Folgen
Daoyuan Li
Daoyuan Li
Finquest
Bestätigte E-Mail-Adresse bei finquest.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting
L Li, D Li, TFDA Bissyande, J Klein, Y Le Traon, D Lo, L Cavallaro
IEEE Transactions on Information Forensics & Security, 2017
2082017
Haptic Feedback Enabled Navigation System Using Short Range Radio Technologies
A Larmo, A Keranen, D LI, R Susitaival, TLME Publ)
US Patent 8,838,387, 2012
612012
Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study
D Li, TFDA Bissyande, J Klein, Y Le Traon
The 28th International Conference on Software Engineering and Knowledge …, 2016
56*2016
Potential component leaks in Android apps: An investigation into a new feature set for malware detection
L Li, K Allix, D Li, A Bartel, TF Bissyandé, J Klein
Software Quality, Reliability and Security (QRS), 2015 IEEE International …, 2015
362015
Automatically locating malicious packages in piggybacked android apps
L Li, D Li, TF Bissyandé, J Klein, H Cai, D Lo, Y Le Traon
2017 IEEE/ACM 4th International Conference on Mobile Software Engineering …, 2017
332017
Watch out for this commit! a study of influential software changes
D Li, L Li, D Kim, TF Bissyandé, D Lo, Y Le Traon
Journal of Software: Evolution and Process 31 (12), e2181, 2019
282019
On locating malicious code in piggybacked android apps
L Li, D Li, TF Bissyandé, J Klein, H Cai, D Lo, Y Le Traon
Journal of Computer Science and Technology 32, 1108-1124, 2017
262017
Ungrafting malicious code from piggybacked android apps
L Li, D Li, TFDA Bissyande, D Lo, J Klein, Y Le Traon
SnT, 2016
222016
Extracting statistical graph features for accurate and efficient time series classification
D Li, J Lin, TFDA Bissyande, J Klein, Y Le Traon
21st international conference on extending database technology, 2018
212018
Profiling household appliance electricity usage with n-gram language modeling
D Li, T Bissyandé, S Kubler, J Klein, Y Le Traon
2016 IEEE International Conference on Industrial Technology (ICIT), 604-609, 2016
212016
Connecting Clothes and Washing Machine
A Larmo, A Keranen, D LI, R Susitaival, TLME Publ)
US Patent App. 13/715,499, 2012
182012
Understanding Android app piggybacking
L Li, D Li, TF Bissyandé, J Klein, Y Le Traon, D Lo, L Cavallaro
2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017
122017
DSCo: A Language Modeling Approach for Time Series Classification
D Li, L Li, TFDA Bissyande, J Klein, Y Le Traon
12th International Conference on Machine Learning and Data Mining (MLDM 2016), 2016
92016
DSCo-NG: A Practical Language Modeling Approach for Time Series Classification
D Li, TF Bissyandé, J Klein, Y Le Traon
International Symposium on Intelligent Data Analysis, 1-13, 2016
82016
Towards a generic framework for automating extensive analysis of android applications
L Li, D Li, A Bartel, TF Bissyandé, J Klein, YL Traon
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 1460-1465, 2016
82016
Transforming time series for efficient and accurate classification
D Li
Unilu-University of Luxembourg, Luxembourg, Luxembourg, 2018
72018
Sensing by proxy in buildings with agglomerative clustering of indoor temperature movements
D Li, TF Bissyandé, J Klein, YL Traon
Proceedings of the Symposium on Applied Computing, 477-484, 2017
52017
Method and mobile device for generating a data authentication key
A Larmo, A Keranen, D LI, R Susitaival, TLME Publ)
US Patent 9,253,633, 2012
52012
A study of potential component leaks in android apps
L Li, K Allix, D Li, A Bartel, TFDA Bissyande, J Klein
SnT Centre-University of Luxembourg, 2015
32015
A proxy for distributed Hash table based machine-to-machine networks
D Li
32011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20