Li, D., Li, L., Kim, D., Bissyande, T. F. D. A., Lo, D., & Le Traon, Y. (2019). Watch out for This Commit! A Study of Influential Software Changes. Journal of Software: Evolution and Process. doi:10.1002/smr.2181 Peer reviewed |
Li, D., Lin, J., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification. In 21st International Conference on Extending Database Technology. Peer reviewed |
Li, D. (2018). Transforming Time Series for Efficient and Accurate Classification [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/34046 |
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017). On Locating Malicious Code in Piggybacked Android Apps. Journal of Computer Science and Technology. doi:10.1007/s11390-017-1786-z Peer reviewed |
Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Schummer, P., Muller, B., & Solvi, A.-M. (2017). Towards a Plug-and-Play and Holistic Data Mining Framework for Understanding and Facilitating Operations in Smart Buildings. (TR-SNT-2017-5). SnT. |
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (May 2017). Understanding Android App Piggybacking [Poster presentation]. The 39th International Conference on Software Engineering. |
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017). Automatically Locating Malicious Packages in Piggybacked Android Apps. Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017). Peer reviewed |
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2017). Sensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements. In The 32nd ACM Symposium on Applied Computing (SAC 2017). doi:10.1145/3019612.3019699 Peer reviewed |
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (2017). Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2017.2656460 Peer reviewed |
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo-NG: A Practical Language Modeling Approach for Time Series Classification. In The 15th International Symposium on Intelligent Data Analysis. Peer reviewed |
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (September 2016). Time Series Classification with Discrete Wavelet Transformed Data. International Journal of Software Engineering and Knowledge Engineering, 26 (9&10), 1361–1377. doi:10.1142/S0218194016400088 Peer Reviewed verified by ORBi |
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study. In The 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016). Peer reviewed |
Li, D., Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo: A Language Modeling Approach for Time Series Classification. In 12th International Conference on Machine Learning and Data Mining (MLDM 2016). Peer reviewed |
Li, L., Li, D., Bissyande, T. F. D. A., Lo, D., Klein, J., & Le Traon, Y. (2016). Ungrafting Malicious Code from Piggybacked Android Apps. SnT. |
Li, L., Li, D., BARTEL, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Towards a Generic Framework for Automating Extensive Analysis of Android Applications. In The 31st ACM/SIGAPP Symposium on Applied Computing (SAC 2016). Peer reviewed |
Li, D., Bissyande, T. F. D. A., Kubler, S., Klein, J., & Le Traon, Y. (2016). Profiling household appliance electricity usage with n-gram language modeling. In The 2016 IEEE International Conference on Industrial Technology (ICIT 2016). Peer reviewed |
Li, L., Allix, K., Li, D., BARTEL, A., Bissyande, T. F. D. A., & Klein, J. (2015). Potential Component Leaks in Android Apps: An Investigation into a new Feature Set for Malware Detection. In The 2015 IEEE International Conference on Software Quality, Reliability and Security (QRS 2015). doi:10.1109/QRS.2015.36 Peer reviewed |
Li, L., Allix, K., Li, D., BARTEL, A., Bissyande, T. F. D. A., & Klein, J. (2015). A Study of Potential Component Leaks in Android Apps. SnT Centre - University of Luxembourg. |