Yvesle Traon Le Traon
#146,038
Most Influential Person Now
Yvesle Traon Le Traon's AcademicInfluence.com Rankings
Yvesle Traon Le Traoncomputer-science Degrees
Computer Science
#7327
World Rank
#7717
Historical Rank
Software Engineering
#202
World Rank
#204
Historical Rank
Database
#4383
World Rank
#4557
Historical Rank

Download Badge
Computer Science
Why Is Yvesle Traon Le Traon Influential?
(Suggest an Edit or Addition)Yvesle Traon Le Traon's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps (2014) (1784)
- AndroZoo: Collecting Millions of Android Apps for the Research Community (2016) (609)
- IccTA: Detecting Inter-Component Privacy Leaks in Android Apps (2015) (559)
- Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis (2013) (354)
- Automatic test generation: a use case driven approach (2006) (324)
- Refactoring UML Models (2001) (302)
- Chapter Six - Mutation Testing Advances: An Analysis and Survey (2019) (288)
- A state-of the-art survey & testbed of fuzzy AHP (FAHP) applications (2016) (284)
- Static analysis of android apps: A systematic literature review (2017) (254)
- Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines (2010) (242)
- Dexpler: converting Android Dalvik bytecode to Jimple for static analysis with Soot (2012) (230)
- Improving test suites for efficient fault localization (2006) (222)
- Metallaxis‐FL: mutation‐based fault localization (2015) (211)
- Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-Wise Test Configurations for Software Product Lines (2014) (190)
- Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique (2015) (173)
- Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines (2015) (171)
- Comparing White-Box and Black-Box Test Prioritization (2016) (155)
- Metamodel-based Test Generation for Model Transformations: an Algorithm and a Tool (2006) (148)
- Barriers to systematic model transformation testing (2010) (145)
- Automatically securing permission-based software by reducing the attack surface: an application to Android (2012) (145)
- Got issues? Who cares about it? A large scale investigation of issue trackers from GitHub (2013) (140)
- Pairwise testing for software product lines: comparison of two approaches (2012) (135)
- Efficient object-oriented integration and regression testing (2000) (131)
- Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis (2013) (130)
- Empirical assessment of machine learning-based malware detectors for Android (2016) (125)
- An Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation That Avoids the Unreliable Clean Program Assumption (2017) (117)
- An Investigation into the Use of Common Libraries in Android Apps (2015) (112)
- Software Reliability Modeling with Test Coverage: Experimentation and Measurement with A Fault-Tolerant Software Project (2007) (110)
- Multi-objective test generation for software product lines (2013) (107)
- Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis (2016) (104)
- Qualifying input test data for model transformations (2009) (103)
- Mutation Analysis Testing for Model Transformations (2006) (101)
- Highly precise taint analysis for Android applications (2013) (100)
- Bottom-up adoption of software product lines: a generic and extensible approach (2015) (100)
- Threats to the validity of mutation-based test assessment (2016) (99)
- A Model-Based Framework for Security Policy Specification, Deployment and Testing (2008) (98)
- From genetic to bacteriological algorithms for mutation‐based testing (2005) (95)
- You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems (2018) (93)
- Model-Based Tests for Access Control Policies (2008) (92)
- FaCoY – A Code-to-Code Search Engine (2018) (91)
- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis (2015) (89)
- Learning to Spot and Refactor Inconsistent Method Names (2019) (88)
- Testability analysis of a UML class diagram (2002) (88)
- Comparison of metadata quality in open data portals using the Analytic Hierarchy Process (2017) (87)
- Automatic test case optimization: a bacteriologic algorithm (2005) (85)
- Model Transformation Testing Challenges (2006) (85)
- Test Synthesis from UML Models of Distributed Software (2002) (83)
- Using Mutants to Locate "Unknown" Faults (2012) (82)
- Design by Contract to Improve Software Vigilance (2006) (80)
- Testing Security Policies: Going Beyond Functional Testing (2007) (80)
- I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis (2014) (79)
- Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing (2013) (78)
- AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community (2017) (77)
- Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges and Solutions for Analyzing Android (2014) (75)
- Permissioned blockchain frameworks in the industry: A comparison (2020) (73)
- Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware (2017) (72)
- An extensive systematic review on the Model-Driven Development of secure systems (2015) (72)
- Automatically Exploiting Potential Component Leaks in Android Applications (2014) (71)
- A Tridimensional Approach for Studying the Formal Verification of Model Transformations (2012) (70)
- On the Efficiency of Test Suite based Program Repair A Systematic Assessment of 16 Automated Repair Systems for Java Programs (2020) (70)
- Model transformation testing: oracle issue (2008) (67)
- Automating the Extraction of Model-Based Software Product Lines from Model Variants (T) (2015) (67)
- A Requirement-Based Approach to Test Product Families (2003) (66)
- Requirements by contracts allow automated system testing (2003) (66)
- Semantic fuzzing with zest (2018) (62)
- Measuring design testability of a UML class diagram (2005) (61)
- iFixR: bug report driven program repair (2019) (60)
- Automatic test case optimization using a bacteriological adaptation model: application to .NET components (2002) (60)
- Genes and bacteria for automatic test cases optimization in the .NET environment (2002) (59)
- Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection (2015) (58)
- Mutation-Based Generation of Software Product Line Test Configurations (2014) (58)
- The importance of accounting for real-world labelling when predicting software vulnerabilities (2019) (54)
- Selecting an Efficient OO Integration Testing Strategy: An Experimental Comparison of Actual Strategies (2001) (54)
- Accessing Inaccessible Android APIs: An Empirical Study (2016) (52)
- Evaluating Context Descriptions and Property Definition Patterns for Software Formal Validation (2009) (51)
- System Testing of Product Lines: From Requirements to Test Cases (2006) (50)
- Model-Driven Engineering for Requirements Analysis (2007) (49)
- Bench4BL: reproducibility study on the performance of IR-based bug localization (2018) (49)
- Effective fault localization via mutation analysis: a selective mutation approach (2014) (49)
- Measuring and improving design patterns testability (2003) (48)
- Transforming and Selecting Functional Test Cases for Security Policy Testing (2009) (48)
- Self-testable components: from pragmatic tests to design-for-testability methodology (1999) (46)
- A Forensic Analysis of Android Malware -- How is Malware Written and How it Could Be Detected? (2014) (46)
- Automated requirements-based generation of test cases for product families (2003) (46)
- Assessing and Improving the Mutation Testing Practice of PIT (2016) (45)
- How effective are mutation testing tools? An empirical analysis of Java mutation testing tools with manual analysis and real faults (2018) (45)
- AjMutator: A Tool for the Mutation Analysis of AspectJ Pointcut Descriptors (2009) (45)
- Augmenting and structuring user queries to support efficient free-form code search (2018) (44)
- Validity Fuzzing and Parametric Generators for Effective Random Testing (2018) (44)
- Formal Verification Techniques for Model Transformations: A Tridimensional Classification (2015) (44)
- Towards a language-independent approach for reverse-engineering of software product lines (2014) (43)
- Security-driven model-based dynamic adaptation (2010) (43)
- Generating realistic Smart Grid communication topologies based on real-data (2014) (43)
- Testability measurements for data flow designs (1997) (42)
- A Replicable Comparison Study of NER Software: StanfordNLP, NLTK, OpenNLP, SpaCy, Gate (2019) (42)
- Sound and Quasi-Complete Detection of Infeasible Test Requirements (2015) (42)
- Reliable Objects: Lightweight Testing for OO Languages (2001) (41)
- A Closer Look at Real-World Patches (2018) (41)
