HU, Q., Yuejun Guo, Xiaofei Xie, CORDY, M., Lei Ma, PAPADAKIS, M., & LE TRAON, Y. (In press). Test Optimization in DNN Testing: A Survey. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/59273. doi:10.1145/3643678 |
RUIZ RODRIGUEZ, M. L., KUBLER, S., Robert, J., & LE TRAON, Y. (15 August 2024). Dynamic maintenance scheduling approach under uncertainty: Comparison between reinforcement learning, genetic algorithm simheuristic, dispatching rules. Expert Systems with Applications, 248, 123404. doi:10.1016/j.eswa.2024.123404 Peer Reviewed verified by ORBi |
DOGOULIS, P. T., JIMENEZ, M., GHAMIZI, S., CORDY, M., & LE TRAON, Y. (28 July 2024). Robustness Analysis of AI Models in Critical Energy Systems [Poster presentation]. International Conference on Machine Learning, Vienna, Austria. Peer reviewed |
DANG, X., LI, Y., Wei Ma, Yuejun Guo, Qiang Hu, PAPADAKIS, M., CORDY, M., & LE TRAON, Y. (22 July 2024). Towards Exploring the Limitations of Test Selection Techniques on Graph Neural Networks: An Empirical Study. Empirical Software Engineering, 29 (5). doi:10.1007/s10664-024-10515-y Peer Reviewed verified by ORBi |
LI, Y., DANG, X., Ma, L., KLEIN, J., LE TRAON, Y., & BISSYANDE, T. F. D. A. (04 June 2024). Test Input Prioritization for 3D Point Clouds. ACM Transactions on Software Engineering and Methodology, 33 (5), 1-44. doi:10.1145/3643676 Peer Reviewed verified by ORBi |
DANG, X.* , LI, Y.* , PAPADAKIS, M., KLEIN, J., BISSYANDE, T. F. D. A., & LE TRAON, Y. (05 January 2024). Test Input Prioritization for Machine Learning Classifiers. IEEE Transactions on Software Engineering, 50 (3), 413 - 442. doi:10.1109/TSE.2024.3350019 Peer Reviewed verified by ORBi * These authors have contributed equally to this work. |
SIMONETTO, T. J. A., CORDY, M., GHAMIZI, S., LE TRAON, Y., Lefebvre, C., Boystov, A., & Goujon, A. (2024). On the Impact of Industrial Delays when Mitigating Distribution Drifts: an Empirical Study on Real-world Financial Systems. In KDD Workshop on Discovering Drift Phenomena in Evolving Data Landscape. Springer. Peer reviewed |
Kim, K., Ghatpande, S., Kim, D., Zhou, X., Liu, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (26 August 2023). Big Code Search: A Bibliography. ACM Computing Surveys, 56 (1), 1-49. doi:10.1145/3604905 Peer Reviewed verified by ORBi |
HU, Q., Guo, Y., Xie, X., CORDY, M., Ma, W., PAPADAKIS, M., & LE TRAON, Y. (2023). Evaluating the Robustness of Test Selection Methods for Deep Neural Networks. preprint. doi:https://doi.org/10.48550/arXiv.2308.01314 |
DANG, X., LI, Y., PAPADAKIS, M., KLEIN, J., BISSYANDE, T. F. D. A., & LE TRAON, Y. (2023). GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3607191 Peer Reviewed verified by ORBi |
AKLI, A., HABEN, G., Habchi, S., PAPADAKIS, M., & LE TRAON, Y. (2023). FlakyCat: Predicting Flaky Tests Categories using Few-Shot Learning. In FlakyCat: Predicting Flaky Tests Categories using Few-Shot Learning. doi:10.1109/AST58925.2023.00018 Peer reviewed |
GUBRI, M., CORDY, M., & LE TRAON, Y. (2023). Going Further: Flatness at the Rescue of Early Stopping for Adversarial Example Transferability. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/55436. |
GARG, A., OJDANIC, M., DEGIOVANNI, R. G., TITCHEU CHEKAM, T., PAPADAKIS, M., & LE TRAON, Y. (2023). Cerebro: Static Subsuming Mutant Selection. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2022.3140510 Peer Reviewed verified by ORBi |
KUBLER, S., Renard, M., GHATPANDE, S., Georges, J.-P., & LE TRAON, Y. (2023). Decision support system for blockchain (DLT) platform selection based on ITU recommendations: A systematic literature review approach. Expert systems with applications, 211, 118704. doi:10.1016/j.eswa.2022.118704 Peer reviewed |
DYRMISHI, S., GHAMIZI, S., SIMONETTO, T. J. A., LE TRAON, Y., & CORDY, M. (2023). On the empirical effectiveness of unrealistic adversarial hardening against realistic adversarial attacks. In Conference Proceedings 2023 IEEE Symposium on Security and Privacy (SP) (pp. 1384-1400). IEEE. doi:10.1109/SP46215.2023.00049 Peer reviewed |
OJDANIC, M., KHANFIR, A., GARG, A., DEGIOVANNI, R. G., PAPADAKIS, M., & LE TRAON, Y. (2023). On Comparing Mutation Testing Tools through Learning-based Mutant Selection. In On Comparing Mutation Testing Tools through Learning-based Mutant Selection (pp. 10). doi:10.1109/AST58925.2023.00008 Peer reviewed |
OJDANIC, M., GARG, A., KHANFIR, A., DEGIOVANNI, R. G., PAPADAKIS, M., & LE TRAON, Y. (2023). Syntactic Vs. Semantic similarity of Artificial and Real Faults in Mutation Testing Studies. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/49190. doi:10.1109/TSE.2023.3277564 |
RWEMALIKA, R., HABCHI, S., PAPADAKIS, M., LE TRAON, Y., & Brasseur, M.-C. (2023). Smells in system user interactive tests. Empirical Software Engineering, 28 (1). doi:10.1007/s10664-022-10251-1 Peer Reviewed verified by ORBi |
Carvalho, L., DEGIOVANNI, R. G., Brizzio, M. A., CORDY, M., Aguirre, N., LE TRAON, Y., & PAPADAKIS, M. (2023). ACoRe: Automated Goal-Conflict Resolution. 26th International Conference on Fundamental Approaches to Software Engineering (FASE), 13991, 3–25. doi:10.1007/978-3-031-30826-0_1 Peer reviewed |
GHAMIZI, S., Zhang, J., CORDY, M., PAPADAKIS, M., Sugiyama, M., & LE TRAON, Y. (2023). GAT: Guided Adversarial Training with Pareto-optimal Auxiliary Tasks. Proceedings of the International Conference on Machine Learning (ICML), 202, 11255–11282. Peer reviewed |
GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2023). On Evaluating Adversarial Robustness of Chest X-ray Classification. Proceedings of the Workshop on Artificial Intelligence Safety 2023, 3381. Peer reviewed |
Dong, Z., HU, Q., GUO, Y., CORDY, M., PAPADAKIS, M., Zhang, Z., LE TRAON, Y., & Zhao, J. (2023). MixCode: Enhancing Code Classification by Mixup-Based Data Augmentation. IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 379–390. doi:10.1109/SANER56733.2023.00043 Peer reviewed |
HU, Q., GUO, Y., Xie, X., CORDY, M., PAPADAKIS, M., Ma, L., & LE TRAON, Y. (2023). CodeS: Towards Code Model Generalization Under Distribution Shift. IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results, 1–6. doi:10.1109/ICSE-NIER58687.2023.00007 Peer reviewed |
KHANFIR, A., JIMENEZ, M., PAPADAKIS, M., & LE TRAON, Y. (2022). CODEBERT-NT: code naturalness via CodeBERT. 22nd IEEE International Conference on Software Quality, Reliability and Security (QRS'22). doi:10.1109/QRS57517.2022.00098 Peer reviewed |
BERNIER, F., JIMENEZ, M., CORDY, M., & LE TRAON, Y. (2022). Faster and Cheaper Energy Demand Forecasting at Scale. In Has it Trained Yet? Workshop at the Conference on Neural Information Processing Systems. Peer reviewed |
LORENTZ, J., HARTMANN, T., MOAWAD, A., FOUQUET, F., AOUADA, D., & LE TRAON, Y. (2022). CalcGraph: taming the high costs of deep learning using models. Software and Systems Modeling. doi:10.1007/s10270-022-01052-7 Peer Reviewed verified by ORBi |
Habchi, S., HABEN, G., SOHN, J., Franci, A., PAPADAKIS, M., CORDY, M., & LE TRAON, Y. (2022). What Made This Test Flake? Pinpointing Classes Responsible for Test Flakiness. In What Made This Test Flake? Pinpointing Classes Responsible for Test Flakiness. doi:10.1109/ICSME55016.2022.00039 Peer reviewed |
SOUANI, B., KHANFIR, A., BARTEL, A., ALLIX, K., & LE TRAON, Y. (2022). Android Malware Detection Using BERT. In Z. Jianying, Applied Cryptography and Network Security Workshops (pp. 575–591). Berlin, Germany: Springer. doi:10.1007/978-3-031-16815-4_31 Peer reviewed |
GARG, A., DEGIOVANNI, R. G., JIMENEZ, M., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2022). Learning from what we know: How to perform vulnerability prediction using noisy historical data. Empirical Software Engineering. doi:10.1007/s10664-022-10197-4 Peer Reviewed verified by ORBi |
Sawadogo, D. A., BISSYANDE, T. F. D. A., Moha, N., Allix, K., KLEIN, J., Li, L., & LE TRAON, Y. (August 2022). SSPCATCHER: Learning to catch security patches. Empirical Software Engineering, 27. doi:10.1007/s10664-022-10168-9 Peer Reviewed verified by ORBi |
KHANFIR, A., Koyuncu, A., PAPADAKIS, M., CORDY, M., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2022). iBiR: Bug Report driven Fault Injection. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3542946 Peer Reviewed verified by ORBi |
OJDANIC, M., SOREMEKUN, E., DEGIOVANNI, R. G., PAPADAKIS, M., & LE TRAON, Y. (2022). Mutation Testing in Evolving Systems: Studying the relevance of mutants to code evolution. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3530786 Peer Reviewed verified by ORBi |
HABCHI, S., HABEN, G., PAPADAKIS, M., CORDY, M., & LE TRAON, Y. (2022). A Qualitative Study on the Sources, Impacts, and Mitigation Strategies of Flaky Tests. In A Qualitative Study on the Sources, Impacts, and Mitigation Strategies of Flaky Tests. doi:10.1109/ICST53961.2022.00034 Peer reviewed |
GHAMIZI, S., GARCIA SANTA CRUZ, B., Temple, P., CORDY, M., Perrouin, G., PAPADAKIS, M., & LE TRAON, Y. (2022). Towards Generalizable Machine Learning for Chest X-ray Diagnosis with Multi-task learning. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/50815. |
SIMONETTO, T. J. A., DYRMISHI, S., GHAMIZI, S., CORDY, M., & LE TRAON, Y. (2022). A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space. In Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI-22 (pp. 1313-1319). International Joint Conferences on Artificial Intelligence Organization. doi:10.24963/ijcai.2022/183 Peer reviewed |
GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2022). On Evaluating Adversarial Robustness of Chest X-ray Classification: Pitfalls and Best Practices. In The Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI- 23) - SafeAI Workshop, Washington, D.C., Feb 13-14, 2023. Peer reviewed |
GUBRI, M., CORDY, M., PAPADAKIS, M., LE TRAON, Y., & Sen, K. (2022). Efficient and Transferable Adversarial Examples from Bayesian Neural Networks. The 38th Conference on Uncertainty in Artificial Intelligence. Peer reviewed |
RUIZ RODRIGUEZ, M. L., KUBLER, S., de Giorgio, A., CORDY, M., Robert, J., & LE TRAON, Y. (2022). Multi-agent deep reinforcement learning based Predictive Maintenance on parallel machines. Robotics and Computer-Integrated Manufacturing. doi:10.1016/j.rcim.2022.102406 Peer reviewed |
HU, Q., GUO, Y., CORDY, M., Xie, X., Ma, L., PAPADAKIS, M., & LE TRAON, Y. (2022). An Empirical Study on Data Distribution-Aware Test Selection for Deep Learning Enhancement. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3511598 Peer Reviewed verified by ORBi |
GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2022). Adversarial Robustness in Multi-Task Learning: Promises and Illusions. In Proceedings of the thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22). doi:10.1609/aaai.v36i1.19950 Peer reviewed |
GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2021). Evasion Attack STeganography: Turning Vulnerability Of Machine Learning ToAdversarial Attacks Into A Real-world Application. Proceedings of International Conference on Computer Vision 2021. doi:10.1109/ICCVW54120.2021.00010 Peer reviewed |
GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2021). Requirements And Threat Models of Adversarial Attacks and Robustness of Chest X-ray classification. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/48411. |
POLGE, J., GHATPANDE, S., Kubler, S., Robert, J., & LE TRAON, Y. (28 July 2021). BlockPerf: A Hybrid Blockchain Emulator/Simulator Framework. IEEE Access, 9, 107858 - 107872. doi:10.1109/ACCESS.2021.3101044 Peer Reviewed verified by ORBi |
HABEN, G., HABCHI, S., PAPADAKIS, M., CORDY, M., & LE TRAON, Y. (2021). A Replication Study on the Usability of Code Vocabulary in Predicting Flaky Tests. In 18th International Conference on Mining Software Repositories. doi:10.1109/MSR52588.2021.00034 Peer reviewed |
MA, W., PAPADAKIS, M., Tsakmalis, A., CORDY, M., & LE TRAON, Y. (2021). Test Selection for Deep Learning Systems. ACM Transactions on Software Engineering and Methodology, 30 (2), 13:1--13:22. doi:10.1145/3417330 Peer Reviewed verified by ORBi |
TITCHEU CHEKAM, T., PAPADAKIS, M., CORDY, M., & LE TRAON, Y. (2021). Killing Stubborn Mutants with Symbolic Execution. ACM Transactions on Software Engineering and Methodology, 30 (2), 19:1--19:23. doi:10.1145/3425497 Peer Reviewed verified by ORBi |
HU, Q., GUO, Y., CORDY, M., Xiaofei, X., MA, W., PAPADAKIS, M., & LE TRAON, Y. (2021). Towards Exploring the Limitations of Active Learning: An Empirical Study. In The 36th IEEE/ACM International Conference on Automated Software Engineering. doi:10.1109/ASE51524.2021.9678672 Peer reviewed |
Bonnaventure, W., KHANFIR, A., BARTEL, A., PAPADAKIS, M., & LE TRAON, Y. (2021). CONFUZZION: A Java Virtual Machine Fuzzer for Type Confusion Vulnerabilities. In IEEE International Conference on Software Quality, Reliability, and Security (QRS), 2021. Peer reviewed |
KELLER, P., KABORE, A. K., Plein, L., KLEIN, J., LE TRAON, Y., & BISSYANDE, T. F. D. A. (2021). What You See is What it Means! Semantic Representation Learning of Code based on Visualization. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3485135 Peer Reviewed verified by ORBi |
POLGE, J., ROBERT, J., & LE TRAON, Y. (18 December 2020). A Case Driven Study of the Use of Time Series Classification for Flexibility in Industry 4.0. Sensors, 20 (24). doi:10.3390/s20247273 Peer Reviewed verified by ORBi |
MOULINE, L., CORDY, M., & LE TRAON, Y. (2020). Load approximation for uncertain topologies in the low-voltage grid. In INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS, 11-13 November 2020 (pp. 1-6). doi:10.1109/SmartGridComm47815.2020.9302940 Peer reviewed |
POLGE, J., ROBERT, J., & LE TRAON, Y. (2020). Permissioned Blockchain Frameworks in the Industry: A Comparison. ICT Express. doi:10.1016/j.icte.2020.09.002 Peer Reviewed verified by ORBi |
GHAMIZI, S., RWEMALIKA, R., CORDY, M., VEIBER, L., BISSYANDE, T. F. D. A., PAPADAKIS, M., KLEIN, J., & LE TRAON, Y. (2020). Data-driven simulation and optimization for covid-19 exit strategies. In S. GHAMIZI, R. RWEMALIKA, M. CORDY, L. VEIBER, T. F. D. A. BISSYANDE, M. PAPADAKIS, J. KLEIN, ... Y. LE TRAON, Data-driven simulation and optimization for covid-19 exit strategies (pp. 3434-3442). New York, NY, United States: Association for Computing Machinery. doi:10.1145/3394486.3412863 Peer reviewed |
LIU, K., Wang, S., KOYUNCU, A., KIM, K., BISSYANDE, T. F. D. A., Kim, D., Wu, P., KLEIN, J., Mao, X., & LE TRAON, Y. (2020). On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs. In 42nd ACM/IEEE International Conference on Software Engineering (ICSE). doi:10.1145/3377811.3380338 Peer reviewed |
KOLBE, N., Vandenbussche, P.-Y., KUBLER, S., & LE TRAON, Y. (2020). LOVBench: Ontology Ranking Benchmark. In Proceedings of The Web Conference 2020 (WWW '20). doi:10.1145/3366423.3380245 Peer reviewed |
KOYUNCU, A., LIU, K., BISSYANDE, T. F. D. A., KIM, D., KLEIN, J., Monperrus, M., & LE TRAON, Y. (2020). FixMiner: Mining relevant fix patterns for automated program repair. Empirical Software Engineering. doi:10.1007/s10664-019-09780-z Peer Reviewed verified by ORBi |
ANTONIADIS, N., CORDY, M., Sifaleras, A., & LE TRAON, Y. (2020). Preventing Overloading Incidents on Smart Grids: A Multiobjective Combinatorial Optimization Approach. In Communications in Computer and Information Science (pp. 269-281). Springer, Cham. doi:10.1007/978-3-030-41913-4_22 Peer reviewed |
GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2020). Adversarial Embedding: A robust and elusive Steganography and Watermarking technique [Paper presentation]. IEEE Symposium on Security and Privacy. |
GHAMIZI, S., RWEMALIKA, R., CORDY, M., LE TRAON, Y., & PAPADAKIS, M. (2020). Pandemic Simulation and Forecasting of exit strategies:Convergence of Machine Learning and EpidemiologicalModels. University of Luxembourg. https://orbilu.uni.lu/handle/10993/43166 |
TITCHEU CHEKAM, T., PAPADAKIS, M., & LE TRAON, Y. (2020). Muteria: An Extensible and Flexible Multi-Criteria Software Testing Framework. In ACM/IEEE International Conference on Automation of Software Test (AST) 2020. doi:10.1145/3387903.3389316 Peer reviewed |
GHAMIZI, S., CORDY, M., GUBRI, M., PAPADAKIS, M., Boystov, A., LE TRAON, Y., & Goujon, A. (2020). Search-based adversarial testing and improvement of constrained credit scoring systems. In ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '20), November 8-13, 2020. Peer reviewed |
GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2020). FeatureNET: Diversity-driven Generation of Deep Learning Models. In International Conference on Software Engineering (ICSE). doi:10.1145/3377812.3382153 Peer reviewed |
TITCHEU CHEKAM, T., PAPADAKIS, M., BISSYANDE, T. F. D. A., LE TRAON, Y., & Sen, K. (2019). Selecting fault revealing mutants. Empirical Software Engineering, 1-54. doi:10.1007/s10664-019-09778-7 Peer Reviewed verified by ORBi |
RWEMALIKA, R., Kintis, M., PAPADAKIS, M., LE TRAON, Y., & Lorrach, P. (2019). An industrial study on the differences between pre-release and post-release bugs. In Proceedings of 35th IEEE International Conference on Software Maintenance and Evolution (pp. 11). IEEE. doi:10.1109/ICSME.2019.00019 Peer reviewed |
KOYUNCU, A., LIU, K., BISSYANDE, T. F. D. A., Kim, D., Monperrus, M., KLEIN, J., & LE TRAON, Y. (2019). iFixR: bug report driven program repair. In ESEC/FSE 2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. doi:10.1145/3338906.3338935 Peer reviewed |
Li, L., RIOM, T., BISSYANDE, T. F. D. A., Wang, H., KLEIN, J., & LE TRAON, Y. (August 2019). Revisiting the impact of common libraries for android-related investigations. Journal of Systems and Software, 154, 157-175. doi:10.1016/j.jss.2019.04.065 Peer Reviewed verified by ORBi |
