default search action
Kevin Allix
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Tiezhu Sun, Nadia Daoudi, Kisub Kim, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
DetectBERT: Towards Full App-Level Representation Learning to Detect Android Malware. ESEM 2024: 420-426 - [c23]Marco Alecci, Pedro Jesús Ruiz Jiménez, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
AndroZoo: A Retrospective with a Glimpse into the Future. MSR 2024: 389-393 - [c22]Tiezhu Sun, Weiguo Pian, Nadia Daoudi, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
LaFiCMIL: Rethinking Large File Classification from the Perspective of Correlated Multiple Instance Learning. NLDB (1) 2024: 62-77 - [i9]Tiezhu Sun, Nadia Daoudi, Kisub Kim, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
DetectBERT: Towards Full App-Level Representation Learning to Detect Android Malware. CoRR abs/2408.16353 (2024) - 2023
- [j8]Nadia Daoudi, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
Assessing the opportunity of combining state-of-the-art Android malware detectors. Empir. Softw. Eng. 28(1): 22 (2023) - [j7]Tiezhu Sun, Kevin Allix, Kisub Kim, Xin Zhou, Dongsun Kim, David Lo, Tegawendé F. Bissyandé, Jacques Klein:
DexBERT: Effective, Task-Agnostic and Fine-Grained Representation Learning of Android Bytecode. IEEE Trans. Software Eng. 49(10): 4691-4706 (2023) - [c21]Nadia Daoudi, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
Guided Retraining to Enhance the Detection of Difficult Android Malware. ISSTA 2023: 1131-1143 - [c20]Cedric Lothritz, Bertrand Lebichot, Kevin Allix, Saad Ezzini, Tegawendé F. Bissyandé, Jacques Klein, Andrey Boytsov, Clément Lefebvre, Anne Goujon:
Evaluating the Impact of Text De-Identification on Downstream NLP Tasks. NoDaLiDa 2023: 10-16 - [i8]Tiezhu Sun, Weiguo Pian, Nadia Daoudi, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
LaFiCMIL: Rethinking Large File Classification from the Perspective of Correlated Multiple Instance Learning. CoRR abs/2308.01413 (2023) - 2022
- [j6]Arthur D. Sawadogo, Tegawendé F. Bissyandé, Naouel Moha, Kevin Allix, Jacques Klein, Li Li, Yves Le Traon:
SSPCatcher: Learning to catch security patches. Empir. Softw. Eng. 27(6): 151 (2022) - [j5]Nadia Daoudi, Kevin Allix, Tegawendé François D. Assise Bissyandé, Jacques Klein:
A Deep Dive Inside DREBIN: An Explorative Analysis beyond Android Malware Detection Scores. ACM Trans. Priv. Secur. 25(2): 13:1-13:28 (2022) - [c19]Badr Souani, Ahmed Khanfir, Alexandre Bartel, Kevin Allix, Yves Le Traon:
Android Malware Detection Using BERT. ACNS Workshops 2022: 575-591 - [c18]Yusuf Arslan, Bertrand Lebichot, Kevin Allix, Lisa Veiber, Clément Lefebvre, Andrey Boytsov, Anne Goujon, Tegawendé F. Bissyandé, Jacques Klein:
Towards Refined Classifications Driven by SHAP Explanations. CD-MAKE 2022: 68-81 - [c17]Yusuf Arslan, Bertrand Lebichot, Kevin Allix, Lisa Veiber, Clément Lefebvre, Andrey Boytsov, Anne Goujon, Tegawendé F. Bissyandé, Jacques Klein:
On the Suitability of SHAP Explanations for Refining Classifications. ICAART (3) 2022: 395-402 - [c16]Yusuf Arslan, Kevin Allix, Clément Lefebvre, Andrey Boytsov, Tegawendé F. Bissyandé, Jacques Klein:
Exploiting Prototypical Explanations for Undersampling Imbalanced Datasets. ICMLA 2022: 1449-1454 - [c15]Jordan Samhi, Jun Gao, Nadia Daoudi, Pierre Graux, Henri Hoyez, Xiaoyu Sun, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
JuCify: A Step Towards Android Code Unification for Enhanced Static Analysis. ICSE 2022: 1232-1244 - [c14]Cedric Lothritz, Bertrand Lebichot, Kevin Allix, Lisa Veiber, Tegawendé F. Bissyandé, Jacques Klein, Andrey Boytsov, Clément Lefebvre, Anne Goujon:
LuxemBERT: Simple and Practical Data Augmentation in Language Model Pre-Training for Luxembourgish. LREC 2022: 5080-5089 - [c13]Boladji Vinny Adjibi, Fatou Ndiaye Mbodji, Tegawendé F. Bissyandé, Kevin Allix, Jacques Klein:
The Devil is in the Details: Unwrapping the Cryptojacking Malware Ecosystem on Android. SCAM 2022: 153-163 - [i7]Nadia Daoudi, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
A two-steps approach to improve the performance of Android malware detectors. CoRR abs/2205.08265 (2022) - [i6]Tiezhu Sun, Kevin Allix, Kisub Kim, Xin Zhou, Dongsun Kim, David Lo, Tegawendé F. Bissyandé, Jacques Klein:
A Pre-Trained BERT Model for Android Applications. CoRR abs/2212.05976 (2022) - 2021
- [j4]Timothée Riom, Arthur D. Sawadogo, Kevin Allix, Tegawendé F. Bissyandé, Naouel Moha, Jacques Klein:
Revisiting the VCCFinder approach for the identification of vulnerability-contributing commits. Empir. Softw. Eng. 26(3): 46 (2021) - [j3]Jordan Samhi, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
A first look at Android applications in Google Play related to COVID-19. Empir. Softw. Eng. 26(4): 57 (2021) - [j2]Nadia Daoudi, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
Lessons Learnt on Reproducibility in Machine Learning Based Android Malware Detection. Empir. Softw. Eng. 26(4): 74 (2021) - [c12]Tiezhu Sun, Nadia Daoudi, Kevin Allix, Tegawendé F. Bissyandé:
Android Malware Detection: Looking beyond Dalvik Bytecode. ASE Workshops 2021: 34-39 - [c11]Cedric Lothritz, Kevin Allix, Bertrand Lebichot, Lisa Veiber, Tegawendé F. Bissyandé, Jacques Klein:
Comparing MultiLingual and Multiple MonoLingual Models for Intent Classification and Slot Filling. NLDB 2021: 367-375 - [c10]Yusuf Arslan, Kevin Allix, Lisa Veiber, Cedric Lothritz, Tegawendé F. Bissyandé, Jacques Klein, Anne Goujon:
A Comparison of Pre-Trained Language Models for Multi-Class Text Classification in the Financial Domain. WWW (Companion Volume) 2021: 260-268 - [i5]Nadia Daoudi, Jordan Samhi, Abdoul Kader Kaboré, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection based on Image Representation of Bytecode. CoRR abs/2109.03326 (2021) - [i4]Jordan Samhi, Jun Gao, Nadia Daoudi, Pierre Graux, Henri Hoyez, Xiaoyu Sun, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
JuCify: A Step Towards Android Code Unification for Enhanced Static Analysis. CoRR abs/2112.10469 (2021) - 2020
- [c9]Cedric Lothritz, Kevin Allix, Lisa Veiber, Tegawendé F. Bissyandé, Jacques Klein:
Evaluating Pretrained Transformer-based Models on the Task of Fine-Grained Named Entity Recognition. COLING 2020: 3750-3760 - [c8]Lisa Veiber, Kevin Allix, Yusuf Arslan, Tegawendé F. Bissyandé, Jacques Klein:
Challenges Towards Production-Ready Explainable Machine Learning. OpML 2020 - [i3]Arthur D. Sawadogo, Tegawendé F. Bissyandé, Naouel Moha, Kevin Allix, Jacques Klein, Li Li, Yves Le Traon:
Learning to Catch Security Patches. CoRR abs/2001.09148 (2020) - [i2]Jordan Samhi, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
A First Look at Android Applications in Google Play related to Covid-19. CoRR abs/2006.11002 (2020)
2010 – 2019
- 2016
- [j1]Kevin Allix, Tegawendé F. Bissyandé, Quentin Jérome, Jacques Klein, Radu State, Yves Le Traon:
Empirical assessment of machine learning-based malware detectors for Android - Measuring the gap between in-the-lab and in-the-wild validation scenarios. Empir. Softw. Eng. 21(1): 183-211 (2016) - [c7]Médéric Hurier, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. DIMVA 2016: 142-162 - [c6]Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
AndroZoo: collecting millions of Android apps for the research community. MSR 2016: 468-471 - 2015
- [b1]Kevin Allix:
Challenges and Outlook in Machine Learning-based Malware Detection for Android. University of Luxembourg, 2015 - [c5]Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. ESSoS 2015: 51-67 - [c4]Li Li, Kevin Allix, Daoyuan Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein:
Potential Component Leaks in Android Apps: An Investigation into a New Feature Set for Malware Detection. QRS 2015: 195-200 - 2014
- [c3]Kevin Allix, Tegawendé F. Bissyandé, Quentin Jérome, Jacques Klein, Radu State, Yves Le Traon:
Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality. CODASPY 2014: 163-166 - [c2]Kevin Allix, Quentin Jérome, Tegawendé F. Bissyandé, Jacques Klein, Radu State, Yves Le Traon:
A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected? COMPSAC 2014: 384-393 - [c1]Quentin Jérome, Kevin Allix, Radu State, Thomas Engel:
Using opcode-sequences to detect malicious Android applications. ICC 2014: 914-919 - 2012
- [i1]Alexandre Bartel, Jacques Klein, Martin Monperrus, Kevin Allix, Yves Le Traon:
Improving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation. CoRR abs/1208.4536 (2012)
Coauthor Index
aka: Tegawendé François D. Assise Bissyandé
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint