Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting L Li, D Li, TFDA Bissyande, J Klein, Y Le Traon, D Lo, L Cavallaro IEEE Transactions on Information Forensics & Security, 2017 | 208 | 2017 |
Haptic Feedback Enabled Navigation System Using Short Range Radio Technologies A Larmo, A Keranen, D LI, R Susitaival, TLME Publ) US Patent 8,838,387, 2012 | 61 | 2012 |
Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study D Li, TFDA Bissyande, J Klein, Y Le Traon The 28th International Conference on Software Engineering and Knowledge …, 2016 | 56* | 2016 |
Potential component leaks in Android apps: An investigation into a new feature set for malware detection L Li, K Allix, D Li, A Bartel, TF Bissyandé, J Klein Software Quality, Reliability and Security (QRS), 2015 IEEE International …, 2015 | 36 | 2015 |
Automatically locating malicious packages in piggybacked android apps L Li, D Li, TF Bissyandé, J Klein, H Cai, D Lo, Y Le Traon 2017 IEEE/ACM 4th International Conference on Mobile Software Engineering …, 2017 | 33 | 2017 |
Watch out for this commit! a study of influential software changes D Li, L Li, D Kim, TF Bissyandé, D Lo, Y Le Traon Journal of Software: Evolution and Process 31 (12), e2181, 2019 | 28 | 2019 |
On locating malicious code in piggybacked android apps L Li, D Li, TF Bissyandé, J Klein, H Cai, D Lo, Y Le Traon Journal of Computer Science and Technology 32, 1108-1124, 2017 | 26 | 2017 |
Ungrafting malicious code from piggybacked android apps L Li, D Li, TFDA Bissyande, D Lo, J Klein, Y Le Traon SnT, 2016 | 22 | 2016 |
Extracting statistical graph features for accurate and efficient time series classification D Li, J Lin, TFDA Bissyande, J Klein, Y Le Traon 21st international conference on extending database technology, 2018 | 21 | 2018 |
Profiling household appliance electricity usage with n-gram language modeling D Li, T Bissyandé, S Kubler, J Klein, Y Le Traon 2016 IEEE International Conference on Industrial Technology (ICIT), 604-609, 2016 | 21 | 2016 |
Connecting Clothes and Washing Machine A Larmo, A Keranen, D LI, R Susitaival, TLME Publ) US Patent App. 13/715,499, 2012 | 18 | 2012 |
Understanding Android app piggybacking L Li, D Li, TF Bissyandé, J Klein, Y Le Traon, D Lo, L Cavallaro 2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017 | 12 | 2017 |
DSCo: A Language Modeling Approach for Time Series Classification D Li, L Li, TFDA Bissyande, J Klein, Y Le Traon 12th International Conference on Machine Learning and Data Mining (MLDM 2016), 2016 | 9 | 2016 |
DSCo-NG: A Practical Language Modeling Approach for Time Series Classification D Li, TF Bissyandé, J Klein, Y Le Traon International Symposium on Intelligent Data Analysis, 1-13, 2016 | 8 | 2016 |
Towards a generic framework for automating extensive analysis of android applications L Li, D Li, A Bartel, TF Bissyandé, J Klein, YL Traon Proceedings of the 31st Annual ACM Symposium on Applied Computing, 1460-1465, 2016 | 8 | 2016 |
Transforming time series for efficient and accurate classification D Li Unilu-University of Luxembourg, Luxembourg, Luxembourg, 2018 | 7 | 2018 |
Sensing by proxy in buildings with agglomerative clustering of indoor temperature movements D Li, TF Bissyandé, J Klein, YL Traon Proceedings of the Symposium on Applied Computing, 477-484, 2017 | 5 | 2017 |
Method and mobile device for generating a data authentication key A Larmo, A Keranen, D LI, R Susitaival, TLME Publ) US Patent 9,253,633, 2012 | 5 | 2012 |
A study of potential component leaks in android apps L Li, K Allix, D Li, A Bartel, TFDA Bissyande, J Klein SnT Centre-University of Luxembourg, 2015 | 3 | 2015 |
A proxy for distributed Hash table based machine-to-machine networks D Li | 3 | 2011 |