default search action
Li Li 0029
Person information
- affiliation: Beihang University, Department of Software Engineering, Beijing, China
- affiliation (former): Monash University, Faculty of Information Technology, Melbourne, VIC, Australia
- affiliation (former): University of Luxembourg, Interdisciplinary Security and Trust Centre (SnT), Luxembourg
- affiliation (former): Beihang University, Beijing, China
Other persons with the same name
- Li Li — disambiguation page
- Li Li 0001 — FutureWei Technologies (and 1 more)
- Li Erran Li (aka: Li (Erran) Li, Li Li 0002, Erran L. Li) — Bell Labs
- Li Li 0003 — Nanjing University, Institute of VLSI Design, China
- Li Li 0004 — Shenzhen University, School of Management, China
- Li Li 0005 — National University of Defense Technology, School of Computer Science, Changsha, China
- Li Li 0006 — Southwest University, School of Computer and Information Science, Chongqing, China (and 2 more)
- Li Li 0008 — Tongji University, College of Electrical and Information Engineering, Shanghai, China (and 1 more)
- Li Li 0009 — Communications Research Centre Canada (CRC)
- Li Li 0010 — Beijing Information Science & Technology University, China (and 1 more)
- Li Li 0011 — Southwest Jiaotong University, Provincial Key Laboratory of Information Coding and Transmission, Chengdu, China (and 1 more)
- Li Li 0012 — Shanghai Jiao Tong University, China
- Li Li 0013 — Tsinghua University, Department of Automation, Beijing, China (and 1 more)
- Li Li 0014 — Hangzhou Dianzi University, School of Computer Science and Technology, China (and 1 more)
- Li Li 0015 — Harbin Institute of Technology, Shenzhen Graduate School, School of Computer Science and Technology, Key Laboratory of Network Oriented Intelligent Computation, China
- Li Li 0016 — US Naval Research Laboratory
- Li Li 0017 — Institute of Remote Sensing Applications, CAS
- Li Li 0018 — Oakland University, Department of Mathematics and Statistics, Rochester, MI, USA (and 3 more)
- Li Li 0019 — University of Alabama
- Li Li 0020 — University of Oregon, Eugene
- Li Li 0021 — Northwestern University
- Li Li 0022 — Shenyang Normal University, College of Maths and Systematic Science, China (and 1 more)
- Li Li 0023 — TU Kaiserslautern, Renesas Electronics Europe
- Li Li 0024 — University of Science and Technology, Beijing
- Li Li 0025 — University of Bristol
- Li Li 0026 — Department of Psychology, HKU
- Li Li 0027 — TU Braunschweig
- Li Li 0028 — University of Strathclyde
- Li Li 0030 — University of New Mexico, Department of Mathematics and Statistics, Albuquerque, NM, USA (and 1 more)
- Li Li 0031 — University of Technology Sydney, School of Electrical, Mechanical and Mechatronic Systems, NSW, Australia (and 1 more)
- Li Li 0032 — Harbin Institute of Technology, Department of Mathematics, China (and 1 more)
- Li Li 0033 — Wuhan University of Science and Technology, School of Computer Science, Wuhan, China (and 1 more)
- Li Li 0034 — Tsinghua University, Department of Computer Science and Technology, Beijing, China (and 1 more)
- Li Li 0035 — Samsung Electronics America, Mountain view, CA, USA (and 1 more)
- Li Li 0036 — Henan Institute of Engineering, Department of Computer Science and Engineering, Zhengzhou, China
- Li Li 0037 — Zhejiang University of Technology, College of Computer Science and Technology, Hangzhou, China
- Li Li 0038 — Fudan University, State Key Laboratory of ASIC and System, Shanghai, China
- Li Li 0039 — Anhui University, Ministry of Education, Key Laboratory of Intelligent Computing and Signal Processing, China (and 2 more)
- Li Li 0040 — University of Missouri-Kansas City, School of Computing and Engineering, MO, USA (and 1 more)
- Li Li 0041 — Shanghai University of Political Science and Law, China
- Li Li 0042 — Duke University, Durham, NC, USA
- Li Li 0043 — Xidian University, School of Aerospace Science and Technology, China (and 1 more)
- Li Li 0044 — National University of Singapore, School of Computing, Singapore
- Li Li 0045 — Dalian University of Technology, Faculty of Electronic Information and Electrical Engineering, China
- Li Li 0046 — Jiangnan University, School of Science, Key Laboratory of Advanced Process Control for Light Industry (Ministry of Education), Wuxi, China (and 1 more)
- Li Li 0047 — Wuhan University, School of Remote Sensing and Information Engineering, Computer Vision and Remote Sensing Lab, China
- Li Li 0048 — University of Electronic Science and Technology of China, School of Resources and Environment, Chengdu, China
- Li Li 0049 — Southeast University, School of Architecture, Laboratory of Architectural Algorithm and Application, Nanjing, China (and 1 more)
- Li Li 0050 — Yanshan University, School of Electrical Engineering, Qinhuangdao, China (and 1 more)
- Li Li 0051 — Xidian University, College of Communication Engineering, Xi'an, China (and 1 more)
- Li Li 0052 — Donghua University, College of Textiles, Shanghai, China
- Li Li 0053 — Wuhan University, International School of Software, China
- Li Li 0054 — Dalian University, College of Information Engineering, China (and 2 more)
- Li Li 0055 — Shenzhen Institute of Information Technology, China
- Li Li 0056 — Shanxi University, Shanxi Key Laboratory of Mathematical Techniques and Big Data Analysis on Disease Control and Prevention, China
- Li Li 0057 — Huazhong Agricultural University, Hubei Key Laboratory of Agricultural Bioinformatics, Wuhan, China
- Li Li 0058 — JIKAN Research Institute of Engineering Investigations and Design, Co., Ltd., Xi'an, China
- Li Li 0059 — China Agricultural University, College of Land Science and Technology, Beijing, China (and 1 more)
- Li Li 0060 — Google AI, Mountain View, CA, USA
- Li Li 0061 — Joint Center for Global Change Studies (JCGCS), Beijing, China (and 4 more)
- Li Li 0062 — Institute of Next Generation of Healthcare, Icahn School of Medicine at Mount Sinai, New York, NY, USA (and 1 more)
- Li Li 0063 — University of Tsukuba, Graduate School of Systems and Information Engineering, Japan
- Li Li 0064 — University of Macau, Macau (and 2 more)
- Li Li 0065 — Bath Spa University, Bath Business School, UK (and 2 more)
- Li Li 0066 — Georgia Southern University, Statesboro, GA, USA (and 2 more)
- Li Li 0067 — Sun Yat-Sen University, Lingnan College, Guangzhou, China
- Li Li 0068 — Harbin Institute of Technology, School of Astronautics, Key Laboratory of Ultra-Precision Intelligent Instrumentation / Center of Ultra-Precision Optoelectronic Instrument Engineering, China
- Li Li 0069 — Wuhan University, School of Electronic Information, China
- Li Li 0070 — Beijing Institute of Technology, MOE Key Laboratory of Optoelectronic Imaging Technology and Systems, China
- Li Li 0071 — Bohai University, College of Mathematics and Physics, Jinzhou, China (and 1 more)
- Li Li 0072 — Central South University, School of Information Science and Engineering, Changsha, China
- Li Li 0073 — Wuhan University, School of Cyber Science and Engineering, China (and 1 more)
- Li Li 0074 — Shenzhen University, College of Mathematics and Statistics, China (and 1 more)
- Li Li 0075 — China Medical University, First Affiliated Hospital, Shenyang, China
