Recherche - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu

Filtrer vos résultats

10 357 résultats
Sous-domaine niveau 1 : info.info-cr

Choquet-based multi-criteria decision making with objective and subjective information

Meimei Xia , Zhang Runtong , Youakim Badr
Journal of Intelligent and Fuzzy Systems, 2016, 30 (2), pp.773-781. ⟨10.3233/IFS-151798⟩
Article dans une revue hal-01478750v1
Image document

Yedroudj-Net : un réseaux de neurones efficace pour la stéganalyse spatiale

Mehdi Yedroudj , Marc Chaumont , Frédéric Comby
CORESA: COmpression et REprésentation des Signaux Audiovisuels, C. Charrier (GREYC, Université de Caen Normandie); C. Rosenberger (GREYC, ENSICAEN), Nov 2017, Caen, France
Communication dans un congrès lirmm-01777361v1
Image document

Capacity: an Abstract Model of Control over Personal Data

Daniel Le Métayer , Pablo Rauzy
[Research Report] RR-9124, Inria Grenoble Rhône-Alpes; Université Paris 8. 2017, pp.1-21
Rapport hal-01638190v2

Protéger et utiliser ses données en ligne

Matthieu Giraud
Interstices, 2018
Article dans une revue hal-01827610v1

A Continuous Query Language for Stream-based Artifacts

Maroun Abi Assaf , Youakim Badr , Amghar Youssef
28th International Conference on Database and Expert Systems Applications (DEXA), Aug 2017, Lyon, France. pp 80-89
Communication dans un congrès hal-01575959v1
Image document

All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE

Benoît Libert , Amin Sakzad , Damien Stehlé , Ron Steinfeld
Crypto 2017 - 37th International Cryptology Conference, Aug 2017, Santa Barbara, United States. pp.332 - 364, ⟨10.1007/978-3-662-53018-4_18⟩
Communication dans un congrès hal-01621025v1
Image document

Yedroudj-Net: An Efficient CNN for Spatial Steganalysis

Mehdi Yedroudj , Frédéric Comby , Marc Chaumont
ICASSP: International Conference on Acoustics, Speech and Signal Processing, Apr 2018, Calgary, Alberta, Canada. pp.2092-2096, ⟨10.1109/ICASSP.2018.8461438⟩
Communication dans un congrès lirmm-01717550v1
Image document

PREEMPTIVE PREventivE Methodology and Tools to protect utilitIEs

Alessia Valentini , Giorgio Sinibaldi
Fast abstracts at International Conference on Computer Safety, Reliability, and Security (SAFECOMP), Sep 2016, Trondheim, Norway
Communication dans un congrès hal-01370266v1

Privacy-preserving Wi-Fi Analytics

Mohammad Alaggan , Mathieu Cunche , Sébastien Gambs
Proceedings on Privacy Enhancing Technologies, 2018, 2018 (2), pp.4-26. ⟨10.1515/popets-2018-0010⟩
Article dans une revue hal-01719211v1
Image document

Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors

Benoît Libert , San Ling , Khoa Nguyen , Huaxiong Wang
Eurocrypt 2016, International Association for Cryptologic Research, May 2016, Vienne, Austria. ⟨10.1007/978-3-662-49896-5_1⟩
Communication dans un congrès hal-01314642v1
Image document

An Alternative Approach for SIDH Arithmetic

Cyril Bouvier , Laurent Imbert
PKC 2021 - IACR International Conference on Public-Key Cryptography, May 2021, Virtual, United Kingdom. pp.27-44, ⟨10.1007/978-3-030-75245-3_2⟩
Communication dans un congrès lirmm-03219438v1
Image document

Verifying the Application of Security Measures in IoT Software Systems with Model Learning

Sébastien Salva , Elliot Blot
15th International Conference on Software Technologies, Jul 2020, Lieusaint - Paris, France. pp.350-360, ⟨10.5220/0009872103500360⟩
Communication dans un congrès hal-03048356v1

Multiround Distributed Lifetime Coverage Optimization protocol in wireless sensor networks

Ali Kadhum Idrees , Karine Deschinkel , Michel Salomon , Raphael Couturier
Journal of Supercomputing, 2018, 74 (5), pp.1949 - 1972
Article dans une revue hal-02945133v1

IoT Botnet Detection using Black-box Machine Learning Models: the Trade-off between Performance and Interpretability

Nourhène Ben Rabah , Benedicte Le Grand , Manuele Kirsch Pinheiro
2021 IEEE 30th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Oct 2021, Bayonne, France. pp.101-106, ⟨10.1109/WETICE53228.2021.00030⟩
Communication dans un congrès hal-03877517v1
Image document

Homomorphic Two Tier Reversible Data Hiding In Encrypted 3D Objects

Bianca Jansen van Rensburg , William Puech , Pauline Puteaux , Jean-Pierre Pedeboy
ICIP 2021 - 28th IEEE International Conference on Image Processing, Sep 2021, Anchorage, AK, United States. pp.3068-3072, ⟨10.1109/ICIP42928.2021.9506320⟩
Communication dans un congrès lirmm-03520989v1
Image document

CCA Secure A Posteriori Openable Encryption in the Standard Model

Xavier Bultel
The Cryptographer’s Track at the RSA Conference (TC-RSA 2022), Mar 2022, San Francisco, United States. ⟨10.1007/978-3-030-95312-6_16⟩
Communication dans un congrès hal-03754615v1
Image document

Binary Analysis for Linux and IoT Malware

Emanuele Cozzi
Cryptography and Security [cs.CR]. Sorbonne Université, 2020. English. ⟨NNT : 2020SORUS197⟩
Thèse tel-03417110v1
Image document

Security management in vehicular ad hoc networks

Tayeb Diab
Cryptography and Security [cs.CR]. Université de Haute Alsace - Mulhouse, 2020. English. ⟨NNT : 2020MULH3002⟩
Thèse tel-03661114v1
Image document

Combining Reduction and Dense Blocks for Music Genre Classification

Charbel El Achkar , Raphael Couturier , Talar Atechian , Abdallah Makhoul
28th International Conference on Neural Information Processing (ICONIP) 2021, Dec 2021, Bali, Indonesia
Communication dans un congrès hal-03814512v1
Image document

Firejail : Le couteau suisse du confinement sous Linux

Vincent Autefage
JRES 2022 : 14èmes Journées Réseaux, RENATER, May 2022, Marseille, France. pp.Article 31
Communication dans un congrès hal-03640803v2
Image document

Analyse de l'évolutivité d'un réseau d'apprentissage profond pour la stéganalyse d'images

Hugo Ruiz , Marc Chaumont , Mehdi Yedroudj , Frédéric Comby , Gérard Subsol
CORESA 2021 - 21e colloque COmpression et REprésentation des Signaux Audiovisuels, Nov 2021, Sophia Antipolis, France
Communication dans un congrès lirmm-03819818v1
Image document

Security of Distributed Model Predictive Control under False Data Injection

Rafael Accácio Nogueira
Automatic. CentraleSupélec, 2022. English. ⟨NNT : 2022CSUP0006⟩
Thèse tel-04003991v1
Image document

More Insights Into Communication Issues in the Internet of Vehicles

Oumaya Baala , Chérifa Boucetta , Kahina Ait Ali , Alexandre Caminada
International Symposium on Pervasive Systems, Algorithms and Networks, Oct 2018, Yichang, China
Communication dans un congrès hal-02182808v1

Vulnerabilities segregation using CVSS framework

Laurent Gallon
4th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2011), Feb 2011, France
Communication dans un congrès hal-00538860v1

An approach based on Model-driven Engineering to define Security Policies using the access control model OrBAC

Denisse Muñante Arzapalo , Laurent Gallon , Philippe Aniorte
FARES 2013 : The Eight International Workshop on Frontiers in Availability, Reliability and Security. In conjonction with the 8th ARES Conference (ARES 2013), Sep 2013, Regensburg, Germany
Communication dans un congrès hal-01092973v1
Image document

Algebraic Approach for Code Equivalence

Mohamed Ahmed Saeed
Cryptography and Security [cs.CR]. Normandie Université; University of Khartoum, 2017. English. ⟨NNT : 2017NORMR034⟩
Thèse tel-01678829v2

Extended autofocusing capabilities in digital holographic microscopy with transformer neural networks

Louis Andreoli , Stéphane Cuenat , Antoine André , Patrick Sandoz , Raphael Couturier , et al.
SPIE Photonics Europe, Apr 2022, Strasbourg, France
Communication dans un congrès hal-03812933v1

Computer microvision-based precision motion measurement by digital holographic microscopy and deep transformer neural networks

Stéphane Cuenat , Jesús Eduardo Brito Carcaño , Patrick Sandoz , Raphael Couturier , Guillaume Laurent , et al.
SPIE Photonics West, Jan 2023, San Francisco, California, United States
Communication dans un congrès hal-04224349v1
Image document

PROLISEAN: A New Security Protocol for Programmable Matter

Edy Hourany , Bachir Habib , Camille Fountaine , Abdallah Makhoul , Benoit Piranda , et al.
ACM Transactions on Internet Technology, 2021, 21 (1), pp.22. ⟨10.1145/3432250⟩
Article dans une revue hal-03186562v1
Image document

Commutative Cryptanalysis Made Practical

Jules Baudrin , Patrick Felke , Gregor Leander , Patrick Neumann , Léo Perrin , et al.
IACR Transactions on Symmetric Cryptology, 2023, 2023 (4), pp.299-329. ⟨10.46586/tosc.v2023.i4.299-329⟩
Article dans une revue hal-04277884v3