, T., Wang, H., Li, L., Luo, X., Dong, F., Guo, Y., Wang, L., Bissyande, T. F. D. A., & Klein, J. (2020). MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps. In Proceedings of The Web Conference 2020 (pp. 1715–1726). New York, NY, USA, Unknown/unspecified: Association for Computing Machinery. doi:10.1145/3366423.3380242
Peer reviewed

Koyuncu, A., Liu, K., Bissyande, T. F. D. A., Kim, D., Klein, J., Monperrus, M., & Le Traon, Y. (2020). FixMiner: Mining relevant fix patterns for automated program repair. Empirical Software Engineering. doi:10.1007/s10664-019-09780-z
Peer Reviewed verified by ORBi

li, L., Gao, J., Bissyande, T. F. D. A., Ma, L., Xia, X., & Klein, J. (11 January 2020). CDA: Characterising Deprecated Android APIs. Empirical Software Engineering, 24 (118), 1-41. doi:10.1007/s10664-019-09764-z
Peer Reviewed verified by ORBi

Gao, J., li, L., Bissyande, T. F. D. A., & Klein, J. (2020). Understanding the Evolution of Android App Vulnerabilities. IEEE Transactions on Reliability. doi:10.1109/TR.2019.2956690
Peer Reviewed verified by ORBi

Tian, H., Liu, K., Kabore, A. K., Koyuncu, A., Li, L., Klein, J., & Bissyande, T. F. D. A. (2020). Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair. In H. Tian, 35th IEEE/ACM International Conference on Automated Software Engineering, September 21-25, 2020, Melbourne, Australia. doi:10.1145/3324884.3416532
Peer reviewed

Oumaziz, M., Falleri, J.-R., Blanc, X., Bissyande, T. F. D. A., & Klein, J. (2019). Handling duplicates in Dockerfiles families: Learning from experts. In 35th IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 524-535). IEEE.
Peer reviewed

Koyuncu, A., Liu, K., Bissyande, T. F. D. A., Kim, D., Monperrus, M., Klein, J., & Le Traon, Y. (2019). iFixR: bug report driven program repair. In ESEC/FSE 2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. doi:10.1145/3338906.3338935
Peer reviewed

Li, L., Riom, T., Bissyande, T. F. D. A., Wang, H., Klein, J., & Le Traon, Y. (August 2019). Revisiting the impact of common libraries for android-related investigations. Journal of Systems and Software, 154, 157-175. doi:10.1016/j.jss.2019.04.065
Peer Reviewed verified by ORBi

Kong, P., li, L., Gao, J., Bissyande, T. F. D. A., & Klein, J. (15 July 2019). Mining Android Crash Fixes in the Absence of Issue- and Change-Tracking Systems [Paper presentation]. The 28th International Symposium on Software Testing and Analysis, Beijing, China. doi:10.1145/3293882.3330572

Liu, K., Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., & Le Traon, Y. (2019). You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems. In The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019). Xi'an, China: IEEE. doi:10.1109/ICST.2019.00020
Peer reviewed

Li, L., Bissyande, T. F. D. A., Wang, H., & Klein, J. (March 2019). On Identifying and Explaining Similarities in Android Apps. Journal of Computer Science and Technology, 34 (2), 437-455. doi:10.1007/s11390-019-1918-8
Peer reviewed

Li, L., Bissyande, T. F. D. A., & Klein, J. (2019). Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2019.2901679
Peer reviewed

Gao, J., Li, L., Kong, P., Bissyande, T. F. D. A., & Klein, J. (2019). Should You Consider Adware as Malware in Your Study? In 26th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering.
Peer reviewed

Gao, J., Li, Bissyande, T. F. D. A., & Klein, J. (2019). On the Evolution of Mobile App Complexity. Proceedings of 2019 24th International Conference on Engineering of Complex Computer Systems.
Peer reviewed

BARTEL, A., Klein, J., & Le Traon, Y. (2019). Désérialisation Java : Une brève introduction au ROP de haut niveau. Multi-System & Internet Security Cookbook, 101.