- Li Li 0076 — Ocean University of China, College of Information Science and Engineering, Qingdao, China (and 1 more)
- Li Li 0077 — University of Arizona, Department of Electrical and Computer Engineering, Tucson, AZ, USA
- Li Li 0078 — Huazhong University of Science and Technology, School of Mechanical Science and Engineering, Wuhan, China
- Li Li 0079 — Capital Medical University, Beijing Children's Hospital, Department of Ophthalmology, China (and 1 more)
- Li Li 0080 — Central South University, Changsha, China
- Li Li 0081 — Southwest University, College of Engineering and Technology, Chongqing, China (and 1 more)
- Li Li 0082 — New York University, Department of Civil and Urban Engineering, Brooklyn, NY, USA (and 1 more)
- Li Li 0083 — University of Melbourne, Department of Computing and Information Systems, VIC, Australia
- Li Li 0084 — Woosuk University, College of Sports Science, Jeonju, South Korea
- Li Li 0085 — Tianjin Normal University, College of Computer and Information Engineering, China
- Li Li 0086 — Chang'an University, School of Electronics and Control Engineering, Xi'an, China
- Li Li 0087 — George Washington University, Washington, DC, USA
- Li Li 0088 — Southwest University of Science and Technology, College of Computer Science and Technology, Mianyang, China (and 1 more)
- Li Li 0089 — Suzhou University of Science and Technology, Research Center of Beidou Navigation and Remote Sensing, Suzhou, China (and 1 more)
- Li Li 0090 — Nanjing University of Science and Technology, School of Economics and Management, China
- Li Li 0091 — National University of Singapore, Singapore
- Li Li 0092 — Durham University, Department of Computer Science, UK
- Li Li 0093 — Tongji University, Department of Medical Genetics, Shanghai, China
- Li Li 0094 — Wuhan Textile University, School of Computer Science and Artificial Intelligence, China (and 2 more)
- Li Li 0095 — Chongqing University of Posts and Telecommunications, School of Communications and Information Engineering, China
- Li Li 0096 — Harbin Institute of Technology, College of New Energy, Weihai, China
- Li Li 0097 — University of Electronic Science and Technology of China, National Key Laboratory of Wireless Communications, Chengdu, China
- Li Li 0098 — Shandong Agricultural University, School of Economics and Management, Taian, China (and 1 more)
- Li Li 0099 — Chongqing University of Technology, College of Artificial Intelligence, China
- Li Li 0100 — PLA Strategic Support Force Information Engineering University, School of Geospatial Information, Zhengzhou, China
- Li Li 0101 — Syracuse University, NY, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j58]Wenhan Zhu, Sebastian Proksch, Daniel M. Germán, Michael W. Godfrey, Li Li, Shane McIntosh:
What is an app store? The software engineering perspective. Empir. Softw. Eng. 29(1): 35 (2024) - [j57]Deheng Yang, Kui Liu, Yan Lei, Li Li, Huan Xie, Chunyan Liu, Zhenyu Wang, Xiaoguang Mao, Tegawendé F. Bissyandé:
Demystifying API misuses in deep learning applications. Empir. Softw. Eng. 29(2): 45 (2024) - [j56]Ashwin Prasad Shivarpatna Venkatesh, Samkutty Sabu, Mouli Chekkapalli, Jiawei Wang, Li Li, Eric Bodden:
Static analysis driven enhancements for comprehension in machine learning notebooks. Empir. Softw. Eng. 29(5): 136 (2024) - [j55]Juncai Guo, Jin Liu, Xiao Liu, Li Li:
Summarizing source code through heterogeneous feature fusion and extraction. Inf. Fusion 103: 102058 (2024) - [j54]Juncai Guo, Lina Su, Jin Liu, Jianli Ding, Xiao Liu, Bo Huang, Li Li:
Auction-based client selection for online Federated Learning. Inf. Fusion 112: 102549 (2024) - [j53]Md. Shamsujjoha, John C. Grundy, Hourieh Khalajzadeh, Qinghua Lu, Li Li:
Developer and End-User Perspectives on Addressing Human Aspects in Mobile eHealth Apps. Inf. Softw. Technol. 166: 107353 (2024) - [j52]Pei Liu, Li Li, Kui Liu, Shane McIntosh, John C. Grundy:
Understanding the quality and evolution of Android app build systems. J. Softw. Evol. Process. 36(5) (2024) - [j51]Juncai Guo, Jin Liu, Xiao Liu, Yao Wan, Yanjie Zhao, Li Li, Kui Liu, Jacques Klein, Tegawendé F. Bissyandé:
PyScribe-Learning to describe python code. Softw. Pract. Exp. 54(3): 501-527 (2024) - [j50]Lihong Tang, Xiao Chen, Sheng Wen, Li Li, Marthie Grobler, Yang Xiang:
Demystifying the Evolution of Android Malware Variants. IEEE Trans. Dependable Secur. Comput. 21(4): 3324-3341 (2024) - [j49]Marco Alecci, Jordan Samhi, Li Li, Tegawendé F. Bissyandé, Jacques Klein:
Improving Logic Bomb Identification in Android Apps via Context-Aware Anomaly Detection. IEEE Trans. Dependable Secur. Comput. 21(5): 4735-4753 (2024) - [j48]Pei Liu, Yanjie Zhao, Mattia Fazzini, Haipeng Cai, John Grundy, Li Li:
Automatically Detecting Incompatible Android APIs. ACM Trans. Softw. Eng. Methodol. 33(1): 15:1-15:33 (2024) - [j47]Wen Li, Austin Marino, Haoran Yang, Na Meng, Li Li, Haipeng Cai:
How Are Multilingual Systems Constructed: Characterizing Language Use and Selection in Open-Source Multilingual Software. ACM Trans. Softw. Eng. Methodol. 33(3): 63:1-63:46 (2024) - [j46]Yue Liu, Thanh Le-Cong, Ratnadira Widyasari, Chakkrit Tantithamthavorn, Li Li, Xuan-Bach Dinh Le, David Lo:
Refining ChatGPT-Generated Code: Characterizing and Mitigating Code Quality Issues. ACM Trans. Softw. Eng. Methodol. 33(5): 116:1-116:26 (2024) - [j45]Yue Liu, Chakkrit Tantithamthavorn, Yonghui Liu, Li Li:
On the Reliability and Explainability of Language Models for Program Generation. ACM Trans. Softw. Eng. Methodol. 33(5): 126:1-126:26 (2024) - [j44]Bo Li, Haowei Quan, Jiawei Wang, Pei Liu, Haipeng Cai, Yuan Miao, Yun Yang, Li Li:
Neural Library Recommendation by Embedding Project-Library Knowledge Graph. IEEE Trans. Software Eng. 50(6): 1620-1638 (2024) - [j43]Shangwen Wang, Mingyang Geng, Bo Lin, Zhensu Sun, Ming Wen, Yepang Liu, Li Li, Tegawendé F. Bissyandé, Xiaoguang Mao:
Fusing Code Searchers. IEEE Trans. Software Eng. 50(7): 1852-1866 (2024) - [c119]Li Li:
Smart Software Analysis for Software Quality Assurance. ACM TUR-C 2024 - [c118]Ashwin Prasad Shivarpatna Venkatesh, Samkutty Sabu, Jiawei Wang, Amir M. Mir, Li Li, Eric Bodden:
TypeEvalPy: A Micro-benchmarking Framework for Python Type Inference Tools. ICSE Companion 2024: 49-53 - [c117]Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Li Li:
When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference. ICSE 2024: 75:1-75:12 - [c116]Shuzheng Gao, Wenxin Mao, Cuiyun Gao, Li Li, Xing Hu, Xin Xia, Michael R. Lyu:
Learning in the Wild: Towards Leveraging Unlabeled Data for Effectively Tuning Pre-trained Code Models. ICSE 2024: 80:1-80:13 - [c115]Mingyi Zhou, Xiang Gao, Jing Wu, Kui Liu, Hailong Sun, Li Li:
Investigating White-Box Attacks for On-Device Models. ICSE 2024: 152:1-152:12 - [c114]Yunlong Ma, Wentong Tian, Xiang Gao, Hailong Sun, Li Li:
API Misuse Detection via Probabilistic Graphical Model. ISSTA 2024: 88-99 - [c113]Mingyi Zhou, Xiang Gao, Pei Liu, John Grundy, Chunyang Chen, Xiao Chen, Li Li:
Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models. ISSTA 2024: 174-185 - [c112]Zhensu Sun, Xiaoning Du, Xiapu Luo, Fu Song, David Lo, Li Li:
