Follow
Kevin Allix
Kevin Allix
Verified email at centralesupelec.fr
Title
Cited by
Cited by
Year
Androzoo: Collecting millions of android apps for the research community
K Allix, TF Bissyandé, J Klein, Y Le Traon
2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR …, 2016
6762016
Empirical assessment of machine learning-based malware detectors for Android
K Allix, TF Bissyandé, Q Jérome, J Klein, Y Le Traon
Empirical Software Engineering 21 (1), 183-211, 2016
1352016
Are your training datasets yet relevant?
K Allix, TF Bissyandé, J Klein, YL Traon
International Symposium on Engineering Secure Software and Systems, 51-67, 2015
802015
Using opcode-sequences to detect malicious Android applications
Q Jerome, K Allix, R State, T Engel
2014 IEEE international conference on communications (ICC), 914-919, 2014
692014
A Forensic Analysis of Android Malware--How is Malware Written and How it Could Be Detected?
K Allix, Q Jérome, TF Bissyandé, J Klein, R State, Y Le Traon
2014 IEEE 38th Annual Computer Software and Applications Conference, 384-393, 2014
582014
On the lack of consensus in anti-virus decisions: Metrics and insights on building ground truths of android malware
M Hurier, K Allix, TF Bissyandé, J Klein, Y Le Traon
International Conference on Detection of Intrusions and Malware, and …, 2016
542016
Improving privacy on android smartphones through in-vivo bytecode instrumentation
A Bartel, J Klein, M Monperrus, K Allix, Y Le Traon
University of Luxembourg, 2012
372012
Potential component leaks in Android apps: An investigation into a new feature set for malware detection
L Li, K Allix, D Li, A Bartel, TF Bissyandé, J Klein
2015 IEEE International Conference on Software Quality, Reliability and …, 2015
322015
Machine learning-based malware detection for Android applications: History matters!
K Allix, TFDA Bissyande, J Klein, Y Le Traon
University of Luxembourg, SnT, 2014
282014
Large-scale machine learning-based malware detection: confronting the" 10-fold cross validation" scheme with reality
K Allix, TF Bissyandé, Q Jérome, J Klein, R State, Y Le Traon
Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014
242014
A first look at Android applications in Google Play related to COVID-19
J Samhi, K Allix, TF Bissyandé, J Klein
Empirical Software Engineering 26 (4), 1-49, 2021
122021
Lessons learnt on reproducibility in machine learning based Android malware detection
N Daoudi, K Allix, TF Bissyandé, J Klein
Empirical Software Engineering 26 (4), 1-53, 2021
112021
Learning to catch security patches
AD Sawadogo, TF Bissyandé, N Moha, K Allix, J Klein, L Li, YL Traon
arXiv preprint arXiv:2001.09148, 2020
112020
A comparison of pre-trained language models for multi-class text classification in the financial domain
Y Arslan, K Allix, L Veiber, C Lothritz, TF Bissyandé, J Klein, A Goujon
Companion Proceedings of the Web Conference 2021, 260-268, 2021
102021
DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode
N Daoudi, J Samhi, AK Kabore, K Allix, TF Bissyandé, J Klein
International Workshop on Deployable Machine Learning for Security Defense …, 2021
82021
Evaluating pretrained transformer-based models on the task of fine-grained named entity recognition
C Lothritz, K Allix, L Veiber, J Klein, TFDA Bissyande
Proceedings of the 28th International Conference on Computational …, 2020
82020
Challenges Towards {Production-Ready} Explainable Machine Learning
L Veiber, K Allix, Y Arslan, TF Bissyandé, J Klein
2020 USENIX Conference on Operational Machine Learning (OpML 20), 2020
62020
A deep dive inside drebin: An explorative analysis beyond android malware detection scores
N Daoudi, K Allix, TF Bissyandé, J Klein
ACM Transactions on Privacy and Security 25 (2), 1-28, 2022
42022
Revisiting the VCCFinder approach for the identification of vulnerability-contributing commits
T Riom, A Sawadogo, K Allix, TF Bissyandé, N Moha, J Klein
Empirical Software Engineering 26 (3), 1-30, 2021
42021
In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments
A Bartel, J Klein, M Monperrus, K Allix, YL Traon
arXiv preprint arXiv:1208.4536, 2012
42012
The system can't perform the operation now. Try again later.
Articles 1–20