Bartel, A., Klein, J., & Le Traon, Y. (2019). MUSTI: Dynamic Prevention of Invalid Object Initialization Attacks. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2019.2894356
Peer Reviewed verified by ORBi

Gao, J., Kong, P., Li, L., Bissyande, T. F. D. A., & Klein, J. (2019). Negative Results on Mining Crypto-API Usage Rules in Android Apps. Proceedings of the 16th International Conference on Mining Software Repositories. doi:10.1109/MSR.2019.00065
Peer reviewed

Dong, F., Wang, H., Li, L., Guo, Y., Bissyande, T. F. D. A., Liu, T., Xu, G., & Klein, J. (2018). FraudDroid: Automated Ad Fraud Detection for Android Apps. In ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018) (pp. 257-268). doi:10.1145/3236024.3236045
Peer reviewed

Li, L., Bissyande, T. F. D. A., & Klein, J. (2018). MoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsistencies. In 29th IEEE International Symposium on Software Reliability Engineering (ISSRE) (pp. 212-223).
Peer reviewed

Kong, P., Li, L., Gao, J., Liu, K., Bissyande, T. F. D. A., & Klein, J. (2018). Automated Testing of Android Apps: A Systematic Literature Review. IEEE Transactions on Reliability, 1-22. doi:10.1109/TR.2018.2865733
Peer Reviewed verified by ORBi

Li, L., Bissyande, T. F. D. A., Wang, H., & Klein, J. (2018). CiD: Automating the Detection of API-related Compatibility Issues in Android Apps. In International Symposium on Software Testing and Analysis (ISSTA) (pp. 153-163). ACM. doi:10.1145/3213846.3213857
Peer reviewed

Bartel, A., Klein, J., & Le Traon, Y. (2018). MUSTI: Dynamic Prevention of Invalid Object Initialization Attacks. (TR-SNT-2018-3). Université du Luxembourg.

Kim, K., Kim, D., Bissyande, T. F. D. A., Choi, E., Li, L., Klein, J., & Le Traon, Y. (2018). FaCoY - A Code-to-Code Search Engine. In International Conference on Software Engineering (ICSE 2018).
Peer reviewed

Li, L., Gao, J., Bissyande, T. F. D. A., Ma, L., Xia, X., & Klein, J. (2018). Characterising Deprecated Android APIs. In 15th International Conference on Mining Software Repositories (MSR 2018) (pp. 254-264). ACM.
Peer reviewed

Martinez, J., Sottet, J.-S., Garcia-Frey, A., Bissyande, T. F. D. A., Ziadi, T., Klein, J., Temple, P., Mathieu, A., & Le Traon, Y. (2018). Towards Estimating and Predicting User Perception on Software Product Variants. In 17th International Conference on Software Reuse (ICSR) (pp. 23-40). Springer, LNCS.
Peer reviewed

Li, D., Lin, J., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification. In 21st International Conference on Extending Database Technology.
Peer reviewed

Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants. Information and Software Technology. doi:10.1016/j.infsof.2018.07.005
Peer Reviewed verified by ORBi

Bartel, A., Klein, J., & Le Traon, Y. (2018). Fini le Bac à Sable. Avec le CVE-2017-3272, devenez un grand! Multi-System & Internet Security Cookbook, 97.

Bartel, A., Klein, J., & Le Traon, Y. (2018). Désérialisation Java : Une brève introduction. Multi-System & Internet Security Cookbook, 100.

Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (January 2018). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search. Empirical Software Engineering, 90, 27-39. doi:10.1007/s10664-017-9544-y
Peer Reviewed verified by ORBi

Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017). On Locating Malicious Code in Piggybacked Android Apps. Journal of Computer Science and Technology. doi:10.1007/s11390-017-1786-z
Peer reviewed

Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Schummer, P., Muller, B., & Solvi, A.-M. (2017). Towards a Plug-and-Play and Holistic Data Mining Framework for Understanding and Facilitating Operations in Smart Buildings. (TR-SNT-2017-5). SnT.

Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., Monperrus, M., & Le Traon, Y. (July 2017). Impact of Tool Support in Patch Construction [Paper presentation]. 2017 International Symposium on Software Testing & Analysis (ISSTA). doi:10.1145/3092703.3092713

Hurier, M., Suarez-Tangil, G., Dash, S. K., Bissyande, T. F. D. A., Le Traon, Y., Klein, J., & Cavallaro, L. (2017). Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware. In MSR 2017.
Peer reviewed

Li, L., Bissyande, T. F. D. A., Bartel, A., Klein, J., & Le Traon, Y. (May 2017). The Multi-Generation Repackaging Hypothesis [Poster presentation]. The 39th International Conference on Software Engineering.

Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (May 2017). Understanding Android App Piggybacking [Poster presentation]. The 39th International Conference on Software Engineering.

Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017). Automatically Locating Malicious Packages in Piggybacked Android Apps. Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017).
Peer reviewed

Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2017). Sensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements. In The 32nd ACM Symposium on Applied Computing (SAC 2017). doi:10.1145/3019612.3019699
Peer reviewed

Li, L., Bissyande, T. F. D. A., & Klein, J. (2017). SimiDroid: Identifying and Explaining Similarities in Android Apps. Abstract book of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.230
Peer reviewed

Yang, X., Lo, D., Li, L., Xia, X., Bissyande, T. F. D. A., & Klein, J. (2017). Comprehending Malicious Android Apps By Mining Topic-Specific Data Flow Signatures. Information and Software Technology. doi:10.1016/j.infsof.2017.04.007
Peer reviewed

Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (2017). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search.

Li, L., Bissyande, T. F. D. A., Papadakis, M., Rasthofer, S., Bartel, A., Octeau, D., Klein, J., & Le Traon, Y. (2017). Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology. doi:10.1016/j.infsof.2017.04.001
Peer reviewed

Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (2017). Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2017.2656460
Peer reviewed

Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo-NG: A Practical Language Modeling Approach for Time Series Classification. In The 15th International Symposium on Intelligent Data Analysis.
Peer reviewed

Li, L., Bissyande, T. F. D. A., Le Traon, Y., & Klein, J. (2016). Accessing Inaccessible Android APIs: An Empirical Study. In The 32nd International Conference on Software Maintenance and Evolution (ICSME) (pp. 12).
Peer reviewed

Li, L., Bissyande, T. F. D. A., Octeau, D., & Klein, J. (2016). Reflection-Aware Static Analysis of Android Apps. In The 31st IEEE/ACM International Conference on Automated Software (ASE) (pp. 6). doi:10.1145/2970276.2970277
Peer reviewed

Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (September 2016). Time Series Classification with Discrete Wavelet Transformed Data. International Journal of Software Engineering and Knowledge Engineering, 26 (9&10), 1361–1377. doi:10.1142/S0218194016400088
Peer Reviewed verified by ORBi

Jimenez, M., Papadakis, M., Bissyande, T. F. D. A., & Klein, J. (2016). Profiling Android Vulnerabilities. In 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS 2016) (pp. 222-229). IEEE Computer Society. doi:10.1109/QRS.2016.34
Peer reviewed

Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study. In The 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016).
Peer reviewed

Li, L., Bissyande, T. F. D. A., Octeau, D., & Klein, J. (2016). DroidRA: Taming Reflection to Support Whole-Program Analysis of Android Apps. In The 2016 International Symposium on Software Testing and Analysis. doi:10.1145/2931037.2931044
Peer reviewed

Li, D., Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo: A Language Modeling Approach for Time Series Classification. In 12th International Conference on Machine Learning and Data Mining (MLDM 2016).
Peer reviewed

Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). AndroZoo: Collecting Millions of Android Apps for the Research Community. In Proceedings of the 13th International Workshop on Mining Software Repositories (pp. 468--471). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2901739.2903508
Peer reviewed

Li, L., Bissyande, T. F. D. A., Papadakis, M., Rasthofer, S., BARTEL, A., Octeau, D., Klein, J., & Le Traon, Y. (2016). Static Analysis of Android Apps: A Systematic Literature Review. SnT.

Li, L., Li, D., Bissyande, T. F. D. A., Lo, D., Klein, J., & Le Traon, Y. (2016). Ungrafting Malicious Code from Piggybacked Android Apps. SnT.

Li, L., Li, D., BARTEL, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Towards a Generic Framework for Automating Extensive Analysis of Android Applications. In The 31st ACM/SIGAPP Symposium on Applied Computing (SAC 2016).
Peer reviewed

Hartmann, T., Moawad, A., Fouquet, F., Reckinger, Y., Klein, J., & Le Traon, Y. (2016). Near Real-Time Electric Load Approximation in Low Voltage Cables of Smart Grids with Models@run.time. In 31st Annual ACM Symposium on Applied Computing (SAC'16) (pp. 2119--2126).
Peer reviewed

Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). An Investigation into the Use of Common Libraries in Android Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 12). doi:10.1109/SANER.2016.52
Peer reviewed

Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Parameter Values of Android APIs: A Preliminary Study on 100,000 Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 5). doi:10.1109/SANER.2016.51
Peer reviewed

Li, D., Bissyande, T. F. D. A., Kubler, S., Klein, J., & Le Traon, Y. (2016). Profiling household appliance electricity usage with n-gram language modeling. In The 2016 IEEE International Conference on Industrial Technology (ICIT 2016).
Peer reviewed

Octeau, D., Jha, S., Dering, M., McDaniel, P., BARTEL, A., Li, L., Klein, J., & Le Traon, Y. (2016). Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis. In The 43rd Symposium on Principles of Programming Languages (POPL 2016).
Peer reviewed

Hurier, M., Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. In Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference (pp. 142--162). Springer. doi:10.1007/978-3-319-40667-1_8
Peer reviewed

Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Feature Location Benchmark for Software Families using Eclipse Community Releases. In Software Reuse: Bridging with Social-Awareness, ICSR 2016 Proceedings. doi:10.1007/978-3-319-35122-3_18
Peer reviewed

Li, L., Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Mining Families of Android Applications for Extractive SPL Adoption. In The 20th International Systems and Software Product Line Conference (SPLC 2016).
Peer reviewed

Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Name Suggestions during Feature Identification: The VariClouds Approach. In 20th International Systems and Software Product Line Conference (SPLC 2016) proceedings.
Peer reviewed

Hartmann, T., Moawad, A., Fouquet, F., Reckinger, Y., Mouelhi, T., Klein, J., & Le Traon, Y. (2015). Suspicious Electric Consumption Detection Based on Multi-Profiling Using Live Machine Learning. In 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
Peer reviewed

Nguyen, P. H., Yskout, K., Heyman, T., Klein, J., Scandariato, R., & Le Traon, Y. (2015). SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems. In Proceedings ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems. doi:10.1109/MODELS.2015.7338255
Peer reviewed

Moawad, A., Hartmann, T., Fouquet, F., Nain, G., Klein, J., & Le Traon, Y. (2015). Beyond Discrete Modeling: A Continuous and Efficient Model for IoT. In T. Lethbridge, J. Cabot, ... A. Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 90-99). Passau, Germany: Conference Publishing Consulting. doi:10.1109/MODELS.2015.7338239
Peer reviewed

Hartmann, T., Moawad, A., Fouquet, F., Nain, G., Klein, J., & Le Traon, Y. (2015). Stream my Models: Reactive Peer-to-Peer Distributed Models@run.time. In T. Lethbridge, J. Cabot, ... A. Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 80-89). Passau, Germany: Conference Publishing Consulting.
Peer reviewed

Nguyen, P. H., Kramer, M., Klein, J., & Le Traon, Y. (September 2015). An Extensive Systematic Review on the Model-Driven Development of Secure Systems. Information and Software Technology, 68 (December 2015), 62-81. doi:10.1016/j.infsof.2015.08.006
Peer reviewed

Li, L., Allix, K., Li, D., BARTEL, A., Bissyande, T. F. D. A., & Klein, J. (2015). Potential Component Leaks in Android Apps: An Investigation into a new Feature Set for Malware Detection. In The 2015 IEEE International Conference on Software Quality, Reliability and Security (QRS 2015). doi:10.1109/QRS.2015.36
Peer reviewed

Li, L., Allix, K., Li, D., BARTEL, A., Bissyande, T. F. D. A., & Klein, J. (2015). A Study of Potential Component Leaks in Android Apps. SnT Centre - University of Luxembourg.

Li, L., BARTEL, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. In International Conference on ICT Systems Security and Privacy Protection (SEC 2015).
Peer reviewed

Moawad, A., Hartmann, T., Fouquet, F., Klein, J., & Le Traon, Y. (2015). Adaptive Blurring of Sensor Data to balance Privacy and Utility for Ubiquitous Services. In The 30th Annual ACM Symposium on Applied Computing (pp. 2271-2278). ACM. doi:10.1145/2695664.2695855
Peer reviewed

Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (March 2015). Using An Instrumentation based Approach to Detect Inter-Component Leaks in Android Apps [Paper presentation]. Grande Region Security and Reliability Day 2015.

Moawad, A., Hartmann, T., Fouquet, F., Nain, G., Klein, J., & Bourcier, J. (2015). Polymer: A Model-Driven Approach for Simpler, Safer, and Evolutive Multi-Objective Optimization Development. In S. Hammoudi, L. F. Pires, P. Desfray, ... J. Filipe (Eds.), MODELSWARD 2015 - Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development (pp. 286-293). Portugal: SCITEPRESS. doi:10.5220/0005243202860293
Peer reviewed

Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. In Engineering Secure Software and Systems - 7th International Symposium ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings (pp. 51-67). Springer International Publishing. doi:10.1007/978-3-319-15618-7_5
Peer reviewed

Li, L., Bissyandé, T. F., Klein, J., & Le Traon, Y. (2015). An Investigation into the Use of Common Libraries in Android Apps. arXiv preprint arXiv:1511.06554. doi:10.1109/SANER.2016.52
Peer reviewed

Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Automating the Extraction of Model-based Software Product Lines from Model Variants. In 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015). doi:10.1109/ASE.2015.44
Peer reviewed

Martinez, J., Ziadi, T., Bissyandé, T. F., Klein, J., & Traon, Y. L. (2015). Bottom-up adoption of software product lines: a generic and extensible approach. In Proceedings of the 19th International Conference on Software Product Line, SPLC 2015, Nashville, TN, USA, July 20-24, 2015 (pp. 101--110). doi:10.1145/2791060.2791086
Peer reviewed

Martinez, J., Rossi, G., Ziadi, T., Bissyandé, T. F. D. A., Klein, J., & Traon, Y. L. (2015). Estimating and Predicting Average Likability on Computer-Generated Artwork Variants. In Genetic and Evolutionary Computation Conference, GECCO 2015, Madrid Spain, July 11-15, 2015, Companion Material Proceedings (pp. 1431--1432). ACM. doi:10.1145/2739482.2764681
Peer reviewed

Li, L., BARTEL, A., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015).
Peer reviewed

Allix, K., Bissyande, T. F. D. A., Jerome, Q., Klein, J., State, R., & Le Traon, Y. (2014). Empirical assessment of machine learning-based malware detectors for Android: Measuring the Gap between In-the-Lab and In-the-Wild Validation Scenarios. Empirical Software Engineering, 1-29. doi:10.1007/s10664-014-9352-6
Peer reviewed

Hartmann, T., Fouquet, F., Klein, J., Le Traon, Y., Pelov, A., Toutain, L., & Ropitault, T. (2014). Generating Realistic Smart Grid Communication Topologies Based on Real-Data. In 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
Peer reviewed

Li, L., {"lastName":"BARTEL", F. A. A. U. O. L. U. E. I. C. F. S. R. A. T. S., Klein, J., & Le Traon, Y. (2014). Automatically Exploiting Potential Component Leaks in Android Applications. In The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), IEEE, Sept. 2014, Beijing, China.
Peer reviewed

Nguyen, P. H., Klein, J., & Le Traon, Y. (2014). Model-Driven Security with A System of Aspect-Oriented Security Design Patterns. In 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling. doi:10.1145/2631675.2631683
Peer reviewed

Hartmann, T., Fouquet, F., Nain, G., Brice, M., Klein, J., & Le Traon, Y. (02 July 2014). Model-based time-distorted Contexts for efficient temporal Reasoning [Poster presentation]. 26th International Conference on Software Engineering and Knowledge Engineering, Vancouver, Canada.

Hartmann, T., Fouquet, F., Nain, G., Morin, B., Klein, J., & Le Traon, Y. (2014). Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach. In Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering (1st, pp. 586-591). Vancouver, Canada: Knowledge Systems Institute Graduate School, USA.
Peer reviewed

Allix, K., Jerome, Q., Bissyande, T. F. D. A., Klein, J., State, R., & Le Traon, Y. (2014). A Forensic Analysis of Android Malware -- How is Malware Written and How It Could Be Detected? In Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference (pp. 384--393). Washington, DC, USA, Unknown/unspecified: IEEE Computer Society. doi:10.1109/COMPSAC.2014.61
Peer reviewed

Li, L., Bartel, A., Klein, J., & Le Traon, Y. (2014). Automatically Exploiting Potential Component Leaks in Android Applications. (TR-SnT-2014-13). Luxembourg, Luxembourg: SnT.

Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., & McDaniel, P. (June 2014). FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps [Paper presentation]. ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI 2014).

Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (June 2014). Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android. IEEE Transactions on Software Engineering, 40 (6), 617-632. doi:10.1109/TSE.2014.2322867
Peer reviewed

Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2014). Machine Learning-Based Malware Detection for Android Applications: History Matters! Luxembourg, Luxembourg: University of Luxembourg, SnT.

Li, L., Bartel, A., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2014). I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis. (TR-SNT-2014-9, Technical Report). Luxembourg, Luxembourg: SnT Centre - University of Luxembourg.

Hartmann, T., Fouquet, F., Klein, J., Nain, G., & Le Traon, Y. (2014). Reactive Security for Smart Grids Using Models@run.time-Based Simulation and Reasoning. In Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14).
Peer reviewed

Li, L., Bartel, A., Klein, J., & Le Traon, Y. (12 March 2014). Using A Path Matching Algorithm to Detect Inter-Component Leaks in Android Apps [Paper presentation]. Grande Region Security and Reliability Day 2014.

Allix, K., Bissyande, T. F. D. A., Jerome, Q., Klein, J., State, R., & Le Traon, Y. (2014). Large-scale Machine Learning-based Malware Detection: Confronting the "10-fold Cross Validation" Scheme with Reality. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (pp. 163--166). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2557547.2557587
Peer reviewed

Li, L., Bartel, A., Klein, J., & Le Traon, Y. (26 February 2014). Detecting privacy leaks in Android Apps [Paper presentation]. International Symposium on Engineering Secure Software and Systems - Doctoral Symposium.

Nguyen, P. H., Klein, J., & Le Traon, Y. (2014). Modeling, composing, and testing of security concerns in a Model-Driven Security approach. In W. Joosen, F. Martinelli, ... T. Heyman (Eds.), Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014).
Peer reviewed

Lucio, L., Zhang, Q., Nguyen, P. H., Amrani, M., Klein, J., Vangheluwe, H., & Le Traon, Y. (2014). Advances in Model-Driven Security. In A. Memon (Ed.), Advances in Computers. Elsevier. doi:10.1016/B978-0-12-800162-2.00003-8
Peer reviewed

Olivares Mendez, M. A., Bissyandé, T., Somasundar, K., Klein, J., Voos, H., & Le Traon, Y. (2014). The NOAH Project: Giving a Chance to Threatened Species in Africa with UAVs. In T. F. Bissyandé & G. van Stam (Eds.), e-Infrastructure and e-Services for Developing Countries (pp. 198-208). Springer International Publishing. doi:10.1007/978-3-319-08368-1_24
Peer reviewed

Martinez, J., Ziadi, T., Mazo, R., Klein, J., & Le Traon, Y. (2014). Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines. In 2nd IEEE Working Conference on Software Visualization. doi:10.1109/VISSOFT.2014.18
Peer reviewed

Martinez, J., Ziadi, T., Klein, J., & Le Traon, Y. (2014). Identifying and Visualising Commonality and Variability in Model Variants. In ECMFA 2014 European Conference on Modelling Foundations and Applications.
Peer reviewed

Henard, C., Papadakis, M., Perrouin, G., Klein, J., Heymans, P., & Le Traon, Y. (2014). Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Configurations for Software Product Lines. IEEE Transactions on Software Engineering, 40 (7), 650-670. doi:10.1109/TSE.2014.2327020
Peer reviewed

Nguyen, P. H., Nain, G., Klein, J., Mouelhi, T., & Le Traon, Y. (2014). Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management. Transactions on Aspect-Oriented Software Development, 11, 109-144.
Peer reviewed

Martinez, J., Ziadi, T., Klein, J., & Le Traon, Y. (2014). BUT4Reuse Feature identifier: Identifying reusable features on software variants [Poster presentation]. 3ème Conférence en IngénieriE du Logiciel.

Hartmann, T., Fouquet, F., Nain, G., Morin, B., Klein, J., Barais, O., & Le Traon, Y. (2014). A Native Versioning Concept to Support Historized Models at Runtime. In J. Dingel, W. Schulte, I. Ramos, S. Abrahao, ... E. Insfran (Eds.), Model-Driven Engineering Languages and Systems - 17th International Conference, MODELS 2014, Valencia, Spain, September 28 - October 3, 2014. Proceedings (1st, pp. 252-268). Springer. doi:10.1007/978-3-319-11653-2_16
Peer reviewed

Nguyen, P. H., Klein, J., Kramer, M., & Le Traon, Y. (2013). A Systematic Review of Model-Driven Security. In The 20th Asia-Pacific Software Engineering Conference Proceedings.
Peer reviewed

Bissyande, T. F. D. A., Lo, D., Jiang, L., Reveillere, L., Klein, J., & Le Traon, Y. (2013). Got Issues? Who Cares About It? A Large Scale Investigation of Issue Trackers from GitHub. In Proceedings of the 24th International Symposium on Software Reliability Engineering (ISSRE 2013). doi:10.1109/ISSRE.2013.6698918
Peer reviewed

Kramer, M. E., Klein, J., Steel, J. R. H., Morin, B., Kienzle, J., Barais, O., & Jézéquel, J.-M. (2013). Achieving Practical Genericity in Model Weaving through Extensibility. In K. Duddy & G. Kappel (Eds.), Theory and Practice of Model Transformations (pp. 108-124). Springer Berlin Heidelberg. doi:10.1007/978-3-642-38883-5_12
Peer reviewed

Fritz, C., Arzt, S., Rasthofer, S., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., & McDaniel, P. (2013). Highly precise taint analysis for Android applications.

Nguyen, P. H., Nain, G., Klein, J., Mouelhi, T., & Le Traon, Y. (2013). Model-Driven Adaptive Delegation. In S. Chiba, N. Ubayashi, ... H. Masuhara (Eds.), Proceedings of the 12th annual international conference companion on Aspect-oriented software development. New York, United States: ACM. doi:10.1145/2451436.2451445
Peer reviewed

Octeau, D., McDaniel, P., Jha, S., Bartel, A., Bodden, E., Klein, J., & Le Traon, Y. (2013). Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. In Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis.
Peer reviewed

Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). Multi-objective test generation for software product lines. In 17th International Software Product Line Conference, SPLC 2013, Tokyo, Japan - August 26 - 30, 2013. ACM. doi:10.1145/2491627.2491635
Peer reviewed

Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing. In 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, Workshops Proceedings, Luxembourg, Luxembourg, March 18-22, 2013. IEEE. doi:10.1109/ICSTW.2013.30
Peer reviewed

Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). Towards automated testing and fixing of re-engineered feature models. In Proceedings of the 2013 International Conference on Software Engineering. Piscataway, NJ, USA, Unknown/unspecified: IEEE Press.
Peer reviewed

Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). PLEDGE: a product line editor and test generation tool. In 17th International Software Product Line Conference co-located workshops, SPLC 2013 workshops, Tokyo, Japan - August 26. ACM. doi:10.1145/2499777.2499778
Peer reviewed

Bissyande, T. F. D. A., Ahmat, D., Ouoba, J., van Stam, G., Klein, J., & Le Traon, Y. (2013). Sustainable ICT4D in Africa: Where Do We Go From Here? In EAI International Conference on e-Infrastructure and e-Services for Developing Countries.
Peer reviewed

Perrouin, G., Morin, B., Chauvel, F., Fleurey, F., Klein, J., Le Traon, Y., Barais, O., & Jézéquel, J.-M. (2012). Towards Flexible Evolution of Dynamically Adaptive Systems. In New Ideas & Emerging Results Track of the International Conference of Software Engineering (NIER@ICSE) (pp. 1353-1356). IEEE Press.
Peer reviewed

Perrouin, G., Oster, S., Sen, S., Klein, J., Baudry, B., & Le Traon, Y. (2012). Pairwise testing for software product lines: Comparison of two approaches. Software Quality Journal, 20 (3), 605-643. doi:10.1007/s11219-011-9160-9
Peer reviewed

Mens, T., & Klein, J. (2012). Evolving Software - Introduction to the Special Theme. ERCIM News, 88, 8-9.

Klein, J., Kramer, M. E., Steel, J. R. H., Morin, B., Kienzle, J., Barais, O., & Jézéquel, J.-M. (2012). On the Formalisation of GeKo: a Generic Aspect Models Weaver. In On the Formalisation of GeKo: a Generic Aspect Models Weaver (Tech Report) (pp. 1-15). SnT Technical Report.

Mussbacher, G., Al Abed, W., Alam, O., Ali, S., Beugnard, A., Bonnet, V., Bræk, R., Capozucca, A., Cheng, B., Fatima, U., France, R., Georg, G., Guelfi, N., Istoan, P., Jézéquel, J.-M., Kienzle, J., Klein, J., Lézoray, J.-B., Malakuti, S., ... Troup, L. (2012). Comparing Six Modeling Approaches. In J. Kienzle (Ed.), Models in Software Engineering (pp. 217-243). Springer Berlin. doi:10.1007/978-3-642-29645-1_22
Peer reviewed

Bartel, A., Klein, J., Monperrus, M., Allix, K., & Le Traon, Y. (2012). In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/25161.

Bartel, A., Klein, J., Monperrus, M., Allix, K., & Le Traon, Y. (2012). Improving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation. Luxembourg, Unknown/unspecified: uni.lu.

Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (2012). Dexpler: Converting Android Dalvik Bytecode to Jimple for Static Analysis with Soot. In ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2012) (pp. 1-12). doi:10.1145/2259051.2259056
Peer reviewed

Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (2012). Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android. In IEEE/ACM International Conference on Automated Software Engineering (pp. 1-4). doi:10.1145/2351676.2351722
Peer reviewed

Henard, C., Papadakis, M., Perrouin, G., Klein, J., Heymans, P., & Le Traon, Y. (2012). Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Suites for Large Software Product Lines. Technical Report.

Kramer, M. E., Klein, J., & Steel, J. R. H. (2012). Building specifications as a domain-specific aspect language. DSAL'12 - Proceedings of the 7th Workshop on Domain-Specific Aspect Languages, 29-31. doi:10.1145/2162037.2162047
Peer reviewed

Istoan, P., Biri, N., & Klein, J. (2011). Issues in model-driven behavioural product derivation. In Fifth International Workshop on Variability Modelling of Software-intensive Systems (Vamos 2011). ACM. doi:10.1145/1944892.1944900
Peer reviewed

Alferez, M., Amalio, N., Ciraci, S., Fleurey, F., Kienzle, J., Klein, J., Kramer, M., Mosser, S., Mussbacher, G., Roubtsova, E., & Zhang, G. (2011). Aspect-Oriented Model Development at Different Levels of Abstraction. In Modelling Foundations and Applications - 7th European Conference, ECMFA 2011 (pp. 6698–361). Springer.
Peer reviewed

Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (2011). Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android. In Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android (Tech Report) (pp. 1-11). Tech Report.

Istoan, P., Klein, J., Perrouin, G., & Jezequel, J.-M. (2011). A Metamodel-based Classification of Variability Modeling Approaches. In VARY, International Workshop affiliated with ACM/IEEE 14th International Conference on Driven Engineering Languages and Systems (pp. 2011–144–23). IT University of Copenhagen.
Peer reviewed

Bartel, A., Baudry, B., Munoz, F., Klein, J., Mouelhi, T., & Le Traon, Y. (2011). Model Driven Mutation Applied to Adaptative Systems Testing. 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops. doi:10.1109/ICSTW.2011.24
Peer reviewed

Perrouin, G., Sen, S., Klein, J., Baudry, B., & Le Traon, Y. (2010). Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines. International Conference on Software Test and Validation. doi:10.1109/ICST.2010.43
Peer reviewed

Joerg, K., Wisam, A. A., Fleurey, F., Jézéquel, J.-M., & Klein, J. (2010). Aspect-Oriented Design with Reusable Aspect Models. Transactions on Aspect-Oriented Software Development, 1-1. doi:10.1145/1509239.1509252
Peer reviewed

Morin, B., Klein, J., Kienzle, J., & Jézéquel, J.-M. (2010). Flexible model element introduction policies for aspect-oriented modeling. Abstract book of 13th IEEE/ACM International Conference on Model Driven Engineering Languages and Systems, MODELS 2010, LNCS, 6395 LNCS (PART 2), 63-77. doi:10.1007/978-3-642-16129-2_6
Peer reviewed

Kienzle, J., Al Abed, W., & Klein, J. (2009). Aspect-Oriented Multi-View Modeling. Abstract book of 8th International Conference on Aspect Oriented Software Development (AOSD.09).
Peer reviewed

Klein, J., Kienzle, J., Morin, B., & Jézéquel, J.-M. (2009). Aspect model unweaving. Abstract book of 12th IEEE/ACM International Conference on Model Driven Engineering Languages and Systems, MODELS 2009, 5795 LNCS, 514-530. doi:10.1007/978-3-642-04425-0_39
Peer reviewed

Morin, B., Klein, J., Barais, O., & Jezequel, J.-M. (2008). A Generic Weaver for supporting Product Lines. Early Aspects Workshop at E.
Peer reviewed

Perrouin, G., Klein, J., Guelfi, N., & Jezequel, J. M. (2008). Reconciling Automation and Flexibility in Product Derivation. Abstract book of 12th International Software Product Line Conference (SPLC2008). doi:10.1109/SPLC.2008.38
Peer reviewed

Barais, O., Klein, J., Baudry, B., Jackson, A., & Clarke, S. (2008). Composing Multi-View Aspect Models. Abstract book of 7th IEEE International Conference on Composition Based Software Systems. doi:10.1109/ICCBSS.2008.12
Peer reviewed

Klein, J., & Kienzle, J. (2007). Reusable Aspect Models. Abstract book of 11th Workshop on Aspect Oriented Modeling, AOM at Models’07.
Peer reviewed

Contact ORBilu