![]() ![]() | RUIZ RODRIGUEZ, M. L., KUBLER, S., Robert, J., & LE TRAON, Y. (15 August 2024). Dynamic maintenance scheduling approach under uncertainty: Comparison between reinforcement learning, genetic algorithm simheuristic, dispatching rules. Expert Systems with Applications, 248, 123404. doi:10.1016/j.eswa.2024.123404 ![]() |
DOGOULIS, P. T., JIMENEZ, M., GHAMIZI, S., CORDY, M., & LE TRAON, Y. (28 July 2024). Robustness Analysis of AI Models in Critical Energy Systems [Poster presentation]. International Conference on Machine Learning, Vienna, Austria. ![]() |
![]() ![]() | DANG, X., LI, Y., Wei Ma, Yuejun Guo, Qiang Hu, PAPADAKIS, M., CORDY, M., & LE TRAON, Y. (22 July 2024). Towards Exploring the Limitations of Test Selection Techniques on Graph Neural Networks: An Empirical Study. Empirical Software Engineering, 29 (5). doi:10.1007/s10664-024-10515-y ![]() |
![]() ![]() | LI, Y., DANG, X., Ma, L., KLEIN, J., LE TRAON, Y., & BISSYANDE, T. F. D. A. (04 June 2024). Test Input Prioritization for 3D Point Clouds. ACM Transactions on Software Engineering and Methodology, 33 (5), 1-44. doi:10.1145/3643676 ![]() |
![]() ![]() | DANG, X.* , LI, Y.* , PAPADAKIS, M., KLEIN, J., BISSYANDE, T. F. D. A., & LE TRAON, Y. (05 January 2024). Test Input Prioritization for Machine Learning Classifiers. IEEE Transactions on Software Engineering, 50 (3), 413 - 442. doi:10.1109/TSE.2024.3350019 ![]() * These authors have contributed equally to this work. |
![]() ![]() | HU, Q., Yuejun Guo, Xiaofei Xie, CORDY, M., Lei Ma, PAPADAKIS, M., & LE TRAON, Y. (2024). Test Optimization in DNN Testing: A Survey. ACM Transactions on Software Engineering and Methodology, 33 (4), 111:1-111:42. doi:10.1145/3643678 ![]() |
![]() ![]() | SIMONETTO, T. J. A., CORDY, M., GHAMIZI, S., LE TRAON, Y., Lefebvre, C., Boystov, A., & Goujon, A. (2024). On the Impact of Industrial Delays when Mitigating Distribution Drifts: an Empirical Study on Real-world Financial Systems. In KDD Workshop on Discovering Drift Phenomena in Evolving Data Landscape. Springer. ![]() |
![]() ![]() | Nasiri, N., ZEINALI, S., Ravadanegh, S. N., KUBLER, S., & LE TRAON, Y. (2024). Decentralized Privacy-Preserving Distributionally Robust Restoration of Electricity/Natural-Gas Systems Considering Coordination of Pump Storage Hydropower and Wind Farms. IEEE Access, 12, 13747 - 13762. doi:10.1109/ACCESS.2024.3354891 ![]() |
![]() ![]() | Kim, K., Ghatpande, S., Kim, D., Zhou, X., Liu, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (26 August 2023). Big Code Search: A Bibliography. ACM Computing Surveys, 56 (1), 1-49. doi:10.1145/3604905 ![]() |
![]() ![]() | HU, Q., Guo, Y., Xie, X., CORDY, M., Ma, W., PAPADAKIS, M., & LE TRAON, Y. (2023). Evaluating the Robustness of Test Selection Methods for Deep Neural Networks. preprint. doi:https://doi.org/10.48550/arXiv.2308.01314 |
![]() ![]() | DANG, X., LI, Y., PAPADAKIS, M., KLEIN, J., BISSYANDE, T. F. D. A., & LE TRAON, Y. (2023). GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3607191 ![]() |
![]() ![]() | AKLI, A., HABEN, G., Habchi, S., PAPADAKIS, M., & LE TRAON, Y. (2023). FlakyCat: Predicting Flaky Tests Categories using Few-Shot Learning. In FlakyCat: Predicting Flaky Tests Categories using Few-Shot Learning. doi:10.1109/AST58925.2023.00018 ![]() |
![]() ![]() | GUBRI, M., CORDY, M., & LE TRAON, Y. (2023). Going Further: Flatness at the Rescue of Early Stopping for Adversarial Example Transferability. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/55436. |
![]() ![]() | GARG, A., OJDANIC, M., DEGIOVANNI, R. G., TITCHEU CHEKAM, T., PAPADAKIS, M., & LE TRAON, Y. (2023). Cerebro: Static Subsuming Mutant Selection. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2022.3140510 ![]() |
![]() ![]() | OJDANIC, M., KHANFIR, A., GARG, A., DEGIOVANNI, R. G., PAPADAKIS, M., & LE TRAON, Y. (2023). On Comparing Mutation Testing Tools through Learning-based Mutant Selection. In On Comparing Mutation Testing Tools through Learning-based Mutant Selection (pp. 10). doi:10.1109/AST58925.2023.00008 ![]() |
![]() ![]() | OJDANIC, M., GARG, A., KHANFIR, A., DEGIOVANNI, R. G., PAPADAKIS, M., & LE TRAON, Y. (2023). Syntactic Vs. Semantic similarity of Artificial and Real Faults in Mutation Testing Studies. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/49190. doi:10.1109/TSE.2023.3277564 |
![]() ![]() | DYRMISHI, S., GHAMIZI, S., SIMONETTO, T. J. A., LE TRAON, Y., & CORDY, M. (2023). On the empirical effectiveness of unrealistic adversarial hardening against realistic adversarial attacks. In Conference Proceedings 2023 IEEE Symposium on Security and Privacy (SP) (pp. 1384-1400). IEEE. doi:10.1109/SP46215.2023.00049 ![]() |
![]() ![]() | KUBLER, S., Renard, M., GHATPANDE, S., Georges, J.-P., & LE TRAON, Y. (2023). Decision support system for blockchain (DLT) platform selection based on ITU recommendations: A systematic literature review approach. Expert systems with applications, 211, 118704. doi:10.1016/j.eswa.2022.118704 ![]() |
![]() ![]() | GHAMIZI, S., Zhang, J., CORDY, M., PAPADAKIS, M., Sugiyama, M., & LE TRAON, Y. (2023). GAT: Guided Adversarial Training with Pareto-optimal Auxiliary Tasks. Proceedings of the International Conference on Machine Learning (ICML), 202, 11255–11282. ![]() |
![]() ![]() | Dong, Z., HU, Q., GUO, Y., CORDY, M., PAPADAKIS, M., Zhang, Z., LE TRAON, Y., & Zhao, J. (2023). MixCode: Enhancing Code Classification by Mixup-Based Data Augmentation. IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 379–390. doi:10.1109/SANER56733.2023.00043 ![]() |
![]() ![]() | HU, Q., GUO, Y., Xie, X., CORDY, M., PAPADAKIS, M., Ma, L., & LE TRAON, Y. (2023). CodeS: Towards Code Model Generalization Under Distribution Shift. IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results, 1–6. doi:10.1109/ICSE-NIER58687.2023.00007 ![]() |
![]() ![]() | Carvalho, L., DEGIOVANNI, R. G., Brizzio, M. A., CORDY, M., Aguirre, N., LE TRAON, Y., & PAPADAKIS, M. (2023). ACoRe: Automated Goal-Conflict Resolution. 26th International Conference on Fundamental Approaches to Software Engineering (FASE), 13991, 3–25. doi:10.1007/978-3-031-30826-0_1 ![]() |
![]() ![]() | GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2023). On Evaluating Adversarial Robustness of Chest X-ray Classification. Proceedings of the Workshop on Artificial Intelligence Safety 2023, 3381. ![]() |
![]() ![]() | RWEMALIKA, R., HABCHI, S., PAPADAKIS, M., LE TRAON, Y., & Brasseur, M.-C. (2023). Smells in system user interactive tests. Empirical Software Engineering, 28 (1). doi:10.1007/s10664-022-10251-1 ![]() |
![]() ![]() | KHANFIR, A., JIMENEZ, M., PAPADAKIS, M., & LE TRAON, Y. (2022). CODEBERT-NT: code naturalness via CodeBERT. 22nd IEEE International Conference on Software Quality, Reliability and Security (QRS'22). doi:10.1109/QRS57517.2022.00098 ![]() |
![]() ![]() | BERNIER, F., JIMENEZ, M., CORDY, M., & LE TRAON, Y. (2022). Faster and Cheaper Energy Demand Forecasting at Scale. In Has it Trained Yet? Workshop at the Conference on Neural Information Processing Systems. ![]() |
![]() ![]() | LORENTZ, J., HARTMANN, T., MOAWAD, A., FOUQUET, F., AOUADA, D., & LE TRAON, Y. (2022). CalcGraph: taming the high costs of deep learning using models. Software and Systems Modeling. doi:10.1007/s10270-022-01052-7 ![]() |
![]() ![]() | Habchi, S., HABEN, G., SOHN, J., Franci, A., PAPADAKIS, M., CORDY, M., & LE TRAON, Y. (2022). What Made This Test Flake? Pinpointing Classes Responsible for Test Flakiness. In What Made This Test Flake? Pinpointing Classes Responsible for Test Flakiness. doi:10.1109/ICSME55016.2022.00039 ![]() |
![]() ![]() | SOUANI, B., KHANFIR, A., BARTEL, A., ALLIX, K., & LE TRAON, Y. (2022). Android Malware Detection Using BERT. In Z. Jianying, Applied Cryptography and Network Security Workshops (pp. 575–591). Berlin, Germany: Springer. doi:10.1007/978-3-031-16815-4_31 ![]() |
![]() ![]() | GARG, A., DEGIOVANNI, R. G., JIMENEZ, M., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2022). Learning from what we know: How to perform vulnerability prediction using noisy historical data. Empirical Software Engineering. doi:10.1007/s10664-022-10197-4 ![]() |
![]() ![]() | Sawadogo, D. A., BISSYANDE, T. F. D. A., Moha, N., Allix, K., KLEIN, J., Li, L., & LE TRAON, Y. (August 2022). SSPCATCHER: Learning to catch security patches. Empirical Software Engineering, 27. doi:10.1007/s10664-022-10168-9 ![]() |
![]() ![]() | KHANFIR, A., Koyuncu, A., PAPADAKIS, M., CORDY, M., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2022). iBiR: Bug Report driven Fault Injection. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3542946 ![]() |
![]() ![]() | OJDANIC, M., SOREMEKUN, E., DEGIOVANNI, R. G., PAPADAKIS, M., & LE TRAON, Y. (2022). Mutation Testing in Evolving Systems: Studying the relevance of mutants to code evolution. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3530786 ![]() |
![]() ![]() | HABCHI, S., HABEN, G., PAPADAKIS, M., CORDY, M., & LE TRAON, Y. (2022). A Qualitative Study on the Sources, Impacts, and Mitigation Strategies of Flaky Tests. In A Qualitative Study on the Sources, Impacts, and Mitigation Strategies of Flaky Tests. doi:10.1109/ICST53961.2022.00034 ![]() |
![]() ![]() | GHAMIZI, S., GARCIA SANTA CRUZ, B., Temple, P., CORDY, M., Perrouin, G., PAPADAKIS, M., & LE TRAON, Y. (2022). Towards Generalizable Machine Learning for Chest X-ray Diagnosis with Multi-task learning. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/50815. |
![]() ![]() | HU, Q., GUO, Y., CORDY, M., Xie, X., Ma, L., PAPADAKIS, M., & LE TRAON, Y. (2022). An Empirical Study on Data Distribution-Aware Test Selection for Deep Learning Enhancement. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3511598 ![]() |
![]() ![]() | RUIZ RODRIGUEZ, M. L., KUBLER, S., de Giorgio, A., CORDY, M., Robert, J., & LE TRAON, Y. (2022). Multi-agent deep reinforcement learning based Predictive Maintenance on parallel machines. Robotics and Computer-Integrated Manufacturing. doi:10.1016/j.rcim.2022.102406 ![]() |
![]() ![]() | SIMONETTO, T. J. A., DYRMISHI, S., GHAMIZI, S., CORDY, M., & LE TRAON, Y. (2022). A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space. In Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI-22 (pp. 1313-1319). International Joint Conferences on Artificial Intelligence Organization. doi:10.24963/ijcai.2022/183 ![]() |
![]() ![]() | GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2022). On Evaluating Adversarial Robustness of Chest X-ray Classification: Pitfalls and Best Practices. In The Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI- 23) - SafeAI Workshop, Washington, D.C., Feb 13-14, 2023. ![]() |
![]() ![]() | GUBRI, M., CORDY, M., PAPADAKIS, M., LE TRAON, Y., & Sen, K. (2022). Efficient and Transferable Adversarial Examples from Bayesian Neural Networks. The 38th Conference on Uncertainty in Artificial Intelligence. ![]() |
![]() ![]() | GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2022). Adversarial Robustness in Multi-Task Learning: Promises and Illusions. In Proceedings of the thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22). doi:10.1609/aaai.v36i1.19950 ![]() |
![]() ![]() | GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2021). Evasion Attack STeganography: Turning Vulnerability Of Machine Learning ToAdversarial Attacks Into A Real-world Application. Proceedings of International Conference on Computer Vision 2021. doi:10.1109/ICCVW54120.2021.00010 ![]() |
![]() ![]() | GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2021). Requirements And Threat Models of Adversarial Attacks and Robustness of Chest X-ray classification. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/48411. |
![]() ![]() | POLGE, J., GHATPANDE, S., Kubler, S., Robert, J., & LE TRAON, Y. (28 July 2021). BlockPerf: A Hybrid Blockchain Emulator/Simulator Framework. IEEE Access, 9, 107858 - 107872. doi:10.1109/ACCESS.2021.3101044 ![]() |
![]() ![]() | HABEN, G., HABCHI, S., PAPADAKIS, M., CORDY, M., & LE TRAON, Y. (2021). A Replication Study on the Usability of Code Vocabulary in Predicting Flaky Tests. In 18th International Conference on Mining Software Repositories. doi:10.1109/MSR52588.2021.00034 ![]() |
![]() ![]() | Bonnaventure, W., KHANFIR, A., BARTEL, A., PAPADAKIS, M., & LE TRAON, Y. (2021). CONFUZZION: A Java Virtual Machine Fuzzer for Type Confusion Vulnerabilities. In IEEE International Conference on Software Quality, Reliability, and Security (QRS), 2021. ![]() |
![]() ![]() | HU, Q., GUO, Y., CORDY, M., Xiaofei, X., MA, W., PAPADAKIS, M., & LE TRAON, Y. (2021). Towards Exploring the Limitations of Active Learning: An Empirical Study. In The 36th IEEE/ACM International Conference on Automated Software Engineering. doi:10.1109/ASE51524.2021.9678672 ![]() |
![]() ![]() | MA, W., PAPADAKIS, M., Tsakmalis, A., CORDY, M., & LE TRAON, Y. (2021). Test Selection for Deep Learning Systems. ACM Transactions on Software Engineering and Methodology, 30 (2), 13:1--13:22. doi:10.1145/3417330 ![]() |
![]() ![]() | TITCHEU CHEKAM, T., PAPADAKIS, M., CORDY, M., & LE TRAON, Y. (2021). Killing Stubborn Mutants with Symbolic Execution. ACM Transactions on Software Engineering and Methodology, 30 (2), 19:1--19:23. doi:10.1145/3425497 ![]() |
![]() ![]() | KELLER, P., KABORE, A. K., Plein, L., KLEIN, J., LE TRAON, Y., & BISSYANDE, T. F. D. A. (2021). What You See is What it Means! Semantic Representation Learning of Code based on Visualization. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3485135 ![]() |
![]() ![]() | POLGE, J., ROBERT, J., & LE TRAON, Y. (18 December 2020). A Case Driven Study of the Use of Time Series Classification for Flexibility in Industry 4.0. Sensors, 20 (24). doi:10.3390/s20247273 ![]() |
![]() ![]() | MOULINE, L., CORDY, M., & LE TRAON, Y. (2020). Load approximation for uncertain topologies in the low-voltage grid. In INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS, 11-13 November 2020 (pp. 1-6). doi:10.1109/SmartGridComm47815.2020.9302940 ![]() |
![]() ![]() | POLGE, J., ROBERT, J., & LE TRAON, Y. (2020). Permissioned Blockchain Frameworks in the Industry: A Comparison. ICT Express. doi:10.1016/j.icte.2020.09.002 ![]() |
![]() ![]() | GHAMIZI, S., RWEMALIKA, R., CORDY, M., VEIBER, L., BISSYANDE, T. F. D. A., PAPADAKIS, M., KLEIN, J., & LE TRAON, Y. (2020). Data-driven simulation and optimization for covid-19 exit strategies. In S. GHAMIZI, R. RWEMALIKA, M. CORDY, L. VEIBER, T. F. D. A. BISSYANDE, M. PAPADAKIS, J. KLEIN, ... Y. LE TRAON, Data-driven simulation and optimization for covid-19 exit strategies (pp. 3434-3442). New York, NY, United States: Association for Computing Machinery. doi:10.1145/3394486.3412863 ![]() |
![]() ![]() | LIU, K., Wang, S., KOYUNCU, A., KIM, K., BISSYANDE, T. F. D. A., Kim, D., Wu, P., KLEIN, J., Mao, X., & LE TRAON, Y. (2020). On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs. In 42nd ACM/IEEE International Conference on Software Engineering (ICSE). doi:10.1145/3377811.3380338 ![]() |
![]() ![]() | KOLBE, N., Vandenbussche, P.-Y., KUBLER, S., & LE TRAON, Y. (2020). LOVBench: Ontology Ranking Benchmark. In Proceedings of The Web Conference 2020 (WWW '20). doi:10.1145/3366423.3380245 ![]() |
![]() ![]() | KOYUNCU, A., LIU, K., BISSYANDE, T. F. D. A., KIM, D., KLEIN, J., Monperrus, M., & LE TRAON, Y. (2020). FixMiner: Mining relevant fix patterns for automated program repair. Empirical Software Engineering. doi:10.1007/s10664-019-09780-z ![]() |
![]() ![]() | ANTONIADIS, N., CORDY, M., Sifaleras, A., & LE TRAON, Y. (2020). Preventing Overloading Incidents on Smart Grids: A Multiobjective Combinatorial Optimization Approach. In Communications in Computer and Information Science (pp. 269-281). Springer, Cham. doi:10.1007/978-3-030-41913-4_22 ![]() |
![]() ![]() | GHAMIZI, S., RWEMALIKA, R., CORDY, M., LE TRAON, Y., & PAPADAKIS, M. (2020). Pandemic Simulation and Forecasting of exit strategies:Convergence of Machine Learning and EpidemiologicalModels. University of Luxembourg. https://orbilu.uni.lu/handle/10993/43166 |
![]() ![]() | GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2020). Adversarial Embedding: A robust and elusive Steganography and Watermarking technique [Paper presentation]. IEEE Symposium on Security and Privacy. |
![]() ![]() | GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2020). FeatureNET: Diversity-driven Generation of Deep Learning Models. In International Conference on Software Engineering (ICSE). doi:10.1145/3377812.3382153 ![]() |
![]() ![]() | TITCHEU CHEKAM, T., PAPADAKIS, M., & LE TRAON, Y. (2020). Muteria: An Extensible and Flexible Multi-Criteria Software Testing Framework. In ACM/IEEE International Conference on Automation of Software Test (AST) 2020. doi:10.1145/3387903.3389316 ![]() |
![]() ![]() | GHAMIZI, S., CORDY, M., GUBRI, M., PAPADAKIS, M., Boystov, A., LE TRAON, Y., & Goujon, A. (2020). Search-based adversarial testing and improvement of constrained credit scoring systems. In ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '20), November 8-13, 2020. ![]() |
![]() ![]() | TITCHEU CHEKAM, T., PAPADAKIS, M., BISSYANDE, T. F. D. A., LE TRAON, Y., & Sen, K. (2019). Selecting fault revealing mutants. Empirical Software Engineering, 1-54. doi:10.1007/s10664-019-09778-7 ![]() |
![]() ![]() | RWEMALIKA, R., Kintis, M., PAPADAKIS, M., LE TRAON, Y., & Lorrach, P. (2019). An industrial study on the differences between pre-release and post-release bugs. In Proceedings of 35th IEEE International Conference on Software Maintenance and Evolution (pp. 11). IEEE. doi:10.1109/ICSME.2019.00019 ![]() |
![]() ![]() | KOYUNCU, A., LIU, K., BISSYANDE, T. F. D. A., Kim, D., Monperrus, M., KLEIN, J., & LE TRAON, Y. (2019). iFixR: bug report driven program repair. In ESEC/FSE 2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. doi:10.1145/3338906.3338935 ![]() |
![]() ![]() | Li, L., RIOM, T., BISSYANDE, T. F. D. A., Wang, H., KLEIN, J., & LE TRAON, Y. (August 2019). Revisiting the impact of common libraries for android-related investigations. Journal of Systems and Software, 154, 157-175. doi:10.1016/j.jss.2019.04.065 ![]() |
![]() ![]() | LIU, K., Kim, D., BISSYANDE, T. F. D. A., Kim, T., KIM, K., KOYUNCU, A., Kim, S., & LE TRAON, Y. (2019). Learning to Spot and Refactor Inconsistent Method Names. In 41st ACM/IEEE International Conference on Software Engineering (ICSE). Montreal, Canada: IEEE. ![]() |
![]() ![]() | LIU, K., KOYUNCU, A., BISSYANDE, T. F. D. A., Kim, D., KLEIN, J., & LE TRAON, Y. (2019). You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems. In The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019). Xi'an, China: IEEE. doi:10.1109/ICST.2019.00020 ![]() |
![]() ![]() | LI, D., LI, L., KIM, D., BISSYANDE, T. F. D. A., Lo, D., & LE TRAON, Y. (2019). Watch out for This Commit! A Study of Influential Software Changes. Journal of Software: Evolution and Process. doi:10.1002/smr.2181 ![]() |
![]() ![]() | POLGE, J., ROBERT, J., & LE TRAON, Y. (2019). Assessing the impact of attacks on OPC-UA applications in the Industry 4.0 era. In 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, 11-14 January 2019. ![]() |
![]() ![]() | KOLBE, N., KUBLER, S., ROBERT, J., LE TRAON, Y., & Zaslavsky, A. (2019). Linked Vocabulary Recommendation Tools for Internet of Things: A Survey. ACM Computing Surveys. doi:10.1145/3284316 ![]() |
BARTEL, A., KLEIN, J., & LE TRAON, Y. (2019). Désérialisation Java : Une brève introduction au ROP de haut niveau. Multi-System & Internet Security Cookbook, 101. |
![]() ![]() | TITCHEU CHEKAM, T., PAPADAKIS, M., & LE TRAON, Y. (2019). Mart: A Mutant Generation Tool for LLVM. In T. TITCHEU CHEKAM, M. PAPADAKIS, ... Y. LE TRAON, Mart: A Mutant Generation Tool for LLVM. doi:10.1145/3338906.3341180 ![]() |
![]() ![]() | Padhye, R., Lemieux, C., Sen, K., PAPADAKIS, M., & LE TRAON, Y. (2019). Semantic Fuzzing with Zest. In ACM SIGSOFT International Symposium on Software Testing and Analysis. doi:10.1145/3293882.3330576 ![]() |
![]() ![]() | Jimenez, M., RWEMALIKA, R., PAPADAKIS, M., Sarro, F., LE TRAON, Y., & Harman, M. (2019). An Empirical Study on Vulnerability Prediction of Open-Source Software Releases. In Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE). ![]() |
![]() ![]() | KOLBE, N., KUBLER, S., & LE TRAON, Y. (2019). Popularity-driven Ontology Ranking using Qualitative Features. In The Semantic Web - ISWC 2019. doi:10.1007/978-3-030-30793-6_19 ![]() |
![]() ![]() | Schmitt, X., Kubler, S., ROBERT, J., PAPADAKIS, M., & LE TRAON, Y. (2019). A Replicable Comparison Study of NER Software: StanfordNLP, NLTK, OpenNLP, SpaCy, Gate. In International Conference on Social Networks Analysis, Management and Security. doi:10.1109/SNAMS.2019.8931850 ![]() |
![]() ![]() | BARTEL, A., KLEIN, J., & LE TRAON, Y. (2019). MUSTI: Dynamic Prevention of Invalid Object Initialization Attacks. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2019.2894356 ![]() |
![]() ![]() | PAPADAKIS, M., KINTIS, M., ZHANG, J., Jia, Y., LE TRAON, Y., & Harman, M. (2019). Mutation Testing Advances: An Analysis and Survey. In Advances in Computers. Elsevier. doi:10.1016/bs.adcom.2018.03.015 ![]() |
![]() ![]() | Jimenez, M., RWEMALIKA, R., PAPADAKIS, M., Sarro, F., LE TRAON, Y., & Harman, M. (2019). The Importance of Accounting for Real-World Labelling When Predicting Software Vulnerabilities. In Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE). doi:10.1145/3338906.3338941 ![]() |
![]() ![]() | GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2019). Automated Search for Configurations of Deep Neural Network Architectures. In Automated Search for Configurations of Convolutional Neural Network Architectures. doi:10.1145/3336294.3336306 ![]() |
![]() ![]() | RWEMALIKA, R., KINTIS, M., PAPADAKIS, M., LE TRAON, Y., & Lorrach, P. (2019). On the Evolution of Keyword-Driven Test Suites. In 12th IEEE International Conference on Software Testing, Verification and Validation. doi:10.1109/ICST.2019.00040 ![]() |
![]() ![]() | CORDY, M., Muller, S., PAPADAKIS, M., & LE TRAON, Y. (2019). Search-based Test and Improvement of Machine-Learning-Based Anomaly Detection Systems. In ACM SIGSOFT International Symposium on Software Testing and Analysis. doi:10.1145/3293882.3330580 ![]() |
![]() ![]() | Leong, C., Abhayendra, S., PAPADAKIS, M., LE TRAON, Y., & Micco, J. (2019). Assessing Transition-based Test Selection Algorithms at Google. In International Conference on Software Engineering (ICSE). doi:10.1109/ICSE-SEIP.2019.00019 ![]() |
![]() ![]() | BENEDICK, P.-L., ROBERT, J., & LE TRAON, Y. (2019). TRIDENT: A Three-Steps Strategy to Digitise an Industrial System for Stepping into Industry 4.0. Proceedings of 45th Annual Conference of the IEEE Industrial Electronics Society. ![]() |
![]() ![]() | Padhye, R., Lemieux, C., Sen, K., PAPADAKIS, M., & LE TRAON, Y. (2019). Validity fuzzing and parametric generators for effective random testing. 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), 266–267. doi:10.1109/ICSE-COMPANION.2019.00107 ![]() |
![]() ![]() | RWEMALIKA, R., KINTIS, M., PAPADAKIS, M., & LE TRAON, Y. (11 December 2018). Can we automate away the main challenges of end-to-end testing? [Paper presentation]. The 17th Belgium-Netherlands Software Evolution Workshop, Delft, Netherlands. |
![]() ![]() | JIMENEZ, M., TITCHEU CHEKAM, T., CORDY, M., PAPADAKIS, M., KINTIS, M., LE TRAON, Y., & Harman, M. (2018). Are mutants really natural? A study on how “naturalness” helps mutant selection. Proceedings of 12th International Symposium on
Empirical Software Engineering and Measurement (ESEM'18). doi:10.1145/3239235.3240500 ![]() |
![]() ![]() | Kubler, S., Derigent, W., Voisin, A., ROBERT, J., LE TRAON, Y., & Herrera Viedma, E. (2018). Measuring inconsistency and deriving priorities from fuzzy pairwise comparison matrices using the knowledge-based consistency index. Knowledge-Based Systems. doi:10.1016/j.knosys.2018.09.015 ![]() |
![]() ![]() | JIMENEZ, M., CORDY, M., LE TRAON, Y., & PAPADAKIS, M. (2018). TUNA: TUning Naturalness-based Analysis. In 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018. ![]() |
![]() ![]() | JIMENEZ, M., CORDY, M., LE TRAON, Y., & PAPADAKIS, M. (September 2018). On the impact of tokenizer and parameters on N-gram based Code Analysis [Paper presentation]. 34th IEEE International Conference on Software Maintenance and Evolution (ICSME'18), Madrid, Spain. |
![]() ![]() | LIU, K., KIM, D., KOYUNCU, A., Li, L., BISSYANDE, T. F. D. A., & LE TRAON, Y. (2018). A Closer Look at Real-World Patches. In 34th IEEE International Conference on Software Maintenance and Evolution (ICSME). doi:10.1109/ICSME.2018.00037 ![]() |
![]() ![]() | BENEDICK, P.-L., ROBERT, J., LE TRAON, Y., & Kubler, S. (2018). O-MI/O-DF vs. MQTT: a performance analysis. In O-MI/O-DF vs. MQTT: a performance analysis. ![]() |
![]() ![]() | BARTEL, A., KLEIN, J., & LE TRAON, Y. (2018). MUSTI: Dynamic Prevention of Invalid Object Initialization Attacks. (TR-SNT-2018-3). Université du Luxembourg. https://orbilu.uni.lu/handle/10993/36085 |
![]() ![]() | KIM, K., KIM, D., BISSYANDE, T. F. D. A., Choi, E., Li, L., KLEIN, J., & LE TRAON, Y. (2018). FaCoY - A Code-to-Code Search Engine. In International Conference on Software Engineering (ICSE 2018). ![]() |
![]() ![]() | Martinez, J., Sottet, J.-S., Garcia-Frey, A., BISSYANDE, T. F. D. A., Ziadi, T., KLEIN, J., Temple, P., Mathieu, A., & LE TRAON, Y. (2018). Towards Estimating and Predicting User Perception on Software Product Variants. In 17th International Conference on Software Reuse (ICSR) (pp. 23-40). Springer, LNCS. ![]() |
![]() ![]() | LI, D., Lin, J., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2018). Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification. In 21st International Conference on Extending Database Technology. ![]() |
![]() ![]() | BARTOLINI, C., El Kateb, D., LE TRAON, Y., & Hagen, D. (February 2018). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? Electron Markets, 28 (1), 53-75. doi:10.1007/s12525-018-0284-7 ![]() |
![]() ![]() | Kubler, S., ROBERT, J., Neumaier, S., Umbrich, J., & LE TRAON, Y. (2018). Comparison of metadata quality in open data portals using the Analytic Hierarchy Process. Government Information Quarterly. doi:10.1016/j.giq.2017.11.003 ![]() |
![]() ![]() | LIU, K., Kim, D., BISSYANDE, T. F. D. A., Yoo, S., & LE TRAON, Y. (2018). Mining Fix Patterns for FindBugs Violations. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2018.2884955 ![]() |
![]() ![]() | Sirres, R., BISSYANDE, T. F. D. A., Kim, D., Lo, D., KLEIN, J., & LE TRAON, Y. (January 2018). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search. Empirical Software Engineering, 90, 27-39. doi:10.1007/s10664-017-9544-y ![]() |
![]() ![]() | Martinez, J., Ziadi, T., PAPADAKIS, M., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2018). Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants. Information and Software Technology. doi:10.1016/j.infsof.2018.07.005 ![]() |
BARTEL, A., KLEIN, J., & LE TRAON, Y. (2018). Fini le Bac à Sable. Avec le CVE-2017-3272, devenez un grand! Multi-System & Internet Security Cookbook, 97. |
