关注
Kevin Allix
Kevin Allix
Independent Researcher
在 kallix.net 的电子邮件经过验证
标题
引用次数
引用次数
年份
Androzoo: Collecting millions of android apps for the research community
K Allix, TF Bissyandé, J Klein, Y Le Traon
Proceedings of the 13th international conference on mining software …, 2016
10122016
Empirical assessment of machine learning-based malware detectors for Android: Measuring the gap between in-the-lab and in-the-wild validation scenarios
K Allix, TF Bissyandé, Q Jérome, J Klein, R State, Y Le Traon
Empirical Software Engineering 21, 183-211, 2016
1692016
Are your training datasets yet relevant? an investigation into the importance of timeline in machine learning-based malware detection
K Allix, TF Bissyandé, J Klein, Y Le Traon
International Symposium on Engineering Secure Software and Systems, 51-67, 2015
982015
Using opcode-sequences to detect malicious Android applications
Q Jerome, K Allix, R State, T Engel
2014 IEEE international conference on communications (ICC), 914-919, 2014
892014
A comparison of pre-trained language models for multi-class text classification in the financial domain
Y Arslan, K Allix, L Veiber, C Lothritz, TF Bissyandé, J Klein, A Goujon
Companion Proceedings of the Web Conference 2021, 260-268, 2021
722021
A Forensic Analysis of Android Malware--How is Malware Written and How it Could Be Detected?
K Allix, Q Jérome, TF Bissyandé, J Klein, R State, Y Le Traon
2014 IEEE 38th annual computer software and applications conference, 384-393, 2014
672014
On the lack of consensus in anti-virus decisions: Metrics and insights on building ground truths of android malware
M Hurier, K Allix, TF Bissyandé, J Klein, Y Le Traon
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
612016
DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode
N Daoudi, J Samhi, AK Kabore, K Allix, TF Bissyandé, J Klein
Deployable Machine Learning for Security Defense: Second International …, 2021
412021
Jucify: A step towards android code unification for enhanced static analysis
J Samhi, J Gao, N Daoudi, P Graux, H Hoyez, X Sun, K Allix, ...
Proceedings of the 44th International Conference on Software Engineering …, 2022
402022
Improving privacy on android smartphones through in-vivo bytecode instrumentation
A Bartel, J Klein, M Monperrus, K Allix, Y Le Traon
University of Luxembourg, 2012
382012
Potential component leaks in android apps: An investigation into a new feature set for malware detection
L Li, K Allix, D Li, A Bartel, TF Bissyandé, J Klein
2015 IEEE international conference on software quality, reliability and …, 2015
362015
Machine learning-based malware detection for Android applications: History matters!
K Allix, TFDA Bissyande, J Klein, Y Le Traon
University of Luxembourg, SnT, Luxembourg, Luxembourg, 2014
352014
Evaluating pretrained transformer-based models on the task of fine-grained named entity recognition
C Lothritz, K Allix, L Veiber, J Klein, TFDA Bissyande
28th International Conference on Computational Linguistics, 2020
332020
A deep dive inside drebin: An explorative analysis beyond android malware detection scores
N Daoudi, K Allix, TF Bissyandé, J Klein
ACM Transactions on Privacy and Security 25 (2), 1-28, 2022
282022
Large-scale machine learning-based malware detection: confronting the" 10-fold cross validation" scheme with reality
K Allix, TF Bissyandé, Q Jérome, J Klein, R State, Y Le Traon
Proceedings of the 4th ACM conference on Data and application security and …, 2014
282014
Lessons learnt on reproducibility in machine learning based android malware detection
N Daoudi, K Allix, TF Bissyandé, J Klein
Empirical Software Engineering 26 (4), 74, 2021
222021
A first look at Android applications in Google Play related to COVID-19
J Samhi, K Allix, TF Bissyandé, J Klein
Empirical Software Engineering 26, 1-49, 2021
212021
Learning to catch security patches
AD Sawadogo, TF Bissyandé, N Moha, K Allix, J Klein, L Li, YL Traon
arXiv preprint arXiv:2001.09148, 2020
182020
Towards refined classifications driven by shap explanations
Y Arslan, B Lebichot, K Allix, L Veiber, C Lefebvre, A Boytsov, A Goujon, ...
International Cross-Domain Conference for Machine Learning and Knowledge …, 2022
142022
SSPCatcher: Learning to catch security patches
AD Sawadogo, TF Bissyandé, N Moha, K Allix, J Klein, L Li, Y Le Traon
Empirical Software Engineering 27 (6), 151, 2022
132022
系统目前无法执行此操作,请稍后再试。
文章 1–20