Tegawendé F. Bissyandé

According to our database1, Tegawendé F. Bissyandé authored at least 94 papers between 2010 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants.
Information & Software Technology, 2018

Augmenting and structuring user queries to support efficient free-form code search.
Empirical Software Engineering, 2018

Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark.
CoRR, 2018

FixMiner: Mining Relevant Fix Patterns for Automated Program Repair.
CoRR, 2018

Selecting Fault Revealing Mutants.
CoRR, 2018

FraudDroid: automated ad fraud detection for Android apps.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Characterising deprecated Android APIs.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

Bench4BL: reproducibility study on the performance of IR-based bug localization.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

CiD: automating the detection of API-related compatibility issues in Android apps.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

MoonlightBox: Mining Android API Histories for Uncovering Release-Time Inconsistencies.
Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering, 2018

Towards Estimating and Predicting User Perception on Software Product Variants.
Proceedings of the New Opportunities for Software Reuse - 17th International Conference, 2018

A Closer Look at Real-World Patches.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

Augmenting and structuring user queries to support efficient free-form code search.
Proceedings of the 40th International Conference on Software Engineering, 2018

FaCoY: a code-to-code search engine.
Proceedings of the 40th International Conference on Software Engineering, 2018

On vulnerability evolution in Android apps.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Predicting the fault revelation utility of mutants.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification.
Proceedings of the 21th International Conference on Extending Database Technology, 2018

2017
Variability Management and Assessment for User Interface Design.
Proceedings of the Human Centered Software Product Lines, 2017

Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting.
IEEE Trans. Information Forensics and Security, 2017

On Locating Malicious Code in Piggybacked Android Apps.
J. Comput. Sci. Technol., 2017

Characterizing malicious Android apps by mining topic-specific data flow signatures.
Information & Software Technology, 2017

Static analysis of android apps: A systematic literature review.
Information & Software Technology, 2017

Mining Fix Patterns for FindBugs Violations.
CoRR, 2017

AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community.
CoRR, 2017

SimiDroid: Identifying and Explaining Similarities in Android Apps.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Sensing by proxy in buildings with agglomerative clustering of indoor temperature movements.
Proceedings of the Symposium on Applied Computing, 2017

Euphony: harmonious unification of cacophonous anti-virus vendor labels for Android malware.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

Impact of tool support in patch construction.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Bottom-up technologies for reuse: automated extractive adoption of software product lines.
Proceedings of the 39th International Conference on Software Engineering, 2017

Automatically Locating Malicious Packages in Piggybacked Android Apps.
Proceedings of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2017

Understanding Android app piggybacking.
Proceedings of the 39th International Conference on Software Engineering, 2017

The multi-generation repackaging hypothesis.
Proceedings of the 39th International Conference on Software Engineering, 2017

2016
Time Series Classification with Discrete Wavelet Transformed Data.
International Journal of Software Engineering and Knowledge Engineering, 2016

Empirical assessment of machine learning-based malware detectors for Android - Measuring the gap between in-the-lab and in-the-wild validation scenarios.
Empirical Software Engineering, 2016

Watch out for This Commit! A Study of Influential Software Changes.
CoRR, 2016

Ahead of time static analysis for automatic generation of debugging interfaces to the Linux kernel.
Autom. Softw. Eng., 2016

Parameter Values of Android APIs: A Preliminary Study on 100, 000 Apps.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

An Investigation into the Use of Common Libraries in Android Apps.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

Name suggestions during feature identification: the variclouds approach.
Proceedings of the 20th International Systems and Software Product Line Conference, 2016

Mining families of android applications for extractive SPL adoption.
Proceedings of the 20th International Systems and Software Product Line Conference, 2016

Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

Towards a generic framework for automating extensive analysis of Android applications.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Profiling Android Vulnerabilities.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

AndroZoo: collecting millions of Android apps for the research community.
Proceedings of the 13th International Conference on Mining Software Repositories, 2016

DSCo: A Language Modeling Approach for Time Series Classification.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2016

Reflection-aware static analysis of Android apps.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

DroidRA: taming reflection to support whole-program analysis of Android apps.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

DSCo-NG: A Practical Language Modeling Approach for Time Series Classification.
Proceedings of the Advances in Intelligent Data Analysis XV - 15th International Symposium, 2016

Feature Location Benchmark for Software Families Using Eclipse Community Releases.
Proceedings of the Software Reuse: Bridging with Social-Awareness, 2016

Accessing Inaccessible Android APIs: An Empirical Study.
Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution, 2016

Data model evolution using object-NoSQL mappers: folklore or state-of-the-art?
Proceedings of the 2nd International Workshop on BIG Data Software Engineering, 2016

UAV degradation identification for pilot notification using machine learning techniques.
Proceedings of the 21st IEEE International Conference on Emerging Technologies and Factory Automation, 2016

On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
Implementing an embedded compiler using program transformation rules.
Softw., Pract. Exper., 2015

End-to-End Key Exchange through Disjoint Paths in P2P Networks.
ICST Trans. Security Safety, 2015

Towards an Autonomous Vision-Based Unmanned Aerial System against Wildlife Poachers.
Sensors, 2015

Harvesting Fix Hints in the History of Bugs.
CoRR, 2015

An Investigation into the Use of Common Libraries in Android Apps.
CoRR, 2015

Bottom-up adoption of software product lines: a generic and extensible approach.
Proceedings of the 19th International Conference on Software Product Line, 2015

ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Potential Component Leaks in Android Apps: An Investigation into a New Feature Set for Malware Detection.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Automating the Extraction of Model-Based Software Product Lines from Model Variants (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Estimating and Predicting Average Likability on Computer-Generated Artwork Variants.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

Impact of Small-World Effect on the ip-level Routing Dynamics.
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015

Vulnerabilities of Government Websites in a Developing Country - the Case of Burkina Faso.
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015

2014
Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines.
Proceedings of the Second IEEE Working Conference on Software Visualization, 2014

Matching Information Requests with Node Profiles in Opportunistic Mobile Networks.
Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, 2014

Sensing in the Urban Technological Deserts: A Position Paper for Smart Cities in Least Developed Countries.
Proceedings of the 2014 International Workshop on Web Intelligence and Smart Sensing, 2014

A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected?
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Bootstrapping Software Engineering Training in Developing Countries - Return on Experience at the University of Ouagadougou.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2014

2013
Contributions for Improving Debugging of Kernel-level Services in a Monolithic Operating System. (Contributions à l'Amélioration du Débogage des Services Noyau dans un Système d'Exploitation Monolithique).
PhD thesis, 2013

Improving the performance of message parsers for embedded systems.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

An Empirical Study of Adoption of Software Testing in Open Source Projects.
Proceedings of the 2013 13th International Conference on Quality Software, 2013

Got issues? Who cares about it? A large scale investigation of issue trackers from GitHub.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Orion: A Software Project Search Engine with Integrated Diverse Software Artifacts.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

Network Structure of Social Coding in GitHub.
Proceedings of the 17th European Conference on Software Maintenance and Reengineering, 2013

Adoption of Software Testing in Open Source Projects-A Preliminary Study on 50, 000 Projects.
Proceedings of the 17th European Conference on Software Maintenance and Reengineering, 2013

Empirical Evaluation of Bug Linking.
Proceedings of the 17th European Conference on Software Maintenance and Reengineering, 2013

Popularity, Interoperability, and Impact of Programming Languages in 100, 000 Open Source Projects.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Y Nut, a Phonetic-Based Learning System for Spoken Languages.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013

Improving Rural Emergency Services with Cognitive Radio Networks in Sub-Saharan Africa.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013

The NOAH Project: Giving a Chance to Threatened Species in Africa with UAVs.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013

Sustainable ICT4D in Africa: Where Do We Go from Here?
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013

Towards Securing Communications in Infrastructure-Poor Areas.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013

2012
Zebra: Building Efficient Network Message Parsers for Embedded Systems.
Embedded Systems Letters, 2012

Diagnosys: automatic generation of a debugging interface to the Linux kernel.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Leveraging the Cultural Model for Opportunistic Networking in Sub-Saharan Africa.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2012

Open Source in Africa: An Opportunity Wasted? - Why and How FLOSS Should Make Sense for Africa.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2012

2011
Typhoon: a middleware for epidemic propagation of software updates.
Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2011), Lisbon, Portugal, December 12, 2011

2010
Bridging the Gap between Legacy Services and Web Services.
Proceedings of the Middleware 2010 - ACM/IFIP/USENIX 11th International Middleware Conference, Bangalore, India, November 29, 2010

UbiPAN: A Bluetooth Extended Personal Area Network.
Proceedings of the CISIS 2010, 2010


  Loading...