BARTEL, A., KLEIN, J., & LE TRAON, Y. (2018). Désérialisation Java : Une brève introduction. Multi-System & Internet Security Cookbook, 100. |
![]() ![]() | KINTIS, M., PAPADAKIS, M., Papadopoulos, A., Valvis, E., Malevris, N., & LE TRAON, Y. (2018). How effective are mutation testing tools? An empirical analysis of Java mutation testing tools with manual analysis and real faults. Empirical Software Engineering. doi:10.1007/s10664-017-9582-5 ![]() |
![]() ![]() | JIMENEZ, M., LE TRAON, Y., & PAPADAKIS, M. (2018). Enabling the Continous Analysis of Security Vulnerabilities with VulData7. In IEEE International Working Conference on Source Code Analysis and Manipulation. doi:10.1109/SCAM.2018.00014 ![]() |
![]() ![]() | TITCHEU CHEKAM, T., PAPADAKIS, M., BISSYANDE, T. F. D. A., & LE TRAON, Y. (2018). Predicting the Fault Revelation Utility of Mutants. In 40th International Conference on Software Engineering, Gothenburg, Sweden, May 27 - 3 June 2018. ![]() |
![]() ![]() | PAPADAKIS, M., TITCHEU CHEKAM, T., & LE TRAON, Y. (2018). Mutant Quality Indicators. In 13th International Workshop on Mutation Analysis (MUTATION'18). ![]() |
![]() ![]() | MULLER, S., Lancrenon, J., Harpes, C., LE TRAON, Y., Gombault, S., & Bonnin, J.-M. (2018). A training-resistant anomaly detection system. Computers and Security, 76, 1-11. doi:10.1016/j.cose.2018.02.015 ![]() |
![]() ![]() | KOLBE, N., ROBERT, J., Kubler, S., & LE TRAON, Y. (2017). PROFICIENT: Productivity Tool for Semantic Interoperability in an Open IoT Ecosystem. In Proceedings of the 14th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. doi:10.1145/3144457.3144479 ![]() |
![]() ![]() | LI, L., LI, D., BISSYANDE, T. F. D. A., KLEIN, J., Cai, H., Lo, D., & LE TRAON, Y. (2017). On Locating Malicious Code in Piggybacked Android Apps. Journal of Computer Science and Technology. doi:10.1007/s11390-017-1786-z ![]() |
![]() ![]() | LI, D., BISSYANDE, T. F. D. A., KLEIN, J., LE TRAON, Y., Schummer, P., Muller, B., & Solvi, A.-M. (2017). Towards a Plug-and-Play and Holistic Data Mining Framework for Understanding and Facilitating Operations in Smart Buildings. (TR-SNT-2017-5). SnT. https://orbilu.uni.lu/handle/10993/32961 |
![]() ![]() | Benelallam, A., HARTMANN, T., MOULINE, L., FOUQUET, F., Bourcier, J., Barais, O., & LE TRAON, Y. (2017). Raising Time Awareness in Model-Driven Engineering. In 2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (pp. 181-188). Springer. doi:10.1109/MODELS.2017.11 ![]() |
![]() ![]() | KUBLER, S., Derigent, W., Voisin, A., ROBERT, J., & LE TRAON, Y. (2017). Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices. In Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices. ![]() |
![]() ![]() | KOLBE, N., Zaslavsky, A., KUBLER, S., ROBERT, J., & LE TRAON, Y. (2017). Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components. In Modeling and Using Context. ![]() |
![]() ![]() | KOLBE, N., KUBLER, S., ROBERT, J., LE TRAON, Y., & Zaslavsky, A. (2017). Towards Semantic Interoperability in an Open IoT Ecosystem for Connected Vehicle Services. In 2017 IEEE Global Internet of Things Summit (GIoTS) Proceedings. ![]() |
![]() ![]() | KOYUNCU, A., BISSYANDE, T. F. D. A., KIM, D., KLEIN, J., Monperrus, M., & LE TRAON, Y. (July 2017). Impact of Tool Support in Patch Construction [Paper presentation]. 2017 International Symposium on Software Testing & Analysis (ISSTA). doi:10.1145/3092703.3092713 |
![]() ![]() | HARTMANN, T., FOUQUET, F., JIMENEZ, M., Rouvoy, R., & LE TRAON, Y. (2017). Analyzing Complex Data in Motion at Scale with Temporal Graphs. In Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering. ![]() |
![]() ![]() | HARTMANN, T., Moawad, A., FOUQUET, F., & LE TRAON, Y. (2017). The Next Evolution of MDE: A Seamless Integration of Machine Learning into Domain Modeling. Software and Systems Modeling. doi:10.1007/s10270-017-0600-2 ![]() |
![]() ![]() | TITCHEU CHEKAM, T., PAPADAKIS, M., LE TRAON, Y., & Harman, M. (2017). An Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption. In International Conference on Software Engineering (ICSE 2017). doi:10.1109/ICSE.2017.61 ![]() |
![]() ![]() | HURIER, M., Suarez-Tangil, G., Dash, S. K., BISSYANDE, T. F. D. A., LE TRAON, Y., KLEIN, J., & Cavallaro, L. (2017). Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware. In MSR 2017. ![]() |
![]() ![]() | LI, L., BISSYANDE, T. F. D. A., BARTEL, A., KLEIN, J., & LE TRAON, Y. (May 2017). The Multi-Generation Repackaging Hypothesis [Poster presentation]. The 39th International Conference on Software Engineering. |
![]() ![]() | LI, L., LI, D., BISSYANDE, T. F. D. A., KLEIN, J., LE TRAON, Y., Lo, D., & Cavallaro, L. (May 2017). Understanding Android App Piggybacking [Poster presentation]. The 39th International Conference on Software Engineering. |
![]() ![]() | LI, L., LI, D., BISSYANDE, T. F. D. A., KLEIN, J., Cai, H., Lo, D., & LE TRAON, Y. (2017). Automatically Locating Malicious Packages in Piggybacked Android Apps. Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017). ![]() |
![]() ![]() | LI, D., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2017). Sensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements. In The 32nd ACM Symposium on Applied Computing (SAC 2017). doi:10.1145/3019612.3019699 ![]() |
![]() ![]() | MOULINE, L., HARTMANN, T., FOUQUET, F., LE TRAON, Y., Bourcier, J., & Barais, O. (2017). Weaving Rules into Models@run.time for Embedded Smart Systems. In L. MOULINE, T. HARTMANN, F. FOUQUET, Y. LE TRAON, J. Bourcier, ... O. Barais, Programming '17 Companion to the first International Conference on the Art, Science and Engineering of Programming. Brussels, Belgium: ACM. doi:10.1145/3079368.3079394 ![]() |
![]() ![]() | KINTIS, M., PAPADAKIS, M., Jia, Y., Malevris, N., LE TRAON, Y., & Harman, M. (2017). Detecting Trivial Mutant Equivalences via Compiler Optimisations. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2017.2684805 ![]() |
![]() ![]() | Sirres, R., BISSYANDE, T. F. D. A., KIM, D., Lo, D., KLEIN, J., & LE TRAON, Y. (2017). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search. https://orbilu.uni.lu/handle/10993/30408 |
![]() ![]() | KUBLER, S., ROBERT, J., Umbrich, J., Neumaier, S., & LE TRAON, Y. (2017). Comparison of metadata quality in open data portals using the Analytic Hierarchy Process. Government Information Quarterly. doi:10.1016/j.giq.2017.11.003 ![]() |
![]() ![]() | JIMENEZ, M., CORDY, M., KINTIS, M., TITCHEU CHEKAM, T., LE TRAON, Y., & PAPADAKIS, M. (2017). On the Naturalness of Mutants. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/35014. |
![]() ![]() | Laurent, T., PAPADAKIS, M., KINTIS, M., HENARD, C., LE TRAON, Y., & Ventresque, A. (2017). Assessing and Improving the Mutation Testing Practice of PIT. In 10th IEEE International Conference on Software Testing, Verification and Validation. doi:10.1109/ICST.2017.47 ![]() |
![]() ![]() | LI, L., BISSYANDE, T. F. D. A., PAPADAKIS, M., Rasthofer, S., BARTEL, A., Octeau, D., KLEIN, J., & LE TRAON, Y. (2017). Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology. doi:10.1016/j.infsof.2017.04.001 ![]() |
![]() ![]() | MULLER, S., Harpes, C., LE TRAON, Y., Gombault, S., & Bonnin, J.-M. (2017). Efficiently computing the likelihoods of cyclically interdependent risk scenarios. Computers and Security, 64, 59-68. doi:10.1016/j.cose.2016.09.008 ![]() |
![]() ![]() | LI, L., LI, D., BISSYANDE, T. F. D. A., KLEIN, J., LE TRAON, Y., Lo, D., & Cavallaro, L. (2017). Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2017.2656460 ![]() |
![]() ![]() | JIMENEZ, M., PAPADAKIS, M., & LE TRAON, Y. (2016). An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel. In 2016 Asia-Pacific Software Engineering Conference (APSEC). ![]() |
![]() ![]() | LI, D., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). DSCo-NG: A Practical Language Modeling Approach for Time Series Classification. In The 15th International Symposium on Intelligent Data Analysis. ![]() |
![]() ![]() | LI, L., BISSYANDE, T. F. D. A., LE TRAON, Y., & KLEIN, J. (2016). Accessing Inaccessible Android APIs: An Empirical Study. In The 32nd International Conference on Software Maintenance and Evolution (ICSME) (pp. 12). ![]() |
![]() ![]() | JIMENEZ, M., PAPADAKIS, M., & LE TRAON, Y. (2016). Vulnerability Prediction Models: A case study on the Linux Kernel. In 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, US, October 2-3, 2016. doi:10.1109/SCAM.2016.15 ![]() |
![]() ![]() | KUBLER, S., ROBERT, J., William, D., Alexandre, V., & LE TRAON, Y. (October 2016). A state-of the-art survey & testbed of Fuzzy AHP (FAHP) applications. Expert Systems with Applications, 65, 398--422. doi:10.1016/j.eswa.2016.08.064 ![]() |
![]() ![]() | MANUKYAN, A., OLIVARES MENDEZ, M. A., BISSYANDE, T. F. D. A., VOOS, H., & LE TRAON, Y. (2016). UAV degradation identification for pilot notification using machine learning techniques. Proceedings of 21st IEEE International Conference on Emerging Technologies and Factory Automation ETFA 2016. doi:10.1109/ETFA.2016.7733537 ![]() |
![]() ![]() | LI, D., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (September 2016). Time Series Classification with Discrete Wavelet Transformed Data. International Journal of Software Engineering and Knowledge Engineering, 26 (9&10), 1361–1377. doi:10.1142/S0218194016400088 ![]() |
![]() ![]() | BARTOLINI, C., EL KATEB, D., LE TRAON, Y., & Hagen, D. (2016). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? In J. Altmann, G. C. Silaghi, ... O. F. Rana (Eds.), Economics of Grids, Clouds, Systems, and Services (pp. 281-295). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-319-43177-2 ![]() |
![]() ![]() | SANCHEZ GUINEA, A., Nain, G., & LE TRAON, Y. (August 2016). A systematic review on the engineering of software for ubiquitous systems. Journal of Systems and Software, 118, 251-276. doi:10.1016/j.jss.2016.05.024 ![]() |
![]() ![]() | LI, D., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study. In The 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016). ![]() |
![]() ![]() | LI, D., LI, L., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). DSCo: A Language Modeling Approach for Time Series Classification. In 12th International Conference on Machine Learning and Data Mining (MLDM 2016). ![]() |
![]() ![]() | KUBLER, S., ROBERT, J., LE TRAON, Y., Umbrich, J., & Neumaier, S. (2016). Open Data Portal Quality Comparison using AHP. In Proceedings of the 17th International Digital Government Research Conference on Digital Government Research (pp. 397-407). New York, United States: ACM. doi:10.1145/2912160.2912167 ![]() |
![]() ![]() | ALLIX, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). AndroZoo: Collecting Millions of Android Apps for the Research Community. In Proceedings of the 13th International Workshop on Mining Software Repositories (pp. 468--471). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2901739.2903508 ![]() |
![]() ![]() | LI, L., BISSYANDE, T. F. D. A., PAPADAKIS, M., Rasthofer, S., BARTEL, A., Octeau, D., KLEIN, J., & LE TRAON, Y. (2016). Static Analysis of Android Apps: A Systematic Literature Review. SnT. https://orbilu.uni.lu/handle/10993/26879 |
![]() ![]() | LI, L., LI, D., BISSYANDE, T. F. D. A., Lo, D., KLEIN, J., & LE TRAON, Y. (2016). Ungrafting Malicious Code from Piggybacked Android Apps. SnT. https://orbilu.uni.lu/handle/10993/26880 |
![]() ![]() | HARTMANN, T., MOAWAD, A., FOUQUET, F., Reckinger, Y., KLEIN, J., & LE TRAON, Y. (2016). Near Real-Time Electric Load Approximation in Low Voltage Cables of Smart Grids with Models@run.time. In 31st Annual ACM Symposium on Applied Computing (SAC'16) (pp. 2119--2126). ![]() |
![]() ![]() | LI, L., LI, D., BARTEL, A., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Towards a Generic Framework for Automating Extensive Analysis of Android Applications. In The 31st ACM/SIGAPP Symposium on Applied Computing (SAC 2016). ![]() |
![]() ![]() | LI, L., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). An Investigation into the Use of Common Libraries in Android Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 12). doi:10.1109/SANER.2016.52 ![]() |
![]() ![]() | LI, L., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Parameter Values of Android APIs: A Preliminary Study on 100,000 Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 5). doi:10.1109/SANER.2016.51 ![]() |
![]() ![]() | LI, D., BISSYANDE, T. F. D. A., KUBLER, S., KLEIN, J., & LE TRAON, Y. (2016). Profiling household appliance electricity usage with n-gram language modeling. In The 2016 IEEE International Conference on Industrial Technology (ICIT 2016). ![]() |
![]() ![]() | HURIER, M., ALLIX, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. In Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference (pp. 142--162). Springer. doi:10.1007/978-3-319-40667-1_8 ![]() |
![]() ![]() | Octeau, D., Jha, S., Dering, M., McDaniel, P., BARTEL, A., LI, L., KLEIN, J., & LE TRAON, Y. (2016). Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis. In The 43rd Symposium on Principles of Programming Languages (POPL 2016). ![]() |
![]() ![]() | CAIRE, P., MOAWAD, A., EFTHYMIOU, V., bikakis, A., & LE TRAON, Y. (2016). Privacy Challenges in Ambient Intelligence Systems. Journal of Ambient Intelligence and Smart Environments. doi:10.3233/AIS-160405 ![]() |
![]() ![]() | MEIRA, J. A., Almeira, E. C. D., KIM, D., Filho, E. R. L., & LE TRAON, Y. (2016). “Overloaded!” — A Model-based Approach to Database Stress Testing. In International Conference on Database and Expert Systems Applications, Porto 5-8 September 2016. ![]() |
![]() ![]() | MARTINEZ, J., Ziadi, T., PAPADAKIS, M., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Feature Location Benchmark for Software Families using Eclipse Community Releases. In Software Reuse: Bridging with Social-Awareness, ICSR 2016 Proceedings. doi:10.1007/978-3-319-35122-3_18 ![]() |
![]() ![]() | LI, L., MARTINEZ, J., Ziadi, T., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Mining Families of Android Applications for Extractive SPL Adoption. In The 20th International Systems and Software Product Line Conference (SPLC 2016). ![]() |
![]() ![]() | MARTINEZ, J., Ziadi, T., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Name Suggestions during Feature Identification: The VariClouds Approach. In 20th International Systems and Software Product Line Conference (SPLC 2016) proceedings. ![]() |
![]() ![]() | ROBERT, J., KUBLER, S., & LE TRAON, Y. (2016). Micro-billing framework for IoT: Research & Technological foundations. In International Conference on Future Internet of Things and Cloud, 22-24 August 2016, Vienna, Austria. doi:10.1109/FiCloud.2016.50 ![]() |
![]() ![]() | ROBERT, J., KUBLER, S., LE TRAON, Y., & Främling, K. (2016). O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis. In O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis. doi:10.1109/IECON.2016.7793138 ![]() |
![]() ![]() | HENARD, C., PAPADAKIS, M., Harman, M., Jia, Y., & LE TRAON, Y. (2016). Comparing White-box and Black-box Test Prioritization. In 38th International Conference on Software Engineering (ICSE'16). ![]() |
![]() ![]() | PAPADAKIS, M., Henard, C., Harman, M., Jia, & LE TRAON, Y. (2016). Threats to the validity of mutation-based test assessment. In International Symposium on Software Testing and Analysis, ISSTA 2016. doi:10.1145/2931037.2931040 ![]() |
![]() ![]() | MULLER, S., Harpes, C., LE TRAON, Y., Gombault, S., Bonnin, J.-M., & Hoffmann, P. (2016). Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures. In International Conference on Critical Information Infrastructures Security (pp. 163-175). Springer International Publishing. doi:10.1007/978-3-319-71368-7_14 ![]() |
![]() ![]() | HARTMANN, T., MOAWAD, A., FOUQUET, F., Reckinger, Y., Mouelhi, T., KLEIN, J., & LE TRAON, Y. (2015). Suspicious Electric Consumption Detection Based on Multi-Profiling Using Live Machine Learning. In 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm). ![]() |
![]() ![]() | Laurent, T., Ventresque, A., PAPADAKIS, M., HENARD, C., & LE TRAON, Y. (2015). Assessing and Improving the Mutation Testing Practice of PIT. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/24473. |
![]() ![]() | NGUYEN, P. H., Yskout, K., Heyman, T., KLEIN, J., Scandariato, R., & LE TRAON, Y. (2015). SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems. In Proceedings ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems. doi:10.1109/MODELS.2015.7338255 ![]() |
![]() ![]() | BARTOLINI, C., EL KATEB, D., LE TRAON, Y., & Hagen, D. (2015). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? In Economics of Grids, Clouds, Systems, and Services. Springer. ![]() |
![]() ![]() | HARTMANN, T., MOAWAD, A., FOUQUET, F., NAIN, G., KLEIN, J., & LE TRAON, Y. (2015). Stream my Models: Reactive Peer-to-Peer Distributed Models@run.time. In T. Lethbridge, J. Cabot, ... A. Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 80-89). Passau, Germany: Conference Publishing Consulting. ![]() |
![]() ![]() | MOAWAD, A., HARTMANN, T., FOUQUET, F., NAIN, G., KLEIN, J., & LE TRAON, Y. (2015). Beyond Discrete Modeling: A Continuous and Efficient Model for IoT. In T. Lethbridge, J. Cabot, ... A. Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 90-99). Passau, Germany: Conference Publishing Consulting. doi:10.1109/MODELS.2015.7338239 ![]() |
![]() ![]() | NGUYEN, P. H., Kramer, M., KLEIN, J., & LE TRAON, Y. (September 2015). An Extensive Systematic Review on the Model-Driven Development of Secure Systems. Information and Software Technology, 68 (December 2015), 62-81. doi:10.1016/j.infsof.2015.08.006 ![]() |
MOUELHI, T., EL KATEB, D., & LE TRAON, Y. (2015). Inroads in Testing Access Control. In Advances in Computers. ELSEVIER. ![]() |
![]() ![]() | LI, L., BARTEL, A., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2015). ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. In International Conference on ICT Systems Security and Privacy Protection (SEC 2015). ![]() |
![]() ![]() | MOAWAD, A., HARTMANN, T., FOUQUET, F., KLEIN, J., & LE TRAON, Y. (2015). Adaptive Blurring of Sensor Data to balance Privacy and Utility for Ubiquitous Services. In The 30th Annual ACM Symposium on Applied Computing (pp. 2271-2278). ACM. doi:10.1145/2695664.2695855 ![]() |
![]() ![]() | HENARD, C., PAPADAKIS, M., & LE TRAON, Y. (2015). Flattening or not of the combinatorial interaction testing models. In Eighth IEEE International Conference on Software Testing, Verification and Validation, ICST 2015 Workshops (pp. 1-4). IEEE. ![]() |
![]() ![]() | LI, L., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (March 2015). Using An Instrumentation based Approach to Detect Inter-Component Leaks in Android Apps [Paper presentation]. Grande Region Security and Reliability Day 2015. |
![]() ![]() | Amrani, M., Combemale, B., Lúcio, L., Selim, G. M. K., Dingel, J., LE TRAON, Y., Vangheluwe, H., & Cordy, J. R. (2015). Formal verification techniques for model transformations: A tridimensional classification. Journal of Object Technology, 14 (3). doi:10.5381/jot.2015.14.1.a3 ![]() |
![]() ![]() | LI, L., Bissyandé, T. F., KLEIN, J., & LE TRAON, Y. (2015). An Investigation into the Use of Common Libraries in Android Apps. In 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), Osaka, Japan, 2016. IEE. doi:10.1109/SANER.2016.52 ![]() |
![]() ![]() | EL KATEB, D., Zannone, N., MOAWAD, A., CAIRE, P., NAIN, G., Mouelhi, T., & LE TRAON, Y. (2015). Conviviality-driven access control policy. Requirements Engineering, 20 (4), 363-382. doi:10.1007/s00766-014-0204-0 ![]() |
![]() ![]() | Zhang, X., Zhang, D., LE TRAON, Y., Wang, Q., & Zhang, L. (2015). Roundtable: Research Opportunities and Challenges for Emerging Software Systems. Journal of Computer Science and Technology, 30 (5), 935-941. doi:10.1007/s11390-015-1572-8 ![]() |
![]() ![]() | ALLIX, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2015). Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. In Engineering Secure Software and Systems - 7th International Symposium ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings (pp. 51-67). Springer International Publishing. doi:10.1007/978-3-319-15618-7_5 ![]() |
![]() ![]() | MARTINEZ, J., Ziadi, T., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2015). Automating the Extraction of Model-based Software Product Lines from Model Variants. In 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015). doi:10.1109/ASE.2015.44 ![]() |
![]() ![]() | LI, L., BARTEL, A., BISSYANDE, T. F. D. A., KLEIN, J., LE TRAON, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015). ![]() |
![]() ![]() | EL KATEB, D., ELRAKAIBY, Y., Mouelhi, T., RUBAB, I., & LE TRAON, Y. (2015). Towards a full support of obligations in XACML. Lecture Notes in Computer Science, 8924, 213-221. doi:10.1007/978-3-319-17127-2_14 ![]() |
![]() ![]() | Bardin, S., Delahaye, M., Kosmatov, N., David, R., PAPADAKIS, M., LE TRAON, Y., & Marion, J.-Y. (2015). Sound and Quasi-Complete Detection of Infeasible Test Requirements. In 8th IEEE International Conference on Software Testing, Verification and Validation (ICST'15). doi:10.1109/ICST.2015.7102607 ![]() |
![]() ![]() | PAPADAKIS, M., Yue, J., Harman, M., & LE TRAON, Y. (2015). Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique. In 37th International Conference on Software Engineering (ICSE 2015). ![]() |
![]() ![]() | Bertolino, A., Daoudagh, S., EL KATEB, D., HENARD, C., LE TRAON, Y., Lonetti, F., Marchetti, E., Mouelhi, T., & PAPADAKIS, M. (2015). Similarity testing for access control. Information and Software Technology, 58, 355-372. doi:10.1016/j.infsof.2014.07.003 ![]() |
![]() ![]() | HENARD, C., PAPADAKIS, M., Harman, M., & LE TRAON, Y. (2015). Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines. In 37th International Conference on Software Engineering (ICSE 2015). ![]() |
![]() ![]() | Xu, D., Kent, M., Thomas, L., Mouelhi, T., & LE TRAON, Y. (2015). Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets. IEEE Transactions on Computers, 64 (9), 2490-2505. doi:10.1109/TC.2014.2375189 ![]() |
![]() ![]() | PAPADAKIS, M., & LE TRAON, Y. (2015). Metallaxis-FL: mutation-based fault localization. Software Testing, Verification and Reliability, 25, 605-628. doi:10.1002/stvr.1509 ![]() |
![]() ![]() | ALLIX, K., BISSYANDE, T. F. D. A., JEROME, Q., KLEIN, J., STATE, R., & LE TRAON, Y. (2014). Empirical assessment of machine learning-based malware detectors for Android: Measuring the Gap between In-the-Lab and In-the-Wild Validation Scenarios. Empirical Software Engineering, 1-29. doi:10.1007/s10664-014-9352-6 ![]() |
Ko, D., Ma, K., Park, S., Kim, S., KIM, D., & LE TRAON, Y. (01 December 2014). API Document Quality for Resolving Deprecated APIs [Paper presentation]. The 21st Asia-Pacific Software Engineering Conference. |
![]() ![]() | PAPADAKIS, M., Delamaro, E. M., & LE TRAON, Y. (December 2014). Mitigating the Effects of Equivalent Mutants with Mutant Classification Strategies. Science of Computer Programming, 95, 298-319. doi:10.1016/j.scico.2014.05.012 ![]() |
![]() ![]() | HARTMANN, T., FOUQUET, F., KLEIN, J., LE TRAON, Y., Pelov, A., Toutain, L., & Ropitault, T. (2014). Generating Realistic Smart Grid Communication Topologies Based on Real-Data. In 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm). ![]() |
![]() ![]() | EL KATEB, D., FOUQUET, F., bourcier, J., & LE TRAON, Y. (October 2014). Optimizing Multi-Objective Evolutionary Algorithms to Enable Quality-Aware Software Provisioning [Paper presentation]. The 14th International Conference on Quality Software. |
![]() ![]() | LI, L., BARTEL, A., KLEIN, J., & LE TRAON, Y. (2014). Automatically Exploiting Potential Component Leaks in Android Applications. In The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), IEEE, Sept. 2014, Beijing, China. ![]() |
![]() ![]() | NGUYEN, P. H., KLEIN, J., & LE TRAON, Y. (2014). Model-Driven Security with A System of Aspect-Oriented Security Design Patterns. In 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling. doi:10.1145/2631675.2631683 ![]() |
![]() ![]() | HARTMANN, T., FOUQUET, F., NAIN, G., Brice, M., KLEIN, J., & LE TRAON, Y. (02 July 2014). Model-based time-distorted Contexts for efficient temporal Reasoning [Poster presentation]. 26th International Conference on Software Engineering and Knowledge Engineering, Vancouver, Canada. |
![]() ![]() | HARTMANN, T., FOUQUET, F., NAIN, G., Morin, B., KLEIN, J., & LE TRAON, Y. (2014). Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach. In Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering (1st, pp. 586-591). Vancouver, Canada: Knowledge Systems Institute Graduate School, USA. ![]() |
![]() ![]() | ALLIX, K., JEROME, Q., BISSYANDE, T. F. D. A., KLEIN, J., STATE, R., & LE TRAON, Y. (2014). A Forensic Analysis of Android Malware -- How is Malware Written and How It Could Be Detected? In Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference (pp. 384--393). Washington, DC, USA, Unknown/unspecified: IEEE Computer Society. doi:10.1109/COMPSAC.2014.61 ![]() |
![]() ![]() | LI, L., BARTEL, A., KLEIN, J., & LE TRAON, Y. (2014). Automatically Exploiting Potential Component Leaks in Android Applications. (TR-SnT-2014-13). Luxembourg, Luxembourg: SnT. https://orbilu.uni.lu/handle/10993/16914 |
![]() ![]() | Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., KLEIN, J., LE TRAON, Y., Octeau, D., & McDaniel, P. (June 2014). FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps [Paper presentation]. ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI 2014). |
![]() ![]() | BARTEL, A., KLEIN, J., Monperrus, M., & LE TRAON, Y. (June 2014). Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android. IEEE Transactions on Software Engineering, 40 (6), 617-632. doi:10.1109/TSE.2014.2322867 ![]() |
![]() ![]() | ALLIX, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2014). Machine Learning-Based Malware Detection for Android Applications: History Matters! Luxembourg, Luxembourg: University of Luxembourg, SnT. https://orbilu.uni.lu/handle/10993/17251 |
![]() ![]() | LI, L., BARTEL, A., KLEIN, J., LE TRAON, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2014). I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis. (TR-SNT-2014-9, Technical Report). Luxembourg, Luxembourg: SnT Centre - University of Luxembourg. https://orbilu.uni.lu/handle/10993/16886 |
![]() ![]() | HARTMANN, T., FOUQUET, F., KLEIN, J., NAIN, G., & LE TRAON, Y. (2014). Reactive Security for Smart Grids Using Models@run.time-Based Simulation and Reasoning. In Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14). ![]() |
![]() ![]() | LI, L., BARTEL, A., KLEIN, J., & LE TRAON, Y. (12 March 2014). Using A Path Matching Algorithm to Detect Inter-Component Leaks in Android Apps [Paper presentation]. Grande Region Security and Reliability Day 2014. |
![]() ![]() | EL KATEB, D., FOUQUET, F., NAIN, G., MEIRA, J. A., Ackerman, M., & LE TRAON, Y. (March 2014). Generic Cloud Platform Multi-objective Optimization Leveraging Models@run.time [Paper presentation]. 29th Symposium On Applied Computing. |
![]() ![]() | ALLIX, K., BISSYANDE, T. F. D. A., JEROME, Q., KLEIN, J., STATE, R., & LE TRAON, Y. (2014). Large-scale Machine Learning-based Malware Detection: Confronting the "10-fold Cross Validation" Scheme with Reality. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (pp. 163--166). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2557547.2557587 ![]() |
![]() ![]() | NGUYEN, P. H., KLEIN, J., & LE TRAON, Y. (2014). Modeling, composing, and testing of security concerns in a Model-Driven Security approach. In W. Joosen, F. Martinelli, ... T. Heyman (Eds.), Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014). ![]() |
![]() ![]() | LI, L., BARTEL, A., KLEIN, J., & LE TRAON, Y. (26 February 2014). Detecting privacy leaks in Android Apps [Paper presentation]. International Symposium on Engineering Secure Software and Systems - Doctoral Symposium. |
![]() ![]() | Lucio, L., ZHANG, Q., NGUYEN, P. H., AMRANI, M., KLEIN, J., Vangheluwe, H., & LE TRAON, Y. (2014). Advances in Model-Driven Security. In A. Memon (Ed.), Advances in Computers. Elsevier. doi:10.1016/B978-0-12-800162-2.00003-8 ![]() |
![]() ![]() | NGUYEN, P. H., NAIN, G., KLEIN, J., MOUELHI, T., & LE TRAON, Y. (2014). Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management. Transactions on Aspect-Oriented Software Development, 11, 109-144. ![]() |
![]() ![]() | EL KATEB, D., Zannone, N., MOAWAD, A., CAIRE, P., NAIN, G., MOUELHI, T., & LE TRAON, Y. (2014). Conviviality-Driven Access Control Policy. Requirements Engineering. ![]() |
![]() ![]() | LUCAS FILHO, E. R., CUNHA DE ALMEIDA, E., & LE TRAON, Y. (2014). Intra-query Adaptivity for MapReduce Query Processing Systems. In IDEAS 2014 : 18th International Database Engineering Applications Symposium. doi:10.1145/2628194.2628202 ![]() |
![]() ![]() | Sunyé, G., De Almeida, E. C., LE TRAON, Y., Baudry, B., & Jézéquel, J.-M. (2014). Model-based testing of global properties on large-scale distributed systems. Information and Software Technology, 56 (7), 749-762. doi:10.1016/j.infsof.2014.02.002 ![]() |
![]() ![]() | Bertolino, A., LE TRAON, Y., Lonetti, F., Marchetti, E., & Mouelhi, T. (2014). Coverage-based Test Cases Selection for XACML Policies. IEEE International Conference on Software Testing Verification and Validation Workshops, 12-21. doi:10.1109/ICSTW.2014.49 ![]() |
![]() ![]() | OLIVARES MENDEZ, M. A., Bissyandé, T., Somasundar, K., KLEIN, J., VOOS, H., & LE TRAON, Y. (2014). The NOAH Project: Giving a Chance to Threatened Species in Africa with UAVs. In T. F. Bissyandé & G. van Stam (Eds.), e-Infrastructure and e-Services for Developing Countries (pp. 198-208). Springer International Publishing. doi:10.1007/978-3-319-08368-1_24 ![]() |
![]() ![]() | Rubab, I., Ali, S., BRIAND, L., & LE TRAON, Y. (2014). Model-Based Testing of Obligations. In 14th Annual International Conference on Quality Software (QSIC) (pp. 1-10). Los Alamitos, Unknown/unspecified: Ieee Computer Soc. doi:10.1109/QSIC.2014.47 ![]() |
![]() ![]() | ABGRALL, E., LE TRAON, Y., Gombault, S., & Monperrus, M. (2014). Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: an Urgent Need for Systematic Security Regression Testing. In 7th IEEE International Conference on Software Testing, Verification and Validation (ICST)- Workshop SECTEST (pp. 34-41). New York, Unknown/unspecified: Ieee. doi:10.1109/ICSTW.2014.63 ![]() |
![]() ![]() | MARTINEZ, J., Ziadi, T., Mazo, R., KLEIN, J., & LE TRAON, Y. (2014). Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines. In 2nd IEEE Working Conference on Software Visualization. doi:10.1109/VISSOFT.2014.18 ![]() |
![]() ![]() | MARTINEZ, J., Ziadi, T., KLEIN, J., & LE TRAON, Y. (2014). Identifying and Visualising Commonality and Variability in Model Variants. In ECMFA 2014 European Conference on Modelling Foundations and Applications. ![]() |
![]() ![]() | bikakis, A., CAIRE, P., & LE TRAON, Y. (2014). Tools for Conviviality in Multi-Context Systems. IfCoLog Journal of Logics and Their Applications, 1 (1). ![]() |
![]() ![]() | PAPADAKIS, M., & LE TRAON, Y. (2014). Effective Fault Localization via Mutation Analysis: A Selective Mutation Approach. In ACM Symposium On Applied Computing (SAC'14). doi:10.1145/2554850.2554978 ![]() |
![]() ![]() | PAPADAKIS, M., HENARD, C., & LE TRAON, Y. (2014). Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing. In 7th International Conference on Software Testing, Verification and Validation (ICST 2014). doi:10.1109/ICST.2014.11 ![]() |
MARTINEZ, J., Ziadi, T., KLEIN, J., & LE TRAON, Y. (2014). BUT4Reuse Feature identifier: Identifying reusable features on software variants [Poster presentation]. 3ème Conférence en IngénieriE du Logiciel. |
![]() ![]() | MEIRA, J. A., Almeida, E., & LE TRAON, Y. (2014). A state machine for database non-functional testing [Poster presentation]. 18th International Database Engineering & Applications Symposium. |
![]() ![]() | HARTMANN, T., FOUQUET, F., NAIN, G., Morin, B., KLEIN, J., Barais, O., & LE TRAON, Y. (2014). A Native Versioning Concept to Support Historized Models at Runtime. In J. Dingel, W. Schulte, I. Ramos, S. Abrahao, ... E. Insfran (Eds.), Model-Driven Engineering Languages and Systems - 17th International Conference, MODELS 2014, Valencia, Spain, September 28 - October 3, 2014. Proceedings (1st, pp. 252-268). Springer. doi:10.1007/978-3-319-11653-2_16 ![]() |
![]() ![]() | AMRANI, M., Lúcio, L., Selim, G., Combemale, B., Dingel, J., Vangheluwe, H., LE TRAON, Y., & Cordy, J. (2014). A Survey of Formal Verification Techniques for Model Transformations: A Tridimensional Classification. Journal of Technology. doi:10.5381/jot.2015.14.1.a3 ![]() |
![]() ![]() | ELRAKAIBY, Y., AMRANI, M., & LE TRAON, Y. (2014). A Flexible MDE approach to Enforce Fine- grained Security Policies. In Proceedings of the International Symposium on Engineering Secure Software and Systems. ![]() |
![]() ![]() | EL KATEB, D., ELRAKAIBY, Y., MOUELHI, T., RUBAB, I., & LE TRAON, Y. (2014). Towards a Full Support of Obligations In XACML [Paper presentation]. 9th International Conference on Risks and Security of Internet and Systems. |
![]() ![]() | ELRAKAIBY, Y., AMRANI, M., & LE TRAON, Y. (2014). Security@Runtime: A flexible MDE approach to enforce fine-grained security policies. Lecture Notes in Computer Science, 8364 LNCS, 19-34. doi:10.1007/978-3-319-04897-0-2 ![]() |
![]() ![]() | HENARD, C., PAPADAKIS, M., & LE TRAON, Y. (2014). MutaLog: a Tool for Mutating Logic Formulas. In Testing Tools Track, 7th International Conference on Software Testing, Verification and Validation (ICST 2014). doi:10.1109/ICSTW.2014.54 ![]() |
![]() ![]() | Ziadi, T., HENARD, C., PAPADAKIS, M., Ziane, M., & LE TRAON, Y. (2014). Towards a Language-Independent Approach for Reverse-Engineering of Software Product Lines. In 29th Symposium on Applied Computing (SAC 2014). doi:10.1145/2554850.2554874 ![]() |
![]() ![]() | HENARD, C., PAPADAKIS, M., PERROUIN, G., KLEIN, J., Heymans, P., & LE TRAON, Y. (2014). Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Configurations for Software Product Lines. IEEE Transactions on Software Engineering, 40 (7), 650-670. doi:10.1109/TSE.2014.2327020 ![]() |
![]() ![]() | HENARD, C., PAPADAKIS, M., & LE TRAON, Y. (2014). Mutation-based Generation of Software Product Line Test Configurations. In Symposium on Search-Based Software Engineering (SSBSE 2014). Springer. ![]() |
![]() ![]() | CAIRE, P., Bikakis, A., & LE TRAON, Y. (2013). Information Dependencies in MCS: Conviviality-Based Model and Metrics. In 16th INTERNATIONAL CONFERENCE ON PRINCIPLES AND PRACTICE OF MULTI-AGENT SYSTEMS (PRIMA 2013). ![]() |
![]() ![]() | NGUYEN, P. H., KLEIN, J., Kramer, M., & LE TRAON, Y. (2013). A Systematic Review of Model-Driven Security. In The 20th Asia-Pacific Software Engineering Conference Proceedings. ![]() |
![]() ![]() | BISSYANDE, T. F. D. A., Lo, D., Jiang, L., Reveillere, L., KLEIN, J., & LE TRAON, Y. (2013). Got Issues? Who Cares About It? A Large Scale Investigation of Issue Trackers from GitHub. In Proceedings of the 24th International Symposium on Software Reliability Engineering (ISSRE 2013). doi:10.1109/ISSRE.2013.6698918 ![]() |
![]() ![]() | MOAWAD, A., Bikakis, A., CAIRE, P., NAIN, G., & LE TRAON, Y. (2013). A Rule-based Contextual Reasoning Platform for Ambient Intelligence environments. In Theory, Practice, and Applications of Rules on the Web (pp. 158-172). springer. ![]() |
![]() ![]() | MOAWAD, A., Bikakis, A., CAIRE, P., NAIN, G., & LE TRAON, Y. (2013). R-CoRe: A Rule-based Contextual Reasoning Platform for AmI. In Joint Proceedings of the 7th International Rule Challenge, the Special Track on Human Language Technology and the 3rd RuleML Doctoral Consortium hosted at the 8th International Symposium on Rules (RuleML2013). ![]() |
![]() ![]() | Fritz, C., Arzt, S., Rasthofer, S., Bodden, E., BARTEL, A., KLEIN, J., LE TRAON, Y., Octeau, D., & McDaniel, P. (2013). Highly precise taint analysis for Android applications. https://orbilu.uni.lu/handle/10993/25162 |
![]() ![]() | NGUYEN, P. H., NAIN, G., KLEIN, J., MOUELHI, T., & LE TRAON, Y. (2013). Model-Driven Adaptive Delegation. In S. Chiba, N. Ubayashi, ... H. Masuhara (Eds.), Proceedings of the 12th annual international conference companion on Aspect-oriented software development. New York, United States: ACM. doi:10.1145/2451436.2451445 ![]() |
![]() ![]() | Munoz, F., Baudry, B., Delamare, R., & LE TRAON, Y. (2013). Usage and testability of AOP: An empirical study of AspectJ. Information and Software Technology, 55 (2), 252-266. doi:10.1016/j.infsof.2012.08.003 ![]() |
![]() ![]() | PAPADAKIS, M., & LE TRAON, Y. (2013). Mutation Testing Strategies using Mutant Classification. Abstract book of 28th Symposium On Applied Computing. doi:10.1145/2480362.2480592 ![]() |
![]() ![]() | El Kateb, D., ElRakaiby, Y., Mouelhi, T., & LE TRAON, Y. (2013). Access Control Enforcement Testing. Abstract book of 2013 8TH INTERNATIONAL WORKSHOP ON AUTOMATION OF SOFTWARE TEST (AST), 64-70. doi:10.1109/IWAST.2013.6595793 ![]() |
![]() ![]() | MEIRA, J. A., Almeida, E. C. D., Sunyé, G., LE TRAON, Y., & Valduriez, P. (2013). Stress Testing of Transactional Database Systems. Journal of Information and Data Management. ![]() |
![]() ![]() | Fior, A. G., MEIRA, J. A., Almeida, E. C. D., Coelho, R. G., Del Fabro, M. D., & LE TRAON, Y. (2013). Under Pressure Benchmark for DDBMS Availability. Journal of Information and Data Management. ![]() |
![]() ![]() | BISSYANDE, T. F. D. A., Ahmat, D., Ouoba, J., van Stam, G., KLEIN, J., & LE TRAON, Y. (2013). Sustainable ICT4D in Africa: Where Do We Go From Here? In EAI International Conference on e-Infrastructure and e-Services for Developing Countries. ![]() |
![]() ![]() | HENARD, C., PAPADAKIS, M., PERROUIN, G., KLEIN, J., & LE TRAON, Y. (2013). PLEDGE: a product line editor and test generation tool. In 17th International Software Product Line Conference co-located workshops, SPLC 2013 workshops, Tokyo, Japan - August 26. ACM. doi:10.1145/2499777.2499778 ![]() |
![]() ![]() | PAPADAKIS, M., Delamaro, E. M., & LE TRAON, Y. (2013). Proteum/FL: A tool for localizing faults using mutation analysis. In International Working Conference on Source Code Analysis and Manipulation (pp. 94-99). doi:10.1109/SCAM.2013.6648189 ![]() |
![]() ![]() | HENARD, C., PAPADAKIS, M., PERROUIN, G., KLEIN, J., & LE TRAON, Y. (2013). Multi-objective test generation for software product lines. In 17th International Software Product Line Conference, SPLC 2013, Tokyo, Japan - August 26 - 30, 2013. ACM. doi:10.1145/2491627.2491635 ![]() |
![]() ![]() | HENARD, C., PAPADAKIS, M., PERROUIN, G., KLEIN, J., & LE TRAON, Y. (2013). Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing. In 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, Workshops Proceedings, Luxembourg, Luxembourg, March 18-22, 2013. IEEE. doi:10.1109/ICSTW.2013.30 ![]() |
![]() ![]() | HENARD, C., PAPADAKIS, M., PERROUIN, G., KLEIN, J., & LE TRAON, Y. (2013). Towards automated testing and fixing of re-engineered feature models. In Proceedings of the 2013 International Conference on Software Engineering. Piscataway, NJ, USA, Unknown/unspecified: IEEE Press. ![]() |
![]() ![]() | Octeau, D., McDaniel, P., Jha, S., BARTEL, A., Bodden, E., KLEIN, J., & LE TRAON, Y. (2013). Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. In Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. ![]() |
![]() ![]() | Elrakaiby, Y., & LE TRAON, Y. (2013). A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications. In 2013 International Conference on Availability, Reliability and Security. doi:10.1109/ARES.2013.49 ![]() |
![]() ![]() | Hwang, J., Xie, T., EL KATEB, D., MOUELHI, T., & LE TRAON, Y. (September 2012). Selection of Regression System Tests for Security Policy Evolution [Paper presentation]. 27th IEEE/ACM International Conference Automated Software Engineering 2012. |
![]() ![]() | Bikakis, A., EFTHYMIOU, V., CAIRE, P., & LE TRAON, Y. (2012). Introducing Conviviality as a property of Multi-Context Systems. In The 4th International Workshop on Acquisition, Representation and Reasoning with Contextualized Knowledge ARCOE-12. ![]() |
![]() ![]() | MOAWAD, A., EFTHYMIOU, V., CAIRE, P., NAIN, G., & LE TRAON, Y. (August 2012). Introducing Conviviality as a New Paradigm for Interactions among IT Objects. Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments, 907, 3-8. ![]() |
![]() ![]() | PERROUIN, G., Morin, B., Chauvel, F., Fleurey, F., KLEIN, J., LE TRAON, Y., Barais, O., & Jézéquel, J.-M. (2012). Towards Flexible Evolution of Dynamically Adaptive Systems. In New Ideas & Emerging Results Track of the International Conference of Software Engineering (NIER@ICSE) (pp. 1353-1356). IEEE Press. ![]() |
![]() ![]() | EL KATEB, D., Elrakaiby, Y., MOUELHI, T., & LE TRAON, Y. (2012). Access Control Enforcement Testing. In 8th International Workshop on Automation of Software Test (AST), 2013 (pp. 64-70). ![]() |
![]() ![]() | EL KATEB, D., MOUELHI, T., LE TRAON, Y., Hwang, J., & Xie, T. (2012). Refactoring access control policies for performance improvement. In Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (pp. 323--334). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2188286.2188346 ![]() |
![]() ![]() | HENARD, C., PAPADAKIS, M., PERROUIN, G., KLEIN, J., Heymans, P., & LE TRAON, Y. (2012). Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Suites for Large Software Product Lines. Technical Report. https://orbilu.uni.lu/handle/10993/4896 |
![]() ![]() | MEIRA, J. A., Almeida, E. C., LE TRAON, Y., & Sunye, G. (2012). Peer-to-Peer Load Testing. In Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on (pp. 642-647). IEEE. doi:10.1109/ICST.2012.153 ![]() |
![]() ![]() | Dhaussy, P., Boniol, F., Roger, J.-C., Raji, A., LE TRAON, Y., & Baudry, B. I. (2012). Formalisation de contextes et d'exigences pour la validation formelle de logiciels embarqués. TSI. Technique et science informatiques, 31 (6), 797--825. ![]() |
![]() ![]() | Xu, D., THOMAS, L., Kent, M., MOUELHI, T., & LE TRAON, Y. (2012). A Model-Based Approach to Automated Testing of Access Control Policies. Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 100-110. doi:10.1145/2295136.2295173 ![]() |
![]() ![]() | ELRAKAIBY, Y., MOUELHI, T., & LE TRAON, Y. (2012). Testing obligation policy enforcement using mutation analysis. Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012, 673-680. doi:10.1109/ICST.2012.157 ![]() |
![]() ![]() | EL RAKAIBY, Y., MOUELHI, T., & LE TRAON, Y. (2012). Testing Obligation Policy Enforcement using Mutation Analysis. Proceedings of the 7th International Workshop on Mutation Analysis (associated to the Fifth International Conference on Software Testing, Verification, and Validation, ICST 2012), 100-110. ![]() |
![]() ![]() | BARTEL, A., KLEIN, J., Monperrus, M., ALLIX, K., & LE TRAON, Y. (2012). In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/25161. |
![]() ![]() | PERROUIN, G., Oster, S., Sen, S., KLEIN, J., Baudry, B., & LE TRAON, Y. (2012). Pairwise testing for software product lines: Comparison of two approaches. Software Quality Journal, 20 (3), 605-643. doi:10.1007/s11219-011-9160-9 ![]() |
![]() ![]() | PAPADAKIS, M., & LE TRAON, Y. (2012). Using Mutants to Locate "Unknown" Faults. In ICST 2012. doi:10.1109/ICST.2012.159 ![]() |
![]() ![]() | BARTEL, A., KLEIN, J., Monperrus, M., ALLIX, K., & LE TRAON, Y. (2012). Improving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation. Luxembourg, Unknown/unspecified: uni.lu. https://orbilu.uni.lu/handle/10993/3889 |
![]() ![]() | BARTEL, A., KLEIN, J., Monperrus, M., & LE TRAON, Y. (2012). Dexpler: Converting Android Dalvik Bytecode to Jimple for Static Analysis with Soot. In ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2012) (pp. 1-12). doi:10.1145/2259051.2259056 ![]() |
![]() ![]() | BARTEL, A., KLEIN, J., Monperrus, M., & LE TRAON, Y. (2012). Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android. In IEEE/ACM International Conference on Automated Software Engineering (pp. 1-4). doi:10.1145/2351676.2351722 ![]() |
![]() ![]() | ELKATEB, D., MOUELHI, T., LE TRAON, Y., Hwang, J., & Xie, T. (2012). Refactoring Access Control Policies for Performance Improvement. Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (ICPE 2012), 100-110. ![]() |
![]() ![]() | BARTEL, A., KLEIN, J., Monperrus, M., & LE TRAON, Y. (2011). Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android. In Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android (Tech Report) (pp. 1-11). Tech Report. |
![]() ![]() | BARTEL, A., Baudry, B., Munoz, F., KLEIN, J., MOUELHI, T., & LE TRAON, Y. (2011). Model Driven Mutation Applied to Adaptative Systems Testing. 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops. doi:10.1109/ICSTW.2011.24 ![]() |
![]() ![]() | PERROUIN, G., Sen, S., KLEIN, J., Baudry, B., & LE TRAON, Y. (2010). Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines. International Conference on Software Test and Validation. doi:10.1109/ICST.2010.43 ![]() |