- Test Selection for Deep Learning Systems (2019) (41)
- On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware (2016) (41)
- A model-based approach to automated testing of access control policies (2012) (40)
- Reusable MDA components: a testing-for-trust approach (2006) (40)
- Mitigating the effects of equivalent mutants with mutant classification strategies (2014) (38)
- A Test-Driven Approach to Developing Pointcut Descriptors in AspectJ (2009) (38)
- Towards automated testing and fixing of re-engineered Feature Models (2013) (38)
- Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing (2014) (37)
- A systematic review on the engineering of software for ubiquitous systems (2016) (36)
- Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Suites for Large Software Product Lines (2012) (35)
- PLEDGE: a product line editor and test generation tool (2013) (35)
- Robustness and diagnosability of OO systems designed by contracts (2001) (35)
- Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines (2014) (35)
- Producing a Global Requirement Model from Multiple Requirement Specifications (2007) (34)
- Bottom-Up Technologies for Reuse: Automated Extractive Adoption of Software Product Lines (2017) (34)
- From hardware to software testability (1995) (34)
- Test-Driven Assessment of Access Control in Legacy Applications (2008) (33)
- Analyzing Complex Data in Motion at Scale with Temporal Graphs (2017) (33)
- Vulnerability Prediction Models: A Case Study on the Linux Kernel (2016) (33)
- The next evolution of MDE: a seamless integration of machine learning into domain modeling (2017) (33)
- Analyzing testability on data flow designs (2000) (32)
- Building trust into OO components using a genetic analogy (2000) (32)
- Advances in Model-Driven Security (2014) (32)
- Identifying and Visualising Commonality and Variability in Model Variants (2014) (32)
- Data-driven Simulation and Optimization for Covid-19 Exit Strategies (2020) (31)
- A Native Versioning Concept to Support Historized Models at Runtime (2014) (30)
- Improving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation (2012) (30)
- Similarity testing for access control (2015) (29)
- Measuring inconsistency and deriving priorities from fuzzy pairwise comparison matrices using the knowledge-based consistency index (2018) (29)
- Strong Mutation-Based Test Data Generation Using Hill Climbing (2016) (29)
- Mutant Quality Indicators (2018) (29)
- Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective (2009) (28)
- Towards Dependable Model Transformations: Qualifying Input Test Data (2007) (28)
- Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets (2015) (28)
- Selection of regression system tests for security policy evolution (2012) (27)
- Automatically Locating Malicious Packages in Piggybacked Android Apps (2017) (27)
- A Systematic Review of Model-Driven Security (2013) (26)
- Name suggestions during feature identification: the variclouds approach (2016) (25)
- API Document Quality for Resolving Deprecated APIs (2014) (25)
- Reverse-engineering of UML 2.0 Sequence Diagrams from Execution Traces (2006) (25)
- Towards flexible evolution of Dynamically Adaptive Systems (2012) (24)
- Trustable components: yet another mutation-based approach (2000) (23)
- Impact of tool support in patch construction (2017) (23)
- Efficient strategies for integration and regression testing of OO systems (1999) (22)
- Assessing Transition-Based Test Selection Algorithms at Google (2019) (22)
- Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality (2014) (22)
- Stream my models: Reactive peer-to-peer distributed models@run.time (2015) (22)
- Machine Learning-Based Malware Detection for Android Applications: History Matters! (2014) (22)
- A Framework for Testing Peer-to-Peer Systems (2008) (21)
- Watch out for this commit! A study of influential software changes (2016) (21)
- Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants (2018) (21)
- D&C: A Divide-and-Conquer Approach to IR-based Bug Localization (2019) (21)
- Parameter Values of Android APIs: A Preliminary Study on 100,000 Apps (2016) (20)
- Refactoring access control policies for performance improvement (2012) (20)
- SoSPa: A system of Security design Patterns for systematically engineering secure systems (2015) (20)
- An Enterprise Architecture Alignment Measure for Telecom Service Development (2007) (20)
- Towards a 'safe' use of design patterns to improve OO software testability (2001) (20)
- Inquiring the usage of aspect-oriented programming: An empirical study (2009) (20)
- On Locating Malicious Code in Piggybacked Android Apps (2017) (20)
- Revisiting the impact of common libraries for android-related investigations (2019) (19)
- Beyond discrete modeling: A continuous and efficient model for IoT (2015) (19)
- Mining families of android applications for extractive SPL adoption (2016) (19)
- Reusable test requirements for UML-modeled product lines (2002) (19)
- Open Data Portal Quality Comparison using AHP (2016) (19)
- Model Driven Mutation Applied to Adaptative Systems Testing (2011) (18)
- Coverage-Based Test Cases Selection for XACML Policies (2014) (18)
- Mart: a mutant generation tool for LLVM (2019) (18)
- An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel (2016) (17)
- O-MI/O-DF standards as interoperability enablers for Industrial Internet: A performance analysis (2016) (17)
- GreyCat: Efficient What-If Analytics for Data in Motion at Scale (2018) (17)
- Testing Obligation Policy Enforcement Using Mutation Analysis (2012) (16)
- Generic cloud platform multi-objective optimization leveraging models@run.time (2014) (16)
- Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study (2016) (16)
- Are mutants really natural?: a study on how "naturalness" helps mutant selection (2018) (16)
- Privacy challenges in Ambient Intelligence systems (2016) (16)
- A Replication Study on the Usability of Code Vocabulary in Predicting Flaky Tests (2021) (16)
- Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach (2014) (16)
- Enabling the Continous Analysis of Security Vulnerabilities with VulData7 (2018) (16)
- Model-based testing of global properties on large-scale distributed systems (2014) (16)
- Testing-for-trust: the genetic selection model applied to component qualification (2000) (15)
- Killing Stubborn Mutants with Symbolic Execution (2020) (15)
- On the Impact of Tokenizer and Parameters on N-Gram Based Code Analysis (2018) (15)
- Impact of System Partitioning on Test Cost (1997) (15)
- Towards semantic interoperability in an open IoT ecosystem for connected vehicle services (2017) (15)
- Assessing and Comparing Mutation-based Fault Localization Techniques (2016) (15)
- PROFICIENT: Productivity Tool for Semantic Interoperability in an Open IoT Ecosystem (2017) (15)
- Model-Driven Security with A System of Aspect-Oriented Security Design Patterns (2014) (15)
- Linked Vocabulary Recommendation Tools for Internet of Things (2019) (15)
- Tailored Shielding and Bypass Testing of Web Applications (2011) (14)
- Efficient Distributed Test Architectures for Large-Scale Systems (2010) (14)
- Ungrafting Malicious Code from Piggybacked Android Apps (2016) (14)
- Reliable Objects: a Lightweight Approach Applied to Java (2001) (14)
- Profiling household appliance electricity usage with N-gram language modeling (2016) (14)
- Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification (2018) (14)
- Visualizing and Exploring Dynamic High-Dimensional Datasets with LION-tSNE (2017) (13)
- Testing peer-to-peer systems (2010) (13)
- Continuous Identification in Smart Environments Using Wrist-Worn Inertial Sensors (2018) (13)
- Time Series Classification with Discrete Wavelet Transformed Data (2016) (13)
- EA4UP: An Enterprise Architecture-Assisted Telecom Service Development Method (2008) (13)
- Suspicious electric consumption detection based on multi-profiling using live machine learning (2015) (13)
- Proteum/FL: A tool for localizing faults using mutation analysis (2013) (13)
- Towards an automatic diagnosis for high-level design validation (1998) (12)
- Assessing the impact of attacks on OPC-UA applications in the Industry 4.0 era (2019) (12)
- Usage and testability of AOP: An empirical study of AspectJ (2013) (12)
- On the Evolution of Keyword-Driven Test Suites (2019) (12)
- Towards a unified approach to the testability of co-designed systems (1995) (12)
- Model-driven adaptive delegation (2013) (12)
- Understanding Android App Piggybacking (2017) (12)
- A training-resistant anomaly detection system (2018) (12)
- Reactive Security for Smart Grids Using Models@run.time-Based Simulation and Reasoning (2014) (12)
- Variability Management and Assessment for User Interface Design (2017) (11)
- Business and Information System Alignment: A Formal Solution for Telecom Services (2010) (11)
- Model-Driven Analytics: Connecting Data, Domain Knowledge, and Learning (2017) (11)
- Micro-billing Framework for IoT: Research & Technological Foundations (2016) (10)
- Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components (2017) (10)
- A Rule-Based Contextual Reasoning Platform for Ambient Intelligence Environments (2013) (10)
- Cerebro: Static Subsuming Mutant Selection (2021) (10)
- An approach for testing pointcut descriptors in AspectJ (2011) (10)
- Detecting Privacy Leaks in Android Apps (2014) (10)
- From diagnosis to diagnosability: axiomatization, measurement and application (2003) (10)
- Automated functional test case synthesis from THALES industrial requirements (2004) (10)
- Mutation testing strategies using mutant classification (2013) (10)
- Peer-to-Peer Load Testing (2012) (10)
- Search-based adversarial testing and improvement of constrained credit scoring systems (2020) (10)
- Automated Search for Configurations of Convolutional Neural Network Architectures (2019) (9)
- Testability analysis of co-designed systems (1995) (9)
- MutaLog: A Tool for Mutating Logic Formulas (2014) (9)
- Estimating and Predicting Average Likability on Computer-Generated Artwork Variants (2015) (9)
- Adversarial Robustness in Multi-Task Learning: Promises and Illusions (2021) (9)
- Sustainable ICT4D in Africa: Where Do We Go from Here? (2013) (9)
- Learning to Catch Security Patches (2020) (9)
- Under Pressure Benchmark for DDBMS Availability (2013) (9)
- Security@Runtime: A Flexible MDE Approach to Enforce Fine-grained Security Policies (2014) (9)
- The NOAH Project: Giving a Chance to Threatened Species in Africa with UAVs (2013) (9)
- Cloud Providers Viability: How to Address it from an IT and Legal Perspective? (2015) (9)
- Feature Location Benchmark for Software Families Using Eclipse Community Releases (2016) (9)
- Vidock: A Tool for Impact Analysis of Aspect Weaving on Test Cases (2010) (9)
- DSCo: A Language Modeling Approach for Time Series Classification (2016) (8)
- iBiR: Bug-report-driven Fault Injection (2020) (8)
- Regression test selection when evolving software with aspects (2008) (8)
- Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management (2013) (8)
- Inroads in Testing Access Control (2015) (7)
- Towards a generic framework for automating extensive analysis of Android applications (2016) (7)
- The Multi-Generation Repackaging Hypothesis (2017) (7)
- GraphCode2Vec: Generic Code Embedding via Lexical and Program Dependence Analyses (2021) (7)
- DSCo-NG: A Practical Language Modeling Approach for Time Series Classification (2016) (7)
- Software diagnosability (1998) (7)
- Introducing Conviviality as a New Paradigm for Interactions among IT Objects (2012) (7)
- Multi-agent deep reinforcement learning based Predictive Maintenance on parallel machines (2022) (7)
- Muteria: An Extensible and Flexible Multi-Criteria Software Testing Framework (2020) (7)
- Efficiently computing the likelihoods of cyclically interdependent risk scenarios (2017) (7)
- XSS-FP: Browser Fingerprinting using HTML Parser Quirks (2012) (7)
- Verifying Access Control in Statecharts (2012) (7)
- A Qualitative Study on the Sources, Impacts, and Mitigation Strategies of Flaky Tests (2021) (7)
- Towards Estimating and Predicting User Perception on Software Product Variants (2018) (6)
- Analysis and Improvement of the Alignment between Business and Information System for Telecom Services (2011) (6)
- Model-Based Testing for the Cloud (2010) (6)
- An Industrial Study on the Differences between Pre-Release and Post-Release Bugs (2019) (6)
- Search-based test and improvement of machine-learning-based anomaly detection systems (2019) (6)
- Building Lifecycle Management System for Enhanced Closed Loop Collaboration (2016) (6)
- [Engineering Paper] Enabling the Continuous Analysis of Security Vulnerabilities with VulData7 (2018) (6)
- A Case Driven Study of the Use of Time Series Classification for Flexibility in Industry 4.0 (2020) (6)
