default search action
Yves Le Traon
Person information
- affiliation: University of Luxembourg, Interdisciplinary Centre for Security, Reliability and Trust (SnT)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j120]Nima Nasiri, Saeed Zeynali, Sajad Najafi Ravadanegh, Sylvain Kubler, Yves Le Traon:
Decentralized Privacy-Preserving Distributionally Robust Restoration of Electricity/Natural-Gas Systems Considering Coordination of Pump Storage Hydropower and Wind Farms. IEEE Access 12: 13747-13762 (2024) - [j119]Kisub Kim, Sankalp Ghatpande, Dongsun Kim, Xin Zhou, Kui Liu, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Big Code Search: A Bibliography. ACM Comput. Surv. 56(1): 25:1-25:49 (2024) - [j118]Xueqi Dang, Yinghua Li, Wei Ma, Yuejun Guo, Qiang Hu, Mike Papadakis, Maxime Cordy, Yves Le Traon:
Towards Exploring the Limitations of Test Selection Techniques on Graph Neural Networks: An Empirical Study. Empir. Softw. Eng. 29(5): 112 (2024) - [j117]Marcelo Luis Ruiz Rodríguez, Sylvain Kubler, Jérémy Robert, Yves Le Traon:
Dynamic maintenance scheduling approach under uncertainty: Comparison between reinforcement learning, genetic algorithm simheuristic, dispatching rules. Expert Syst. Appl. 248: 123404 (2024) - [j116]Sai Sathiesh Rajan, Ezekiel O. Soremekun, Yves Le Traon, Sudipta Chattopadhyay:
Distribution-aware fairness test generation. J. Syst. Softw. 215: 112090 (2024) - [j115]Zeming Dong, Qiang Hu, Zhenya Zhang, Yuejun Guo, Maxime Cordy, Mike Papadakis, Yves Le Traon, Jianjun Zhao:
On the effectiveness of hybrid pooling in mixup-based graph learning for language processing. J. Syst. Softw. 216: 112139 (2024) - [j114]Yves Le Traon, Tao Xie:
Test case prioritization and mutation testing. Softw. Test. Verification Reliab. 34(1) (2024) - [j113]Yves Le Traon, Tao Xie:
Bud hunting with directed fuzz testing and source code vulnerability detection with advanced graph neural networks. Softw. Test. Verification Reliab. 34(2) (2024) - [j112]Yves Le Traon, Tao Xie:
Test code evolution and mutation testing. Softw. Test. Verification Reliab. 34(3) (2024) - [j111]Yves Le Traon, Tao Xie:
Investigating fault injection techniques in hardware-based deep neural networks and mutation-based fault localization. Softw. Test. Verification Reliab. 34(4) (2024) - [j110]Yves Le Traon, Tao Xie:
Unsafe code detection in Rust and metamorphic testing of autonomous driving systems. Softw. Test. Verification Reliab. 34(5) (2024) - [j109]Yves Le Traon, Tao Xie:
Fault tolerance and metamorphic relation prediction. Softw. Test. Verification Reliab. 34(6) (2024) - [j108]Yves Le Traon, Tao Xie:
Metamorphic Testing and Web Element Localization. Softw. Test. Verification Reliab. 34(7) (2024) - [j107]Yves Le Traon, Tao Xie:
DNN Testing, Regression Testing and Software Reliability Prediction. Softw. Test. Verification Reliab. 34(8) (2024) - [j106]Haroon Elahi, Guojun Wang, Wenjun Jiang, Alexandre Bartel, Yves Le Traon:
A Qualitative Study of App Acquisition and Management. IEEE Trans. Comput. Soc. Syst. 11(2): 1907-1925 (2024) - [j105]Xueqi Dang, Yinghua Li, Mike Papadakis, Jacques Klein, Tegawendé F. Bissyandé, Yves Le Traon:
GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks. ACM Trans. Softw. Eng. Methodol. 33(1): 22:1-22:40 (2024) - [j104]Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Mike Papadakis, Yves Le Traon:
LaF: Labeling-free Model Selection for Automated Deep Neural Network Reusing. ACM Trans. Softw. Eng. Methodol. 33(1): 25:1-25:28 (2024) - [j103]Yuejun Guo, Qiang Hu, Xiaofei Xie, Maxime Cordy, Mike Papadakis, Yves Le Traon:
KAPE: kNN-based Performance Testing for Deep Code Search. ACM Trans. Softw. Eng. Methodol. 33(2): 48:1-48:24 (2024) - [j102]Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon:
Test Optimization in DNN Testing: A Survey. ACM Trans. Softw. Eng. Methodol. 33(4): 111:1-111:42 (2024) - [j101]Yinghua Li, Xueqi Dang, Lei Ma, Jacques Klein, Yves Le Traon, Tegawendé F. Bissyandé:
Test Input Prioritization for 3D Point Clouds. ACM Trans. Softw. Eng. Methodol. 33(5): 132:1-132:44 (2024) - [j100]Xueqi Dang, Yinghua Li, Mike Papadakis, Jacques Klein, Tegawendé F. Bissyandé, Yves Le Traon:
Test Input Prioritization for Machine Learning Classifiers. IEEE Trans. Software Eng. 50(3): 413-442 (2024) - [j99]Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon:
Active Code Learning: Benchmarking Sample-Efficient Training of Code Models. IEEE Trans. Software Eng. 50(5): 1080-1095 (2024) - [c257]Chaimaa Medjadji, Guilain Leduc, Sylvain Kubler, Yves Le Traon:
Centralized vs Decentralized Federated Learning: A trade-off performance analysis. FiCloud 2024: 69-76 - [c256]Luiz Carvalho, Renzo Degiovanni, Maxime Cordy, Nazareno Aguirre, Yves Le Traon, Mike Papadakis:
SpecBCFuzz: Fuzzing LTL Solvers with Boundary Conditions. ICSE 2024: 123:1-123:13 - [c255]Aayush Garg, Renzo Degiovanni, Mike Papadakis, Yves Le Traon:
On the Coupling between Vulnerabilities and LLM-Generated Mutants: A Study on Vul4J Dataset. ICST 2024: 305-316 - [i84]Pantelis Dogoulis, Matthieu Jimenez, Salah Ghamizi, Maxime Cordy, Yves Le Traon:
Robustness Analysis of AI Models in Critical Energy Systems. CoRR abs/2406.14361 (2024) - 2023
- [j98]Renaud Rwemalika, Sarra Habchi, Mike Papadakis, Yves Le Traon, Marie-Claude Brasseur:
Smells in system user interactive tests. Empir. Softw. Eng. 28(1): 20 (2023) - [j97]Sylvain Kubler, Matthieu Renard, Sankalp Ghatpande, Jean-Philippe Georges, Yves Le Traon:
Decision support system for blockchain (DLT) platform selection based on ITU recommendations: A systematic literature review approach. Expert Syst. Appl. 211: 118704 (2023) - [j96]Yuejun Guo, Qiang Hu, Maxime Cordy, Michail Papadakis, Yves Le Traon:
DRE: density-based data selection with entropy for adversarial-robust deep learning models. Neural Comput. Appl. 35(5): 4009-4026 (2023) - [j95]Joe Lorentz, Thomas Hartmann, Assaad Moawad, François Fouquet, Djamila Aouada, Yves Le Traon:
CalcGraph: taming the high costs of deep learning using models. Softw. Syst. Model. 22(4): 1151-1174 (2023) - [j94]Yves Le Traon, Tao Xie:
Fuzz testing for digital TV receivers and multitasking control software verification. Softw. Test. Verification Reliab. 33(1) (2023) - [j93]Yves Le Traon, Tao Xie:
Model-based testing. Softw. Test. Verification Reliab. 33(2) (2023) - [j92]Yves Le Traon, Tao Xie:
Test infrastructure and environment. Softw. Test. Verification Reliab. 33(3) (2023) - [j91]Yves Le Traon, Tao Xie:
Combinatorial testing and machine learning for automated test generation. Softw. Test. Verification Reliab. 33(4) (2023) - [j90]Yves Le Traon, Tao Xie:
Quality assurance for Internet of Things and speech recognition systems. Softw. Test. Verification Reliab. 33(5) (2023) - [j89]Yves Le Traon, Tao Xie:
Deep neural network supervision and data flow testing. Softw. Test. Verification Reliab. 33(6) (2023) - [j88]Yves Le Traon, Tao Xie:
In vivo testing and integration of proving and testing. Softw. Test. Verification Reliab. 33(7) (2023) - [j87]Yves Le Traon, Tao Xie:
Model-based testing, test case prioritization and testing of virtual reality applications. Softw. Test. Verification Reliab. 33(8) (2023) - [j86]Milos Ojdanic, Ezekiel O. Soremekun, Renzo Degiovanni, Mike Papadakis, Yves Le Traon:
Mutation Testing in Evolving Systems: Studying the Relevance of Mutants to Code Evolution. ACM Trans. Softw. Eng. Methodol. 32(1): 14:1-14:39 (2023) - [j85]Imen Sayar, Alexandre Bartel, Eric Bodden, Yves Le Traon:
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities. ACM Trans. Softw. Eng. Methodol. 32(1): 25:1-25:45 (2023) - [j84]Ahmed Khanfir, Anil Koyuncu, Mike Papadakis, Maxime Cordy, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
iBiR: Bug-report-driven Fault Injection. ACM Trans. Softw. Eng. Methodol. 32(2): 33:1-33:31 (2023) - [j83]Aayush Garg, Milos Ojdanic, Renzo Degiovanni, Thierry Titcheu Chekam, Mike Papadakis, Yves Le Traon:
Cerebro: Static Subsuming Mutant Selection. IEEE Trans. Software Eng. 49(1): 24-43 (2023) - [j82]Milos Ojdanic, Aayush Garg, Ahmed Khanfir, Renzo Degiovanni, Mike Papadakis, Yves Le Traon:
Syntactic Versus Semantic Similarity of Artificial and Real Faults in Mutation Testing Studies. IEEE Trans. Software Eng. 49(7): 3922-3938 (2023) - [c254]Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
On Evaluating Adversarial Robustness of Chest X-ray Classification. SafeAI@AAAI 2023 - [c253]Milos Ojdanic, Ahmed Khanfir, Aayush Garg, Renzo Degiovanni, Mike Papadakis, Yves Le Traon:
On Comparing Mutation Testing Tools through Learning-based Mutant Selection. AST 2023: 35-46 - [c252]Amal Akli, Guillaume Haben, Sarra Habchi, Mike Papadakis, Yves Le Traon:
FlakyCat: Predicting Flaky Tests Categories using Few-Shot Learning. AST 2023: 140-151 - [c251]Qiang Hu, Yuejun Guo, Maxime Cordy, Xiaofei Xie, Wei Ma, Mike Papadakis, Yves Le Traon:
Towards Understanding Model Quantization for Reliable Deep Neural Network Deployment. CAIN 2023: 56-67 - [c250]Jie Zhang, Wei Ma, Qiang Hu, Shangqing Liu, Xiaofei Xie, Yves Le Traon, Yang Liu:
A Black-Box Attack on Code Models via Representation Nearest Neighbor Search. EMNLP (Findings) 2023: 9706-9716 - [c249]Yuejun Guo, Qiang Hu, Qiang Tang, Yves Le Traon:
An Empirical Study of the Imbalance Issue in Software Vulnerability Detection. ESORICS (4) 2023: 371-390 - [c248]Luiz Carvalho, Renzo Degiovanni, Matías Brizzio, Maxime Cordy, Nazareno Aguirre, Yves Le Traon, Mike Papadakis:
ACoRe: Automated Goal-Conflict Resolution. FASE 2023: 3-25 - [c247]Salah Ghamizi, Jingfeng Zhang, Maxime Cordy, Mike Papadakis, Masashi Sugiyama, Yves Le Traon:
GAT: Guided Adversarial Training with Pareto-optimal Auxiliary Tasks. ICML 2023: 11255-11282 - [c246]Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Mike Papadakis, Lei Ma, Yves Le Traon:
CodeS: Towards Code Model Generalization Under Distribution Shift. ICSE (NIER) 2023: 1-6 - [c245]Sai Sathiesh Rajan, Ezekiel O. Soremekun, Sudipta Chattopadhyay, Yves Le Traon:
Poster: Distribution-aware Fairness Test Generation. ICSE Companion 2023: 322-323 - [c244]Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Mike Papadakis, Lei Ma, Yves Le Traon:
Aries: Efficient Testing of Deep Neural Networks via Labeling-Free Accuracy Estimation. ICSE 2023: 1776-1787 - [c243]Yves Le Traon:
AI is a game-changing technology: how to test and robustify Machine-Learning software? ICST 2023: 12 - [c242]Aayush Garg, Renzo Degiovanni, Facundo Molina, Maxime Cordy, Nazareno Aguirre, Mike Papadakis, Yves Le Traon:
Enabling Efficient Assertion Inference. ISSRE 2023: 623-634 - [c241]Qiang Hu, Yuejun Guo, Maxime Cordy, Mike Papadakis, Yves Le Traon:
MUTEN: Mutant-Based Ensembles for Boosting Gradient-Based Adversarial Attack. ASE 2023: 1708-1712 - [c240]Salijona Dyrmishi, Salah Ghamizi, Thibault Simonetto, Yves Le Traon, Maxime Cordy:
On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks. SP 2023: 1384-1400 - [c239]Zeming Dong, Qiang Hu, Yuejun Guo, Maxime Cordy, Mike Papadakis, Zhenya Zhang, Yves Le Traon, Jianjun Zhao:
MixCode: Enhancing Code Classification by Mixup-Based Data Augmentation. SANER 2023: 379-390 - [p4]Jabier Martinez, Tewfik Ziadi, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Bottom-Up Technologies for Reuse: A Framework to Support Extractive Software Product Line Adoption Activities. Handbook of Re-Engineering Software Intensive Systems into Software Product Lines 2023: 355-377 - [i83]Ahmed Khanfir, Renzo Degiovanni, Mike Papadakis, Yves Le Traon:
Efficient Mutation Testing via Pre-Trained Language Models. CoRR abs/2301.03543 (2023) - [i82]Aayush Garg, Renzo Degiovanni, Facundo Molina, Mike Papadakis, Nazareno Aguirre, Maxime Cordy, Yves Le Traon:
Assertion Inferring Mutants. CoRR abs/2301.12284 (2023) - [i81]Salah Ghamizi, Jingfeng Zhang, Maxime Cordy, Mike Papadakis, Masashi Sugiyama, Yves Le Traon:
GAT: Guided Adversarial Training with Pareto-optimal Auxiliary Tasks. CoRR abs/2302.02907 (2023) - [i80]Guillaume Haben, Sarra Habchi, Mike Papadakis, Maxime Cordy, Yves Le Traon:
The Importance of Discerning Flaky from Fault-triggering Test Failures: A Case Study on the Chromium CI. CoRR abs/2302.10594 (2023) - [i79]Aayush Garg, Renzo Degiovanni, Mike Papadakis, Yves Le Traon:
Vulnerability Mimicking Mutants. CoRR abs/2303.04247 (2023) - [i78]Luiz Carvalho, Renzo Degiovanni, Matías Brizzio, Maxime Cordy, Nazareno Aguirre, Yves Le Traon, Mike Papadakis:
ACoRe: Automated Goal-Conflict Resolution. CoRR abs/2303.05213 (2023) - [i77]Zeming Dong, Qiang Hu, Yuejun Guo, Zhenya Zhang, Maxime Cordy, Mike Papadakis, Yves Le Traon, Jianjun Zhao:
Boosting Source Code Learning with Data Augmentation: An Empirical Study. CoRR abs/2303.06808 (2023) - [i76]Martin Gubri, Maxime Cordy, Yves Le Traon:
Going Further: Flatness at the Rescue of Early Stopping for Adversarial Example Transferability. CoRR abs/2304.02688 (2023) - [i75]Jie Zhang, Wei Ma, Qiang Hu, Xiaofei Xie, Yves Le Traon, Yang Liu:
RNNS: Representation Nearest Neighbor Search Black-Box Attack on Code Models. CoRR abs/2305.05896 (2023) - [i74]Sai Sathiesh Rajan, Ezekiel O. Soremekun, Yves Le Traon, Sudipta Chattopadhyay:
Distribution-aware Fairness Test Generation. CoRR abs/2305.13935 (2023) - [i73]Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon:
Active Code Learning: Benchmarking Sample-Efficient Training of Code Models. CoRR abs/2306.01250 (2023) - [i72]Yuejun Guo, Seifeddine Bettaieb, Qiang Hu, Yves Le Traon, Qiang Tang:
CodeLens: An Interactive Tool for Visualizing Code Representations. CoRR abs/2307.14902 (2023) - [i71]Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Wei Ma, Mike Papadakis, Yves Le Traon:
Evaluating the Robustness of Test Selection Methods for Deep Neural Networks. CoRR abs/2308.01314 (2023) - [i70]Salah Ghamizi, Maxime Cordy, Yuejun Guo, Mike Papadakis, Yves Le Traon:
Hazards in Deep Learning Testing: Prevalence, Impact and Recommendations. CoRR abs/2309.05381 (2023) - [i69]Thibault Simonetto, Salah Ghamizi, Antoine Desjardins, Maxime Cordy, Yves Le Traon:
Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data. CoRR abs/2311.04503 (2023) - 2022
- [j81]Arthur D. Sawadogo, Tegawendé F. Bissyandé, Naouel Moha, Kevin Allix, Jacques Klein, Li Li, Yves Le Traon:
SSPCatcher: Learning to catch security patches. Empir. Softw. Eng. 27(6): 151 (2022) - [j80]Aayush Garg, Renzo Degiovanni, Matthieu Jimenez, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Learning from what we know: How to perform vulnerability prediction using noisy historical data. Empir. Softw. Eng. 27(7): 169 (2022) - [j79]Nikolaos Antoniadis, Maxime Cordy, Angelo Sifaleras, Yves Le Traon:
A variable neighborhood search simheuristic algorithm for reliability optimization of smart grids under uncertainty. Int. Trans. Oper. Res. 29(4): 2172-2200 (2022) - [j78]Kisub Kim, Sankalp Ghatpande, Kui Liu, Anil Koyuncu, Dongsun Kim, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
DigBug - Pre/post-processing operator selection for accurate bug localization. J. Syst. Softw. 189: 111300 (2022) - [j77]Marcelo Luis Ruiz Rodríguez, Sylvain Kubler, Andrea de Giorgio, Maxime Cordy, Jérémy Robert, Yves Le Traon:
Multi-agent deep reinforcement learning based Predictive Maintenance on parallel machines. Robotics Comput. Integr. Manuf. 78: 102406 (2022) - [j76]Yves Le Traon, Tao Xie:
Integration testing and metamorphic testing. Softw. Test. Verification Reliab. 32(4) (2022) - [j75]Yves Le Traon, Tao Xie:
Combinatorial testing and model checking. Softw. Test. Verification Reliab. 32(6) (2022) - [j74]Patrick Keller, Abdoul Kader Kaboré, Laura Plein, Jacques Klein, Yves Le Traon, Tegawendé F. Bissyandé:
What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning. ACM Trans. Softw. Eng. Methodol. 31(2): 31:1-31:34 (2022) - [j73]Qiang Hu, Yuejun Guo, Maxime Cordy, Xiaofei Xie, Lei Ma, Mike Papadakis, Yves Le Traon:
An Empirical Study on Data Distribution-Aware Test Selection for Deep Learning Enhancement. ACM Trans. Softw. Eng. Methodol. 31(4): 78:1-78:30 (2022) - [c238]Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Adversarial Robustness in Multi-Task Learning: Promises and Illusions. AAAI 2022: 697-705 - [c237]Badr Souani, Ahmed Khanfir, Alexandre Bartel, Kevin Allix, Yves Le Traon:
Android Malware Detection Using BERT. ACNS Workshops 2022: 575-591 - [c236]Yuejun Guo, Qiang Hu, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Robust active learning: sample-efficient training of robust deep learning models. CAIN 2022: 41-42 - [c235]Adriano Franci, Maxime Cordy, Martin Gubri, Mike Papadakis, Yves Le Traon:
Influence-driven data poisoning in graph-based semi-supervised classifiers. CAIN 2022: 77-87 - [c234]Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen:
LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity. ECCV (4) 2022: 603-618 - [c233]Sarra Habchi, Guillaume Haben, Jeongju Sohn, Adriano Franci, Mike Papadakis, Maxime Cordy, Yves Le Traon:
What Made This Test Flake? Pinpointing Classes Responsible for Test Flakiness. ICSME 2022: 352-363 - [c232]Sarra Habchi, Guillaume Haben, Mike Papadakis, Maxime Cordy, Yves Le Traon:
A Qualitative Study on the Sources, Impacts, and Mitigation Strategies of Flaky Tests. ICST 2022: 244-255 - [c231]Thibault Simonetto, Salijona Dyrmishi, Salah Ghamizi, Maxime Cordy, Yves Le Traon:
A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space. IJCAI 2022: 1313-1319 - [c230]Wei Ma, Mengjie Zhao, Ezekiel O. Soremekun, Qiang Hu, Jie M. Zhang, Mike Papadakis, Maxime Cordy, Xiaofei Xie, Yves Le Traon:
GraphCode2Vec: Generic Code Embedding via Lexical and Program Dependence Analyses. MSR 2022: 524-536 - [c229]Ahmed Khanfir, Matthieu Jimenez, Mike Papadakis, Yves Le Traon:
CodeBERT-nt: Code Naturalness via CodeBERT. QRS 2022: 936-947 - [c228]Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen:
Efficient and transferable adversarial examples from bayesian neural networks. UAI 2022: 738-748 - [i68]Salijona Dyrmishi, Salah Ghamizi, Thibault Simonetto, Yves Le Traon, Maxime Cordy:
On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks. CoRR abs/2202.03277 (2022) - [i67]Yuejun Guo, Qiang Hu, Maxime Cordy, Xiaofei Xie, Mike Papadakis, Yves Le Traon:
Labeling-Free Comparison Testing of Deep Learning Models. CoRR abs/2204.03994 (2022) - [i66]Qiang Hu, Yuejun Guo, Maxime Cordy, Xiaofei Xie, Wei Ma, Mike Papadakis, Yves Le Traon:
Characterizing and Understanding the Behavior of Quantized Models for Reliable Deployment. CoRR abs/2204.04220 (2022) - [i65]Ezekiel O. Soremekun, Mike Papadakis, Maxime Cordy, Yves Le Traon:
Software Fairness: An Analysis and Survey. CoRR abs/2205.08809 (2022) - [i64]Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon:
CodeS: A Distribution Shift Benchmark Dataset for Source Code Learning. CoRR abs/2206.05480 (2022) - [i63]Sarra Habchi, Guillaume Haben, Jeongju Sohn, Adriano Franci, Mike Papadakis, Maxime Cordy, Yves Le Traon:
What Made This Test Flake? Pinpointing Classes Responsible for Test Flakiness. CoRR abs/2207.10143 (2022) - [i62]Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon:
Efficient Testing of Deep Neural Networks via Decision Boundary Analysis. CoRR abs/2207.10942 (2022) - [i61]Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen:
LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity. CoRR abs/2207.13129 (2022) - [i60]Ahmed Khanfir, Matthieu Jimenez, Mike Papadakis, Yves Le Traon:
CodeBERT-nt: code naturalness via CodeBERT. CoRR abs/2208.06042 (2022) - [i59]Imen Sayar, Alexandre Bartel, Eric Bodden, Yves Le Traon:
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities. CoRR abs/2208.08173 (2022) - [i58]Amal Akli, Guillaume Haben, Sarra Habchi, Mike Papadakis, Yves Le Traon:
Predicting Flaky Tests Categories using Few-Shot Learning. CoRR abs/2208.14799 (2022) - [i57]Zeming Dong, Qiang Hu, Yuejun Guo, Maxime Cordy, Mike Papadakis, Yves Le Traon, Jianjun Zhao:
Enhancing Code Classification by Mixup-Based Data Augmentation. CoRR abs/2210.03003 (2022) - [i56]Zeming Dong, Qiang Hu, Yuejun Guo, Maxime Cordy, Mike Papadakis, Yves Le Traon, Jianjun Zhao:
Enhancing Mixup-Based Graph Learning for Language Processing via Hybrid Pooling. CoRR abs/2210.03123 (2022) - [i55]Salah Ghamizi, Maxime Cordy, Michail Papadakis, Yves Le Traon:
On Evaluating Adversarial Robustness of Chest X-ray Classification: Pitfalls and Best Practices. CoRR abs/2212.08130 (2022) - 2021
- [j72]Julien Polge, Sankalp Ghatpande, Sylvain Kubler, Jérémy Robert, Yves Le Traon:
BlockPerf: A Hybrid Blockchain Emulator/Simulator Framework. IEEE Access 9: 107858-107872 (2021) - [j71]Julien Polge, Jérémy Robert, Yves Le Traon:
Permissioned blockchain frameworks in the industry: A comparison. ICT Express 7(2): 229-233 (2021) - [j70]Paul-Lou Benedick, Jérémy Robert, Yves Le Traon:
A Systematic Approach for Evaluating Artificial Intelligence Models in Industrial Settings. Sensors 21(18): 6195 (2021) - [j69]Wei Ma, Mike Papadakis, Anestis Tsakmalis, Maxime Cordy, Yves Le Traon:
Test Selection for Deep Learning Systems. ACM Trans. Softw. Eng. Methodol. 30(2): 13:1-13:22 (2021) - [j68]Thierry Titcheu Chekam, Mike Papadakis, Maxime Cordy, Yves Le Traon:
Killing Stubborn Mutants with Symbolic Execution. ACM Trans. Softw. Eng. Methodol. 30(2): 19:1-19:23 (2021) - [j67]T. H. Tse, Yves Le Traon, Zhenyu Chen:
Guest Editorial: A Retrospective of Special Sections on Software Testing and Program Analysis. IEEE Trans. Reliab. 70(2): 443-445 (2021) - [j66]Kui Liu, Dongsun Kim, Tegawendé F. Bissyandé, Shin Yoo, Yves Le Traon:
Mining Fix Patterns for FindBugs Violations. IEEE Trans. Software Eng. 47(1): 165-188 (2021) - [c227]Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Evasion Attack STeganography: Turning Vulnerability Of Machine Learning To Adversarial Attacks Into A Real-world Application. ICCVW 2021: 31-40 - [c226]Qiang Hu, Yuejun Guo, Maxime Cordy, Xiaofei Xie, Wei Ma, Mike Papadakis, Yves Le Traon:
Towards Exploring the Limitations of Active Learning: An Empirical Study. ASE 2021: 917-929 - [c225]Guillaume Haben, Sarra Habchi, Mike Papadakis, Maxime Cordy, Yves Le Traon:
A Replication Study on the Usability of Code Vocabulary in Predicting Flaky Tests. MSR 2021: 219-229 - [c224]William Bonnaventure, Ahmed Khanfir, Alexandre Bartel, Mike Papadakis, Yves Le Traon:
Confuzzion: A Java Virtual Machine Fuzzer for Type Confusion Vulnerabilities. QRS 2021: 586-597 - [i54]Sarra Habchi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
On the Use of Mutation in Injecting Test Order-Dependency. CoRR abs/2104.07441 (2021) - [i53]Yuejun Guo, Qiang Hu, Maxime Cordy, Michail Papadakis, Yves Le Traon:
MUTEN: Boosting Gradient-Based Adversarial Attacks via Mutant-Based Ensembles. CoRR abs/2109.12838 (2021) - [i52]Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Adversarial Robustness in Multi-Task Learning: Promises and Illusions. CoRR abs/2110.15053 (2021) - [i51]Renaud Rwemalika, Sarra Habchi, Mike Papadakis, Yves Le Traon, Marie-Claude Brasseur:
Smells in System User Interactive Tests. CoRR abs/2111.02317 (2021) - [i50]Guillaume Haben, Sarra Habchi, Mike Papadakis, Maxime Cordy, Yves Le Traon:
Discerning Legitimate Failures From False Alerts: A Study of Chromium's Continuous Integration. CoRR abs/2111.03382 (2021) - [i49]Thibault Simonetto, Salijona Dyrmishi, Salah Ghamizi, Maxime Cordy, Yves Le Traon:
A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space. CoRR abs/2112.01156 (2021) - [i48]Wei Ma, Mengjie Zhao, Ezekiel O. Soremekun, Qiang Hu, Jie Zhang, Mike Papadakis, Maxime Cordy, Xiaofei Xie, Yves Le Traon:
GraphCode2Vec: Generic Code Embedding via Lexical and Program Dependence Analyses. CoRR abs/2112.01218 (2021) - [i47]Yuejun Guo, Qiang Hu, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Robust Active Learning: Sample-Efficient Training of Robust Deep Learning Models. CoRR abs/2112.02542 (2021) - [i46]Sarra Habchi, Guillaume Haben, Mike Papadakis, Maxime Cordy, Yves Le Traon:
A Qualitative Study on the Sources, Impacts, and Mitigation Strategies of Flaky Tests. CoRR abs/2112.04919 (2021) - [i45]Aayush Garg, Milos Ojdanic, Renzo Degiovanni, Thierry Titcheu Chekam, Mike Papadakis, Yves Le Traon:
Cerebro: Static Subsuming Mutant Selection. CoRR abs/2112.14151 (2021) - [i44]Milos Ojdanic, Aayush Garg, Ahmed Khanfir, Renzo Degiovanni, Mike Papadakis, Yves Le Traon:
Syntactic Vs. Semantic similarity of Artificial and Real Faults in Mutation Testing Studies. CoRR abs/2112.14508 (2021) - [i43]Milos Ojdanic, Ezekiel O. Soremekun, Renzo Degiovanni, Mike Papadakis, Yves Le Traon:
Mutation Testing in Evolving Systems: Studying the relevance of mutants to code evolution. CoRR abs/2112.14566 (2021) - 2020
- [j65]Thierry Titcheu Chekam, Mike Papadakis, Tegawendé F. Bissyandé, Yves Le Traon, Koushik Sen:
Selecting fault revealing mutants. Empir. Softw. Eng. 25(1): 434-487 (2020) - [j64]Anil Koyuncu, Kui Liu, Tegawendé F. Bissyandé, Dongsun Kim, Jacques Klein, Martin Monperrus, Yves Le Traon:
FixMiner: Mining relevant fix patterns for automated program repair. Empir. Softw. Eng. 25(3): 1980-2024 (2020) - [j63]Julien Polge, Jérémy Robert, Yves Le Traon:
A Case Driven Study of the Use of Time Series Classification for Flexibility in Industry 4.0. Sensors 20(24): 7273 (2020) - [c223]Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
FeatureNET: diversity-driven generation of deep learning models. ICSE (Companion Volume) 2020: 41-44 - [c222]Thierry Titcheu Chekam, Mike Papadakis, Yves Le Traon:
Muteria: An Extensible and Flexible Multi-Criteria Software Testing Framework. AST@ICSE 2020: 97-100 - [c221]Kui Liu, Shangwen Wang, Anil Koyuncu, Kisub Kim, Tegawendé F. Bissyandé, Dongsun Kim, Peng Wu, Jacques Klein, Xiaoguang Mao, Yves Le Traon:
On the efficiency of test suite based program repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs. ICSE 2020: 615-627 - [c220]Salah Ghamizi, Renaud Rwemalika, Maxime Cordy, Lisa Veiber, Tegawendé F. Bissyandé, Mike Papadakis, Jacques Klein, Yves Le Traon:
Data-driven Simulation and Optimization for Covid-19 Exit Strategies. KDD 2020: 3434-3442 - [c219]Nikolaos Antoniadis, Maxime Cordy, Angelo Sifaleras, Yves Le Traon:
Preventing Overloading Incidents on Smart Grids: A Multiobjective Combinatorial Optimization Approach. OLA 2020: 269-281 - [c218]Salah Ghamizi, Maxime Cordy, Martin Gubri, Mike Papadakis, Andrey Boytsov, Yves Le Traon, Anne Goujon:
Search-based adversarial testing and improvement of constrained credit scoring systems. ESEC/SIGSOFT FSE 2020: 1089-1100 - [c217]Ludovic Mouline, Maxime Cordy, Yves Le Traon:
Load approximation for uncertain topologies in the low-voltage grid. SmartGridComm 2020: 1-6 - [c216]Niklas Kolbe, Pierre-Yves Vandenbussche, Sylvain Kubler, Yves Le Traon:
LOVBench: Ontology Ranking Benchmark. WWW 2020: 1750-1760 - [i42]Thierry Titcheu Chekam, Mike Papadakis, Maxime Cordy, Yves Le Traon:
Killing Stubborn Mutants with Symbolic Execution. CoRR abs/2001.02941 (2020) - [i41]Arthur D. Sawadogo, Tegawendé F. Bissyandé, Naouel Moha, Kevin Allix, Jacques Klein, Li Li, Yves Le Traon:
Learning to Catch Security Patches. CoRR abs/2001.09148 (2020) - [i40]Patrick Keller, Laura Plein, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning. CoRR abs/2002.02650 (2020) - [i39]Salah Ghamizi, Renaud Rwemalika, Lisa Veiber, Maxime Cordy, Tegawendé F. Bissyandé, Mike Papadakis, Jacques Klein, Yves Le Traon:
Data-driven Simulation and Optimization for Covid-19 Exit Strategies. CoRR abs/2006.07087 (2020) - [i38]Kui Liu, Shangwen Wang, Anil Koyuncu, Kisub Kim, Tegawendé F. Bissyandé, Dongsun Kim, Peng Wu, Jacques Klein, Xiaoguang Mao, Yves Le Traon:
On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs. CoRR abs/2008.00914 (2020) - [i37]Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Efficient and Transferable Adversarial Examples from Bayesian Neural Networks. CoRR abs/2011.05074 (2020) - [i36]Anil Koyuncu, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
FlexiRepair: Transparent Program Repair with Generic Patches. CoRR abs/2011.13280 (2020) - [i35]Ahmed Khanfir, Anil Koyuncu, Mike Papadakis, Maxime Cordy, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
IBIR: Bug Report driven Fault Injection. CoRR abs/2012.06506 (2020) - [i34]Adriano Franci, Maxime Cordy, Martin Gubri, Mike Papadakis, Yves Le Traon:
Effective and Efficient Data Poisoning in Semi-Supervised Learning. CoRR abs/2012.07381 (2020) - [i33]Aayush Garg, Renzo Degiovanni, Matthieu Jimenez, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Learning To Predict Vulnerabilities From Vulnerability-Fixes: A Machine Translation Approach. CoRR abs/2012.11701 (2020)
2010 – 2019
- 2019
- [j62]Mike Papadakis, Marinos Kintis, Jie Zhang, Yue Jia, Yves Le Traon, Mark Harman:
Chapter Six - Mutation Testing Advances: An Analysis and Survey. Adv. Comput. 112: 275-378 (2019) - [j61]Niklas Kolbe, Sylvain Kubler, Jérémy Robert, Yves Le Traon, Arkady B. Zaslavsky:
Linked Vocabulary Recommendation Tools for Internet of Things: A Survey. ACM Comput. Surv. 51(6): 127:1-127:31 (2019) - [j60]Thomas Hartmann, François Fouquet, Assaad Moawad, Romain Rouvoy, Yves Le Traon:
GreyCat: Efficient what-if analytics for data in motion at scale. Inf. Syst. 83: 101-117 (2019) - [j59]Li Li, Timothée Riom, Tegawendé F. Bissyandé, Haoyu Wang, Jacques Klein, Yves Le Traon:
Revisiting the impact of common libraries for android-related investigations. J. Syst. Softw. 154: 157-175 (2019) - [j58]Daoyuan Li, Li Li, Dongsun Kim, Tegawendé F. Bissyandé, David Lo, Yves Le Traon:
Watch out for this commit! A study of influential software changes. J. Softw. Evol. Process. 31(12) (2019) - [j57]Thomas Hartmann, Assaad Moawad, François Fouquet, Yves Le Traon:
The next evolution of MDE: a seamless integration of machine learning into domain modeling. Softw. Syst. Model. 18(2): 1285-1304 (2019) - [j56]Alexandre Bartel, Jacques Klein, Yves Le Traon:
Musti: Dynamic Prevention of Invalid Object Initialization Attacks. IEEE Trans. Inf. Forensics Secur. 14(8): 2167-2178 (2019) - [c215]Julien Polge, Jérémy Robert, Yves Le Traon:
Assessing the impact of attacks on OPC-UA applications in the Industry 4.0 era. CCNC 2019: 1-6 - [c214]Kui Liu, Dongsun Kim, Tegawendé F. Bissyandé, Tae-young Kim, Kisub Kim, Anil Koyuncu, Suntae Kim, Yves Le Traon:
Learning to spot and refactor inconsistent method names. ICSE 2019: 1-12 - [c213]Claire Leong, Abhayendra Singh, Mike Papadakis, Yves Le Traon, John Micco:
Assessing transition-based test selection algorithms at Google. ICSE (SEIP) 2019: 101-110 - [c212]Rohan Padhye, Caroline Lemieux, Koushik Sen, Mike Papadakis, Yves Le Traon:
Validity fuzzing and parametric generators for effective random testing. ICSE (Companion Volume) 2019: 266-267 - [c211]Renaud Rwemalika, Marinos Kintis, Mike Papadakis, Yves Le Traon, Pierre Lorrach:
An Industrial Study on the Differences between Pre-Release and Post-Release Bugs. ICSME 2019: 92-102 - [c210]Kui Liu, Anil Koyuncu, Tegawendé F. Bissyandé, Dongsun Kim, Jacques Klein, Yves Le Traon:
You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems. ICST 2019: 102-113 - [c209]Renaud Rwemalika, Marinos Kintis, Mike Papadakis, Yves Le Traon, Pierre Lorrach:
On the Evolution of Keyword-Driven Test Suites. ICST 2019: 335-345 - [c208]Paul-Lou Benedick, Jérémy Robert, Yves Le Traon:
TRIDENT: A Three-Steps Strategy to Digitise an Industrial System for Stepping into Industry 4.0. IECON 2019: 3037-3042 - [c207]Maxime Cordy, Steve Muller, Mike Papadakis, Yves Le Traon:
Search-based test and improvement of machine-learning-based anomaly detection systems. ISSTA 2019: 158-168 - [c206]Rohan Padhye, Caroline Lemieux, Koushik Sen, Mike Papadakis, Yves Le Traon:
Semantic fuzzing with zest. ISSTA 2019: 329-340 - [c205]Renaud Rwemalika, Marinos Kintis, Mike Papadakis, Yves Le Traon, Pierre Lorrach:
Ukwikora: continuous inspection for keyword-driven testing. ISSTA 2019: 402-405 - [c204]Alejandro Sánchez Guinea, Andrey Boytsov, Ludovic Mouline, Yves Le Traon:
Smart discovery of periodic-frequent human routines for home automation. MobiQuitous 2019: 268-277 - [c203]Thomas Hartmann, Assaad Moawad, Cedric Schockaert, François Fouquet, Yves Le Traon:
Meta-Modelling Meta-Learning. MoDELS 2019: 300-305 - [c202]Niklas Kolbe, Sylvain Kubler, Yves Le Traon:
Popularity-Driven Ontology Ranking Using Qualitative Features. ISWC (1) 2019: 329-346 - [c201]Anil Koyuncu, Kui Liu, Tegawendé F. Bissyandé, Dongsun Kim, Martin Monperrus, Jacques Klein, Yves Le Traon:
iFixR: bug report driven program repair. ESEC/SIGSOFT FSE 2019: 314-325 - [c200]Matthieu Jimenez, Renaud Rwemalika, Mike Papadakis, Federica Sarro, Yves Le Traon, Mark Harman:
The importance of accounting for real-world labelling when predicting software vulnerabilities. ESEC/SIGSOFT FSE 2019: 695-705 - [c199]Thierry Titcheu Chekam, Mike Papadakis, Yves Le Traon:
Mart: a mutant generation tool for LLVM. ESEC/SIGSOFT FSE 2019: 1080-1084 - [c198]Xavier Schmitt, Sylvain Kubler, Jérémy Robert, Mike Papadakis, Yves Le Traon:
A Replicable Comparison Study of NER Software: StanfordNLP, NLTK, OpenNLP, SpaCy, Gate. SNAMS 2019: 338-343 - [c197]Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Automated search for configurations of convolutional neural network architectures. SPLC (A) 2019: 21:1-21:12 - [i32]Anil Koyuncu, Tegawendé F. Bissyandé, Dongsun Kim, Kui Liu, Jacques Klein, Martin Monperrus, Yves Le Traon:
D&C: A Divide-and-Conquer Approach to IR-based Bug Localization. CoRR abs/1902.02703 (2019) - [i31]Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Automated Search for Configurations of Deep Neural Network Architectures. CoRR abs/1904.04612 (2019) - [i30]Wei Ma, Mike Papadakis, Anestis Tsakmalis, Maxime Cordy, Yves Le Traon:
Test Selection for Deep Learning Systems. CoRR abs/1904.13195 (2019) - [i29]Anil Koyuncu, Kui Liu, Tegawendé F. Bissyandé, Dongsun Kim, Martin Monperrus, Jacques Klein, Yves Le Traon:
iFixR: Bug Report driven Program Repair. CoRR abs/1907.05620 (2019) - [i28]Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Adversarial Embedding: A robust and elusive Steganography and Watermarking technique. CoRR abs/1912.01487 (2019) - 2018
- [j55]Steve Muller, Jean Lancrenon, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin:
A training-resistant anomaly detection system. Comput. Secur. 76: 1-11 (2018) - [j54]Cesare Bartolini, Donia El Kateb, Yves Le Traon, David Hagen:
Cloud providers viability - How to address it from an IT and legal perspective? Electron. Mark. 28(1): 53-75 (2018) - [j53]Marinos Kintis, Mike Papadakis, Andreas Papadopoulos, Evangelos Valvis, Nicos Malevris, Yves Le Traon:
How effective are mutation testing tools? An empirical analysis of Java mutation testing tools with manual analysis and real faults. Empir. Softw. Eng. 23(4): 2426-2463 (2018) - [j52]Raphael Sirres, Tegawendé F. Bissyandé, Dongsun Kim, David Lo, Jacques Klein, Kisub Kim, Yves Le Traon:
Augmenting and structuring user queries to support efficient free-form code search. Empir. Softw. Eng. 23(5): 2622-2654 (2018) - [j51]Sylvain Kubler, Jérémy Robert, Sebastian Neumaier, Jürgen Umbrich, Yves Le Traon:
Comparison of metadata quality in open data portals using the Analytic Hierarchy Process. Gov. Inf. Q. 35(1): 13-29 (2018) - [j50]Jabier Martinez, Tewfik Ziadi, Mike Papadakis, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants. Inf. Softw. Technol. 104: 46-59 (2018) - [j49]Sylvain Kubler, William Derigent, Alexandre Voisin, Jérémy Robert, Yves Le Traon, Enrique Herrera-Viedma:
Measuring inconsistency and deriving priorities from fuzzy pairwise comparison matrices using the knowledge-based consistency index. Knowl. Based Syst. 162: 147-160 (2018) - [j48]Marinos Kintis, Mike Papadakis, Yue Jia, Nicos Malevris, Yves Le Traon, Mark Harman:
Detecting Trivial Mutant Equivalences via Compiler Optimisations. IEEE Trans. Software Eng. 44(4): 308-333 (2018) - [c196]Renaud Rwemalika, Marinos Kintis, Mike Papadakis, Yves Le Traon:
Can We Automate Away the Main Challenges of End-To-End Testing? BENEVOL 2018: 33-37 - [c195]Daoyuan Li, Jessica Lin, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification. EDBT 2018: 205-216 - [c194]Matthieu Jimenez, Thierry Titcheu Chekam, Maxime Cordy, Mike Papadakis, Marinos Kintis, Yves Le Traon, Mark Harman:
Are mutants really natural?: a study on how "naturalness" helps mutant selection. ESEM 2018: 3:1-3:10 - [c193]Paul-Lou Benedick, Jérémy Robert, Yves Le Traon, Sylvain Kubler:
O-MI/O-DF vs. MQTT: A performance analysis. ICPS 2018: 153-158 - [c192]Thierry Titcheu Chekam, Mike Papadakis, Tegawendé F. Bissyandé, Yves Le Traon:
Predicting the fault revelation utility of mutants. ICSE (Companion Volume) 2018: 408-409 - [c191]Raphael Sirres, Tegawendé F. Bissyandé, Dongsun Kim, David Lo, Jacques Klein, Kisub Kim, Yves Le Traon:
Augmenting and structuring user queries to support efficient free-form code search. ICSE 2018: 945 - [c190]Kisub Kim, Dongsun Kim, Tegawendé F. Bissyandé, Eunjong Choi, Li Li, Jacques Klein, Yves Le Traon:
FaCoY: a code-to-code search engine. ICSE 2018: 946-957 - [c189]Kui Liu, Dongsun Kim, Anil Koyuncu, Li Li, Tegawendé F. Bissyandé, Yves Le Traon:
A Closer Look at Real-World Patches. ICSME 2018: 275-286 - [c188]Matthieu Jimenez, Maxime Cordy, Yves Le Traon, Mike Papadakis:
On the Impact of Tokenizer and Parameters on N-Gram Based Code Analysis. ICSME 2018: 437-448 - [c187]Matthieu Jimenez, Maxime Cordy, Yves Le Traon, Mike Papadakis:
TUNA: TUning Naturalness-Based Analysis. ICSME 2018: 715 - [c186]Jabier Martinez, Jean-Sébastien Sottet, Alfonso García Frey, Tegawendé F. Bissyandé, Tewfik Ziadi, Jacques Klein, Paul Temple, Mathieu Acher, Yves Le Traon:
Towards Estimating and Predicting User Perception on Software Product Variants. ICSR 2018: 23-40 - [c185]Mike Papadakis, Thierry Titcheu Chekam, Yves Le Traon:
Mutant Quality Indicators. ICST Workshops 2018: 32-39 - [c184]Jaekwon Lee, Dongsun Kim, Tegawendé F. Bissyandé, Woosung Jung, Yves Le Traon:
Bench4BL: reproducibility study on the performance of IR-based bug localization. ISSTA 2018: 61-72 - [c183]Alejandro Sánchez Guinea, Andrey Boytsov, Ludovic Mouline, Yves Le Traon:
Continuous Identification in Smart Environments Using Wrist-Worn Inertial Sensors. MobiQuitous 2018: 87-96 - [c182]Matthieu Jimenez, Yves Le Traon, Mike Papadakis:
[Engineering Paper] Enabling the Continuous Analysis of Security Vulnerabilities with VulData7. SCAM 2018: 56-61 - [i27]Thierry Titcheu Chekam, Mike Papadakis, Tegawendé F. Bissyandé, Yves Le Traon, Koushik Sen:
Selecting Fault Revealing Mutants. CoRR abs/1803.07901 (2018) - [i26]Thomas Hartmann, François Fouquet, Assaad Moawad, Romain Rouvoy, Yves Le Traon:
GreyCat: Efficient What-If Analytics for Data in Motion at Scale. CoRR abs/1803.09627 (2018) - [i25]Anil Koyuncu, Kui Liu, Tegawendé F. Bissyandé, Dongsun Kim, Jacques Klein, Martin Monperrus, Yves Le Traon:
FixMiner: Mining Relevant Fix Patterns for Automated Program Repair. CoRR abs/1810.01791 (2018) - [i24]Rohan Padhye, Caroline Lemieux, Koushik Sen, Mike Papadakis, Yves Le Traon:
Zest: Validity Fuzzing and Parametric Generators for Effective Random Testing. CoRR abs/1812.00078 (2018) - [i23]Kui Liu, Anil Koyuncu, Tegawendé F. Bissyandé, Dongsun Kim, Jacques Klein, Yves Le Traon:
You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems. CoRR abs/1812.07283 (2018) - [i22]Anil Koyuncu, Tegawendé F. Bissyandé, Dongsun Kim, Jacques Klein, Martin Monperrus, Yves Le Traon:
Impact of Tool Support in Patch Construction. CoRR abs/1812.07416 (2018) - 2017
- [j47]Steve Muller, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin:
Efficiently computing the likelihoods of cyclically interdependent risk scenarios. Comput. Secur. 64: 59-68 (2017) - [j46]Li Li, Tegawendé F. Bissyandé, Mike Papadakis, Siegfried Rasthofer, Alexandre Bartel, Damien Octeau, Jacques Klein, Yves Le Traon:
Static analysis of android apps: A systematic literature review. Inf. Softw. Technol. 88: 67-95 (2017) - [j45]Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Haipeng Cai, David Lo, Yves Le Traon:
On Locating Malicious Code in Piggybacked Android Apps. J. Comput. Sci. Technol. 32(6): 1108-1124 (2017) - [j44]Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, David Lo, Lorenzo Cavallaro:
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Trans. Inf. Forensics Secur. 12(6): 1269-1284 (2017) - [c181]Niklas Kolbe, Arkady B. Zaslavsky, Sylvain Kubler, Jérémy Robert, Yves Le Traon:
Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components. CONTEXT 2017: 41-54 - [c180]Sylvain Kubler, William Derigent, Alexandre Voisin, Jérémy Robert, Yves Le Traon:
Knowledge-based consistency index for fuzzy pairwise comparison matrices. FUZZ-IEEE 2017: 1-7 - [c179]Niklas Kolbe, Sylvain Kubler, Jérémy Robert, Yves Le Traon, Arkady B. Zaslavsky:
Towards semantic interoperability in an open IoT ecosystem for connected vehicle services. GIoTS 2017: 1-5 - [c178]Jabier Martinez, Tewfik Ziadi, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Bottom-up technologies for reuse: automated extractive adoption of software product lines. ICSE (Companion Volume) 2017: 67-70 - [c177]Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Haipeng Cai, David Lo, Yves Le Traon:
Automatically Locating Malicious Packages in Piggybacked Android Apps. MOBILESoft@ICSE 2017: 170-174 - [c176]Li Li, Tegawendé F. Bissyandé, Alexandre Bartel, Jacques Klein, Yves Le Traon:
The multi-generation repackaging hypothesis. ICSE (Companion Volume) 2017: 344-346 - [c175]Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, David Lo, Lorenzo Cavallaro:
Understanding Android app piggybacking. ICSE (Companion Volume) 2017: 359-361 - [c174]Thierry Titcheu Chekam, Mike Papadakis, Yves Le Traon, Mark Harman:
An empirical study on mutation, statement and branch coverage fault revelation that avoids the unreliable clean program assumption. ICSE 2017: 597-608 - [c173]Thomas Laurent, Mike Papadakis, Marinos Kintis, Christopher Henard, Yves Le Traon, Anthony Ventresque:
Assessing and Improving the Mutation Testing Practice of PIT. ICST 2017: 430-435 - [c172]Anil Koyuncu, Tegawendé F. Bissyandé, Dongsun Kim, Jacques Klein, Martin Monperrus, Yves Le Traon:
Impact of tool support in patch construction. ISSTA 2017: 237-248 - [c171]Niklas Kolbe, Jérémy Robert, Sylvain Kubler, Yves Le Traon:
PROFICIENT: Productivity Tool for Semantic Interoperability in an Open IoT Ecosystem. MobiQuitous 2017: 116-125 - [c170]Thomas Hartmann, Assaad Moawad, François Fouquet, Yves Le Traon:
The Next Evolution of MDE: A Seamless Integration of Machine Learning into Domain Modeling. MoDELS 2017: 180 - [c169]Amine Benelallam, Thomas Hartmann, Ludovic Mouline, François Fouquet, Johann Bourcier, Olivier Barais, Yves Le Traon:
Raising Time Awareness in Model-Driven Engineering: Vision Paper. MoDELS 2017: 181-188 - [c168]Médéric Hurier, Guillermo Suarez-Tangil, Santanu Kumar Dash, Tegawendé F. Bissyandé, Yves Le Traon, Jacques Klein, Lorenzo Cavallaro:
Euphony: harmonious unification of cacophonous anti-virus vendor labels for Android malware. MSR 2017: 425-435 - [c167]Ludovic Mouline, Thomas Hartmann, François Fouquet, Yves Le Traon, Johann Bourcier, Olivier Barais:
Weaving Rules into Models@run.time for Embedded Smart Systems. Programming 2017: 17:1-17:6 - [c166]Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Sensing by proxy in buildings with agglomerative clustering of indoor temperature movements. SAC 2017: 477-484 - [c165]Thomas Hartmann, François Fouquet, Matthieu Jimenez, Romain Rouvoy, Yves Le Traon:
Analyzing Complex Data in Motion at Scale with Temporal Graphs. SEKE 2017: 596-601 - [p3]Jabier Martinez, Jean-Sébastien Sottet, Alfonso García Frey, Tewfik Ziadi, Tegawendé F. Bissyandé, Jean Vanderdonckt, Jacques Klein, Yves Le Traon:
Variability Management and Assessment for User Interface Design. Human Centered Software Product Lines 2017: 81-106 - [i21]Thomas Hartmann, Assaad Moawad, François Fouquet, Grégory Nain, Jacques Klein, Yves Le Traon, Jean-Marc Jézéquel:
Model-Driven Analytics: Connecting Data, Domain Knowledge, and Learning. CoRR abs/1704.01320 (2017) - [i20]Ludovic Mouline, Thomas Hartmann, François Fouquet, Yves Le Traon, Johann Bourcier, Olivier Barais:
Weaving Rules into Models@run.time for Embedded Smart Systems. CoRR abs/1704.04378 (2017) - [i19]Andrey Boytsov, François Fouquet, Thomas Hartmann, Yves Le Traon:
Visualizing and Exploring Dynamic High-Dimensional Datasets with LION-tSNE. CoRR abs/1708.04983 (2017) - [i18]Li Li, Jun Gao, Médéric Hurier, Pingfan Kong, Tegawendé F. Bissyandé, Alexandre Bartel, Jacques Klein, Yves Le Traon:
AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community. CoRR abs/1709.05281 (2017) - [i17]Kui Liu, Dongsun Kim, Tegawendé F. Bissyandé, Shin Yoo, Yves Le Traon:
Mining Fix Patterns for FindBugs Violations. CoRR abs/1712.03201 (2017) - 2016
- [j43]Kevin Allix, Tegawendé F. Bissyandé, Quentin Jérome, Jacques Klein, Radu State, Yves Le Traon:
Empirical assessment of machine learning-based malware detectors for Android - Measuring the gap between in-the-lab and in-the-wild validation scenarios. Empir. Softw. Eng. 21(1): 183-211 (2016) - [j42]Sylvain Kubler, Jérémy Robert, William Derigent, Alexandre Voisin, Yves Le Traon:
A state-of the-art survey & testbed of fuzzy AHP (FAHP) applications. Expert Syst. Appl. 65: 398-422 (2016) - [j41]Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Time Series Classification with Discrete Wavelet Transformed Data. Int. J. Softw. Eng. Knowl. Eng. 26(9-10): 1361-1378 (2016) - [j40]Patrice Caire, Assaad Moawad, Vasilis Efthymiou, Antonis Bikakis, Yves Le Traon:
Privacy challenges in Ambient Intelligence systems. J. Ambient Intell. Smart Environ. 8(6): 619-644 (2016) - [j39]Alejandro Sánchez Guinea, Grégory Nain, Yves Le Traon:
A systematic review on the engineering of software for ubiquitous systems. J. Syst. Softw. 118: 251-276 (2016) - [c164]Matthieu Jimenez, Mike Papadakis, Yves Le Traon:
An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel. APSEC 2016: 105-112 - [c163]Steve Muller, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin, Paul Hoffmann:
Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures. CRITIS 2016: 163-175 - [c162]Jorge Augusto Meira, Eduardo Cunha de Almeida, Dongsun Kim, Edson Ramiro Lucas Filho, Yves Le Traon:
"Overloaded!" - A Model-Based Approach to Database Stress Testing. DEXA (1) 2016: 207-222 - [c161]Sylvain Kubler, Jérémy Robert, Yves Le Traon, Jürgen Umbrich, Sebastian Neumaier:
Open Data Portal Quality Comparison using AHP. DG.O 2016: 397-407 - [c160]Médéric Hurier, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. DIMVA 2016: 142-162 - [c159]Anush Manukyan, Miguel A. Olivares-Méndez, Tegawendé F. Bissyandé, Holger Voos, Yves Le Traon:
UAV degradation identification for pilot notification using machine learning techniques. ETFA 2016: 1-8 - [c158]Jérémy Robert, Sylvain Kubler, Yves Le Traon:
Micro-billing Framework for IoT: Research & Technological Foundations. FiCloud 2016: 301-308 - [c157]Daoyuan Li, Tegawendé F. Bissyandé, Sylvain Kubler, Jacques Klein, Yves Le Traon:
Profiling household appliance electricity usage with N-gram language modeling. ICIT 2016: 604-609 - [c156]Francisco Carlos M. Souza, Mike Papadakis, Yves Le Traon, Márcio Eduardo Delamaro:
Strong mutation-based test data generation using hill climbing. SBST@ICSE 2016: 45-54 - [c155]Christopher Henard, Mike Papadakis, Mark Harman, Yue Jia, Yves Le Traon:
Comparing white-box and black-box test prioritization. ICSE 2016: 523-534 - [c154]Li Li, Tegawendé F. Bissyandé, Yves Le Traon, Jacques Klein:
Accessing Inaccessible Android APIs: An Empirical Study. ICSME 2016: 411-422 - [c153]Jabier Martinez, Tewfik Ziadi, Mike Papadakis, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Feature Location Benchmark for Software Families Using Eclipse Community Releases. ICSR 2016: 267-283 - [c152]Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
DSCo-NG: A Practical Language Modeling Approach for Time Series Classification. IDA 2016: 1-13 - [c151]Jérémy Robert, Sylvain Kubler, Yves Le Traon, Kary Främling:
O-MI/O-DF standards as interoperability enablers for Industrial Internet: A performance analysis. IECON 2016: 4908-4915 - [c150]Sylvain Kubler, Andrea Buda, Jérémy Robert, Kary Främling, Yves Le Traon:
Building Lifecycle Management System for Enhanced Closed Loop Collaboration. PLM 2016: 423-432 - [c149]Mike Papadakis, Christopher Henard, Mark Harman, Yue Jia, Yves Le Traon:
Threats to the validity of mutation-based test assessment. ISSTA 2016: 354-365 - [c148]Daoyuan Li, Li Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
DSCo: A Language Modeling Approach for Time Series Classification. MLDM 2016: 294-310 - [c147]Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
AndroZoo: collecting millions of Android apps for the research community. MSR 2016: 468-471 - [c146]Damien Octeau, Somesh Jha, Matthew L. Dering, Patrick D. McDaniel, Alexandre Bartel, Li Li, Jacques Klein, Yves Le Traon:
Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis. POPL 2016: 469-484 - [c145]Li Li, Daoyuan Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Towards a generic framework for automating extensive analysis of Android applications. SAC 2016: 1460-1465 - [c144]Thomas Hartmann, Assaad Moawad, François Fouquet, Yves Reckinger, Jacques Klein, Yves Le Traon:
Near real-time electric load approximation in low voltage cables of smart grids with models@run.time. SAC 2016: 2119-2126 - [c143]Matthieu Jimenez, Mike Papadakis, Yves Le Traon:
Vulnerability Prediction Models: A Case Study on the Linux Kernel. SCAM 2016: 1-10 - [c142]Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study. SEKE 2016: 273-278 - [c141]Jabier Martinez, Tewfik Ziadi, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Name suggestions during feature identification: the variclouds approach. SPLC 2016: 119-123 - [c140]Li Li, Jabier Martinez, Tewfik Ziadi, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Mining families of android applications for extractive SPL adoption. SPLC 2016: 271-275 - [c139]Li Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
An Investigation into the Use of Common Libraries in Android Apps. SANER 2016: 403-414 - [c138]Li Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Parameter Values of Android APIs: A Preliminary Study on 100, 000 Apps. SANER 2016: 584-588 - [i16]Thomas Laurent, Anthony Ventresque, Mike Papadakis, Christopher Henard, Yves Le Traon:
Assessing and Improving the Mutation Testing Practice of PIT. CoRR abs/1601.02351 (2016) - [i15]Daoyuan Li, Li Li, Dongsun Kim, Tegawendé F. Bissyandé, David Lo, Yves Le Traon:
Watch out for This Commit! A Study of Influential Software Changes. CoRR abs/1606.03266 (2016) - [i14]Thierry Titcheu Chekam, Mike Papadakis, Yves Le Traon:
Assessing and Comparing Mutation-based Fault Localization Techniques. CoRR abs/1607.05512 (2016) - 2015
- [j38]Tejeddine Mouelhi, Donia El Kateb, Yves Le Traon:
Inroads in Testing Access Control. Adv. Comput. 99: 195-222 (2015) - [j37]Antonia Bertolino, Said Daoudagh, Donia El Kateb, Christopher Henard, Yves Le Traon, Francesca Lonetti, Eda Marchetti, Tejeddine Mouelhi, Mike Papadakis:
Similarity testing for access control. Inf. Softw. Technol. 58: 355-372 (2015) - [j36]Phu Hong Nguyen, Max E. Kramer, Jacques Klein, Yves Le Traon:
An extensive systematic review on the Model-Driven Development of secure systems. Inf. Softw. Technol. 68: 62-81 (2015) - [j35]Xiangyu Zhang, Dongmei Zhang, Yves Le Traon, Qing Wang, Lu Zhang:
Roundtable: Research Opportunities and Challenges for Emerging Software Systems. J. Comput. Sci. Technol. 30(5): 935-941 (2015) - [j34]Moussa Amrani, Benoît Combemale, Levi Lucio, Gehan M. K. Selim, Jürgen Dingel, Yves Le Traon, Hans Vangheluwe, James R. Cordy:
Formal Verification Techniques for Model Transformations: A Tridimensional Classification. J. Object Technol. 14(3): 1:1-43 (2015) - [j33]Donia El Kateb, Nicola Zannone, Assaad Moawad, Patrice Caire, Grégory Nain, Tejeddine Mouelhi, Yves Le Traon:
Conviviality-driven access control policy. Requir. Eng. 20(4): 363-382 (2015) - [j32]Mike Papadakis, Yves Le Traon:
Metallaxis-FL: mutation-based fault localization. Softw. Test. Verification Reliab. 25(5-7): 605-628 (2015) - [j31]Dianxiang Xu, Michael Kent, Lijo Thomas, Tejeddine Mouelhi, Yves Le Traon:
Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets. IEEE Trans. Computers 64(9): 2490-2505 (2015) - [c137]Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. ESSoS 2015: 51-67 - [c136]Jabier Martinez, Gabriele Rossi, Tewfik Ziadi, Tegawendé François D. Assise Bissyandé, Jacques Klein, Yves Le Traon:
Estimating and Predicting Average Likability on Computer-Generated Artwork Variants. GECCO (Companion) 2015: 1431-1432 - [c135]Cesare Bartolini, Donia El Kateb, Yves Le Traon, David Hagen:
Cloud Providers Viability: How to Address it from an IT and Legal Perspective? GECON 2015: 281-295 - [c134]Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, Patrick D. McDaniel:
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. ICSE (1) 2015: 280-291 - [c133]Christopher Henard, Mike Papadakis, Mark Harman, Yves Le Traon:
Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines. ICSE (1) 2015: 517-528 - [c132]Mike Papadakis, Yue Jia, Mark Harman, Yves Le Traon:
Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique. ICSE (1) 2015: 936-946 - [c131]Sébastien Bardin, Mickaël Delahaye, Robin David, Nikolai Kosmatov, Mike Papadakis, Yves Le Traon, Jean-Yves Marion:
Sound and Quasi-Complete Detection of Infeasible Test Requirements. ICST 2015: 1-10 - [c130]Christopher Henard, Mike Papadakis, Yves Le Traon:
Flattening or not of the combinatorial interaction testing models? ICST Workshops 2015: 1-4 - [c129]Jabier Martinez, Tewfik Ziadi, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Automating the Extraction of Model-Based Software Product Lines from Model Variants (T). ASE 2015: 396-406 - [c128]Yves Le Traon:
Keynote - Model-driven Analytics with Models@run.time: The Case of Cyber-Physical-Systems. ModComp@MoDELS 2015: 4-5 - [c127]Thomas Hartmann, Assaad Moawad, François Fouquet, Grégory Nain, Jacques Klein, Yves Le Traon:
Stream my models: Reactive peer-to-peer distributed models@run.time. MoDELS 2015: 80-89 - [c126]Assaad Moawad, Thomas Hartmann, François Fouquet, Grégory Nain, Jacques Klein, Yves Le Traon:
Beyond discrete modeling: A continuous and efficient model for IoT. MoDELS 2015: 90-99 - [c125]Phu Hong Nguyen, Koen Yskout, Thomas Heyman, Jacques Klein, Riccardo Scandariato, Yves Le Traon:
SoSPa: A system of Security design Patterns for systematically engineering secure systems. MoDELS 2015: 246-255 - [c124]Assaad Moawad, Thomas Hartmann, François Fouquet, Jacques Klein, Yves Le Traon:
Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services. SAC 2015: 2271-2278 - [c123]Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. SEC 2015: 513-527 - [c122]Thomas Hartmann, Assaad Moawad, François Fouquet, Yves Reckinger, Tejeddine Mouelhi, Jacques Klein, Yves Le Traon:
Suspicious electric consumption detection based on multi-profiling using live machine learning. SmartGridComm 2015: 891-896 - [c121]Jabier Martinez, Tewfik Ziadi, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Bottom-up adoption of software product lines: a generic and extensible approach. SPLC 2015: 101-110 - [i13]Phu Hong Nguyen, Max E. Kramer, Jacques Klein, Yves Le Traon:
An Extensive Systematic Review on Model-Driven Development of Secure Systems. CoRR abs/1505.06557 (2015) - [i12]Li Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
An Investigation into the Use of Common Libraries in Android Apps. CoRR abs/1511.06554 (2015) - 2014
- [j30]Levi Lucio, Qin Zhang, Phu Hong Nguyen, Moussa Amrani, Jacques Klein, Hans Vangheluwe, Yves Le Traon:
Advances in Model-Driven Security. Adv. Comput. 93: 103-152 (2014) - [j29]Antonis Bikakis, Patrice Caire, Yves Le Traon:
Tools for Conviviality in Multi-Context Systems. FLAP 1(1): 95-114 (2014) - [j28]Gerson Sunyé, Eduardo Cunha de Almeida, Yves Le Traon, Benoit Baudry, Jean-Marc Jézéquel:
Model-based testing of global properties on large-scale distributed systems. Inf. Softw. Technol. 56(7): 749-762 (2014) - [j27]Mike Papadakis, Márcio Eduardo Delamaro, Yves Le Traon:
Mitigating the effects of equivalent mutants with mutant classification strategies. Sci. Comput. Program. 95: 298-319 (2014) - [j26]Alexandre Bartel, Jacques Klein, Martin Monperrus, Yves Le Traon:
Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges and Solutions for Analyzing Android. IEEE Trans. Software Eng. 40(6): 617-632 (2014) - [j25]Christopher Henard, Mike Papadakis, Gilles Perrouin, Jacques Klein, Patrick Heymans, Yves Le Traon:
Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-Wise Test Configurations for Software Product Lines. IEEE Trans. Software Eng. 40(7): 650-670 (2014) - [c120]Deokyoon Ko, Kyeongwook Ma, Sooyong Park, Suntae Kim, Dongsun Kim, Yves Le Traon:
API Document Quality for Resolving Deprecated APIs. APSEC (2) 2014: 27-30 - [c119]Kevin Allix, Tegawendé F. Bissyandé, Quentin Jérome, Jacques Klein, Radu State, Yves Le Traon:
Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality. CODASPY 2014: 163-166 - [c118]Kevin Allix, Quentin Jérome, Tegawendé F. Bissyandé, Jacques Klein, Radu State, Yves Le Traon:
A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected? COMPSAC 2014: 384-393 - [c117]Donia El Kateb, Yehia ElRakaiby, Tejeddine Mouelhi, Iram Rubab, Yves Le Traon:
Towards a Full Support of Obligations in XACML. CRiSIS 2014: 213-221 - [c116]Jabier Martinez, Tewfik Ziadi, Jacques Klein, Yves Le Traon:
Identifying and Visualising Commonality and Variability in Model Variants. ECMFA 2014: 117-131 - [c115]Yehia Elrakaiby, Moussa Amrani, Yves Le Traon:
Security@Runtime: A Flexible MDE Approach to Enforce Fine-grained Security Policies. ESSoS 2014: 19-34 - [c114]Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon:
Detecting Privacy Leaks in Android Apps. ESSoS Doctoral Symposium 2014 - [c113]Phu Hong Nguyen, Jacques Klein, Yves Le Traon:
Modeling, Composing, and Testing of Security Concerns in a Model-Driven Security Approach. ESSoS Doctoral Symposium 2014 - [c112]Mike Papadakis, Christopher Henard, Yves Le Traon:
Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing. ICST 2014: 1-10 - [c111]Antonia Bertolino, Yves Le Traon, Francesca Lonetti, Eda Marchetti, Tejeddine Mouelhi:
Coverage-Based Test Cases Selection for XACML Policies. ICST Workshops 2014: 12-21 - [c110]Erwan Abgrall, Yves Le Traon, Sylvain Gombault, Martin Monperrus:
Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: An Urgent Need for Systematic Security Regression Testing. ICST Workshops 2014: 34-41 - [c109]Christopher Henard, Mike Papadakis, Yves Le Traon:
MutaLog: A Tool for Mutating Logic Formulas. ICST Workshops 2014: 399-404 - [c108]Jorge Augusto Meira, Eduardo Cunha de Almeida, Yves Le Traon:
A state machine for database non-functional testing. IDEAS 2014: 378-379 - [c107]Edson Ramiro Lucas Filho, Eduardo Cunha de Almeida, Yves Le Traon:
Intra-query adaptivity for MapReduce query processing systems. IDEAS 2014: 380-381 - [c106]Thomas Hartmann, François Fouquet, Grégory Nain, Brice Morin, Jacques Klein, Olivier Barais, Yves Le Traon:
A Native Versioning Concept to Support Historized Models at Runtime. MoDELS 2014: 252-268 - [c105]Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, Patrick D. McDaniel:
FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. PLDI 2014: 259-269 - [c104]Iram Rubab, Shaukat Ali, Lionel C. Briand, Yves Le Traon:
Model-Based Testing of Obligations. QSIC 2014: 1-10 - [c103]Donia El Kateb, François Fouquet, Johann Bourcier, Yves Le Traon:
Optimizing Multi-objective Evolutionary Algorithms to Enable Quality-Aware Software Provisioning. QSIC 2014: 85-94 - [c102]Donia El Kateb, François Fouquet, Grégory Nain, Jorge Augusto Meira, Michel Ackerman, Yves Le Traon:
Generic cloud platform multi-objective optimization leveraging models@run.time. SAC 2014: 343-350 - [c101]Tewfik Ziadi, Christopher Henard, Mike Papadakis, Mikal Ziane, Yves Le Traon:
Towards a language-independent approach for reverse-engineering of software product lines. SAC 2014: 1064-1071 - [c100]Mike Papadakis, Yves Le Traon:
Effective fault localization via mutation analysis: a selective mutation approach. SAC 2014: 1293-1300 - [c99]Thomas Hartmann, François Fouquet, Grégory Nain, Brice Morin, Jacques Klein, Yves Le Traon:
Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach. SEKE 2014: 586-591 - [c98]Thomas Hartmann, François Fouquet, Grégory Nain, Brice Morin, Jacques Klein, Yves Le Traon:
Model-based time-distorted Contexts for efficient temporal Reasoning. SEKE 2014: 746-747 - [c97]Thomas Hartmann, François Fouquet, Jacques Klein, Yves Le Traon, Alexander Pelov, Laurent Toutain, Tanguy Ropitault:
Generating realistic Smart Grid communication topologies based on real-data. SmartGridComm 2014: 428-433 - [c96]Thomas Hartmann, François Fouquet, Jacques Klein, Grégory Nain, Yves Le Traon:
Reactive Security for Smart Grids Using Models@run.time-Based Simulation and Reasoning. SmartGridSec 2014: 139-153 - [c95]Christopher Henard, Mike Papadakis, Yves Le Traon:
Mutation-Based Generation of Software Product Line Test Configurations. SSBSE 2014: 92-106 - [c94]Phu Hong Nguyen, Jacques Klein, Yves Le Traon:
Model-Driven Security with A System of Aspect-Oriented Security Design Patterns. VAO@STAF 2014: 51-54 - [c93]Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon:
Automatically Exploiting Potential Component Leaks in Android Applications. TrustCom 2014: 388-397 - [c92]Jabier Martinez, Tewfik Ziadi, Raúl Mazo, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines. VISSOFT 2014: 50-59 - [p2]Antonia Bertolino, Yves Le Traon, Francesca Lonetti, Eda Marchetti, Tejeddine Mouelhi:
Validation of Access Control Systems. Engineering Secure Future Internet Services and Systems 2014: 210-233 - [i11]Donia El Kateb, François Fouquet, Johann Bourcier, Yves Le Traon:
Artificial Mutation inspired Hyper-heuristic for Runtime Usage of Multi-objective Algorithms. CoRR abs/1402.4442 (2014) - [i10]Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, Patrick D. McDaniel:
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis. CoRR abs/1404.7431 (2014) - [i9]Thomas Hartmann, François Fouquet, Yves Le Traon, Brice Morin:
Leveraging Time Distortion for seamless Navigation into Data Space-Time Continuum. CoRR abs/1407.4607 (2014) - [i8]Alexandre Bartel, Jacques Klein, Martin Monperrus, Yves Le Traon:
Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android. CoRR abs/1408.3976 (2014) - 2013
- [j24]Freddy Muñoz, Benoit Baudry, Romain Delamare, Yves Le Traon:
Usage and testability of AOP: An empirical study of AspectJ. Inf. Softw. Technol. 55(2): 252-266 (2013) - [j23]Alessandro Gustavo Fior, Jorge Augusto Meira, Eduardo Cunha de Almeida, Ricardo Gonçalves Coelho, Marcos Didonet Del Fabro, Yves Le Traon:
Under Pressure Benchmark for DDBMS Availability. J. Inf. Data Manag. 4(3): 266-278 (2013) - [j22]Jorge Augusto Meira, Eduardo Cunha de Almeida, Gerson Sunyé, Yves Le Traon, Patrick Valduriez:
Stress Testing of Transactional Database Systems. J. Inf. Data Manag. 4(3): 279-294 (2013) - [j21]Phu Hong Nguyen, Grégory Nain, Jacques Klein, Tejeddine Mouelhi, Yves Le Traon:
Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management. LNCS Trans. Aspect Oriented Softw. Dev. 11: 109-144 (2013) - [c91]Yehia Elrakaiby, Yves Le Traon:
A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications. ARES 2013: 367-374 - [c90]Tegawendé F. Bissyandé, Daouda Ahmat, Jonathan Ouoba, Gertjan van Stam, Jacques Klein, Yves Le Traon:
Sustainable ICT4D in Africa: Where Do We Go from Here? AFRICOMM 2013: 95-103 - [c89]Miguel A. Olivares-Méndez, Tegawendé F. Bissyandé, Kannan Somasundar, Jacques Klein, Holger Voos, Yves Le Traon:
The NOAH Project: Giving a Chance to Threatened Species in Africa with UAVs. AFRICOMM 2013: 198-208 - [c88]Phu Hong Nguyen, Grégory Nain, Jacques Klein, Tejeddine Mouelhi, Yves Le Traon:
Model-driven adaptive delegation. AOSD 2013: 61-72 - [c87]Phu Hong Nguyen, Jacques Klein, Yves Le Traon, Max E. Kramer:
A Systematic Review of Model-Driven Security. APSEC (1) 2013: 432-441 - [c86]Donia El Kateb, Yehia ElRakaiby, Tejeddine Mouelhi, Yves Le Traon:
Access control enforcement testing. AST 2013: 64-70 - [c85]Christopher Henard, Mike Papadakis, Gilles Perrouin, Jacques Klein, Yves Le Traon:
Towards automated testing and fixing of re-engineered feature models. ICSE 2013: 1245-1248 - [c84]Christopher Henard, Mike Papadakis, Gilles Perrouin, Jacques Klein, Yves Le Traon:
Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing. ICST Workshops 2013: 188-197 - [c83]Tegawendé F. Bissyandé, David Lo, Lingxiao Jiang, Laurent Réveillère, Jacques Klein, Yves Le Traon:
Got issues? Who cares about it? A large scale investigation of issue trackers from GitHub. ISSRE 2013: 188-197 - [c82]Patrice Caire, Antonis Bikakis, Yves Le Traon:
Information Dependencies in MCS: Conviviality-Based Model and Metrics. PRIMA 2013: 405-412 - [c81]Assaad Moawad, Antonis Bikakis, Patrice Caire, Grégory Nain, Yves Le Traon:
A Rule-Based Contextual Reasoning Platform for Ambient Intelligence Environments. RuleML 2013: 158-172 - [c80]Assaad Moawad, Antonis Bikakis, Patrice Caire, Grégory Nain, Yves Le Traon:
R-CoRe: A Rule-based Contextual Reasoning Platform for AmI. RuleML (2) 2013 - [c79]Mike Papadakis, Yves Le Traon:
Mutation testing strategies using mutant classification. SAC 2013: 1223-1229 - [c78]Mike Papadakis, Márcio Eduardo Delamaro, Yves Le Traon:
Proteum/FL: A tool for localizing faults using mutation analysis. SCAM 2013: 94-99 - [c77]Christopher Henard, Mike Papadakis, Gilles Perrouin, Jacques Klein, Yves Le Traon:
Multi-objective test generation for software product lines. SPLC 2013: 62-71 - [c76]Christopher Henard, Mike Papadakis, Gilles Perrouin, Jacques Klein, Yves Le Traon:
PLEDGE: a product line editor and test generation tool. SPLC Workshops 2013: 126-129 - [c75]Damien Octeau, Patrick D. McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, Yves Le Traon:
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis. USENIX Security Symposium 2013: 543-558 - 2012
- [j20]Gilles Perrouin, Sebastian Oster, Sagar Sen, Jacques Klein, Benoit Baudry, Yves Le Traon:
Pairwise testing for software product lines: comparison of two approaches. Softw. Qual. J. 20(3-4): 605-643 (2012) - [j19]Philippe Dhaussy, Frédéric Boniol, Jean-Charles Roger, Amine Raji, Yves Le Traon, Benoit Baudry:
Formalisation de contextes et d'exigences pour la validation formelle de logiciels embarqués. Tech. Sci. Informatiques 31(6): 797-826 (2012) - [c74]Gilles Perrouin, Brice Morin, Franck Chauvel, Franck Fleurey, Jacques Klein, Yves Le Traon, Olivier Barais, Jean-Marc Jézéquel:
Towards flexible evolution of Dynamically Adaptive Systems. ICSE 2012: 1353-1356 - [c73]Jorge Augusto Meira, Eduardo Cunha de Almeida, Yves Le Traon, Gerson Sunyé:
Peer-to-Peer Load Testing. ICST 2012: 642-647 - [c72]Yehia Elrakaiby, Tejeddine Mouelhi, Yves Le Traon:
Testing Obligation Policy Enforcement Using Mutation Analysis. ICST 2012: 673-680 - [c71]Mike Papadakis, Yves Le Traon:
Using Mutants to Locate "Unknown" Faults. ICST 2012: 691-700 - [c70]Moussa Amrani, Levi Lucio, Gehan M. K. Selim, Benoît Combemale, Jürgen Dingel, Hans Vangheluwe, Yves Le Traon, James R. Cordy:
A Tridimensional Approach for Studying the Formal Verification of Model Transformations. ICST 2012: 921-928 - [c69]JeeHyun Hwang, Tao Xie, Donia El Kateb, Tejeddine Mouelhi, Yves Le Traon:
Selection of regression system tests for security policy evolution. ASE 2012: 266-269 - [c68]Alexandre Bartel, Jacques Klein, Yves Le Traon, Martin Monperrus:
Automatically securing permission-based software by reducing the attack surface: an application to Android. ASE 2012: 274-277 - [c67]Alexandre Bartel, Jacques Klein, Yves Le Traon, Martin Monperrus:
Dexpler: converting Android Dalvik bytecode to Jimple for static analysis with Soot. SOAP@PLDI 2012: 27-38 - [c66]Dianxiang Xu, Lijo Thomas, Michael Kent, Tejeddine Mouelhi, Yves Le Traon:
A model-based approach to automated testing of access control policies. SACMAT 2012: 209-218 - [c65]Donia El Kateb, Tejeddine Mouelhi, Yves Le Traon, JeeHyun Hwang, Tao Xie:
Refactoring access control policies for performance improvement. ICPE 2012: 323-334 - [i7]Alexandre Bartel, Jacques Klein, Martin Monperrus, Yves Le Traon:
Dexpler: Converting Android Dalvik Bytecode to Jimple for Static Analysis with Soot. CoRR abs/1205.3576 (2012) - [i6]Alexandre Bartel, Benoit Baudry, Freddy Muñoz, Jacques Klein, Tejeddine Mouelhi, Yves Le Traon:
Model Driven Mutation Applied to Adaptative Systems Testing. CoRR abs/1205.5783 (2012) - [i5]Alexandre Bartel, Jacques Klein, Martin Monperrus, Yves Le Traon:
Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android. CoRR abs/1206.5829 (2012) - [i4]Alexandre Bartel, Jacques Klein, Martin Monperrus, Kevin Allix, Yves Le Traon:
Improving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation. CoRR abs/1208.4536 (2012) - [i3]Erwan Abgrall, Yves Le Traon, Martin Monperrus, Sylvain Gombault, Mario Heiderich, Alain Ribault:
XSS-FP: Browser Fingerprinting using HTML Parser Quirks. CoRR abs/1211.4812 (2012) - [i2]Christopher Henard, Mike Papadakis, Gilles Perrouin, Jacques Klein, Patrick Heymans, Yves Le Traon:
Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Suites for Large Software Product Lines. CoRR abs/1211.5451 (2012) - 2011
- [j18]Levi Lucio, Qin Zhang, Vasco Sousa, Yves Le Traon:
Verifying Access Control in Statecharts. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 50 (2011) - [j17]Gilles Perrouin, Andreas Metzger, Patrick Heymans, Yves Le Traon:
VAST 2011 workshop summary. ACM SIGSOFT Softw. Eng. Notes 36(4): 24-25 (2011) - [j16]Romain Delamare, Benoit Baudry, Sudipto Ghosh, Shashank Gupta, Yves Le Traon:
An approach for testing pointcut descriptors in AspectJ. Softw. Test. Verification Reliab. 21(3): 215-239 (2011) - [c64]Thomas Demongeot, Eric Totel, Yves Le Traon:
Preventing data leakage in service orchestration. IAS 2011: 122-127 - [c63]Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, Benoit Baudry, Sylvain Gombault:
Tailored Shielding and Bypass Testing of Web Applications. ICST 2011: 210-219 - [c62]Alexandre Bartel, Benoit Baudry, Freddy Muñoz, Jacques Klein, Tejeddine Mouelhi, Yves Le Traon:
Model Driven Mutation Applied to Adaptative Systems Testing. ICST Workshops 2011: 408-413 - 2010
- [j15]Benoit Baudry, Sudipto Ghosh, Franck Fleurey, Robert B. France, Yves Le Traon, Jean-Marie Mottu:
Barriers to systematic model transformation testing. Commun. ACM 53(6): 139-143 (2010) - [j14]Eduardo Cunha de Almeida, Gerson Sunyé, Yves Le Traon, Patrick Valduriez:
Testing peer-to-peer systems. Empir. Softw. Eng. 15(4): 346-379 (2010) - [j13]Jean-Marie Mottu, Benoit Baudry, Yves Le Traon:
Construction de tests qualifiés de transformations de modèles. Tech. Sci. Informatiques 29(4-5): 537-569 (2010) - [c61]Jacques Simonin, Emmanuel Bertin, Yves Le Traon, Jean-Marc Jézéquel, Noël Crespi:
Business and Information System Alignment: A Formal Solution for Telecom Services. ICSEA 2010: 278-283 - [c60]Yves Le Traon, Tejeddine Mouelhi, Franck Fleurey, Benoit Baudry:
Language-Specific vs. Language-Independent Approaches: Embedding Semantics on a Metamodel for Testing and Verifying Access Control Policies. ICST Workshops 2010: 72-79 - [c59]Gilles Perrouin, Sagar Sen, Jacques Klein, Benoit Baudry, Yves Le Traon:
Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines. ICST 2010: 459-468 - [c58]Brice Morin, Tejeddine Mouelhi, Franck Fleurey, Yves Le Traon, Olivier Barais, Jean-Marc Jézéquel:
Security-driven model-based dynamic adaptation. ASE 2010: 205-214 - [c57]Eduardo Cunha de Almeida, João Eugenio Marynowski, Gerson Sunyé, Yves Le Traon, Patrick Valduriez:
Efficient Distributed Test Architectures for Large-Scale Systems. ICTSS 2010: 174-187 - [c56]Romain Delamare, Freddy Muñoz, Benoit Baudry, Yves Le Traon:
Vidock: A Tool for Impact Analysis of Aspect Weaving on Test Cases. ICTSS 2010: 250-265 - [c55]Erwan Brottier, Yves Le Traon, Bertrand Nicolas:
Composing Models at Two Modeling Levels to Capture Heterogeneous Concerns in Requirements. SC@TOOLS 2010: 1-16 - [i1]Antonia Bertolino, Wolfgang Grieskamp, Robert M. Hierons, Yves Le Traon, Bruno Legeard, Henry Muccini, Amit M. Paradkar, David S. Rosenblum, Jan Tretmans:
Model-Based Testing for the Cloud. Practical Software Testing: Tool Automation and Human Factors 2010
2000 – 2009
- 2009
- [j12]Franck Fleurey, Benoit Baudry, Pierre-Alain Muller, Yves Le Traon:
Qualifying input test data for model transformations. Softw. Syst. Model. 8(2): 185-203 (2009) - [c54]Thomas Demongeot, Julien Mallet, Yves Le Traon:
Runtime verification of declassification for imperative programs: Formal foundations. CRiSIS 2009: 43-50 - [c53]Freddy Muñoz, Benoit Baudry, Romain Delamare, Yves Le Traon:
Inquiring the usage of aspect-oriented programming: An empirical study. ICSM 2009: 137-146 - [c52]Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry:
Transforming and Selecting Functional Test Cases for Security Policy Testing. ICST 2009: 171-180 - [c51]Romain Delamare, Benoit Baudry, Yves Le Traon:
AjMutator: A Tool for the Mutation Analysis of AspectJ Pointcut Descriptors. ICST Workshops 2009: 200-204 - [c50]Romain Delamare, Benoit Baudry, Sudipto Ghosh, Yves Le Traon:
A Test-Driven Approach to Developing Pointcut Descriptors in AspectJ. ICST 2009: 376-385 - [c49]Philippe Dhaussy, Pierre Yves Pillain, Stephen Creff, Amine Raji, Yves Le Traon, Benoit Baudry:
Evaluating Context Descriptions and Property Definition Patterns for Software Formal Validation. MoDELS 2009: 438-452 - [c48]Gilles Perrouin, Erwan Brottier, Benoit Baudry, Yves Le Traon:
Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective. REFSQ 2009: 89-103 - 2008
- [c47]Romain Delamare, Benoit Baudry, Yves Le Traon:
Regression test selection when evolving software with aspects. LATE@AOSD 2008: 7 - [c46]Jacques Simonin, Francis Alizon, Jean Pierre Deschrevel, Yves Le Traon, Jean-Marc Jézéquel, Bertrand Nicolas:
EA4UP: An Enterprise Architecture-Assisted Telecom Service Development Method. EDOC 2008: 279-285 - [c45]Jean-Marie Mottu, Benoit Baudry, Yves Le Traon:
Model transformation testing: oracle issue. ICST Workshops 2008: 105-112 - [c44]Yves Le Traon, Tejeddine Mouelhi, Alexander Pretschner, Benoit Baudry:
Test-Driven Assessment of Access Control in Legacy Applications. ICST 2008: 238-247 - [c43]Alexander Pretschner, Tejeddine Mouelhi, Yves Le Traon:
Model-Based Tests for Access Control Policies. ICST 2008: 338-347 - [c42]Eduardo Cunha de Almeida, Gerson Sunyé, Yves Le Traon, Patrick Valduriez:
A Framework for Testing Peer-to-Peer Systems. ISSRE 2008: 167-176 - [c41]Eduardo Cunha de Almeida, Gerson Sunyé, Yves Le Traon, Patrick Valduriez:
Testing Peers' Volatility. ASE 2008: 419-422 - [c40]Tejeddine Mouelhi, Franck Fleurey, Benoit Baudry, Yves Le Traon:
A Model-Based Framework for Security Policy Specification, Deployment and Testing. MoDELS 2008: 537-552 - [c39]Tejeddine Mouelhi, Franck Fleurey, Benoit Baudry, Yves Le Traon:
Mutating DAC and MAC Security Policies: A Generic Metamodel Based Approach. MODSEC@MoDELS 2008 - 2007
- [j11]Simon Pickin, Claude Jard, Thierry Jéron, Jean-Marc Jézéquel, Yves Le Traon:
Test Synthesis from UML Models of Distributed Software. IEEE Trans. Software Eng. 33(4): 252-269 (2007) - [c38]Erwan Brottier, Benoit Baudry, Yves Le Traon, David Touzet, Bertrand Nicolas:
Producing a Global Requirement Model from Multiple Requirement Specifications. EDOC 2007: 390-404 - [c37]Benoit Baudry, Clémentine Nebut, Yves Le Traon:
Model-Driven Engineering for Requirements Analysis. EDOC 2007: 459-466 - [c36]Jacques Simonin, Yves Le Traon, Jean-Marc Jézéquel:
An Enterprise Architecture Alignment Measure for Telecom Service Development. EDOC 2007: 476-483 - [c35]Yves Le Traon, Tejeddine Mouelhi, Benoit Baudry:
Testing Security Policies: Going Beyond Functional Testing. ISSRE 2007: 93-102 - 2006
- [j10]Clémentine Nebut, Franck Fleurey, Yves Le Traon, Jean-Marc Jézéquel:
Automatic Test Generation: A Use Case Driven Approach. IEEE Trans. Software Eng. 32(3): 140-155 (2006) - [j9]Yves Le Traon, Benoit Baudry, Jean-Marc Jézéquel:
Design by Contract to Improve Software Vigilance. IEEE Trans. Software Eng. 32(8): 571-586 (2006) - [c34]Yves Le Traon:
Le test et le diagnostic en vue de la m maintenance : des objets aux modéles. CAL 2006: 190 - [c33]Jean-Marie Mottu, Benoit Baudry, Yves Le Traon:
Mutation Analysis Testing for Model Transformations. ECMDA-FA 2006: 376-390 - [c32]Benoit Baudry, Franck Fleurey, Yves Le Traon:
Improving test suites for efficient fault localization. ICSE 2006: 82-91 - [c31]Erwan Brottier, Franck Fleurey, Jim Steel, Benoit Baudry, Yves Le Traon:
Metamodel-based Test Generation for Model Transformations: an Algorithm and a Tool. ISSRE 2006: 85-94 - [c30]Yves Le Traon:
Test et diagnostic - des objets aux modèles. LMO 2006: 17 - [c29]Yves Le Traon, Benoit Baudry:
Test d'intégration d'un système à objets - planification de l'ordre d'intégration. LMO 2006: 217-230 - [c28]Jean-Marie Mottu, Benoit Baudry, Yves Le Traon:
Reusable MDA Components: A Testing-for-Trust Approach. MoDELS 2006: 589-603 - [p1]Clémentine Nebut, Yves Le Traon, Jean-Marc Jézéquel:
System Testing of Product Lines: From Requirements to Test Cases. Software Product Lines 2006: 447-477 - 2005
- [j8]Benoit Baudry, Yves Le Traon:
Measuring design testability of a UML class diagram. Inf. Softw. Technol. 47(13): 859-879 (2005) - [j7]Benoit Baudry, Franck Fleurey, Jean-Marc Jézéquel, Yves Le Traon:
Automatic Test Case Optimization: A Bacteriologic Algorithm. IEEE Softw. 22(2): 76-82 (2005) - [j6]Benoit Baudry, Franck Fleurey, Jean-Marc Jézéquel, Yves Le Traon:
From genetic to bacteriological algorithms for mutation-based testing. Softw. Test. Verification Reliab. 15(2): 73-96 (2005) - 2004
- [c27]Franck Fleurey, Yves Le Traon, Benoit Baudry:
From Testing to Diagnosis: An Automated Approach. ASE 2004: 306-309 - [c26]David Lugato, Frédéric Maraux, Yves Le Traon, Véronique Normand, Hubert Dubois, Jean-Yves Pierron, Jean-Pierre Gallois, Clémentine Nebut:
Automated Functional Test Case Synthesis from THALES industrial Requirements. IEEE Real-Time and Embedded Technology and Applications Symposium 2004: 104-111 - 2003
- [j5]Yves Le Traon, Farid Ouabdesselam, Chantal Robach, Benoit Baudry:
From diagnosis to diagnosability: axiomatization, measurement and application. J. Syst. Softw. 65(1): 31-50 (2003) - [c25]Clémentine Nebut, Franck Fleurey, Yves Le Traon, Jean-Marc Jézéquel:
Requirements by Contracts allow Automated System Testing. ISSRE 2003: 85-98 - [c24]Clémentine Nebut, Simon Pickin, Yves Le Traon, Jean-Marc Jézéquel:
Automated Requirements-based Generation of Test Cases for Product Families. ASE 2003: 263-266 - [c23]Benoit Baudry, Yves Le Traon, Gerson Sunyé, Jean-Marc Jézéquel:
Measuring and Improving Design Patterns Testability. IEEE METRICS 2003: 50- - [c22]Clémentine Nebut, Franck Fleurey, Yves Le Traon, Jean-Marc Jézéquel:
A Requirement-Based Approach to Test Product Families. PFE 2003: 198-210 - 2002
- [c21]Simon Pickin, Claude Jard, Yves Le Traon, Thierry Jéron, Jean-Marc Jézéquel, Alain Le Guennec:
System Test Synthesis from UML Models of Distributed Software. FORTE 2002: 97-113 - [c20]Benoit Baudry, Franck Fleurey, Jean-Marc Jézéquel, Yves Le Traon:
Genes and Bacteria for Automatic Test Cases Optimization in the .NET Environment. ISSRE 2002: 195-206 - [c19]Benoit Baudry, Franck Fleurey, Jean-Marc Jézéquel, Yves Le Traon:
Automatic Test Cases Optimization Using a Bacteriological Adaptation Model: Application to .NET Component. ASE 2002: 253-256 - [c18]Benoit Baudry, Yves Le Traon, Gerson Sunyé:
Testability Analysis of a UML Class Diagram. IEEE METRICS 2002: 54- - 2001
- [j4]Jean-Marc Jézéquel, Daniel Deveaux, Yves Le Traon:
Reliable Objects: Lightweight Testing for OO Languages. IEEE Softw. 18(4): 76-83 (2001) - [c17]Vu Le Hanh, Kamel Akif, Yves Le Traon, Jean-Marc Jézéquel:
Selecting an Efficient OO Integration Testing Strategy: An Experimental Comparison of Actual Strategies. ECOOP 2001: 381-401 - [c16]Benoit Baudry, Yves Le Traon, Gerson Sunyé, Jean-Marc Jézéquel:
Towards a 'Safe' Use of Design Patterns to Improve OO Software Testability. ISSRE 2001: 324-331 - [c15]Benoit Baudry, Yves Le Traon, Jean-Marc Jézéquel:
Robustness and Diagnosability of OO Systems Designed by Contracts. IEEE METRICS 2001: 272-284 - [c14]Gerson Sunyé, Damien Pollet, Yves Le Traon, Jean-Marc Jézéquel:
Refactoring UML Models. UML 2001: 134-148 - 2000
- [j3]Yves Le Traon, Thierry Jéron, Jean-Marc Jézéquel, Pierre Morel:
Efficient object-oriented integration and regression testing. IEEE Trans. Reliab. 49(1): 12-25 (2000) - [c13]Benoit Baudry, Vu Le Hanh, Jean-Marc Jézéquel, Yves Le Traon:
Building Trust into OO Components Using a Genetic Analogy. ISSRE 2000: 4-14 - [c12]Yves Le Traon, Farid Ouabdesselam, Chantal Robach:
Analyzing Testability on Data Flow Designs. ISSRE 2000: 162-173 - [c11]Benoit Baudry, Vu Le Hanh, Yves Le Traon:
Testing-for-Trust: The Genetic Selection Model Applied to Component Qualification. TOOLS (33) 2000: 108-119
1990 – 1999
- 1999
- [j2]Daniel Deveaux, Régis Fleurquin, Patrice Frison, Jean-Marc Jézéquel, Yves Le Traon:
Composants objets fiables : une approche pragmatique. Obj. Logiciel Base données Réseaux 5(3/4) (1999) - [c10]Thierry Jéron, Jean-Marc Jézéquel, Yves Le Traon, Pierre Morel:
Efficient strategies for integration and regression testing of OO systems. ISSRE 1999: 260-269 - [c9]Yves Le Traon, Daniel Deveaux, Jean-Marc Jézéquel:
Self-Testable Components: From Pragmatic Tests to Design-for-Testability Methodology. TOOLS (29) 1999: 96-107 - 1998
- [c8]Yves Le Traon, Farid Ouabdesselam, Chantal Robach:
Software diagnosability. ISSRE 1998: 257-266 - [c7]Maisaa Khalil, Yves Le Traon, Chantal Robach:
Towards an automatic diagnosis for high-level design validation. ITC 1998: 1010-1018 - 1997
- [j1]Ghassan Al Hayek, Yves Le Traon, Chantal Robach:
Impact of System Partitioning on Test Cost. IEEE Des. Test Comput. 14(1): 64-74 (1997) - [c6]Yves Le Traon, Chantal Robach:
Testability Measurements for Data Flow Designs. IEEE METRICS 1997: 91-98 - 1996
- [c5]Ghassan Al Hayek, Yves Le Traon, Chantal Robach:
Considering Test Economics in the Process of Hardware/Software Partitioning. EUROMICRO 1996: 28- - [c4]Yves Le Traon, Ghassan Al Hayek, Chantal Robach:
Testability-Oriented Hardware/Software Partitioning. ITC 1996: 725-731 - 1995
- [c3]Yves Le Traon, Chantal Robach:
Testability analysis of co-designed systems. Asian Test Symposium 1995: 206- - [c2]Yves Le Traon, Chantal Robach:
Towards a unified approach to the testability of co-designed systems. ISSRE 1995: 278-285 - [c1]Yves Le Traon, Chantal Robach:
From Hardware to Software Testability. ITC 1995: 710-719
Coauthor Index
aka: Eduardo Cunha de Almeida
aka: Tegawendé François D. Assise Bissyandé
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint