Prof. Dr. Yves Le Traon
![]() |
|
||||||
Faculté ou Centre | Interdisciplinary Centre for Security, Reliability and Trust | ||||||
Department | SerVal | ||||||
Adresse postale |
Campus Kirchberg, Université du Luxembourg 6, rue Richard Coudenhove-Kalergi L-1359 Luxembourg |
||||||
Bureau sur le campus | E 101 | ||||||
![]() |
|||||||
Téléphone | (+352) 46 66 44 5262 | ||||||

Sous presse
2023

; ; ; ;
in Expert systems with applications (2023), 211
2022

; ; ;
in Has it Trained Yet? Workshop at the Conference on Neural Information Processing Systems (2022, December 02)

; ; ; ; ;
in Empirical Software Engineering (2022)

; ; ; ; ;
in IEEE Transactions on Software Engineering (2022)

; ; ;
in The Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI- 23) - SafeAI Workshop, Washington, D.C., Feb 13-14, 2023 (2022)

; ; ;
in Proceedings of the thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22) (2022)

; ; ; ; ; ;
E-print/Working paper (2022)

; ; ; ;
in The 38th Conference on Uncertainty in Artificial Intelligence (2022)

; ; ; ; ; ;
in ACM Transactions on Software Engineering and Methodology (2022)

; ; ;
in 22nd IEEE International Conference on Software Quality, Reliability and Security (QRS'22) (2022, December 05)

; ; ; ; ; ;
in ACM Transactions on Software Engineering and Methodology (2022)

; ; ; ; ;
in Software and Systems Modeling (2022)

; ; ; ;
in ACM Transactions on Software Engineering and Methodology (2022)

; ; ; ; ;
in Robotics and Computer-Integrated Manufacturing (2022)

; ; ; ; ; ;
in Empirical Software Engineering (2022), 27

; ; ; ;
in Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI-22 (2022)

; ; ; ;
in Jianying, Zhou (Ed.) Applied Cryptography and Network Security Workshops (2022, September 24)
2021

; ; ; ;
in IEEE International Conference on Software Quality, Reliability, and Security (QRS), 2021 (2021)

; ; ;
in Proceedings of International Conference on Computer Vision 2021 (2021)

; ; ;
E-print/Working paper (2021)

; ; ; ;
in 18th International Conference on Mining Software Repositories (2021, May)

; ; ; ; ; ;
in The 36th IEEE/ACM International Conference on Automated Software Engineering. (2021)

; ; ; ; ;
in ACM Transactions on Software Engineering and Methodology (2021)

; ; ; ;
in ACM Transactions on Software Engineering and Methodology (2021), 30(2), 131--1322

; ; ; ; ;
E-print/Working paper (2021)

; ; ;
in ACM Transactions on Software Engineering and Methodology (2021), 30(2), 191--1923
2020

; ; ;
in Communications in Computer and Information Science (2020, February 15)

; ; ; ; ; ;
in ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '20), November 8-13, 2020 (2020)

; ; ;
in International Conference on Software Engineering (ICSE) (2020)

; ; ;
Scientific Conference (2020)

; ; ; ; ; ; ;
in Ghamizi, Salah; Rwemalika, Renaud; Cordy, Maxime; Veiber, Lisa; Bissyande, Tegawendé François D Assise; Papadakis, Mike; Klein, Jacques; Le Traon, Yves (Eds.) Data-driven simulation and optimization for covid-19 exit strategies (2020, August)

; ; ;
in Proceedings of The Web Conference 2020 (WWW '20) (2020, April)

; ; ; ; ; ;
in Empirical Software Engineering (2020)

; ; ; ; ; ; ; ; ;
in 42nd ACM/IEEE International Conference on Software Engineering (ICSE) (2020, May)

; ;
in INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS, 11-13 November 2020 (2020, November)

; ;
in Sensors (2020), 20(24),

; ;
in ACM/IEEE International Conference on Automation of Software Test (AST) 2020 (2020)
2019

; ;
Article for general public (2019)

; ;
in IEEE Transactions on Information Forensics and Security (2019)

; ;
in Proceedings of 45th Annual Conference of the IEEE Industrial Electronics Society (2019)

; ; ;
in ACM SIGSOFT International Symposium on Software Testing and Analysis (2019)

; ; ;
in Automated Search for Configurations of Convolutional Neural Network Architectures (2019)

; ; ; ; ;
in Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2019)

; ; ; ; ;
in Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2019)

; ;
in The Semantic Web - ISWC 2019 (2019)

; ; ; ;
in ACM Computing Surveys (2019)

; ; ; ; ; ;
in ESEC/FSE 2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (2019, August)

; ; ; ;
in International Conference on Software Engineering (ICSE) (2019)

; ; ; ; ;
in Journal of Software: Evolution and Process (2019)

; ; ; ; ;
in Journal of Systems and Software (2019), 154

; ; ; ; ; ; ;
in 41st ACM/IEEE International Conference on Software Engineering (ICSE) (2019, May)

; ; ; ; ;
in The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019) (2019, April 24)

; ; ; ;
in ACM SIGSOFT International Symposium on Software Testing and Analysis (2019)

; ;
in 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, 11-14 January 2019 (2019, January 11)

; ; ; ;
in Proceedings of 35th IEEE International Conference on Software Maintenance and Evolution (2019, September 30)

; ; ; ;
in 12th IEEE International Conference on Software Testing, Verification and Validation (2019)

; ; ; ;
in International Conference on Social Networks Analysis, Management and Security (2019)

; ;
in Titcheu Chekam, Thierry; Papadakis, Mike; Le Traon, Yves (Eds.) Mart: A Mutant Generation Tool for LLVM (2019)
2018

; ; ;
in Electron Markets (2018), 28(1), 53-75

; ; ;
in O-MI/O-DF vs. MQTT: a performance analysis (2018, June 21)

; ; ;
in 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018 (2018, September 26)

; ; ;
Scientific Conference (2018, September)

; ;
in IEEE International Working Conference on Source Code Analysis and Manipulation (2018)

; ; ; ; ; ;
in Proceedings of 12th International Symposium on Empirical Software Engineering and Measurement (ESEM'18) (2018, October 11)

; ; ; ; ; ;
in International Conference on Software Engineering (ICSE 2018) (2018, May 27)

; ; ; ; ;
in Empirical Software Engineering (2018)

; ; ; ; ;
in Knowledge-Based Systems (2018)

; ; ; ;
in Government Information Quarterly (2018)

; ; ; ;
in 21st International Conference on Extending Database Technology (2018, March)

; ; ; ;
in IEEE Transactions on Software Engineering (2018)

; ; ; ; ;
in 34th IEEE International Conference on Software Maintenance and Evolution (ICSME) (2018, September)

; ; ; ; ; ; ; ;
in 17th International Conference on Software Reuse (ICSR) (2018, May)

; ; ; ; ;
in Information and Software Technology (2018)

; ;
in 13th International Workshop on Mutation Analysis (MUTATION'18) (2018)

; ; ;
Scientific Conference (2018, December 11)

; ; ; ; ;
in Empirical Software Engineering (2018), 90

; ; ;
in 40th International Conference on Software Engineering, Gothenburg, Sweden, May 27 - 3 June 2018 (2018)
2017

; ; ; ; ; ;
in 2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (2017, September)

; ; ; ;
in Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering (2017, July)

; ; ;
in Software and Systems Modeling (2017)

; ; ; ; ; ;
in MSR 2017 (2017, May 21)

; ; ; ; ;
in IEEE Transactions on Software Engineering (2017)

; ; ; ;
in 2017 IEEE Global Internet of Things Summit (GIoTS) Proceedings (2017, July)

; ; ;
in Proceedings of the 14th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (2017, November 07)

; ; ; ;
in Modeling and Using Context (2017, July)

; ; ; ;
in Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices (2017, July 10)

; ; ; ;
in Government Information Quarterly (2017)

; ; ; ; ;
in 10th IEEE International Conference on Software Testing, Verification and Validation (2017)

; ; ;
in The 32nd ACM Symposium on Applied Computing (SAC 2017) (2017, April)

; ; ; ; ; ; ;
in Information and Software Technology (2017)

; ; ; ; ; ;
in Journal of Computer Science and Technology (2017)

; ; ; ; ; ;
in Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017) (2017, May)

; ; ; ; ; ;
in IEEE Transactions on Information Forensics and Security (2017)

; ; ; ; ;
in Mouline, Ludovic; Hartmann, Thomas; Fouquet, François; Le Traon, Yves; Bourcier, Johann; Barais, Olivier (Eds.) Programming '17 Companion to the first International Conference on the Art, Science and Engineering of Programming (2017, April)

; ; ; ;
in Computers and Security (2017), 64

; ; ; ; ;
Report (2017)

; ; ;
in International Conference on Software Engineering (ICSE 2017) (2017, May 28)
2016

; ; ;
in Proceedings of the 13th International Workshop on Mining Software Repositories (2016, May)

; ; ;
in Altmann, Jörn; Silaghi, Gheorghe Cosmin; Rana, Omer F. (Eds.) Economics of Grids, Clouds, Systems, and Services (2016)

; ; ; ;
in Journal of Ambient Intelligence and Smart Environments (2016)

; ; ; ; ;
in 31st Annual ACM Symposium on Applied Computing (SAC'16) (2016, April)

; ; ; ;
in 38th International Conference on Software Engineering (ICSE'16) (2016)

; ; ; ;
in Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference (2016)

; ;
in 2016 Asia-Pacific Software Engineering Conference (APSEC) (2016, December)

; ;
in 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, US, October 2-3, 2016 (2016, October)

; ; ; ;
in Proceedings of the 17th International Digital Government Research Conference on Digital Government Research (2016, June 07)

; ; ; ;
in Expert Systems with Applications (2016), 65

; ; ;
in The 15th International Symposium on Intelligent Data Analysis (2016, October)

; ; ;
in International Journal of Software Engineering and Knowledge Engineering (2016), 26(9&10), 13611377

; ; ;
in The 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016) (2016, July)

; ; ; ;
in The 2016 IEEE International Conference on Industrial Technology (ICIT 2016) (2016, March)

; ; ; ;
in 12th International Conference on Machine Learning and Data Mining (MLDM 2016) (2016, July)

; ; ;
in The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (2016, March)

; ; ;
in The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (2016, March)

; ; ;
in The 32nd International Conference on Software Maintenance and Evolution (ICSME) (2016, October)

; ; ; ; ;
in The 31st ACM/SIGAPP Symposium on Applied Computing (SAC 2016) (2016, April)

; ; ; ; ;
in The 20th International Systems and Software Product Line Conference (SPLC 2016) (2016)

; ; ; ;
in Proceedings of 21st IEEE International Conference on Emerging Technologies and Factory Automation ETFA 2016 (2016, September 06)

; ; ; ;
in 20th International Systems and Software Product Line Conference (SPLC 2016) proceedings (2016)

; ; ; ; ;
in Software Reuse: Bridging with Social-Awareness, ICSR 2016 Proceedings (2016)

; ; ; ;
in International Conference on Database and Expert Systems Applications, Porto 5-8 September 2016 (2016)

; ; ; ; ;
in International Conference on Critical Information Infrastructures Security (2016)

; ; ; ; ; ; ;
in The 43rd Symposium on Principles of Programming Languages (POPL 2016) (2016, January)

; ; ; ;
in International Symposium on Software Testing and Analysis, ISSTA 2016 (2016)

; ;
in International Conference on Future Internet of Things and Cloud, 22-24 August 2016, Vienna, Austria (2016)

; ; ;
in O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis (2016)

; ;
in Journal of Systems and Software (2016), 118
2015

; ; ;
in Engineering Secure Software and Systems - 7th International Symposium ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings (2015)

; ; ; ; ; ; ;
in Journal of Object Technology (2015), 14(3),

; ; ; ; ; ;
in 8th IEEE International Conference on Software Testing, Verification and Validation (ICST'15) (2015)

; ; ;
in Economics of Grids, Clouds, Systems, and Services (2015, September 16)

; ; ; ; ; ; ; ;
in Information and Software Technology (2015), 58

; ; ; ;
in Lecture Notes in Computer Science (2015), 8924

; ; ; ; ; ;
in Requirements Engineering (2015), 20(4), 363-382

; ; ; ; ;
in Lethbridge, Timothy; Cabot, Jordi; Egyed, Alexander (Eds.) 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (2015, September)

; ; ; ; ; ;
in 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm) (2015, November)

; ; ;
in 37th International Conference on Software Engineering (ICSE 2015) (2015)

; ;
in Eighth IEEE International Conference on Software Testing, Verification and Validation, ICST 2015 Workshops (2015, April)

; ; ; ;
in International Conference on ICT Systems Security and Privacy Protection (SEC 2015) (2015, May)

; ; ; ; ; ; ; ; ;
in 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015) (2015)

; ; ;
in arXiv preprint arXiv:1511.06554 (2015)

; ; ;
Scientific Conference (2015, March)

; ; ; ;
in 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015) (2015)

; ; ; ;
in The 30th Annual ACM Symposium on Applied Computing (2015, April)

; ; ; ; ;
in Lethbridge, Timothy; Cabot, Jordi; Egyed, Alexander (Eds.) 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (2015, September)

; ; ;
in Information and Software Technology (2015), 68(December 2015), 62-81

; ; ; ; ;
in Proceedings ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (2015, October)

;
in Software Testing, Verification and Reliability (2015), 25

; ; ;
in 37th International Conference on Software Engineering (ICSE 2015) (2015)

; ; ; ;
in IEEE Transactions on Computers (2015), 64(9), 2490-2505

; ; ; ;
in Journal of Computer Science and Technology (2015), 30(5), 935-941
2014

; ; ;
in 7th IEEE International Conference on Software Testing, Verification and Validation (ICST)- Workshop SECTEST (2014)

; ; ; ; ;
in Empirical Software Engineering (2014)

; ; ; ; ;
in Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (2014, March)

; ; ; ; ;
in Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference (2014, July)

; ; ; ; ; ; ;
in Journal of Technology (2014)

; ; ; ; ; ; ; ;
Scientific Conference (2014, June)

; ; ;
in IEEE Transactions on Software Engineering (2014), 40(6), 617-632

; ; ; ;
in IEEE International Conference on Software Testing Verification and Validation Workshops (2014)

; ;
in IfCoLog Journal of Logics and Their Applications (2014), 1(1),

; ; ;
Scientific Conference (2014, October)

; ; ; ; ;
Scientific Conference (2014, March)

; ;
in Proceedings of the International Symposium on Engineering Secure Software and Systems (2014)

; ;
in Lecture Notes in Computer Science (2014), 8364 LNCS

; ; ; ; ; ;
in 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm) (2014, November)

; ; ; ;
in Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14) (2014, April)

; ; ; ; ;
Poster (2014, July 02)

; ; ; ; ; ;
in Dingel, Juergen; Schulte, Wolfram; Ramos, Isidro; Abrahao, Silvia; Insfran, Emilio (Eds.) Model-Driven Engineering Languages and Systems - 17th International Conference, MODELS 2014, Valencia, Spain, September 28 - October 3, 2014. Proceedings (2014)

; ; ; ; ;
in Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering (2014, July)

; ;
in Symposium on Search-Based Software Engineering (SSBSE 2014) (2014)

; ;
in Testing Tools Track, 7th International Conference on Software Testing, Verification and Validation (ICST 2014) (2014)

; ; ; ; ;
in IEEE Transactions on Software Engineering (2014), 40(7), 650-670

; ; ; ; ;
Scientific Conference (2014, December 01)

; ; ;
in The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), IEEE, Sept. 2014, Beijing, China. (2014, September)

; ; ;
Scientific Conference (2014, March 12)

; ; ; ; ; ; ; ;
Report (2014)

; ;
in IDEAS 2014 : 18th International Database Engineering Applications Symposium (2014)

; ; ;
Poster (2014)

; ; ;
in ECMFA 2014 European Conference on Modelling Foundations and Applications (2014)

; ; ; ;
in 2nd IEEE Working Conference on Software Visualization (2014)

; ;
in 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling (2014, July 22)

; ;
in Joosen, Wouter; Martinelli, Fabio; Heyman, Thomas (Eds.) Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014) (2014, February 26)

; ; ; ;
in Transactions on Aspect-Oriented Software Development (2014), 11

; ; ; ; ;
in Bissyandé, Tegawendé F.; van Stam, Gertjan (Eds.) e-Infrastructure and e-Services for Developing Countries (2014)

; ;
in Science of Computer Programming (2014), 95

; ;
in 7th International Conference on Software Testing, Verification and Validation (ICST 2014) (2014)

;
in ACM Symposium On Applied Computing (SAC'14) (2014)

; ; ;
in 14th Annual International Conference on Quality Software (QSIC) (2014)

; ; ; ;
in Information and Software Technology (2014), 56(7), 749-762

; ; ; ;
in 29th Symposium on Applied Computing (SAC 2014) (2014)
2013

; ; ; ; ;
in EAI International Conference on e-Infrastructure and e-Services for Developing Countries (2013)

; ; ; ; ;
in Proceedings of the 24th International Symposium on Software Reliability Engineering (ISSRE 2013) (2013, November)

; ;
in 16th INTERNATIONAL CONFERENCE ON PRINCIPLES AND PRACTICE OF MULTI-AGENT SYSTEMS (PRIMA 2013) (2013, December 01)

; ; ;
in Abstract book of 2013 8TH INTERNATIONAL WORKSHOP ON AUTOMATION OF SOFTWARE TEST (AST) (2013)

;
in 2013 International Conference on Availability, Reliability and Security (2013)

; ; ; ; ;
in Journal of Information and Data Management (2013)

; ; ; ;
in 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, Workshops Proceedings, Luxembourg, Luxembourg, March 18-22, 2013 (2013)

; ; ; ;
in 17th International Software Product Line Conference, SPLC 2013, Tokyo, Japan - August 26 - 30, 2013 (2013)

; ; ; ;
in Proceedings of the 2013 International Conference on Software Engineering (2013)

; ; ; ;
in 17th International Software Product Line Conference co-located workshops, SPLC 2013 workshops, Tokyo, Japan - August 26 (2013)

; ; ; ;
in Journal of Information and Data Management (2013)

; ; ; ;
in Theory, Practice, and Applications of Rules on the Web (2013, July 01)

; ; ; ;
in Joint Proceedings of the 7th International Rule Challenge, the Special Track on Human Language Technology and the 3rd RuleML Doctoral Consortium hosted at the 8th International Symposium on Rules (RuleML2013) (2013, July)

; ; ;
in Information and Software Technology (2013), 55(2), 252-266

; ; ;
in The 20th Asia-Pacific Software Engineering Conference Proceedings (2013, December)

; ; ; ;
in Masuhara, Hidehiko; Chiba, Sigeru; Ubayashi, Naoyasu (Eds.) Proceedings of the 12th annual international conference companion on Aspect-oriented software development (2013, March)

; ; ; ; ; ;
in Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis (2013)

; ;
in International Working Conference on Source Code Analysis and Manipulation (2013)

;
in Abstract book of 28th Symposium On Applied Computing (2013)
2012

; ; ; ;
Report (2012)

; ; ; ;
E-print/Working paper (2012)

; ; ;
in IEEE/ACM International Conference on Automated Software Engineering (2012)

; ; ;
in ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2012) (2012)

; ; ;
in The 4th International Workshop on Acquisition, Representation and Reasoning with Contextualized Knowledge ARCOE-12 (2012, August 27)

; ; ; ; ;
in TSI. Technique et science informatiques (2012), 31(6), 797--825

; ; ;
in 8th International Workshop on Automation of Software Test (AST), 2013 (2012, May)

; ; ; ;
in Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (2012, April)

; ;
in Proceedings of the 7th International Workshop on Mutation Analysis (associated to the Fifth International Conference on Software Testing, Verification, and Validation, ICST 2012) (2012)

; ; ; ;
in Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (ICPE 2012) (2012)

; ;
in Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012 (2012)

; ; ; ;
Scientific Conference (2012, September)

; ; ;
in Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on (2012)

; ; ; ;
in Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments (2012, August), 907

; ; ; ; ; ; ;
in New Ideas & Emerging Results Track of the International Conference of Software Engineering (NIER@ICSE) (2012, June)

; ; ; ; ;
in Software Quality Journal (2012), 20(3), 605-643

; ; ; ;
in Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (2012)
2011

; ; ; ; ;
in 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops (2011)

; ; ;
in Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android (Tech Report) (2011)
2010

; ; ; ;
in International Conference on Software Test and Validation (2010)