FDI: Attack Neural Code Generation Systems through User Feedback Channel. ISSTA 2024: 528-540 - [c111]Zhensu Sun, Xiaoning Du, Zhou Yang, Li Li, David Lo:
AI Coders Are among Us: Rethinking Programming Language Grammar towards Efficient Code Generation. ISSTA 2024: 1124-1136 - [c110]Chao Wang, Tianming Liu, Yanjie Zhao, Lin Zhang, Xiaoning Du, Li Li, Haoyu Wang:
Towards Demystifying Android Adware: Dataset and Payload Location. ASE Workshops 2024: 167-175 - [c109]Haonan Chen, Daihang Chen, Yonghui Liu, Xiaoyu Sun, Li Li:
Are Your Android App Analyzers Still Relevant? MOBILESoft@ICSE 2024: 69-73 - [c108]Zikan Dong, Tianming Liu, Jiapeng Deng, Haoyu Wang, Li Li, Minghui Yang, Meng Wang, Guosheng Xu, Guoai Xu:
Exploring Covert Third-party Identifiers through External Storage in the Android New Era. USENIX Security Symposium 2024 - [d1]Mingyi Zhou, Xiang Gao, Pei Liu, John Grundy, Chunyang Chen, Xiao Chen, Li Li:
CustomDLCoder: Generating Pure Code Implementations to Replace On-Device DL Models. Zenodo, 2024 - [i79]Shuzheng Gao, Wenxin Mao, Cuiyun Gao, Li Li, Xing Hu, Xin Xia, Michael R. Lyu:
Learning in the Wild: Towards Leveraging Unlabeled Data for Effectively Tuning Pre-trained Code Models. CoRR abs/2401.01060 (2024) - [i78]Baijun Cheng, Kailong Wang, Cuiyun Gao, Xiapu Luo, Li Li, Yao Guo, Xiangqun Chen, Haoyu Wang:
The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors. CoRR abs/2401.02737 (2024) - [i77]Wenhan Zhu, Sebastian Proksch, Daniel M. Germán, Michael W. Godfrey, Li Li, Shane McIntosh:
What Is an App Store? The Software Engineering Perspective. CoRR abs/2401.04287 (2024) - [i76]Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Li Li:
When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference. CoRR abs/2401.09964 (2024) - [i75]Mingyi Zhou, Xiang Gao, Jing Wu, Kui Liu, Hailong Sun, Li Li:
Investigating White-Box Attacks for On-Device Models. CoRR abs/2402.05493 (2024) - [i74]Mingyi Zhou, Xiang Gao, Pei Liu, John C. Grundy, Chunyang Chen, Xiao Chen, Li Li:
Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models. CoRR abs/2403.16479 (2024) - [i73]Zhihao Lin, Wei Ma, Tao Lin, Yaowen Zheng, Jingquan Ge, Jun Wang, Jacques Klein, Tegawendé F. Bissyandé, Yang Liu, Li Li:
Open-Source AI-based SE Tools: Opportunities and Challenges of Collaborative Software Learning. CoRR abs/2404.06201 (2024) - [i72]Zhensu Sun, Xiaoning Du, Zhou Yang, Li Li, David Lo:
AI Coders Are Among Us: Rethinking Programming Language Grammar Towards Efficient Code Generation. CoRR abs/2404.16333 (2024) - [i71]Daihang Chen, Yonghui Liu, Mingyi Zhou, Yanjie Zhao, Haoyu Wang, Shuai Wang, Xiao Chen, Tegawendé F. Bissyandé, Jacques Klein, Li Li:
LLM for Mobile: An Initial Roadmap. CoRR abs/2407.06573 (2024) - [i70]Zhensu Sun, Haotian Zhu, Bowen Xu, Xiaoning Du, Li Li, David Lo:
LLM as Runtime Error Handler: A Promising Pathway to Adaptive Self-Healing of Software Systems. CoRR abs/2408.01055 (2024) - [i69]Zhensu Sun, Xiaoning Du, Xiapu Luo, Fu Song, David Lo, Li Li:
FDI: Attack Neural Code Generation Systems through User Feedback Channel. CoRR abs/2408.04194 (2024) - [i68]Zhibo Zhang, Wuxia Bai, Yuxi Li, Mark Huasong Meng, Kailong Wang, Ling Shi, Li Li, Jun Wang, Haoyu Wang:
GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models. CoRR abs/2408.04905 (2024) - [i67]Zhihao Lin, Wei Ma, Mingyi Zhou, Yanjie Zhao, Haoyu Wang, Yang Liu, Jun Wang, Li Li:
PathSeeker: Exploring LLM Security Vulnerabilities with a Reinforcement Learning-Based Jailbreak Approach. CoRR abs/2409.14177 (2024) - 2023
- [j42]Qianguo Chen, Teng Zhou, Kui Liu, Li Li, Chunpeng Ge, Zhe Liu, Jacques Klein, Tegawendé F. Bissyandé:
Tips: towards automating patch suggestion for vulnerable smart contracts. Autom. Softw. Eng. 30(2): 31 (2023) - [j41]Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu:
Deep Learning for Android Malware Defenses: A Systematic Literature Review. ACM Comput. Surv. 55(8): 153:1-153:36 (2023) - [j40]Humphrey O. Obie, Hung Du, Kashumi Madampe, Mojtaba Shahin, Idowu Ilekura, John C. Grundy, Li Li, Jon Whittle, Burak Turhan, Hourieh Khalajzadeh:
Automated detection, categorisation and developers' experience with the violations of honesty in mobile apps. Empir. Softw. Eng. 28(6): 134 (2023) - [j39]Padmanabhan Krishnan, Cristina Cifuentes, Li Li, Tegawendé F. Bissyandé, Jacques Klein:
Why Is Static Application Security Testing Hard to Learn? IEEE Secur. Priv. 21(5): 68-72 (2023) - [j38]Xiao Yu, Heng Dai, Li Li, Xiaodong Gu, Jacky Wai Keung, Kwabena Ebo Bennin, Fuyang Li, Jin Liu:
Finding the best learning to rank algorithms for effort-aware defect prediction. Inf. Softw. Technol. 157: 107165 (2023) - [j37]Juncai Guo, Jin Liu, Xiao Liu, Yao Wan, Li Li:
Summarizing source code with Heterogeneous Syntax Graph and dual position. Inf. Process. Manag. 60(5): 103415 (2023) - [j36]Pei Liu, Qingxin Xia, Kui Liu, Juncai Guo, Xin Wang, Jin Liu, John C. Grundy, Li Li:
Towards automated Android app internationalisation: An exploratory study. J. Syst. Softw. 197: 111559 (2023) - [j35]Lihong Tang, Tingmin Wu, Xiao Chen, Sheng Wen, Li Li, Xin Xia, Marthie Grobler, Yang Xiang:
How Does Visualisation Help App Practitioners Analyse Android Apps? IEEE Trans. Dependable Secur. Comput. 20(3): 2238-2255 (2023) - [j34]Xiaoyu Sun, Xiao Chen, Li Li, Haipeng Cai, John Grundy, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein:
Demystifying Hidden Sensitive Operations in Android Apps. ACM Trans. Softw. Eng. Methodol. 32(2): 50:1-50:30 (2023) - [j33]Haoye Tian, Kui Liu, Yinghua Li, Abdoul Kader Kaboré, Anil Koyuncu, Andrew Habib, Li Li, Junhao Wen, Jacques Klein, Tegawendé F. Bissyandé:
The Best of Both Worlds: Combining Learned Embeddings with Engineered Features for Accurate Prediction of Correct Patches. ACM Trans. Softw. Eng. Methodol. 32(4): 92:1-92:34 (2023) - [j32]Kui Liu, Jingtang Zhang, Li Li, Anil Koyuncu, Dongsun Kim, Chunpeng Ge, Zhe Liu, Jacques Klein, Tegawendé F. Bissyandé:
Reliable Fix Patterns Inferred from Static Checkers for Automated Program Repair. ACM Trans. Softw. Eng. Methodol. 32(4): 96:1-96:38 (2023) - [j31]Yanjie Zhao, Li Li, Haoyu Wang, Qiang He, John C. Grundy:
APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps. IEEE Trans. Software Eng. 49(1): 113-130 (2023) - [j30]Xiaoyu Sun, Xiao Chen, Yonghui Liu, John C. Grundy, Li Li:
Taming Android Fragmentation Through Lightweight Crowdsourced Testing. IEEE Trans. Software Eng. 49(6): 3599-3615 (2023) - [c107]Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Mingze Ni, Li Li:
Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion Systems. ICSE Companion 2023: 324-325 - [c106]Liu Wang, Haoyu Wang, Huiyi Wang, Li Li, Yi Wang:
A Deep Dive into the Featured iOS Apps. Internetware 2023: 112-122 - [c105]Mingyi Zhou, Xiang Gao, Jing Wu, John C. Grundy, Xiao Chen, Chunyang Chen, Li Li:
ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-Based Systems. ISSTA 2023: 1005-1017 - [c104]Haonan Hu, Yue Liu, Yanjie Zhao, Yonghui Liu, Xiaoyu Sun, Chakkrit Tantithamthavorn, Li Li:
Detecting Temporal Inconsistency in Biased Datasets for Android Malware Detection. ASEW 2023: 17-23 - [c103]Yonghui Liu, Xiao Chen, Pei Liu, John Grundy, Chunyang Chen, Li Li:
ReuNify: A Step Towards Whole Program Analysis for React Native Android Apps. ASE 2023: 1390-1402 - [c102]Tianzhi Ma, Yanjie Zhao, Li Li, Liang Liu:
CiD4HMOS: A Solution to HarmonyOS Compatibility Issues. ASE 2023: 2006-2017 - [c101]Shangwen Wang, Mingyang Geng, Bo Lin, Zhensu Sun, Ming Wen, Yepang Liu, Li Li, Tegawendé F. Bissyandé, Xiaoguang Mao:
Natural Language to Code: How Far Are We? ESEC/SIGSOFT FSE 2023: 375-387 - [c100]Zhensu Sun, Xiaoning Du, Fu Song, Li Li:
CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models. ESEC/SIGSOFT FSE 2023: 1561-1572 - [c99]Xiaoyu Sun, Xiao Chen, Yonghui Liu, John C. Grundy, Li Li:
LazyCow: A Lightweight Crowdsourced Testing Tool for Taming Android Fragmentation. ESEC/SIGSOFT FSE 2023: 2127-2131 - [c98]Ashwin Prasad Shivarpatna Venkatesh, Jiawei Wang, Li Li, Eric Bodden:
Enhancing Comprehension and Navigation in Jupyter Notebooks with Static Analysis. SANER 2023: 391-401 - [c97]Yanjie Zhao, Tianming Liu, Haoyu Wang, Yepang Liu, John C. Grundy, Li Li:
Are Mobile Advertisements in Compliance with App's Age Group? WWW 2023: 3132-3141 - [i66]Ashwin Prasad Shivarpatna Venkatesh, Jiawei Wang, Li Li, Eric Bodden:
Enhancing Comprehension and Navigation in Jupyter Notebooks with Static Analysis. CoRR abs/2301.04419 (2023) - [i65]Yue Liu, Chakkrit Tantithamthavorn, Yonghui Liu, Li Li:
On the Reliability and Explainability of Automated Code Generation Approaches. CoRR abs/2302.09587 (2023) - [i64]Xiaoyu Sun, Xiao Chen, Yonghui Liu, John C. Grundy, Li Li:
Taming Android Fragmentation through Lightweight Crowdsourced Testing. CoRR abs/2304.04347 (2023) - [i63]Terry Yue Zhuo, Zhou Yang, Zhensu Sun, Yufei Wang, Li Li, Xiaoning Du, Zhenchang Xing, David Lo:
Data Augmentation Approaches for Source Code Models: A Survey. CoRR abs/2305.19915 (2023) - [i62]Mingyi Zhou, Xiang Gao, Jing Wu, John Grundy, Xiao Chen, Chunyang Chen, Li Li:
ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-based Systems. CoRR abs/2306.06112 (2023) - [i61]Yue Liu, Thanh Le-Cong, Ratnadira Widyasari, Chakkrit Tantithamthavorn, Li Li, Xuan-Bach Dinh Le, David Lo:
Refining ChatGPT-Generated Code: Characterizing and Mitigating Code Quality Issues. CoRR abs/2307.12596 (2023) - [i60]Xinyi Hou, Yanjie Zhao, Yue Liu, Zhou Yang, Kailong Wang, Li Li, Xiapu Luo, David Lo, John C. Grundy, Haoyu Wang:
Large Language Models for Software Engineering: A Systematic Literature Review. CoRR abs/2308.10620 (2023) - [i59]Zhensu Sun, Xiaoning Du, Fu Song, Li Li:
CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models. CoRR abs/2308.14401 (2023) - [i58]Yonghui Liu, Xiao Chen, Pei Liu, John Grundy, Chunyang Chen, Li Li:
ReuNify: A Step Towards Whole Program Analysis for React Native Android Apps. CoRR abs/2309.03524 (2023) - [i57]Terry Yue Zhuo, Xiaoning Du, Zhenchang Xing, Jiamou Sun, Haowei Quan, Li Li, Liming Zhu:
Pop Quiz! Do Pre-trained Code Models Possess Knowledge of Correct API Names? CoRR abs/2309.07804 (2023) - [i56]Xinyu She, Yue Liu, Yanjie Zhao, Yiling He, Li Li, Chakkrit Tantithamthavorn, Zhan Qin, Haoyu Wang:
Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey. CoRR abs/2310.17903 (2023) - [i55]Li Li, Xiang Gao, Hailong Sun, Chunming Hu, Xiaoyu Sun, Haoyu Wang, Haipeng Cai, Ting Su, Xiapu Luo, Tegawendé F. Bissyandé, Jacques Klein, John C. Grundy, Tao Xie, Haibo Chen, Huaimin Wang:
Software Engineering for OpenHarmony: A Research Roadmap. CoRR abs/2311.01311 (2023) - [i54]Ashwin Prasad Shivarpatna Venkatesh, Samkutty Sabu, Jiawei Wang, Amir M. Mir, Li Li, Eric Bodden:
TypeEvalPy: A Micro-benchmarking Framework for Python Type Inference Tools. CoRR abs/2312.16882 (2023) - 2022
- [j29]Arthur D. Sawadogo, Tegawendé F. Bissyandé, Naouel Moha, Kevin Allix, Jacques Klein, Li Li, Yves Le Traon:
SSPCatcher: Learning to catch security patches. Empir. Softw. Eng. 27(6): 151 (2022) - [j28]Dapeng Yan, Kui Liu, Yuqing Niu, Li Li, Zhe Liu, Zhiming Liu, Jacques Klein, Tegawendé F. Bissyandé:
Crex: Predicting patch correctness in automated repair of C programs through transfer learning of execution semantics. Inf. Softw. Technol. 152: 107043 (2022) - [j27]Mojtaba Shahin, Christabel Gonsalvez, Jon Whittle, Chunyang Chen, Li Li, Xin Xia:
How secondary school girls perceive Computational Thinking practices through collaborative programming with the micro: bit. J. Syst. Softw. 183: 111107 (2022) - [j26]Xian Zhan, Tianming Liu, Lingling Fan, Li Li, Sen Chen, Xiapu Luo, Yang Liu:
Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review. IEEE Trans. Software Eng. 48(10): 4181-4213 (2022) - [j25]Xian Zhan, Tianming Liu, Yepang Liu, Yang Liu, Li Li, Haoyu Wang, Xiapu Luo:
A Systematic Assessment on Android Third-Party Library Detection Tools. IEEE Trans. Software Eng. 48(11): 4249-4273 (2022) - [c96]Juncai Guo, Jin Liu, Yao Wan, Li Li, Pingyi Zhou:
Modeling Hierarchical Syntax Structure with Triplet Position for Source Code Summarization. ACL (1) 2022: 486-500 - [c95]Yanjie Zhao, Li Li, Xiaoyu Sun, Pei Liu, John Grundy:
Code Implementation Recommendation for Android GUI Components. ICSE-Companion 2022: 31-35 - [c94]Jordan Samhi, Li Li, Tegawendé F. Bissyandé, Jacques Klein:
Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps. ICSE 2022: 723-735 - [c93]Zhensu Sun, Li Li, Yan Liu, Xiaoning Du, Li Li:
On the Importance of Building High-quality Training Datasets for Neural Code Search. ICSE 2022: 1609-1620 - [c92]Yanjie Zhao, Li Li, Kui Liu, John C. Grundy:
Towards Automatically Repairing Compatibility Issues in Published Android Apps. ICSE 2022: 2142-2153 - [c91]Yihao Qin, Shangwen Wang, Kui Liu, Bo Lin, Hongjun Wu, Li Li, Xiaoguang Mao, Tegawendé F. Bissyandé:
Peeler: Learning to Effectively Predict Flakiness without Running Tests. ICSME 2022: 257-268 - [c90]Haowei Quan, Jiawei Wang, Bo Li, Xiaoning Du, Kui Liu, Li Li:
Characterizing Python Method Evolution with PyMevol: An Essential Step Towards Enabling Reliable Software Systems. ISSRE Workshops 2022: 81-86 - [c89]Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu:
Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well? ISSRE 2022: 169-180 - [c88]Pei Liu, Yanjie Zhao, Haipeng Cai, Mattia Fazzini, John C. Grundy, Li Li:
Automatically detecting API-induced compatibility issues in Android apps: a comparative analysis (replicability study). ISSTA 2022: 617-628 - [c87]Xiaoyu Sun, Xiao Chen, Yanjie Zhao, Pei Liu, John Grundy, Li Li:
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues. ASE 2022: 70:1-70:13 - [c86]Pei Liu, Xiaoyu Sun, Yanjie Zhao, Yonghui Liu, John Grundy, Li Li:
A First Look at CI/CD Adoptions in Open-Source Android Apps. ASE 2022: 201:1-201:6 - [c85]Humphrey O. Obie, Idowu Ilekura, Hung Du, Mojtaba Shahin, John C. Grundy, Li Li, Jon Whittle, Burak Turhan:
On the Violation of Honesty in Mobile Apps: Automated Detection and Categories. MSR 2022: 321-332 - [c84]Pei Liu, Mattia Fazzini, John C. Grundy, Li Li:
Do Customized Android Frameworks Keep Pace with Android? MSR 2022: 376-387 - [c83]Xin Wang, Yasheng Wang, Yao Wan, Jiawei Wang, Pingyi Zhou, Li Li, Hao Wu, Jin Liu:
CODE-MVP: Learning to Represent Source Code from Multiple Views with Contrastive Pre-Training. NAACL-HLT (Findings) 2022: 1066-1077 - [c82]Wen Li, Li Li, Haipeng Cai:
On the vulnerability proneness of multilingual code. ESEC/SIGSOFT FSE 2022: 847-859 - [c81]Yuhao Gao, Guoai Xu, Li Li, Xiapu Luo, Chenyu Wang, Yulei Sui:
Demystifying the underground ecosystem of account registration bots. ESEC/SIGSOFT FSE 2022: 897-909 - [c80]Wen Li, Li Li, Haipeng Cai:
PolyFax: a toolkit for characterizing multi-language software. ESEC/SIGSOFT FSE 2022: 1662-1666 - [c79]Zhensu Sun, Xiaoning Du, Fu Song, Mingze Ni, Li Li:
CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning. WWW 2022: 652-660 - [c78]Guosheng Xu, Siyi Li, Hao Zhou, Shucen Liu, Yutian Tang, Li Li, Xiapu Luo, Xusheng Xiao, Guoai Xu, Haoyu Wang:
Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit. WWW 2022: 3327-3335 - [i53]Xiaoyu Sun, Xiao Chen, Kui Liu, Sheng Wen, Li Li, John C. Grundy:
Characterizing Sensor Leaks in Android Apps. CoRR abs/2201.06235 (2022) - [i52]Zhensu Sun, Li Li, Yan Liu, Xiaoning Du, Li Li:
On the Importance of Building High-quality Training Datasets for Neural Code Search. CoRR abs/2202.06649 (2022) - [i51]Li Li, Jiawei Wang, Haowei Quan:
Scalpel: The Python Static Analysis Framework. CoRR abs/2202.11840 (2022) - [i50]Humphrey O. Obie, Idowu Ilekura, Hung Du, Mojtaba Shahin, John C. Grundy, Li Li, Jon Whittle, Burak Turhan:
On the Violation of Honesty in Mobile Apps: Automated Detection and Categories. CoRR abs/2203.07547 (2022) - [i49]Haoye Tian, Kui Liu, Yinghua Li, Abdoul Kader Kaboré, Anil Koyuncu, Andrew Habib, Li Li, Junhao Wen, Jacques Klein, Tegawendé F. Bissyandé:
The Best of Both Worlds: Combining Learned Embeddings with Engineered Features for Accurate Prediction of Correct Patches. CoRR abs/2203.08912 (2022) - [i48]Xin Wang, Yasheng Wang, Yao Wan, Jiawei Wang, Pingyi Zhou, Li Li, Hao Wu, Jin Liu:
CODE-MVP: Learning to Represent Source Code from Multiple Views with Contrastive Pre-Training. CoRR abs/2205.02029 (2022) - [i47]Yan Lin, Tianming Liu, Wei Liu, Zhigaoyuan Wang, Li Li, Guoai Xu, Haoyu Wang:
Dataset Bias in Android Malware Detection. CoRR abs/2205.15532 (2022) - [i46]Pei Liu, Mattia Fazzini, John C. Grundy, Li Li:
Do Customized Android Frameworks Keep Pace with Android? CoRR abs/2205.15535 (2022) - [i45]Pei Liu, Li Li, Yichun Yan, Mattia Fazzini, John C. Grundy:
Identifying and Characterizing Silently-Evolved Methods in the Android API. CoRR abs/2205.15546 (2022) - [i44]Pei Liu, Yanjie Zhao, Haipeng Cai, Mattia Fazzini, John C. Grundy, Li Li:
Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study). CoRR abs/2205.15561 (2022) - [i43]Sherlock A. Licorish, Christoph Treude, John C. Grundy, Chakkrit Tantithamthavorn, Kelly Blincoe, Stephen G. MacDonell, Li Li, Jean-Guy Schneider:
Software Engineering in Australasia. CoRR abs/2206.05397 (2022) - [i42]Xiaoyu Sun, Xiao Chen, Yanjie Zhao, Pei Liu, John C. Grundy, Li Li:
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues. CoRR abs/2208.13417 (2022) - [i41]Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu:
Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well? CoRR abs/2209.00812 (2022) - [i40]Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Mingze Ni, Li Li:
Learning to Prevent Profitless Neural Code Completion. CoRR abs/2209.05948 (2022) - [i39]Yue Liu, Chakkrit Tantithamthavorn, Yonghui Liu, Patanamon Thongtanunam, Li Li:
AutoUpdate: Automatically Recommend Code Updates for Android Apps. CoRR abs/2209.07048 (2022) - [i38]Xiaoyu Sun, Xiao Chen, Li Li, Haipeng Cai, John C. Grundy, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein:
Demystifying Hidden Sensitive Operations in Android apps. CoRR abs/2210.10997 (2022) - [i37]Pei Liu, Xiaoyu Sun, Yanjie Zhao, Yonghui Liu, John C. Grundy, Li Li:
A First Look at CI/CD Adoptions in Open-Source Android Apps. CoRR abs/2210.12581 (2022) - [i36]Humphrey O. Obie, Hung Du, Kashumi Madampe, Mojtaba Shahin, Idowu Ilekura, John C. Grundy, Li Li, Jon Whittle, Burak Turhan, Hourieh Khalajzadeh:
Automated Detection, Categorisation and Developers' Experience with the Violations of Honesty in Mobile Apps. CoRR abs/2211.07142 (2022) - 2021
- [j24]Pingfan Kong, Li Li, Jun Gao, Timothée Riom, Yanjie Zhao, Tegawendé F. Bissyandé, Jacques Klein:
ANCHOR: locating android framework-specific crashing faults. Autom. Softw. Eng. 28(2): 10 (2021) - [j23]Yu Nong, Haipeng Cai, Pengfei Ye, Li Li, Feng Chen:
Evaluating and comparing memory error vulnerability detectors. Inf. Softw. Technol. 137: 106614 (2021) - [j22]Yanjie Zhao, Li Li, Xiaoyu Sun, Pei Liu, John C. Grundy:
Icon2Code: Recommending code implementations for Android GUI components. Inf. Softw. Technol. 138: 106619 (2021) - [j21]Md. Shamsujjoha, John Grundy, Li Li, Hourieh Khalajzadeh, Qinghua Lu:
Developing Mobile Applications Via Model Driven Development: A Systematic Literature Review. Inf. Softw. Technol. 140: 106693 (2021) - [j20]Kui Liu, Li Li, Anil Koyuncu, Dongsun Kim, Zhe Liu, Jacques Klein, Tegawendé F. Bissyandé:
A critical review on the evaluation of automated program repair systems. J. Syst. Softw. 171: 110817 (2021) - [j19]Zhou Xu, Li Li, Meng Yan, Jin Liu, Xiapu Luo, John Grundy, Yifeng Zhang, Xiaohong Zhang:
A comprehensive comparative study of clustering-based unsupervised defect prediction models. J. Syst. Softw. 172: 110862 (2021) - [j18]Sherlock A. Licorish, Christoph Treude, John C. Grundy, Kelly Blincoe, Stephen G. MacDonell, Chakkrit Tantithamthavorn, Li Li, Jean-Guy Schneider:
Software Engineering in Australasia. ACM SIGSOFT Softw. Eng. Notes 46(2): 16-17 (2021) - [j17]Yangyu Hu, Haoyu Wang, Yajin Zhou, Yao Guo, Li Li, Bingxuan Luo, Fangren Xu:
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications. IEEE Trans. Dependable Secur. Comput. 18(3): 1033-1050 (2021) - [j16]Xiaoqin Fu, Haipeng Cai, Wen Li, Li Li:
SEADS: Scalable and Cost-effective Dynamic Dependence Analysis of Distributed Systems via Reinforcement Learning. ACM Trans. Softw. Eng. Methodol. 30(1): 10:1-10:45 (2021) - [j15]Xiaoyu Sun, Li Li, Tegawendé F. Bissyandé, Jacques Klein, Damien Octeau, John C. Grundy:
Taming Reflection: An Essential Step Toward Whole-program Analysis of Android Apps. ACM Trans. Softw. Eng. Methodol. 30(3): 32:1-32:36 (2021) - [j14]Yanjie Zhao, Li Li, Haoyu Wang, Haipeng Cai, Tegawendé F. Bissyandé, Jacques Klein, John C. Grundy:
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection. ACM Trans. Softw. Eng. Methodol. 30(3): 40:1-40:38 (2021) - [j13]Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein:
Understanding the Evolution of Android App Vulnerabilities. IEEE Trans. Reliab. 70(1): 212-230 (2021) - [j12]Li Li, Tegawendé F. Bissyandé, Jacques Klein:
Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark. IEEE Trans. Software Eng. 47(4): 676-693 (2021) - [c77]Humphrey O. Obie, Mojtaba Shahin, John Grundy, Burak Turhan, Li Li, Waqar Hussain, Jon Whittle:
Does Domain Change the Opinion of Individuals on Human Values? A Preliminary Investigation on eHealth Apps End-users. APSEC 2021: 531-535 - [c76]Humphrey O. Obie, Waqar Hussain, Xin Xia, John C. Grundy, Li Li, Burak Turhan, Jon Whittle, Mojtaba Shahin:
A First Look at Human Values-Violation in App Reviews. ICSE-SEIS 2021: 29-38 - [c75]Wen Li, Na Meng, Li Li, Haipeng Cai:
Understanding Language Selection in Multi-language Software Projects on GitHub. ICSE (Companion Volume) 2021: 256-257 - [c74]Pei Liu, Li Li, Yichun Yan, Mattia Fazzini, John C. Grundy:
Identifying and Characterizing Silently-Evolved Methods in the Android API. ICSE (SEIP) 2021: 308-317 - [c73]Jiawei Wang, Li Li, Andreas Zeller:
Restoring Execution Environments of Jupyter Notebooks. ICSE 2021: 1622-1633 - [c72]Teng Zhou, Kui Liu, Li Li, Zhe Liu, Jacques Klein, Tegawendé F. Bissyandé:
SmartGift: Learning to Generate Practical Inputs for Testing Smart Contracts. ICSME 2021: 23-34 - [c71]Jingtang Zhang, Kui Liu, Dongsun Kim, Li Li, Zhe Liu, Jacques Klein, Tegawendé F. Bissyandé:
Revisiting Test Cases to Boost Generate-and-Validate Program Repair. ICSME 2021: 35-46 - [c70]Xin Wang, Xiao Liu, Li Li, Xiao Chen, Jin Liu, Hao Wu:
Time-aware User Modeling with Check-in Time Prediction for Next POI Recommendation. ICWS 2021: 125-134 - [c69]Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo:
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach. ISPEC 2021: 327-344 - [c68]Xiaoyu Sun, Xiao Chen, Kui Liu, Sheng Wen, Li Li, John Grundy:
Characterizing Sensor Leaks in Android Apps. ISSRE 2021: 498-509 - [c67]Kunsong Zhao, Jin Liu, Zhou Xu, Li Li, Meng Yan, Jiaojiao Yu, Yuxuan Zhou:
Predicting Crash Fault Residence via Simplified Deep Forest Based on A Reduced Feature Set. ICPC 2021: 242-252 - [c66]Md. Shamsujjoha, John C. Grundy, Li Li, Hourieh Khalajzadeh, Qinghua Lu:
Checking App Behavior Against App Descriptions: What If There are No App Descriptions? ICPC 2021: 422-432 - [c65]Yonghui Liu, Li Li, Pingfan Kong, Xiaoyu Sun, Tegawendé F. Bissyandé:
A First Look at Security Risks of Android TV Apps. ASE Workshops 2021: 59-64 - [c64]Xiaolei Ren, Michael Ho, Jiang Ming, Yu Lei, Li Li:
Unleashing the hidden power of compiler optimization on binary code difference: an empirical study. PLDI 2021: 142-157 - [c63]Xiao Chen, Wanli Chen, Kui Liu, Chunyang Chen, Li Li:
A comparative study of smartphone and smartwatch apps. SAC 2021: 1484-1493 - [c62]Bo Li, Qiang He, Feifei Chen, Xin Xia, Li Li, John C. Grundy, Yun Yang:
Embedding app-library graph for neural third party library recommendation. ESEC/SIGSOFT FSE 2021: 466-477 - [c61]Md. Shamsujjoha, John Grundy, Li Li, Hourieh Khalajzadeh, Qinghua Lu:
Human-Centric Issues in eHealth App Development and Usage: A Preliminary Assessment. SANER 2021: 506-510 - [c60]Yuhao Gao, Haoyu Wang, Li Li, Xiapu Luo, Guoai Xu, Xuanzhe Liu:
Demystifying Illegal Mobile Gambling Apps. WWW 2021: 1447-1458 - [e2]Weizhi Meng, Li Li:
ASSS '21: Proceedings of the 2021 International Symposium on Advanced Security on Software and Systems, Virtual Event, Hong Kong, 7 June, 2021. ACM 2021, ISBN 978-1-4503-8403-2 [contents] - [i35]Jiawei Wang, Li Li, Andreas Zeller:
Restoring Execution Environments of Jupyter Notebooks. CoRR abs/2103.02959 (2021) - [i34]Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu:
Deep Learning for Android Malware Defenses: a Systematic Literature Review. CoRR abs/2103.05292 (2021) - [i33]Md. Shamsujjoha, John C. Grundy, Li Li, Hourieh Khalajzadeh, Qinghua Lu:
Checking App Behavior Against App Descriptions: What If There are No App Descriptions? CoRR abs/2103.11668 (2021) - [i32]Xiaolei Ren, Michael Ho, Jiang Ming, Yu Lei, Li Li:
Unleashing the Hidden Power of Compiler Optimization on Binary Code Difference: An Empirical Study. CoRR abs/2103.12357 (2021) - [i31]Md. Shamsujjoha, John C. Grundy, Li Li, Hourieh Khalajzadeh, Qinghua Lu:
Human-Centric Issues in eHealth App Development and Usage: A Preliminary Assessment. CoRR abs/2104.01426 (2021) - [i30]Kunsong Zhao, Jin Liu, Zhou Xu, Li Li, Meng Yan, Jiaojiao Yu, Yuxuan Zhou:
Predicting Crash Fault Residence via Simplified Deep Forest Based on A Reduced Feature Set. CoRR abs/2104.01768 (2021) - [i29]Jing Wu, Mingyi Zhou, Ce Zhu, Yipeng Liu, Mehrtash Harandi, Li Li:
Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions. CoRR abs/2104.11103 (2021) - [i28]Xian Zhan, Tianming Liu, Yepang Liu, Yang Liu, Li Li, Haoyu Wang, Xiapu Luo:
A Systematic Assessment on Android Third-party Library Detection Tools. CoRR abs/2108.01964 (2021) - [i27]Xian Zhan, Tianming Liu, Lingling Fan, Li Li, Sen Chen, Xiapu Luo, Yang Liu:
Research on Third-Party Libraries in AndroidApps: A Taxonomy and Systematic LiteratureReview. CoRR abs/2108.03787 (2021) - [i26]Xin Wang, Yasheng Wang, Pingyi Zhou, Fei Mi, Meng Xiao, Yadao Wang, Li Li, Xiao Liu, Hao Wu, Jin Liu, Xin Jiang:
CLSEBERT: Contrastive Learning for Syntax Enhanced Code Pre-Trained Model. CoRR abs/2108.04556 (2021) - [i25]Mojtaba Shahin, Chris Gonsalvez, Jon Whittle, Chunyang Chen, Li Li, Xin Xia:
How Secondary School Girls Perceive Computational Thinking Practices through Collaborative Programming with the Micro: bit. CoRR abs/2110.00812 (2021) - [i24]Humphrey O. Obie, Mojtaba Shahin, John C. Grundy, Burak Turhan, Li Li, Waqar Hussain, Jon Whittle:
Does Domain Change the Opinion of Individuals on Human Values? A Preliminary Investigation on eHealth Apps End-users. CoRR abs/2110.01832 (2021) - [i23]Zhensu Sun, Xiaoning Du, Fu Song, Mingze Ni, Li Li:
CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning. CoRR abs/2110.12925 (2021) - [i22]Shangwen Wang, Kui Liu, Bo Lin, Li Li, Jacques Klein, Xiaoguang Mao, Tegawendé F. Bissyandé:
Beep: Fine-grained Fix Localization by Learning to Predict Buggy Code Elements. CoRR abs/2111.07739 (2021) - [i21]Jordan Samhi, Li Li, Tegawendé F. Bissyandé, Jacques Klein:
Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps. CoRR abs/2112.10470 (2021) - 2020
- [j11]Li Li, Jun Gao, Tegawendé F. Bissyandé, Lei Ma, Xin Xia, Jacques Klein:
CDA: Characterising Deprecated Android APIs. Empir. Softw. Eng. 25(3): 2058-2098 (2020) - [j10]Dabao Wang, Kui Liu, Li Li:
On the Need of Understanding the Failures of Smart Contracts. IEEE Softw. 37(4): 49-54 (2020) - [c59]Jiawei Wang, Li Li, Andreas Zeller:
Better code, better sharing: on the need of analyzing jupyter notebooks. ICSE (NIER) 2020: 53-56 - [c58]Jiawei Wang, Tzu-yang Kuo, Li Li, Andreas Zeller:
Restoring reproducibility of Jupyter notebooks. ICSE (Companion Volume) 2020: 288-289 - [c57]Li Li, Jun Gao, Pingfan Kong, Haoyu Wang, Mengyu Huang, Yuan-Fang Li, Tegawendé F. Bissyandé:
KnowledgeZooClient: constructing knowledge graph for Android. ASE Workshops 2020: 73-78 - [c56]Jiawei Wang, Tzu-yang Kuo, Li Li, Andreas Zeller:
Assessing and Restoring Reproducibility of Jupyter Notebooks. ASE 2020: 138-149 - [c55]Xin Wang, Jin Liu, Li Li, Xiao Chen, Xiao Liu, Hao Wu:
Detecting and Explaining Self-Admitted Technical Debts with Attention-based Neural Networks. ASE 2020: 871-882 - [c54]Xian Zhan, Lingling Fan, Tianming Liu, Sen Chen, Li Li, Haoyu Wang, Yifei Xu, Xiapu Luo, Yang Liu:
Automated Third-Party Library Detection for Android Applications: Are We There Yet? ASE 2020: 919-930 - [c53]Haoye Tian, Kui Liu, Abdoul Kader Kaboré, Anil Koyuncu, Li Li, Jacques Klein, Tegawendé F. Bissyandé:
Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair. ASE 2020: 981-992 - [c52]Pei Liu, Li Li, Yanjie Zhao, Xiaoyu Sun, John Grundy:
AndroZooOpen: Collecting Large-scale Open Source Android Apps for the Research Community. MSR 2020: 548-552 - [c51]Xu Xu, Yangyu Hu, Qian Guo, Ren He, Li Li, Guoai Xu, Zhihui Han, Haoyu Wang:
Dissecting Mobile Offerwall Advertisements: An Explorative Study. QRS 2020: 518-526 - [c50]Jiawei Wang, Li Li, Kui Liu, Haipeng Cai:
Exploring how deprecated Python library APIs are (not) handled. ESEC/SIGSOFT FSE 2020: 233-244 - [c49]Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein:
Borrowing your enemy's arrows: the case of code reuse in Android via direct inter-app code invocation. ESEC/SIGSOFT FSE 2020: 939-951 - [c48]Xiaoqin Fu, Haipeng Cai, Li Li:
Dads: dynamic slicing continuously-running distributed programs with budget constraints. ESEC/SIGSOFT FSE 2020: 1566-1570 - [c47]Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé, Jacques Klein:
MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps. WWW 2020: 1715-1726 - [c46]Yangyu Hu, Haoyu Wang, Ren He, Li Li, Gareth Tyson, Ignacio Castro, Yao Guo, Lei Wu, Guoai Xu:
Mobile App Squatting. WWW 2020: 1727-1738 - [i20]Arthur D. Sawadogo, Tegawendé F. Bissyandé, Naouel Moha, Kevin Allix, Jacques Klein, Li Li, Yves Le Traon:
Learning to Catch Security Patches. CoRR abs/2001.09148 (2020) - [i19]Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé, Jacques Klein:
MadDroid: Characterising and Detecting Devious Ad Content for Android Apps. CoRR abs/2002.01656 (2020) - [i18]Pingfan Kong, Li Li, Jun Gao, Timothée Riom, Yanjie Zhao, Tegawendé F. Bissyandé, Jacques Klein:
Anchor: Locating Android Framework-specific Crashing Faults. CoRR abs/2008.01676 (2020) - [i17]Haoye Tian, Kui Liu, Abdoul Kader Kaboré, Anil Koyuncu, Li Li, Jacques Klein, Tegawendé F. Bissyandé:
Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair. CoRR abs/2008.02944 (2020) - [i16]Humphrey O. Obie, Waqar Hussain, Xin Xia, John C. Grundy, Li Li, Burak Turhan, Jon Whittle, Mojtaba Shahin:
A First Look at Human Values-Violation in App Reviews. CoRR abs/2012.10095 (2020) - [i15]Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li:
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. IACR Cryptol. ePrint Arch. 2020: 528 (2020)
2010 – 2019
- 2019
- [j9]Li Li, Tegawendé F. Bissyandé, Haoyu Wang, Jacques Klein:
On Identifying and Explaining Similarities in Android Apps. J. Comput. Sci. Technol. 34(2): 437-455 (2019) - [j8]Li Li, Timothée Riom, Tegawendé F. Bissyandé, Haoyu Wang, Jacques Klein, Yves Le Traon:
Revisiting the impact of common libraries for android-related investigations. J. Syst. Softw. 154: 157-175 (2019) - [j7]Daoyuan Li, Li Li, Dongsun Kim, Tegawendé F. Bissyandé, David Lo, Yves Le Traon:
Watch out for this commit! A study of influential software changes. J. Softw. Evol. Process. 31(12) (2019) - [j6]Pingfan Kong, Li Li, Jun Gao, Kui Liu, Tegawendé F. Bissyandé, Jacques Klein:
Automated Testing of Android Apps: A Systematic Literature Review. IEEE Trans. Reliab. 68(1): 45-66 (2019) - [c45]Jun Gao, Li Li, Tegawendé F. Bissyandé, Jacques Klein:
On the Evolution of Mobile App Complexity. ICECCS 2019: 200-209 - [c44]Luis Cruz, Rui Abreu, John C. Grundy, Li Li, Xin Xia:
Do Energy-Oriented Changes Hinder Maintainability? ICSME 2019: 29-40 - [c43]Pingfan Kong, Li Li, Jun Gao, Tegawendé F. Bissyandé, Jacques Klein:
Mining Android crash fixes in the absence of issue- and change-tracking systems. ISSTA 2019: 78-89 - [c42]Haipeng Cai, Ziyi Zhang, Li Li, Xiaoqin Fu:
A large-scale study of application incompatibilities in Android. ISSTA 2019: 216-227 - [c41]Tianming Liu, Haoyu Wang, Li Li, Guangdong Bai, Yao Guo, Guoai Xu:
DaPanda: Detecting Aggressive Push Notifications in Android Apps. ASE 2019: 66-78 - [c40]Ayesha Sadiq, Li Li, Yuan-Fang Li, Ijaz Ahmed, Sea Ling:
Sip4J: Statically Inferring Access Permission Contracts for Parallelising Sequential Java Programs. ASE 2019: 1098-1101 - [c39]Jun Gao, Pingfan Kong, Li Li, Tegawendé F. Bissyandé, Jacques Klein:
Negative results on mining crypto-API usage rules in Android apps. MSR 2019: 388-398 - [c38]Yangyu Hu, Haoyu Wang, Li Li, Yao Guo, Guoai Xu, Ren He:
Want to Earn a Few Extra Bucks? A First Look at Money-Making Apps. SANER 2019: 332-343 - [c37]Yanjie Zhao, Haoyu Wang, Lei Ma, Yuxin Liu, Li Li, John Grundy:
Knowledge Graphing Git Repositories: A Preliminary Study. SANER 2019: 599-603 - [c36]Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein:
Should You Consider Adware as Malware in Your Study? SANER 2019: 604-608 - [c35]Lei Ma, Felix Juefei-Xu, Minhui Xue, Bo Li, Li Li, Yang Liu, Jianjun Zhao:
DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems. SANER 2019: 614-618 - [i14]Ayesha Sadiq, Yuan-Fang Li, Sea Ling, Li Li, Ijaz Ahmed:
Sip4J: Statically inferring permission-based specifications for sequential Java programs. CoRR abs/1902.05311 (2019) - [i13]Jiawei Wang, Li Li, Andreas Zeller:
Better Code, Better Sharing: On the Need of Analyzing Jupyter Notebooks. CoRR abs/1906.05234 (2019) - [i12]Luis Cruz, Rui Abreu, John C. Grundy, Li Li, Xin Xia:
Do Energy-oriented Changes Hinder Maintainability? CoRR abs/1908.08332 (2019) - 2018
- [c34]Qiuyuan Chen, Lingfeng Bao, Li Li, Xin Xia, Liang Cai:
Categorizing and Predicting Invalid Vulnerabilities on Common Vulnerabilities and Exposures. APSEC 2018: 345-354 - [c33]Tien-Duy B. Le, Lingfeng Bao, David Lo, Debin Gao, Li Li:
Towards Mining Comprehensive Android Sandboxes. ICECCS 2018: 51-60 - [c32]Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein:
On vulnerability evolution in Android apps. ICSE (Companion Volume) 2018: 276-277 - [c31]Kisub Kim, Dongsun Kim, Tegawendé F. Bissyandé, Eunjong Choi, Li Li, Jacques Klein, Yves Le Traon:
FaCoY: a code-to-code search engine. ICSE 2018: 946-957 - [c30]Kui Liu, Dongsun Kim, Anil Koyuncu, Li Li, Tegawendé F. Bissyandé, Yves Le Traon:
A Closer Look at Real-World Patches. ICSME 2018: 275-286 - [c29]Haoyu Wang, Zhe Liu, Jingyue Liang, Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, Guoai Xu:
Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets. Internet Measurement Conference 2018: 293-307 - [c28]Lei Ma, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Felix Juefei-Xu, Chao Xie, Li Li, Yang Liu, Jianjun Zhao, Yadong Wang:
DeepMutation: Mutation Testing of Deep Learning Systems. ISSRE 2018: 100-111 - [c27]Li Li, Tegawendé F. Bissyandé, Jacques Klein:
MoonlightBox: Mining Android API Histories for Uncovering Release-Time Inconsistencies. ISSRE 2018: 212-223 - [c26]Li Li, Tegawendé F. Bissyandé, Haoyu Wang, Jacques Klein:
CiD: automating the detection of API-related compatibility issues in Android apps. ISSTA 2018: 153-163 - [c25]Lei Ma, Felix Juefei-Xu, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Chunyang Chen, Ting Su, Li Li, Yang Liu, Jianjun Zhao, Yadong Wang:
DeepGauge: multi-granularity testing criteria for deep learning systems. ASE 2018: 120-131 - [c24]Haoyu Wang, Hao Li, Li Li, Yao Guo, Guoai Xu:
Why are Android apps removed from Google Play?: a large-scale empirical study. MSR 2018: 231-242 - [c23]Li Li, Jun Gao, Tegawendé F. Bissyandé, Lei Ma, Xin Xia, Jacques Klein:
Characterising deprecated Android APIs. MSR 2018: 254-264 - [c22]Feng Dong, Haoyu Wang, Li Li, Yao Guo, Tegawendé F. Bissyandé, Tianming Liu, Guoai Xu, Jacques Klein:
FraudDroid: automated ad fraud detection for Android apps. ESEC/SIGSOFT FSE 2018: 257-268 - [c21]Feng Dong, Haoyu Wang, Li Li, Yao Guo, Guoai Xu, Shaodong Zhang:
How do Mobile Apps Violate the Behavioral Policy of Advertisement Libraries? HotMobile 2018: 75-80 - [e1]Li Li, Guozhu Meng, Jacques Klein, Sam Malek:
Proceedings of the 1st International Workshop on Advances in Mobile App Analysis, A-Mobile@ASE 2018, Montpellier, France, September 4, 2018. ACM 2018 [contents] - [i11]Lei Ma, Felix Juefei-Xu, Jiyuan Sun, Chunyang Chen, Ting Su, Fuyuan Zhang, Minhui Xue, Bo Li, Li Li, Yang Liu, Jianjun Zhao, Yadong Wang:
DeepGauge: Comprehensive and Multi-Granularity Testing Criteria for Gauging the Robustness of Deep Learning Systems. CoRR abs/1803.07519 (2018) - [i10]Lei Ma, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Felix Juefei-Xu, Chao Xie, Li Li, Yang Liu, Jianjun Zhao, Yadong Wang:
DeepMutation: Mutation Testing of Deep Learning Systems. CoRR abs/1805.05206 (2018) - [i9]Yangyu Hu, Haoyu Wang, Yajin Zhou, Yao Guo, Li Li, Bingxuan Luo, Fangren Xu:
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications. CoRR abs/1807.04901 (2018) - [i8]Haoyu Wang, Zhe Liu, Jingyue Liang, Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, Guoai Xu:
Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets. CoRR abs/1810.07780 (2018) - [i7]Qianyu Guo, Xiaofei Xie, Lei Ma, Qiang Hu, Ruitao Feng, Li Li, Yang Liu, Jianjun Zhao, Xiaohong Li:
An Orchestrated Empirical Study on Deep Learning Frameworks and Platforms. CoRR abs/1811.05187 (2018) - [i6]Li Li, Tegawendé F. Bissyandé, Jacques Klein:
Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark. CoRR abs/1811.08520 (2018) - 2017
- [j5]Li Li, Tegawendé F. Bissyandé, Mike Papadakis, Siegfried Rasthofer, Alexandre Bartel, Damien Octeau, Jacques Klein, Yves Le Traon:
Static analysis of android apps: A systematic literature review. Inf. Softw. Technol. 88: 67-95 (2017) - [j4]Xinli Yang, David Lo, Li Li, Xin Xia, Tegawendé F. Bissyandé, Jacques Klein:
Characterizing malicious Android apps by mining topic-specific data flow signatures. Inf. Softw. Technol. 90: 27-39 (2017) - [j3]Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Haipeng Cai, David Lo, Yves Le Traon:
On Locating Malicious Code in Piggybacked Android Apps. J. Comput. Sci. Technol. 32(6): 1108-1124 (2017) - [j2]Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, David Lo, Lorenzo Cavallaro:
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Trans. Inf. Forensics Secur. 12(6): 1269-1284 (2017) - [c20]Jyoti Gajrani, Li Li, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Mauro Conti:
Detection of Information Leaks via Reflection in Android Apps. AsiaCCS 2017: 911-913 - [c19]Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Haipeng Cai, David Lo, Yves Le Traon:
Automatically Locating Malicious Packages in Piggybacked Android Apps. MOBILESoft@ICSE 2017: 170-174 - [c18]Li Li, Tegawendé F. Bissyandé, Alexandre Bartel, Jacques Klein, Yves Le Traon:
The multi-generation repackaging hypothesis. ICSE (Companion Volume) 2017: 344-346 - [c17]Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, David Lo, Lorenzo Cavallaro:
Understanding Android app piggybacking. ICSE (Companion Volume) 2017: 359-361 - [c16]Li Li, Tegawendé F. Bissyandé, Jacques Klein:
SimiDroid: Identifying and Explaining Similarities in Android Apps. TrustCom/BigDataSE/ICESS 2017: 136-143 - [i5]Feng Dong, Haoyu Wang, Yuanchun Li, Yao Guo, Li Li, Shaodong Zhang, Guoai Xu:
FrauDroid: An Accurate and Scalable Approach to Automated Mobile Ad Fraud Detection. CoRR abs/1709.01213 (2017) - [i4]Li Li, Jun Gao, Médéric Hurier, Pingfan Kong, Tegawendé F. Bissyandé, Alexandre Bartel, Jacques Klein, Yves Le Traon:
AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community. CoRR abs/1709.05281 (2017) - 2016
- [b1]Li Li:
Boosting Static Security Analysis of Android Apps through Code Instrumentation. University of Luxembourg, 2016 - [c15]Li Li:
Boosting static analysis of Android apps through code instrumentation. ICSE (Companion Volume) 2016: 819-822 - [c14]Li Li, Tegawendé F. Bissyandé, Yves Le Traon, Jacques Klein:
Accessing Inaccessible Android APIs: An Empirical Study. ICSME 2016: 411-422 - [c13]Li Li, Tegawendé F. Bissyandé, Damien Octeau, Jacques Klein:
DroidRA: taming reflection to support whole-program analysis of Android apps. ISSTA 2016: 318-329 - [c12]Li Li, Tegawendé F. Bissyandé, Damien Octeau, Jacques Klein:
Reflection-aware static analysis of Android apps. ASE 2016: 756-761 - [c11]Daoyuan Li, Li Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
DSCo: A Language Modeling Approach for Time Series Classification. MLDM 2016: 294-310 - [c10]Damien Octeau, Somesh Jha, Matthew L. Dering, Patrick D. McDaniel, Alexandre Bartel, Li Li, Jacques Klein, Yves Le Traon:
Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis. POPL 2016: 469-484 - [c9]Li Li, Daoyuan Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Towards a generic framework for automating extensive analysis of Android applications. SAC 2016: 1460-1465 - [c8]Li Li, Jabier Martinez, Tewfik Ziadi, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Mining families of android applications for extractive SPL adoption. SPLC 2016: 271-275 - [c7]Li Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
An Investigation into the Use of Common Libraries in Android Apps. SANER 2016: 403-414 - [c6]Li Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Parameter Values of Android APIs: A Preliminary Study on 100, 000 Apps. SANER 2016: 584-588 - [i3]Daoyuan Li, Li Li, Dongsun Kim, Tegawendé F. Bissyandé, David Lo, Yves Le Traon:
Watch out for This Commit! A Study of Influential Software Changes. CoRR abs/1606.03266 (2016) - 2015
- [c5]Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, Patrick D. McDaniel:
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. ICSE (1) 2015: 280-291 - [c4]Li Li, Kevin Allix, Daoyuan Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein:
Potential Component Leaks in Android Apps: An Investigation into a New Feature Set for Malware Detection. QRS 2015: 195-200 - [c3]Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. SEC 2015: 513-527 - [i2]Li Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
An Investigation into the Use of Common Libraries in Android Apps. CoRR abs/1511.06554 (2015) - 2014
- [c2]Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon:
Detecting Privacy Leaks in Android Apps. ESSoS Doctoral Symposium 2014 - [c1]Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon:
Automatically Exploiting Potential Component Leaks in Android Applications. TrustCom 2014: 388-397 - [i1]Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, Patrick D. McDaniel:
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis. CoRR abs/1404.7431 (2014) - 2012
- [j1]Yuqing Lan, Li Li, Wenbin Zhou:
A Kind of Optimization Method of Loading Documents in OpenOffice.org. IEICE Trans. Inf. Syst. 95-D(3): 778-785 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint