Jacques Klein

According to our database1, Jacques Klein authored at least 136 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Automated Testing of Android Apps: A Systematic Literature Review.
IEEE Trans. Reliability, 2019

Musti: Dynamic Prevention of Invalid Object Initialization Attacks.
IEEE Trans. Information Forensics and Security, 2019

Revisiting the impact of common libraries for android-related investigations.
Journal of Systems and Software, 2019

On Identifying and Explaining Similarities in Android Apps.
J. Comput. Sci. Technol., 2019

iFixR: Bug Report driven Program Repair.
CoRR, 2019

D&C: A Divide-and-Conquer Approach to IR-based Bug Localization.
CoRR, 2019

Should You Consider Adware as Malware in Your Study?
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

iFixR: bug report driven program repair.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Negative results on mining crypto-API usage rules in Android apps.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

Mining Android crash fixes in the absence of issue- and change-tracking systems.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems.
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019

2018
Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants.
Information & Software Technology, 2018

Augmenting and structuring user queries to support efficient free-form code search.
Empirical Software Engineering, 2018

Impact of Tool Support in Patch Construction.
CoRR, 2018

You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems.
CoRR, 2018

Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark.
CoRR, 2018

FixMiner: Mining Relevant Fix Patterns for Automated Program Repair.
CoRR, 2018

FraudDroid: automated ad fraud detection for Android apps.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Characterising deprecated Android APIs.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

CiD: automating the detection of API-related compatibility issues in Android apps.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

MoonlightBox: Mining Android API Histories for Uncovering Release-Time Inconsistencies.
Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering, 2018

Towards Estimating and Predicting User Perception on Software Product Variants.
Proceedings of the New Opportunities for Software Reuse - 17th International Conference, 2018

Augmenting and structuring user queries to support efficient free-form code search.
Proceedings of the 40th International Conference on Software Engineering, 2018

FaCoY: a code-to-code search engine.
Proceedings of the 40th International Conference on Software Engineering, 2018

On vulnerability evolution in Android apps.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification.
Proceedings of the 21th International Conference on Extending Database Technology, 2018

2017
Variability Management and Assessment for User Interface Design.
Proceedings of the Human Centered Software Product Lines, 2017

Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting.
IEEE Trans. Information Forensics and Security, 2017

On Locating Malicious Code in Piggybacked Android Apps.
J. Comput. Sci. Technol., 2017

Characterizing malicious Android apps by mining topic-specific data flow signatures.
Information & Software Technology, 2017

Static analysis of android apps: A systematic literature review.
Information & Software Technology, 2017

AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community.
CoRR, 2017

Model-Driven Analytics: Connecting Data, Domain Knowledge, and Learning.
CoRR, 2017

SimiDroid: Identifying and Explaining Similarities in Android Apps.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Sensing by proxy in buildings with agglomerative clustering of indoor temperature movements.
Proceedings of the Symposium on Applied Computing, 2017

Euphony: harmonious unification of cacophonous anti-virus vendor labels for Android malware.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

Impact of tool support in patch construction.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Bottom-up technologies for reuse: automated extractive adoption of software product lines.
Proceedings of the 39th International Conference on Software Engineering, 2017

Automatically Locating Malicious Packages in Piggybacked Android Apps.
Proceedings of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2017

Understanding Android app piggybacking.
Proceedings of the 39th International Conference on Software Engineering, 2017

The multi-generation repackaging hypothesis.
Proceedings of the 39th International Conference on Software Engineering, 2017

2016
Time Series Classification with Discrete Wavelet Transformed Data.
International Journal of Software Engineering and Knowledge Engineering, 2016

Empirical assessment of machine learning-based malware detectors for Android - Measuring the gap between in-the-lab and in-the-wild validation scenarios.
Empirical Software Engineering, 2016

Parameter Values of Android APIs: A Preliminary Study on 100, 000 Apps.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

An Investigation into the Use of Common Libraries in Android Apps.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

Name suggestions during feature identification: the variclouds approach.
Proceedings of the 20th International Systems and Software Product Line Conference, 2016

Mining families of android applications for extractive SPL adoption.
Proceedings of the 20th International Systems and Software Product Line Conference, 2016

Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

Towards a generic framework for automating extensive analysis of Android applications.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Near real-time electric load approximation in low voltage cables of smart grids with models@run.time.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Profiling Android Vulnerabilities.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

AndroZoo: collecting millions of Android apps for the research community.
Proceedings of the 13th International Conference on Mining Software Repositories, 2016

DSCo: A Language Modeling Approach for Time Series Classification.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2016

Reflection-aware static analysis of Android apps.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

DroidRA: taming reflection to support whole-program analysis of Android apps.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

DSCo-NG: A Practical Language Modeling Approach for Time Series Classification.
Proceedings of the Advances in Intelligent Data Analysis XV - 15th International Symposium, 2016

Feature Location Benchmark for Software Families Using Eclipse Community Releases.
Proceedings of the Software Reuse: Bridging with Social-Awareness, 2016

VCU: The Three Dimensions of Reuse.
Proceedings of the Software Reuse: Bridging with Social-Awareness, 2016

Accessing Inaccessible Android APIs: An Empirical Study.
Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution, 2016

Profiling household appliance electricity usage with N-gram language modeling.
Proceedings of the IEEE International Conference on Industrial Technology, 2016

On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
An extensive systematic review on the Model-Driven Development of secure systems.
Information & Software Technology, 2015

An Extensive Systematic Review on Model-Driven Development of Secure Systems.
CoRR, 2015

An Investigation into the Use of Common Libraries in Android Apps.
CoRR, 2015

Bottom-up adoption of software product lines: a generic and extensible approach.
Proceedings of the 19th International Conference on Software Product Line, 2015

Suspicious electric consumption detection based on multi-profiling using live machine learning.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Potential Component Leaks in Android Apps: An Investigation into a New Feature Set for Malware Detection.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Polymer - A Model-driven Approach for Simpler, Safer, and Evolutive Multi-objective Optimization Development.
Proceedings of the MODELSWARD 2015, 2015

SoSPa: A system of Security design Patterns for systematically engineering secure systems.
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

Beyond discrete modeling: A continuous and efficient model for IoT.
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

Stream my models: Reactive peer-to-peer distributed models@run.time.
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

Automating the Extraction of Model-Based Software Product Lines from Model Variants (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Estimating and Predicting Average Likability on Computer-Generated Artwork Variants.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

2014
Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-Wise Test Configurations for Software Product Lines.
IEEE Trans. Software Eng., 2014

Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges and Solutions for Analyzing Android.
IEEE Trans. Software Eng., 2014

I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
CoRR, 2014

Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android.
CoRR, 2014

Advances in Model-Driven Security.
Advances in Computers, 2014

Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines.
Proceedings of the Second IEEE Working Conference on Software Visualization, 2014

Automatically Exploiting Potential Component Leaks in Android Applications.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Model-Driven Security with A System of Aspect-Oriented Security Design Patterns.
Proceedings of the 2nd Workshop on View-Based, 2014

Reactive Security for Smart Grids Using Models@run.time-Based Simulation and Reasoning.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Generating realistic Smart Grid communication topologies based on real-data.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Model-based time-distorted Contexts for efficient temporal Reasoning.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014

A Native Versioning Concept to Support Historized Models at Runtime.
Proceedings of the Model-Driven Engineering Languages and Systems, 2014

Modeling, Composing, and Testing of Security Concerns in a Model-Driven Security Approach.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Detecting Privacy Leaks in Android Apps.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Identifying and Visualising Commonality and Variability in Model Variants.
Proceedings of the Modelling Foundations and Applications - 10th European Conference, 2014

A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected?
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management.
LNCS Trans. Aspect Oriented Softw. Dev., 2013

Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

PLEDGE: a product line editor and test generation tool.
Proceedings of the 17th International Software Product Line Conference co-located workshops, 2013

Multi-objective test generation for software product lines.
Proceedings of the 17th International Software Product Line Conference, 2013

Got issues? Who cares about it? A large scale investigation of issue trackers from GitHub.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Towards automated testing and fixing of re-engineered feature models.
Proceedings of the 35th International Conference on Software Engineering, 2013

Achieving Practical Genericity in Model Weaving through Extensibility.
Proceedings of the Theory and Practice of Model Transformations, 2013

A Systematic Review of Model-Driven Security.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

Model-driven adaptive delegation.
Proceedings of the Aspect-Oriented Software Development, 2013

The NOAH Project: Giving a Chance to Threatened Species in Africa with UAVs.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013

Sustainable ICT4D in Africa: Where Do We Go from Here?
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013

2012
Pairwise testing for software product lines: comparison of two approaches.
Software Quality Journal, 2012

Evolving Software - Introduction to the Special Theme.
ERCIM News, 2012

Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Suites for Large Software Product Lines
CoRR, 2012

Improving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation
CoRR, 2012

Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android
CoRR, 2012

Model Driven Mutation Applied to Adaptative Systems Testing
CoRR, 2012

Dexpler: Converting Android Dalvik Bytecode to Jimple for Static Analysis with Soot
CoRR, 2012

Dexpler: converting Android Dalvik bytecode to Jimple for static analysis with Soot.
Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis, 2012

Automatically securing permission-based software by reducing the attack surface: an application to Android.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Towards flexible evolution of Dynamically Adaptive Systems.
Proceedings of the 34th International Conference on Software Engineering, 2012

Building specifications as a domain-specific aspect language.
Proceedings of the seventh workshop on Domain-Specific Aspect Languages, 2012

2011
Issues in model-driven behavioural product derivation.
Proceedings of the Fifth International Workshop on Variability Modelling of Software-Intensive Systems, 2011


Model Driven Mutation Applied to Adaptative Systems Testing.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

Aspect-Oriented Model Development at Different Levels of Abstraction.
Proceedings of the Modelling Foundations and Applications - 7th European Conference, 2011

2010
Aspect-Oriented Design with Reusable Aspect Models.
LNCS Trans. Aspect Oriented Softw. Dev., 2010

Flexible Model Element Introduction Policies for Aspect-Oriented Modeling.
Proceedings of the Model Driven Engineering Languages and Systems, 2010

Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines.
Proceedings of the Third International Conference on Software Testing, 2010

2009
Aspect Model Unweaving.
Proceedings of the Model Driven Engineering Languages and Systems, 2009

Aspect-oriented multi-view modeling.
Proceedings of the 8th International Conference on Aspect-Oriented Software Development, 2009

2008
Reconciling Automation and Flexibility in Product Derivation.
Proceedings of the Software Product Lines, 12th International Conference, 2008

Composing Multi-view Aspect Models.
Proceedings of the Seventh International Conference on Composition-Based Software Systems (ICCBSS 2008), 2008

2007
Weaving Multiple Aspects in Sequence Diagrams.
LNCS Trans. Aspect Oriented Softw. Dev., 2007

2006
Aspects Comportementaux et Tissage.
PhD thesis, 2006

Tissage d'aspects comportementaux.
Proceedings of the Actes des journéees Langages et Modèles à Objets, 2006

Semantic-based weaving of scenarios.
Proceedings of the 5th International Conference on Aspect-Oriented Software Development, 2006

2005
Merging Scenarios.
Electr. Notes Theor. Comput. Sci., 2005


  Loading...