default search action
Christophe Guyeux
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j67]Marianne Abi Kanaan, Jean-François Couchot, Christophe Guyeux, David Laiymani, Talar Atéchian, Rony Darazi:
Combining a multi-feature neural network with multi-task learning for emergency calls severity prediction. Array 21: 100333 (2024) - [j66]Jérémy Renaud, Raphaël Couturier, Christophe Guyeux, Benoit Courjal:
TSCAPE: time series clustering with curve analysis and projection on an Euclidean space. Connect. Sci. 36(1) (2024) - [j65]Shufeng Huang, Qianxue Wang, Xiaoming Xiong, Shuting Cai, Christophe Guyeux:
Designing higher-dimensional digital chaotic systems via reverse derivation of iterative function from strongly connected graph and its application. Expert Syst. Appl. 255: 124638 (2024) - [j64]Wissam AlKendi, Franck Gechter, Laurent Heyberger, Christophe Guyeux:
Advancements and Challenges in Handwritten Text Recognition: A Comprehensive Survey. J. Imaging 10(1): 18 (2024) - [c77]Nicolas Caron, Christophe Guyeux, Benjamin Aynes:
Predicting wildfire events with calibrated probabilities. ICMLC 2024: 168-175 - [c76]Wissam AlKendi, Franck Gechter, Laurent Heyberger, Christophe Guyeux:
Belfort Birth Records Transcription: Preprocessing, and Structured Data Generation. IMPROVE 2024: 32-43 - [c75]Wissam AlKendi, Stéphane Chrétien, Christophe Guyeux:
Computing the Shortest Vector in a Lattice Using the Alternating Direction Method of Multipliers. SAI (1) 2024: 576-587 - 2023
- [j63]Raphaël Couturier, Etienne Dionis, Stéphane Guérin, Christophe Guyeux, Dominique Sugny:
Characterization of a Driven Two-Level Quantum System by Supervised Learning. Entropy 25(3): 446 (2023) - [j62]Xin Chen, Simin Yu, Qianxue Wang, Christophe Guyeux, Mengjie Wang:
On the cryptanalysis of an image encryption algorithm with quantum chaotic map and DNA coding. Multim. Tools Appl. 82(27): 42717-42737 (2023) - [j61]Suzan Hajj, Joseph Azar, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul, Dominique Ginhac:
Cross-Layer Federated Learning for Lightweight IoT Intrusion Detection Systems. Sensors 23(16): 7038 (2023) - [j60]Christophe Guyeux, Gaby Bou Tayeh, Abdallah Makhoul, Stéphane Chrétien, Julien Bourgeois, Jacques M. Bahi:
Using data science to predict firemen interventions: a case study. J. Supercomput. 79(7): 7160-7175 (2023) - [c74]Monah Bou Hatoum, Jean-Claude Charr, Christophe Guyeux, David Laiymani, Alia Ghaddar:
EMTE: An Enhanced Medical Terms Extractor Using Pattern Matching Rules. ICAART (2) 2023: 301-311 - [c73]Monah Bou Hatoum, Jean-Claude Charr, Alia Ghaddar, Christophe Guyeux, David Laiymani:
UTP: A Unified Term Presentation Tool for Clinical Textual Data Using Pattern-Matching Rules and Dictionary-Based Ontologies. ICAART (Revised Selected Paper) 2023: 353-369 - [c72]Marianne Abi Kanaan, Jean-François Couchot, Christophe Guyeux, David Laiymani, Talar Atéchian, Rony Darazi:
A Methodology for Emergency Calls Severity Prediction: From Pre-processing to BERT-Based Classifiers. AIAI (1) 2023: 329-342 - [c71]Wissam AlKendi, Paresh Mahapatra, Bassam AlKindy, Christophe Guyeux, Magali Barthès:
Application of Particle Detection Methods to Solve Particle Overlapping Problems. IMPROVE 2023: 84-91 - 2022
- [j59]Bassam AlKindy, Christophe Guyeux:
Impact of Insertion Sequences and RNAs on Genomic Inversions in Pseudomonas aeruginosa. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9513-9522 (2022) - [j58]Selene Cerna, Christophe Guyeux, David Laiymani:
The usefulness of NLP techniques for predicting peaks in firefighter interventions due to rare events. Neural Comput. Appl. 34(12): 10117-10132 (2022) - [j57]Héber Hwang Arcolezi, Selene Cerna, Jean-François Couchot, Christophe Guyeux, Abdallah Makhoul:
Privacy-Preserving Prediction of Victim's Mortality and Their Need for Transportation to Health Facilities. IEEE Trans. Ind. Informatics 18(8): 5592-5599 (2022) - [c70]Roxane Elias Mallouhy, Christophe Guyeux, Chady Abou Jaoude, Abdallah Makhoul:
Forecasting the Number of Firemen Interventions Using Exponential Smoothing Methods: A Case Study. AINA (1) 2022: 579-589 - [c69]Roxane Elias Mallouhy, Christophe Guyeux, Chady Abou Jaoude, Abdallah Makhoul:
Machine Learning for Predicting Firefighters' Interventions Per Type of Mission. CoDIT 2022: 1196-1200 - [c68]Christophe Guyeux, Abdallah Makhoul, Jacques M. Bahi:
How to Build an Optimal and Operational Knowledge Base to Predict Firefighters' Interventions. IntelliSys (1) 2022: 558-572 - [c67]Christophe Guyeux:
Study and predictions of emergency rescue in the Doubs department, France. IS 2022: 1-6 - [c66]Christophe Guyeux, Guislaine Refregier, Christophe Sola:
Spolmap: An Enriched Visualization of CRISPR Diversity. IWBBIO (2) 2022: 300-308 - [c65]Roxane Elias Mallouhy, Christophe Guyeux, Chady Abou Jaoude, Abdallah Makhoul:
Predicting fire brigades' operations based on their type of interventions. IWCMC 2022: 606-610 - [c64]Gaby Bou Tayeh, Joseph Azar, Abdallah Makhoul, Christophe Guyeux, Jacques Demerjian:
On the performance of data-driven approaches for energy efficiency on WiFi and LoRa-based sensors: an experimental study. IWCMC 2022: 883-888 - [c63]Roxane Elias Mallouhy, Christophe Guyeux, Chady Abou Jaoude, Abdallah Makhoul:
Anomalies and Breakpoint Detection for a Dataset of Firefighters' Operations During the COVID-19 Period in France. WorldCIST (1) 2022: 3-12 - [c62]Christophe Guyeux, Jacques M. Bahi:
How to Predict Patient Arrival in the Emergency Room. WorldCIST (1) 2022: 600-610 - [i74]Yakini Tchouka, Jean-François Couchot, Maxime Coulmeau, David Laiymani, Philippe Selles, Azzedine Rahmani, Christophe Guyeux:
De-Identification of French Unstructured Clinical Notes for Machine Learning Tasks. CoRR abs/2209.09631 (2022) - 2021
- [j56]Suzan Hajj, Rayane El Sibai, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul, Dominique Ginhac:
A Critical Review on the Implementation of Static Data Sampling Techniques to Detect Network Attacks. IEEE Access 9: 138903-138938 (2021) - [j55]Selene Cerna, Héber Hwang Arcolezi, Christophe Guyeux, Guillaume Royer, Céline Chevallier:
Machine learning-based forecasting of firemen ambulances' turnaround time in hospitals, considering the COVID-19 impact. Appl. Soft Comput. 109: 107561 (2021) - [j54]Suzan Hajj, Rayane El Sibai, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul, Christophe Guyeux:
Anomaly-based intrusion detection systems: The requirements, methods, measurements, and datasets. Trans. Emerg. Telecommun. Technol. 32(4) (2021) - [j53]Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
An optimal cluster-based routing algorithm for UCBSNs. Internet Technol. Lett. 4(2) (2021) - [j52]Christophe Guyeux, Christophe Sola, Camille Noûs, Guislaine Refregier:
CRISPRbuilder-TB: "CRISPR-builder for tuberculosis". Exhaustive reconstruction of the CRISPR locus in mycobacterium tuberculosis complex using SRA. PLoS Comput. Biol. 17(3) (2021) - [j51]Qianxue Wang, Simin Yu, Christophe Guyeux, Wei Wang:
Constructing Higher-Dimensional Digital Chaotic Systems via Loop-State Contraction Algorithm. IEEE Trans. Circuits Syst. I Regul. Pap. 68(9): 3794-3807 (2021) - [c61]Roxane Elias Mallouhy, Christophe Guyeux, Chady Abou Jaoude, Abdallah Makhoul:
Time Series Forecasting for the Number of Firefighters Interventions. AINA (1) 2021: 39-50 - [c60]Gaby Bou Tayeh, Christophe Guyeux, Abdallah Makhoul, Jacques M. Bahi, Sébastien Freidig:
A Personal LPWAN Remote Monitoring System. IWCMC 2021: 80-85 - [c59]Johny Matar, Hicham El Khoury, Jean-Claude Charr, Christophe Guyeux:
Impact of Eigensolvers on Spectral Clustering. MENACOMM 2021: 49-53 - 2020
- [j50]Christophe Guyeux, Mohammed Haddad, Mourad Hakem, Matthieu Lagacherie:
Efficient distributed average consensus in wireless sensor networks. Comput. Commun. 150: 115-121 (2020) - [j49]Héber Hwang Arcolezi, Jean-François Couchot, Selene Cerna, Christophe Guyeux, Guillaume Royer, Bechara al Bouna, Xiaokui Xiao:
Forecasting the number of firefighter interventions per region with local-differential-privacy-based data. Comput. Secur. 96: 101888 (2020) - [j48]Nadine Boudargham, Rayane El Sibai, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
Toward fast and accurate emergency cases detection in BSNs. IET Wirel. Sens. Syst. 10(1): 47-60 (2020) - [j47]Christophe Guyeux, Jean-Claude Charr, Jacques Bou Abdo, Jacques Demerjian:
Advances in the enumeration of foldable self-avoiding walks. Int. J. Comput. Sci. Eng. 22(4): 365-375 (2020) - [j46]Ahmad Farhat, Christophe Guyeux, Mohammed Haddad, Mourad Hakem:
Energy-efficiency and coverage quality management for reliable diagnostics in wireless sensor networks. Int. J. Sens. Networks 32(3): 127-138 (2020) - [j45]Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul, Christophe Guyeux:
Mobility aware and traffic adaptive hybrid MAC protocol for collaborative body sensor networks. Int. J. Sens. Networks 32(3): 182-196 (2020) - [j44]Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
Performance of low level protocols in high traffic wireless body sensor networks. Peer-to-Peer Netw. Appl. 13(3): 850-871 (2020) - [j43]Gaby Bou Tayeh, Abdallah Makhoul, Jacques Demerjian, Christophe Guyeux, Jacques M. Bahi:
Fault tolerant data transmission reduction method for wireless sensor networks. World Wide Web 23(2): 1197-1216 (2020) - [c58]Gaby Bou Tayeh, Joseph Azar, Abdallah Makhoul, Christophe Guyeux, Jacques Demerjian:
A Wearable LoRa-Based Emergency System for Remote Safety Monitoring. IWCMC 2020: 120-125 - [c57]Selene Cerna, Christophe Guyeux, Héber Hwang Arcolezi, Raphaël Couturier, Guillaume Royer:
A Comparison of LSTM and XGBoost for Predicting Firemen Interventions. WorldCIST (2) 2020: 424-434
2010 – 2019
- 2019
- [j42]Johny Matar, Hicham El Khoury, Jean-Claude Charr, Christophe Guyeux, Stéphane Chrétien:
SpCLUST: Towards a fast and reliable clustering for potentially divergent biological sequences. Comput. Biol. Medicine 114 (2019) - [j41]Jacques M. Bahi, Wiem Elghazel, Christophe Guyeux, Mourad Hakem, Kamal Medjaher, Noureddine Zerhouni:
Reliable diagnostics using wireless sensor networks. Comput. Ind. 104: 103-115 (2019) - [j40]Zhuosheng Lin, Christophe Guyeux, Simin Yu, Qianxue Wang, Shuting Cai:
On the use of chaotic iterations to design keyed hash function. Clust. Comput. 22(Suppl 1): 905-919 (2019) - [j39]Hassan Noura, Christophe Guyeux, Ali Chehab, Mohammad M. Mansour, Raphaël Couturier:
Efficient Chaotic Encryption Scheme with OFB Mode. Int. J. Bifurc. Chaos 29(5): 1950059:1-1950059:24 (2019) - [j38]Christophe Guyeux, Michel Salomon, Bashar Al-Nuaimi, Bassam AlKindy, Jean-François Couchot:
Ancestral Reconstruction and Investigations of Genomic Recombination on some Pentapetalae Chloroplasts. J. Integr. Bioinform. 16(4) (2019) - [j37]Ahmad Farhat, Christophe Guyeux, Abdallah Makhoul, Ali Jaber, Rami Tawil, Abbas Hijazi:
Impacts of wireless sensor networks strategies and topologies on prognostics and health management. J. Intell. Manuf. 30(5): 2129-2155 (2019) - [j36]Christophe Guyeux, Stéphane Chrétien, Gaby Bou Tayeh, Jacques Demerjian, Jacques M. Bahi:
Introducing and Comparing Recent Clustering Methods for Massive Data Management in the Internet of Things. J. Sens. Actuator Networks 8(4): 56 (2019) - [c56]Selene Leya Cerna Ñahuis, Christophe Guyeux, Héber Hwang Arcolezi, Raphaël Couturier, Guillaume Royer, Anna Diva P. Lotufo:
Long Short-Term Memory for Predicting Firemen Interventions. CoDIT 2019: 1132-1137 - [c55]Luigi Marangio, Christophe Guyeux:
Entropy and Security of Pseudorandom Number Generators based on Chaotic Iterations. ICETE (2) 2019: 402-407 - [c54]Roxane Mallouhy, Chady Abou Jaoude, Christophe Guyeux, Abdallah Makhoul:
Major earthquake event prediction using various machine learning algorithms. ICT-DM 2019: 1-7 - [c53]Jean-François Couchot, Christophe Guyeux, Guillaume Royer:
Anonymously forecasting the number and nature of firefighting operations. IDEAS 2019: 30:1-30:8 - [c52]Christophe Guyeux, Jean-Marc Nicod, Christophe Varnier, Zeina Al Masry, Nourredine Zerhouny, Nabil Omri, Guillaume Royer:
Firemen Prediction by Using Neural Networks: A Real Case Study. IntelliSys (1) 2019: 541-552 - [c51]Stéphane Chrétien, Christophe Guyeux:
Efficient Online Laplacian Eigenmap Computation for Dimensionality Reduction in Molecular Phylogeny via Optimisation on the Sphere. IWBBIO (1) 2019: 441-452 - [c50]Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
Efficient Cluster based Routing Protocol for Collaborative Body Sensor Networks. SENSORNETS 2019: 94-101 - 2018
- [j35]Panisa Treepong, Christophe Guyeux, Alexandre Meunier, Charlotte Couchoud, Didier Hocquet, Benoit Valot:
panISa: ab initio detection of insertion sequences in bacterial genomes from short read sequence data. Bioinform. 34(22): 3795-3800 (2018) - [j34]Régis Garnier, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Bashar Al-Nuaimi, Bassam AlKindy:
Comparison of metaheuristics to measure gene effects on phylogenetic supports and topologies. BMC Bioinform. 19-S(7): 89-107 (2018) - [j33]Christophe Guyeux, Bashar Al-Nuaimi, Bassam AlKindy, Jean-François Couchot, Michel Salomon:
On the reconstruction of the ancestral bacterial genomes in genus Mycobacterium and Brucella. BMC Syst. Biol. 12(5): 99-121 (2018) - [j32]Marine Bruneau, Thierry Mottet, Serge Moulin, Maël Kerbiriou, Franz Chouly, Stéphane Chrétien, Christophe Guyeux:
A clustering package for nucleotide sequences using Laplacian Eigenmaps and Gaussian Mixture Model. Comput. Biol. Medicine 93: 66-74 (2018) - [j31]Mohammed Bakiri, Christophe Guyeux, Jean-François Couchot, Abdelkrim Kamel Oudjida:
Survey on hardware implementation of random number generators on FPGA: Theory and experimental analyses. Comput. Sci. Rev. 27: 135-153 (2018) - [j30]Ahmad Farhat, Christophe Guyeux, Abdallah Makhoul, Ali Jaber, Rami Tawil:
On the coverage effects in wireless sensor networks based prognostic and health management. Int. J. Sens. Networks 28(2): 125-138 (2018) - [j29]Nadine Bou Dargham, Abdallah Makhoul, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux:
Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks. Sensors 18(10): 3572 (2018) - [j28]Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux:
CIPRNG: A VLSI Family of Chaotic Iterations Post-Processings for $\mathbb {F}_{2}$ -Linear Pseudorandom Number Generation Based on Zynq MPSoC. IEEE Trans. Circuits Syst. I Regul. Pap. 65-I(5): 1628-1641 (2018) - [j27]Mohammed Bakiri, Christophe Guyeux, Jean-François Couchot, Luigi Marangio, Stefano Galatolo:
A Hardware and Secure Pseudorandom Generator for Constrained Devices. IEEE Trans. Ind. Informatics 14(8): 3754-3765 (2018) - [c49]Stéphane Chrétien, Christophe Guyeux:
Online Shortest Paths With Confidence Intervals for Routing in a Time Varying Random Network. IJCNN 2018: 1-6 - [c48]Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Talar Atéchian:
Efficient cluster-based routing algorithm for body sensor networks. MENACOMM 2018: 1-6 - [c47]Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
Collaborative body sensor networks: Taxonomy and open challenges. MENACOMM 2018: 1-6 - [c46]Elie Khoury, Maguy Medlej, Chady Abou Jaoude, Christophe Guyeux:
Novel order preserving encryption scheme for wireless sensor networks. MENACOMM 2018: 1-6 - [c45]Luigi Marangio, Christophe Guyeux, Jacques M. Bahi:
On the collision property of chaotic iterations based post-treatments over cryptographic pseudorandom number generators. MENACOMM 2018: 1-6 - [c44]Anthony Tannoury, Rony Darazi, Abdallah Makhoul, Christophe Guyeux:
Wireless multimedia sensor network deployment for disparity map calculation. MENACOMM 2018: 1-6 - [c43]Stéphane Chrétien, Christophe Guyeux, Zhen-Wai Olivier Ho:
Average Performance Analysis of the Stochastic Gradient Method for Online PCA. LOD 2018: 231-242 - [c42]Stéphane Chrétien, Christophe Guyeux, Serge Moulin:
l1-Penalised Ordinal Polytomous Regression Estimators with Application to Gene Expression Studies. WABI 2018: 17:1-17:13 - [i73]Stéphane Chrétien, Christophe Guyeux, Zhen-Wai Olivier Ho:
Average performance analysis of the stochastic gradient method for online PCA. CoRR abs/1804.01071 (2018) - [i72]Stéphane Chrétien, Christophe Guyeux:
Online shortest paths with confidence intervals for routing in a time varying random network. CoRR abs/1805.09261 (2018) - 2017
- [j26]Serge Moulin, Nicolas Seux, Stéphane Chrétien, Christophe Guyeux, Emmanuelle Lerat:
Simulation-based estimation of branching models for LTR retrotransposons. Bioinform. 33(3): 320-326 (2017) - [j25]Sylvain Contassot-Vivier, Jean-François Couchot, Christophe Guyeux, Pierre-Cyrille Héam:
Random Walk in a N-Cube Without Hamiltonian Cycle to Chaotic Pseudorandom Number Generation: Theoretical and Practical Considerations. Int. J. Bifurc. Chaos 27(1): 1750014:1-1750014:18 (2017) - [j24]Christophe Guyeux, Stéphane Chrétien, Nathalie M.-L. Côté, Jacques M. Bahi:
Systematic investigations of gene effects on both topologies and supports: An Echinococcus illustration. J. Bioinform. Comput. Biol. 15(5): 1750019:1-1750019:27 (2017) - [j23]Kahina Ghidouche, Abderrahmane Sider, Raphaël Couturier, Christophe Guyeux:
Efficient high degree polynomial root finding using GPU. J. Comput. Sci. 18: 46-56 (2017) - [c41]Abdessalem Abidi, Christophe Guyeux, Belgacem Bouallegue, Mohsen Machhout:
Conditions to Have a Well-Disordered Dynamics in the CBC Mode of Operation. AICCSA 2017: 226-231 - [c40]Régis Garnier, Christophe Guyeux, Stéphane Chrétien:
Finding optimal finite biological sequences over finite alphabets: The OptiFin toolbox. CIBCB 2017: 1-9 - [c39]Zhuosheng Lin, Christophe Guyeux, Simin Yu, Qianxue Wang:
Design and Evaluation of Chaotic Iterations Based Keyed Hash Function. ICISA 2017: 404-414 - [c38]Christophe Guyeux, Bashar Al-Nuaimi, Bassam AlKindy, Jean-François Couchot, Michel Salomon:
On the Ability to Reconstruct Ancestral Genomes from Mycobacterium Genus. IWBBIO (1) 2017: 642-658 - [c37]Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux:
One Random Jump and One Permutation: Sufficient Conditions to Chaotic, Statistically Faultless, and Large Throughput PRNG for FPGA. SECRYPT 2017: 295-302 - [i71]Jacques M. Bahi, Christophe Guyeux:
Hash functions using chaotic iterations. CoRR abs/1702.02489 (2017) - [i70]Jacques M. Bahi, Christophe Guyeux, Abdallah Makhoul, Congduc Pham:
Low Cost Monitoring and Intruders Detection using Wireless Video Sensor Networks. CoRR abs/1702.02516 (2017) - [i69]Sylvain Contassot-Vivier, Jean-François Couchot, Christophe Guyeux, Pierre-Cyrille Héam:
Random Walk in a N-cube Without Hamiltonian Cycle to Chaotic Pseudorandom Number Generation: Theoretical and Practical Considerations. CoRR abs/1702.02533 (2017) - [i68]Anthony Tannoury, Rony Darazi, Christophe Guyeux, Abdallah Makhoul:
Efficient and accurate monitoring of the depth information in a Wireless Multimedia Sensor Network based surveillance. CoRR abs/1706.08088 (2017) - [i67]Régis Garnier, Christophe Guyeux, Stéphane Chrétien:
Finding optimal finite biological sequences over finite alphabets: the OptiFin toolbox. CoRR abs/1706.08089 (2017) - [i66]Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux:
One random jump and one permutation: sufficient conditions to chaotic, statistically faultless, and large throughput PRNG for FPGA. CoRR abs/1706.08093 (2017) - [i65]Abdessalem Abidi, Christophe Guyeux, Jacques Demerjian, Belagacem Bouallegue, Mohsen Machhout:
Lyapunov Exponent Evaluation of the CBC Mode of Operation. CoRR abs/1706.08099 (2017) - [i64]Zhuosheng Lin, Christophe Guyeux, Simin Yu, Qianxue Wang:
Design and evaluation of chaotic iterations based keyed hash function. CoRR abs/1706.08101 (2017) - [i63]Wiem Elghazel, Kamal Medjaher, Nourredine Zerhouni, Jacques M. Bahi, Ahmad Farhat, Christophe Guyeux, Mourad Hakem:
Random Forests for Industrial Device Functioning Diagnostics Using Wireless Sensor Networks. CoRR abs/1706.08106 (2017) - [i62]Wiem Elghazel, Jacques M. Bahi, Christophe Guyeux, Mourad Hakem, Kamal Medjaher, Noureddine Zerhouni:
Dependability of Sensor Networks for Industrial Prognostics and Health Management. CoRR abs/1706.08129 (2017) - [i61]Christophe Guyeux, Abdallah Makhoul, Jacques M. Bahi:
A Security Framework for Wireless Sensor Networks: Theory and Practice. CoRR abs/1706.08133 (2017) - [i60]Rola Al-Sharif, Christophe Guyeux, Yousra Ahmed Fadil, Abdallah Makhoul, Ali Jaber:
On the usefulness of information hiding techniques for wireless sensor networks security. CoRR abs/1706.08136 (2017) - [i59]Reem Alsrraj, Bassam AlKindy, Christophe Guyeux, Laurent Philippe, Jean-François Couchot:
Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization. CoRR abs/1706.08514 (2017) - [i58]Jacques M. Bahi, Christophe Guyeux, Pierre-Cyrille Héam:
A Cryptographic Approach for Steganography. CoRR abs/1706.08752 (2017) - [i57]Jacques M. Bahi, Jean-François Couchot, Nicolas Friot, Christophe Guyeux:
A Robust Data Hiding Process Contributing to the Development of a Semantic Web. CoRR abs/1706.08764 (2017) - [i56]Jacques M. Bahi, Xiaole Fang, Christophe Guyeux:
An optimization technique on pseudorandom generators based on chaotic iterations. CoRR abs/1706.08773 (2017) - [i55]Jean-François Couchot, Pierre-Cyrille Héam, Christophe Guyeux, Qianxue Wang, Jacques M. Bahi:
Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers. CoRR abs/1706.08923 (2017) - [i54]Zhuosheng Lin, Christophe Guyeux, Qianxue Wang, Simin Yu:
Diffusion and confusion of chaotic iteration based hash functions. CoRR abs/1708.02793 (2017) - [i53]Abdessalem Abidi, Samar Tawbi, Christophe Guyeux, Belgacem Bouallegue, Mohsen Machhout:
Summary of Topological Study of Chaotic CBC Mode of Operation. CoRR abs/1708.03243 (2017) - [i52]Christophe Guyeux, Qianxue Wang, Xiaole Fang, Jacques M. Bahi:
Introducing the truly chaotic finite state machines and their applications in security field. CoRR abs/1708.04963 (2017) - [i51]Ahmad Farhat, Abdallah Makhoul, Christophe Guyeux, Rami Tawil, Ali Jaber, Abbas Hijazi:
On the topology effects in wireless sensor networks based prognostics and health management. CoRR abs/1708.05965 (2017) - [i50]Christophe Guyeux, Jacques M. Bahi:
An improved watermarking scheme for Internet applications. CoRR abs/1708.05970 (2017) - 2016
- [j22]Stéphane Chrétien, Christophe Guyeux, Bastien Conesa, Régis Delage-Mouroux, Michèle Jouvenot, Philippe Huetz, Françoise Descôtes:
A Bregman-proximal point algorithm for robust non-negative matrix factorization with possible missing values and outliers - application to gene expression analysis. BMC Bioinform. 17(S-8): 284 (2016) - [j21]Jacques M. Bahi, Wiem Elghazel, Christophe Guyeux, Mohammed Haddad, Mourad Hakem, Kamal Medjaher, Noureddine Zerhouni:
Resiliency in Distributed Sensor Networks for Prognostics and Health Management of the Monitoring Targets. Comput. J. 59(2): 275-284 (2016) - [j20]Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux:
Proving Chaotic Behavior of CBC Mode of Operation. Int. J. Bifurc. Chaos 26(7): 1650113:1-1650113:10 (2016) - [j19]Raphaël Couturier, Lilia Ziane Khodja, Christophe Guyeux:
TSIRM: A two-stage iteration with least-squares residual minimization algorithm to solve large sparse linear and nonlinear systems. J. Comput. Sci. 17: 535-546 (2016) - [j18]Qianxue Wang, Simin Yu, Chengqing Li, Jinhu Lu, Xiaole Fang, Christophe Guyeux, Jacques M. Bahi:
Theoretical Design and FPGA-Based Implementation of Higher-Dimensional Digital Chaotic Systems. IEEE Trans. Circuits Syst. I Regul. Pap. 63-I(3): 401-412 (2016) - [j17]Abdallah Makhoul, Christophe Guyeux, Mourad Hakem, Jacques M. Bahi:
Using an Epidemiological Approach to Maximize Data Survival in the Internet of Things. ACM Trans. Internet Techn. 16(1): 5:1-5:15 (2016) - [c36]Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
Investigating low level protocols for Wireless Body Sensor Networks. AICCSA 2016: 1-6 - [c35]Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux:
Quantitative evaluation of chaotic CBC mode of operation. ATSIP 2016: 88-92 - [c34]Ahmad Farhat, Abdallah Makhoul, Christophe Guyeux, Rami Tawil, Ali Jaber, Abbas Hijazi:
On the Topology Effects in Wireless Sensor Networks Based Prognostics and Health Management. CSE/EUC/DCABES 2016: 335-342 - [c33]Abdessalem Abidi, Samar Tawbi, Christophe Guyeux, Belgacem Bouallegue, Mohsen Machhout:
Summary of Topological Study of Chaotic CBC Mode of Operation. CSE/EUC/DCABES 2016: 436-443 - [c32]Zhuosheng Lin, Christophe Guyeux, Qianxue Wang, Simin Yu:
Diffusion and Confusion of Chaotic Iteration Based Hash Functions. CSE/EUC/DCABES 2016: 444-447 - [c31]Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux:
FPGA Implementation of F2-Linear Pseudorandom Number Generators based on Zynq MPSoC: A Chaotic Iterations Post Processing Case Study. SECRYPT 2016: 302-309 - [c30]Sara Barakat, Bechara al Bouna, Mohamed Nassar, Christophe Guyeux:
On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets. SECRYPT 2016: 318-326 - [c29]Jean-François Couchot, Raphaël Couturier, Yousra Ahmed Fadil, Christophe Guyeux:
A Second Order Derivatives based Approach for Steganography. SECRYPT 2016: 424-431 - [i49]Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux:
Quantitative Evaluation of Chaotic CBC Mode of Operation. CoRR abs/1601.08139 (2016) - [i48]Abdessalem Abidi, Christophe Guyeux, Bechara al Bouna, Belgacem Bouallegue, Mohsen Machhout:
The dynamics of the CBC Mode of Operation. CoRR abs/1605.02950 (2016) - [i47]Jean-François Couchot, Raphaël Couturier, Christophe Guyeux, Michel Salomon:
Steganalysis via a Convolutional Neural Network using Large Convolution Filters. CoRR abs/1605.07946 (2016) - [i46]Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux:
Proving chaotic behaviour of CBC mode of operation. CoRR abs/1608.05838 (2016) - [i45]Jacques M. Bahi, Wiem Elghazel, Christophe Guyeux, Mohammed Haddad, Mourad Hakem, Kamal Medjaher, Nourredine Zerhouni:
Resiliency in Distributed Sensor Networks for PHM of the Monitoring Targets. CoRR abs/1608.05844 (2016) - [i44]Yousra Ahmed Fadil, Jean-François Couchot, Raphaël Couturier, Christophe Guyeux:
Steganalyzer performances in operational contexts. CoRR abs/1608.05850 (2016) - [i43]Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux, Michel Salomon:
Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with Multilayer Feedforward Networks. CoRR abs/1608.05916 (2016) - [i42]Christophe Guyeux, Jacques M. Bahi:
A Topological Study of Chaotic Iterations. Application to Hash Functions. CoRR abs/1608.05920 (2016) - [i41]Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux:
Quality Analysis of a Chaotic Proven Keyed Hash Function. CoRR abs/1608.05928 (2016) - [i40]Jacques M. Bahi, Xiaole Fang, Christophe Guyeux, Laurent Larger:
FPGA Design for Pseudorandom Number Generator Based on Chaotic Iteration used in Information Hiding Application. CoRR abs/1608.05930 (2016) - [i39]Jacques M. Bahi, Christophe Guyeux, Abdallah Makhoul:
Two Security Layers for Hierarchical Data Aggregation in Sensor Networks. CoRR abs/1608.05936 (2016) - [i38]Qianxue Wang, Simin Yu, Christophe Guyeux, Jacques M. Bahi, Xiaole Fang:
Theoretical design and circuit implementation of integer domain chaotic systems. CoRR abs/1608.05945 (2016) - [i37]Jacques M. Bahi, Christophe Guyeux, Mourad Hakem, Abdallah Makhoul:
Epidemiological Approach for Data Survivability in Unattended Wireless Sensor Networks. CoRR abs/1608.05951 (2016) - [i36]Abdallah Makhoul, Christophe Guyeux, Mourad Hakem, Jacques M. Bahi:
Using an epidemiological approach to maximize data survival in the internet of things. CoRR abs/1608.07443 (2016) - [i35]Bassam AlKindy, Bashar Al-Nuaimi, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Reem Alsrraj, Laurent Philippe:
Binary Particle Swarm Optimization versus Hybrid Genetic Algorithm for Inferring Well Supported Phylogenetic Trees. CoRR abs/1608.08749 (2016) - [i34]Jean-François Couchot, Raphaël Couturier, Yousra Ahmed Fadil, Christophe Guyeux:
A Second Order Derivatives based Approach for Steganography. CoRR abs/1611.08397 (2016) - [i33]Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
Investigating Low Level Protocols for Wireless Body Sensor Networks. CoRR abs/1611.08401 (2016) - [i32]Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux:
FPGA Implementation of $\mathbb{F}_2$-Linear Pseudorandom Number Generators Based on Zynq MPSoC: a Chaotic Iterations Post Processing Case Study. CoRR abs/1611.08410 (2016) - [i31]Sara Barakat, Bechara al Bouna, Mohamed Nassar, Christophe Guyeux:
On the Evaluation of the Privacy Breach in Disassociated Set-Valued Datasets. CoRR abs/1611.08417 (2016) - [i30]Xiaole Fang, Christophe Guyeux, Qianxue Wang, Jacques M. Bahi:
Randomness and disorder of chaotic iterations. Applications in information security field. CoRR abs/1611.08422 (2016) - 2015
- [j16]Jean-François Couchot, Raphaël Couturier, Christophe Guyeux:
STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost. Ann. des Télécommunications 70(9-10): 441-449 (2015) - [j15]Wiem Elghazel, Jacques M. Bahi, Christophe Guyeux, Mourad Hakem, Kamal Medjaher, Noureddine Zerhouni:
Dependability of wireless sensor networks for industrial prognostics and health management. Comput. Ind. 68: 1-15 (2015) - [j14]Christophe Guyeux, Abdallah Makhoul, Ibrahim Atoui, Samar Tawbi, Jacques M. Bahi:
A Complete Security Framework for Wireless Sensor Networks: Theory and Practice. Int. J. Inf. Technol. Web Eng. 10(1): 47-74 (2015) - [j13]Christophe Guyeux, Jean-Marc Nicod, Laurent Philippe, Jacques M. Bahi:
The study of unfoldable self-avoiding walks - Application to protein structure prediction software. J. Bioinform. Comput. Biol. 13(4): 1550009:1-1550009:36 (2015) - [j12]Christophe Guyeux, Raphaël Couturier, Pierre-Cyrille Héam, Jacques M. Bahi:
Efficient and cryptographically secure generation of chaotic pseudorandom numbers on GPU. J. Supercomput. 71(10): 3877-3903 (2015) - [c28]Bassam AlKindy, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Christian Parisod, Jacques M. Bahi:
Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees Based on Subsets of Chloroplastic Core Genes. AlCoB 2015: 83-96 - [c27]Stéphane Chrétien, Christophe Guyeux, Michael Boyer-Guittaut, Régis Delage-Mouroux, Françoise Descôtes:
Investigating gene expression array with outliers and missing data in bladder cancer. BIBM 2015: 994-998 - [c26]Bassam AlKindy, Bashar Al-Nuaimi, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Reem Alsrraj, Laurent Philippe:
Binary Particle Swarm Optimization Versus Hybrid Genetic Algorithm for Inferring Well Supported Phylogenetic Trees. CIBB 2015: 165-179 - [c25]Huda Al-Nayyef, Christophe Guyeux, Jacques M. Bahi:
Taenia biomolecular phylogeny and the impact of mitochondrial genes on this latter. CIBCB 2015: 1-7 - [c24]Yousra Ahmed Fadil, Jean-François Couchot, Raphaël Couturier, Christophe Guyeux:
Steganalyzer Performances in Operational Contexts. IIH-MSP 2015: 429-432 - [c23]Raphaël Couturier, Lilia Ziane Khodja, Christophe Guyeux:
TSIRM: A Two-Stage Iteration with Least-Squares Residual Minimization Algorithm to Solve Large Sparse Linear Systems. IPDPS Workshops 2015: 990-997 - [c22]Bassam AlKindy, Huda Al-Nayyef, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Jacques M. Bahi:
Improved Core Genes Prediction for Constructing Well-Supported Phylogenetic Trees in Large Sets of Plant Species. IWBBIO (1) 2015: 379-390 - [c21]Huda Al-Nayyef, Christophe Guyeux, Marie Petitjean, Didier Hocquet, Jacques M. Bahi:
Relation between Insertion Sequences and Genome Rearrangements in Pseudomonas aeruginosa. IWBBIO (1) 2015: 426-437 - [i29]Bassam AlKindy, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Christian Parisod, Jacques M. Bahi:
Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes. CoRR abs/1504.05095 (2015) - [i28]Bassam AlKindy, Huda Al-Nayyef, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Jacques M. Bahi:
Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species. CoRR abs/1504.06110 (2015) - [i27]Christophe Guyeux, Jacques M. Bahi:
Topological chaos and chaotic iterations. Application to Hash functions. CoRR abs/1511.00117 (2015) - [i26]Jacques M. Bahi, Christophe Guyeux:
A new chaos-based watermarking algorithm. CoRR abs/1511.00118 (2015) - 2014
- [j11]Jacques M. Bahi, Christophe Guyeux, Abdallah Makhoul:
Two security layers for hierarchical data aggregation in sensor networks. Int. J. Auton. Adapt. Commun. Syst. 7(3): 239-270 (2014) - [j10]Qianxue Wang, Simin Yu, Christophe Guyeux, Jacques M. Bahi, Xiaole Fang:
Theoretical Design and Circuit Implementation of Integer Domain Chaotic Systems. Int. J. Bifurc. Chaos 24(10) (2014) - [j9]Xiaole Fang, Qianxue Wang, Christophe Guyeux, Jacques M. Bahi:
FPGA acceleration of a pseudorandom number generator based on chaotic iterations. J. Inf. Secur. Appl. 19(1): 78-87 (2014) - [j8]Christophe Guyeux, Nathalie M.-L. Côté, Jacques M. Bahi, Wojciech Bienia:
Is protein Folding Problem Really a NP-Complete One? First Investigations. J. Bioinform. Comput. Biol. 12(1) (2014) - [j7]Jacques M. Bahi, Xiaole Fang, Christophe Guyeux, Qianxue Wang:
Suitability of chaotic iterations schemes using XORshift for security applications. J. Netw. Comput. Appl. 37: 282-292 (2014) - [j6]Jacques M. Bahi, Christophe Guyeux, Mourad Hakem, Abdallah Makhoul:
Epidemiological approach for data survivability in unattended wireless sensor networks. J. Netw. Comput. Appl. 46: 374-383 (2014) - [j5]Xiaole Fang, Benjamin Wetzel, Jean-Marc Merolla, John M. Dudley, Laurent Larger, Christophe Guyeux, Jacques M. Bahi:
Noise and Chaos Contributions in Fast Random Bit Sequence Generated From Broadband Optoelectronic Entropy Sources. IEEE Trans. Circuits Syst. I Regul. Pap. 61-I(3): 888-901 (2014) - [c20]Rola Al-Sharif, Christophe Guyeux, Yousra Ahmed Fadil, Abdallah Makhoul, Ali Jaber:
On the Usefulness of Information Hiding Techniques for Wireless Sensor Networks Security. ADHOCNETS 2014: 51-62 - [c19]Bassam AlKindy, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Jacques M. Bahi:
Gene similarity-based approaches for determining core-genes of chloroplasts. BIBM 2014: 71-74 - [c18]Huda Al-Nayyef, Christophe Guyeux, Jacques M. Bahi:
A pipeline for insertion sequence detection and study for bacterial genome. GCB 2014: 85-98 - [c17]Jean-François Couchot, Pierre-Cyrille Héam, Christophe Guyeux, Qianxue Wang, Jacques M. Bahi:
Pseudorandom Number Generators with Balanced Gray Codes. SECRYPT 2014: 469-475 - [c16]Christophe Guyeux, Abdallah Makhoul, Jacques M. Bahi:
A Security Framework for Wireless Sensor Networks: Theory and Practice. WETICE 2014: 269-274 - [i25]Bassam AlKindy, Jean-François Couchot, Christophe Guyeux, Arnaud Mouly, Michel Salomon, Jacques M. Bahi:
Finding the Core-Genes of Chloroplasts. CoRR abs/1409.6369 (2014) - [i24]Bassam AlKindy, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Jacques M. Bahi:
Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts. CoRR abs/1412.5323 (2014) - 2013
- [b2]Christophe Guyeux:
The dynamics of complex systems. Studies and applications in computer science and biology. University of Franche-Comté, Besançon, France, 2013 - [j4]Jacques M. Bahi, Christophe Guyeux, Kamel Mazouzi, Laurent Philippe:
Computational investigations of folded self-avoiding walks related to protein folding. Comput. Biol. Chem. 47: 246-256 (2013) - [c15]Jacques M. Bahi, Christophe Guyeux, Pierre-Cyrille Héam:
A Cryptographic Approach for Steganography. IIH-MSP 2013: 518-521 - [c14]Jacques M. Bahi, Jean-François Couchot, Nicolas Friot, Christophe Guyeux, Kamel Mazouzi:
Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction. IIH-MSP 2013: 547-550 - [c13]Jacques M. Bahi, Nicolas Friot, Christophe Guyeux:
Topological Study and Lyapunov Exponent of a Secure Steganographic Scheme. SECRYPT 2013: 275-283 - 2012
- [j3]Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux:
Steganography: A Class of Secure and Robust Algorithms. Comput. J. 55(6): 653-666 (2012) - [j2]Jacques M. Bahi, Nathalie Côté, Christophe Guyeux, Michel Salomon:
Protein Folding in the 2D Hydrophobic-Hydrophilic (HP) Square Lattice Model is Chaotic. Cogn. Comput. 4(1): 98-114 (2012) - [j1]Jacques M. Bahi, Christophe Guyeux, Abdallah Makhoul, Congduc Pham:
Low-Cost Monitoring and Intruders Detection Using Wireless Video Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [c12]Jacques M. Bahi, Nicolas Friot, Christophe Guyeux:
Lyapunov Exponent Evaluation of a Digital Watermarking Scheme Proven to be Secure. IIH-MSP 2012: 359-362 - [c11]Jacques M. Bahi, Christophe Guyeux, Antoine Perasso:
Predicting the Evolution of two Genes in the Yeast Saccharomyces Cerevisiae. CSBio 2012: 4-16 - [p1]Christophe Guyeux, Jacques M. Bahi:
A Topological Study of Chaotic Iterations Application to Hash Functions. Computational Intelligence for Privacy and Security 2012: 51-73 - [i23]Jacques M. Bahi, Jean-François Couchot, Nicolas Friot, Christophe Guyeux:
Application of Steganography for Anonymity through the Internet. CoRR abs/1202.5302 (2012) - [i22]Jacques M. Bahi, Nicolas Friot, Christophe Guyeux:
Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure. CoRR abs/1203.0692 (2012) - [i21]Julien Voisin, Christophe Guyeux, Jacques M. Bahi:
The Metadata Anonymization Toolkit. CoRR abs/1212.3648 (2012) - 2011
- [c10]Jacques M. Bahi, Christophe Guyeux, Abdallah Makhoul, CongDuc Pham:
Secure Scheduling of Wireless Video Sensor Nodes for Surveillance Applications. ADHOCNETS 2011: 1-15 - [c9]Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux, Adrien Richard:
On the Link between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems. FCT 2011: 126-137 - [c8]Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux:
Steganography: A Class of Algorithms having Secure Properties. IIH-MSP 2011: 209-212 - [c7]Jacques M. Bahi, Nathalie Côté, Christophe Guyeux:
Chaos of protein folding. IJCNN 2011: 1948-1954 - [c6]Nicolas Friot, Christophe Guyeux, Jacques M. Bahi:
Chaotic Iterations for Steganography - Stego-security and Chaos-security. SECRYPT 2011: 218-227 - [i20]Jacques M. Bahi, Christophe Guyeux, Michel Salomon:
Building a Chaotic Proved Neural Network. CoRR abs/1101.4351 (2011) - [i19]Jacques M. Bahi, Xiaole Fang, Christophe Guyeux, Qianxue Wang:
Randomness Quality of CI Chaotic Generators: Applications to Internet Security. CoRR abs/1112.0941 (2011) - [i18]Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux, Qianxue Wang:
Class of Trustworthy Pseudo-Random Number Generators. CoRR abs/1112.0950 (2011) - [i17]Jacques M. Bahi, Xiaole Fang, Christophe Guyeux, Qianxue Wang:
On the design of a family of CI pseudo-random number generators. CoRR abs/1112.0958 (2011) - [i16]Jacques M. Bahi, Xiaole Fang, Christophe Guyeux, Qianxue Wang:
Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding. CoRR abs/1112.1201 (2011) - [i15]Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux:
Steganography: a class of secure and robust algorithms. CoRR abs/1112.1260 (2011) - [i14]Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux:
Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations. CoRR abs/1112.1271 (2011) - [i13]Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux:
Steganography: a Class of Algorithms having Secure Properties. CoRR abs/1112.1675 (2011) - [i12]Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux, Adrien Richard:
On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems. CoRR abs/1112.1684 (2011) - [i11]Nicolas Friot, Christophe Guyeux, Jacques M. Bahi:
Chaotic iterations for steganography: Stego-security and topological-security. CoRR abs/1112.3873 (2011) - [i10]Christophe Guyeux, Nicolas Friot, Jacques M. Bahi:
Chaotic iterations versus Spread-spectrum: topological-security and stego-security. CoRR abs/1112.3874 (2011) - [i9]Jacques M. Bahi, Raphaël Couturier, Christophe Guyeux, Pierre-Cyrille Héam:
Efficient and Cryptographically Secure Generation of Chaotic Pseudorandom Numbers on GPU. CoRR abs/1112.5239 (2011) - [i8]Jacques M. Bahi, Christophe Guyeux, Pierre-Cyrille Héam:
A Complexity Approach for Steganalysis. CoRR abs/1112.5245 (2011) - 2010
- [b1]Christophe Guyeux:
Le désordre des itérations chaotiques et leur utilité en sécurité informatique. (The disorder of chaotic iterations and its use in the computer science security field). University of Franche-Comté, Besançon, France, 2010 - [c5]Jacques M. Bahi, Christophe Guyeux, Abdallah Makhoul:
Secure Data Aggregation in Wireless Sensor Networks: Homomorphism versus Watermarking Approach. ADHOCNETS 2010: 344-358 - [c4]Christophe Guyeux, Nicolas Friot, Jacques M. Bahi:
Chaotic Iterations versus Spread-Spectrum: Chaos and Stego Security. IIH-MSP 2010: 208-211 - [c3]Christophe Guyeux, Jacques M. Bahi:
Topological chaos and chaotic iterations application to hash functions. IJCNN 2010: 1-7 - [c2]Christophe Guyeux, Jacques M. Bahi:
A New Chaos-based Watermarking Algorithm. SECRYPT 2010: 455-458 - [c1]Christophe Guyeux, Qianxue Wang, Jacques M. Bahi:
A Pseudo Random Numbers Generator Based on Chaotic Iterations: Application to Watermarking. WISM 2010: 202-211 - [i7]Qianxue Wang, Christophe Guyeux, Jacques M. Bahi:
A novel pseudo-random number generator based on discrete chaotic iterations. CoRR abs/1004.2374 (2010) - [i6]Jacques M. Bahi, Christophe Guyeux:
A chaos-based approach for information hiding security. CoRR abs/1005.0704 (2010) - [i5]Christophe Guyeux, Nicolas Friot, Jacques M. Bahi:
Chaotic iterations versus Spread-spectrum: chaos and stego security. CoRR abs/1005.0705 (2010) - [i4]Christophe Guyeux, Qianxue Wang, Jacques M. Bahi:
Improving random number generators by chaotic iterations. Application in data hiding. CoRR abs/1012.4620 (2010) - [i3]Christophe Guyeux, Qianxue Wang, Jacques M. Bahi:
A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application to Watermarking. CoRR abs/1012.4626 (2010)
2000 – 2009
- 2008
- [i2]Jacques M. Bahi, Christophe Guyeux:
A topological chaos framework for hash functions. CoRR abs/0810.4711 (2008) - [i1]Jacques M. Bahi, Christophe Guyeux:
A watermarking algorithm satisfying topological chaos properties. CoRR abs/0810.4713 (2008)
Coauthor Index
aka: Nadine Bou Dargham
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 20:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint