kevin allix
kevin allix
Email verificata su uni.lu
Titolo
Citata da
Citata da
Anno
Androzoo: Collecting millions of android apps for the research community
K Allix, TF Bissyandé, J Klein, Y Le Traon
2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR …, 2016
3842016
Empirical assessment of machine learning-based malware detectors for Android
K Allix, TF Bissyandé, Q Jérome, J Klein, Y Le Traon
Empirical Software Engineering 21 (1), 183-211, 2016
932016
Using opcode-sequences to detect malicious Android applications
Q Jerome, K Allix, R State, T Engel
2014 IEEE International Conference on Communications (ICC), 914-919, 2014
512014
Are your training datasets yet relevant?
K Allix, TF Bissyandé, J Klein, Y Le Traon
International Symposium on Engineering Secure Software and Systems, 51-67, 2015
502015
A Forensic Analysis of Android Malware--How is Malware Written and How it Could Be Detected?
K Allix, Q Jérome, TF Bissyandé, J Klein, R State, Y Le Traon
2014 IEEE 38th Annual Computer Software and Applications Conference, 384-393, 2014
472014
On the lack of consensus in anti-virus decisions: Metrics and insights on building ground truths of android malware
M Hurier, K Allix, TF Bissyandé, J Klein, Y Le Traon
International Conference on Detection of Intrusions and Malware, and …, 2016
392016
Improving privacy on android smartphones through in-vivo bytecode instrumentation
A Bartel, J Klein, M Monperrus, K Allix, Y Le Traon
University of Luxembourg, 2012
332012
Potential component leaks in Android apps: An investigation into a new feature set for malware detection
L Li, K Allix, D Li, A Bartel, TF Bissyandé, J Klein
2015 IEEE International Conference on Software Quality, Reliability and …, 2015
252015
Machine learning-based malware detection for Android applications: History matters!
K Allix, TFDA Bissyande, J Klein, Y Le Traon
University of Luxembourg, SnT, 2014
222014
Large-scale machine learning-based malware detection: confronting the" 10-fold cross validation" scheme with reality
K Allix, TF Bissyandé, Q Jérome, J Klein, R State, Y Le Traon
Proceedings of the 4th ACM conference on Data and application security and …, 2014
182014
Radu State, and Yves Le Traon. Empirical assessment of machine learning-based malware detectors for android
K Allix, TF Bissyandé, Q Jérome, J Klein
Empirical Software Engineering 21 (1), 2014
122014
State R, Le Traon Y (2014b) A forensic analysis of android malware: How is malware written and how it could be detected
K Allix, Q Jérome, TF Bissyandé, J Klein
Computer software and applications conference (COMPSAC), 0
4
Learning to Catch Security Patches
AD Sawadogo, TF Bissyandé, N Moha, K Allix, J Klein, L Li, YL Traon
arXiv preprint arXiv:2001.09148, 2020
32020
In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments
A Bartel, J Klein, M Monperrus, K Allix, YL Traon
arXiv preprint arXiv:1208.4536, 2012
32012
A First Look at Android Applications in Google Play related to Covid-19
J Samhi, K Allix, TF Bissyandé, J Klein
arXiv preprint arXiv:2006.11002, 2020
22020
A study of potential component leaks in android apps
L Li, K Allix, D Li, A Bartel, TFDA Bissyande, J Klein
SnT Centre-University of Luxembourg, 2015
22015
Radu State, and Yves Le Traon. Large-scale machine learning-based malware detection: Confronting the 10-fold cross validation scheme with reality
K Allix, T Bissyandé, Q Jérome, J Klein
Proceedings of the Conference on Data and Application Security and Privacy, 2014
22014
Challenges Towards Production-Ready Explainable Machine Learning
L Veiber, K Allix, Y Arslan, TF Bissyandé, J Klein
2020 {USENIX} Conference on Operational Machine Learning (OpML 20), 2020
12020
Challenges and Outlook in Machine Learning-based Malware Detection for Android
K Allix
University of Luxembourg, Luxembourg, Luxembourg, 2015
12015
Revisiting the VCCFinder approach for the identification of vulnerability-contributing commits
T Riom, A Sawadogo, K Allix, TF Bissyandé, N Moha, J Klein
Empirical Software Engineering 26 (3), 1-30, 2021
2021
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20