LIU, K., Kim, D., BISSYANDE, T. F. D. A., Kim, T., KIM, K., KOYUNCU, A., Kim, S., & LE TRAON, Y. (2019). Learning to Spot and Refactor Inconsistent Method Names. In 41st ACM/IEEE International Conference on Software Engineering (ICSE). Montreal, Canada: IEEE. Peer reviewed |
LIU, K., KOYUNCU, A., BISSYANDE, T. F. D. A., Kim, D., KLEIN, J., & LE TRAON, Y. (2019). You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems. In The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019). Xi'an, China: IEEE. doi:10.1109/ICST.2019.00020 Peer reviewed |
LI, D., LI, L., KIM, D., BISSYANDE, T. F. D. A., Lo, D., & LE TRAON, Y. (2019). Watch out for This Commit! A Study of Influential Software Changes. Journal of Software: Evolution and Process. doi:10.1002/smr.2181 Peer Reviewed verified by ORBi |
POLGE, J., ROBERT, J., & LE TRAON, Y. (2019). Assessing the impact of attacks on OPC-UA applications in the Industry 4.0 era. In 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, 11-14 January 2019. Peer reviewed |
TITCHEU CHEKAM, T., PAPADAKIS, M., & LE TRAON, Y. (2019). Mart: A Mutant Generation Tool for LLVM. In T. TITCHEU CHEKAM, M. PAPADAKIS, ... Y. LE TRAON, Mart: A Mutant Generation Tool for LLVM. doi:10.1145/3338906.3341180 Peer reviewed |
KOLBE, N., KUBLER, S., ROBERT, J., LE TRAON, Y., & Zaslavsky, A. (2019). Linked Vocabulary Recommendation Tools for Internet of Things: A Survey. ACM Computing Surveys. doi:10.1145/3284316 Peer Reviewed verified by ORBi |
Padhye, R., Lemieux, C., Sen, K., PAPADAKIS, M., & LE TRAON, Y. (2019). Semantic Fuzzing with Zest. In ACM SIGSOFT International Symposium on Software Testing and Analysis. doi:10.1145/3293882.3330576 Peer reviewed |
Jimenez, M., RWEMALIKA, R., PAPADAKIS, M., Sarro, F., LE TRAON, Y., & Harman, M. (2019). An Empirical Study on Vulnerability Prediction of Open-Source Software Releases. In Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE). Peer reviewed |
KOLBE, N., KUBLER, S., & LE TRAON, Y. (2019). Popularity-driven Ontology Ranking using Qualitative Features. In The Semantic Web - ISWC 2019. doi:10.1007/978-3-030-30793-6_19 Peer reviewed |
BARTEL, A., KLEIN, J., & LE TRAON, Y. (2019). Désérialisation Java : Une brève introduction au ROP de haut niveau. Multi-System & Internet Security Cookbook, 101. |
BARTEL, A., KLEIN, J., & LE TRAON, Y. (2019). MUSTI: Dynamic Prevention of Invalid Object Initialization Attacks. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2019.2894356 Peer Reviewed verified by ORBi |
Jimenez, M., RWEMALIKA, R., PAPADAKIS, M., Sarro, F., LE TRAON, Y., & Harman, M. (2019). The Importance of Accounting for Real-World Labelling When Predicting Software Vulnerabilities. In Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE). doi:10.1145/3338906.3338941 Peer reviewed |
CORDY, M., Muller, S., PAPADAKIS, M., & LE TRAON, Y. (2019). Search-based Test and Improvement of Machine-Learning-Based Anomaly Detection Systems. In ACM SIGSOFT International Symposium on Software Testing and Analysis. doi:10.1145/3293882.3330580 Peer reviewed |
GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2019). Automated Search for Configurations of Deep Neural Network Architectures. In Automated Search for Configurations of Convolutional Neural Network Architectures. doi:10.1145/3336294.3336306 Peer reviewed |
RWEMALIKA, R., KINTIS, M., PAPADAKIS, M., LE TRAON, Y., & Lorrach, P. (2019). On the Evolution of Keyword-Driven Test Suites. In 12th IEEE International Conference on Software Testing, Verification and Validation. doi:10.1109/ICST.2019.00040 Peer reviewed |
Leong, C., Abhayendra, S., PAPADAKIS, M., LE TRAON, Y., & Micco, J. (2019). Assessing Transition-based Test Selection Algorithms at Google. In International Conference on Software Engineering (ICSE). doi:10.1109/ICSE-SEIP.2019.00019 Peer reviewed |
PAPADAKIS, M., KINTIS, M., ZHANG, J., Jia, Y., LE TRAON, Y., & Harman, M. (2019). Mutation Testing Advances: An Analysis and Survey. In Advances in Computers. Elsevier. doi:10.1016/bs.adcom.2018.03.015 Peer reviewed |
Schmitt, X., Kubler, S., ROBERT, J., PAPADAKIS, M., & LE TRAON, Y. (2019). A Replicable Comparison Study of NER Software: StanfordNLP, NLTK, OpenNLP, SpaCy, Gate. In International Conference on Social Networks Analysis, Management and Security. doi:10.1109/SNAMS.2019.8931850 Peer reviewed |
BENEDICK, P.-L., ROBERT, J., & LE TRAON, Y. (2019). TRIDENT: A Three-Steps Strategy to Digitise an Industrial System for Stepping into Industry 4.0. Proceedings of 45th Annual Conference of the IEEE Industrial Electronics Society. Peer reviewed |
Padhye, R., Lemieux, C., Sen, K., PAPADAKIS, M., & LE TRAON, Y. (2019). Validity fuzzing and parametric generators for effective random testing. 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), 266–267. doi:10.1109/ICSE-COMPANION.2019.00107 Peer reviewed |
RWEMALIKA, R., KINTIS, M., PAPADAKIS, M., & LE TRAON, Y. (11 December 2018). Can we automate away the main challenges of end-to-end testing? [Paper presentation]. The 17th Belgium-Netherlands Software Evolution Workshop, Delft, Netherlands. |
JIMENEZ, M., TITCHEU CHEKAM, T., CORDY, M., PAPADAKIS, M., KINTIS, M., LE TRAON, Y., & Harman, M. (2018). Are mutants really natural? A study on how “naturalness” helps mutant selection. Proceedings of 12th International Symposium on
Empirical Software Engineering and Measurement (ESEM'18). doi:10.1145/3239235.3240500 Peer reviewed |
Kubler, S., Derigent, W., Voisin, A., ROBERT, J., LE TRAON, Y., & Herrera Viedma, E. (2018). Measuring inconsistency and deriving priorities from fuzzy pairwise comparison matrices using the knowledge-based consistency index. Knowledge-Based Systems. doi:10.1016/j.knosys.2018.09.015 Peer Reviewed verified by ORBi |
JIMENEZ, M., CORDY, M., LE TRAON, Y., & PAPADAKIS, M. (2018). TUNA: TUning Naturalness-based Analysis. In 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018. Peer reviewed |
JIMENEZ, M., CORDY, M., LE TRAON, Y., & PAPADAKIS, M. (September 2018). On the impact of tokenizer and parameters on N-gram based Code Analysis [Paper presentation]. 34th IEEE International Conference on Software Maintenance and Evolution (ICSME'18), Madrid, Spain. |
LIU, K., KIM, D., KOYUNCU, A., Li, L., BISSYANDE, T. F. D. A., & LE TRAON, Y. (2018). A Closer Look at Real-World Patches. In 34th IEEE International Conference on Software Maintenance and Evolution (ICSME). doi:10.1109/ICSME.2018.00037 Peer reviewed |
BENEDICK, P.-L., ROBERT, J., LE TRAON, Y., & Kubler, S. (2018). O-MI/O-DF vs. MQTT: a performance analysis. In O-MI/O-DF vs. MQTT: a performance analysis. Peer reviewed |
BARTEL, A., KLEIN, J., & LE TRAON, Y. (2018). MUSTI: Dynamic Prevention of Invalid Object Initialization Attacks. (TR-SNT-2018-3). Université du Luxembourg. https://orbilu.uni.lu/handle/10993/36085 |
KIM, K., KIM, D., BISSYANDE, T. F. D. A., Choi, E., Li, L., KLEIN, J., & LE TRAON, Y. (2018). FaCoY - A Code-to-Code Search Engine. In International Conference on Software Engineering (ICSE 2018). Peer reviewed |
Martinez, J., Sottet, J.-S., Garcia-Frey, A., BISSYANDE, T. F. D. A., Ziadi, T., KLEIN, J., Temple, P., Mathieu, A., & LE TRAON, Y. (2018). Towards Estimating and Predicting User Perception on Software Product Variants. In 17th International Conference on Software Reuse (ICSR) (pp. 23-40). Springer, LNCS. Peer reviewed |
LI, D., Lin, J., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2018). Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification. In 21st International Conference on Extending Database Technology. Peer reviewed |
BARTOLINI, C., El Kateb, D., LE TRAON, Y., & Hagen, D. (February 2018). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? Electron Markets, 28 (1), 53-75. doi:10.1007/s12525-018-0284-7 Peer reviewed |
LIU, K., Kim, D., BISSYANDE, T. F. D. A., Yoo, S., & LE TRAON, Y. (2018). Mining Fix Patterns for FindBugs Violations. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2018.2884955 Peer Reviewed verified by ORBi |
TITCHEU CHEKAM, T., PAPADAKIS, M., BISSYANDE, T. F. D. A., & LE TRAON, Y. (2018). Predicting the Fault Revelation Utility of Mutants. In 40th International Conference on Software Engineering, Gothenburg, Sweden, May 27 - 3 June 2018. Peer reviewed |
Martinez, J., Ziadi, T., PAPADAKIS, M., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2018). Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants. Information and Software Technology. doi:10.1016/j.infsof.2018.07.005 Peer Reviewed verified by ORBi |
PAPADAKIS, M., TITCHEU CHEKAM, T., & LE TRAON, Y. (2018). Mutant Quality Indicators. In 13th International Workshop on Mutation Analysis (MUTATION'18). Peer reviewed |
Kubler, S., ROBERT, J., Neumaier, S., Umbrich, J., & LE TRAON, Y. (2018). Comparison of metadata quality in open data portals using the Analytic Hierarchy Process. Government Information Quarterly. doi:10.1016/j.giq.2017.11.003 Peer reviewed |
KINTIS, M., PAPADAKIS, M., Papadopoulos, A., Valvis, E., Malevris, N., & LE TRAON, Y. (2018). How effective are mutation testing tools? An empirical analysis of Java mutation testing tools with manual analysis and real faults. Empirical Software Engineering. doi:10.1007/s10664-017-9582-5 Peer Reviewed verified by ORBi |
Sirres, R., BISSYANDE, T. F. D. A., Kim, D., Lo, D., KLEIN, J., & LE TRAON, Y. (January 2018). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search. Empirical Software Engineering, 90, 27-39. doi:10.1007/s10664-017-9544-y Peer Reviewed verified by ORBi |
BARTEL, A., KLEIN, J., & LE TRAON, Y. (2018). Fini le Bac à Sable. Avec le CVE-2017-3272, devenez un grand! Multi-System & Internet Security Cookbook, 97. |
BARTEL, A., KLEIN, J., & LE TRAON, Y. (2018). Désérialisation Java : Une brève introduction. Multi-System & Internet Security Cookbook, 100. |
JIMENEZ, M., LE TRAON, Y., & PAPADAKIS, M. (2018). Enabling the Continous Analysis of Security Vulnerabilities with VulData7. In IEEE International Working Conference on Source Code Analysis and Manipulation. doi:10.1109/SCAM.2018.00014 Peer reviewed |
MULLER, S., Lancrenon, J., Harpes, C., LE TRAON, Y., Gombault, S., & Bonnin, J.-M. (2018). A training-resistant anomaly detection system. Computers and Security, 76, 1-11. doi:10.1016/j.cose.2018.02.015 Peer Reviewed verified by ORBi |
KOLBE, N., ROBERT, J., Kubler, S., & LE TRAON, Y. (2017). PROFICIENT: Productivity Tool for Semantic Interoperability in an Open IoT Ecosystem. In Proceedings of the 14th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. doi:10.1145/3144457.3144479 Peer reviewed |
LI, L., LI, D., BISSYANDE, T. F. D. A., KLEIN, J., Cai, H., Lo, D., & LE TRAON, Y. (2017). On Locating Malicious Code in Piggybacked Android Apps. Journal of Computer Science and Technology. doi:10.1007/s11390-017-1786-z Peer reviewed |
LI, D., BISSYANDE, T. F. D. A., KLEIN, J., LE TRAON, Y., Schummer, P., Muller, B., & Solvi, A.-M. (2017). Towards a Plug-and-Play and Holistic Data Mining Framework for Understanding and Facilitating Operations in Smart Buildings. (TR-SNT-2017-5). SnT. https://orbilu.uni.lu/handle/10993/32961 |
Benelallam, A., HARTMANN, T., MOULINE, L., FOUQUET, F., Bourcier, J., Barais, O., & LE TRAON, Y. (2017). Raising Time Awareness in Model-Driven Engineering. In 2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (pp. 181-188). Springer. doi:10.1109/MODELS.2017.11 Peer reviewed |
KUBLER, S., Derigent, W., Voisin, A., ROBERT, J., & LE TRAON, Y. (2017). Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices. In Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices. Peer reviewed |
KOLBE, N., Zaslavsky, A., KUBLER, S., ROBERT, J., & LE TRAON, Y. (2017). Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components. In Modeling and Using Context. Peer reviewed |
KOLBE, N., KUBLER, S., ROBERT, J., LE TRAON, Y., & Zaslavsky, A. (2017). Towards Semantic Interoperability in an Open IoT Ecosystem for Connected Vehicle Services. In 2017 IEEE Global Internet of Things Summit (GIoTS) Proceedings. Peer reviewed |
KOYUNCU, A., BISSYANDE, T. F. D. A., KIM, D., KLEIN, J., Monperrus, M., & LE TRAON, Y. (July 2017). Impact of Tool Support in Patch Construction [Paper presentation]. 2017 International Symposium on Software Testing & Analysis (ISSTA). doi:10.1145/3092703.3092713 |
HARTMANN, T., FOUQUET, F., JIMENEZ, M., Rouvoy, R., & LE TRAON, Y. (2017). Analyzing Complex Data in Motion at Scale with Temporal Graphs. In Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering. Peer reviewed |
HARTMANN, T., Moawad, A., FOUQUET, F., & LE TRAON, Y. (2017). The Next Evolution of MDE: A Seamless Integration of Machine Learning into Domain Modeling. Software and Systems Modeling. doi:10.1007/s10270-017-0600-2 Peer Reviewed verified by ORBi |
TITCHEU CHEKAM, T., PAPADAKIS, M., LE TRAON, Y., & Harman, M. (2017). An Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption. In International Conference on Software Engineering (ICSE 2017). doi:10.1109/ICSE.2017.61 Peer reviewed |
HURIER, M., Suarez-Tangil, G., Dash, S. K., BISSYANDE, T. F. D. A., LE TRAON, Y., KLEIN, J., & Cavallaro, L. (2017). Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware. In MSR 2017. Peer reviewed |
LI, L., LI, D., BISSYANDE, T. F. D. A., KLEIN, J., LE TRAON, Y., Lo, D., & Cavallaro, L. (May 2017). Understanding Android App Piggybacking [Poster presentation]. The 39th International Conference on Software Engineering. |
LI, L., BISSYANDE, T. F. D. A., BARTEL, A., KLEIN, J., & LE TRAON, Y. (May 2017). The Multi-Generation Repackaging Hypothesis [Poster presentation]. The 39th International Conference on Software Engineering. |
LI, L., LI, D., BISSYANDE, T. F. D. A., KLEIN, J., Cai, H., Lo, D., & LE TRAON, Y. (2017). Automatically Locating Malicious Packages in Piggybacked Android Apps. Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017). Peer reviewed |
LI, D., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2017). Sensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements. In The 32nd ACM Symposium on Applied Computing (SAC 2017). doi:10.1145/3019612.3019699 Peer reviewed |
MOULINE, L., HARTMANN, T., FOUQUET, F., LE TRAON, Y., Bourcier, J., & Barais, O. (2017). Weaving Rules into Models@run.time for Embedded Smart Systems. In L. MOULINE, T. HARTMANN, F. FOUQUET, Y. LE TRAON, J. Bourcier, ... O. Barais, Programming '17 Companion to the first International Conference on the Art, Science and Engineering of Programming. Brussels, Belgium: ACM. doi:10.1145/3079368.3079394 Peer reviewed |
KINTIS, M., PAPADAKIS, M., Jia, Y., Malevris, N., LE TRAON, Y., & Harman, M. (2017). Detecting Trivial Mutant Equivalences via Compiler Optimisations. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2017.2684805 Peer Reviewed verified by ORBi |
Sirres, R., BISSYANDE, T. F. D. A., KIM, D., Lo, D., KLEIN, J., & LE TRAON, Y. (2017). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search. https://orbilu.uni.lu/handle/10993/30408 |
KUBLER, S., ROBERT, J., Umbrich, J., Neumaier, S., & LE TRAON, Y. (2017). Comparison of metadata quality in open data portals using the Analytic Hierarchy Process. Government Information Quarterly. doi:10.1016/j.giq.2017.11.003 Peer reviewed |
LI, L., BISSYANDE, T. F. D. A., PAPADAKIS, M., Rasthofer, S., BARTEL, A., Octeau, D., KLEIN, J., & LE TRAON, Y. (2017). Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology. doi:10.1016/j.infsof.2017.04.001 Peer Reviewed verified by ORBi |
JIMENEZ, M., CORDY, M., KINTIS, M., TITCHEU CHEKAM, T., LE TRAON, Y., & PAPADAKIS, M. (2017). On the Naturalness of Mutants. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/35014. |
Laurent, T., PAPADAKIS, M., KINTIS, M., HENARD, C., LE TRAON, Y., & Ventresque, A. (2017). Assessing and Improving the Mutation Testing Practice of PIT. In 10th IEEE International Conference on Software Testing, Verification and Validation. doi:10.1109/ICST.2017.47 Peer reviewed |
MULLER, S., Harpes, C., LE TRAON, Y., Gombault, S., & Bonnin, J.-M. (2017). Efficiently computing the likelihoods of cyclically interdependent risk scenarios. Computers and Security, 64, 59-68. doi:10.1016/j.cose.2016.09.008 Peer Reviewed verified by ORBi |
LI, L., LI, D., BISSYANDE, T. F. D. A., KLEIN, J., LE TRAON, Y., Lo, D., & Cavallaro, L. (2017). Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2017.2656460 Peer Reviewed verified by ORBi |
JIMENEZ, M., PAPADAKIS, M., & LE TRAON, Y. (2016). An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel. In 2016 Asia-Pacific Software Engineering Conference (APSEC). Peer reviewed |
JIMENEZ, M., PAPADAKIS, M., & LE TRAON, Y. (2016). Vulnerability Prediction Models: A case study on the Linux Kernel. In 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, US, October 2-3, 2016. doi:10.1109/SCAM.2016.15 Peer reviewed |
LI, L., BISSYANDE, T. F. D. A., LE TRAON, Y., & KLEIN, J. (2016). Accessing Inaccessible Android APIs: An Empirical Study. In The 32nd International Conference on Software Maintenance and Evolution (ICSME) (pp. 12). Peer reviewed |
LI, D., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). DSCo-NG: A Practical Language Modeling Approach for Time Series Classification. In The 15th International Symposium on Intelligent Data Analysis. Peer reviewed |
KUBLER, S., ROBERT, J., William, D., Alexandre, V., & LE TRAON, Y. (October 2016). A state-of the-art survey & testbed of Fuzzy AHP (FAHP) applications. Expert Systems with Applications, 65, 398--422. doi:10.1016/j.eswa.2016.08.064 Peer reviewed |
MANUKYAN, A., OLIVARES MENDEZ, M. A., BISSYANDE, T. F. D. A., VOOS, H., & LE TRAON, Y. (2016). UAV degradation identification for pilot notification using machine learning techniques. Proceedings of 21st IEEE International Conference on Emerging Technologies and Factory Automation ETFA 2016. doi:10.1109/ETFA.2016.7733537 Peer reviewed |
LI, D., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (September 2016). Time Series Classification with Discrete Wavelet Transformed Data. International Journal of Software Engineering and Knowledge Engineering, 26 (9&10), 1361–1377. doi:10.1142/S0218194016400088 Peer Reviewed verified by ORBi |
BARTOLINI, C., EL KATEB, D., LE TRAON, Y., & Hagen, D. (2016). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? In J. Altmann, G. C. Silaghi, ... O. F. Rana (Eds.), Economics of Grids, Clouds, Systems, and Services (pp. 281-295). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-319-43177-2 Peer reviewed |
SANCHEZ GUINEA, A., Nain, G., & LE TRAON, Y. (August 2016). A systematic review on the engineering of software for ubiquitous systems. Journal of Systems and Software, 118, 251-276. doi:10.1016/j.jss.2016.05.024 Peer Reviewed verified by ORBi |
LI, D., LI, L., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). DSCo: A Language Modeling Approach for Time Series Classification. In 12th International Conference on Machine Learning and Data Mining (MLDM 2016). Peer reviewed |
LI, D., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study. In The 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016). Peer reviewed |
KUBLER, S., ROBERT, J., LE TRAON, Y., Umbrich, J., & Neumaier, S. (2016). Open Data Portal Quality Comparison using AHP. In Proceedings of the 17th International Digital Government Research Conference on Digital Government Research (pp. 397-407). New York, United States: ACM. doi:10.1145/2912160.2912167 Peer reviewed |
ALLIX, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). AndroZoo: Collecting Millions of Android Apps for the Research Community. In Proceedings of the 13th International Workshop on Mining Software Repositories (pp. 468--471). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2901739.2903508 Peer reviewed |
LI, L., BISSYANDE, T. F. D. A., PAPADAKIS, M., Rasthofer, S., BARTEL, A., Octeau, D., KLEIN, J., & LE TRAON, Y. (2016). Static Analysis of Android Apps: A Systematic Literature Review. SnT. https://orbilu.uni.lu/handle/10993/26879 |
LI, L., LI, D., BISSYANDE, T. F. D. A., Lo, D., KLEIN, J., & LE TRAON, Y. (2016). Ungrafting Malicious Code from Piggybacked Android Apps. SnT. https://orbilu.uni.lu/handle/10993/26880 |
LI, L., LI, D., BARTEL, A., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Towards a Generic Framework for Automating Extensive Analysis of Android Applications. In The 31st ACM/SIGAPP Symposium on Applied Computing (SAC 2016). Peer reviewed |
HARTMANN, T., MOAWAD, A., FOUQUET, F., Reckinger, Y., KLEIN, J., & LE TRAON, Y. (2016). Near Real-Time Electric Load Approximation in Low Voltage Cables of Smart Grids with Models@run.time. In 31st Annual ACM Symposium on Applied Computing (SAC'16) (pp. 2119--2126). Peer reviewed |
LI, L., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). An Investigation into the Use of Common Libraries in Android Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 12). doi:10.1109/SANER.2016.52 Peer reviewed |
LI, L., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Parameter Values of Android APIs: A Preliminary Study on 100,000 Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 5). doi:10.1109/SANER.2016.51 Peer reviewed |
LI, D., BISSYANDE, T. F. D. A., KUBLER, S., KLEIN, J., & LE TRAON, Y. (2016). Profiling household appliance electricity usage with n-gram language modeling. In The 2016 IEEE International Conference on Industrial Technology (ICIT 2016). Peer reviewed |
CAIRE, P., MOAWAD, A., EFTHYMIOU, V., bikakis, A., & LE TRAON, Y. (2016). Privacy Challenges in Ambient Intelligence Systems. Journal of Ambient Intelligence and Smart Environments. doi:10.3233/AIS-160405 Peer Reviewed verified by ORBi |
MEIRA, J. A., Almeira, E. C. D., KIM, D., Filho, E. R. L., & LE TRAON, Y. (2016). “Overloaded!” — A Model-based Approach to Database Stress Testing. In International Conference on Database and Expert Systems Applications, Porto 5-8 September 2016. Peer reviewed |
MARTINEZ, J., Ziadi, T., PAPADAKIS, M., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Feature Location Benchmark for Software Families using Eclipse Community Releases. In Software Reuse: Bridging with Social-Awareness, ICSR 2016 Proceedings. doi:10.1007/978-3-319-35122-3_18 Peer reviewed |
LI, L., MARTINEZ, J., Ziadi, T., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Mining Families of Android Applications for Extractive SPL Adoption. In The 20th International Systems and Software Product Line Conference (SPLC 2016). Peer reviewed |
MARTINEZ, J., Ziadi, T., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). Name Suggestions during Feature Identification: The VariClouds Approach. In 20th International Systems and Software Product Line Conference (SPLC 2016) proceedings. Peer reviewed |
HURIER, M., ALLIX, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2016). On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. In Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference (pp. 142--162). Springer. doi:10.1007/978-3-319-40667-1_8 Peer reviewed |
Octeau, D., Jha, S., Dering, M., McDaniel, P., BARTEL, A., LI, L., KLEIN, J., & LE TRAON, Y. (2016). Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis. In The 43rd Symposium on Principles of Programming Languages (POPL 2016). Peer reviewed |
ROBERT, J., KUBLER, S., & LE TRAON, Y. (2016). Micro-billing framework for IoT: Research & Technological foundations. In International Conference on Future Internet of Things and Cloud, 22-24 August 2016, Vienna, Austria. doi:10.1109/FiCloud.2016.50 Peer reviewed |
ROBERT, J., KUBLER, S., LE TRAON, Y., & Främling, K. (2016). O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis. In O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis. doi:10.1109/IECON.2016.7793138 Peer reviewed |
HENARD, C., PAPADAKIS, M., Harman, M., Jia, Y., & LE TRAON, Y. (2016). Comparing White-box and Black-box Test Prioritization. In 38th International Conference on Software Engineering (ICSE'16). Peer reviewed |
PAPADAKIS, M., Henard, C., Harman, M., Jia, & LE TRAON, Y. (2016). Threats to the validity of mutation-based test assessment. In International Symposium on Software Testing and Analysis, ISSTA 2016. doi:10.1145/2931037.2931040 Peer reviewed |
MULLER, S., Harpes, C., LE TRAON, Y., Gombault, S., Bonnin, J.-M., & Hoffmann, P. (2016). Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures. In International Conference on Critical Information Infrastructures Security (pp. 163-175). Springer International Publishing. doi:10.1007/978-3-319-71368-7_14 Peer reviewed |
HARTMANN, T., MOAWAD, A., FOUQUET, F., Reckinger, Y., Mouelhi, T., KLEIN, J., & LE TRAON, Y. (2015). Suspicious Electric Consumption Detection Based on Multi-Profiling Using Live Machine Learning. In 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm). Peer reviewed |
Laurent, T., Ventresque, A., PAPADAKIS, M., HENARD, C., & LE TRAON, Y. (2015). Assessing and Improving the Mutation Testing Practice of PIT. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/24473. |
NGUYEN, P. H., Yskout, K., Heyman, T., KLEIN, J., Scandariato, R., & LE TRAON, Y. (2015). SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems. In Proceedings ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems. doi:10.1109/MODELS.2015.7338255 Peer reviewed |
BARTOLINI, C., EL KATEB, D., LE TRAON, Y., & Hagen, D. (2015). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? In Economics of Grids, Clouds, Systems, and Services. Springer. Peer reviewed |
MOAWAD, A., HARTMANN, T., FOUQUET, F., NAIN, G., KLEIN, J., & LE TRAON, Y. (2015). Beyond Discrete Modeling: A Continuous and Efficient Model for IoT. In T. Lethbridge, J. Cabot, ... A. Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 90-99). Passau, Germany: Conference Publishing Consulting. doi:10.1109/MODELS.2015.7338239 Peer reviewed |
HARTMANN, T., MOAWAD, A., FOUQUET, F., NAIN, G., KLEIN, J., & LE TRAON, Y. (2015). Stream my Models: Reactive Peer-to-Peer Distributed Models@run.time. In T. Lethbridge, J. Cabot, ... A. Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 80-89). Passau, Germany: Conference Publishing Consulting. Peer reviewed |
NGUYEN, P. H., Kramer, M., KLEIN, J., & LE TRAON, Y. (September 2015). An Extensive Systematic Review on the Model-Driven Development of Secure Systems. Information and Software Technology, 68 (December 2015), 62-81. doi:10.1016/j.infsof.2015.08.006 Peer reviewed |
MOUELHI, T., EL KATEB, D., & LE TRAON, Y. (2015). Inroads in Testing Access Control. In Advances in Computers. ELSEVIER. Peer reviewed |
LI, L., BARTEL, A., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2015). ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. In International Conference on ICT Systems Security and Privacy Protection (SEC 2015). Peer reviewed |
HENARD, C., PAPADAKIS, M., & LE TRAON, Y. (2015). Flattening or not of the combinatorial interaction testing models. In Eighth IEEE International Conference on Software Testing, Verification and Validation, ICST 2015 Workshops (pp. 1-4). IEEE. Peer reviewed |
MOAWAD, A., HARTMANN, T., FOUQUET, F., KLEIN, J., & LE TRAON, Y. (2015). Adaptive Blurring of Sensor Data to balance Privacy and Utility for Ubiquitous Services. In The 30th Annual ACM Symposium on Applied Computing (pp. 2271-2278). ACM. doi:10.1145/2695664.2695855 Peer reviewed |
LI, L., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (March 2015). Using An Instrumentation based Approach to Detect Inter-Component Leaks in Android Apps [Paper presentation]. Grande Region Security and Reliability Day 2015. |
EL KATEB, D., Zannone, N., MOAWAD, A., CAIRE, P., NAIN, G., Mouelhi, T., & LE TRAON, Y. (2015). Conviviality-driven access control policy. Requirements Engineering, 20 (4), 363-382. doi:10.1007/s00766-014-0204-0 Peer reviewed |
MARTINEZ, J., Ziadi, T., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2015). Automating the Extraction of Model-based Software Product Lines from Model Variants. In 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015). doi:10.1109/ASE.2015.44 Peer reviewed |
Amrani, M., Combemale, B., Lúcio, L., Selim, G. M. K., Dingel, J., LE TRAON, Y., Vangheluwe, H., & Cordy, J. R. (2015). Formal verification techniques for model transformations: A tridimensional classification. Journal of Object Technology, 14 (3). doi:10.5381/jot.2015.14.1.a3 Peer Reviewed verified by ORBi |
Zhang, X., Zhang, D., LE TRAON, Y., Wang, Q., & Zhang, L. (2015). Roundtable: Research Opportunities and Challenges for Emerging Software Systems. Journal of Computer Science and Technology, 30 (5), 935-941. doi:10.1007/s11390-015-1572-8 Peer reviewed |
HENARD, C., PAPADAKIS, M., Harman, M., & LE TRAON, Y. (2015). Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines. In 37th International Conference on Software Engineering (ICSE 2015). Peer reviewed |
Bardin, S., Delahaye, M., Kosmatov, N., David, R., PAPADAKIS, M., LE TRAON, Y., & Marion, J.-Y. (2015). Sound and Quasi-Complete Detection of Infeasible Test Requirements. In 8th IEEE International Conference on Software Testing, Verification and Validation (ICST'15). doi:10.1109/ICST.2015.7102607 Peer reviewed |
PAPADAKIS, M., Yue, J., Harman, M., & LE TRAON, Y. (2015). Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique. In 37th International Conference on Software Engineering (ICSE 2015). Peer reviewed |
EL KATEB, D., ELRAKAIBY, Y., Mouelhi, T., RUBAB, I., & LE TRAON, Y. (2015). Towards a full support of obligations in XACML. Lecture Notes in Computer Science, 8924, 213-221. doi:10.1007/978-3-319-17127-2_14 Peer reviewed |
LI, L., BARTEL, A., BISSYANDE, T. F. D. A., KLEIN, J., LE TRAON, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015). Peer reviewed |
ALLIX, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2015). Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. In Engineering Secure Software and Systems - 7th International Symposium ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings (pp. 51-67). Springer International Publishing. doi:10.1007/978-3-319-15618-7_5 Peer reviewed |
Bertolino, A., Daoudagh, S., EL KATEB, D., HENARD, C., LE TRAON, Y., Lonetti, F., Marchetti, E., Mouelhi, T., & PAPADAKIS, M. (2015). Similarity testing for access control. Information and Software Technology, 58, 355-372. doi:10.1016/j.infsof.2014.07.003 Peer Reviewed verified by ORBi |
Xu, D., Kent, M., Thomas, L., Mouelhi, T., & LE TRAON, Y. (2015). Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets. IEEE Transactions on Computers, 64 (9), 2490-2505. doi:10.1109/TC.2014.2375189 Peer reviewed |
PAPADAKIS, M., & LE TRAON, Y. (2015). Metallaxis-FL: mutation-based fault localization. Software Testing, Verification and Reliability, 25, 605-628. doi:10.1002/stvr.1509 Peer Reviewed verified by ORBi |
LI, L., Bissyandé, T. F., KLEIN, J., & LE TRAON, Y. (2015). An Investigation into the Use of Common Libraries in Android Apps. In 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), Osaka, Japan, 2016. IEE. doi:10.1109/SANER.2016.52 Peer reviewed |
ALLIX, K., BISSYANDE, T. F. D. A., JEROME, Q., KLEIN, J., STATE, R., & LE TRAON, Y. (2014). Empirical assessment of machine learning-based malware detectors for Android: Measuring the Gap between In-the-Lab and In-the-Wild Validation Scenarios. Empirical Software Engineering, 1-29. doi:10.1007/s10664-014-9352-6 Peer Reviewed verified by ORBi |
PAPADAKIS, M., Delamaro, E. M., & LE TRAON, Y. (December 2014). Mitigating the Effects of Equivalent Mutants with Mutant Classification Strategies. Science of Computer Programming, 95, 298-319. doi:10.1016/j.scico.2014.05.012 Peer Reviewed verified by ORBi |
Ko, D., Ma, K., Park, S., Kim, S., KIM, D., & LE TRAON, Y. (01 December 2014). API Document Quality for Resolving Deprecated APIs [Paper presentation]. The 21st Asia-Pacific Software Engineering Conference. |
HARTMANN, T., FOUQUET, F., KLEIN, J., LE TRAON, Y., Pelov, A., Toutain, L., & Ropitault, T. (2014). Generating Realistic Smart Grid Communication Topologies Based on Real-Data. In 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm). Peer reviewed |
EL KATEB, D., FOUQUET, F., bourcier, J., & LE TRAON, Y. (October 2014). Optimizing Multi-Objective Evolutionary Algorithms to Enable Quality-Aware Software Provisioning [Paper presentation]. The 14th International Conference on Quality Software. |
LI, L., BARTEL, A., KLEIN, J., & LE TRAON, Y. (2014). Automatically Exploiting Potential Component Leaks in Android Applications. In The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), IEEE, Sept. 2014, Beijing, China. Peer reviewed |
NGUYEN, P. H., KLEIN, J., & LE TRAON, Y. (2014). Model-Driven Security with A System of Aspect-Oriented Security Design Patterns. In 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling. doi:10.1145/2631675.2631683 Peer reviewed |
HARTMANN, T., FOUQUET, F., NAIN, G., Brice, M., KLEIN, J., & LE TRAON, Y. (02 July 2014). Model-based time-distorted Contexts for efficient temporal Reasoning [Poster presentation]. 26th International Conference on Software Engineering and Knowledge Engineering, Vancouver, Canada. |
HARTMANN, T., FOUQUET, F., NAIN, G., Morin, B., KLEIN, J., & LE TRAON, Y. (2014). Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach. In Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering (1st, pp. 586-591). Vancouver, Canada: Knowledge Systems Institute Graduate School, USA. Peer reviewed |
ALLIX, K., JEROME, Q., BISSYANDE, T. F. D. A., KLEIN, J., STATE, R., & LE TRAON, Y. (2014). A Forensic Analysis of Android Malware -- How is Malware Written and How It Could Be Detected? In Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference (pp. 384--393). Washington, DC, USA, Unknown/unspecified: IEEE Computer Society. doi:10.1109/COMPSAC.2014.61 Peer reviewed |
LI, L., BARTEL, A., KLEIN, J., & LE TRAON, Y. (2014). Automatically Exploiting Potential Component Leaks in Android Applications. (TR-SnT-2014-13). Luxembourg, Luxembourg: SnT. https://orbilu.uni.lu/handle/10993/16914 |
Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., KLEIN, J., LE TRAON, Y., Octeau, D., & McDaniel, P. (June 2014). FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps [Paper presentation]. ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI 2014). |
BARTEL, A., KLEIN, J., Monperrus, M., & LE TRAON, Y. (June 2014). Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android. IEEE Transactions on Software Engineering, 40 (6), 617-632. doi:10.1109/TSE.2014.2322867 Peer Reviewed verified by ORBi |
ALLIX, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (2014). Machine Learning-Based Malware Detection for Android Applications: History Matters! Luxembourg, Luxembourg: University of Luxembourg, SnT. https://orbilu.uni.lu/handle/10993/17251 |
LI, L., BARTEL, A., KLEIN, J., LE TRAON, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2014). I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis. (TR-SNT-2014-9, Technical Report). Luxembourg, Luxembourg: SnT Centre - University of Luxembourg. https://orbilu.uni.lu/handle/10993/16886 |
HARTMANN, T., FOUQUET, F., KLEIN, J., NAIN, G., & LE TRAON, Y. (2014). Reactive Security for Smart Grids Using Models@run.time-Based Simulation and Reasoning. In Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14). Peer reviewed |
LI, L., BARTEL, A., KLEIN, J., & LE TRAON, Y. (12 March 2014). Using A Path Matching Algorithm to Detect Inter-Component Leaks in Android Apps [Paper presentation]. Grande Region Security and Reliability Day 2014. |
EL KATEB, D., FOUQUET, F., NAIN, G., MEIRA, J. A., Ackerman, M., & LE TRAON, Y. (March 2014). Generic Cloud Platform Multi-objective Optimization Leveraging Models@run.time [Paper presentation]. 29th Symposium On Applied Computing. |
ALLIX, K., BISSYANDE, T. F. D. A., JEROME, Q., KLEIN, J., STATE, R., & LE TRAON, Y. (2014). Large-scale Machine Learning-based Malware Detection: Confronting the "10-fold Cross Validation" Scheme with Reality. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (pp. 163--166). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2557547.2557587 Peer reviewed |
LI, L., BARTEL, A., KLEIN, J., & LE TRAON, Y. (26 February 2014). Detecting privacy leaks in Android Apps [Paper presentation]. International Symposium on Engineering Secure Software and Systems - Doctoral Symposium. |
NGUYEN, P. H., KLEIN, J., & LE TRAON, Y. (2014). Modeling, composing, and testing of security concerns in a Model-Driven Security approach. In W. Joosen, F. Martinelli, ... T. Heyman (Eds.), Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014). Peer reviewed |
MARTINEZ, J., Ziadi, T., Mazo, R., KLEIN, J., & LE TRAON, Y. (2014). Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines. In 2nd IEEE Working Conference on Software Visualization. doi:10.1109/VISSOFT.2014.18 Peer reviewed |
MARTINEZ, J., Ziadi, T., KLEIN, J., & LE TRAON, Y. (2014). Identifying and Visualising Commonality and Variability in Model Variants. In ECMFA 2014 European Conference on Modelling Foundations and Applications. Peer reviewed |
Rubab, I., Ali, S., BRIAND, L., & LE TRAON, Y. (2014). Model-Based Testing of Obligations. In 14th Annual International Conference on Quality Software (QSIC) (pp. 1-10). Los Alamitos, Unknown/unspecified: Ieee Computer Soc. doi:10.1109/QSIC.2014.47 Peer reviewed |
ABGRALL, E., LE TRAON, Y., Gombault, S., & Monperrus, M. (2014). Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: an Urgent Need for Systematic Security Regression Testing. In 7th IEEE International Conference on Software Testing, Verification and Validation (ICST)- Workshop SECTEST (pp. 34-41). New York, Unknown/unspecified: Ieee. doi:10.1109/ICSTW.2014.63 Peer reviewed |
Sunyé, G., De Almeida, E. C., LE TRAON, Y., Baudry, B., & Jézéquel, J.-M. (2014). Model-based testing of global properties on large-scale distributed systems. Information and Software Technology, 56 (7), 749-762. doi:10.1016/j.infsof.2014.02.002 Peer reviewed |
Bertolino, A., LE TRAON, Y., Lonetti, F., Marchetti, E., & Mouelhi, T. (2014). Coverage-based Test Cases Selection for XACML Policies. IEEE International Conference on Software Testing Verification and Validation Workshops, 12-21. doi:10.1109/ICSTW.2014.49 Peer reviewed |
OLIVARES MENDEZ, M. A., Bissyandé, T., Somasundar, K., KLEIN, J., VOOS, H., & LE TRAON, Y. (2014). The NOAH Project: Giving a Chance to Threatened Species in Africa with UAVs. In T. F. Bissyandé & G. van Stam (Eds.), e-Infrastructure and e-Services for Developing Countries (pp. 198-208). Springer International Publishing. doi:10.1007/978-3-319-08368-1_24 Peer reviewed |
bikakis, A., CAIRE, P., & LE TRAON, Y. (2014). Tools for Conviviality in Multi-Context Systems. IfCoLog Journal of Logics and Their Applications, 1 (1). Peer reviewed |
PAPADAKIS, M., & LE TRAON, Y. (2014). Effective Fault Localization via Mutation Analysis: A Selective Mutation Approach. In ACM Symposium On Applied Computing (SAC'14). doi:10.1145/2554850.2554978 Peer reviewed |
PAPADAKIS, M., HENARD, C., & LE TRAON, Y. (2014). Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing. In 7th International Conference on Software Testing, Verification and Validation (ICST 2014). doi:10.1109/ICST.2014.11 Peer reviewed |
Ziadi, T., HENARD, C., PAPADAKIS, M., Ziane, M., & LE TRAON, Y. (2014). Towards a Language-Independent Approach for Reverse-Engineering of Software Product Lines. In 29th Symposium on Applied Computing (SAC 2014). doi:10.1145/2554850.2554874 Peer reviewed |
HENARD, C., PAPADAKIS, M., & LE TRAON, Y. (2014). Mutation-based Generation of Software Product Line Test Configurations. In Symposium on Search-Based Software Engineering (SSBSE 2014). Springer. Peer reviewed |
HENARD, C., PAPADAKIS, M., PERROUIN, G., KLEIN, J., Heymans, P., & LE TRAON, Y. (2014). Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Configurations for Software Product Lines. IEEE Transactions on Software Engineering, 40 (7), 650-670. doi:10.1109/TSE.2014.2327020 Peer Reviewed verified by ORBi |
ELRAKAIBY, Y., AMRANI, M., & LE TRAON, Y. (2014). Security@Runtime: A flexible MDE approach to enforce fine-grained security policies. Lecture Notes in Computer Science, 8364 LNCS, 19-34. doi:10.1007/978-3-319-04897-0-2 Peer reviewed |
HENARD, C., PAPADAKIS, M., & LE TRAON, Y. (2014). MutaLog: a Tool for Mutating Logic Formulas. In Testing Tools Track, 7th International Conference on Software Testing, Verification and Validation (ICST 2014). doi:10.1109/ICSTW.2014.54 Peer reviewed |
EL KATEB, D., Zannone, N., MOAWAD, A., CAIRE, P., NAIN, G., MOUELHI, T., & LE TRAON, Y. (2014). Conviviality-Driven Access Control Policy. Requirements Engineering. Peer Reviewed verified by ORBi |
AMRANI, M., Lúcio, L., Selim, G., Combemale, B., Dingel, J., Vangheluwe, H., LE TRAON, Y., & Cordy, J. (2014). A Survey of Formal Verification Techniques for Model Transformations: A Tridimensional Classification. Journal of Technology. doi:10.5381/jot.2015.14.1.a3 Peer reviewed |
ELRAKAIBY, Y., AMRANI, M., & LE TRAON, Y. (2014). A Flexible MDE approach to Enforce Fine- grained Security Policies. In Proceedings of the International Symposium on Engineering Secure Software and Systems. Peer reviewed |
Lucio, L., ZHANG, Q., NGUYEN, P. H., AMRANI, M., KLEIN, J., Vangheluwe, H., & LE TRAON, Y. (2014). Advances in Model-Driven Security. In A. Memon (Ed.), Advances in Computers. Elsevier. doi:10.1016/B978-0-12-800162-2.00003-8 Peer reviewed |
MEIRA, J. A., Almeida, E., & LE TRAON, Y. (2014). A state machine for database non-functional testing [Poster presentation]. 18th International Database Engineering & Applications Symposium. |
HARTMANN, T., FOUQUET, F., NAIN, G., Morin, B., KLEIN, J., Barais, O., & LE TRAON, Y. (2014). A Native Versioning Concept to Support Historized Models at Runtime. In J. Dingel, W. Schulte, I. Ramos, S. Abrahao, ... E. Insfran (Eds.), Model-Driven Engineering Languages and Systems - 17th International Conference, MODELS 2014, Valencia, Spain, September 28 - October 3, 2014. Proceedings (1st, pp. 252-268). Springer. doi:10.1007/978-3-319-11653-2_16 Peer reviewed |
EL KATEB, D., ELRAKAIBY, Y., MOUELHI, T., RUBAB, I., & LE TRAON, Y. (2014). Towards a Full Support of Obligations In XACML [Paper presentation]. 9th International Conference on Risks and Security of Internet and Systems. |
LUCAS FILHO, E. R., CUNHA DE ALMEIDA, E., & LE TRAON, Y. (2014). Intra-query Adaptivity for MapReduce Query Processing Systems. In IDEAS 2014 : 18th International Database Engineering Applications Symposium. doi:10.1145/2628194.2628202 Peer reviewed |
MARTINEZ, J., Ziadi, T., KLEIN, J., & LE TRAON, Y. (2014). BUT4Reuse Feature identifier: Identifying reusable features on software variants [Poster presentation]. 3ème Conférence en IngénieriE du Logiciel. |
NGUYEN, P. H., NAIN, G., KLEIN, J., MOUELHI, T., & LE TRAON, Y. (2014). Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management. Transactions on Aspect-Oriented Software Development, 11, 109-144. Peer reviewed |
NGUYEN, P. H., KLEIN, J., Kramer, M., & LE TRAON, Y. (2013). A Systematic Review of Model-Driven Security. In The 20th Asia-Pacific Software Engineering Conference Proceedings. Peer reviewed |
CAIRE, P., Bikakis, A., & LE TRAON, Y. (2013). Information Dependencies in MCS: Conviviality-Based Model and Metrics. In 16th INTERNATIONAL CONFERENCE ON PRINCIPLES AND PRACTICE OF MULTI-AGENT SYSTEMS (PRIMA 2013). Peer reviewed |
BISSYANDE, T. F. D. A., Lo, D., Jiang, L., Reveillere, L., KLEIN, J., & LE TRAON, Y. (2013). Got Issues? Who Cares About It? A Large Scale Investigation of Issue Trackers from GitHub. In Proceedings of the 24th International Symposium on Software Reliability Engineering (ISSRE 2013). doi:10.1109/ISSRE.2013.6698918 Peer reviewed |
MOAWAD, A., Bikakis, A., CAIRE, P., NAIN, G., & LE TRAON, Y. (2013). R-CoRe: A Rule-based Contextual Reasoning Platform for AmI. In Joint Proceedings of the 7th International Rule Challenge, the Special Track on Human Language Technology and the 3rd RuleML Doctoral Consortium hosted at the 8th International Symposium on Rules (RuleML2013). Peer reviewed |
MOAWAD, A., Bikakis, A., CAIRE, P., NAIN, G., & LE TRAON, Y. (2013). A Rule-based Contextual Reasoning Platform for Ambient Intelligence environments. In Theory, Practice, and Applications of Rules on the Web (pp. 158-172). springer. Peer reviewed |
Fritz, C., Arzt, S., Rasthofer, S., Bodden, E., BARTEL, A., KLEIN, J., LE TRAON, Y., Octeau, D., & McDaniel, P. (2013). Highly precise taint analysis for Android applications. https://orbilu.uni.lu/handle/10993/25162 |
NGUYEN, P. H., NAIN, G., KLEIN, J., MOUELHI, T., & LE TRAON, Y. (2013). Model-Driven Adaptive Delegation. In S. Chiba, N. Ubayashi, ... H. Masuhara (Eds.), Proceedings of the 12th annual international conference companion on Aspect-oriented software development. New York, United States: ACM. doi:10.1145/2451436.2451445 Peer reviewed |
Elrakaiby, Y., & LE TRAON, Y. (2013). A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications. In 2013 International Conference on Availability, Reliability and Security. doi:10.1109/ARES.2013.49 Peer reviewed |
Octeau, D., McDaniel, P., Jha, S., BARTEL, A., Bodden, E., KLEIN, J., & LE TRAON, Y. (2013). Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. In Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. Peer reviewed |
PAPADAKIS, M., & LE TRAON, Y. (2013). Mutation Testing Strategies using Mutant Classification. Abstract book of 28th Symposium On Applied Computing. doi:10.1145/2480362.2480592 Peer reviewed |
El Kateb, D., ElRakaiby, Y., Mouelhi, T., & LE TRAON, Y. (2013). Access Control Enforcement Testing. Abstract book of 2013 8TH INTERNATIONAL WORKSHOP ON AUTOMATION OF SOFTWARE TEST (AST), 64-70. doi:10.1109/IWAST.2013.6595793 Peer reviewed |
Munoz, F., Baudry, B., Delamare, R., & LE TRAON, Y. (2013). Usage and testability of AOP: An empirical study of AspectJ. Information and Software Technology, 55 (2), 252-266. doi:10.1016/j.infsof.2012.08.003 Peer reviewed |
HENARD, C., PAPADAKIS, M., PERROUIN, G., KLEIN, J., & LE TRAON, Y. (2013). Multi-objective test generation for software product lines. In 17th International Software Product Line Conference, SPLC 2013, Tokyo, Japan - August 26 - 30, 2013. ACM. doi:10.1145/2491627.2491635 Peer reviewed |
HENARD, C., PAPADAKIS, M., PERROUIN, G., KLEIN, J., & LE TRAON, Y. (2013). Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing. In 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, Workshops Proceedings, Luxembourg, Luxembourg, March 18-22, 2013. IEEE. doi:10.1109/ICSTW.2013.30 Peer reviewed |
HENARD, C., PAPADAKIS, M., PERROUIN, G., KLEIN, J., & LE TRAON, Y. (2013). Towards automated testing and fixing of re-engineered feature models. In Proceedings of the 2013 International Conference on Software Engineering. Piscataway, NJ, USA, Unknown/unspecified: IEEE Press. Peer reviewed |
PAPADAKIS, M., Delamaro, E. M., & LE TRAON, Y. (2013). Proteum/FL: A tool for localizing faults using mutation analysis. In International Working Conference on Source Code Analysis and Manipulation (pp. 94-99). doi:10.1109/SCAM.2013.6648189 Peer reviewed |
HENARD, C., PAPADAKIS, M., PERROUIN, G., KLEIN, J., & LE TRAON, Y. (2013). PLEDGE: a product line editor and test generation tool. In 17th International Software Product Line Conference co-located workshops, SPLC 2013 workshops, Tokyo, Japan - August 26. ACM. doi:10.1145/2499777.2499778 Peer reviewed |
MEIRA, J. A., Almeida, E. C. D., Sunyé, G., LE TRAON, Y., & Valduriez, P. (2013). Stress Testing of Transactional Database Systems. Journal of Information and Data Management. Peer reviewed |
Fior, A. G., MEIRA, J. A., Almeida, E. C. D., Coelho, R. G., Del Fabro, M. D., & LE TRAON, Y. (2013). Under Pressure Benchmark for DDBMS Availability. Journal of Information and Data Management. Peer reviewed |
BISSYANDE, T. F. D. A., Ahmat, D., Ouoba, J., van Stam, G., KLEIN, J., & LE TRAON, Y. (2013). Sustainable ICT4D in Africa: Where Do We Go From Here? In EAI International Conference on e-Infrastructure and e-Services for Developing Countries. Peer reviewed |
Hwang, J., Xie, T., EL KATEB, D., MOUELHI, T., & LE TRAON, Y. (September 2012). Selection of Regression System Tests for Security Policy Evolution [Paper presentation]. 27th IEEE/ACM International Conference Automated Software Engineering 2012. |
Bikakis, A., EFTHYMIOU, V., CAIRE, P., & LE TRAON, Y. (2012). Introducing Conviviality as a property of Multi-Context Systems. In The 4th International Workshop on Acquisition, Representation and Reasoning with Contextualized Knowledge ARCOE-12. Peer reviewed |
MOAWAD, A., EFTHYMIOU, V., CAIRE, P., NAIN, G., & LE TRAON, Y. (August 2012). Introducing Conviviality as a New Paradigm for Interactions among IT Objects. Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments, 907, 3-8. Peer reviewed |
PERROUIN, G., Morin, B., Chauvel, F., Fleurey, F., KLEIN, J., LE TRAON, Y., Barais, O., & Jézéquel, J.-M. (2012). Towards Flexible Evolution of Dynamically Adaptive Systems. In New Ideas & Emerging Results Track of the International Conference of Software Engineering (NIER@ICSE) (pp. 1353-1356). IEEE Press. Peer reviewed |
EL KATEB, D., Elrakaiby, Y., MOUELHI, T., & LE TRAON, Y. (2012). Access Control Enforcement Testing. In 8th International Workshop on Automation of Software Test (AST), 2013 (pp. 64-70). Peer reviewed |
EL KATEB, D., MOUELHI, T., LE TRAON, Y., Hwang, J., & Xie, T. (2012). Refactoring access control policies for performance improvement. In Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (pp. 323--334). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2188286.2188346 Peer reviewed |
ELKATEB, D., MOUELHI, T., LE TRAON, Y., Hwang, J., & Xie, T. (2012). Refactoring Access Control Policies for Performance Improvement. Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (ICPE 2012), 100-110. Peer reviewed |
BARTEL, A., KLEIN, J., Monperrus, M., ALLIX, K., & LE TRAON, Y. (2012). In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/25161. |
Dhaussy, P., Boniol, F., Roger, J.-C., Raji, A., LE TRAON, Y., & Baudry, B. I. (2012). Formalisation de contextes et d'exigences pour la validation formelle de logiciels embarqués. TSI. Technique et science informatiques, 31 (6), 797--825. Peer reviewed |
MEIRA, J. A., Almeida, E. C., LE TRAON, Y., & Sunye, G. (2012). Peer-to-Peer Load Testing. In Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on (pp. 642-647). IEEE. doi:10.1109/ICST.2012.153 Peer reviewed |
Xu, D., THOMAS, L., Kent, M., MOUELHI, T., & LE TRAON, Y. (2012). A Model-Based Approach to Automated Testing of Access Control Policies. Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 100-110. doi:10.1145/2295136.2295173 Peer reviewed |
ELRAKAIBY, Y., MOUELHI, T., & LE TRAON, Y. (2012). Testing obligation policy enforcement using mutation analysis. Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012, 673-680. doi:10.1109/ICST.2012.157 Peer reviewed |
EL RAKAIBY, Y., MOUELHI, T., & LE TRAON, Y. (2012). Testing Obligation Policy Enforcement using Mutation Analysis. Proceedings of the 7th International Workshop on Mutation Analysis (associated to the Fifth International Conference on Software Testing, Verification, and Validation, ICST 2012), 100-110. Peer reviewed |
BARTEL, A., KLEIN, J., Monperrus, M., ALLIX, K., & LE TRAON, Y. (2012). Improving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation. Luxembourg, Unknown/unspecified: uni.lu. https://orbilu.uni.lu/handle/10993/3889 |
BARTEL, A., KLEIN, J., Monperrus, M., & LE TRAON, Y. (2012). Dexpler: Converting Android Dalvik Bytecode to Jimple for Static Analysis with Soot. In ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2012) (pp. 1-12). doi:10.1145/2259051.2259056 Peer reviewed |
BARTEL, A., KLEIN, J., Monperrus, M., & LE TRAON, Y. (2012). Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android. In IEEE/ACM International Conference on Automated Software Engineering (pp. 1-4). doi:10.1145/2351676.2351722 Peer reviewed |
PAPADAKIS, M., & LE TRAON, Y. (2012). Using Mutants to Locate "Unknown" Faults. In ICST 2012. doi:10.1109/ICST.2012.159 Peer reviewed |
HENARD, C., PAPADAKIS, M., PERROUIN, G., KLEIN, J., Heymans, P., & LE TRAON, Y. (2012). Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Suites for Large Software Product Lines. Technical Report. https://orbilu.uni.lu/handle/10993/4896 |
PERROUIN, G., Oster, S., Sen, S., KLEIN, J., Baudry, B., & LE TRAON, Y. (2012). Pairwise testing for software product lines: Comparison of two approaches. Software Quality Journal, 20 (3), 605-643. doi:10.1007/s11219-011-9160-9 Peer reviewed |
BARTEL, A., KLEIN, J., Monperrus, M., & LE TRAON, Y. (2011). Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android. In Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android (Tech Report) (pp. 1-11). Tech Report. |
BARTEL, A., Baudry, B., Munoz, F., KLEIN, J., MOUELHI, T., & LE TRAON, Y. (2011). Model Driven Mutation Applied to Adaptative Systems Testing. 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops. doi:10.1109/ICSTW.2011.24 Peer reviewed |
PERROUIN, G., Sen, S., KLEIN, J., Baudry, B., & LE TRAON, Y. (2010). Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines. International Conference on Software Test and Validation. doi:10.1109/ICST.2010.43 Peer reviewed |