Suivre
Kevin Allix
Kevin Allix
Independent Researcher
Adresse e-mail validée de kallix.net
Titre
Citée par
Citée par
Année
Androzoo: Collecting millions of android apps for the research community
K Allix, TF Bissyandé, J Klein, Y Le Traon
Proceedings of the 13th international conference on mining software …, 2016
9762016
Empirical assessment of machine learning-based malware detectors for Android: Measuring the gap between in-the-lab and in-the-wild validation scenarios
K Allix, TF Bissyandé, Q Jérome, J Klein, R State, Y Le Traon
Empirical Software Engineering 21, 183-211, 2016
1702016
Are your training datasets yet relevant? an investigation into the importance of timeline in machine learning-based malware detection
K Allix, TF Bissyandé, J Klein, Y Le Traon
International Symposium on Engineering Secure Software and Systems, 51-67, 2015
962015
Using opcode-sequences to detect malicious Android applications
Q Jerome, K Allix, R State, T Engel
2014 IEEE international conference on communications (ICC), 914-919, 2014
872014
A Forensic Analysis of Android Malware--How is Malware Written and How it Could Be Detected?
K Allix, Q Jérome, TF Bissyandé, J Klein, R State, Y Le Traon
2014 IEEE 38th annual computer software and applications conference, 384-393, 2014
652014
A comparison of pre-trained language models for multi-class text classification in the financial domain
Y Arslan, K Allix, L Veiber, C Lothritz, TF Bissyandé, J Klein, A Goujon
Companion Proceedings of the Web Conference 2021, 260-268, 2021
612021
On the lack of consensus in anti-virus decisions: Metrics and insights on building ground truths of android malware
M Hurier, K Allix, TF Bissyandé, J Klein, Y Le Traon
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
612016
DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode
N Daoudi, J Samhi, AK Kabore, K Allix, TF Bissyandé, J Klein
Deployable Machine Learning for Security Defense: Second International …, 2021
392021
Potential component leaks in Android apps: An investigation into a new feature set for malware detection
L Li, K Allix, D Li, A Bartel, TF Bissyandé, J Klein
2015 IEEE international conference on software quality, reliability and …, 2015
372015
Improving privacy on android smartphones through in-vivo bytecode instrumentation
A Bartel, J Klein, M Monperrus, K Allix, Y Le Traon
University of Luxembourg, 2012
372012
Machine learning-based malware detection for Android applications: History matters!
K Allix, TFDA Bissyande, J Klein, Y Le Traon
University of Luxembourg, SnT, Luxembourg, Luxembourg, 2014
352014
Jucify: A step towards android code unification for enhanced static analysis
J Samhi, J Gao, N Daoudi, P Graux, H Hoyez, X Sun, K Allix, ...
Proceedings of the 44th International Conference on Software Engineering …, 2022
342022
Evaluating pretrained transformer-based models on the task of fine-grained named entity recognition
C Lothritz, K Allix, L Veiber, J Klein, TFDA Bissyande
28th International Conference on Computational Linguistics, 2020
312020
Large-scale machine learning-based malware detection: confronting the" 10-fold cross validation" scheme with reality
K Allix, TF Bissyandé, Q Jérome, J Klein, R State, Y Le Traon
Proceedings of the 4th ACM conference on Data and application security and …, 2014
282014
A deep dive inside drebin: An explorative analysis beyond android malware detection scores
N Daoudi, K Allix, TF Bissyandé, J Klein
ACM Transactions on Privacy and Security 25 (2), 1-28, 2022
272022
Lessons learnt on reproducibility in machine learning based android malware detection
N Daoudi, K Allix, TF Bissyandé, J Klein
Empirical Software Engineering 26 (4), 74, 2021
222021
A first look at Android applications in Google Play related to COVID-19
J Samhi, K Allix, TF Bissyandé, J Klein
Empirical Software Engineering 26, 1-49, 2021
202021
Learning to catch security patches
AD Sawadogo, TF Bissyandé, N Moha, K Allix, J Klein, L Li, YL Traon
arXiv preprint arXiv:2001.09148, 2020
182020
Android malware detection: looking beyond dalvik bytecode
T Sun, N Daoudi, K Allix, TF Bissyandé
2021 36th IEEE/ACM International Conference on Automated Software …, 2021
122021
Towards refined classifications driven by shap explanations
Y Arslan, B Lebichot, K Allix, L Veiber, C Lefebvre, A Boytsov, A Goujon, ...
International Cross-Domain Conference for Machine Learning and Knowledge …, 2022
112022
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20