- Stress Testing of Transactional Database Systems (2013) (6)
- Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services (2015) (6)
- Near real-time electric load approximation in low voltage cables of smart grids with models@run.time (2016) (6)
- Testability-oriented hardware/software partitioning (1996) (5)
- Knowledge-based consistency index for fuzzy pairwise comparison matrices (2017) (5)
- LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity (2022) (5)
- Information Dependencies in MCS: Conviviality-Based Model and Metrics (2013) (5)
- Software Fairness: An Analysis and Survey (2022) (5)
- Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: An Urgent Need for Systematic Security Regression Testing (2014) (5)
- Model-Based Testing of Obligations (2014) (5)
- From testing to diagnosis: an automated approach (2004) (5)
- Flattening or not of the combinatorial interaction testing models? (2015) (5)
- Cloud providers viability (2018) (5)
- Adversarial Embedding: A robust and elusive Steganography and Watermarking technique (2019) (5)
- Intra-query adaptivity for MapReduce query processing systems (2014) (5)
- Towards Exploring the Limitations of Active Learning: An Empirical Study (2021) (5)
- FlexiRepair: Transparent Program Repair with Generic Patches (2020) (4)
- Popularity-Driven Ontology Ranking Using Qualitative Features (2019) (4)
- Raising Time Awareness in Model-Driven Engineering: Vision Paper (2017) (4)
- Testing Peers' Volatility (2008) (4)
- Predicting the fault revelation utility of mutants (2018) (4)
- Syntactic Vs. Semantic similarity of Artificial and Real Faults in Mutation Testing Studies (2021) (4)
- Preventing data leakage in service orchestration (2011) (4)
- TUNA: TUning Naturalness-Based Analysis (2018) (4)
- Optimizing Multi-objective Evolutionary Algorithms to Enable Quality-Aware Software Provisioning (2014) (4)
- "Overloaded!" - A Model-Based Approach to Database Stress Testing (2016) (4)
- Conviviality-driven access control policy (2015) (4)
- O-MI/O-DF vs. MQTT: A performance analysis (2018) (4)
- CodeBERT-nt: Code Naturalness via CodeBERT (2022) (3)
- Preventing Overloading Incidents on Smart Grids: A Multiobjective Combinatorial Optimization Approach (2020) (3)
- A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space (2021) (3)
- LOVBench: Ontology Ranking Benchmark (2020) (3)
- Language-Specific vs. Language-Independent Approaches: Embedding Semantics on a Metamodel for Testing and Verifying Access Control Policies (2010) (3)
- Sensing by proxy in buildings with agglomerative clustering of indoor temperature movements (2017) (3)
- Efficient and Transferable Adversarial Examples from Bayesian Neural Networks (2020) (3)
- On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks (2022) (3)
- Towards a Full Support of Obligations in XACML (2014) (3)
- Artificial Mutation inspired Hyper-heuristic for Runtime Usage of Multi-objective Algorithms (2013) (3)
- Mutating DAC and MAC Security Policies: A Generic Metamodel Based Approach (2008) (3)
- Learning To Predict Vulnerabilities From Vulnerability-Fixes: A Machine Translation Approach (2020) (3)
- Computational Intelligence for Testing . NET Components (2002) (3)
- Validation of Access Control Systems (2014) (3)
- Automated Search for Configurations of Deep Neural Network Architectures (2019) (3)
- Access control enforcement testing (2013) (3)
- Learning from what we know: How to perform vulnerability prediction using noisy historical data (2020) (3)
- Accompanying Data for paper: How Effective Mutation Testing Tools Are? An Empirical Analysis of Java Mutation Testing Tools with Manual Analysis and Real Faults (2017) (2)
- On the Use of Mutation in Injecting Test Order-Dependency (2021) (2)
- Composing Models at Two Modeling Levels to Capture Heterogeneous Concerns in Requirements (2010) (2)
- FeatureNET: Diversity-Driven Generation of Deep Learning Models (2020) (2)
- Discerning Legitimate Failures From False Alerts: A Study of Chromium's Continuous Integration (2021) (2)
- Predicting Flaky Tests Categories using Few-Shot Learning (2022) (2)
- Effective and Efficient Data Poisoning in Semi-Supervised Learning (2020) (2)
- Model-based time-distorted Contexts for efficient temporal Reasoning (2014) (2)
- UAV degradation identification for pilot notification using machine learning techniques (2016) (2)
- DigBug - Pre/post-processing operator selection for accurate bug localization (2022) (2)
- Evasion Attack STeganography: Turning Vulnerability Of Machine Learning To Adversarial Attacks Into A Real-world Application (2021) (2)
- Confuzzion: A Java Virtual Machine Fuzzer for Type Confusion Vulnerabilities (2021) (2)
- Ukwikora: continuous inspection for keyword-driven testing (2019) (2)
- In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments (2012) (2)
- A Flexible MDE approach to Enforce Fine- grained Security Policies (2014) (1)
- CodeS: Towards Code Model Generalization Under Distribution Shift (2022) (1)
- Weaving Rules into Models@run.time for Embedded Smart Systems (2017) (1)
- TRIDENT: A Three-Steps Strategy to Digitise an Industrial System for Stepping into Industry 4.0 (2019) (1)
- Got Issues ? Who Cares About It ? An Investigation of Issue Trackers of 10 5 Projects (2014) (1)
- XML to Manage Source Engineering in Object-Oriented Development : an Example (2001) (1)
- CodeS: A Distribution Shift Benchmark Dataset for Source Code Learning (2022) (1)
- Augmenting and structuring user queries to support efficient free-form code search (2018) (1)
- Characterizing and Understanding the Behavior of Quantized Models for Reliable Deployment (2022) (1)
- Robust Active Learning: Sample-Efficient Training of Robust Deep Learning Models (2021) (1)
- An Empirical Study on Vulnerability Prediction of Open-Source Software Releases (2019) (1)
- Chameleon : The Performance Tuning Tool for MapReduce Query Processing Systems (2014) (1)
- Sustainable ICT 4 D in Africa : Where Do We Go From Here ? (2016) (1)
- Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures (2016) (1)
- Mutation analysis applied to security tests (2007) (1)
- A state machine for database non-functional testing (2014) (1)
- What Made This Test Flake? Pinpointing Classes Responsible for Test Flakiness (2022) (1)
- Proceedings of the IECON 2016 - 42nd Annual Conference of the Industrial Electronics Society, Florence (Italy), October 24-27, 2016 (2016) (1)
- MUTEN: Boosting Gradient-Based Adversarial Attacks via Mutant-Based Ensembles (2021) (1)
- A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications (2013) (1)
- Considering test economics in the process of hardware/software partitioning (1996) (1)
- Pandemic Simulation and Forecasting of exit strategies:Convergence of Machine Learning and EpidemiologicalModels (2020) (1)
- Roundtable: Research Opportunities and Challenges for Emerging Software Systems (2015) (1)
- Modeling, Composing, and Testing of Security Concerns in a Model-Driven Security Approach (2014) (1)
- Influence-Driven Data Poisoning in Graph-Based Semi-Supervised Classifiers (2020) (1)
- Going Further: Flatness at the Rescue of Early Stopping for Adversarial Example Transferability (2023) (0)
- Software - Mutator : Mutation testing tool family for OO programs (2004) (0)
- GAT: Guided Adversarial Training with Pareto-optimal Auxiliary Tasks (2023) (0)
- Contracts and Grants with Industry - FAMILIES ( ITEA Eureka) (2004) (0)
- Decision support system for blockchain (DLT) platform selection based on ITU recommendations: A systematic literature review approach (2022) (0)
- ReturnStatement “ return statement code ” InfixExpression “ InfixExpression code ” “ code ” MethodInvocation “ code ” InfixExpression “ code (2018) (0)
- Smart discovery of periodic-frequent human routines for home automation (2019) (0)
- Load approximation for uncertain topologies in the low-voltage grid (2020) (0)
- Keynote - Model-driven Analytics with Models@run.time: The Case of Cyber-Physical-Systems (2015) (0)
- GraphCode2Vec (2022) (0)
- Runtime verification of declassification for imperative programs: Formal foundations (2009) (0)
- Enhancing Mixup-Based Graph Learning for Language Processing via Hybrid Pooling (2022) (0)
- Contracts and Grants with Industry - MUTATION 2 ( carroll) (2004) (0)
- Model Driven Engineering for Component Based Software (2004) (0)
- New Results - Model-Based Testing (2004) (0)
- Contracts and Grants with Industry - DOMINO (RNTL) (2008) (0)
- Introducing Conviviality as a property of Multi-Context Systems (2012) (0)
- Proceedings of the 2013 International Workshop on Testing the Cloud (2013) (0)
- On the Naturalness of Mutants (2017) (0)
- Reusable MDA Components : A Design-for-Trust Approach (2005) (0)
- Beyond Discrete Modeling : Continuous and Efficient Models @ Run . time for IoT (2015) (0)
- Regions Step 2 Step 3 Step 4 Step 5 Divide Conquer Best Models Leaf-wise Weights Computations Code changes in Software repositories Bug fix patches (2019) (0)
- VAST 2011 workshop summary (2011) (0)
- ACoRe: Automated Goal-Conflict Resolution (2023) (0)
- Contracts and Grants with Industry - France Telecom R& D (2007) (0)
- Labeling-Free Comparison Testing of Deep Learning Models (2022) (0)
- Contracts and Grants with Industry - Orange Labs (2008) (0)
- The Importance of Discerning Flaky from Fault-triggering Test Failures: A Case Study on the Chromium CI (2023) (0)
- Using A Path Matching Algorithm to Detect Inter-Component Leaks in Android Apps (2014) (0)
- 745 ) Details Type : Bug Status : CLOSED Priority : Major Resolution : Complete Affects (2019) (0)
- Combinatorial testing and model checking (2022) (0)
- Other Grants and Activities - National projects (2004) (0)
- Towards a Plug-and-Play and Holistic Data Mining Framework for Understanding and Facilitating Operations in Smart Buildings (2017) (0)
- A Systematic Approach for Evaluating Artificial Intelligence Models in Industrial Settings (2021) (0)
- Contracts and Grants with Industry - KEREVAL (2004) (0)
- Aries: Efficient Testing of Deep Neural Networks via Labeling-Free Accuracy Estimation (2022) (0)
- Sputnik: Elitist Artifical Mutation Hyper-heuristic for Runtime Usage of Multi-objective Evolutionary Algorithms (2014) (0)
- Contracts and Grants with Industry - AOSD-Europe (Network of Excellence) (2004) (0)
- Tools for Conviviality in Multi-Context Systems (2014) (0)
- Configurable Model Refinements for Palladio based on a Generic Model (2013) (0)
- R-CoRe: A Rule-based Contextual Reasoning Platform for AmI (2013) (0)
- Chapter 3 Variability Management and Assessment for User Interface Design (2017) (0)
- LaF: Labeling-Free Model Selection for Automated Deep Neural Network Reusing (2022) (0)
- Fuzz testing for digital TV receivers and multitasking control software verification (2022) (0)
- Raising Time Awareness in Model-Driven Engineering (2018) (0)
- Leveraging Time Distortion for seamless Navigation into Data Space-Time Continuum (2014) (0)
- FeatureNET (2020) (0)
- Testability Analysis of a UML Class Diagram 1 (2002) (0)
- Guest Editorial: A Retrospective of Special Sections on Software Testing and Program Analysis (2021) (0)
- Model‐based testing (2023) (0)
- Integration testing and metamorphic testing (2022) (0)
- Efficient Mutation Testing via Pre-Trained Language Models (2023) (0)
- Enhancing Code Classification by Mixup-Based Data Augmentation (2022) (0)
- BUT4Reuse Feature identifier: Identifying reusable features on software variants (2014) (0)
- Assertion Inferring Mutants (2023) (0)
- Efficient and Transferable Adversarial Examples from Bayesian Neural Networks (2022) (0)
- Bottom-Up Technologies for Reuse: A Framework to Support Extractive Software Product Line Adoption Activities (2023) (0)
- Electronic Communications of the EASST Volume 50 ( 2011 ) Recent Advances in Multi-paradigm Modeling ( MPM 2011 ) Verifying Access Control in Statecharts (2012) (0)
- On Evaluating Adversarial Robustness of Chest X-ray Classification: Pitfalls and Best Practices (2022) (0)
- Vulnerability Mimicking Mutants (2023) (0)
- Can We Automate Away the Main Challenges of End-To-End Testing? (2018) (0)
- Using An Instrumentation based Approach to Detect Inter-Component Leaks in Android Apps (2015) (0)
- Efficient Testing of Deep Neural Networks via Decision Boundary Analysis (2022) (0)
- Android Malware Detection Using BERT (2022) (0)
- Boosting Source Code Learning with Data Augmentation: An Empirical Study (2023) (0)
- Software - Requested : a toolbox for requirement simulation and testing (2004) (0)
- Replication package for "Search-Based Adversarial Testing and Improvement of Constrained Credit Scoring Systems", accepted at ESEC/FSE 2020 (2020) (0)
This paper list is powered by the following services: