If you made any changes in Pure these will be visible here soon.

Research Output 2014 2019

  • 42 Conference Paper
  • 8 Article
  • 2 Foreword / Postscript
  • 1 Review Article
Filter
Article
2019
8 Citations (Scopus)

Automated testing of Android apps: a systematic literature review

Kong, P., Li, L., Gao, J., Liu, K., Bissyande, T. F. & Klein, J., Mar 2019, In : IEEE Transactions on Reliability. 68, 1, p. 45-66 22 p.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Dating with Scambots: understanding the ecosystem of fraudulent dating applications

Hu, Y., Wang, H., Zhou, Y., Guo, Y., Li, L., Luo, B. & Xu, F., 2019, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 18 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
1 Citation (Scopus)

On identifying and explaining similarities in Android apps

Li, L., Bissyandé, T. F., Wang, H-Y. & Klein, J., Mar 2019, In : Journal of Computer Science and Technology. 34, 2, p. 437-455 19 p.

Research output: Contribution to journalArticleResearchpeer-review

2 Citations (Scopus)

Revisiting the impact of common libraries for android-related investigations

Li, L., Riom, T., Bissyandé, T. F., Wang, H., Klein, J. & Yves, L. T., Aug 2019, In : Journal of Systems and Software. 154, p. 157-175 19 p.

Research output: Contribution to journalArticleResearchpeer-review

Watch out for this commit! a study of influential software changes

Li, D., Li, L., Kim, D., Bissyandé, T. F., Lo, D. & Le Traon, Y., 19 Aug 2019, In : Journal of Software: Evolution and Process. 31, 12, 25 p.

Research output: Contribution to journalArticleResearchpeer-review

2017
10 Citations (Scopus)

Characterizing malicious Android apps by mining topic-specific data flow signatures

Yang, X., Lo, D., Li, L., Xia, X., Bissyandé, T. F. & Klein, J., 1 Oct 2017, In : Information and Software Technology. 90, p. 27-39 13 p.

Research output: Contribution to journalArticleResearchpeer-review

10 Citations (Scopus)

On locating malicious code in piggybacked Android apps

Li, L., Li, D., Bissyandé, T. F., Klein, J., Cai, H., Lo, D. & Le Traon, Y., Nov 2017, In : Journal of Computer Science and Technology. 32, 6, p. 1108-1124 17 p.

Research output: Contribution to journalArticleResearchpeer-review

46 Citations (Scopus)

Understanding Android app piggybacking: a systematic study of malicious code grafting

Li, L., Li, D., Bissyande, T. F., Klein, J., Le Traon, Y., Lo, D. & Cavallaro, L., Jun 2017, In : IEEE Transactions on Information Forensics and Security. 12, 6, p. 1269-1284 16 p., 7828100.

Research output: Contribution to journalArticleResearchpeer-review