kevin allix
kevin allix
Vahvistettu sähköpostiosoite verkkotunnuksessa uni.lu
Nimike
Viittaukset
Viittaukset
Vuosi
Androzoo: Collecting millions of android apps for the research community
K Allix, TF Bissyandé, J Klein, Y Le Traon
2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR …, 2016
3952016
Empirical assessment of machine learning-based malware detectors for Android
K Allix, TF Bissyandé, Q Jérome, J Klein, Y Le Traon
Empirical Software Engineering 21 (1), 183-211, 2016
104*2016
Using opcode-sequences to detect malicious Android applications
Q Jerome, K Allix, R State, T Engel
2014 IEEE International Conference on Communications (ICC), 914-919, 2014
532014
A Forensic Analysis of Android Malware--How is Malware Written and How it Could Be Detected?
K Allix, Q Jérome, TF Bissyandé, J Klein, R State, Y Le Traon
2014 IEEE 38th Annual Computer Software and Applications Conference, 384-393, 2014
512014
Are your training datasets yet relevant?
K Allix, TF Bissyandé, J Klein, Y Le Traon
International Symposium on Engineering Secure Software and Systems, 51-67, 2015
502015
On the lack of consensus in anti-virus decisions: Metrics and insights on building ground truths of android malware
M Hurier, K Allix, TF Bissyandé, J Klein, Y Le Traon
International Conference on Detection of Intrusions and Malware, and …, 2016
392016
Improving privacy on android smartphones through in-vivo bytecode instrumentation
A Bartel, J Klein, M Monperrus, K Allix, Y Le Traon
University of Luxembourg, 2012
332012
Potential component leaks in Android apps: An investigation into a new feature set for malware detection
L Li, K Allix, D Li, A Bartel, TF Bissyandé, J Klein
2015 IEEE International Conference on Software Quality, Reliability and …, 2015
272015
Machine learning-based malware detection for Android applications: History matters!
K Allix, TFDA Bissyande, J Klein, Y Le Traon
University of Luxembourg, SnT, 2014
232014
Large-scale machine learning-based malware detection: confronting the" 10-fold cross validation" scheme with reality
K Allix, TF Bissyandé, Q Jérome, J Klein, R State, Y Le Traon
Proceedings of the 4th ACM conference on Data and application security and …, 2014
212014
Learning to Catch Security Patches
AD Sawadogo, TF Bissyandé, N Moha, K Allix, J Klein, L Li, YL Traon
arXiv preprint arXiv:2001.09148, 2020
32020
In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments
A Bartel, J Klein, M Monperrus, K Allix, YL Traon
arXiv preprint arXiv:1208.4536, 2012
32012
A first look at Android applications in Google Play related to COVID-19
J Samhi, K Allix, TF Bissyandé, J Klein
Empirical Software Engineering 26 (4), 1-49, 2021
22021
Challenges and Outlook in Machine Learning-based Malware Detection for Android
K Allix
University of Luxembourg, Luxembourg, Luxembourg, 2015
22015
A study of potential component leaks in android apps
L Li, K Allix, D Li, A Bartel, TFDA Bissyande, J Klein
SnT Centre-University of Luxembourg, 2015
22015
Challenges Towards Production-Ready Explainable Machine Learning
L Veiber, K Allix, Y Arslan, TF Bissyandé, J Klein
2020 {USENIX} Conference on Operational Machine Learning (OpML 20), 2020
12020
Revisiting the VCCFinder approach for the identification of vulnerability-contributing commits
T Riom, A Sawadogo, K Allix, TF Bissyandé, N Moha, J Klein
Empirical Software Engineering 26 (3), 1-30, 2021
2021
Evaluating Pretrained Transformer-based Models on the Task of Fine-Grained Named Entity Recognition
C Lothritz, K Allix, L Veiber, J Klein, TFDA Bissyande
Proceedings of the 28th International Conference on Computational …, 2020
2020
Appreciation to Empirical Software Engineering Reviewers of 2018
R Abdalkareem, P Abrahamsson, R Abreu, B Adams, N Ali, N bin Ali, N Ali, ...
Empirical Software Engineering 24, 1-6, 2019
2019
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–19