[J32]
Xiaoyu Sun, Xiao Chen, Li Li, Haipeng Cai, John Grundy, Jordan Samhi, Tegawendé F. Bissyandé and Jacques Klein, Demystifying Hidden Sensitive Operations in Android apps, ACM Transactions on Software Engineering and Methodology (TOSEM), 2022
[pdf][bib]
[J31]
Haoye Tian, Kui Liu, Yinghua Li, Abdoul Kader Kaboré, Anil Koyuncu, Andrew Habib, Li Li, Junhao Wen, Jacques Klein, Tegawendé F. Bissyandé, The Best of Both Worlds: Combining Learned Embeddings with Engineered Features for Accurate Prediction of Correct Patches, ACM Transactions on Software Engineering and Methodology (TOSEM), 2022
[pdf][bib]
[C98]
Xiaoyu Sun, Xiao Chen, Yanjie Zhao, Pei Liu, John Grundy and Li Li, Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues, The 37th IEEE/ACM International Conference on Automated Software Engineering (ASE 2022), 2022
[pdf][bib]
[C97]
Pei Liu, Xiaoyu Sun, Yanjie Zhao, Yonghui Liu, John Grundy and Li Li, A First Look at CI/CD Adoptions in Open-Source Android Apps, The 5th International Workshop on Advances in Mobile App Analysis (A-Mobile 2022), co-located with ASE 2022, 2022
[pdf][bib]
[C96]
Yue Liu, Chakkrit Tantithamthavorn, Li Li, and Yepang Liu, Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?, The 33rd IEEE International Symposium on Software Reliability Engineering (ISSRE 2022), 2022
[pdf][bib]
[C95]
Haowei Quan, Jiawei Wang, Bo Li, Xiaoning Du, Kui Liu and Li Li, Characterizing Python Method Evolution with PyMevol: An Essential Step Towards Enabling Reliable Software Systems, The 33rd IEEE International Symposium on Software Reliability Engineering, Industry Track (ISSRE 2022), 2022
[pdf][bib]
[J30]
Dapeng Yan, Kui Liu, Yuqing Niu, Li Li, Zhe Liu, Zhiming Liu, Jacques Klein, and Tegawendé F. Bissyandé, Crex: Predicting Patch Correctness in Automated Repair of C Programs through Transfer Learning of Execution Semantics, Information and Software Technology (IST), 2022
[pdf][bib]
[J29]
Yue Liu, Chakkrit Tantithamthavorn, Li Li, and Yepang Liu, Deep Learning for Android Malware Defenses: a Systematic Literature Review, ACM Computing Surveys (CSUR), 2022
[pdf][bib]
[C94]
Yuhao Gao, Guoai Xu, Li Li, Xiapu Luo, Chenyu Wang, and Yulei Sui, Demystifying the Underground Ecosystem of Account Registration Bots, ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2022), 2022
[pdf][bib]
[C93]
Wen Li, Li Li, and Haipeng Cai, On the Vulnerability Proneness of Multilingual Code, ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2022), 2022
[pdf][bib]
[C92]
Wen Li, Li Li, and Haipeng Cai, PolyFax: A Toolkit for Characterizing Multi-Language Software, ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Demo Track (ESEC/FSE 2022), 2022
[pdf][bib]
[C91]
Yihao Qin, Shangwen Wang, Kui Liu, Bo Lin, Hongjun Wu, Li Li, Xiaoguang Mao, and Tegawendé F. Bissyandé, Peeler: Learning to Effectively Predict Flakiness without Running Tests, International Conference on Software Maintenance and Evolution (ICSME 2022), 2022
[pdf][bib]
[J28]
Lihong Tang, Tingmin Wu, Xiao Chen, Li Li, Xin Xia, Marthie Grobler, Yang Xiang, How does Visualisation Help App Practitioners Analyse Android Apps?, IEEEE Transactions on Dependable and Secure Computing (TDSC), 2022
[pdf][bib]
[C90]
Pei Liu, Yanjie Zhao, Haipeng Cai, Mattia Fazzini, John Grundy, and Li Li, Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study), The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2022), 2022
[pdf][bib]
[C89]
Pei Liu, Mattia Fazzini, John Grundy, Li Li, Do Customized Android Frameworks Keep Pace with Android?, The 19th International Conference on Mining Software Repositories (MSR 2022), 2022
[pdf][bib]
[C88]
Humphrey O. Obie, Idowu Ilekura, Hung Du, Mojtaba Shahin, John Grundy, Li Li, Jon Whittle, Burak Turhan, On the Violation of Honesty in Mobile Apps: Automated Detection and Categories, The 19th International Conference on Mining Software Repositories (MSR 2022), 2022
[pdf][bib]
[J27]
Delwende Arthur Sawadogo, Tegawendé F. Bissyandé, Naouel Moha, Kevin Allix, Jacques Klein, Li Li and Yves Le Traon, SSPCatcher: Learning to Catch Security Patches, Empirical Software Engineering (EMSE), 2022
[pdf][bib]
[C87]
Juncai Guo, Jin Liu, Yao Wan, Li Li, Pingyi Zhou, Modeling Hierarchical Syntax Structure with Triplet Position for Source Code Summarization, The 60th Annual Meeting of the Association for Computational Linguistics (ACL 2022), 2022
[pdf][bib]
[C86]
Xin Wang, Yasheng Wang, Yao Wan, Jiawei Wang, Pingyi Zhou, Li Li, Hao Wu, Jin Liu, CODE-MVP: Learning to Represent Source Code from Multiple Views with Contrastive Pre-Training, Findings of the 2022 Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL 2022), 2022
[pdf][bib]
[J26]
Yanjie Zhao, Li Li, Haoyu Wang, Qiang He, and John Grundy, APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps, IEEE Transactions on Software Engineering (TSE), 2022
[pdf][bib]
[C85]
Zhensu Sun, Xiaoning Du, Fu Song, Mingze Ni and Li Li, CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning, The ACM Web Conference (WWW 2022), 2022
[pdf][bib]
[C84]
Guosheng Xu, Siyi Li, Hao Zhou, Shucen Liu, Yutian Tang, Li Li, Xiapu Luo, Xusheng Xiao, Guoai Xu and Haoyu Wang, Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit, The ACM Web Conference (WWW 2022), 2022
[pdf][bib]
[C83]
Zhensu Sun, Li Li, Yan Liu, Xiaoning Du, Li Li, On the Importance of Building High-quality Training Datasets for Neural Code Search, The 44th International Conference on Software Engineering (ICSE 2022), 2022
[pdf][bib]
[C82]
Jordan Samhi, Li Li, Tegawendé F. Bissyandé, Jacques Klein, Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps, The 44th International Conference on Software Engineering (ICSE 2022), 2022
[pdf][bib]
[C81]
Yanjie Zhao, Li Li, Kui Liu, John Grundy, Towards Automatically Repairing Compatibility Issues in Published Android Apps, The 44th International Conference on Software Engineering (ICSE 2022), 2022
[pdf][bib]
[C80]
Yanjie Zhao, Li Li, Xiaoyu Sun, Pei Liu, John Grundy, Code Implementation Recommendation for Android GUI Components, The 44th International Conference on Software Engineering, Demonstrations Track (ICSE 2022), 2022
[pdf][bib]
[J25]
Mojtaba Shahin, Christabel Gonsalvez, Jon Whittle, Chunyang Chen, Li Li, Xin Xia, How Secondary School Girls Perceive Computational Thinking Practices through Collaborative Programming with the Micro:bit, Journal of Systems and Software (JSS), 2022
[pdf][bib]
[C79]
Roland Croft, Muhammad Ali Babar, Li Li, An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources, IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2022), 2022
[pdf][bib]
2021
[J24]
Xian Zhan, Tianming Liu, Yepang Liu, Yang Liu, Li Li, Haoyu Wang, Xiapu Luo, A Systematic Assessment on Android Third-party Library Detection Tools, IEEE Transactions on Software Engineering (TSE), 2021
[pdf][bib]
[J23]
Xian Zhan, Tianming Liu, Lingling Fan, Li Li, Sen Chen, Xiapu Luo, Yang Liu, Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review, IEEE Transactions on Software Engineering (TSE), 2021
[pdf][bib]
[C78]
Joseph Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li and Kim-Kwang Raymond Choo, Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach, International Conference on Information Security Practice and Experience (ISPEC 2021), 2021
[pdf][bib]
[C77]
Humphrey O. Obie, Mojtaba Shahin, John Grundy, Burak Turhan, Li Li, Waqar Hussain and Jon Whittle, Does Domain Change the Opinion of Individuals on Human Values? A Preliminary Investigation on eHealth Apps End-users, The 28th Asia-Pacific Software Engineering Conference (APSEC), ERA track (APSEC 2021), 2021
[pdf][bib]
[C76]
Xiaoyu Sun, Xiao Chen, Kui Liu, Sheng Wen, Li Li and John Grundy, Characterizing Sensor Leaks in Android Apps, The 32nd International Symposium on Software Reliability Engineering (ISSRE 2021), 2021
[pdf][bib]
[J22]
Pingfan Kong, Li Li, Jun Gao, Timothée Riom, Yanjie Zhao, Tegawendé F. Bissyandé, Jacques Klein, Anchor: Locating Android Framework-specific Crashing Faults, Automated Software Engineering Journal (AUSE), 2021
[pdf][bib]
[J21]
Md. Shamsujjoha, John Grundy, Li Li, Hourieh Khalajzadeh and Qinghua Lu, Developing Mobile Applications via Model Driven Development: A Systematic Literature Review, Information and Software Technology (IST), 2021
[pdf][bib]
[C75]
Jingtang Zhang, Kui Liu, Dongsun Kim, Li Li, Zhe Liu, Jacques Klein and Tegawendé F. Bissyandé, Revisiting Test Cases to Boost Generate-and-Validate Program Repair, The 37th International Conference on Software Maintenance and Evolution (ICSME 2021), 2021
[pdf][bib]
[C74]
Teng Zhou, Kui Liu, Li Li, Zhe Liu, Jacques Klein and Tegawendé F. Bissyandé, SMARTGIFT: Learning to Generate Practical Inputs for Testing Smart Contracts, The 37th International Conference on Software Maintenance and Evolution (ICSME 2021), 2021
[pdf][bib]
[C73]
Xin Wang, Xiao Liu, Li Li, Xiao Chen, Jin Liu and Hao Wu, Time-aware User Modeling with Check-in Time Prediction for Next POI Recommendation Service, The International Conference on Web Services (ICWS 2021), 2021
[pdf][bib]
[C72]
Bo Li, Qiang He, Feifei Chen, Xin Xia, Li Li, John Grundy, Yun Yang, Embedding App-Library Graph for Neural Third Party Library Recommendation, The 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2021), 2021
[pdf][bib]
[J20]
Yanjie Zhao, Li Li, Xiaoyu Sun, Pei Liu, John Grundy, Icon2Code: Recommending Code Implementations for Android GUI Components, Information and Software Technology (IST), 2021
[pdf][bib]
[J19]
Yu Nong, Haipeng Cai, Pengfei Ye, Li Li, Feng Chen, Evaluating and comparing memory error vulnerability detectors, Information and Software Technology (IST), 2021
[pdf][bib]
[C71]
Yonghui Liu, Li Li, Pingfan Kong, Xiaoyu Sun, and Tegawendé F. Bissyandé, A First Look at Security Risks of Android TV Apps, The 4th International Workshop on Advances in Mobile App Analysis (A-Mobile 2021), co-located with ASE 2021, 2021
[pdf][bib]
[C70]
Xiaolei Ren, Michael Ho, Jiang Ming, Jeff Y. Lei, Li Li, Unleashing the Hidden Power of Compiler Optimization on Binary Code Difference: An Empirical Study, The 42nd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2021), 2021
[pdf][bib]
[C69]
Kunsong Zhao, Jin Liu, Zhou Xu, Li Li, Meng Yan, Jiaojiao Yu and Yuxuan Zhou, Predicting Crash Fault Residence via Simplified Deep Forest Based on A Reduced Feature Set, The 29th IEEE/ACM International Conference on Program Comprehension (ICPC 2021), 2021
[pdf][bib]
[C68]
Md. Shamsujjoha, John Grundy, Li Li, Hourieh Khalajzadeh and Qinghua Lu, Checking App Behavior Against App Descriptions: What If There are No App Descriptions?, The 29th IEEE/ACM International Conference on Program Comprehension, RENE Track (ICPC-RENE 2021), 2021
[pdf][bib]
[C67]
Yuhao Gao, Haoyu Wang, Li Li, Xiapu Luo, Xuanzhe Liu and Guoai Xu, Demystifying Illegal Mobile Gambling Apps, The Web Conference 2021 (WWW 2021), 2021
[pdf][bib]
[J18]
Yanjie Zhao, Li Li, Haoyu Wang, Haipeng Cai, Tegawendé F. Bissyandé, Jacques Klein and John Grundy, On the Impact of Sample Duplication in Machine Learning based Android Malware Detection, ACM Transactions on Software Engineering and Methodology (TOSEM), 2021
[pdf][bib]
[C66]
Jiawei Wang, Li Li, Andreas Zeller, Restoring Execution Environments of Jupyter Notebooks, The 43rd ACM/IEEE International Conference on Software Engineering (ICSE 2021), 2021
[pdf][bib]
[C65]
Wen Li, Na Meng, Li Li, Haipeng Cai, Understanding Language Selection in Multi-Language Software Projects on GitHub, The 43rd ACM/IEEE International Conference on Software Engineering, Poster Track (ICSE-Poster 2021), 2021
[pdf][bib]
[C64]
Pei Liu, Li Li, Yichun Yan, Mattia Fazzini and John Grundy, Identifying and Characterizing Silently-Evolved Methods in the Android API, The 43rd ACM/IEEE International Conference on Software Engineering, SEIP Track (ICSE-SEIP 2021), 2021
[pdf][bib]
[C63]
Humphrey O. Obie, Waqar Hussain, Xin Xia, John Grundy, Li Li, Burak Turhan, Jon Whittle and Mojtaba Shahin, A First Look at Human Values-Violation in App Reviews, The 43rd ACM/IEEE International Conference on Software Engineering, SEIS Track (ICSE-SEIS 2021), 2021
[pdf][bib]
[C62]
Md. Shamsujjoha, John Grundy, Li Li, Hourieh Khalajzadeh and Qinghua Lu, Human-Centric Issues in eHealth App Development and Usage: A Preliminary Assessment, The 28th IEEE International Conference on Software Analysis, Evolution and Reengineering, ERA track (SANER-ERA 2021), 2021
[pdf][bib]
[C61]
Xiao Chen, Wanli Chen, Kui Liu, Chunyang Chen and Li Li, A Comparative Study of Smartphone and Smartwatch Apps, The 2021 ACM/SIGAPP Symposium on Applied Computing (SAC 2021), 2021
[pdf][bib]
2020
[J17]
Xiaoyu Sun, Li Li, Tegawendé F. Bissyandé, Jacques Klein, Damien Octeau, John Grundy, Taming Reflection: An Essential Step Towards Whole-Program Analysis of Android Apps, ACM Transactions on Software Engineering and Methodology (TOSEM), 2020
[pdf][bib]
[J16]
Kui Liu, Li Li, Anil Koyuncu, Dongsun Kim, Zhe Liu, Jacques Klein, and Tegawendé F. Bissyandé, A Critical Review on the Evaluation of Automated Program Repair Systems, Journal of Systems and Software (JSS), 2020
[pdf][bib]
[J15]
Zhou Xu, Li Li, Meng Yan, Jin Liu, Xiapu Luo, John Grundy, Yifeng Zhang, Xiaohong Zhang, A comprehensive comparative study of clustering-based unsupervised defect prediction models, Journal of Systems and Software (JSS), 2020
[pdf][bib]
[C60]
Jiawei Wang, Tzu-yang Kuo, Li Li, Andreas Zeller, Assessing and Restoring Reproducibility of Jupyter Notebooks, The 35th IEEE/ACM International Conference on Automated Software Engineering (ASE 2020), 2020
[pdf][bib]
[C59]
Xin Wang, Jin Liu, Li Li, Xiao Chen, Xiao Liu, Hao Wu, Detecting and Explaining Self-Admitted Technical Debts with Attention-based Neural Networks, The 35th IEEE/ACM International Conference on Automated Software Engineering (ASE 2020), 2020
[pdf][bib]
[C58]
Haoye Tian, Kui Liu, Abdoul Kader Kaboré, Anil Koyuncu, Li Li, Jacques Klein, Tegawendé F. Bissyandé, Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair, The 35th IEEE/ACM International Conference on Automated Software Engineering (ASE 2020), 2020
[pdf][bib]
[C57]
Xian Zhan, Lingling Fan, Tianming Liu, Sen Chen, Li Li, Haoyu Wang, Yifei Xu, Xiapu Luo and Yang Liu, Automated Third-party Library Detection for Android Applications: Are We There Yet?, The 35th IEEE/ACM International Conference on Automated Software Engineering (ASE 2020), 2020
[pdf][bib]
[C56]
Li Li, Jun Gao, Pingfan Kong, Haoyu Wang, Mengyu Huang, Yuan-Fang Li, and Tegawendé F. Bissyandé, KnowledgeZooClient: Constructing Knowledge Graph for Android, The 3rd International Workshop on Advances in Mobile App Analysis (A-Mobile 2020), co-located with ASE 2020, 2020
[pdf][bib]
[C55]
Guosheng Xu, Yangyu Hu, Qian Guo, Ren He, Li Li, Guoai Xu, Zhihui Han, Haoyu Wang, Dissecting Mobile Offerwall Advertisements: An Explorative Study, The 20th IEEE International Conference on Software Quality, Reliability, and Security (QRS 2020), 2020
[pdf][bib]
[C54]
Xiaoqin Fu, Haipeng Cai, and Li Li, Dads: Dynamic Slicing Continuously-Running Distributed Programs with Budget Constraints, The Tool Demo Track of the 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE-Tool 2020), 2020
[pdf][bib]
[J14]
Xiaoqin Fu, Haipeng Cai, Wen Li, and Li Li, Seads: Scalable and cost-effective dynamic dependence analysis of distributed systems via reinforcement learning, ACM Transactions on Software Engineering and Methodology (TOSEM), 2020
[pdf][bib]
[J13]
Dabao Wang, Kui Liu, Li Li, On the Need of Understanding the Failures of Smart Contracts, IEEE Software, 2020
[pdf][bib]
[C53]
Jiawei Wang, Li Li, Kui Liu, Haipeng Cai, Exploring How Deprecated Python Library APIs are (Not) Handled, The 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020), 2020
[pdf][bib]
[C52]
Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé and Jacques Klein, Borrowing Your Enemy’s Arrows: the Case of Code Reuse in Android via Direct Inter-app Code Invocation, The 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020), 2020
[pdf][bib]
[C51]
Zicheng Zhang, Wenrui Diao, Chengyu Hu, Shanqing Guo, Chaoshun Zuo, Li Li, An Empirical Study of Potentially Malicious Third-Party Libraries in Android Apps, The 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2020), 2020
[pdf][bib]
[C50]
Pei Liu, Li Li, Yanjie Zhao, Xiaoyu Sun, John Grundy, AndroZooOpen: Collecting Large-scale Open Source Android Apps for the Research Community, The 2020 International Conference on Mining Software Repositories, Data Track (MSR 2020), 2020
[pdf][bib]
[C49]
Jiawei Wang, Li Li, Andreas Zeller, Better Code, Better Sharing: On the Need of Analyzing Jupyter Notebooks, The 42nd International Conference on Software Engineering, NIER Track (ICSE 2020), 2020
[pdf][bib]
[C48]
Jiawei Wang, Tzu-yang Kuo, Li Li, Andreas Zeller, Restoring Reproducibility of Jupyter Notebooks, The 42nd International Conference on Software Engineering, Invited Poster (ICSE 2020), 2020
[pdf][bib]
[C47]
Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé and Jacques Klein, MadDroid: Characterising and Detecting Devious Ad Content for Android Apps, The Web Conference 2020 (WWW 2020), 2020
[pdf][bib]
[C46]
Yangyu Hu, Haoyu Wang, Ren He, Li Li, Gareth Tyson, Ignacio Castro, Yao Guo, Lei Wu, and Guoai Xu, Mobile App Squatting, The Web Conference 2020 (WWW 2020), 2020
[pdf][bib]
[J12]
Li Li, Jun Gao, Tegawendé F. Bissyandé, Lei Ma, Xin Xia and Jacques Klein, CDA: Characterising Deprecated Android APIs, Empirical Software Engineering (EMSE), 2020
[pdf][bib]
2019
[J11]
Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé and Jacques Klein, Understanding the Evolution of Android App Vulnerabilities, IEEE Transactions on Reliability (TRel), 2019
[pdf][bib]
[C45]
Tianming Liu, Haoyu Wang, Li Li, Guangdong Bai, Yao Guo and Guoai Xu, DaPanda: Detecting Aggressive Push Notification in Android Apps, The 34th IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), 2019
[pdf][bib]
[C44]
Ayesha Sadiq, Li Li, Yuan-Fang Li, Ijaz Ahmed, and Sea Ling, Sip4J: Statically Inferring Access Permission Contracts for Parallelising Sequential Java Programs, The 34th IEEE/ACM International Conference on Automated Software Engineering, Demo Track (ASE 2019), 2019
[pdf][bib]
[C43]
Jun Gao, Li Li, Tegawendé F. Bissyandé and Jacques Klein, On the Evolution of Mobile App Complexity, The 24th International Conference on Engineering of Complex Computer Systems (ICECCS 2019), 2019
[pdf][bib]
[C42]
Luis Cruz, Rui Abreu, John Grundy, Li Li, Xin Xia, Do Energy-oriented Changes Hinder Maintainability?, The 35th IEEE International Conference on Software Maintenance and Evolution (ICSME 2019), 2019
[pdf][bib]
[C41]
Pingfan Kong, Li Li, Jun Gao, Tegawendé Bissyandé, Jacques Klein, Mining Android Crash Fixes in the Absence of Issue- and Change-Tracking Systems, The 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2019), 2019
[pdf][bib]
[C40]
Haipeng Cai, Ziyi Zhang, Li Li, Xiaoqin Fu, A Large-Scale Study of Application Incompatibilities in Android, The 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2019), 2019
[pdf][bib]
[J10]
Li Li, Timothée Riom, Tegawendé F. Bissyandé, Haoyu Wang, Jacques Klein and Yves Le Traon, Revisiting the Impact of Common Libraries for Android-related Investigations, Journal of Systems and Software (JSS), 2019
[pdf][bib]
[J9]
Daoyuan Li, Li Li, Dongsun Kim, Tegawendé F. Bissyandé, David Lo, and Yves Le Traon, Watch out for This Commit! A Study of Influential Software Changes, Journal of Software: Evolution and Process, 2019
[pdf][bib]
[J8]
Yangyu Hu, Haoyu Wang, Yajin Zhou, Yao Guo, Li Li, Bingxuan Luo, Fangren Xu, Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications, IEEE Transactions on Dependable and Secure Computing (TDSC), 2019
[pdf][bib]
[C39]
Jun Gao, Pingfan Kong, Li Li, Tegawendé F. Bissyandé and Jacques Klein, Negative Results on Mining Crypto-API Usage Rules in Android Apps, The 16th International Conference on Mining Software Repositories (MSR 2019), 2019
[pdf][bib]
[C38]
Yanjie Zhao, Haoyu Wang, Lei Ma, Yuxin Liu, Li Li and John Grundy, Knowledge Graphing Git Repositories: A Preliminary Study, IEEE International Conference on Software Analysis, Evolution and Reengineering, ERA Track (SANER 2019), 2019
[pdf][bib]
[C37]
Lei Ma, Felix Juefei-Xu, Minhui Xue, Bo Li, Li Li, Yang Liu and Jianjun Zhao, DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems, IEEE International Conference on Software Analysis, Evolution and Reengineering, ERA Track (SANER 2019), 2019
[pdf][bib]
[C36]
Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein, Should You Consider Adware as Malware in Your Study?, IEEE International Conference on Software Analysis, Evolution and Reengineering, ERA Track (SANER 2019), 2019
[pdf][bib]
[C35]
Yangyu Hu, Haoyu Wang, Li Li, Yao Guo, Guoai Xu, and Ren He, Want to Earn a Few Extra Bucks? A First Look at Money-making Apps, IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2019), 2019
[pdf][bib]
[J7]
Li Li, Tegawendé F. Bissyandé, Haoyu Wang and Jacques Klein, On Identifying and Explaining Similarities in Android Apps, Journal of Computer Science and Technology (JCST), 2019
[pdf][bib]
[J6]
Li Li, Tegawendé F. Bissyandé, Jacques Klein, Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark, IEEE Transactions on Software Engineering (TSE), 2019
[pdf][bib]
2018
[C34]
Tien-Duy B. Le, Lingfeng Bao, David Lo, Debin Gao, Li Li, Towards Mining Comprehensive Android Sandboxes, The 23rd International Conference on Engineering of Complex Computer Systems (ICECCS 2018), 2018
[pdf][bib]
[C33]
Qiuyuan Chen, Lingfeng Bao, Li Li, Xin Xia, Liang Cai, Categorizing and Predicting Invalid Vulnerabilities on Common Vulnerabilities and Exposures, The 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018
[pdf][bib]
[J5]
Pingfan Kong, Li Li, Jun Gao, Kui Liu, Tegawendé Bissyandé, Jacques Klein, Automated Testing of Android Apps: A Systematic Literature Review, IEEE Transactions on Reliability (TRel), 2018
[pdf][bib]
[C32]
Haoyu Wang, Zhe Liu, Jingyue Liang, Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, and Guoai Xu, Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets, The 2018 Internet Measurement Conference (IMC 2018), 2018
[pdf][bib]
[C31]
Li Li, Tegawendé F. Bissyandé, and Jacques Klein, MoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsistencies, The 29th IEEE International Symposium on Software Reliability Engineering (ISSRE 2018), 2018
[pdf][bib]
[acceptance rate: 23.9%, (23/96)]
[C30]
Lei Ma, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Felix Juefei-Xu, Chao Xie, Li Li, Yang Liu, Jianjun Zhao, and Yadong Wang, DeepMutation: Mutation Testing of Deep Learning Systems, The 29th IEEE International Symposium on Software Reliability Engineering (ISSRE 2018), 2018
[pdf][bib]
[acceptance rate: 23.9%, (23/96)]
[C29]
Lei Ma, Felix Juefei-Xu, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Chunyang Chen, Ting Su, Li Li, Yang Liu, Jianjun Zhao, and Yadong Wang, DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems, The 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2018), 2018
[pdf][bib]
[C28]
Feng Dong, Haoyu Wang, Li Li, Yao Guo, Tegawendé F. Bissyandé, Tianming Liu, Guoai Xu, and Jacques Klein, FraudDroid: Automated Ad Fraud Detection for Android Apps, The 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018), 2018
[pdf][bib]
[acceptance rate: 21%, (61/289)]
[C27]
Li Li, Tegawendé F. Bissyandé, Haoyu Wang and Jacques Klein, CiD: Automating the Detection of API-related Compatibility Issues in Android Apps, The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2018), 2018
[pdf][bib]
[acceptance rate: 23.8%, (31/130)]
[C26]
Kui Liu, Dongsun Kim, Li Li, Anil Koyuncu, Tegawendé Bissyande, and Yves Le Traon, A Closer Look at Real-World Patches, The 34th International Conference on Software Maintenance and Evolution (ICSME 2018), 2018
[pdf][bib]
[C25]
Li Li, Jun Gao, Tegawendé F. Bissyandé, Lei Ma, Xin Xia, Jacques Klein, Characterising Deprecated Android APIs, The 15th International Conference on Mining Software Repositories (MSR 2018), 2018
[pdf][bib]
[C24]
Haoyu Wang, Hao Li, Li Li, Yao Guo, Guoai Xu, Why are Android Apps Removed From Google Play? A Large-scale Empirical Study, The 15th International Conference on Mining Software Repositories (MSR 2018), 2018
[pdf][bib]
[C23]
Kisub Kim, Dongsun Kim, Tegawendé F. Bissyandé, Eunjong Choi, Li Li, Jacques Klein, and Yves Le Traon, FaCoY – A Code-to-Code Search Engine, The 40th International Conference on Software Engineering (ICSE 2018), 2018
[pdf][bib]
[acceptance rate: 21%, (105/502)]
[C22]
Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein, On Vulnerability Evolution in Android Apps, The 40th International Conference on Software Engineering, Poster Track (ICSE 2018), 2018
[pdf][bib]
[C21]
Feng Dong, Haoyu Wang, Li Li, Yao Guo, Guoai Xu and Shaodong Zhang, How Do Mobile Apps Violate the Behavioral Policy of Advertisement Libraries? , The 19th Workshop on Mobile Computing Systems and Applications (HotMobile 2018), 2018
[pdf][bib]
2017
[J4]
Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Haipeng Cai, David Lo and Yves Le Traon, On Locating Malicious Code in Piggybacked Android Apps, Journal of Computer Science and Technology (JCST), 2017
[pdf][bib]
[J3]
Xinli Yang, David Lo, Li Li, Xin Xia, Tegawendé F. Bissyandé and Jacques Klein, Characterizing malicious Android apps by mining topic-specific data flow signatures, Information and Software Technology (IST), 2017
[pdf][bib]
[J2]
Li Li, Tegawendé F. Bissyandé, Mike Papadakis, Siegfried Rasthofer, Alexandre Bartel, Damien Octeau, Jacques Klein and Yves Le Traon, Static Analysis of Android Apps: A Systematic Literature Review, Information and Software Technology (IST), 2017
[pdf][bib]
[C20]
Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Haipeng Cai, David Lo and Yves Le Traon, Automatically locating malicious packages in piggybacked android apps, The 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017), 2017
[pdf][bib]
[C19]
Jyoti Gajrani, Li Li, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur and Mauro Conti, POSTER: Detection of Information Leaks via Reflection in Android Apps, The 2017 ACM on Asia Conference on Computer and Communications Security (AsiaCCS 2017), 2017
[pdf][bib]
[C18]
Li Li, Tegawendé F. Bissyandé and Jacques Klein, SimiDroid: Identifying and Explaining Similarities in Android Apps, The 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2017), 2017
[pdf][bib]
[C17]
Li Li, Mining androzoo: A retrospect, The Doctoral Symposium of 33rd International Conference on Software Maintenance and Evolution (ICSME-DS 2017), 2017
[pdf][bib]
[C16]
Li Li, Tegawendé F. Bissyandé, Alexandre Bartel, Jacques Klein and Yves Le Traon, The Multi-Generation Repackaging Hypothesis, The 39th International Conference on Software Engineering, Poster Track (ICSE 2017), 2017
[pdf][bib]
[C15]
Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, David Lo and Lorenzo Cavallaro, Understanding Android App Piggybacking, The 39th International Conference on Software Engineering, Poster Track (ICSE 2017), 2017
[pdf][bib]
[J1]
Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, David Lo and Lorenzo Cavallaro, Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting, IEEE Transactions on Information Forensics & Security (TIFS), 2017
[pdf][bib]
2016
[C14]
Li Li, Tegawendé F. Bissyandé, Yves Le Traon and Jacques Klein, Accessing Inaccessible Android APIs: An Empirical Study, The 32nd International Conference on Software Maintenance and Evolution (ICSME 2016), 2016
[pdf][bib]
[acceptance rate: 29% (37/127)]
[C13]
Li Li, Tegawendé F. Bissyandé, Damien Octeau and Jacques Klein, Reflection-Aware Static Analysis of Android Apps, The 31st IEEE/ACM International Conference on Automated Software Engineering, Demo Track (ASE 2016), 2016
[pdf][bib]
[C12]
Li Li, Jabier Martinez, Tewfik Ziadi, Tegawendé F. Bissyandé, Jacques Klein and Yves Le Traon, Mining Families of Android Applications for Extractive SPL Adoption, The 20th International Systems and Software Product Line Conference (SPLC 2016), 2016
[pdf][bib]
[C11]
Li Li, Tegawendé F. Bissyandé, Damien Octeau and Jacques Klein, DroidRA: Taming Reflection to Support Whole-Program Analysis of Android Apps, The 2016 International Symposium on Software Testing and Analysis (ISSTA 2016), 2016
[pdf][bib]
[acceptance rate: 25.17% (37/147)]
[C10]
Li Li, Boosting Static Analysis of Android Apps through Code Instrumentation, The Doctoral Symposium of 38th International Conference on Software Engineering (ICSE-DS 2016), 2016
[pdf][bib]
[C9]
Li Li, Tegawendé F. Bissyandé, Jacques Klein and Yves Le Traon, An Investigation into the Use of Common Libraries in Android Apps, The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016), 2016
[pdf][bib]
[C8]
Li Li, Tegawendé F. Bissyandé, Jacques Klein and Yves Le Traon, Parameter Values of Android APIs: A Preliminary Study on 100,000 Apps, The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016), 2016
[pdf][bib]
[Best Paper Award]
[C7]
Li Li, Daoyuan Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein and Yves Le Traon, Towards a Generic Framework for Automating Extensive Analysis of Android Applications, The 31st ACM/SIGAPP Symposium on Applied Computing (SAC 2016), 2016
[pdf][bib]
[C6]
Damien Octeau, Somesh Jha, Matthew Dering, Patrick McDaniel, Alexandre Bartel, Li Li, Jacques Klein and Yves Le Traon, Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis, The 43rd Symposium on Principles of Programming Languages (POPL 2016), 2016
[pdf][bib]
[acceptance rate: 23.32% (59/253)]
2015
[C5]
Li Li, Alexandre Bartel, Tegawendé F. Bissyandé Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau and Patrick McDaniel, IccTA: Detecting Inter-Component Privacy Leaks in Android Apps, The 37th International Conference on Software Engineering (ICSE 2015), 2015
[pdf][bib][www]
[acceptance rate: 18.5%, (84/452)]
[C4]
Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein and Yves Le Traon, ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis, The 30th International Information Security and Privacy Conference (IFIP SEC 2015), 2015
[pdf][bib]
[C3]
Li Li, Kevin Allix, Daoyuan Li, Alexandre Bartel, Tegawendé F. Bissyandé and Jacques Klein, Potential Component Leaks in Android Apps: An Investigation into a New Feature Set for Malware Detection, The IEEE International Conference on Software Quality, Reliability and Security (QRS 2015), 2015
[pdf][bib]
2014
[C2]
Li Li, Alexandre Bartel, Jacques Klein and Yves Le Traon, Detecting privacy leaks in Android Apps, The 2014 Doctoral Symposium of International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2014), 2014
[pdf][bib]
[C1]
Li Li, Alexandre Bartel, Jacques Klein and Yves Le Traon, Automatically Exploiting Potential Component Leaks in Android Applications, The 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014), 2014
[pdf][bib]