Profil

LE TRAON Yves

University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)

Main Referenced Co-authors
KLEIN, Jacques  (107)
PAPADAKIS, Michail  (92)
BISSYANDE, Tegawendé  (61)
CORDY, Maxime  (40)
BARTEL, Alexandre  (28)
Main Referenced Keywords
Android (9); Access control (6); Access control policies (5); Internet of Things (5); Model-Driven Engineering (5);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Security Design and Validation Research Group (SerVal) (27)
SnT (18)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > SerVal - Security, Reasoning & Validation (6)
ULHPC - University of Luxembourg: High Performance Computing (6)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) (2)
Main Referenced Disciplines
Computer science (268)
Engineering, computing & technology: Multidisciplinary, general & others (4)
Electrical & electronics engineering (2)
Aerospace & aeronautics engineering (1)
Radiology, nuclear medicine & imaging (1)

Publications (total 274)

The most downloaded
6692 downloads
Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., & McDaniel, P. (June 2014). FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps [Paper presentation]. ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI 2014). https://hdl.handle.net/10993/20223

The most cited

637 citations (Scopus®)

Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). AndroZoo: Collecting Millions of Android Apps for the Research Community. In Proceedings of the 13th International Workshop on Mining Software Repositories (pp. 468--471). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2901739.2903508 https://hdl.handle.net/10993/27396

HU, Q., Yuejun Guo, Xiaofei Xie, CORDY, M., Lei Ma, PAPADAKIS, M., & LE TRAON, Y. (In press). Test Optimization in DNN Testing: A Survey. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/59273.

Kim, K., Ghatpande, S., Kim, D., Zhou, X., Liu, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (26 August 2023). Big Code Search: A Bibliography. ACM Computing Surveys, 56 (1), 1-49. doi:10.1145/3604905
Peer Reviewed verified by ORBi

Hu, Q., Guo, Y., Xie, X., Cordy, M., Ma, W., Papadakis, M., & Le Traon, Y. (2023). Evaluating the Robustness of Test Selection Methods for Deep Neural Networks. preprint.

DANG, X., Li, Y., PAPADAKIS, M., KLEIN, J., BISSYANDE, T. F. D. A., & LE TRAON, Y. (2023). GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3607191
Peer Reviewed verified by ORBi

Akli, A., Haben, G., Habchi, S., Papadakis, M., & Le Traon, Y. (2023). FlakyCat: Predicting Flaky Tests Categories using Few-Shot Learning. In FlakyCat: Predicting Flaky Tests Categories using Few-Shot Learning. doi:10.1109/AST58925.2023.00018
Peer reviewed

Gubri, M., Cordy, M., & Le Traon, Y. (2023). Going Further: Flatness at the Rescue of Early Stopping for Adversarial Example Transferability. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/55436.

Garg, A., Ojdanic, M., Degiovanni, R. G., Titcheu Chekam, T., Papadakis, M., & Le Traon, Y. (2023). Cerebro: Static Subsuming Mutant Selection. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2022.3140510
Peer reviewed

Kubler, S., Renard, M., Ghatpande, S., Georges, J.-P., & Le Traon, Y. (2023). Decision support system for blockchain (DLT) platform selection based on ITU recommendations: A systematic literature review approach. Expert systems with applications, 211, 118704. doi:10.1016/j.eswa.2022.118704
Peer reviewed

Dong, Z., HU, Q., GUO, Y., CORDY, M., PAPADAKIS, M., Zhang, Z., LE TRAON, Y., & Zhao, J. (2023). MixCode: Enhancing Code Classification by Mixup-Based Data Augmentation. IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 379–390. doi:10.1109/SANER56733.2023.00043
Peer reviewed

RWEMALIKA, R., HABCHI, S., PAPADAKIS, M., LE TRAON, Y., & Brasseur, M.-C. (2023). Smells in system user interactive tests. Empirical Software Engineering, 28 (1). doi:10.1007/s10664-022-10251-1
Peer Reviewed verified by ORBi

Carvalho, L., DEGIOVANNI, R. G., Brizzio, M. A., CORDY, M., Aguirre, N., LE TRAON, Y., & PAPADAKIS, M. (2023). ACoRe: Automated Goal-Conflict Resolution. 26th International Conference on Fundamental Approaches to Software Engineering (FASE), 13991, 3–25. doi:10.1007/978-3-031-30826-0_1
Peer reviewed

GHAMIZI, S., Zhang, J., CORDY, M., PAPADAKIS, M., Sugiyama, M., & LE TRAON, Y. (2023). GAT: Guided Adversarial Training with Pareto-optimal Auxiliary Tasks. Proceedings of the International Conference on Machine Learning (ICML), 202, 11255–11282.
Peer reviewed

GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2023). On Evaluating Adversarial Robustness of Chest X-ray Classification. Proceedings of the Workshop on Artificial Intelligence Safety 2023, 3381.
Peer reviewed

HU, Q., GUO, Y., Xie, X., CORDY, M., PAPADAKIS, M., Ma, L., & LE TRAON, Y. (2023). CodeS: Towards Code Model Generalization Under Distribution Shift. IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results, 1–6. doi:10.1109/ICSE-NIER58687.2023.00007
Peer reviewed

Dyrmishi, S., Ghamizi, S., Simonetto, T. J. A., Le Traon, Y., & Cordy, M. (2023). On the empirical effectiveness of unrealistic adversarial hardening against realistic adversarial attacks. In Conference Proceedings 2023 IEEE Symposium on Security and Privacy (SP) (pp. 1384-1400). IEEE. doi:10.1109/SP46215.2023.00049
Peer reviewed

Ojdanic, M., Garg, A., Khanfir, A., Degiovanni, R. G., Papadakis, M., & Le Traon, Y. (2023). Syntactic Vs. Semantic similarity of Artificial and Real Faults in Mutation Testing Studies. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/49190. doi:10.1109/TSE.2023.3277564

Ojdanic, M., Khanfir, A., Garg, A., Degiovanni, R. G., Papadakis, M., & Le Traon, Y. (2023). On Comparing Mutation Testing Tools through Learning-based Mutant Selection. In On Comparing Mutation Testing Tools through Learning-based Mutant Selection (pp. 10). doi:10.1109/AST58925.2023.00008
Peer reviewed

Khanfir, A., Jimenez, M., Papadakis, M., & Le Traon, Y. (2022). CODEBERT-NT: code naturalness via CodeBERT. 22nd IEEE International Conference on Software Quality, Reliability and Security (QRS'22). doi:10.1109/QRS57517.2022.00098
Peer reviewed

Bernier, F., Jimenez, M., Cordy, M., & Le Traon, Y. (2022). Faster and Cheaper Energy Demand Forecasting at Scale. In Has it Trained Yet? Workshop at the Conference on Neural Information Processing Systems.
Peer reviewed

Lorentz, J., Hartmann, T., Moawad, A., Fouquet, F., Aouada, D., & Le Traon, Y. (2022). CalcGraph: taming the high costs of deep learning using models. Software and Systems Modeling. doi:10.1007/s10270-022-01052-7
Peer Reviewed verified by ORBi

Habchi, S., Haben, G., Sohn, J., Franci, A., Papadakis, M., Cordy, M., & Le Traon, Y. (2022). What Made This Test Flake? Pinpointing Classes Responsible for Test Flakiness. In What Made This Test Flake? Pinpointing Classes Responsible for Test Flakiness. doi:10.1109/ICSME55016.2022.00039
Peer reviewed

Souani, B., Khanfir, A., BARTEL, A., Allix, K., & Le Traon, Y. (2022). Android Malware Detection Using BERT. In Z. Jianying, Applied Cryptography and Network Security Workshops (pp. 575–591). Berlin, Germany: Springer. doi:10.1007/978-3-031-16815-4_31
Peer reviewed

Garg, A., Degiovanni, R. G., Jimenez, M., Cordy, M., Papadakis, M., & Le Traon, Y. (2022). Learning from what we know: How to perform vulnerability prediction using noisy historical data. Empirical Software Engineering. doi:10.1007/s10664-022-10197-4
Peer Reviewed verified by ORBi

Sawadogo, D. A., Bissyande, T. F. D. A., Moha, N., Allix, K., Klein, J., Li, L., & Le Traon, Y. (August 2022). SSPCATCHER: Learning to catch security patches. Empirical Software Engineering, 27. doi:10.1007/s10664-022-10168-9
Peer Reviewed verified by ORBi

Khanfir, A., Koyuncu, A., Papadakis, M., Cordy, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2022). iBiR: Bug Report driven Fault Injection. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3542946
Peer Reviewed verified by ORBi

Ojdanic, M., Soremekun, E., Degiovanni, R. G., Papadakis, M., & Le Traon, Y. (2022). Mutation Testing in Evolving Systems: Studying the relevance of mutants to code evolution. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3530786
Peer Reviewed verified by ORBi

Habchi, S., Haben, G., Papadakis, M., Cordy, M., & Le Traon, Y. (2022). A Qualitative Study on the Sources, Impacts, and Mitigation Strategies of Flaky Tests. In A Qualitative Study on the Sources, Impacts, and Mitigation Strategies of Flaky Tests. doi:10.1109/ICST53961.2022.00034
Peer reviewed

Ghamizi, S., Garcia Santa Cruz, B., Temple, P., Cordy, M., Perrouin, G., Papadakis, M., & Le Traon, Y. (2022). Towards Generalizable Machine Learning for Chest X-ray Diagnosis with Multi-task learning. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/50815.

Hu, Q., Guo, Y., Cordy, M., Xie, X., Ma, L., Papadakis, M., & Le Traon, Y. (2022). An Empirical Study on Data Distribution-Aware Test Selection for Deep Learning Enhancement. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3511598
Peer reviewed

Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2022). Adversarial Robustness in Multi-Task Learning: Promises and Illusions. In Proceedings of the thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22). doi:10.1609/aaai.v36i1.19950
Peer reviewed

Simonetto, T. J. A., Dyrmishi, S., Ghamizi, S., Cordy, M., & Le Traon, Y. (2022). A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space. In Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI-22 (pp. 1313-1319). International Joint Conferences on Artificial Intelligence Organization. doi:10.24963/ijcai.2022/183
Peer reviewed

Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2022). On Evaluating Adversarial Robustness of Chest X-ray Classification: Pitfalls and Best Practices. In The Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI- 23) - SafeAI Workshop, Washington, D.C., Feb 13-14, 2023.
Peer reviewed

Gubri, M., Cordy, M., Papadakis, M., Le Traon, Y., & Sen, K. (2022). Efficient and Transferable Adversarial Examples from Bayesian Neural Networks. The 38th Conference on Uncertainty in Artificial Intelligence.
Peer reviewed

Ruiz Rodriguez, M. L., Kubler, S., de Giorgio, A., Cordy, M., Robert, J., & Le Traon, Y. (2022). Multi-agent deep reinforcement learning based Predictive Maintenance on parallel machines. Robotics and Computer-Integrated Manufacturing. doi:10.1016/j.rcim.2022.102406
Peer reviewed

Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2021). Evasion Attack STeganography: Turning Vulnerability Of Machine Learning ToAdversarial Attacks Into A Real-world Application. Proceedings of International Conference on Computer Vision 2021. doi:10.1109/ICCVW54120.2021.00010
Peer reviewed

Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2021). Requirements And Threat Models of Adversarial Attacks and Robustness of Chest X-ray classification. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/48411.

Polge, J., Ghatpande, S., Kubler, S., Robert, J., & Le Traon, Y. (28 July 2021). BlockPerf: A Hybrid Blockchain Emulator/Simulator Framework. IEEE Access, 9, 107858 - 107872. doi:10.1109/ACCESS.2021.3101044
Peer Reviewed verified by ORBi

Haben, G., Habchi, S., Papadakis, M., Cordy, M., & Le Traon, Y. (2021). A Replication Study on the Usability of Code Vocabulary in Predicting Flaky Tests. In 18th International Conference on Mining Software Repositories. doi:10.1109/MSR52588.2021.00034
Peer reviewed

Ma, W., Papadakis, M., Tsakmalis, A., Cordy, M., & Le Traon, Y. (2021). Test Selection for Deep Learning Systems. ACM Transactions on Software Engineering and Methodology, 30 (2), 13:1--13:22. doi:10.1145/3417330
Peer Reviewed verified by ORBi

Titcheu Chekam, T., Papadakis, M., Cordy, M., & Le Traon, Y. (2021). Killing Stubborn Mutants with Symbolic Execution. ACM Transactions on Software Engineering and Methodology, 30 (2), 19:1--19:23. doi:10.1145/3425497
Peer Reviewed verified by ORBi

Hu, Q., Guo, Y., Cordy, M., Xiaofei, X., Ma, W., Papadakis, M., & Le Traon, Y. (2021). Towards Exploring the Limitations of Active Learning: An Empirical Study. In The 36th IEEE/ACM International Conference on Automated Software Engineering. doi:10.1109/ASE51524.2021.9678672
Peer reviewed

Bonnaventure, W., Khanfir, A., BARTEL, A., Papadakis, M., & Le Traon, Y. (2021). CONFUZZION: A Java Virtual Machine Fuzzer for Type Confusion Vulnerabilities. In IEEE International Conference on Software Quality, Reliability, and Security (QRS), 2021.
Peer reviewed

Keller, P., Kabore, A. K., Plein, L., Klein, J., Le Traon, Y., & Bissyande, T. F. D. A. (2021). What You See is What it Means! Semantic Representation Learning of Code based on Visualization. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3485135
Peer Reviewed verified by ORBi

Polge, J., Robert, J., & Le Traon, Y. (18 December 2020). A Case Driven Study of the Use of Time Series Classification for Flexibility in Industry 4.0. Sensors, 20 (24). doi:10.3390/s20247273
Peer Reviewed verified by ORBi

Mouline, L., Cordy, M., & Le Traon, Y. (2020). Load approximation for uncertain topologies in the low-voltage grid. In INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS, 11-13 November 2020 (pp. 1-6). doi:10.1109/SmartGridComm47815.2020.9302940
Peer reviewed

Polge, J., Robert, J., & Le Traon, Y. (2020). Permissioned Blockchain Frameworks in the Industry: A Comparison. ICT Express. doi:10.1016/j.icte.2020.09.002
Peer Reviewed verified by ORBi

Ghamizi, S., Rwemalika, R., Cordy, M., Veiber, L., Bissyande, T. F. D. A., Papadakis, M., Klein, J., & Le Traon, Y. (2020). Data-driven simulation and optimization for covid-19 exit strategies. In S. Ghamizi, R. Rwemalika, M. Cordy, L. Veiber, T. F. D. A. Bissyande, M. Papadakis, J. Klein, ... Y. Le Traon, Data-driven simulation and optimization for covid-19 exit strategies (pp. 3434-3442). New York, NY, United States: Association for Computing Machinery. doi:10.1145/3394486.3412863
Peer reviewed

Liu, K., Wang, S., Koyuncu, A., Kim, K., Bissyande, T. F. D. A., Kim, D., Wu, P., Klein, J., Mao, X., & Le Traon, Y. (2020). On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs. In 42nd ACM/IEEE International Conference on Software Engineering (ICSE). doi:10.1145/3377811.3380338
Peer reviewed

Kolbe, N., Vandenbussche, P.-Y., Kubler, S., & Le Traon, Y. (2020). LOVBench: Ontology Ranking Benchmark. In Proceedings of The Web Conference 2020 (WWW '20). doi:10.1145/3366423.3380245
Peer reviewed

Koyuncu, A., Liu, K., Bissyande, T. F. D. A., Kim, D., Klein, J., Monperrus, M., & Le Traon, Y. (2020). FixMiner: Mining relevant fix patterns for automated program repair. Empirical Software Engineering. doi:10.1007/s10664-019-09780-z
Peer Reviewed verified by ORBi

Antoniadis, N., Cordy, M., Sifaleras, A., & Le Traon, Y. (2020). Preventing Overloading Incidents on Smart Grids: A Multiobjective Combinatorial Optimization Approach. In Communications in Computer and Information Science (pp. 269-281). Springer, Cham. doi:10.1007/978-3-030-41913-4_22
Peer reviewed

Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2020). Adversarial Embedding: A robust and elusive Steganography and Watermarking technique [Paper presentation]. IEEE Symposium on Security and Privacy.

Ghamizi, S., Rwemalika, R., Cordy, M., Le Traon, Y., & Papadakis, M. (2020). Pandemic Simulation and Forecasting of exit strategies:Convergence of Machine Learning and EpidemiologicalModels. University of Luxembourg.

Titcheu Chekam, T., Papadakis, M., & Le Traon, Y. (2020). Muteria: An Extensible and Flexible Multi-Criteria Software Testing Framework. In ACM/IEEE International Conference on Automation of Software Test (AST) 2020. doi:10.1145/3387903.3389316
Peer reviewed

Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2020). FeatureNET: Diversity-driven Generation of Deep Learning Models. In International Conference on Software Engineering (ICSE). doi:10.1145/3377812.3382153
Peer reviewed

Ghamizi, S., Cordy, M., Gubri, M., Papadakis, M., Boystov, A., Le Traon, Y., & Goujon, A. (2020). Search-based adversarial testing and improvement of constrained credit scoring systems. In ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '20), November 8-13, 2020.
Peer reviewed

Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., Le Traon, Y., & Sen, K. (2019). Selecting fault revealing mutants. Empirical Software Engineering, 1-54. doi:10.1007/s10664-019-09778-7
Peer Reviewed verified by ORBi

Rwemalika, R., Kintis, M., Papadakis, M., Le Traon, Y., & Lorrach, P. (2019). An industrial study on the differences between pre-release and post-release bugs. In Proceedings of 35th IEEE International Conference on Software Maintenance and Evolution (pp. 11). IEEE. doi:10.1109/ICSME.2019.00019
Peer reviewed

Koyuncu, A., Liu, K., Bissyande, T. F. D. A., Kim, D., Monperrus, M., Klein, J., & Le Traon, Y. (2019). iFixR: bug report driven program repair. In ESEC/FSE 2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. doi:10.1145/3338906.3338935
Peer reviewed

Li, L., Riom, T., Bissyande, T. F. D. A., Wang, H., Klein, J., & Le Traon, Y. (August 2019). Revisiting the impact of common libraries for android-related investigations. Journal of Systems and Software, 154, 157-175. doi:10.1016/j.jss.2019.04.065
Peer Reviewed verified by ORBi

Liu, K., Kim, D., Bissyande, T. F. D. A., Kim, T., Kim, K., Koyuncu, A., Kim, S., & Le Traon, Y. (2019). Learning to Spot and Refactor Inconsistent Method Names. In 41st ACM/IEEE International Conference on Software Engineering (ICSE). Montreal, Canada: IEEE.
Peer reviewed

Liu, K., Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., & Le Traon, Y. (2019). You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems. In The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019). Xi'an, China: IEEE. doi:10.1109/ICST.2019.00020
Peer reviewed

Li, D., Li, L., Kim, D., Bissyande, T. F. D. A., Lo, D., & Le Traon, Y. (2019). Watch out for This Commit! A Study of Influential Software Changes. Journal of Software: Evolution and Process. doi:10.1002/smr.2181
Peer reviewed

Polge, J., Robert, J., & Le Traon, Y. (2019). Assessing the impact of attacks on OPC-UA applications in the Industry 4.0 era. In 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, 11-14 January 2019.
Peer reviewed

Titcheu Chekam, T., Papadakis, M., & Le Traon, Y. (2019). Mart: A Mutant Generation Tool for LLVM. In T. Titcheu Chekam, M. Papadakis, ... Y. Le Traon, Mart: A Mutant Generation Tool for LLVM. doi:10.1145/3338906.3341180
Peer reviewed

Padhye, R., Lemieux, C., Sen, K., Papadakis, M., & Le Traon, Y. (2019). Semantic Fuzzing with Zest. In ACM SIGSOFT International Symposium on Software Testing and Analysis. doi:10.1145/3293882.3330576
Peer reviewed

Jimenez, M., Rwemalika, R., Papadakis, M., Sarro, F., Le Traon, Y., & Harman, M. (2019). An Empirical Study on Vulnerability Prediction of Open-Source Software Releases. In Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE).
Peer reviewed

Kolbe, N., Kubler, S., Robert, J., Le Traon, Y., & Zaslavsky, A. (2019). Linked Vocabulary Recommendation Tools for Internet of Things: A Survey. ACM Computing Surveys. doi:10.1145/3284316
Peer Reviewed verified by ORBi

Schmitt, X., Kubler, S., Robert, J., Papadakis, M., & Le Traon, Y. (2019). A Replicable Comparison Study of NER Software: StanfordNLP, NLTK, OpenNLP, SpaCy, Gate. In International Conference on Social Networks Analysis, Management and Security. doi:10.1109/SNAMS.2019.8931850
Peer reviewed

Kolbe, N., Kubler, S., & Le Traon, Y. (2019). Popularity-driven Ontology Ranking using Qualitative Features. In The Semantic Web - ISWC 2019. doi:10.1007/978-3-030-30793-6_19
Peer reviewed

Rwemalika, R., Kintis, M., Papadakis, M., Le Traon, Y., & Lorrach, P. (2019). On the Evolution of Keyword-Driven Test Suites. In 12th IEEE International Conference on Software Testing, Verification and Validation. doi:10.1109/ICST.2019.00040
Peer reviewed

Cordy, M., Muller, S., Papadakis, M., & Le Traon, Y. (2019). Search-based Test and Improvement of Machine-Learning-Based Anomaly Detection Systems. In ACM SIGSOFT International Symposium on Software Testing and Analysis. doi:10.1145/3293882.3330580
Peer reviewed

Leong, C., Abhayendra, S., Papadakis, M., Le Traon, Y., & Micco, J. (2019). Assessing Transition-based Test Selection Algorithms at Google. In International Conference on Software Engineering (ICSE). doi:10.1109/ICSE-SEIP.2019.00019
Peer reviewed

Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2019). Automated Search for Configurations of Deep Neural Network Architectures. In Automated Search for Configurations of Convolutional Neural Network Architectures. doi:10.1145/3336294.3336306
Peer reviewed

Papadakis, M., Kintis, M., Zhang, J., Jia, Y., Le Traon, Y., & Harman, M. (2019). Mutation Testing Advances: An Analysis and Survey. In Advances in Computers. Elsevier. doi:10.1016/bs.adcom.2018.03.015
Peer reviewed

Jimenez, M., Rwemalika, R., Papadakis, M., Sarro, F., Le Traon, Y., & Harman, M. (2019). The Importance of Accounting for Real-World Labelling When Predicting Software Vulnerabilities. In Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE). doi:10.1145/3338906.3338941
Peer reviewed

Benedick, P.-L., Robert, J., & Le Traon, Y. (2019). TRIDENT: A Three-Steps Strategy to Digitise an Industrial System for Stepping into Industry 4.0. Proceedings of 45th Annual Conference of the IEEE Industrial Electronics Society.
Peer reviewed

BARTEL, A., Klein, J., & Le Traon, Y. (2019). Désérialisation Java : Une brève introduction au ROP de haut niveau. Multi-System & Internet Security Cookbook, 101.

Bartel, A., Klein, J., & Le Traon, Y. (2019). MUSTI: Dynamic Prevention of Invalid Object Initialization Attacks. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2019.2894356
Peer Reviewed verified by ORBi

Padhye, R., Lemieux, C., Sen, K., PAPADAKIS, M., & LE TRAON, Y. (2019). Validity fuzzing and parametric generators for effective random testing. 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), 266–267. doi:10.1109/ICSE-COMPANION.2019.00107
Peer reviewed

Rwemalika, R., Kintis, M., Papadakis, M., & Le Traon, Y. (11 December 2018). Can we automate away the main challenges of end-to-end testing? [Paper presentation]. The 17th Belgium-Netherlands Software Evolution Workshop, Delft, Netherlands.

Jimenez, M., Titcheu Chekam, T., Cordy, M., Papadakis, M., Kintis, M., Le Traon, Y., & Harman, M. (2018). Are mutants really natural? A study on how “naturalness” helps mutant selection. Proceedings of 12th International Symposium on 
 Empirical Software Engineering and Measurement (ESEM'18). doi:10.1145/3239235.3240500
Peer reviewed

Kubler, S., Derigent, W., Voisin, A., Robert, J., Le Traon, Y., & Herrera Viedma, E. (2018). Measuring inconsistency and deriving priorities from fuzzy pairwise comparison matrices using the knowledge-based consistency index. Knowledge-Based Systems. doi:10.1016/j.knosys.2018.09.015
Peer Reviewed verified by ORBi

Jimenez, M., Cordy, M., Le Traon, Y., & Papadakis, M. (2018). TUNA: TUning Naturalness-based Analysis. In 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018.
Peer reviewed

Liu, K., Kim, D., Koyuncu, A., Li, L., Bissyande, T. F. D. A., & Le Traon, Y. (2018). A Closer Look at Real-World Patches. In 34th IEEE International Conference on Software Maintenance and Evolution (ICSME). doi:10.1109/ICSME.2018.00037
Peer reviewed

Jimenez, M., Cordy, M., Le Traon, Y., & Papadakis, M. (September 2018). On the impact of tokenizer and parameters on N-gram based Code Analysis [Paper presentation]. 34th IEEE International Conference on Software Maintenance and Evolution (ICSME'18), Madrid, Spain.

Benedick, P.-L., Robert, J., Le Traon, Y., & Kubler, S. (2018). O-MI/O-DF vs. MQTT: a performance analysis. In O-MI/O-DF vs. MQTT: a performance analysis.
Peer reviewed

Bartel, A., Klein, J., & Le Traon, Y. (2018). MUSTI: Dynamic Prevention of Invalid Object Initialization Attacks. (TR-SNT-2018-3). Université du Luxembourg.

Kim, K., Kim, D., Bissyande, T. F. D. A., Choi, E., Li, L., Klein, J., & Le Traon, Y. (2018). FaCoY - A Code-to-Code Search Engine. In International Conference on Software Engineering (ICSE 2018).
Peer reviewed

Martinez, J., Sottet, J.-S., Garcia-Frey, A., Bissyande, T. F. D. A., Ziadi, T., Klein, J., Temple, P., Mathieu, A., & Le Traon, Y. (2018). Towards Estimating and Predicting User Perception on Software Product Variants. In 17th International Conference on Software Reuse (ICSR) (pp. 23-40). Springer, LNCS.
Peer reviewed

Li, D., Lin, J., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification. In 21st International Conference on Extending Database Technology.
Peer reviewed

Bartolini, C., El Kateb, D., Le Traon, Y., & Hagen, D. (February 2018). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? Electron Markets, 28 (1), 53-75. doi:10.1007/s12525-018-0284-7
Peer reviewed

Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., & Le Traon, Y. (2018). Predicting the Fault Revelation Utility of Mutants. In 40th International Conference on Software Engineering, Gothenburg, Sweden, May 27 - 3 June 2018.
Peer reviewed

Kintis, M., Papadakis, M., Papadopoulos, A., Valvis, E., Malevris, N., & Le Traon, Y. (2018). How effective are mutation testing tools? An empirical analysis of Java mutation testing tools with manual analysis and real faults. Empirical Software Engineering. doi:10.1007/s10664-017-9582-5
Peer Reviewed verified by ORBi

Liu, K., Kim, D., Bissyande, T. F. D. A., Yoo, S., & Le Traon, Y. (2018). Mining Fix Patterns for FindBugs Violations. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2018.2884955
Peer reviewed

Papadakis, M., Titcheu Chekam, T., & Le Traon, Y. (2018). Mutant Quality Indicators. In 13th International Workshop on Mutation Analysis (MUTATION'18).
Peer reviewed

Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants. Information and Software Technology. doi:10.1016/j.infsof.2018.07.005
Peer Reviewed verified by ORBi

Kubler, S., Robert, J., Neumaier, S., Umbrich, J., & Le Traon, Y. (2018). Comparison of metadata quality in open data portals using the Analytic Hierarchy Process. Government Information Quarterly. doi:10.1016/j.giq.2017.11.003
Peer reviewed

Bartel, A., Klein, J., & Le Traon, Y. (2018). Fini le Bac à Sable. Avec le CVE-2017-3272, devenez un grand! Multi-System & Internet Security Cookbook, 97.

Bartel, A., Klein, J., & Le Traon, Y. (2018). Désérialisation Java : Une brève introduction. Multi-System & Internet Security Cookbook, 100.

Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (January 2018). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search. Empirical Software Engineering, 90, 27-39. doi:10.1007/s10664-017-9544-y
Peer Reviewed verified by ORBi

Jimenez, M., Le Traon, Y., & Papadakis, M. (2018). Enabling the Continous Analysis of Security Vulnerabilities with VulData7. In IEEE International Working Conference on Source Code Analysis and Manipulation. doi:10.1109/SCAM.2018.00014
Peer reviewed

Muller, S., Lancrenon, J., Harpes, C., Le Traon, Y., Gombault, S., & Bonnin, J.-M. (2018). A training-resistant anomaly detection system. Computers and Security, 76, 1-11. doi:10.1016/j.cose.2018.02.015
Peer Reviewed verified by ORBi

Kolbe, N., Robert, J., Kubler, S., & Le Traon, Y. (2017). PROFICIENT: Productivity Tool for Semantic Interoperability in an Open IoT Ecosystem. In Proceedings of the 14th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. doi:10.1145/3144457.3144479
Peer reviewed

Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017). On Locating Malicious Code in Piggybacked Android Apps. Journal of Computer Science and Technology. doi:10.1007/s11390-017-1786-z
Peer reviewed

Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Schummer, P., Muller, B., & Solvi, A.-M. (2017). Towards a Plug-and-Play and Holistic Data Mining Framework for Understanding and Facilitating Operations in Smart Buildings. (TR-SNT-2017-5). SnT.

Benelallam, A., Hartmann, T., Mouline, L., Fouquet, F., Bourcier, J., Barais, O., & Le Traon, Y. (2017). Raising Time Awareness in Model-Driven Engineering. In 2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (pp. 181-188). Springer. doi:10.1109/MODELS.2017.11
Peer reviewed

Kubler, S., Derigent, W., Voisin, A., Robert, J., & Le Traon, Y. (2017). Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices. In Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices.
Peer reviewed

Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., Monperrus, M., & Le Traon, Y. (July 2017). Impact of Tool Support in Patch Construction [Paper presentation]. 2017 International Symposium on Software Testing & Analysis (ISSTA). doi:10.1145/3092703.3092713

Kolbe, N., Zaslavsky, A., Kubler, S., Robert, J., & Le Traon, Y. (2017). Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components. In Modeling and Using Context.
Peer reviewed

Kolbe, N., Kubler, S., Robert, J., Le Traon, Y., & Zaslavsky, A. (2017). Towards Semantic Interoperability in an Open IoT Ecosystem for Connected Vehicle Services. In 2017 IEEE Global Internet of Things Summit (GIoTS) Proceedings.
Peer reviewed

Hartmann, T., Fouquet, F., Jimenez, M., Rouvoy, R., & Le Traon, Y. (2017). Analyzing Complex Data in Motion at Scale with Temporal Graphs. In Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering.
Peer reviewed

Hartmann, T., Moawad, A., Fouquet, F., & Le Traon, Y. (2017). The Next Evolution of MDE: A Seamless Integration of Machine Learning into Domain Modeling. Software and Systems Modeling. doi:10.1007/s10270-017-0600-2
Peer Reviewed verified by ORBi

Titcheu Chekam, T., Papadakis, M., Le Traon, Y., & Harman, M. (2017). An Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption. In International Conference on Software Engineering (ICSE 2017). doi:10.1109/ICSE.2017.61
Peer reviewed

Hurier, M., Suarez-Tangil, G., Dash, S. K., Bissyande, T. F. D. A., Le Traon, Y., Klein, J., & Cavallaro, L. (2017). Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware. In MSR 2017.
Peer reviewed

Li, L., Bissyande, T. F. D. A., Bartel, A., Klein, J., & Le Traon, Y. (May 2017). The Multi-Generation Repackaging Hypothesis [Poster presentation]. The 39th International Conference on Software Engineering.

Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (May 2017). Understanding Android App Piggybacking [Poster presentation]. The 39th International Conference on Software Engineering.

Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017). Automatically Locating Malicious Packages in Piggybacked Android Apps. Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017).
Peer reviewed

Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2017). Sensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements. In The 32nd ACM Symposium on Applied Computing (SAC 2017). doi:10.1145/3019612.3019699
Peer reviewed

Mouline, L., Hartmann, T., Fouquet, F., Le Traon, Y., Bourcier, J., & Barais, O. (2017). Weaving Rules into Models@run.time for Embedded Smart Systems. In L. Mouline, T. Hartmann, F. Fouquet, Y. Le Traon, J. Bourcier, ... O. Barais, Programming '17 Companion to the first International Conference on the Art, Science and Engineering of Programming. Brussels, Belgium: ACM. doi:10.1145/3079368.3079394
Peer reviewed

Kintis, M., Papadakis, M., Jia, Y., Malevris, N., Le Traon, Y., & Harman, M. (2017). Detecting Trivial Mutant Equivalences via Compiler Optimisations. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2017.2684805
Peer reviewed

Kubler, S., Robert, J., Umbrich, J., Neumaier, S., & Le Traon, Y. (2017). Comparison of metadata quality in open data portals using the Analytic Hierarchy Process. Government Information Quarterly. doi:10.1016/j.giq.2017.11.003
Peer reviewed

Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (2017). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search.

Jimenez, M., Cordy, M., Kintis, M., Titcheu Chekam, T., Le Traon, Y., & Papadakis, M. (2017). On the Naturalness of Mutants. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/35014.

Laurent, T., Papadakis, M., Kintis, M., Henard, C., Le Traon, Y., & Ventresque, A. (2017). Assessing and Improving the Mutation Testing Practice of PIT. In 10th IEEE International Conference on Software Testing, Verification and Validation. doi:10.1109/ICST.2017.47
Peer reviewed

Li, L., Bissyande, T. F. D. A., Papadakis, M., Rasthofer, S., Bartel, A., Octeau, D., Klein, J., & Le Traon, Y. (2017). Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology. doi:10.1016/j.infsof.2017.04.001
Peer reviewed

Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (2017). Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2017.2656460
Peer reviewed

Muller, S., Harpes, C., Le Traon, Y., Gombault, S., & Bonnin, J.-M. (2017). Efficiently computing the likelihoods of cyclically interdependent risk scenarios. Computers and Security, 64, 59-68. doi:10.1016/j.cose.2016.09.008
Peer Reviewed verified by ORBi

Jimenez, M., Papadakis, M., & Le Traon, Y. (2016). An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel. In 2016 Asia-Pacific Software Engineering Conference (APSEC).
Peer reviewed

Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo-NG: A Practical Language Modeling Approach for Time Series Classification. In The 15th International Symposium on Intelligent Data Analysis.
Peer reviewed

Jimenez, M., Papadakis, M., & Le Traon, Y. (2016). Vulnerability Prediction Models: A case study on the Linux Kernel. In 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, US, October 2-3, 2016. doi:10.1109/SCAM.2016.15
Peer reviewed

Kubler, S., Robert, J., William, D., Alexandre, V., & Le Traon, Y. (October 2016). A state-of the-art survey & testbed of Fuzzy AHP (FAHP) applications. Expert Systems with Applications, 65, 398--422. doi:10.1016/j.eswa.2016.08.064
Peer reviewed

Li, L., Bissyande, T. F. D. A., Le Traon, Y., & Klein, J. (2016). Accessing Inaccessible Android APIs: An Empirical Study. In The 32nd International Conference on Software Maintenance and Evolution (ICSME) (pp. 12).
Peer reviewed

Manukyan, A., Olivares Mendez, M. A., Bissyande, T. F. D. A., Voos, H., & Le Traon, Y. (2016). UAV degradation identification for pilot notification using machine learning techniques. Proceedings of 21st IEEE International Conference on Emerging Technologies and Factory Automation ETFA 2016. doi:10.1109/ETFA.2016.7733537
Peer reviewed

Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (September 2016). Time Series Classification with Discrete Wavelet Transformed Data. International Journal of Software Engineering and Knowledge Engineering, 26 (9&10), 1361–1377. doi:10.1142/S0218194016400088
Peer Reviewed verified by ORBi

Bartolini, C., El Kateb, D., Le Traon, Y., & Hagen, D. (2016). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? In J. Altmann, G. C. Silaghi, ... O. F. Rana (Eds.), Economics of Grids, Clouds, Systems, and Services (pp. 281-295). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-319-43177-2
Peer reviewed

Sanchez Guinea, A., Nain, G., & Le Traon, Y. (August 2016). A systematic review on the engineering of software for ubiquitous systems. Journal of Systems and Software, 118, 251-276. doi:10.1016/j.jss.2016.05.024
Peer Reviewed verified by ORBi

Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study. In The 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016).
Peer reviewed

Li, D., Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo: A Language Modeling Approach for Time Series Classification. In 12th International Conference on Machine Learning and Data Mining (MLDM 2016).
Peer reviewed

Kubler, S., Robert, J., Le Traon, Y., Umbrich, J., & Neumaier, S. (2016). Open Data Portal Quality Comparison using AHP. In Proceedings of the 17th International Digital Government Research Conference on Digital Government Research (pp. 397-407). New York, United States: ACM. doi:10.1145/2912160.2912167
Peer reviewed

Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). AndroZoo: Collecting Millions of Android Apps for the Research Community. In Proceedings of the 13th International Workshop on Mining Software Repositories (pp. 468--471). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2901739.2903508
Peer reviewed

Li, L., Bissyande, T. F. D. A., Papadakis, M., Rasthofer, S., BARTEL, A., Octeau, D., Klein, J., & Le Traon, Y. (2016). Static Analysis of Android Apps: A Systematic Literature Review. SnT.

Li, L., Li, D., Bissyande, T. F. D. A., Lo, D., Klein, J., & Le Traon, Y. (2016). Ungrafting Malicious Code from Piggybacked Android Apps. SnT.

Li, L., Li, D., BARTEL, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Towards a Generic Framework for Automating Extensive Analysis of Android Applications. In The 31st ACM/SIGAPP Symposium on Applied Computing (SAC 2016).
Peer reviewed

Hartmann, T., Moawad, A., Fouquet, F., Reckinger, Y., Klein, J., & Le Traon, Y. (2016). Near Real-Time Electric Load Approximation in Low Voltage Cables of Smart Grids with Models@run.time. In 31st Annual ACM Symposium on Applied Computing (SAC'16) (pp. 2119--2126).
Peer reviewed

Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). An Investigation into the Use of Common Libraries in Android Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 12). doi:10.1109/SANER.2016.52
Peer reviewed

Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Parameter Values of Android APIs: A Preliminary Study on 100,000 Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 5). doi:10.1109/SANER.2016.51
Peer reviewed

Li, D., Bissyande, T. F. D. A., Kubler, S., Klein, J., & Le Traon, Y. (2016). Profiling household appliance electricity usage with n-gram language modeling. In The 2016 IEEE International Conference on Industrial Technology (ICIT 2016).
Peer reviewed

Octeau, D., Jha, S., Dering, M., McDaniel, P., BARTEL, A., Li, L., Klein, J., & Le Traon, Y. (2016). Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis. In The 43rd Symposium on Principles of Programming Languages (POPL 2016).
Peer reviewed

Caire, P., Moawad, A., Efthymiou, V., bikakis, A., & Le Traon, Y. (2016). Privacy Challenges in Ambient Intelligence Systems. Journal of Ambient Intelligence and Smart Environments. doi:10.3233/AIS-160405
Peer Reviewed verified by ORBi

Meira, J. A., Almeira, E. C. D., Kim, D., Filho, E. R. L., & Le Traon, Y. (2016). “Overloaded!” — A Model-based Approach to Database Stress Testing. In International Conference on Database and Expert Systems Applications, Porto 5-8 September 2016.
Peer reviewed

Hurier, M., Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. In Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference (pp. 142--162). Springer. doi:10.1007/978-3-319-40667-1_8
Peer reviewed

Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Feature Location Benchmark for Software Families using Eclipse Community Releases. In Software Reuse: Bridging with Social-Awareness, ICSR 2016 Proceedings. doi:10.1007/978-3-319-35122-3_18
Peer reviewed

Li, L., Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Mining Families of Android Applications for Extractive SPL Adoption. In The 20th International Systems and Software Product Line Conference (SPLC 2016).
Peer reviewed

Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Name Suggestions during Feature Identification: The VariClouds Approach. In 20th International Systems and Software Product Line Conference (SPLC 2016) proceedings.
Peer reviewed

Robert, J., Kubler, S., & Le Traon, Y. (2016). Micro-billing framework for IoT: Research & Technological foundations. In International Conference on Future Internet of Things and Cloud, 22-24 August 2016, Vienna, Austria. doi:10.1109/FiCloud.2016.50
Peer reviewed

Robert, J., Kubler, S., Le Traon, Y., & Främling, K. (2016). O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis. In O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis. doi:10.1109/IECON.2016.7793138
Peer reviewed

Papadakis, M., Henard, C., Harman, M., Jia, & Le Traon, Y. (2016). Threats to the validity of mutation-based test assessment. In International Symposium on Software Testing and Analysis, ISSTA 2016. doi:10.1145/2931037.2931040
Peer reviewed

Henard, C., Papadakis, M., Harman, M., Jia, Y., & Le Traon, Y. (2016). Comparing White-box and Black-box Test Prioritization. In 38th International Conference on Software Engineering (ICSE'16).
Peer reviewed

Muller, S., Harpes, C., Le Traon, Y., Gombault, S., Bonnin, J.-M., & Hoffmann, P. (2016). Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures. In International Conference on Critical Information Infrastructures Security (pp. 163-175). Springer International Publishing. doi:10.1007/978-3-319-71368-7_14
Peer reviewed

Hartmann, T., Moawad, A., Fouquet, F., Reckinger, Y., Mouelhi, T., Klein, J., & Le Traon, Y. (2015). Suspicious Electric Consumption Detection Based on Multi-Profiling Using Live Machine Learning. In 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
Peer reviewed

Laurent, T., Ventresque, A., Papadakis, M., Henard, C., & Le Traon, Y. (2015). Assessing and Improving the Mutation Testing Practice of PIT. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/24473.

Nguyen, P. H., Yskout, K., Heyman, T., Klein, J., Scandariato, R., & Le Traon, Y. (2015). SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems. In Proceedings ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems. doi:10.1109/MODELS.2015.7338255
Peer reviewed

Bartolini, C., El Kateb, D., Le Traon, Y., & Hagen, D. (2015). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? In Economics of Grids, Clouds, Systems, and Services. Springer.
Peer reviewed

Moawad, A., Hartmann, T., Fouquet, F., Nain, G., Klein, J., & Le Traon, Y. (2015). Beyond Discrete Modeling: A Continuous and Efficient Model for IoT. In T. Lethbridge, J. Cabot, ... A. Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 90-99). Passau, Germany: Conference Publishing Consulting. doi:10.1109/MODELS.2015.7338239
Peer reviewed

Hartmann, T., Moawad, A., Fouquet, F., Nain, G., Klein, J., & Le Traon, Y. (2015). Stream my Models: Reactive Peer-to-Peer Distributed Models@run.time. In T. Lethbridge, J. Cabot, ... A. Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 80-89). Passau, Germany: Conference Publishing Consulting.
Peer reviewed

Nguyen, P. H., Kramer, M., Klein, J., & Le Traon, Y. (September 2015). An Extensive Systematic Review on the Model-Driven Development of Secure Systems. Information and Software Technology, 68 (December 2015), 62-81. doi:10.1016/j.infsof.2015.08.006
Peer reviewed

Mouelhi, T., El Kateb, D., & Le Traon, Y. (2015). Inroads in Testing Access Control. In Advances in Computers. ELSEVIER.
Peer reviewed

Li, L., BARTEL, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. In International Conference on ICT Systems Security and Privacy Protection (SEC 2015).
Peer reviewed

Moawad, A., Hartmann, T., Fouquet, F., Klein, J., & Le Traon, Y. (2015). Adaptive Blurring of Sensor Data to balance Privacy and Utility for Ubiquitous Services. In The 30th Annual ACM Symposium on Applied Computing (pp. 2271-2278). ACM. doi:10.1145/2695664.2695855
Peer reviewed

Henard, C., Papadakis, M., & Le Traon, Y. (2015). Flattening or not of the combinatorial interaction testing models. In Eighth IEEE International Conference on Software Testing, Verification and Validation, ICST 2015 Workshops (pp. 1-4). IEEE.
Peer reviewed

Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (March 2015). Using An Instrumentation based Approach to Detect Inter-Component Leaks in Android Apps [Paper presentation]. Grande Region Security and Reliability Day 2015.

El Kateb, D., Zannone, N., Moawad, A., Caire, P., Nain, G., Mouelhi, T., & Le Traon, Y. (2015). Conviviality-driven access control policy. Requirements Engineering, 20 (4), 363-382. doi:10.1007/s00766-014-0204-0
Peer reviewed

Amrani, M., Combemale, B., Lúcio, L., Selim, G. M. K., Dingel, J., Le Traon, Y., Vangheluwe, H., & Cordy, J. R. (2015). Formal verification techniques for model transformations: A tridimensional classification. Journal of Object Technology, 14 (3). doi:DOI:10.5381/jot.2015.14.1.a3
Peer Reviewed verified by ORBi

Zhang, X., Zhang, D., Le Traon, Y., Wang, Q., & Zhang, L. (2015). Roundtable: Research Opportunities and Challenges for Emerging Software Systems. Journal of Computer Science and Technology, 30 (5), 935-941. doi:10.1007/s11390-015-1572-8
Peer reviewed

Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. In Engineering Secure Software and Systems - 7th International Symposium ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings (pp. 51-67). Springer International Publishing. doi:10.1007/978-3-319-15618-7_5
Peer reviewed

Li, L., Bissyandé, T. F., Klein, J., & Le Traon, Y. (2015). An Investigation into the Use of Common Libraries in Android Apps. arXiv preprint arXiv:1511.06554. doi:10.1109/SANER.2016.52
Peer reviewed

Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Automating the Extraction of Model-based Software Product Lines from Model Variants. In 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015). doi:10.1109/ASE.2015.44
Peer reviewed

El Kateb, D., Elrakaiby, Y., Mouelhi, T., Rubab, I., & Le Traon, Y. (2015). Towards a full support of obligations in XACML. Lecture Notes in Computer Science, 8924, 213-221. doi:10.1007/978-3-319-17127-2_14
Peer reviewed

Bardin, S., Delahaye, M., Kosmatov, N., David, R., Papadakis, M., Le Traon, Y., & Marion, J.-Y. (2015). Sound and Quasi-Complete Detection of Infeasible Test Requirements. In 8th IEEE International Conference on Software Testing, Verification and Validation (ICST'15). doi:10.1109/ICST.2015.7102607
Peer reviewed

Henard, C., Papadakis, M., Harman, M., & Le Traon, Y. (2015). Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines. In 37th International Conference on Software Engineering (ICSE 2015).
Peer reviewed

Papadakis, M., Yue, J., Harman, M., & Le Traon, Y. (2015). Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique. In 37th International Conference on Software Engineering (ICSE 2015).
Peer reviewed

Li, L., BARTEL, A., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015).
Peer reviewed

Bertolino, A., Daoudagh, S., El Kateb, D., Henard, C., Le Traon, Y., Lonetti, F., Marchetti, E., Mouelhi, T., & Papadakis, M. (2015). Similarity testing for access control. Information and Software Technology, 58, 355-372. doi:10.1016/j.infsof.2014.07.003
Peer reviewed

Xu, D., Kent, M., Thomas, L., Mouelhi, T., & Le Traon, Y. (2015). Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets. IEEE Transactions on Computers, 64 (9), 2490-2505. doi:10.1109/TC.2014.2375189
Peer reviewed

Papadakis, M., & Le Traon, Y. (2015). Metallaxis-FL: mutation-based fault localization. Software Testing, Verification and Reliability, 25, 605-628. doi:10.1002/stvr.1509
Peer reviewed

Allix, K., Bissyande, T. F. D. A., Jerome, Q., Klein, J., State, R., & Le Traon, Y. (2014). Empirical assessment of machine learning-based malware detectors for Android: Measuring the Gap between In-the-Lab and In-the-Wild Validation Scenarios. Empirical Software Engineering, 1-29. doi:10.1007/s10664-014-9352-6
Peer reviewed

Papadakis, M., Delamaro, E. M., & Le Traon, Y. (December 2014). Mitigating the Effects of Equivalent Mutants with Mutant Classification Strategies. Science of Computer Programming, 95, 298-319. doi:10.1016/j.scico.2014.05.012
Peer Reviewed verified by ORBi

Ko, D., Ma, K., Park, S., Kim, S., Kim, D., & Le Traon, Y. (01 December 2014). API Document Quality for Resolving Deprecated APIs [Paper presentation]. The 21st Asia-Pacific Software Engineering Conference.

Hartmann, T., Fouquet, F., Klein, J., Le Traon, Y., Pelov, A., Toutain, L., & Ropitault, T. (2014). Generating Realistic Smart Grid Communication Topologies Based on Real-Data. In 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
Peer reviewed

El Kateb, D., Fouquet, F., bourcier, J., & Le Traon, Y. (October 2014). Optimizing Multi-Objective Evolutionary Algorithms to Enable Quality-Aware Software Provisioning [Paper presentation]. The 14th International Conference on Quality Software.

Li, L., {"lastName":"BARTEL", F. A. A. U. O. L. U. E. I. C. F. S. R. A. T. S., Klein, J., & Le Traon, Y. (2014). Automatically Exploiting Potential Component Leaks in Android Applications. In The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), IEEE, Sept. 2014, Beijing, China.
Peer reviewed

Nguyen, P. H., Klein, J., & Le Traon, Y. (2014). Model-Driven Security with A System of Aspect-Oriented Security Design Patterns. In 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling. doi:10.1145/2631675.2631683
Peer reviewed

Hartmann, T., Fouquet, F., Nain, G., Brice, M., Klein, J., & Le Traon, Y. (02 July 2014). Model-based time-distorted Contexts for efficient temporal Reasoning [Poster presentation]. 26th International Conference on Software Engineering and Knowledge Engineering, Vancouver, Canada.

Hartmann, T., Fouquet, F., Nain, G., Morin, B., Klein, J., & Le Traon, Y. (2014). Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach. In Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering (1st, pp. 586-591). Vancouver, Canada: Knowledge Systems Institute Graduate School, USA.
Peer reviewed

Allix, K., Jerome, Q., Bissyande, T. F. D. A., Klein, J., State, R., & Le Traon, Y. (2014). A Forensic Analysis of Android Malware -- How is Malware Written and How It Could Be Detected? In Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference (pp. 384--393). Washington, DC, USA, Unknown/unspecified: IEEE Computer Society. doi:10.1109/COMPSAC.2014.61
Peer reviewed

Li, L., Bartel, A., Klein, J., & Le Traon, Y. (2014). Automatically Exploiting Potential Component Leaks in Android Applications. (TR-SnT-2014-13). Luxembourg, Luxembourg: SnT.

Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., & McDaniel, P. (June 2014). FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps [Paper presentation]. ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI 2014).

Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (June 2014). Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android. IEEE Transactions on Software Engineering, 40 (6), 617-632. doi:10.1109/TSE.2014.2322867
Peer reviewed

Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2014). Machine Learning-Based Malware Detection for Android Applications: History Matters! Luxembourg, Luxembourg: University of Luxembourg, SnT.

Li, L., Bartel, A., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2014). I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis. (TR-SNT-2014-9, Technical Report). Luxembourg, Luxembourg: SnT Centre - University of Luxembourg.

Hartmann, T., Fouquet, F., Klein, J., Nain, G., & Le Traon, Y. (2014). Reactive Security for Smart Grids Using Models@run.time-Based Simulation and Reasoning. In Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14).
Peer reviewed

Li, L., Bartel, A., Klein, J., & Le Traon, Y. (12 March 2014). Using A Path Matching Algorithm to Detect Inter-Component Leaks in Android Apps [Paper presentation]. Grande Region Security and Reliability Day 2014.

Allix, K., Bissyande, T. F. D. A., Jerome, Q., Klein, J., State, R., & Le Traon, Y. (2014). Large-scale Machine Learning-based Malware Detection: Confronting the "10-fold Cross Validation" Scheme with Reality. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (pp. 163--166). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2557547.2557587
Peer reviewed

El Kateb, D., Fouquet, F., Nain, G., Meira, J. A., Ackerman, M., & Le Traon, Y. (March 2014). Generic Cloud Platform Multi-objective Optimization Leveraging Models@run.time [Paper presentation]. 29th Symposium On Applied Computing.

Li, L., Bartel, A., Klein, J., & Le Traon, Y. (26 February 2014). Detecting privacy leaks in Android Apps [Paper presentation]. International Symposium on Engineering Secure Software and Systems - Doctoral Symposium.

Nguyen, P. H., Klein, J., & Le Traon, Y. (2014). Modeling, composing, and testing of security concerns in a Model-Driven Security approach. In W. Joosen, F. Martinelli, ... T. Heyman (Eds.), Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014).
Peer reviewed

Amrani, M., Lúcio, L., Selim, G., Combemale, B., Dingel, J., Vangheluwe, H., Le Traon, Y., & Cordy, J. (2014). A Survey of Formal Verification Techniques for Model Transformations: A Tridimensional Classification. Journal of Technology. doi:10.5381/jot.2015.14.1.a3
Peer reviewed

Elrakaiby, Y., Amrani, M., & Le Traon, Y. (2014). A Flexible MDE approach to Enforce Fine- grained Security Policies. In Proceedings of the International Symposium on Engineering Secure Software and Systems.
Peer reviewed

Lucio, L., Zhang, Q., Nguyen, P. H., Amrani, M., Klein, J., Vangheluwe, H., & Le Traon, Y. (2014). Advances in Model-Driven Security. In A. Memon (Ed.), Advances in Computers. Elsevier. doi:10.1016/B978-0-12-800162-2.00003-8
Peer reviewed

El Kateb, D., Zannone, N., Moawad, A., Caire, P., Nain, G., Mouelhi, T., & Le Traon, Y. (2014). Conviviality-Driven Access Control Policy. Requirements Engineering.
Peer reviewed

Olivares Mendez, M. A., Bissyandé, T., Somasundar, K., Klein, J., Voos, H., & Le Traon, Y. (2014). The NOAH Project: Giving a Chance to Threatened Species in Africa with UAVs. In T. F. Bissyandé & G. van Stam (Eds.), e-Infrastructure and e-Services for Developing Countries (pp. 198-208). Springer International Publishing. doi:10.1007/978-3-319-08368-1_24
Peer reviewed

Rubab, I., Ali, S., Briand, L., & Le Traon, Y. (2014). Model-Based Testing of Obligations. In 14th Annual International Conference on Quality Software (QSIC) (pp. 1-10). Los Alamitos, Unknown/unspecified: Ieee Computer Soc. doi:10.1109/QSIC.2014.47
Peer reviewed

Abgrall, E., Le Traon, Y., Gombault, S., & Monperrus, M. (2014). Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: an Urgent Need for Systematic Security Regression Testing. In 7th IEEE International Conference on Software Testing, Verification and Validation (ICST)- Workshop SECTEST (pp. 34-41). New York, Unknown/unspecified: Ieee. doi:10.1109/ICSTW.2014.63
Peer reviewed

Sunyé, G., De Almeida, E. C., Le Traon, Y., Baudry, B., & Jézéquel, J.-M. (2014). Model-based testing of global properties on large-scale distributed systems. Information and Software Technology, 56 (7), 749-762. doi:10.1016/j.infsof.2014.02.002
Peer reviewed

Bertolino, A., Le Traon, Y., Lonetti, F., Marchetti, E., & Mouelhi, T. (2014). Coverage-based Test Cases Selection for XACML Policies. IEEE International Conference on Software Testing Verification and Validation Workshops, 12-21. doi:10.1109/ICSTW.2014.49
Peer reviewed

Martinez, J., Ziadi, T., Mazo, R., Klein, J., & Le Traon, Y. (2014). Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines. In 2nd IEEE Working Conference on Software Visualization. doi:10.1109/VISSOFT.2014.18
Peer reviewed

Martinez, J., Ziadi, T., Klein, J., & Le Traon, Y. (2014). Identifying and Visualising Commonality and Variability in Model Variants. In ECMFA 2014 European Conference on Modelling Foundations and Applications.
Peer reviewed

Papadakis, M., Henard, C., & Le Traon, Y. (2014). Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing. In 7th International Conference on Software Testing, Verification and Validation (ICST 2014). doi:10.1109/ICST.2014.11
Peer reviewed

Papadakis, M., & Le Traon, Y. (2014). Effective Fault Localization via Mutation Analysis: A Selective Mutation Approach. In ACM Symposium On Applied Computing (SAC'14). doi:10.1145/2554850.2554978
Peer reviewed

bikakis, A., Caire, P., & Le Traon, Y. (2014). Tools for Conviviality in Multi-Context Systems. IfCoLog Journal of Logics and Their Applications, 1 (1).
Peer reviewed

Elrakaiby, Y., Amrani, M., & Le Traon, Y. (2014). Security@Runtime: A flexible MDE approach to enforce fine-grained security policies. Lecture Notes in Computer Science, 8364 LNCS, 19-34. doi:10.1007/978-3-319-04897-0-2
Peer reviewed

Henard, C., Papadakis, M., Perrouin, G., Klein, J., Heymans, P., & Le Traon, Y. (2014). Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Configurations for Software Product Lines. IEEE Transactions on Software Engineering, 40 (7), 650-670. doi:10.1109/TSE.2014.2327020
Peer reviewed

Ziadi, T., Henard, C., Papadakis, M., Ziane, M., & Le Traon, Y. (2014). Towards a Language-Independent Approach for Reverse-Engineering of Software Product Lines. In 29th Symposium on Applied Computing (SAC 2014). doi:10.1145/2554850.2554874
Peer reviewed

Henard, C., Papadakis, M., & Le Traon, Y. (2014). Mutation-based Generation of Software Product Line Test Configurations. In Symposium on Search-Based Software Engineering (SSBSE 2014). Springer.
Peer reviewed

Henard, C., Papadakis, M., & Le Traon, Y. (2014). MutaLog: a Tool for Mutating Logic Formulas. In Testing Tools Track, 7th International Conference on Software Testing, Verification and Validation (ICST 2014). doi:10.1109/ICSTW.2014.54
Peer reviewed

Nguyen, P. H., Nain, G., Klein, J., Mouelhi, T., & Le Traon, Y. (2014). Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management. Transactions on Aspect-Oriented Software Development, 11, 109-144.
Peer reviewed

Martinez, J., Ziadi, T., Klein, J., & Le Traon, Y. (2014). BUT4Reuse Feature identifier: Identifying reusable features on software variants [Poster presentation]. 3ème Conférence en IngénieriE du Logiciel.

Meira, J. A., Almeida, E., & Le Traon, Y. (2014). A state machine for database non-functional testing [Poster presentation]. 18th International Database Engineering & Applications Symposium.

Hartmann, T., Fouquet, F., Nain, G., Morin, B., Klein, J., Barais, O., & Le Traon, Y. (2014). A Native Versioning Concept to Support Historized Models at Runtime. In J. Dingel, W. Schulte, I. Ramos, S. Abrahao, ... E. Insfran (Eds.), Model-Driven Engineering Languages and Systems - 17th International Conference, MODELS 2014, Valencia, Spain, September 28 - October 3, 2014. Proceedings (1st, pp. 252-268). Springer. doi:10.1007/978-3-319-11653-2_16
Peer reviewed

El Kateb, D., Elrakaiby, Y., Mouelhi, T., Rubab, I., & Le Traon, Y. (2014). Towards a Full Support of Obligations In XACML [Paper presentation]. 9th International Conference on Risks and Security of Internet and Systems.

Lucas Filho, E. R., Cunha De Almeida, E., & Le Traon, Y. (2014). Intra-query Adaptivity for MapReduce Query Processing Systems. In IDEAS 2014 : 18th International Database Engineering Applications Symposium. doi:10.1145/2628194.2628202
Peer reviewed

Nguyen, P. H., Klein, J., Kramer, M., & Le Traon, Y. (2013). A Systematic Review of Model-Driven Security. In The 20th Asia-Pacific Software Engineering Conference Proceedings.
Peer reviewed

Caire, P., Bikakis, A., & Le Traon, Y. (2013). Information Dependencies in MCS: Conviviality-Based Model and Metrics. In 16th INTERNATIONAL CONFERENCE ON PRINCIPLES AND PRACTICE OF MULTI-AGENT SYSTEMS (PRIMA 2013).
Peer reviewed

Bissyande, T. F. D. A., Lo, D., Jiang, L., Reveillere, L., Klein, J., & Le Traon, Y. (2013). Got Issues? Who Cares About It? A Large Scale Investigation of Issue Trackers from GitHub. In Proceedings of the 24th International Symposium on Software Reliability Engineering (ISSRE 2013). doi:10.1109/ISSRE.2013.6698918
Peer reviewed

Moawad, A., Bikakis, A., Caire, P., Nain, G., & Le Traon, Y. (2013). A Rule-based Contextual Reasoning Platform for Ambient Intelligence environments. In Theory, Practice, and Applications of Rules on the Web (pp. 158-172). springer.
Peer reviewed

Moawad, A., Bikakis, A., Caire, P., Nain, G., & Le Traon, Y. (2013). R-CoRe: A Rule-based Contextual Reasoning Platform for AmI. In Joint Proceedings of the 7th International Rule Challenge, the Special Track on Human Language Technology and the 3rd RuleML Doctoral Consortium hosted at the 8th International Symposium on Rules (RuleML2013).
Peer reviewed

Fritz, C., Arzt, S., Rasthofer, S., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., & McDaniel, P. (2013). Highly precise taint analysis for Android applications.

Nguyen, P. H., Nain, G., Klein, J., Mouelhi, T., & Le Traon, Y. (2013). Model-Driven Adaptive Delegation. In S. Chiba, N. Ubayashi, ... H. Masuhara (Eds.), Proceedings of the 12th annual international conference companion on Aspect-oriented software development. New York, United States: ACM. doi:10.1145/2451436.2451445
Peer reviewed

Meira, J. A., Almeida, E. C. D., Sunyé, G., Le Traon, Y., & Valduriez, P. (2013). Stress Testing of Transactional Database Systems. Journal of Information and Data Management.
Peer reviewed

Fior, A. G., Meira, J. A., Almeida, E. C. D., Coelho, R. G., Del Fabro, M. D., & Le Traon, Y. (2013). Under Pressure Benchmark for DDBMS Availability. Journal of Information and Data Management.
Peer reviewed

Elrakaiby, Y., & Le Traon, Y. (2013). A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications. In 2013 International Conference on Availability, Reliability and Security. doi:10.1109/ARES.2013.49
Peer reviewed

Munoz, F., Baudry, B., Delamare, R., & Le Traon, Y. (2013). Usage and testability of AOP: An empirical study of AspectJ. Information and Software Technology, 55 (2), 252-266. doi:10.1016/j.infsof.2012.08.003
Peer reviewed

Papadakis, M., & Le Traon, Y. (2013). Mutation Testing Strategies using Mutant Classification. Abstract book of 28th Symposium On Applied Computing. doi:10.1145/2480362.2480592
Peer reviewed

El Kateb, D., ElRakaiby, Y., Mouelhi, T., & Le Traon, Y. (2013). Access Control Enforcement Testing. Abstract book of 2013 8TH INTERNATIONAL WORKSHOP ON AUTOMATION OF SOFTWARE TEST (AST), 64-70. doi:10.1109/IWAST.2013.6595793
Peer reviewed

Octeau, D., McDaniel, P., Jha, S., Bartel, A., Bodden, E., Klein, J., & Le Traon, Y. (2013). Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. In Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis.
Peer reviewed

Papadakis, M., Delamaro, E. M., & Le Traon, Y. (2013). Proteum/FL: A tool for localizing faults using mutation analysis. In International Working Conference on Source Code Analysis and Manipulation (pp. 94-99). doi:10.1109/SCAM.2013.6648189
Peer reviewed

Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). Multi-objective test generation for software product lines. In 17th International Software Product Line Conference, SPLC 2013, Tokyo, Japan - August 26 - 30, 2013. ACM. doi:10.1145/2491627.2491635
Peer reviewed

Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing. In 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, Workshops Proceedings, Luxembourg, Luxembourg, March 18-22, 2013. IEEE. doi:10.1109/ICSTW.2013.30
Peer reviewed

Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). Towards automated testing and fixing of re-engineered feature models. In Proceedings of the 2013 International Conference on Software Engineering. Piscataway, NJ, USA, Unknown/unspecified: IEEE Press.
Peer reviewed

Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). PLEDGE: a product line editor and test generation tool. In 17th International Software Product Line Conference co-located workshops, SPLC 2013 workshops, Tokyo, Japan - August 26. ACM. doi:10.1145/2499777.2499778
Peer reviewed

Bissyande, T. F. D. A., Ahmat, D., Ouoba, J., van Stam, G., Klein, J., & Le Traon, Y. (2013). Sustainable ICT4D in Africa: Where Do We Go From Here? In EAI International Conference on e-Infrastructure and e-Services for Developing Countries.
Peer reviewed

Hwang, J., Xie, T., El Kateb, D., Mouelhi, T., & Le Traon, Y. (September 2012). Selection of Regression System Tests for Security Policy Evolution [Paper presentation]. 27th IEEE/ACM International Conference Automated Software Engineering 2012.

Bikakis, A., Efthymiou, V., Caire, P., & Le Traon, Y. (2012). Introducing Conviviality as a property of Multi-Context Systems. In The 4th International Workshop on Acquisition, Representation and Reasoning with Contextualized Knowledge ARCOE-12.
Peer reviewed

Moawad, A., Efthymiou, V., Caire, P., Nain, G., & Le Traon, Y. (August 2012). Introducing Conviviality as a New Paradigm for Interactions among IT Objects. Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments, 907, 3-8.
Peer reviewed

Perrouin, G., Morin, B., Chauvel, F., Fleurey, F., Klein, J., Le Traon, Y., Barais, O., & Jézéquel, J.-M. (2012). Towards Flexible Evolution of Dynamically Adaptive Systems. In New Ideas & Emerging Results Track of the International Conference of Software Engineering (NIER@ICSE) (pp. 1353-1356). IEEE Press.
Peer reviewed

El Kateb, D., Elrakaiby, Y., Mouelhi, T., & Le Traon, Y. (2012). Access Control Enforcement Testing. In 8th International Workshop on Automation of Software Test (AST), 2013 (pp. 64-70).
Peer reviewed

El Kateb, D., Mouelhi, T., Le Traon, Y., Hwang, J., & Xie, T. (2012). Refactoring access control policies for performance improvement. In Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (pp. 323--334). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2188286.2188346
Peer reviewed

Perrouin, G., Oster, S., Sen, S., Klein, J., Baudry, B., & Le Traon, Y. (2012). Pairwise testing for software product lines: Comparison of two approaches. Software Quality Journal, 20 (3), 605-643. doi:10.1007/s11219-011-9160-9
Peer reviewed

Xu, D., Thomas, L., Kent, M., Mouelhi, T., & Le Traon, Y. (2012). A Model-Based Approach to Automated Testing of Access Control Policies. Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 100-110. doi:10.1145/2295136.2295173
Peer reviewed

Elrakaiby, Y., Mouelhi, T., & Le Traon, Y. (2012). Testing obligation policy enforcement using mutation analysis. Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012, 673-680. doi:10.1109/ICST.2012.157
Peer reviewed

El Rakaiby, Y., Mouelhi, T., & Le Traon, Y. (2012). Testing Obligation Policy Enforcement using Mutation Analysis. Proceedings of the 7th International Workshop on Mutation Analysis (associated to the Fifth International Conference on Software Testing, Verification, and Validation, ICST 2012), 100-110.
Peer reviewed

Meira, J. A., Almeida, E. C., Le Traon, Y., & Sunye, G. (2012). Peer-to-Peer Load Testing. In Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on (pp. 642-647). IEEE. doi:10.1109/ICST.2012.153
Peer reviewed

Elkateb, D., Mouelhi, T., Le Traon, Y., Hwang, J., & Xie, T. (2012). Refactoring Access Control Policies for Performance Improvement. Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (ICPE 2012), 100-110.
Peer reviewed

Bartel, A., Klein, J., Monperrus, M., Allix, K., & Le Traon, Y. (2012). In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/25161.

Dhaussy, P., Boniol, F., Roger, J.-C., Raji, A., Le Traon, Y., & Baudry, B. I. (2012). Formalisation de contextes et d'exigences pour la validation formelle de logiciels embarqués. TSI. Technique et science informatiques, 31 (6), 797--825.
Peer reviewed

Bartel, A., Klein, J., Monperrus, M., Allix, K., & Le Traon, Y. (2012). Improving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation. Luxembourg, Unknown/unspecified: uni.lu.

Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (2012). Dexpler: Converting Android Dalvik Bytecode to Jimple for Static Analysis with Soot. In ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2012) (pp. 1-12). doi:10.1145/2259051.2259056
Peer reviewed

Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (2012). Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android. In IEEE/ACM International Conference on Automated Software Engineering (pp. 1-4). doi:10.1145/2351676.2351722
Peer reviewed

Papadakis, M., & Le Traon, Y. (2012). Using Mutants to Locate "Unknown" Faults. In ICST 2012. doi:10.1109/ICST.2012.159
Peer reviewed

Henard, C., Papadakis, M., Perrouin, G., Klein, J., Heymans, P., & Le Traon, Y. (2012). Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Suites for Large Software Product Lines. Technical Report.

Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (2011). Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android. In Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android (Tech Report) (pp. 1-11). Tech Report.

Bartel, A., Baudry, B., Munoz, F., Klein, J., Mouelhi, T., & Le Traon, Y. (2011). Model Driven Mutation Applied to Adaptative Systems Testing. 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops. doi:10.1109/ICSTW.2011.24
Peer reviewed

Perrouin, G., Sen, S., Klein, J., Baudry, B., & Le Traon, Y. (2010). Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines. International Conference on Software Test and Validation. doi:10.1109/ICST.2010.43
Peer reviewed

Contact ORBilu