Publications
-
June 2025
Conference
Buffalo: A Practical Secure Aggregation Protocol for Buffered Asynchronous Federated Learning
CODASPY 2025, 15th ACM Conference on Data and Application Security and Privacy, 4-6 June 2025, Pittsburgh, PA, USA
-
May 2025
Talk
Trustworthy intrusion detection: Confidence estimation using latent space
SECURENET 2025, 3rd Summit on Security and Privacy in Future Mobile Networks, 27 May 2025, Dublin, Ireland
-
May 2025
Conference
SNARKs for virtual machines are non-malleable
EUROCRYPT 2025, 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 4-8 May 2025, Madrid, Spain
-
April 2025
Poster / Demo
E2PRIV: Privacy-preserving event-to-video reconstruction with face anonymization
IWBF 2025, International Workshop on Biometrics and Forensics, 24-25 April 2025, Munich, Germany
-
April 2025
Conference
Identifying individuals through egocentric motion: A study using body worn cameras
IWBF 2025, International Workshop on Biometrics and Forensics, 24-25 April 2025, Munich, Germany
-
April 2025
Talk
PhaseSCA: Exploiting phase-modulated emanations in side channels
THCon 2025, 9th Toulouse Hacking Convention, 10-11 April 2025, Toulouse, France
-
April 2025
Poster / Demo
RAW data: A key component for effective deepfake detection
ICASSP 2025, IEEE International Conference on Acoustics, Speech and Signal Processing, 6-11 April 2025, Hyderabad, India
-
April 2025
Conference
A study on the evolution of kernel data types used in memory forensics and their dependency on compilation options
DFRWS EU 2025, Digital Forensics Research Conference Europe, 1-4 April 20025, Brno, Czech Republic / Also published in "Forensic Science International: Digital Investigation", Vol. 52, Supplement, March 2025
Best Paper Award
-
March 2025
Thesis
The phantom thread between malleable and non-malleable cryptography
Thesis
-
March 2025
Poster / Demo
Privacy-preserving federated learning
Presented at EURECOM
-
March 2025
Conference
SNARKs for virtual machines are non-malleable
ZKPROOF 2025, 23-25 March 2025, Sofia, Bulgary
-
March 2025
Journal
Trust under siege: Label spoofing attacks against machine learning for Android malware detection
Submitted to ArXiV, 14 March 2025
-
March 2025
Talk
On the insecurity of vehicles against protocol-level bluetooth threats
AMUSEC 2025, Forum d’Aix-Marseille Université de la Cybersécurité, 13-14 March 2025, Marseille, France
-
March 2025
Journal
Lost in light field compression: Understanding the unseen pitfalls in computer vision
Signal Processing: Image Communication, Vol. 136, August 2025, 117304
-
March 2025
HDR
Reliable and responsible voice biometric technology: Enhancing security, adversarial robustness, and privacy
Habilitation à diriger des recherches (French qualification for conducting Phd theses)
-
February 2025
Conference
Action recognition in law enforcement: A novel dataset from body worn cameras
ICPRAM 2025, 14th International Conference on Pattern Recognition Applications and Methods, 23-25 February 2025, Porto, Portugal / Also in SciTePress, ISBN 978-9897587306; ISSN 2184-4313
-
February 2025
Conference
Robust blockchain-based federated learning
ICISSP 2025, 11th International Conference on Information Systems Security and Privacy, 20-22 February 2025, Porto, Portugal
-
February 2025
Conference
Event-based solutions for human-centered applications: A comprehensive review
Submitted to ArXiV, 17 February 2025
-
February 2025
Journal
ASVspoof 5: Design, collection and validation of resources for spoofing, deepfake, and adversarial attack detection using crowdsourced speech
Submitted to ArXiV, 14 February 2025
-
February 2025
Book
Fed-BioMed: Open, transparent and trusted federated learning for real-world healthcare applications
Chapter book in "Federated Learning Systems", Studies in Computational Intelligence 832, Springer, 2nd ed.
-
February 2025
Report
Comparative analysis of finite difference and finite element method for AudioWaveform simulation
Research Report RR-25-347, 3 Fabruary 2025
-
January 2025
Talk
Non-malleable SNARKs: Bridging theory and practice
27 January 2025, TU Wien, Austria
-
January 2025
Patent
Device, system and method for implementing a recurrent neural network to determine a given region of a build log that meets a fatal error criterion condition
Patent US 2025/0028631 A1, 23 January 2025
-
January 2025
Thesis
Machine learning and privacy protection: Attacks and defenses
Thesis
-
January 2025
Journal
The dark side of native code on Android
ACM Transactions on Privacy and Security, 2025
-
January 2025
Book
Multi-user searchable encryption
Encyclopedia of Cryptography, Security and Privacy, Jajodia, S., Samarati, P., Yung, M. (eds), 1 January 2025, 3rd edition, Springer
-
December 2024
Book
Fundamentals of privacy-preserving and secure machine learning
Book chapter of "Trustworthy AI in Medical Imaging", December 2024, ISBN: 9780443237614, Elsevier
-
December 2024
Conference
Another walk for Monchi
FPS 2024, 17th International Symposium on Foundations and Practice of Security, 9-11 December 2024, Montréal, Canada
-
December 2024
Talk
Customized attacks and defense strategies for robust and privacy-preserving federated learning
ARTMAN 2024, Keynote talk, Workshop co-located with ACSAC 2024, December 9, 2024, Waikiki, Hawaii, USA
-
December 2024
Conference
0x41414141: Avatar2 artifacts, advances and analysis
ACSAC 2024, 40th Annual Computer Security Applications Conference, 9-13 December 2024, Waikiki, Hawaii, USA
Finalist at the "Artifacts Competition and Impact Award"
-
December 2024
Conference
On understanding and forecasting fuzzers performance with static analysis
CCS 2024, 31st ACM Conference on Computer and Communications Security, 14-18 October 2024, Salt Lake City, USA
-
December 2024
Thesis
Protocol-level attacks and defenses to advance IoT security
Thesis
-
December 2024
Conference
CTRAPS: CTAP client impersonation and API confusion on FIDO2
Submitted to ArXiV, 3 December 2024
-
December 2024
Thesis
Compromising electromagnetic emanations: Side-channel leakages in embedded devices
Thesis
-
December 2024
Conference
Beyond RGB: Tri-modal microexpression recognition with RGB, thermal, and event data
FBE 2024, 2nd Workshop on Facial and Body Expressions, in conjunction with ICPR 2024, 27th International Conference on Pattern Recognition, 1-5 December 2024, Kolkata, India
Best Paper Award
-
December 2024
Journal
Lecture Notes: Deepfakes and adversarial threats to automatic speaker verification, countermeasures and human listeners
IEEE Biometrics Newsletter, Vol.52, December 2024
-
November 2024
Patent
Collaborative software application static vulnerability detection
US Patent 2024/0394375 A1, 28 November 2024
-
November 2024
Journal
E-Trojans: Ransomware, tracking, DoS, and data leaks on battery-powered embedded systems
Submitted to ArXiV, 26 November 2024
-
November 2024
Conference
Decoding the secrets of machine learning in malware classification
ESSAI 2024, 1st European Symposium on Security and Artificial Intelligence, 20-21 November 2024, Rennes, France
-
November 2024
Conference
How machine learning is solving the binary function similarity problem
ESSAI 2024, 1st European Symposium on Security and Artificial Intelligence, 20-21 November 2024, Rennes, France
-
November 2024
Conference
Challenges in automatic speaker verification: From deepfakes to adversarial attacks
ESSAI 2024, 1st European Symposium on Security and Artificial Intelligence, 20-21 November 2024, Rennes, France
-
October 2024
Conference
Alignface: Enhancing face verification models through adaptive alignment of pose, expression, and illumination
ICIP 2024, IEEE International Conference on Image Processing, 27-30 October 2024, Abu Dhabi, UAE
-
October 2024
Conference
DiMViDA: Diffusion-based multi-view data augmentation
CAMAD 2024, IEEE 29th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 21-23 October 2024, Athens, Greece
-
October 2024
Conference
A comparative study: Error analysis and model efficiency in event-based action recognition
IPTA 2024, 13th International Conference on Image Processing Theory, Tools and Applications, 14-17 October 2024, Rabat, Morocco
-
October 2024
Conference
Enhancing privacy in federated learning: Secure aggregation for real-world healthcare applications
DECAF 2024, 5th MICCAI Workshop on Distributed, Collaborative and Federated Learning, in conjunction with MICCAI 2024, 10 October 2024, Marrakech, Morocco
-
October 2024
Report
Universally composable SNARKs with transparent setup without programmable random oracle
Cryptology ePrint Archive, Paper 2024/1549, 3 October 2024
-
October 2024
Report
SNARKs for virtual machines are non-malleable
Cryptology ePrint Archive, Paper 2024/1551, 3 October 2024
-
September 2024
Conference
Node injection link stealing attack
PSD 2024, Privacy in Statistical Databases Conference, 25-27 September 2024, Antibes, France / Also to be published in Lecture Notes in Computer Science (LNCS)
-
September 2024
Thesis
Apprentissage automatique sécurisé pour l’analyse collaborative des données de santé à grande échelle
Thesis
-
September 2024
Report
Another walk for Monchi
Cryptology ePrint Archive, Paper 2024/1445, 18 September 2024
-
September 2024
Conference
XAIface: a framework and toolkit for explainable face recognition
CBMI 2024, 21st International Conference on Content-based Multimedia Indexing, 18-20 September 2024, Reykjavik, Iceland
-
September 2024
Conference
Text-to-speech synthesis in the wild
Submitted to ICASSP 2025 / Also submitted to ArXiV, 13 September 2024
-
September 2024
Conference
The voice privacy 2024 challenge evaluation plan
SPSC 2024, 4th Symposium on Security and Privacy in Speech Communication 2024, 6 September 2024, Kos Island, Greece
-
September 2024
Conference
Spoof diarization: “What spoofed when” in partially spoofed audio
INTERSPEECH 2024, 25th Conference of the International Speech Communication Association, 1-5 September 2024, Kos Island, Greece
-
September 2024
Conference
Harder or different? Understanding generalization of audio deepfake detection
INTERSPEECH 2024, 25th Conference of the International Speech Communication Association, 1-5 September 2024, Kos Island, Greece
-
September 2024
Conference
To what extent can ASV systems naturally defend against spoofing attacks?
INTERSPEECH 2024, 25th Conference of the International Speech Communication Association, 1-5 September 2024, Kos Island, Greece
-
August 2024
Talk
One for all and all for WHAD: wireless shenanigans made easy !
DEF CON 2024, DEF CON Security Conference, 8-11 August 2024, Las Vegas, NV, USA
-
August 2024
Journal
Facial biometrics in the social media era: An in-depth analysis of the challenge posed by beautification filters
IEEE Transactions on Biometrics, Behavior, and Identity Science, Vol. 7, N°1, January 2025
-
July 2024
Conference
A false sense of privacy: Towards a reliable evaluation methodology for the anonymization of biometric data
PETS 2024, 24th Privacy Enhancing Technologies Symposium, 15-20 July 2024, Bristol, UK / Also published as Proceedings on Privacy Enhancing Technologies Symposium, Vol. 2024, N°1
-
July 2024
Conference
TIME-E2V: Overcoming limitations of E2VID
AVSS 2024, 20th IEEE International Conference on Advanced Video and Signal-Based Surveillance, 15-16 July 2024, Niagara Falls, Canada
-
July 2024
Poster / Demo
The many facets of Windows malware and the importance of multi-technology analysis
WORMA 2024, Keynote Demo at 3rd Workshop on Rethinking Malware Analysis, co-located with IEEE EuroS&P 2024, 12 July 2024, Vienna, Austria
-
July 2024
Talk
Information and entertainment for automotive researchers: A fresh look into proximity and remote attacks on vehicles
ACSW 2024, Keynote talk at 3rd Workshop on Automotive Cyber Security, colocated with IEEE EuroS&P 2024. 8 July 2024, Vienna, Austria
-
July 2024
Conference
UPCARE: User Privacy-preserving Cancer Research Platform
SECRYPT 2024, 21st International Conference on Security and Cryptography, 8-10 July 2024, Dijon, France
-
July 2024
Conference
Node injection link stealing attack
CSF 2024, IEEE Workshop on Security, Privacy and Information Theory, Protect-IT’24, Session 2: Differential privacy and security attacks, 8 July 2024, Enschede, The Netherlands
-
July 2024
Conference
Nomadic: Normalising maliciously-secure distance with cosine similarity for two-party biometric authentication
ASIACCS 2024, 19th ACM ASIA Conference on Computer and Communications Security, 1-5 July 2024, Singapore, Singapore
-
July 2024
Conference
FP-tracer: Fine-grained browser fingerprinting detection via taint-tracking and entropy-based thresholds
PETS 2024, 24th Privacy Enhancing Technologies Symposium, 15-20 July 2024, Bristol, UK / Also published as Proceedings on Privacy Enhancing Technologies Symposium, Vol. 2024, N°3
-
June 2024
Conference
A pressure and temperature wireless sensing network communicating with LoRa modulation
ISCC 2024, IEEE Symposium on Computers and Communications, 26-29 June 2024, Paris, France
-
June 2024
Conference/Book
Modsec-learn: Boosting modsecurity with machine learning
DCAI 2024, 21st International Conference on Distributed Computing and Artificial Intelligence, Special Sessions I, 26-28 June 2024, Salamanca, Spain / Also published in Lecture Notes in Networks and Systems, Vol. 1198, Springer
-
June 2024
Thesis
Advancing beyond people recognition in facial image processing
Thesis
-
June 2024
Talk
Malware research: History, milestones, and open questions
CODASPY 2024, Keynote talk, 14th ACM Conference on Data and Application Security and Privacy, 19-21 June 2024, Porto, Portugal
-
June 2024
Conference
Spoofing detection in the wild: an investigation of approaches to improve generalisation
ODYSSEY 2024, The Speaker and Language Recognition Workshop, 18-21 June 2024, Québec City, Canada
-
June 2024
Conference
One embedding to predict them all: Visible and thermal universal face representations for soft biometric estimation via vision transformers
BIOMETRICS 2024, 19th IEEE Computer Society Workshop on Biometrics 2024, in conjunction with CVPR 2024, IEEE/CVF Conference on Computer Vision and Pattern Recognition, 17-21 June 2024, Seattle, USA
-
June 2024
Thesis
Improving software development life cycle using data-driven approaches
Thesis
-
June 2024
Conference
PRIDA: PRIvacy-preserving data aggregation with multiple data customers
IFIP SEC 2024, 39th International Conference on ICT Systems Security and Privacy Protection, 12-14 June 2024, Edinburgh, UK
-
June 2024
Talk
Towards trustworthy federated learning
GDR-SECU-JN-2024, Journées Nationales 2024 du GDR Sécurité Informatique, Keynote talk, 10-12 June 2024, Rennes, France
-
June 2024
Talk
OASIS: un framework pour la détection d’intrusion embarquée dans les contrôleurs Bluetooth Low Energy
GDR-SECU-JN-2024, Journées Nationales 2024 du GDR Sécurité Informatique, Keynote talk, 10-12 June 2024, Rennes, France
-
June 2024
Thesis
Advances in privacy preservation and fairness assessment for voice biometrics
Thesis
-
June 2024
Conference
Trustful, Fair and Privacy-Friendly
BIOMETRICS SUMMER SCHOOL 2024, Guest speaker at 21st International Summer school for advanced studies on biometrics, 3-7 June 2024, Alghero, Italy
-
June 2024
Conference
Unmasking the veiled: A comprehensive analysis of Android evasive malware
DEFMAL 2024, 2nd Annual DefMal Workshop, 3-4 June 2024, Saint-Malo, France
-
June 2024
Conference
Malevolent schemes in face recognition applications
BIOMETRICS SUMMER SCHOOL 2024, 21st International Summer school for advanced studies on biometrics, 3-7 June 2024, Alghero, Italy
-
May 2024
Poster / Demo
POSTER: Experimentation platform for repeatable security analysis in IoT heterogeneous environments
WISEC 2024, 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 27-30 May 2024, Seoul, South Korea
-
April 2024
Journal
On the inadequacy of open-source application logs for digital forensics
Forensic Science International: Digital Investigation, Vol. 49, June 2024
-
April 2024
Talk
Fairness-driven collaborative remote attestation
Invited talk at 3rd Huawei Paris Workshop on Building Open Trust Systems, 23-25 April 2024, Paris, France
-
April 2024
Conference
Lookup arguments: Improvements, extensions and applications to zero-knowledge decision trees
PKC 2024, Public-Key Cryptography Conference, 15-17 April 2024, Sydney, Australia
-
April 2024
Talk
Pourquoi les réglementations NIS2 et CRA (Cyber Resilience Act) sont des opportunités pour les PME ?
Conférence Deeptech Cyber 2024, Comprendre les grands enjeux de la Cyber & les projets structurants en région Sud, 11 April 2024, Sophia Antipolis, France
-
April 2024
Talk
E-spoofer: attacking and defending xiaomi electric scooter ecosystem
THCon 2024, Toulouse Hacking Convention, 4-5 April 2024, Toulouse, France
-
April 2024
Talk
Security analysis of radio water meters
THCon 2024, Toulouse Hacking Convention, 4-5 April 2024, Toulouse, France
-
April 2024
Talk
BLUFFS: Bluetooth forward and future secrecy attacks and defenses
THCon 2024, Toulouse Hacking Convention, 4-5 April 2024, Toulouse, France
-
April 2024
Conference
The VoicePrivacy 2024 challenge evaluation plan
Submitted to ArXiV, 3 April 2024
-
March 2024
Talk
Agrégation sécurisée avec cryptographie pour l'apprentissage fédéré
Forum InCyber Europe, Masterclass, 26-27 March 2024, Lille, France
-
February 2024
Talk
Navigating software and system flaws: Unveiling vulnerabilities and strategies for addressing them
WSS 2024, 9th WSS - Winter Seminar Series, Advanced Topics in Computer Science and Engineering, 29 February-3 March 2024, Tehran, Iran
-
February 2024
Conference
Predictive context-sensitive fuzzing
NDSS 2024, Network and Distributed System Security (NDSS) Symposium, 26 February-1 March 2024, San Diego, CA, USA
-
February 2024
Talk
A review on malicious facial image processing and possible counter-measures
ICPRAM 2024, Keynote talk, 13th International Conference on Pattern Recognition Applications and Methods, 25 February 2024, Rome, Italy
-
February 2024
Conference
Self-supervised-based multimodal fusion for active biometric verification on mobile devices
ICPRAM 2024, 13th International Conference on Pattern Recognition Applications and Methods, 24-26 February 2024, Rome, Italy
-
February 2024
Poster / Demo
Demo : Deepfake generation and detection
WAICF 2024, World AI Cannes Festival, 8-10 February 2024, Cannes, France
-
January 2024
Talk
Introduction to malicious software
Ecole d'hiver PEPR Cybersécurité, 29 January-2 February 2024, Grenoble, France
-
January 2024
Journal
Social media filters: Beautification for humans but a critical issue for AI
Science Talks, 29 January 2024
-
January 2024
Talk
Analyse et instrumentation de piles protocolaires embarquées: retour d’expérience et perspectives
SemSecuElec 2024, Séminiaire sur la Sécurité des systèmes électroniques embarqués, 26 January 2024, Rennes, France
-
January 2024
Talk
Do Androids dream of electric phishing?
EURECOM Security System Seminar, 23 January 2024, Sophia Antipolis, France
-
January 2024
Talk
Bluetooth security
NECS-PhD Winter School 2024, 8-12 January 2024, Cortina d'Ampezzo, Italy
-
January 2024
Journal
Known vulnerabilities of open source projects: Where are the fixes?
IEEE Security & Privacy, 5 January 2024
-
December 2023
Conference
Multi-view latent diffusion
BIGDATA 2023, IEEE International Conference on Big Data, 15-18 December 2023, Sorrento, Italy
-
December 2023
Thesis
Fuzzing in the 2020s: Novel approaches and solutions
Thesis
Prix de Thèse du GDR Sécurité Informatique
-
December 2023
Conference/Book
W@rk: Attendance application framework using blockchain technology
DATASET 2023, International Conference on Data Science and Emerging Technologies, 4-5 December 2023, Malaysia, (Online event) / Also published in Lecture Notes on Data Engineering and Communications Technologies, Vol.191, 2024
-
November 2023
Conference
Raze to the ground: Query-efficient adversarial HTML attacks on machine-learning phishing webpage detectors
AISec 2023, 16th ACM Workshop on Artificial Intelligence and Security, co-located with the 30th ACM Conference on Computer and Communications Security, 30 November 2023, Copenhagen, Danemark
-
November 2023
Talk
AI perspectives in society and law
Forensic Congressional Body, 30 November 2023, Rome, Italy (Videoconference)
-
November 2023
Talk
Secure aggregation with malicious parties and user dropouts
FedMalin, FEDerated MAchine Learning over the INternet, 29 November 2023, Sophia Antipolis, France
-
November 2023
Conference
BLUFFS: Bluetooth forward and future secrecy attacks and defenses
CCS 2023, ACM SIGSAC Conference on Computer and Communications Security, 26-30 November 2023, Copenhagen, Danemark
-
November 2023
Conference
Decoding the secrets of machine learning in malware classification: A deep dive into datasets, feature extraction, and model performance
CCS 2023, 30th ACM Conference on Computer and Communications Security, 26-30 November 2023, Copenhagen, Denmark
-
November 2023
Talk
From artefacts to insights: A topical analysis of voice biometric security
ASVspoof 2023, Joint Workshop of VoicePersonae and ASVspoof 2023, 21 November 2023, Tokyo, Japan
-
November 2023
Thesis
Detecting and mitigating the new generation of scraping bots
Thesis
-
November 2023
Report
Privacy-preserving cosine similarity computation with malicious security applied to biometric authentication
Cryptology ePrint Archive, Paper 2023/1684, 3 November 2023
-
October 2023
Report
Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication
IACR Cryptology ePrint Archive, 2023, Paper 2023/1684
-
October 2023
Poster / Demo
Poster: The impact of the client environment on residential IP proxies detection
IMC 2023, ACM Internet Measurement Conference, 24-26 October 2023, Montreal, Canada
-
October 2023
Conference
Introducing a framework for single-human tracking using event-based cameras
ICIP 2023, 30th IEEE International Conference on Image Processing, 8-11 October 2023, Kuala Lumpur, Malaysia
-
October 2023
Tutorial
Information-theoretic approaches to differential privacy
ACM Computing Surveys, Volume 56, Issue 3, Article N°76, 6 October 2023
-
October 2023
Report
Lookup arguments: Improvements, extensions and applications to zero-knowledge decision trees
Eprint IACR, Paper 2023/1518, 5 October 2023
-
October 2023
Thesis
A zero-knowledge approach to memory forensics
Thesis
-
October 2023
Conference
A comprehensive framework for evaluating deepfake generators: Dataset, metrics performance, and comparative analysis
ICCV 2023, IEEE International Conference on Computer Vision, DFAD2023 Workshop and Challenge on DeepFake Analysis and Detection, 2-3 October 2023, Paris, France
-
September 2023
Conference
MetaHumans help to evaluate deepfake generators
MMSP 2023, IEEE 25th International Workshop on Multimedia Signal Processing, 27-29 September 2023, Poitiers, France
-
September 2023
Conference
On the impact of AI-based compression on deep learning-based source social network identification
MMSP 2023, IEEE 25th International Workshop on Multimedia Signal Processing, 27-29 September 2023, Poitiers, France
-
September 2023
Conference
A practical TFHE-based multi-Key homomorphic encryption with linear complexity and low noise growth
ESORICS 2023, 28th European Symposium on Research in Computer Security, September 25-29, 2023, The Hague, The Netherlands / Also published in LNCS, Vol.14344, 12 January 2024
-
September 2023
Talk
Evolutive and end-to-end learning for ASV anti-spoofing
Workshop on Frontiers in Privacy and Security for Biometrics in Europe: Outcomes from PriMa & TReSPAsS-ETN EU Projects, 13-14 September 2023, Sophia Antipolis, France
-
September 2023
Talk
Cryptographic primitives for GDPR compliance
Workshop on Frontiers in Privacy and Security for Biometrics in Europe: Outcomes from PriMa & TReSPAsS-ETN EU Projects, 13-14 September 2023, Sophia Antipolis, France
-
August 2023
Tutorial
Advances in audio anti-spoofing and deepfake detection using graph neural networks and self-supervised learning
INTERSPEECH 2023, 24th Conference of the International Speech Communication Association, 20-24 August 2023, Dublin, Ireland
-
August 2023
Conference
Vocoder drift compensation by x-vector alignment in speaker anonymisation
SIG-SPSC 2023, 3rd ISCA Security and Privacy in Speech Communication Symposium, co-located with 3rd VoicePrivacy Challenge Workshop, 19 August 2023, Dublin, Ireland
-
August 2023
Conference
Adversarial ModSecurity: Countering Adversarial SQL Injections with Robust Machine Learning
Submitted to ArXiV, 17 August 2023
-
August 2023
Conference
WHIP: Improving static vulnerability detection in web application by forcing tools to collaborate
USENIX Security 2023, 32nd USENIX Security Symposium, 9-11 August 2023, Anaheim, CA, USA
-
August 2023
Conference
Rods with laser beams: understanding browser fingerprinting on phishing pages
USENIX 2023, 32nd Usenix Security Symposium, 9-11 August 2023, Anaheim, CA, USA
-
August 2023
Conference
Humans vs. machines in malware classification
USENIX 2023, 32nd Usenix Security Symposium, 9-11 August 2023, Anaheim, CA, USA
-
July 2023
Conference
Deep learning for remote heart rate estimation: A reproducible and optimal state-of-the-art framework
ICPR 2022, 26th International Conference on Pattern Recognition, August 21-25, 2022, Montréal, Québec / Also in Lecture Notes in Computer Science, Vol. 13643
-
July 2023
Conference
CrabSandwich: Fuzzing Rust with Rust (Registered Report)
FUZZING 2023, 2nd International Fuzzing Workshop, 17 July 2023, Seattle, WA, USA
-
July 2023
Conference
Eliminating vulnerabilities by disabling unwanted functionality in binary programs
ASIACCS 2023, ACM ASIA Conference on Computer and Communications Security, 10-14 July 2023, Melbourne, Australia
-
July 2023
Talk
An overview of modern Windows malware analysis: Where we are and where we are going
WORMA 2023, Keynote Speech, 2nd Workshop on Robust Malware Analysis, co-located with EuroS&P 2023, 7 July 2023, Delft, The Netherlands
-
July 2023
Conference
Inside residential IP proxies: Lessons learned from large measurement campaign
WTMC 2023, 8th International Workshop on Traffic Measurements for Cybersecurity, co-located with 8th IEEE European Symposium on Security and Privacy, 7 July 2023, Delft, The Netherlands
-
July 2023
Conference
Inside Residential IP Proxies: Lessons Learned from Large Measurement Campaigns
EuroS&PW 2023, IEEE European Symposium on Security and Privacy Workshops, 3-7 July 2023, Delft, Netherlands
-
June 2023
Report
ASVspoof 5 Evaluation Plan
ASVspoof 2021 Evaluation Plan, 30 June 2023
-
June 2023
Conference
Towards detecting and geolocalizing web scrapers with round trip time measurements
TMA 2023, 7th IFIP Network Traffic Measurement and Analysis Conference, 26-29 June 2023, Naples, Italy
-
June 2023
Poster / Demo
Towards detecting and geolocalizing web scrapers with round trip time measurements
TMA 2023, 7th IFIP Network Traffic Measurement and Analysis Conference, 26-29 June 2023, Naples, Italy
Best Poster Award
-
June 2023
Thesis
Testability tarpits - Navigating the challenges of static tools in web applications
Thesis
-
June 2023
Talk
Social media filters: Beautification for humans but a critical issue for AI
EUSIPCO 2023 / 3MT (three minute thesis) Finalist contest, 15 June 2023, Helsinki, Finland
-
June 2023
Talk
Memory Forensics 2.0
SSTIC 2023, Symposium sur la sécurité des technologies de l'information et des communications, 7-9 June 2023, Rennes, France
-
June 2023
Conference
Rétro-ingénierie et détournement de piles protocolaires embarquées, un cas d'étude sur le système ESP32
SSTIC 2023, Symposium sur la sécurité des technologies de l'information et des communications, 7-9 June 2023, Rennes, France
-
June 2023
Conference
The PartialSpoof database and countermeasures for the detection of short fake speech segments embedded in an utterance
ICASSP 2023, IEEE International Conference on Acoustics, Speech and Signal Processing, 4-10 June 2023, Rhodes Islands, Greece
-
June 2023
Conference
A 3D-assisted framework to evaluate the quality of head motion replication by reenactment deepfake generators
ICASSP 2023, IEEE International Conference on Acoustics, Speech and Signal Processing, 4-10 June 2023, Rhodes Islands, Greece
-
May 2023
Talk
BreakMi: Reversing, exploiting and fixing Xiaomi (and Fitbit) fitness tracking ecosystems
Hardwear.io Security Trainings and Conference USA 2023, 30 May-3 June 2023, Santa Clara, USA
-
May 2023
Conference
E-Spoofer: Attacking and defending Xiaomi electric scooter ecosystem
WISEC 2023, 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, May 29-June 1, 2023, Guildford, United Kingdom
-
May 2023
Thesis
End-to-end modeling for speech spoofing and deepfake detection
Thesis
-
May 2023
Poster / Demo
LIBAFL LIBFUZZER: LIBFUZZER on top of LIBAFL
SBFT 2023, 16th IEEE/ACM International Workshop on Search-Based and Fuzz Testing, 14 May 2023, Melbourne, Australia
-
May 2023
Poster / Demo
AFLrustrust: A LibAFL-based AFL++ prototype
SBFT 2023, 16th IEEE/ACM International Workshop on Search-Based and Fuzz Testing, 14 May 2023, Melbourne, Australia
Search-Based and Fuzz Testing (SBFT) Workshop - Fuzzing Tool Competition Award
-
May 2023
Conference
Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption
PKC 2023, Public-Key Cryptography Conference, 7-10 May 2023, Atlanta, USA / Also on Cryptology ePrint Archive, Paper 2023/152
-
May 2023
Talk
Privacy-preserving federated learning
Invited talk, 5-7 May 2023, Kripto Günleri, Bolu, Turkey
-
May 2023
Talk
Crypto-based federated learning
Keynote talk at Crypto Days, 6 May 2023, Danca, Turkey
-
May 2023
Talk
Towards data privacy in smart cities
Keynote talk at GSU, Galatasaray University, 5 May 2023, Istanbul, Turkey
-
May 2023
Journal
Apprentissage automatique fédéré pour l'IA collaborative dans le secteur de la santé
Revue Internationale de Droit Économique, 2023, Ed. Association internationale de droit économique
-
May 2023
Patent
Proxy detection systems and methods
United States Patent Application No. 63/497053, 1 May 2023
-
April 2023
Report
From polynomial IOP and commitments to non-malleable zkSNARKs
Cryptology ePrint Archive, Paper 2023/569, April 2023
-
April 2023
Conference
Fed-BioMed: Open, transparent and trusted federated learning for real-world healthcare applications
Submitted to ArXiV, 24 April 2023
-
April 2023
Talk
Reflections on trusting Docker: Invisible Malware in continuous integration systems
THCon 2023, Toulouse Hacking Convention, 20-21 April 2023, Toulouse, France
-
April 2023
Talk
Dynamic binary firmware analysis with Avatar2
THCon 2023, Toulouse Hacking Convention, 20-21 April 2023, Toulouse, France
-
April 2023
Talk
Weaponizing ESP32 RF stacks
THCon 2023, Toulouse Hacking Convention, 20-21 April 2023, Toulouse, France
-
April 2023
Report
PARMESAN: Parallel ARithMEticS over ENcrypted data
Cryptology ePrint Archive, Paper 2023/544, 17 April 2023
-
April 2023
Thesis
Performance and verifiability of IOT security protocols
Thesis
-
March 2023
Thesis
Privacy-preserving biometric systems with advanced cryptographic techniques
Thesis
-
March 2023
Thesis
Improving hardware-in-the-loop dynamic security testing for linux-based embedded devices
Thesis
-
February 2023
Journal
Dissecting american fuzzy lop - A fuzzbench evaluation - RCR report
ACM Transactions on Software Engineering and Methodology, 27 February 2023
-
February 2023
Book
Fisher vectors for biometric presentation attack detection
Book chapter 18 of "Handbook of Biometric Anti-Spoofing", February 2023, Springer
-
February 2023
Book
Introduction to voice presentation attack detection and recent advances
Book chapter 13 of "Handbook of Biometric Anti-Spoofing", Springer, February 2023, 3rd ed.
-
February 2023
Book
Handbook of biometric anti-spoofing: Presentation attack detection and vulnerability assessment
Book, Series: Advances in Computer Vision and Pattern Recognition, Editors: Marcel, S., Fierrez, J., Evans, N. (Eds.)2023, 3rd ed. Springer, ISBN: 978-981-19-5288-3
-
January 2023
Journal
Alpha phi-shing fraternity: Phishing assessment in a higher education institution
Journal of Cybersecurity Education Research and Practice (JCERP), January 2023, Vol. 2022, N°2, Article 2
-
January 2023
Journal
Screaming channels
Encyclopedia of Cryptography, Security and Privacy, January 2025
-
December 2022
Journal
The PartialSpoof database and countermeasures for the detection of short fake speech segments embedded in an utterance
IEEE/ACM Transactions on Audio, Speech, and Language Processing, 30 December 2022
-
December 2022
Journal
Dissecting american fuzzy lop - A FuzzBench evaluation
ACM Transactions on Software Engineering and Methodology, 2022
-
December 2022
Conference
Learning from failures: Secure and fault-tolerant aggregation for federated learning
ACSAC 2022, Annual Computer Security Applications Conference, 5-9 December 2022, Austin, Texas, USA
-
November 2022
Thesis
Robustness to digital authentication attacks with deep learning
Thesis
-
November 2022
Conference
Recapture detection to fight deep identity theft
VSIP 2022, 4th International Conference on Video, Signal and Image Processing, November 25-27, 2022, Shanghai, China
-
November 2022
Talk
Malicious facial image processing and counter- Counter-measures: A review
VSIP 2022, Keynote speech, 4th International Conference on Video, Signal and Image Processing, 25-27 November 2022, Shanghai, China
-
November 2022
Conference
BADPASS: Bots taking ADvantage of proxy as a service
ISPEC 2022, 17th international Conference of Information Security Practice and Experience, 23-25 November 2022, Taipei, Taiwan / Also published in Lecture Notes in Computer Science, vol 13620
-
November 2022
Talk
Secure and explainable voice biometrics
IBERSPEECH 2022, Keynote Speech, 14-16 November 2022, Granada, Spain
-
November 2022
Talk
Privacy-preserving machine learning
3IA Côte d'Azur Scientific Days, Annual Scientific Meeting, 14-15 November 2022, Sophia Antipolis, France
-
November 2022
Conference
Auditable asymmetric password authenticated public key establishment
CANS 2022, 21st International Conference on Cryptology and Network Security, 13-16 November 2022, Dubai, United Arab Emirates / Also published in Lecture Notes in Computer Science, Vol. 13641
-
November 2022
Conference
LibAFL: A framework to build modular and reusable fuzzers
CCS 2022, 29th ACM Conference on Computer and Communications Security, 7-11 November 2022, Los Angeles, USA
-
November 2022
Conference
ImMuNE: Improved multilateration in noisy environments
GI 2022, IEEE Global Internet Symposium, 7 November 2022, in conjunction with IEEE CloudNet 2022, Paris, France
-
November 2022
Thesis
Watermarking machine learning models
Thesis
-
October 2022
Report
Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC
Eprint 2022/1425, 20 October 2022
-
October 2022
Conference
AI-based compression: A new unintended counter attack on Jpeg-related image forensic detectors?
ICIP 2022, IEEE International Conference on Image Processing, 16-19 October 2022, Bordeaux, France
-
October 2022
Conference
The dark side of native Ccode on Android
Submitted to TechRXiv, 5 October 2022
-
September 2022
Journal
WPAD: Waiting patiently for an announced disaster
ACM Computing Surveys, September 2022
-
September 2022
Thesis
Deep learning methods and advancements in digital image forensics
Thesis
-
September 2022
Tutorial
Cryptography for privacy-preserving AI : Challenges and solutions
MICCAI 2022, 25th International Conference on Medical Image Computing and Computer Assisted Intervention, 22 September 2022, Singapore, Singapore
-
September 2022
Talk
The bots arms race on airlines booking websites
EU Mini AvTech Exchange by Aviation ISAC, 21-22 September 2022, Nice, France
-
September 2022
Poster / Demo
Privacy preserving image registration
MICCAI 2022, 25th International Conference on Medical Image Computing and Computer Assisted Intervention, 18-22 September 2022, Singapore, Singapore
-
September 2022
Conference
GAIT3: An event-based, visible and thermal database for gait recognition
BIOSIG 2022, International Conference of the Biometrics Special Interest Group, 14-16 September 2022, Darmstadt, Germany
-
September 2022
Talk
TReSPAsS ETN - Exploring Joint Optimisation for Spoofing-Aware Speaker Verification
EAB-RPC 2022 - EAB Research Projects Conference 2022, 12-14 September 2022, Darmstadt, Germany
-
September 2022
Conference
RESPECT - Recognising COVID disease through biometric technologies: the case of the human phonatory system
EAB-RPC 2022 - EAB Research Projects Conference 2022, 12-14 September 2022, Darmstadt, Germany
-
September 2022
Conference
XAIface: Measuring and improving explainability for AI-based face recognition
EUVIP 2022, 10th European Workshop on Visual Information Processing, 11-14 September, 2022, Lisbon, Portugal
-
September 2022
Talk
TFHE parameter setup and applications
Santa's Crypto Get-Together 2022, 8-9 September 2022, Praha, Czech Republic
-
August 2022
Conference
Improving deepfake detection by mixing top solutions of the DFDC
EUSIPCO 2022, 30th European Signal Processing Conference, August 29-September 2, 2022, Belgrade, Serbia
-
August 2022
Report
Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited
IACR Eprint, Paper 2022/1100, 25 August 2022
-
August 2022
Conference
RE-mind: a first look inside the mind of a reverse engineer
USENIX 2022, 31st USENIX Security Symposium, 10-12 August 2022, Boston, MA, USA
-
August 2022
Conference
How machine learning is solving the binary function similarity problem
USENIX 2022, 31st USENIX Security Symposium, 10-12 August 2022, Boston, MA, USA
-
August 2022
Conference
When Sally met trackers: Web tracking from the users’ perspective
USENIX 2022, 31st USENIX Security Symposium, 10-12 August 2022, Boston, MA, USA
-
August 2022
Conference
Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs
USENIX 2022, 31st USENIX Security Symposium, 10-12 August 2022, Boston, MA, USA
-
July 2022
Journal
The mother of all leakages: How to simulate noisy leakages via bounded leakage (almost) for free
IEEE Transactions on Information Theory, 26 July 2022
-
June 2022
Talk
Spoofing-robust voice biometrics and ASVspoof
PRIMA/TRESPASS-ETN Madrid Summer School 2022, 27-30 June 2022, Madrid, Spain
-
June 2022
Talk
On the insecurity of vehicles against protocol-level Bluetooth threats
Fleet & Business Day, 29 June 2022, Cernobio, Italy
-
June 2022
Report
Mix-nets from re-randomizable and replayable CCA-secure public-key encryption
Cryptology ePrint Archive, Paper 2022/856, 28 June 2022
-
June 2022
Conference
BlindSpot: Watermarking through fairness
IH&MMSEC 2022, 10th ACM Workshop on Information Hiding and Multimedia Security, June 27-28, 2022, Santa Barbara, California, USA
-
June 2022
Conference
An industrial perspective on web scraping characteristics and open issues
DSN 2022, 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, June 27-30, 2022, Baltimore, Maryland, USA
-
June 2022
Talk
An overview of modern Windows malware analysis - A researcher's perspective
Journées Nationales 2022 du GDR Sécurité Informatique, 22-24 June 2022, Puteaux, France
-
June 2022
Talk
Malicious facial image processing and counter- Counter-measures: A review
Journées Nationales 2022 du GDR Sécurité Informatique, 22-24 June 2022, Puteaux, France
-
June 2022
Journal
BreakMi: Reversing, exploiting and fixing Xiaomi fitness tracking ecosystem
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, N°3, ISSN 2569-2925 / Also published in CHES 2022, Conference on Cryptographic Hardware and Embedded Systems, 18-21 September 2022, Leuven, Belgium
-
June 2022
Report
Membership inference attack against principal component analysis
Research Report RR-22-349, 16 June 2022
-
June 2022
Conference
BEERR: Bench of embedded system experiments for reproducible research
SILM 2022, 4th Workshop on the Security of Software / Hardware Interfaces, co-located with the 7th IEEE European Symposium on Security and Privacy (EuroS&P 2022), 6 June 2022, Genoa, Italy
-
June 2022
Conference
Fuzzing with data dependency information
EuroS&P 2022, 7th IEEE European Symposium on Security and Privacy, 6-10 June 2022, Genoa, Italy
-
June 2022
Talk
Speaker recognition, spoofing and ASVspoof
Invited talk at 19th Eurasip/IAPR/IEEE International Summer school for advanced studies on Biometrics, 6-10 June 2022, Alghero, Italy
-
May 2022
Conference
The convergence of source code and binary vulnerability discovery - A case study
ASIACCS 2022, 17th ACM ASIA Conference on Computer and Communications Security, 30 May-3 June 2022, Nagasaki, Japan
-
May 2022
Talk
Vie privée et sécurité pour l’IA
MOMI 2022, Keynote talk in "Le Monde des Mathématiques Industrielles", 6ème édition, 30-31 May 2022, Sophia Antipolis, France
-
May 2022
Poster / Demo
Hitchhiker's guide to a practical automated TFHE parameter setup for custom applications
FHE 2022, 1st Annual FHE.org Conference on Fully Homomorphic Encryption, 29 May 2022, Trondheim, Norway
-
May 2022
Conference
On the insecurity of vehicles against protocol-level bluetooth threats
WOOT 2022, 17th Workshop On Offensive Technologies, co-located with IEEE S&P, 26 May 2022, San Francisco, CA, USA
-
May 2022
Conference
Noise-SDR: Arbitrary modulation of electromagnetic noise from unprivileged software and its impact on emission security
S&P 2022, 43rd IEEE Symposium on Security & Privacy, 22-26 May 2022, San Francisco, CA, USA
-
May 2022
Patent
Proxy detection systems and methods
Patent US2023/0379363 A1, United States Patent Application No. 17/746,556, 23 November 2023
-
April 2022
Conference
Registered report: Dissecting american fuzzy lop - A fuzzbench evaluation
FUZZING 2022, 1st International Fuzzing Workshop, 24 April 2022, San Diego, CA, USA / Co-located with NDSS 2022
-
April 2022
Conference
Testability tarpits: the impact of code patterns on the security testing of web applications
NDSS 2022, Network and Distributed System Security Symposium, 24-28 April 2022, San Diego, California, USA
-
April 2022
Talk
Malware - Research directions and open problems
TOBB-ETU Cyber Security Day, 21 April 2022, Ankara, Turkey
-
April 2022
Talk
Malware - Research directions and open problems
Invited talk at Ohio State University, April 2022, Columbus, USA (Online Event)
-
March 2022
Conference
Analyse de la sécurité des Firmware de systèmes embarqués, avancées et défis
15ème Colloque IMT "Gestion de crise et numérique : nouvelles menaces et nouvelles solutions", 31 Mars 2022, Palaiseau, France
-
March 2022
Thesis
An analysis of human-in-the-loop approaches for binary analysis automation
Thesis
-
March 2022
Conference
The VoicePrivacy 2022 challenge evaluation plan
Submitted to ArXiV, 23 March 2022
-
March 2022
Talk
Symbolic execution by compiling symbolic handling into binaries with SymCC and SymQEMU
2022 Annual Meeting of the WG "Formal Methods for Security", Keynote talk, 21-23 Mar 2022, Fréjus, France
-
March 2022
Talk
SoK: Secure aggregation for federated learning
Séminaire de l'équipe Cybersecurity-Cryptography (Session Name: Federated Learning), Telecom ParisTech, 8 March 2022, Palaiseau, France
-
February 2022
Talk
Malware - Research directions and open problems
DSRC Seminar Series, 15 February 2022, TII, Abu Dhabi, United Arab Emirate
-
February 2022
Conference
Does Melania Trump have a body double from the perspective of automatic face verification?
ICPRAM 2022, 11th International Conference on Pattern Recognition Applications and Methods, in conjunction with ICAART 2022, 3-5 February (Online Event)
-
February 2022
Journal
Demographic attribute estimation in face videos combining local information and quality assessment
Machine Vision and Applications, Vol.33, N°26, 3 February 2022, Special Issue Paper on 25th ICPR - Computer Vision, Robotics and Intelligent Systems
-
January 2022
Talk
An introduction to memory forensics
DII Seminar, 28 January 2022, Pisa, Italy
-
January 2022
Report
SASV challenge 2022: A spoofing aware speaker verification challenge evaluation plan
Submitted to ArXiV, 25 January 2022
-
January 2022
Conference
Comparative study of DL-based methods performance for camera model identification with multiple databases
MWSF 2022, Media Watermarking, Security, and Forensics Conference, 17-24 January 2022, Online Event
-
January 2022
Talk
Privacy-preserving federated learning for healthcare
AI4Health Winter School, 10-14 January 2022 (Online Event)
-
January 2022
Book
Face manipulation detection in remote operational systems
Book chapter N°19 of "Handbook of Digital Face Manipulation and Detection", January 2022, ISBN: 978-3-030-87663-0
-
December 2021
Conference
Longitudinal study of the prevalence of malware evasive techniques
Submitted to ArXiV, 21 December 2021
-
December 2021
Report
Identity-based matchmaking encryption without random oracles
ePrint Archive: Report 2021/1660, 17 December 2021
-
December 2021
Conference
I4U system description for NIST SRE’20 CTS challenge
SRE 2021, NIST Speaker Recognition Evaluation Workshop, CTS Speaker Recognition Challenge, 14-12 December 2021
-
December 2021
Conference
Teager energy subband filtered features for near and far-field automatic speech recognition
APSIPA ASC 2021, Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 14-17 December 2021, Tokyo, Japan
-
December 2021
Conference
Identity-based matchmaking encryption without random oracles
INDOCRYPT 2021, 22nd International Conference on Cryptology in India, 12-15 December, Jaipur, India
-
December 2021
Thesis
Privacy-preserving machine learning techniques
Thesis
-
December 2021
Thesis
Unveiling and mitigating common pitfalls in malware analysis
Thesis
-
November 2021
Thesis
Data-driven risk quantification for proactive security
Thesis
-
November 2021
Talk
Lilb AFL, the advanced fuzzing library
HITB CyberWeek 2021, Hack In The Box CyberWeek Armory, 24-25 November 2021, Abu Dhabi, UAE
-
November 2021
Talk
A statistical threshold for adversarial classification in laplace mechanisms
3IA Workshop, 22 November 2021, Toulouse, France
-
November 2021
Conference
Tarnhelm: Isolated, transparent and confidential execution of arbitrary code in ARM’s TrustZone
CheckMATE 2021, Workshop collocated with the ACM Conference on Computer and Communications Security (CCS 2021), 15-19 November 2021 (Virtual Conference)
-
November 2021
Conference
Continuously non-malleable secret sharing: Joint tampering, plain model and capacity
TCC 2021, 19th Theory of Cryptography Conference, 8-11 November 2021, Raleigh, USA / Also on Lecture Notes in Computer Science, Vol.13043
-
November 2021
Conference
Etude comparative de l’apprentissage par transfert pour l’identification des caméras
CORESA 2021, 21eme Colloque sur la COmpression et REprésentation des Signaux Audiovisuels, 3-5 Novembre 2021, Sophia Antipolis, France
-
November 2021
Book
Voice biometrics: how the technology is standardized
Book chapter 7 of "Voice Biometrics: Technology, trust and security", Eds. Garcia-Mateo, Carmen and Chollet, Gérard, 2021, ISBN: 978-1-78561-900-7
-
October 2021
Journal
A Novel Approach for Distributed Denial of service defense using continuous wavelet transform and convolutional neural network for software-defined network
Computers and Security, 27 October 2021, N°102524, Elsevier
-
October 2021
Report
On the distribution of the weighted sum of chi-squared variables
Report, 22 October 2021
-
October 2021
Talk
LibAFL: The advanced fuzzing library
FuzzCon Europe 2021, Ship Secure Software Fast, 21 October 2021 (Online Event)
-
September 2021
Conference
Two-stream convolutional neural network for image source social network identification
CW 2021, 20th International Conference on Cyberworlds, 28-30 September 2021, Caen, France
-
September 2021
Conference
Engineering a new scholarly ecosystem : security and privacy in speech communication
1st AI-DEbate Workshop : workshop establishing An InterDisciplinary pErspective on speech-BAsed TEchnology : Magdeburg, 27 September 2021, Magdeburg, Germany
-
September 2021
Talk
Towards privacy-preserving and trustworthy AI
Keynote speech at TrustBUS 2021, 18th International Conference on Trust, Privacy and Security in Digital Business, September 27-30, 2021, Linz, Austria
-
September 2021
Report
Practical continuously non-malleable randomness encoders in the random Oracle model
Cryptology ePrint Archive: Report 2021/1269, 22 September 2021
-
September 2021
Journal
Towards a unified assessment framework of speech pseudonymisation
Computer Speech & Language, Volume 72, March 2022
-
September 2021
Talk
RESPECT: Presentation attack detection for voice biometrics: When audio meets image - Part II
EAB-RPC 2021, 8th EAB Research Projects Conference 2021, 14 September 2021 (Virtual Event)
-
September 2021
Thesis
A multidimensional analysis of the Android security ecosystem
Thesis
-
September 2021
Conference
Unsupervised detection and clustering of malicious TLS Flows
Submitted to ArXiV, 8 September 2021
-
September 2021
Conference
Does Melania Trump have a body double from the perspective of automatic face recognition?
Submitted to ArXiV, 6 September 2021
-
September 2021
Talk
Evolutive network architecture for speech deepfake detection
Explainability and evolutive systems for Speaker Verification and Anti-Spoofing an event organized by the EXTENSOR project, 2 September 2021, Le Mans, France (Virtual Event)
-
August 2021
Conference
Visualizing classifier adjacency relations: A case study in speaker verification and voice anti-spoofing
INTERSPEECH 2021, Conference of the International Speech Communication Association, 30 August-3 September 2021, Brno, Czechia (Virtual Conference)
-
August 2021
Conference
Adversarial disentanglement of speaker representation for attribute-driven privacy preservation
INTERSPEECH 2021, Conference of the International Speech Communication Association, 30 August-3 September 2021, Brno, Czechia (Virtual Conference)
-
August 2021
Conference
When malware changed its mind: An empirical study of variable program behaviors in the real world
USENIX 2021, 30th USENIX Security Symposium, 11-13 August 2021, Virtual Conference
Best Paper Award
-
August 2021
Conference
The use of likely invariants as feedback for fuzzers
USENIX 2021, 30th USENIX Security Symposium, 11-13 August 2021, Virtual Conference
-
July 2021
Conference
ASVspoof 2021: Automatic speaker verification spoofing and countermeasures challenge evaluation plan
ASVspoof consortium, 16 July 2021
-
July 2021
Talk
Privacy and security for artificial intelligence
Invited talk at the University of Luxembourg, 1 July 2021, Luxembourg, Luxembourg
-
June 2021
Journal
Inmap-t: Leveraging TTCN-3 to test the security impact of intra network elements
Journal of Computer and Communications, Vol.9, N°6, June 2021
-
June 2021
Conference
FADIA: Fairness-driven collaboratIve remote attestation
WISEC 2021, 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 28 June-2 July 2021, Abu Dhabi, UAE
-
June 2021
Talk
Why is hard to secure mobile proximity services
Invited talk at: SecMT2021, 2nd ACNS Workshop on Security in Mobile Technologies, In Conjunction With ACNS 2021, 21-24 June 2021, Kamakura, Japan
-
June 2021
Conference
Indirect synthetic attack on thermal face biometric systems via visible-to-thermal spectrum conversion
CVPR 2021, 34th IEEE Conference on Computer Vision and Pattern Recognition Workshops, 19-25 June 2021, (Virtual Conference)
-
June 2021
Conference
Privacy-preserving density-based clustering
ASIACCS 2021, 16th ACM ASIA Conference on Computer and Communications Security, 7-11 June 2021, Hong-Kong, China (Virtual Conference)
-
June 2021
Conference
SoK: Enabling security analyses of embedded systems via rehosting
ASIACCS 2021, ACM Symposium on Information, Computer and Communications Security, 7-11 June, 2021, Hong Kong, China
-
June 2021
Conference
Speaker embeddings for diarization of broadcast data in the allies challenge
ICASSP 2021, IEEE International Conference on Acoustics, Speech and Signal Processing, 6-11 June 2021, Toronto, Ontario, Canada
-
May 2021
Conference
Zero conf protocols and their numerous man in the middle (MITM) attacks
WOOT 2021, 15th IEEE Workshop on Offensive Technologies, 27 May 2021, Colocated with IEEE S&P (Virtual Conference)
-
May 2021
Conference
Journey to the center of the cookie ecosystem: Unraveling actors' roles and relationships
S&P 2021, 42nd IEEE Symposium on Security & Privacy, 23-27 May 2021, San Francisco, CA, USA
-
May 2021
Talk
How to ask without speech? On quantifying zero-evidence speech
Cryptic Commons 2021: Transdisciplinary Probes of the Ideal and Real World in Actual Cyber-Physical Systems, 21 May 2021, Aalborg, Danemark (Virtual Workshop)
-
May 2021
Journal
Scraping airlines bots: insights obtained studying honeypot data
International Journal of Cyber Forensics and Advanced Threat Investigations, Vol.2, N°1, May 2021
-
April 2021
Journal
Adversarial attacks through architectures and spectra in face recognition
Pattern Recognition Letters, 15 April 2021
-
April 2021
Talk
Privacy preserving arryhtmia detection with neural networks
ISBI 2021, International Symposium on Biomedical Imaging, April 13-16, 2021, Nice, France (Virtual Conference)
-
April 2021
Talk
Privacy preserving arryhtmia detection with neural networks
ISBI 2021, International Symposium on Biomedical Imaging, 13-16 April 2021, Nice, France
-
April 2021
Journal
ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech
IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM), Vol.3, N°2, April 2021
One of the ten most cited INTERSPEECH papers in the last 5 years, at INTERSPEECH 2024
-
March 2021
Talk
Approaches to explore complex data
Invited talk at IMDEA Software Institute, 24 March 2021, Madrid, Spain (Virtual Event)
-
February 2021
Conference
Understanding and detecting international revenue share fraud
NDSS 2021, Network and Distributed System Security Symposium, 21-24 February 2021, Virtual Conference
-
February 2021
Conference
Preventing and detecting state inference attacks on Android
NDSS 2021, Network and Distributed System Security Symposium, 21-24 February 2021, San Diego, CA, USA (Virtual Conference)
-
February 2021
Conference
On the insecurity of SMS one-time password messages against local attackers in modern mobile devices
NDSS 2021, Network and Distributed Systems Security Symposium, 21-24 February 2021, Virtual Conference
-
February 2021
Conference
Optimizing leak detection in open-source platforms with machine learning techniques
ICISSP 2021, 7th International Conference on Information Systems Security and Privacy, 11-13 February 2021 (Virtual Conference)
-
February 2021
Conference
Multi-layer feature fusion and selection from convolutional neural networks for texture classification
VISAPP 2021, 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, 8-10 February 2021, Virtual Conference
-
February 2021
Conference
Demonstrating the vulnerability of RGB-D based face recognition to GAN-generated depth-map injection
ICPRAM 2021, 10th International Conference on Pattern Recognition Applications and Methods, 4-6 February 2021 (Virtual Conference)
-
February 2021
Report
Supplementary material to the paper The VoicePrivacy 2020 Challenge: Results and findings
VOICEPRIVACY 2020, February 2020
-
February 2021
Talk
Reproducing spectre attack with gem5: How to do It right?
ICHSA 2021, 3rd Israeli Conference on Hardware and Side-Channel Attacks, 1-2 June 2021, Tel Aviv, Israel (Hybrid format)
2nd place of the Student Competition
-
January 2021
Talk
Metrics in audio security and privacy
TReSPAsS-ETN Training Event 2, 21-22 January 2021, Virtual Event
-
January 2021
Journal
Multi-user searchable encryption
Encyclopedia of Cryptography, Security and Privacy, 2021
-
January 2021
Report
BaNNers: Binarized neural networks with replicated secret sharing
Cryptology ePrint Archive: Report 2021/045, 12 January 2021
-
January 2021
Conference
Cross-spectrum face recognition using subspace projection hashing
ICPR 2020, 25th International Conference on Pattern Recognition, 10-15 January 2021, Milan, Italy (Virtual Conference)
-
January 2021
Conference
Attribute-based quality assessment for demographic estimation in face videos
ICPR 2020, 25th International Conference on Pattern Recognition, 10-15 January 2021, Milan, Italy (Virtual Conference)
-
January 2021
Book
Finding software bugs in embedded devices
Book Chapter 11 of "Security of Ubiquitous Computing Systems", January 2021, ISBN: 978-3030105907
-
December 2020
Conference
HoPLA: a Honeypot Platform to Lure Attackers
C&ESAR 2020, Computer & Electronics Security Applications Rendez-vous, Deceptive security Conference, part of European Cyber Week, 14-15 December, Rennes, France
-
December 2020
Conference
Botnet sizes: when maths meet myths
CFTIC 2020, 1st International Workshop on Cyber Forensics and Threat INvestigations Challenges in Emerging Infrastructures, held in conjuction with the 18th International Conference on Service Oriented Computing (ICSOC 2020), 14-17 December 2020, Dubai, UAE (Virtual Conference) / Also published in Lecture Notes in Computer Science (LNCS 12632, 2021)
-
December 2020
Thesis
Binary analysis for Linux and IoT malware
Thesis
-
December 2020
Talk
PAPAYA: PlAtform for PrivAcY preserving data analytics (Healthcare Use Cases)
Webinar Cyberwatching.eu, The European Watch on Cybersecurity and Privacy, "Security and Privacy by Design for Healthcare", 10 December 2020, Virtual Event
-
December 2020
Thesis
Security threats emerging from the interaction between digital activity and radio transceivers
Thesis
Runner-up PhD Award from the GDR Sécurité Informatique
-
November 2020
Conference
Complete quality preserving data hiding in animated GIF with reversibility and scalable capacity functionalities
IWDW 2020, 19th International Workshop on Digital-forensics and Watermarking, 25-27 Novembre 2020, Melbourne, Australia (Virtual Conference)
-
November 2020
Talk
AI and security
3IA Scientific Day: AI for Smart and Secure Territories, 25 November 2020 (Virtual Event)
-
November 2020
Talk
Adversarial learning and differential privacy for machine learning
3IA Scientific Day: AI for Smart and Secure Territories, 25 November 2020 (Virtual Event)
-
November 2020
Thesis
Increasing the performance of symbolic execution by compiling symbolic handling into binaries
Thesis
-
November 2020
Report
Subversion-resilient enhanced privacy ID
Cryptology ePrint Archive: Report 2020/1450, 17 November 2020
-
November 2020
Talk
Alternative anonymization metrics and post evaluation results : ZEBRA
VoicePrivacy 2020 Virtual Workshop, 4 November 2020
-
November 2020
Tutorial
Anti-spoofing in automatic speaker recognition
ODYSSEY 2020, Speaker and Language Recognition Workshop, 1-5 Novembre 2020, Tokyo, Japan
-
October 2020
Journal
Proofs of data reliability: Verification of reliable data storage with automatic maintenance
Security and Privacy, December 2020, Wiley
-
October 2020
Conference
Dynamic group key agreement for resource-constrained devices using blockchains
AIBLOCK 2020, 2nd International Workshop on Application Intelligence and Blockchain Security, in conjunction with ACNS 2020, 19-22 October 2020, Rome, Italy / Also published in Lecture Notes in Computer Science, Vol.12418
-
October 2020
Journal
Reversible image visual transformation for privacy and content protection
Multimedia Tools and Applications, 14 October 2020
-
October 2020
Report
The mother of all leakages: How to simulate noisy leakages via bounded leakage (almost) for free
Cryptology ePrint Archive: Report 2020/1246, 8 October 2020
-
October 2020
Conference
Detecting insecure code patterns in industrial robot programs
ASIACCS 2020, 15th ACM Asia Conference on Computer and Communications Security, 5-9 October 2020, Taipei, Taiwan
-
September 2020
Journal
PROTECT: Pervasive and user focused biometrics border project – a case study
IET Biometrics, Vol.9, N°6, November 2020
-
September 2020
Talk
An evaluation of symbolic execution systems and the benefits of compilation with SymCC
SOSYSEC 2020, Séminaire sur la Sécurité des logiciels et des systèmes, 25 Septembre 2020, Rennes, France
-
September 2020
Talk
Metrics in audio security and privacy
EAB-RPC 2020, EAB Research Projects Conference, 14-16 September 2020 (Virtual Conference)
-
September 2020
Talk
Security and privacy in voice biometrics and beyond
14th European Biometric Max Snijder, Research, and Industry Awards, Darmstadt, Germany (Virtual Conference)
European Biometrics Max Snijder Award
-
September 2020
Talk
Understanding screaming channels: From a detailed analysis to improved attacks
CHES 2020, Annual Conference on Cryptographic Hardware and Embedded Systems, 14–18 September 2020, Virtual Conference
-
September 2020
Talk
Understanding screaming channels: From a detailed analysis to improved attacks
CONFIDENCE 2020, 19th International Infosecurity Conference, 7-9 September 2020, Virtual Conference
-
September 2020
Report
Lunar: a toolbox for more efficient universal and updatable zkSNARKs and commit-and-prove extensions
Cryptology ePrint Archive, Report 2020/1069, 3 September 2020
-
September 2020
Journal
Cookies from the past: Timing server-side request processing code for history sniffing
ACM Dgital Threats: Research and Practice Journal (DTRAP), December 2020, Vol.1, N°4
-
August 2020
Journal
A DDoS attack detection and defense scheme using time-series analysis for SDN
Journal of Information Security and Applications, Volume 54, October 2020
-
August 2020
Conference
Symbolic execution with SymCC: Don't interpret, compile!
USENIX Security 2020, 29th USENIX Security Symposium, 12-14 August 2020, Boston, MA, USA (Virtual Conference)
Distinguished Paper Award
-
August 2020
Conference
Towards HTTPS everywhere on Android: We are not there yet
USENIX Security 2020, 29th USENIX Security Symposium, 12-14 August 2020, Boston, MA, USA (Virtual Conference)
-
August 2020
Invited Journal
SoC security evaluation: Reflections on methodology and tooling
Invited paper in IEEE Design & Test, 3 August 2020
-
July 2020
Thesis
Towards system-wide dynamic analysis of embedded systems
Thesis
-
July 2020
Poster / Demo
Unprotected geo-localisation data through ARGOS satellite signals: The risk of cyberpoaching
WISEC 2020, 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, July 8–10, 2020, Linz, Austria (Virtual Conference)
-
July 2020
Conference
SwaNN: Switching among cryptographic tools for privacy-preserving neural network predictions
SECRYPT 2020, 17th International Conference on Security and Cryptography, 8-10 July 2020, (Virtual Conference)
-
July 2020
Conference
ProteiNN: Privacy-preserving one-to-many Neural Network classifications
SECRYPT 2020, 17th International Joint Conference on Security and Cryptography, 8-10 July 2020, Lieusaint-Paris, France (Virtual Conference)
-
July 2020
Conference
QSOR: Quantum-safe onion routing
SECRYPT 2020, 17th International Conference on Security and Cryptography, 8-10 July 2020 (Virtual Conference)
-
June 2020
Conference
HardSnap: Leveraging hardware snapshotting for embedded systems security testing
DSN 2020, 50th IEEE/IFIP International Conference on Dependable Systems and Networks, 29 June-02 July, 2020, Valencia, Spain
-
June 2020
Journal
Protecting citizens’ personal data and privacy: Joint effort from GDPR EU cluster research projects
SN Computer Science, 1, N°217, June 2020
-
May 2020
Journal
Une approche configurationnelle des leurres conversationnels
Réseaux, 2020/2-3 (N° 220-221)
-
May 2020
Poster / Demo
Artificial bandwidth extension using conditional variational auto-encoders and adversarial learning
ICASSP 2020, 45th International Conference on Acoustics, Speech, and Signal Processing, 4-8 May 2020, Barcelona, Spain
-
April 2020
Conference
Dirty clicks: A study of the usability and security implications of click-related behaviors on the Web
WWW 2020, The Web Conference, 20-24 April 2020, Taipei, Taiwan (Virtual Conference)
-
March 2020
Talk
Audio security and privacy
CoSDEO 2020, 7th CoSDEO workshop on Privacy and Security in Digital Assistants, Keynote Speech at 18th Annual IEEE International Conference on Pervasive Computing and Communications, 23-27 March 2020, Austin, Texas, USA
-
March 2020
Poster / Demo
Audio security and privacy
ITG Workshop, 3 March 2020, Magdebourg, Germany
-
February 2020
Report
Speaker anonymisation using the McAdams coefficient
Research Report RR-20-343, 28 February 2020
-
February 2020
Talk
This is madness! 15+ years of DEF CON CTF
Invited Talk at ITASEC 2020, Italian Conference on Cybersecurity, Capture IT, 4-7 February 2020, Ancona, Italy
-
February 2020
Report
The VoicePrivacy 2020 challenge evaluation plan
VOICEPRIVACY 2020, February 2020
-
January 2020
Book
UPRISE-IoT: User-centric Privacy and Security in the IoT
Book chapter of "SPIoT 2020 (Security and Privacy in Internet of Things: Challenges and Solutions)", 2020
-
January 2020
Talk
Intelligence artificielle et confidentialité des données
Meetup du Cluster IA, Village By CA Provence Côte d’Azur, 23 Janvier 2020
-
January 2020
Talk
Machine learning and data confidentiality
7ème Journée Sécurité, 22 janvier 2020, INSA Toulouse/LAAS CNRS, Toulouse, France
-
January 2020
Conference
QSOR: Quantum-safe onion routing
Submitted on ArXiV, 10 January 2020
-
December 2019
Journal
Perspective morphometric criteria for facial beauty and proportion assessment
Applied Sciences, Vol.10, N°1, 18 December 2019
-
December 2019
Conference
BakingTimer: Privacy analysis of server-side request processing time
ACSAC 2019, Annual Computer Security Applications Conference, December 9-13, 2019, San Juan, Puerto Rico
-
December 2019
Conference
Systematic comparison of symbolic execution systems: Intermediate representation and its generation
ACSAC 2019, Annual Computer Security Applications Conference, December 9-13, 2019, San Juan, Puerto Rico
-
November 2019
Conference
Remote KYC: Attacks and counter-measures
EISIC 2019, European Intelligence and Security Informatics Conference, 26-27 November 2019, Oulu, Finland
-
November 2019
Poster / Demo
Privacy-preserving speech processing via STPC and TEEs
PPML 2019, Privacy Preserving Machine Learning, CCS 2019 Workshop, 15 November 2019, London, UK
-
November 2019
Conference
Privacy-preserving speech processing via STPC and TEEs
PPML 2019, Privacy Preserving Machine Learning Workshop, CCS 2019 Workshop, November 15, 2019, London, UK
-
November 2019
Thesis
Explicit memory inclusion for efficient artificial bandwidth extension
Thesis
-
November 2019
Conference
A generic method for acoustic processing using deep learning
ADIPEC 2019, Abu Dhabi International Petroleum Exhibition & Conference, 11-14 November, Abu Dhabi, UAE
-
November 2019
Conference
Time-slotted ALOHA-based LoRaWAN scheduling with aggregated acknowledgement approach
FRUCT 2019, 25th Finnish-Russian University Cooperation in Telecommunications Conference, 5-8 November 2019, Helsinki, Finland
-
October 2019
Report
Data protection in the era of artificial intelligence. Trends, existing solutions and recommendations for privacy-preserving technologies
Research Report, October 2019, Timan, Tjerk & Mann, Zoltan (eds), October 2019, BDVA
-
October 2019
Talk
BGP hijacks: the next generation stealthy command and control for botnets
Invited Talk at CSET 2019, International Conference on Cyber Security for Emerging Technologies, 27-31 October 2019, Doha, Qatar
-
October 2019
Thesis
Efficient speaker diarization and low-latency speaker spotting
Thesis
-
October 2019
Conference
Cascaded generation of high-quality color visible face images from thermal captures
Submitted on ArXiv, 21 October 2019
-
October 2019
Talk
Screaming channels: When electromagnetic side channels meet radio transceivers
PHISIC 2019, Workshop on Practical Hardware Innovations in Security Implementation and Characterization, 15-16 October 2019,Gardanne, France
-
October 2019
Journal
Privacy-preserving PLDA speaker verification using outsourced secure computation
Speech Communication, 1 October 2019
-
September 2019
Conference
A secure visual-thermal fused face recognition system based on non-linear hashing
MMSP 2019, IEEE 21st International Workshop on Multimedia Signal Processing, 27-29 September 2019, Kuala Lumpur, Malaysia
-
September 2019
Journal
Analytical models for the scalability of dynamic group-key agreement protocols and secure file sharing systems
ACM Transactions on Privacy and Security, Vol.22, N°4, Article 20, September 2019
-
September 2019
Conference
Toward the analysis of embedded firmware through automated re-hosting
RAID 2019, 22nd International Symposium on Research in Attacks, Intrusions and Defenses, September 23-25, 2019, Beijing, China
-
September 2019
Conference
Exploring syscall-based semantics reconstruction of Android applications
RAID 2019, 22nd International Symposium on Research in Attacks, Intrusions and Defenses, September 23-25, 2019, Beijing, China
-
September 2019
Thesis
Dynamic binary firmware analysis: Challenges and solutions
Thesis
-
September 2019
Talk
Survey Talk: Preserving privacy in speaker and speech characterisation
INTERSPEECH 2019, Annual conference of the International Speech Communication Association, 15-19 September 2019, Graz, Austria
-
September 2019
Conference
The GDPR & speech data: Reflections of legal and technology communities, first steps towards a common understanding
INTERSPEECH 2019, 20th Annual Conference of the International Speech Communication Association, September 15-19, 2019, Graz, Austria
-
September 2019
Thesis
Advances in memory forensics
Thesis
-
September 2019
Conference
IoT based people detection for emergency scenarios
ICCE-Berlin 2019, 9th IEEE International Conference of Consumer Electronics, 8-11 September 2019, Berlin, Germany
-
September 2019
Conference
Anomaly-based DDoS attack detection by using sparse coding and frequency domain
PIMRC 2019, IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 8-11 September 2019, Istanbul, Turkey
-
September 2019
Talk
Spectrum conversion from thermal to visible images: Safety and security applications
EUSIPCO 2019, Eurasip 3 Minute Thesis, 3MT Contest, 27th European Signal Processing Conference, September 2-6, 2019, Coruña, Spain
3MT contest runner-up Award (2nd prize)
-
August 2019
Report
SwaNN: Switching among cryptographic tools for privacy-preserving neural network predictions
Research Report RR-19-342, 31 August 2019
-
August 2019
Report
PAC: Privacy-preserving arrhythmia classification with neural networks
Technical report RR-19-341, 30 August 2019
-
August 2019
Conference
Workshop on privacy challenges in public and private organizations
Workshop on Privacy Challenges in Public and Private Organizations, 14th IFIP International Summer School on Privacy and Identity Management, August 19-23, 2019, Brugg/Windisch, Switzerland
-
August 2019
Conference
Privacy and identity management: data for better living: AI and privacy
14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vol.576, August 19-23, 2019, Windisch, Switzerland
-
August 2019
Conference
Back to the whiteboard: a principled approach for the assessment and design of memory forensic techniques
Usenix Security 2019, 28th Usenix Security Symposium, 14-16 August 2019, Santa Clara, CA, USA
-
July 2019
Conference
PORTOS: Proof of data reliability for real-world distributed outsourced storage
SECRYPT 2019, 16th International Conference on Security and Cryptography, 26-28 July, 2019, Prague, Czech Republic
Best Student Paper Award
-
July 2019
Journal
PAPAYA: A platform for privacy preserving data analytics
ERCIM News, N°118, July 2019, Special theme: Digital health
-
July 2019
Poster / Demo
Privacy preserving neural network classification: A hybrid solution
PUT 2019, Open Day for Privacy, Usability, and Transparency, Co-located with the 19th Privacy Enhancing Technologies Symposium, July 15, 2019, KTH, Stockholm, Sweden
Best Poster Demo Award
-
July 2019
Conference
On the discriminative power of learned vs. hand-crafted features for crowd density analysis
IJCNN 2019, International Joint Conference on Neural Networks, July 14-19, 2019, Budapest, Hungary
-
July 2019
Conference
Mayflies, breeders, and busy bees in ethereum: Smart contracts over time
BCC 2019, 3rd ACM Workshop on Blockchains, Cryptocurrencies and Contracts, Held in conjunction with ACM Asia CCS 2019, July 8, 2019, Auckland, New Zealand
-
July 2019
Conference
Can I opt out yet? GDPR and the global illusion of cookie control
ASIACCS 2019, 14th ACM Asia Conference on Computer and Communications Security, 7-12 July, Auckland, New Zealand
-
July 2019
Talk
Speaker recognition: A reliable, trustworthy biometric?
S4P Summer School on Speech Signal Processing, Speaker Recognition and Diarization, DAIICT, 6-10 July 2019, Gandhinagar, India
-
July 2019
Talk
ASVspoof: The automatic speaker verification spoofing and countermeasures challenge initiative
S4P Summer School on Speech Signal Processing, Speaker Recognition and Diarization, DAIICT, 6-10 July 2019, Gandhinagar, India
-
July 2019
Talk
Automatic speaker verification and spoofing countermeasures: Integration and metrics
S4P Summer School on Speech Signal Processing, Speaker Recognition and Diarization, DAIICT, 6-10 July 2019, Gandhinagar, India
-
July 2019
Conference
"Doing being" an ordinary human callee
IIEMCA 2019, Conference of the International Institute for Ethnomethodology and Conversation Analysis, July 2?5, 2019, Mannheim, Germany
-
July 2019
Conference
Robust face authentication based on dynamic quality-weighted comparison of visible and thermal-to-visible images to visible enrollments
FUSION 2019, 22nd International Conference on Information Fusion, 2-5 July 2019, Ottawa, Canada
-
June 2019
Conference
Collateral use of deployment code for smart contracts in ethereum
NTMS 2019, 10th IFIP International Conference on New Technologies, Mobility and Security, 24-26 June 2019, Canary Islands, Spain
-
June 2019
Journal
Light fields for face analysis
Sensors, 12 June 2019
-
June 2019
Journal
Preserving privacy in speaker and speech characterisation
Computer Speech and Language, June 2019
-
June 2019
Talk
2019 Hack@DAC top finalist team “NOPS” presents their approach
DAC 2019, Design and Automation Conference, Designer Track Session 36, 2-6 June 2019, Las Vegas, USA
-
June 2019
Conference
Cross-spectrum thermal to visible face recognition based on cascaded image synthesis
ICB 2019, 12th IAPR International Conference On Biometrics, 4-7 June, Crete, Greece
-
June 2019
Thesis
Revisiting face processing with light field images
Thesis
-
June 2019
Journal
Preserving privacy in speaker and speech characterisation
Computer Speech & Language, Vol.58, November 2019
-
May 2019
Conference
Sound classification using summary statistics and N-path filtering
ISCAS 2019, IEEE International Symposium on Circuits and Systems, 26-29 May 2019, Sapporo, Japan
-
May 2019
Talk
Screaming Channels: quand un émetteur radio diffuse des canaux auxiliaires
Invited Talk, GDR ONDE–GT5 CEM, Compatibilité ElectroMagnétique, Journée thématique « Sécurité des systèmes électroniques et communicants », 21 May 2019, Paris, France
-
May 2019
Talk
Screaming channels: When electromagnetic side channels meet radio transceivers
RESSI 2019, Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, 15-17 mai 2019, Erquy, France
-
May 2019
Talk
Rejeu: Screaming channels: quand un émetteur radio diffuse des canaux auxiliaires
RESSI 2019, Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, 15-17 mai 2019, Erquy, France
-
May 2019
Conference
Latent representation learning for artificial bandwidth extension using a conditional variational auto-encoder
ICASSP 2019, International Conference on Acoustics, Speech, and Signal Processing, 12-17 May 2019, Brighton, UK
-
May 2019
Poster / Demo
A cancellable face template scheme based on nonlinear multi-dimension spectral hashing
IWBF 2019, 7th IAPR/IEEE International Workshop on Biometrics and Forensics, 2-3 May 2019, Cancun, Mexico
-
April 2019
Conference
ASVspoof 2019: Future horizons in spoofed and fake audio detection
Submitted on ArXiv, 9 April 2019
-
April 2019
Conference
Privacy-preserving delegable authentication in the Internet of Things
SAC 2019, 34th ACM/SIGAPP Symposium on Applied Computing, IoT Track, April 8-12, 2019, Limassol, Cyprus
-
April 2019
Conference
A survey of tools for analyzing Ethereum smart contracts
DAPPCON 2019, IEEE International Conference on Decentralized Applications and Infrastructures, April 5-9, 2019, East Bay, San Francisco, California, USA
-
March 2019
Poster / Demo
Private neural network predictions
ICT.OPEN2019, Dutch Digital Conference, March 19-20, 2019, Hilversum, Netherthelands
-
March 2019
Thesis
Secure, efficient automatic speaker verification for embedded applications
Thesis
-
February 2019
Thesis
Verifiable computation and biometric authentication
Thesis
-
February 2019
Conference
SoK: Development of secure smart contracts - Lessons from a graduate course
FC 2019, 3rd Workshop on Trusted Smart Contracts, Financial Cryptography 2019, In Association with Financial Cryptography 2019, 22 February 2019, St Kitts, Royaume-Uni / Also published in LNCS, Vol.11599/2019
-
February 2019
Conference
SOCRatES: A database of realistic data for SOurce Camera REcognition on Smartphones
ICPRAM 2019, 8th International Conference on Pattern Recognition Applications and Methods, 19-21 February 2019, Prague, Czech Republic
-
February 2019
Talk
How much have we (not) learned from 30 years of Internet insecurity ?
Invited Talk at KAUST (King Abdullah University of Science and Technology), 17-21 February 2019, Thuwal, Saudi Arabia
-
February 2019
Journal
Security of controlled manufacturing systems in the connected factory: the case of industrial robots
Journal of Computer Virology and Hacking Techniques, February 2019
-
February 2019
Talk
Finding vulnerabilities in Internet of Things devices
4th GDR RSD and ASF Winter School on Distributed Systems and Networks 2019, Keynote Speech, 4-8 February 2019, Pleynet, France
-
January 2019
Poster / Demo
Hybrid G-PRNU: Optimal parameter selection for scale-invariant asymmetric source smartphone identification
EI 2019, IS&T International Symposium on Electronic Imaging 2019, 13-18 January 2019, Burlingame, USA
-
January 2019
Conference
Hybrid G-PRNU: Optimal parameter selection for scale-invariant asymmetric source smartphone identification
EI 2019, IS&T International Symposium on Electronic Imaging 2019, 13-18 January 2019, Burlingame, USA
-
December 2018
Talk
Exploring fraud in telephony networks
35C3 2018, 35th Chaos Communication Congress, 27-30 December 2018, Leipzig, Germany
-
December 2018
Book
Eye movement analysis in biometrics
Book chapter of Biometrics under Biomedical Considerations, Part of the Series in BioEngineering book series (SERBIOENG), December 2018
-
December 2018
Conference
A new framework for optimal facial landmark localization on light-field images
VCIP 2018, IEEE International Conference on Visual Communications and Image Processing, December 9-12, 2018, Taichung, Taiwan
-
December 2018
Talk
When machines can't talk: Security and privacy issues of machine-to-machine data protocols
BLACKHAT Europe 2018, Internet of Things Track, December 3-6, 2018, London, UK
-
December 2018
Conference
Using loops for malware classification resilient to feature-unaware perturbations
ACSAC 2018, 34th Annual Computer Security Applications Conference, 3-7 December 2018, San Juan, Puerto Rico, USA
-
November 2018
HDR
Security of connected embedded devices: software, hardware and wireless
Habilitation à diriger des recherches (French qualification for conducting Phd theses)
-
October 2018
Conference
Fast two-server multi-user searchable encryption with strict access pattern leakage
ICICS 2018, 20th International Conference on Information and Communications Security, 29-31 October 2018, Lille, France / Also published in LNCS, Vol. 11149
-
October 2018
Journal
Biometrics: In search of identity and security (Q & A)
IEEE Multimedia, October 2018
-
October 2018
Conference
ClickShield: Are you hiding something? Towards eradicating clickjacking on Android
CCS 2018, ACM Conference on Computer and Communications Security, 15-19 October 2018, Toronto, Canada
-
October 2018
Conference
Clock around the Clock: Time-based device fingerprinting
CCS 2018, 25th ACM Conference on Computer and Communications Security, October 15-19, 2018, Toronto, Canada
-
October 2018
Conference
Phishing attacks on modern Android
CCS 2018, ACM Conference on Computer and Communications Security, 15-19 October 2018, Toronto, Canada
-
October 2018
Thesis
Multi-user searchable encryption
Thesis
-
October 2018
Conference
Kinect vs lytro in RGB-D face recognition
CW 2018, International Conference on Cyberworlds, 3-5 October 2018, Singapore, Singapore
-
September 2018
Talk
Image forensics detection by dilated convolutional neural network and error level analysis
GdR ISIS/CNRS, 27 September 2018, Paris, France
-
September 2018
Conference
PROTECT Multimodal DB: a multimodal biometrics dataset envisaging border control
BIOSIG 2018, 17th International Conference of the Biometrics Special Interest Group, September 26-29, 2018, Darmstadt, Germany
-
September 2018
Conference
Multi-variation visible and thermal face database for cross-spectrum face recognition
BIOSIG 2018, 17th International Conference of the Biometrics Special Interest Group, 26-29 September 2018, Darmstadt, Germany
Best Poster Award
-
September 2018
Conference
Advanced face presentation attack detection on light field images
BIOSIG 2018, 17th International Conference of the Biometrics Special Interest Group, 26-29 September 2018, Darmstadt, Germany
-
September 2018
Conference
Enhanced low-latency speaker spotting using selective cluster enrichment
BIOSIG 2018, 17th International Conference of the Biometrics Special Interest Group, 26-29 September 2018, Darmstadt, Germany
-
September 2018
Talk
Betrayed by the Android user interface: why a trusted UI matters
CRYPTACUS 2018, Invited Talk, Conference on Cryptanalysis in Ubiquitous Computing Systems, September 18-20, 2018, Rennes, France
-
September 2018
Talk
Screaming channels: When electromagnetic side channels meet radio transceivers
CRYPTACUS 2018, Invited Talk, Conference on Cryptanalysis in Ubiquitous Computing Systems, September 18-20, 2018, Rennes, France
-
September 2018
Conference
Smashing the stack protector for fun and profit
IFIP SEC 2018, 33rd IFIP International Information Security and Privacy Conference, 18-20 September, 2018, Poznan, Poland
-
September 2018
Book
Handbook of biometric anti-spoofing : Presentation attack detection
Editors: Marcel, S., Nixon, M.S., Fierrez, J., Evans, N. (Eds.); Springer International Publishing, 2018, 2nd ed.; ISBN: 978-3319926261
-
September 2018
Conference
FHE-compatible batch normalization for privacy preserving deep learning
DPM 2018, 13th DPM International Workshop on Data Privacy Management, 6-7 September 2018, Barcelona, Spain
-
September 2018
Conference
Autonomous person detection and tracking framework using unmanned aerial vehicles (UAVs)
EUSIPCO 2018, 26th European Signal Processing Conference, 3-7 September 2018, Rome, Italy
-
September 2018
Conference
Efficient proof composition for verifiable computation
ESORICS 2018, European Symposium on Research in Computer Security, 3-7 September 2018, Barcelona, Spain / Also Part of LNCS, Vol.11098
-
September 2018
Conference
On multi-view face recognition using lytro images
EUSIPCO 2018, 26th European Signal Processing Conference, 3-7 September 2018, Rome, Italy
-
September 2018
Conference
Artificial bandwidth extension with memory inclusion using semi-supervised stacked auto-encoders
INTERSPEECH 2018, 19th Annual Conference of the International Speech Communication Association, September 2-6, 2018, Hyderabad, India
-
September 2018
Conference
Integrated presentation attack detection and automatic speaker verification: Common features and Gaussian back-end fusion
INTERSPEECH 2018, 19th Annual Conference of the International Speech Communication Association, September 2-6, 2018, Hyderabad, India
-
September 2018
Conference
Speech database and protocol validation using waveform entropy
INTERSPEECH 2018, 19th Annual Conference of the International Speech Communication Association, September 2-6, 2018, Hyderabad, India
-
September 2018
Conference
The EURECOM submission to the first DIHARD challenge
INTERSPEECH 2018, 19th Annual Conference of the International Speech Communication Association, September 2-6, 2018, Hyderabad, India
-
September 2018
Tutorial
Spoofing attacks in automatic speaker verification: analysis and countermeasures
INTERSPEECH 2018, 19th Annual Conference of the International Speech Communication Association, September 2-6, 2018, Hyderabad, India
-
September 2018
Report
EURECOM-BISC system description
INTERSPEECH 2018, 1st DIHARD Speech Diarization Challenge, 2-6 September 2018, Hyderabad, India
-
August 2018
Conference
CHARIOT: Cloud-assisted access control for the internet of things
PST 2018, 16th Annual Conference on Privacy, Security and Trust, August 28-30, 2018, Belfast, Northern Ireland, United Kingdom
-
August 2018
Conference
Inception: System-wide security testing of real-world embedded systems software
USENIX 2018, 27th Usenix Security Symposium, August 15-17, 2018, Baltimore, MD, USA
-
August 2018
Talk
Screaming channels: When electromagnetic side channels meet radio transceivers
BLACKHAT USA 2018, Keynote speech, 4-9 August 2018, Mandalay Bay, Las vegas
-
July 2018
Conference
Security for distributed machine learning based software
ICETE 2018, 15th International Joint Conference on E-Business and Telecommunications, 26-28 July 2018, Porto, Portugal / Also published as Part of the Communications in Computer and Information Science book series (CCIS, volume 1118)
-
July 2018
Conference
Breaking and fixing the security proof of garbled bloom filters
DBSEC 2018, 32nd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, July 16-18, 2018, Bergamo, Italy / Also published in Lecture Notes in Computer Science, Vol.10980
-
June 2018
Conference
Low-latency speaker spotting with online diarization and detection
ODYSSEY 2018, The Speaker and Language Recognition Workshop, June 26-29, 2018, Les Sables d'Olonne, France
-
June 2018
Conference
An end-to-end spoofing countermeasure for automatic speaker verification using evolving recurrent neural networks
ODYSSEY 2018, The Speaker and Language Recognition Workshop, June 26-29, 2018, Les Sables d'Olonne, France
-
June 2018
Conference
End-to-end automatic speaker verification with evolving recurrent neural networks
ODYSSEY 2018, The Speaker and Language Recognition Workshop, June 26-29, 2018, Les Sables d'Olonne, France
-
June 2018
Talk
Modern Linux malware exposed
RECON 2018, Annual Reverse Engineering and Security Conference, June 15-17, 2018, Montreal, Canada
-
June 2018
Conference
GuardION: Practical mitigation of DMA-based rowhammer attacks on ARM
DIMVA 2018, International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 28-29 June 2018, Paris, France / Also published in Lecture Notes in Computer Science, Vol.10885, Springer
Pwnie Award Nomination for Best Privilege Escalation Bug 2018
-
June 2018
Conference
POROS: Proof of data reliability for outsourced storage
SCC 2018, 6th International Workshop on Security in Cloud Computing, in conjunction with the 13th ACM Asia Conference on Computer and Communications Security (ASIACCS), June 4, 2018, Songdo, Incheon, Republic of Korea
-
June 2018
Conference
Secure and scalable multi-user searchable encryption
SCC 2018, 6th International Workshop on Security in Cloud Computing, in conjunction with the 13th ACM Asia Conference on Computer and Communications Security (ASIACCS), June 4, 2018, Songdo, Incheon, Korea
-
May 2018
Conference
On the effectiveness of the national do-not-call registries
CONPRO 2018, Workshop on Technology and Consumer Protection, Co-located with the 39th IEEE Symposium on Security and Privacy, 24 May 2018, San Fransisco, CA, USA
-
May 2018
Conference
Understanding Linux malware
S&P 2018, 39th IEEE Symposium on Security and Privacy, May 21-23, 2018, San Francisco, CA, USA
-
April 2018
Journal
Deception techniques in computer security: A research perspective
ACM Computing Surveys (CSUR), VOL.51, N°4, July 2018
-
April 2018
Conference
Exploiting explicit memory inclusion for artificial bandwidth extension
ICASSP 2018, IEEE International Conference on Acoustics, Speech and Signal Processing, April 15-20, 2018, Calgary, Alberta, Canada
-
April 2018
Conference
Efficient super-wide bandwidth extension using linear prediction based analysis-synthesis
ICASSP 2018, IEEE International Conference on Acoustics, Speech and Signal Processing, April 15-20, 2018, Calgary, Alberta, Canada
-
March 2018
Journal
JPEG-based scalable privacy protection and image data utility preservation
IET Signal Processing, 23 March 2018, ISSN: 1751-9683
-
March 2018
Conference
Framework for searchable encryption with SQL databases
CLOSER 2018, 8th International Conference on Cloud Computing and Services Science, March 19-21, 2018, Funchal, Madeira, Portugal
-
March 2018
Conference
Beyond precision and recall: Understanding uses (and misuses) of similarity hashes in binary analysis
CODASPY 2018, 8th ACM Conference on Data and Application Security and Privacy, March 19-21, 2018, Tempe, AZ, USA
-
February 2018
Conference
What you corrupt is not what you crash: Challenges in fuzzing embedded devices
NDSS 2018, Network and Distributed Systems Security Symposium, 18-21 February 2018, San Diego, CA, USA
-
February 2018
Conference
Broken fingers: On the usage of the fingerprint API in Android
NDSS 2018, SOC Network and Distributed System Security Symposium, February, 18-21, 2018, San Diego, CA, USA
-
February 2018
Conference
Avatar²: A multi-target orchestration platform
BAR 2018, Workshop on Binary Analysis Research, colocated with NDSS Symposium, 18 February 2018, San Diego, USA
-
February 2018
Thesis
Privacy protection, preserving the utility of the visual surveillance
Thesis
-
February 2018
Thesis
Environments for analyzing the security of smart objects
Thesis
-
January 2018
Report
Secure and scalable multi-User searchable encryption
Cryptology ePrint Archive: Report 2018/090
-
January 2018
Conference
Evolving Attacker Perspectives for Secure Embedded System Design
MODELSWARD 2018, 6th International Conference on Model-Driven Engineering and Software Development, 22-24 January 2018, Funchal, Madeira, Portugal
-
January 2018
Talk
When malware is packing heat
ENIGMA 2018, January 16-18, 2018, Santa Clara, CA, USA
-
January 2018
Journal
Exploring new authentication protocols for sensitive data protection on smartphones
IEEE Communications Magazine, Vol.56, N°1, January 2018
-
December 2017
Thesis
Deep learning for semantic description of visual human traits
Thesis
1er prix du Prix de Thèse TELECOM ParisTech 2018
-
December 2017
Conference
Dynamic provable data possession protocols with public verifiability and data privacy
ISPEC 2017, 13th International Conference on Information Security Practice and Experience, 13-15 December 2017, Melbourne, Australia / Also in LNCS Vol. 10701
-
December 2017
Thesis
Acoustic scene classification: contributions to fundamental and applied research
Thesis
-
December 2017
Conference
Exploitation and mitigation of authentication schemes based on device-public information
ACSAC 2017, 33rd Annual Computer Security Applications Conference, December 4-8, 2017, Orlando, FL, USA
-
November 2017
Thesis
Using web honeypots to study the attackers behavior
Thesis
-
November 2017
Thesis
New insights into loudspeaker nonlinearities: Application to acoustic echo cancellation
Thesis
-
October 2017
Conference
Evaluation of deception-based web attacks detection
MTD 2017, 4th ACM Workshop on Moving Target Defense, In conjunction with the 24th ACM Conference on Computer and Communications Security (CCS), October 30-November 3, 2017, Dallas, Texas, USA
-
October 2017
Conference
Speaker change detection using binary key modelling with contextual information
SLSP 2017, 5th International Conference on Statistical Language and Speech Processing, October 23-25, 2017, Le Mans, France / Also in Lecture Notes in Computer Science, vol.10583
-
October 2017
Report
Embedded proofs for verifiable neural networks
Cryptology ePrint Archive: Report 2017/1038
-
October 2017
Conference
A simplified 2-layer text-dependent speaker authentication system
AES 2017, 143rd International AES Convention, October 18-21, 2017, New York, USA
-
September 2017
Thesis
Measurement and monitoring of security from the perspective of a service provider
Thesis
-
September 2017
Thesis
Understanding telephony fraud as an essential step to better fight it
Thesis
Nominée au prix de thèse de Télécom ParisTech 2017
-
September 2017
Conference
Impact of bandwidth and channel variation on presentation attack detection for speaker verification
BIOSIG 2017, 16th International Conference of the Biometrics Special Interest Group, September 20-22, 2017, Darmstadt, Germany
-
September 2017
Conference
Formal specification of security guidelines for program certification
TASE 2017, 11th International Symposium on Theoretical Aspects of Software Engineering, September 13-15, 2017, Nice, France
-
September 2017
Conference
Verifiable document redacting
ESORICS 2017, European Symposium on Research in Computer Security, September 11-15, 2017, Oslo, Norway / Also Part of the Lecture Notes in Computer Science book series (LNCS, Vol. 10492)
-
September 2017
Conference
From media fears to research reality: How ready are countermeasures against speaker verification spoofing?
UK Speech Conference, 11-12 September 2017, Cambridge, UK
-
September 2017
Talk
Selected security and privacy schemes for coud computing
Invited Talk, Secure Cloud Services and Storage Workshop, NTNU, Norwegian Research Council, 10 September 2017, Oslo, Norway
-
September 2017
Thesis
Specification and automatic verification of security guidelines for program certification
Thesis
-
September 2017
Poster / Demo
ASePPI : une protection adaptative de la vie privée préservant l'intelligibilité
GRETSI 2017, XXVIe Colloque GRETSI, 5-8 septembre 2017, Juan-les-Pins, France
-
August 2017
Journal
Hybris: Robust hybrid cloud storage
ACM Transactions on Storage (TOS), Vol. 13, Issue 3, No 9
-
August 2017
Conference
Security modeling for embedded system design
GRAMSEC 2017, 4th International Workshop on Graphical Models for Security, co-located with CSF 2017, 21 August 2017, Santa Barbara, CA, United States / Also published in LNCS, Vol. 10744
-
August 2017
Conference
The I4U mega fusion and collaboration for NIST speaker recognition evaluation 2016
INTERSPEECH 2017, Annual Conference of the International Speech Communication Association, August 20-24, 2017, Stockholm, Sweden
-
August 2017
Conference
The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection
INTERSPEECH 2017, Annual Conference of the International Speech Communication Association, August 20-24, 2017, Stockholm, Sweden
-
August 2017
Conference
Extension breakdown: Security analysis of browsers extension resources control policies
USENIX 2017, 26th USENIX Security Symposium, August 16-18, 2017, Vancouver, BC, Canada
-
July 2017
Conference
Using chatbots against voice spam: Analyzing Lenny's effectiveness
SOUPS 2017, 13th Symposium on Usable Privacy and Security, July 12-14, 2017, Santa Clara, USA
-
June 2017
Journal
MCR: Structure-aware overlay-based latency-optimal greedy relay search
IEEE/ACM Transactions on Networking, Vol.25, N°5, October 2017
-
June 2017
Journal
Online-offline homomorphic signatures for polynomial functions
Eprint, 2017
-
June 2017
Poster / Demo
Evaluation of the facial makeup impact on femininity appearance based on automatic prediction
COMET 2017, 2nd Cosmetic Measurement & Testing Symposium, 6-7 Juin 2017, Cergy-Pontoise, France
-
May 2017
Conference
A Lustrum of malware network communication: Evolution and insights
S&P 2017, 37th IEEE Symposium on Security and Privacy, May 23-25, 2017, San Jose, USA
-
May 2017
Journal
Introduction to the issue on spoofing and countermeasures for automatic speaker verification
IEEE Journal of Selected Topics in Signal Processing, Vol. 11, N°4, June 2017
-
May 2017
Conference
Secure user authentication on smartphones via sensor and face recognition on short video clips
GPC 2017, 12th International Conference on Green, Pervasive, and Cloud Computing, May 11-14, Cetara, Italy / Also published in Lecture Notes in Computer Science, vol 10232/2017
-
April 2017
Conference
SoK: Fraud in telephony networks
EUROS&P 2017, 2nd IEEE European Symposium on Security and Privacy, April 26-28, 2017, Paris, France
-
April 2017
Journal
Biometrics: in search of identity and security: (Q & A)
IEEE Multimedia, Vol. PP, N°99, June 2017
-
April 2017
Conference
The IST-EURECOM light field face database
IWBF 2017, 5th International Workshop on Biometrics and Forensics, 4-5 April 2017, Coventry, UK
-
April 2017
Conference
Integrating facial makeup detection into multimodal biometric user verification system
IWBF 2017, 5th International Workshop on Biometrics and Forensics, 4-5 April 2017, Coventry, UK
-
April 2017
Conference
Attacks landscape in the dark side of the web
SAC 2017, 32nd Annual ACM SIGAPP Symposium on Applied Computing, April 4-6, 2017, Marrakech, Morocco
Best Paper Award
-
April 2017
Conference
The onions have eyes: A comprehensive structure and privacy analysis of tor hidden services
WWW 2017, 26th International World Wide Web Conférence, April 3-7, 2017, Perth, Australia
-
April 2017
Conference
Reconciling security and functional requirements in multi-tenant clouds
SCC 2017, 5th International Workshop on Security in Cloud Copmuting, in conjunction with ASIACCS 2017, 2 April 2017, Abu Dhabi, United Arab Emirates
-
March 2017
Conference
Artificial bandwidth extension using the constant Q transform
ICASSP 2017, 42nd IEEE International Conference on Acoustics, Speech and Signal Processing, March 5-9, 2017, New Orleans, USA
-
March 2017
Conference
RedDots replayed: A new replay spoofing attack corpus for text-dependent speaker verification research
ICASSP 2017, 42nd IEEE International Conference on Acoustics, Speech and Signal Processing, March 5-9, 2017, New Orleans, USA
-
February 2017
Journal
Constant Q cepstral coefficients: A spoofing countermeasure for automatic Speaker verification
Computer Speech & Language, 20 February 2017
Best Paper Award
-
February 2017
Conference
Tracking dependent information flows
ICISSP 2017, 3rd International Conference on Information Systems Security and Privacy, February 19-21, 2017, Porto, Portugal
-
February 2017
Conference
Security-aware modeling and analysis for HW/SW partitioning
MODELSWARD 2017, 5th International Conference on Model-Driven Engineering and Software Development, 19-21 February 2017, Porto, Portugal
-
February 2017
Talk
A systemization of fraud in telephony networks, illustrated by a study of over-the-top bypass
SSL 2017, Security Seminar at Loria, 7 February 2017, Nancy, France
-
January 2017
Journal
FIRE: Fast Iris REcognition on mobile phones by combining colour and texture features
Pattern Recognition Letters, February 2017
-
January 2017
Conference
Videos versus still images: Asymmetric sensor pattern noise comparison on mobile phones
EI 2017, Electronic Imaging, January 29-February 2nd, 2017, Burlingame, USA
-
January 2017
Conference
Formal specification and verification of security guidelines
PRDC 2017, IEEE Pacific Rim International Symposium on Dependable Computing, January 22-25, 2017, Christchurch, New Zealand
-
January 2017
HDR
Security and privacy for emerging technologies
Habilitation à diriger des recherches (French qualification for conducting Phd theses)
-
January 2017
Talk
Spoofing and countermeasures for automatic speaker verification
WSB 2017, IEEE SPS Winter School on Security and Privacy Issues in Biometrics, January 7-12, 2017, Saadiyat Island, Abu Dhabi
-
December 2016
Conference
Further optimisations of constant Q cepstral processing for integrated utterance verification and text-dependent speaker verification
SLT 2016, IEEE Workshop on Spoken Language Technology, December 13-16, 2016, San Juan, Puerto Rico
-
December 2016
Conference
The I4U submission to the 2016 Nist speaker recognition evaluation
NIST SRE 2016 Workshop, 11-12 December 2016, San Diego, California, USA
-
December 2016
Journal
Leader set selection for low-latency geo-replicated state machine
IEEE Transactions on Parallel and Distributed Systems, Vol. 28, N°7, July 2017
-
December 2016
Conference
Fusing iris colour and texture information for fast iris recognition on mobile devices
ICPR 2016, 23rd International Conference on Pattern Recognition, 4-8 December 2016, Cancun, Mexico
-
December 2016
Journal
Eye movement analysis for human authentication: Critical survey
Pattern Recognition Letters, Volume 84, 1 December 2016
-
November 2016
Conference
EURECOM submission to the Albayzin 2016 speaker diarization evaluation
IBERSPEECH 2016, November 23-25, 2016, Lisbon, Portugal
Best Albayzin Evaluation System Award - Speaker Diarization evaluation (ex-aecquo)
-
November 2016
Poster / Demo
EURECOM submission to the Albayzin 2016 speaker diarization evaluation
IBERSPEECH 2016, November 23-25, 2016, Lisbon, Portugal
-
November 2016
Conference
XFT: Practical fault tolerance beyond crashes
OSDI 2016, 12th USENIX Symposium on Operating Systems Design and Implementation, November 1-4, 2016, Savannah, GA, USA
-
October 2016
Talk
Analyzing thousands of firmware images and a few physical devices. What?s next?
TRUSTED 2016, 6th International Workshop on Trustworthy Embedded Devices, Co-located with ACM SIGSAC 2016, October 28th, 2016, Vienna, Austria
-
October 2016
Conference
Over-the-top bypass: Study of a recent telephony fraud
CCS 2016, 23rd ACM conference on Computer and communications security, October 24-28, 2016, Vienna, Austria
-
October 2016
Thesis
On-line speaker diarization for smart objects
Thesis
-
October 2016
Conference
Message-locked proofs of retrievability with secure deduplication
CCSW 2016, 8th ACM Cloud Computing Security Workshop in Conjunction with CCS 2016, 28 October 2016, Vienna, Austria
-
October 2016
Conference
PhishEye: Live monitoring of sandboxed phishing kits
CCS 2016, 23rd ACM conference on Computer and communications security, October 24-28, 2016, Vienna, Austria
ACM Europe Student Best Paper Award
-
October 2016
Poster / Demo
Deep learning for estimation of human semantic traits
Journée des doctorants Orange 2016
Best Poster Award (for Orange)
-
September 2016
Conference
Uses and abuses of server-side requests
RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses, September 19-21, 2016, Evry, France / Also published in LNCS, Vol. 9854/2016
-
September 2016
Conference
Taming transactions: Towards hardware-assisted control flow integrity using transactional memory
RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses, September 19-21, 2016, Evry, France / Also published in LNCS, Vol. 9854
-
September 2016
Conference
The open-set problem in acoustic scene classification
IWAENC 2016, 15th International Workshop on Acoustic Signal Enhancement, September 13-16, 2016, Xi'an, China
-
September 2016
Conference
Security guidelines: Requirements engineering for verifying code quality
ESPRE 2016, 3rd International Workshop on Evolving Security and Privacy Requirements Engineering, September 12th, 2016, Beijing, China, co-located with the 24th IEEE International Requirements Engineering Conference
-
September 2016
Conference
Articulation rate filtering of CQCC features for automatic speaker verification
INTERSPEECH 2016, Annual Conference of the International Speech Communication Association, September 8-12, 2016, San Francisco, USA
-
September 2016
Conference
On the influence of text content on pass-phrase strength for short-duration text-dependent automatic speaker authentication
INTERSPEECH 2016, Annual Conference of the International Speech Communication Association, September 8-12, 2016, San Francisco, USA
-
September 2016
Conference
Integrated spoofing countermeasures and automatic speaker verification: an evaluation on ASVspoof 2015
INTERSPEECH 2016, Annual Conference of the International Speech Communication Association, September 8-12, 2016, San Francisco, USA
-
September 2016
Conference
Utterance verification for text-dependent speaker recognition: a comparative assessment using the RedDots corpus
INTERSPEECH 2016, Annual Conference of the International Speech Communication Association, September 8-12, 2016, San Francisco, USA
-
September 2016
Conference
Acoustic scene classification using convolutional neural networks
DCASE 2016, Workshop on Detection and Classification of Acoustic Scenes and Events, September 3rd, 2016, Budapest, Hungary
-
August 2016
Conference
Impact of multi-focused images on recognition of soft biometric traits
OPTICS+PHOTONICS 2016, SPIE Optical Engineering + Applications, 28 August-1 September 2016, San Diego, USA
-
August 2016
Patent
Spoken pass-phrase suitability determination
Patent US 2018/0060557 A1, 1st March 2018
-
August 2016
Conference
Micro-virtualization memory tracing to detect and prevent spraying attacks
USENIX 2016, 25th USENIX Security Symposium, August 10-12, 2016, Austin, TX, USA
-
July 2016
Report
Further optimisations of constant Q cepstral processing for integrated utterance verification and text-dependent speaker verification
Research Report RR-16-322, Accepted to the IEEE Workshop on Spoken Language Technology (SLT), December 13-16, 2016, San Juan, Puerto Rico
-
July 2016
Conference
Subverting operating system properties through evolutionary DKOM attacks
DIMVA 2016, 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 7-8, 2016, San Sebastian, Spain / Also published in LNCS, Vol. 9721/2016
-
July 2016
Conference
RAMBO: Run-time packer analysis with multiple branch observation
DIMVA 2016, 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 7-8, 2016, San Sebastian, Spain / Also published in LNCS, Vol. 9721/2016
-
July 2016
Conference
Google dorks: analysis, creation, and new defenses
DIMVA 2016, 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 7-8, 2016, San Sebastian, Spain / Also published in LNCS, Vol 9721/2016
-
June 2016
Journal
An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks
Security and Communication Networks, Wiley, Vol.9; N°15, October 2016
-
June 2016
Conference
Measuring the role of greylisting and nolisting in fighting spam
DSN 2016, 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, June 28-July 1st, 2016, Toulouse, France
-
June 2016
Conference
Apparent age estimation from face images combining general and children-specialized deep learning models
CVPRW 2016, 29th IEEE Conference on Computer Vision and Pattern Recognition Workshops, June 26th-July 1st, 2016, Las Vegas, USA
Best Paper Award and 1st Place Award
-
June 2016
Conference
A new feature for automatic speaker verification anti-spoofing: Constant Q cepstral coefficients
ODYSSEY 2016, The Speaker and Language Recognition Workshop, June 21-24, 2016, Bilbao, Spain
Best Paper Award
-
June 2016
Conference
Semi-supervised on-line speaker diarization for meeting data with incremental maximum a-posteriori adaptation
ODYSSEY 2016, The Speaker and Language Recognition Workshop, June 21-24, 2016, Bilbao, Spain
-
June 2016
Thesis
Verifiability and accountability in the Cloud
Thesis
-
June 2016
Journal
HEAP: Reliable assessment of BGP hijacking attacks
IEEE Journal on Selected Areas in Communications, Vol. 34, N°6, June 2016,
-
May 2016
Conference
Efficient techniques for publicly verifiable delegation of computation
ASIACCS 2016, 11th ACM Asia Conference on Computer and Communications Security, May 30-June 3, 2016, Xi'ian, China
-
May 2016
Conference
ROPMEMU: A framework for the analysis of complex code-reuse attacks
ASIACCS 2016, 11th ACM Asia Conference on Computer and Communications Security, May 30-June 3, 2016, Xi'ian, China
-
May 2016
Report
MobileAppScrutinator: A simple yet efficient dynamic analysis approach for detecting privacy leaks across mobile OSs
Submitted on May 26, 2016
-
April 2016
Conference
Automatic extraction of indicators of compromise for web applications
WWW 2016, 25th International World Wide Web Conference, April 11-15, 2016, Montreal, Canada
-
March 2016
Conference
Behind IP prefix overlaps in the BGP routing table
PAM 2016, 17th International Conference, Heraklion, Greece, also published in Chapter "Passive and Active Measurement", LNCS, Vol. 961, March 2016
-
March 2016
Invited paper in a conference
Trust, but verify: Why and how to establish trust in embedded devices
DATE 2016, Design, Automation and Test in Europe, March 14-18, 2016, Dresden, Germany
-
February 2016
Thesis
Deduplication of encrypted data in cloud computing
Thesis
-
February 2016
Thesis
Design and Development of multi-biometric systems
Thesis
Premio Tesi di Dottorato 2015/2016
-
February 2016
Conference
Leakage-resilient layout randomization for mobile devices
NDSS 2016, Network and Distributed System Security Symposium, 21-24 February 2016, San Diego, CA, USA
-
February 2016
Conference
SysML models and model transformation for security
MODELSWARD 2016, Conference on Model-Driven Engineering and Software Development, 19-21 February 2016, Rome, Italy
-
February 2016
Conference
Automatic face anonymization in visual data: Are we really well protected?
EI 2016, ISAT International Symposium on Electronic Imaging, February 14-18, 2016, San Francisco, USA
-
January 2016
Report
A new feature for automatic speaker verification anti-spoofing: Constant Q cepstral coefficients
Research Report RR-16-313
-
January 2016
Journal
TREDISEC: Towards realizing a truly secure and trustworthy cloud
ERCIM News, Special theme: Tackling Big Data in the Life Sciences, N°104, January 2016
-
December 2015
Tutorial
Spoofing and anti-spoofing: A shared view of speaker verification, speech synthesis and voice conversion
APSIPA ASC 2015, Asia-Pacific Signal and Information Processing Association - Annual Summit and Conference, Speech Synthesis and Voice Conversion Tutorial, December 16-19, 2015, Hong Kong, Hong Kong
-
December 2015
HDR
Advances in the design and engineering of secure distributed systems
Habilitation à diriger des recherches (French qualification for conducting Phd theses)
-
December 2015
Conference
TREDISEC: Trust-aware reliable and distributed information security in the cloud
E-DEMOCRACY 2015, 6th International Conference on e-Democracy, December 10-11, 2015, Athens, Greece
-
December 2015
Conference
PUDA - Privacy and unforgeability for data aggregation
CANS 2015, 14th International Conference on Cryptology and Network Security, 8-12 December 2015, Morocco, Marrakesh / Also published in LNCS, Volume 9476/2015
-
December 2015
Conference
PIE: Parser identification in embedded systems
ACSAC 2015, Annual Computer Security Applications Conference, December 7-11, 2015, Los Angeles, CA, USA
-
December 2015
Report
Security for vehicular DTNs
Research Report RR-16-310
-
November 2015
Journal
ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge
IEEE Signal Processing Society Speech and Language Technical Committee Newsletter (SLTC Newsletter), 20 November 2015
-
November 2015
Poster / Demo
Efficient privacy protection in video surveillance by StegoScrambling
WIFS 2015, 7th IEEE International Workshop on Information Forensics and Security, November 16-19, 2015, Rome, Italy
-
November 2015
Report
Data security and privacy - Threats model and state of the art
Research Report RR-16-309
-
November 2015
Conference
Demystifying the IP blackspace
RAID 2015, 18th International Symposium on Research in Attacks, Intrusions and Defenses, November 2-4, 2015, Kyoto, Japan / Also published in LNCS 9404, Book Chapter of "Research in Attacks, Intrusions, and Defenses"
-
November 2015
Conference
Reverse engineering Intel complex addressing using performance counters
RAID 2015, 18th International Symposium on Research in Attacks, Intrusions and Defenses, November 2-4, 2015, Kyoto, Japan / Also published in LNCS, Volume 9404/2015
-
October 2015
Conference
Dissecting ubuntuOne: Autopsy of a global-scale personal Cloud back-end
IMC 2015, ACM SIGCOMM Internet Measurement Conference, October 28-30, 2015, Tokyo, Japan
Best Dataset Award
-
October 2015
Thesis
Techniques for efficient and fault-tolerant geo-replication
Thesis
-
October 2015
Conference
Keynote speech 1: Bag of visual soft biometrics for person identification: New trends and challenges
ICSIPA 2015, IEEE International Conference on Signal and Image Processing Applications, 19-21 October 2015, Kuala Lumpur, Malaysia
-
October 2015
Conference
Acoustic context recognition using local binary pattern codebooks
WASPAA 2015, IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, 18-21 October 2015, New Paltz, NY, USA
-
October 2015
Conference
An alternative view of loudspeaker nonlinearities using the Hilbert-huang transform
WASPAA 2015, IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, 18-21 October 2015, New Paltz, NY, USA
Nominee for Best Student Paper Award
-
October 2015
Thesis
Towards uncovering BGP hijacking attacks
Thesis
-
October 2015
Thesis
Privacy preserving data collection and analysis
Thesis
-
September 2015
HDR
Web application security
Habilitation à diriger des recherches (French qualification for conducting Phd theses)
-
September 2015
Conference
All your cluster-grids are belong to us: Monitoring the (in)security of infrastructure monitoring systems
SPC 2015, 1st IEEE Workshop on Security and Privacy in the Cloud, 30 September 2015, Florence, Italy
-
September 2015
Conference
Publicly verifiable conjunctive keyword search in outsourced databases
SPC 2015, 1st IEEE Workshop on Security and Privacy in the Cloud, 30 September 2015, Florence, Italy
-
September 2015
Poster / Demo
Analyzing cacheable traffic for FTTH users using Hadoop
ICN 2015, 2nd International ACM Conference on Information-Centric Networking, September 30-October 2, 2015, San Fransisco, USA
-
September 2015
Thesis
Advances in modern malware and memory analysis
Thesis
-
September 2015
Thesis
Large scale security analysis of embedded devices' firmware
Thesis
Nominé au prix de thèse de Télécom ParisTech 2016
-
September 2015
Conference
PerfectDedup: Secure data deduplication
DPM 2015, 10th International Workshop on Data Privacy Management, September 21-22, 2015, Vienna, Austria
-
September 2015
Journal
Multimodal authentication on Smartphones: combining iris and sensor recognition for a double check of user identity
Pattern Recognition Letters, Elsevier, September 2015, ISSN: 0167-8655
EAB Biometrics Research and Industry Award 2016
-
September 2015
Conference
Toward a methodology for unified verification of hardware/software co-designs
PROOFS 2015, Security Proofs for Embedded Systems, 17 September 2015, Saint-Malo, France / To be published in Journal of Cryptographic Engineering (JCEN), Springer
-
September 2015
Thesis
A causal approach to the study of telecommunication networks
Thesis
-
September 2015
Conference
Privacy protection filter using StegoScrambling in video surveillance
MEDIAEVAL 2015, MediaEval Benchmarking Initiative for Multimedia Evaluation Workshop, 14-15 September 2015, Wurzen, Saxony, Germany
-
September 2015
Poster / Demo
Overview of the MediaEval 2015 drone protect task
MEDIAEVAL 2015, MediaEval Benchmarking Initiative for Multimedia Evaluation Workshop, 14-15 September 2015, Wurzen, Saxony, Germany
-
September 2015
Conference
ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge
INTERSPEECH 2015, Automatic Speaker Verification Spoofing and Countermeasures Challenge, colocated with INTERSPEECH 2015, September 6-10, 2015, Dresden, Germany
-
September 2015
Journal
Biometrics systems under spoofing attack: an evaluation methodology and lessons learned
IEEE Signal Processing Magazine, Vol. 32, N°5, September 2015
-
September 2015
Journal
Guest Editorial - Special Issue on biometric security and privacy
IEEE Signal Processing Magazine, September 2015, Volume 32, N° 5
-
August 2015
Conference
Phone adaptive training for short-duration speaker verification
EUSIPCO 2015, 23rd European Signal Processing Conference, August 31st-September 4th, 2015, Nice, France
-
August 2015
Conference
Acoustic context recognition for mobile devices using a reduced complexity SVM
EUSIPCO 2015, 23rd European Signal Processing Conference, August 31st-September 4th, 2015, Nice, France
-
August 2015
Conference
Adaptive and online speaker diarization for meeting data
EUSIPCO 2015, 23rd European Signal Processing Conference, August 31st-September 4th, 2015, Nice, France
-
August 2015
Conference
Improved binary key speaker diarization system
EUSIPCO 2015, 23rd European Signal Processing Conference, 31 August-4 September 2015, Nice, France
-
August 2015
Report
Multi-user searchable encryption in the cloud
Research Report RR-15-306
-
August 2015
Conference
Combining hardwaremetry and biometry for human authentication via smartphones
ICIAP 2015, 18th International Conference, Genoa, Italy, September 7-11, 2015 / Also published in LNCS, Volume 9280/2015
-
August 2015
Conference
Towards a new architecture for autonomous data collection
ISPRS 2015, International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Volume XL-3/W3, 2015, ISPRS Geospatial Week 2015, 28 September-3 October 2015, La Grande Motte, France
-
August 2015
Talk
Privacy and verifiability for data storage in cloud computing
IFIP Summer School 2015, Keynote speech, 16-21 August 2015, Edinburgh, UK
-
August 2015
Conference
In the compression hornet's nest: A security study of data compression in network services
USENIX 2015, 24th USENIX Security Symposium, August 12-14, 2015, Washington DC, USA
-
August 2015
Conference
Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence
USENIX 2015, 24th Usenix Security Symposium, August 12-14, 2015, Washington DC, USA
-
August 2015
Conference
The impact of GPU-assisted malware on memory forensics: A case study
DFRWS 2015, Annual Digital Forensics Research Conference, Philadelphia, USA
-
August 2015
Thesis
Development of novel binary analysis techniques for security applications
Thesis
-
July 2015
Conference
C5: Cross-cores cache covert channel
DIMVA 2015, Detection of Intrusions and Malware, and Vulnerability Assessment, July 9-10, 2015, Milano, Italy
Best Paper Award
-
July 2015
Conference
Cutting the gordian knot: A look under the hood of ransomware attacks
DIMVA 2015, 12th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 9-10, 2015, Milan, Italy
-
July 2015
Conference
The role of cloud services in malicious software: Trends and insights
DIMVA 2015, 12th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 9-10, 2015, Milan, Italy
-
July 2015
Talk
Weighted and restricted Deegan-Packel power indices
SING 11-GTM 2015, European Meeting on Game Theory, 8-10 July 2015, St Petersburg, Russia
-
July 2015
Conference
Methodological approach to security awareness program
CyberSecurity for the Next Generation 2013 Conference, 10-12 December 2013, Milano, Italy
-
July 2015
Book
Footstep recognition
Book chapter in "Encyclopedia of Biometrics", Springer
-
June 2015
Conference
From Kinect video to realistic and animatable Mpeg-4 face model: A complete framework
HOT 3D 2015, 6th IEEE International Workshop on Hot Topics in 3D (ICME 2015), 29 June 2015, Torino, Italy
-
June 2015
Report
PUDA - Privacy and Unforgeability for Data Aggregation
Cryptology ePrint Archive: Report 2015/562
-
June 2015
Conference
How many planet-wide leaders should there be?
DCC 2015, 3rd Workshop on Distributed Cloud Computing, co-located with ACM SIGMETRICS 2015, June 15th, Portland, USA
-
May 2015
Journal
Spatial and temporal variations of feature tracks for crowd behavior analysis
Journal on Multimodal User Interfaces, May 2015, Springer
-
May 2015
Talk
Autonomous drones for disasters management: Safety and security verifications
AT-RASC 2015, 1st URSI Atlantic Radio Science Conference, 18-22 May 2015, Gran Canaria, Canary Islands, Spain
-
May 2015
Conference
SoK: Deep packer inspection: A longitudinal study of the complexity of run-time packers
SSP 2015, IEEE Symposium on Security and Privacy, May 18-20, 2015, San Jose, CA, USA
-
May 2015
Patent
Accoustic context recognition using local binary pattern method and apparatus
Application N°/Patent N°: 15290128.6 - 1901 Applicant / Proprietor: NXP B.V.
-
May 2015
Journal
Quelques épreuves du challenge sécurité "Trust the Future"
MISC, Multi-System & Internet Cookbook, N°79, Mai-Juin 2015
-
April 2015
Talk
Analyzing security properties at the interface between HW & SW
Première Journée des Doctorants du Labex UCN@Sophia, 24 Avril 2014, Sophia-Antipolis, France
-
April 2015
Talk
Mathematical tools for smart-grids
Première Journée des Doctorants du Labex UCN@Sophia, 24 Avril 2014, Sophia-Antipolis, France
-
April 2015
Conference
Non-linear acoustic echo cancellation using empirical mode decomposition
ICASSP 2015, 40th IEEE International Conference on Acoustics, Speech and Signal Processing, 19-24 April 2015, Brisbane, Australia
-
April 2015
Conference
Investigating the nature of routing anomalies: Closing in on subprefix hijacking attacks
TMA 2015, 7th International Workshop on Traffic Monitoring and Analysis, Barcelona, Spain, April 21-24, 2015 / Also published as Book chapter in "Traffic Monitoring and Analysis", LNCS Volume 9053/2015, April 2015
Best Paper Award
-
April 2015
Journal
Hypervisor-based malware protection with AccessMiner
Computers & Security, 9 April 2015
-
April 2015
HDR
Now who's talking? Research in speech and audio processing
Habilitation à diriger des recherches (French qualification for conducting Phd theses)
-
April 2015
Report
Learned vs. hand-crafted features for pedestrian gender recognition
Research Report RR-15-302
-
April 2015
Report
Publicly verifiable keyword search in outsourced databases
Research Report RR-15-303
-
April 2015
Journal
Guest Editorial special issue on biometric spoofing and countermeasures
IEEE Transactions on Information Forensics and Security, Volume 10, N°4, April 2015, ISSN: 1556-6013
-
February 2015
Conference
SysML-Sec: A model driven approach for designing safe and secure systems
MODELSWARD 2015, 3rd International Conference on Model-Driven Engineering and Software Development, Special session on Security and Privacy in Model Based Engineering, 9-11 February 2015, Angers, France
-
February 2015
Conference
Designing safe and secure embedded and cyber-physical systems with SysML-sec
MODELSWARD 2015, 3rd International Conference on Model-Driven Engineering and Software Development, 9-11 February 2015, Angers, France / Also published in Communications in Computer and Information Science, Vol. 580
-
February 2015
Conference
Mind your blocks: On the stealthiness of malicious BGP hijacks
NDSS 2015, Network and Distributed System Security Symposium, 8-11 February 2015, San Diego, California, USA
-
January 2015
Talk
Personal information on social networks: Incentives for data release and fair monetization
UCN@Sophia Labex Seminar, 8 January 2015, Sophia-Antipolis, France
-
January 2015
Journal
Améliorer la sécurité et la sûreté de fonctionnement par l'ingénierie de système dirigée par les modèles
Revue de l'Electricité et de l'Electronique (REE), January 2015, N°5/2014
-
January 2015
Journal
Reversible image data hiding with contrast enhancement
IEEE Signal Processing Letters, Vol.22, N°1, January 2015
-
December 2014
Report
ASVspoof 2015: Automatic speaker verification spoofing and countermeasures challenge evaluation plan
ASVspoof 2015,Automatic Speaker Verification Spoofing and Countermeasures Challenge, Report, December 2014
-
December 2014
Thesis
Detection, analysis and mitigation of malicious BGP hijack attacks
Thesis
-
December 2014
Conference
Erasure-coded byzantine storage with separate metadata
OPODIS 2014, 18th International Conference on Principles of Distributed Systems, December 16-19, 2014, Cortina d?Ampezzo, Italy / Also published in LNCS, Vol. 8878/2014
-
December 2014
Journal
Spatio-temporal crowd density model in a human detection and tracking framework
Signal Processing: Image Communication, 2014
-
December 2014
Thesis
Spoofing and countermeasures for biometric speaker verification
Thesis
-
December 2014
Conference
Highlight presentation: Geo-replication with arbitrary faults
MW4NG 2014, 9th Workshop on Middleware for Next Generation Internet Computing, 15th International Middleware Conference 2014, December 8-12, 2014, Bordeaux, France
-
December 2014
Conference
A Cloud adoption risk assessment model
CLASP 2014, International Workshop on Advances in Cloud Computing Legislation, Accountability, Security and Privacy, In conjunction with the 7th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2014), 8-11 December 2014, London, United Kingdom
-
December 2014
Journal
Towards the verification and validation of software security properties using static code analysis
Computer Science: Theory and Application, Volume 2, N°2, 2014, ISSN: 2336-0984
-
November 2014
Conference
Composition ubiquitaire d'applications pour la remontée d'alerte dans un EHPAD pour des aides-soignantes de nuit
e-PSP 2014, Colloque annuel d'e-Plateformes de Santé de Proximité, 27 Novembre 2014, Biot, France
-
November 2014
Thesis
Security assurance of web services through digital security certification
Thesis
-
November 2014
Conference
Hybris: Robust hybrid cloud storage
SOCC 2014, 5th annual ACM Symposium on Cloud Computing, November 3-5, Seattle, WA, USA
-
October 2014
Conference
Scrambling faces for privacy protection using background self-similarities
ICIP 2014, IEEE International Conference on Image Processing, October 27-30, 2014, Paris, France
-
October 2014
Journal
Spoofing and countermeasures for speaker verification: a survey
Elsevier Speech Communications, 2014
-
October 2014
Conference
Private and dynamic time-series data aggregation with trust relaxation
CANS 2014, 13th International Conference on Cryptology and Network Security, 22-24 October 2014, Heraklion, Crete, Greece / Also published in Lecture Notes in Computer Science, Volume 8813/2014
-
October 2014
Conference
Analysis of security of embedded devices
SECURE 2014, 18th Conference on Telecommunications and IT security, October 21-23, 2014, Warsaw, Poland
-
October 2014
Conference
Privacy protection filter using shape and color cues
MEDIAEVAL 2014, MediaEval Benchmarking Initiative for Multimedia Evaluation Workshop, October 16-17, 2014, Barcelona, Spain
-
September 2014
Conference
Separating data and control: Asynchronous BFT storage with 2 t + 1 data replicas
SSS 2014, 16th International Symposium on Stabilization, Safety, and Security of Distributed Systems, September 28-October 1, Paderborn, Germany / Also published in LNCS Vol. 8756/2014
-
September 2014
Journal
Towards crowd density-aware video surveillance applications
Information Fusion, September 2014, ISSN: 1566-2535
-
September 2014
Conference
Re-assessing the threat of replay spoofing attacks against automatic speaker verification
BIOSIG 2014, 13th International Conference of the Biometrics Special Interest Group, 10-12 September 2014, Darmstadt, Germany
-
September 2014
Conference
A-PPL: An accountability policy language
DPM 2014, 9th International Workshop on Data Privacy Management, September 10, 2014, Wroclaw, Poland
-
September 2014
Conference
TimeAudit: Blind dissection and analysis of transaction delays in enterprise networks
ITC 2014, 26th International Teletraffic Congress, September 9th-11th, 2014, Karlskrona, Sweden
-
September 2014
Conference
Characterisation and modelling of non-linear loudspeakers
IWAENC 2014, 44th International Workshop on Acoustic Signal Enhancement, September 8-11, 2014, Antibes-Juan Les Pins, France
-
September 2014
Conference
StealthGuard: Proofs of retrievability with hidden watchdogs
ESORICS 2014, 19th European Symposium on Research in Computer Security, September 7-11, 2014, Wroclaw, Poland
-
September 2014
Report
Efficient techniques for publicly verifiable delegation of computation
Research Report RR-14-295
-
September 2014
Conference
A quantitative analysis of common criteria certification practice
TRUSTBUS 2014, 11th International Conference on Trust, Privacy, and Security in Digital Business, September 2-3, 2014, Munich, Germany / Also published in Lecture Notes in Computer Science, Volume 8647/2014
-
August 2014
Conference
Privacy preserving delegated word search in the Cloud
SECRYPT 2014, 11th International conference on Security and Cryptography, 28-30 August, 2014, Vienna, Austria
-
August 2014
Conference
Sparse feature tracking for crowd change detection and event recognition
ICPR 2014, 22nd International Conference on Pattern Recognition, 24-28 August 2014, Stockholm, Sweden
-
August 2014
Conference
A large scale analysis of the security of embedded firmwares
USENIX Security 2014, 23rd USENIX Security Symposium, August 20-22, 2014, San Diego, USA
-
August 2014
Conference
Through the looking-glass, and what Eve found there
WOOT 2014, 8th USENIX Workshop on Offensive Technologies, 19 August 2014, San Diego, CA, USA
-
August 2014
Conference
Autonomous drones for assisting rescue services within the context of natural disasters
URSI GASS 2014, 31st URSI General Assembly and Scientific Symposium, 2014, 16-23 August 2014, Beijing, China
-
August 2014
Report
A-PPL: An accountability policy language
Research Report RR-14-294
-
July 2014
Journal
KinectFaceDB: A Kinect database for face recognition
IEEE Transactions on Systems, Man, and Cybernetics: Systems
-
July 2014
Conference
Short paper: A dangerous 'Pyrotechnic Composition': Fireworks, embedded wireless and insecurity-by-design
WISEC 2014, 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 23-25 July 2014, Oxford, United Kingdom
-
July 2014
Conference
Static code analysis for software security verification: Problems and approaches
STPSA 2014, 9th IEEE International Workshop on Security, Trust and Privacy for Software Applications, in COMPSAC 2014, 21-25 July 2014, Västerås, Sweden
-
July 2014
Thesis
Size-based disciplines for job scheduling in data-intensive scalable computing systems
Thesis
-
June 2014
Book
Anti-spoofing: Voice conversion
Book chapter in "Encyclopedia of Biometrics", 2nd Edition, Springer, Stan Z. Li and Anil K. Jain, Eds, September 9th, 2014
-
June 2014
Book
Speaker recognition anti-spoofing
Book Chapter in "Handbook of Biometric Anti-spoofing", Springer, S. Marcel, S. Li and M. Nixon, Eds., 2014
-
June 2014
Thesis
Design and implementation of a distributed back-up system
Thesis
-
June 2014
Conference
Privacy preserving statistics in the smart grid
DASEC 2014, 1st International Workshop for Big Analytics for Security, in conjunction with ICDCS, 30 June-3 July 2014, Madrid, Spain
-
June 2014
Conference
Large scale data analysis for system security
Invited Keynote Speech at CISIS, 7th International Conference on Computational Intelligence in Security for Information Systems, 25-27 June 2014, Bilbao, Spain
-
June 2014
Conference
Drone humanitaire : état de l'art et réflexions
Actes du colloque scientifique francophone "Drones et moyens légers téléporté d'observation : recherche, développement, applications : l'état de l'art", 24-26 juin 2014, Montpellier, France
-
June 2014
Report
StealthGuard: Proofs of retrievability with hidden watchdogs
Research Report RR-13-280
-
June 2014
Conference
Optical delusions: A study of malicious QR codes in the wild
DSN 2014, 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, June 23-26, 2014, Atlanta, GA, USA
-
June 2014
Journal
Resource monitoring for the detection of parasite P2P botnets
Computer Networks, June 2014, Elsevier, ISSN: 1389-1286
-
June 2014
Book
Anti-spoofing: voice databases
Book Chapter in "Handbook of Biometric Anti-spoofing", Springer, S. Marcel, S. Li and M. Nixon, Eds., 2014
-
June 2014
Journal
Block-level de-duplication with encrypted data
Open Journal of Cloud Computing (OJCC), 2014, ISSN: 2199-1987,
-
June 2014
Conference
A P2P based usage control enforcement scheme resilient to re-injection attacks
WOWMOM 2014, IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 16-19 June 2014, Sydney, Australia
-
June 2014
Conference
Short-duration speaker modelling with phone adaptive training
ODYSSEY 2014, Speaker and Language Recognition Workshop, June 16-19, 2014, Joensuu, Finland
-
June 2014
Conference
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment
ASIACCS 2014, 9th ACM Symposium on Information, Computer and Communications Security, June 4-6, 2014, Kyoto, Japan
-
June 2014
Conference
Shades of gray: A closer look at emails in the gray area
ASIACCS 2014, 9th ACM Symposium on Information, Computer and Communications Security, June 4-6, 2014, Kyoto, Japan
-
June 2014
Conference
On the effectiveness of risk prediction based on users browsing behavior
ASIACCS 2014, 9th ACM Symposium on Information, Computer and Communications Security, June 4-6, 2014, Kyoto, Japan
-
June 2014
Journal
On the design of an intelligent sensor network for flash flood monitoring, diagnosis and management in urban areas
Procedia Computer Science, Volume 32, 2014, ISSN: 1877-0509
-
May 2014
Journal
On the design of an intelligent sensor network for flash flood monitoring, diagnosis and management in urban areas position paper
Procedia Computer Science, Volume 32, 2014
-
May 2014
Report
WifiLeaks: Underestimated privacy implications of the access wifi state Android permission
Research Report N°8539, May 2014
-
May 2014
Conference
Improved security requirements engineering using knowledge representation
SAR-SSI 2014, 9ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, May 13-16, 2014, Saint-Germain-Au-Mont-D'Or, France
-
May 2014
Conference
A comparison of different loudspeaker models to empirically estimated non-linearities
HSCMA 2014, 4th Joint Workshop on Hands-free Speech Communication and Microphone Arrays, May 12-14, 2014, Nancy, France
-
May 2014
Conference
Evasion and obfuscation in automatic speaker verification
ICASSP 2014, IEEE International Conference on Acoustics, Speech, and Signal Processing, May 4-9, 2014, Firenze, Italy
-
April 2014
Book
Secure deduplication with encrypted data for cloud storage
Book chapter 16 in "Delivery and Adoption of Cloud Computing Services in Contemporary Organizations", IGI Global, March 2015, ISBN: 9781466682108, 519 p.
-
April 2014
Book
Recognizing face images with disguise variations
Book Chapter in "Face Recognition in Adverse Conditions", IGI Global Book Series in Computational Intelligence and Robotics (ACIR); April 2014; Eds: De Marsico, Maria; Nappi, Michele; Tistarelli, Massimo; ISBN: 978-1466659667
-
April 2014
Journal
3D assisted face recognition: Dealing with expression variations
IEEE Transactions on Information Forensics and Security, Volume 9, N°5, May 2014, ISSN: 1556-6013
-
April 2014
Thesis
Spoofing and disguise variations in face recognition
Thesis
-
April 2014
Conference
From regulatory obligations to enforceable accountability policies in the Cloud
CLOSER 2014, International Conference and Services Sciences, April 3-5, 2014, Barcelona, Spain
-
April 2014
Conference
A cloud accountability policy representation framework
CLOSER 2014, 4th International Conference on Cloud Computing and Services Science, 3-5 April 2014, Barcelona, Spain
-
March 2014
Conference
Drone for Humanitarian Operations
3rd Institut Mines-Télécom Symposium, Topic: Digital Technologies Scale and Complexity, 27-28 March 2014, Paris, France
-
March 2014
Conference
Evasion and obfuscation in speaker recognition surveillance and forensics
IWBF 2014, 2nd International Workshop on Biometrics and Forensics, March 27-28, 2014, Valletta, Malta
-
March 2014
Conference
Autonomous drones for humanitarians operations
Journées scientifiques URSI France, 25-26 March 2014, Paris, France
-
March 2014
Conference
A minimalist approach to remote attestation
DATE 2014, Design, Automation and Test in Europe, March 24-28, 2014, Dresden, Germany
-
March 2014
Conference
Confidentiality issues on a GPU in a virtualized environment
FC 2014, 18th International Conference on Financial Cryptography and Data Security, 3-7 March 2014, Barbados
-
March 2014
Poster / Demo
SysML-Sec: Capturing and formally proving safety and security properties
Colloque de l'Institut Mines-Télécom, "Numérique : Grande échelle et complexité", March 2014, Paris, France
-
February 2014
Conference
Toward black-box detection of logic flaws in web applications
NDSS 2014, Network and Distributed System Security Symposium, 23-26 February 2014, San Diego, USA
-
February 2014
Thesis
A multidimensional analysis of malicious and compromised websites
Thesis
-
January 2014
Thesis
New insights into crowd density analysis in video surveillance systems
Thesis
-
January 2014
Journal
EXPOSURE: a passive DNS analysis service to detect and report malicious domains
ACM Transactions on Information and System Security (TISSEC), Volume 16, N°4, April 2014, ISSN: 1094-9224
-
January 2014
Journal
Inside the SCAM jungle: A closer look at 419 scam email operations
EURASIP Journal on Information Security, 2014, ISSN: 1687-417X
-
January 2014
Journal
Efficient detection of occlusion prior to robust face recognition
The Scientific World Journal, Volume 2014; Article ID 519158
-
December 2013
Patent
Usage of microphones power difference for echo processing in mobile phones
Patent No. US 13/892420
-
December 2013
Conference
Contextualized privacy filters in video surveillance using crowd density maps
ISM 2013, IEEE International Symposium on Multimedia, 9-11 December 2013, Anaheim, CA, USA
-
December 2013
Journal
A subspace co-training framework for multi-view clustering
Pattern Recognition Letters, Elsevier, 8 December 2013
-
December 2013
Thesis
Analysis of bulk email campaigns using a challenge-response anti-spam system
Thesis
-
December 2013
Conference
Monitoring personal data transfers in the Cloud
CLOUDCOM 2013, 5th IEEE Conference on Cloud Computing Technology and Service, 2-5 December 2013, Bristol, UK
-
December 2013
Conference
ClouDedup: secure deduplication with encrypted data for cloud storage
CLOUDCOM 2013, 5th IEEE International Conference on Cloud Computing Technology and Science, 2-5 December 2013, Bristol, UK
-
November 2013
Journal
Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems"
Security and Communication Networks, Volume 6, N°12, December 2013, Wiley
-
November 2013
Conference
Smart card research and advanced applications
CARDIS 2013, 12th International Conference, November 27-29, 2013, Berlin, Germany / Also published in LNCS, Vol. 8419/2014
-
November 2013
Conference
Unsupervised multi-view dimensionality reduction with application to audio-visual speaker retrieval
WIFS 2013, IEEE International Workshop on Information Forensics and Security, 18-21 November, Guangzhou, China
Best Student Paper Award
-
November 2013
Conference
A tool for supporting developers in analyzing the security of web-based security protocols
ICTSS 2013, 25th IFIP International Conference on Testing Software and Systems, November 13-15, 2013, Istanbul, Turkey / Also published in LNCS, Volume 8254/2013
-
November 2013
Thesis
Detection of logic flaws in multi-party business applications via security testing
Thesis
-
November 2013
Thesis
Modularization of security software engineering in distributed systems
Thesis
-
November 2013
Conference
PoWerStore: proofs of writing for robust and efficient storage
CCS 2013, 20th ACM Conference on Computer and Communications Security, 4-7 November 2013, Berlin, Germany
-
October 2013
Journal
Estimating the density of a crowd using computer vision
IEEE ComSoc MMTC R-Letter, Volume 4, N°5, October 2013,
-
October 2013
Conference
Indoor autonomous navigation of low-cost MAVs using landmarks and 3D perception
OCOSS 2013, 3rd Conference on Ocean and Coastal Observation Sensors and Observing Systems, 28-31 October 2013, Nice, France
-
October 2013
Thesis
Multi-view dimensionality reduction for multi-modal biometrics
Thesis
-
October 2013
Conference
Hypervisor memory forensics
RAID 2013, 16th International Symposium on Research in Attacks, Intrusions, and Defenses, 23-25 October 2013, Saint Lucia, USA / Also published in LNCS, Volume 8145/2013
Annual Volatility Framework Plugin Contest Award
-
October 2013
Conference
Server-side code injection attacks: A historical perspective
RAID 2013, 16th International Symposium on Research in Attacks, Intrusions, and Defenses, 23-25 October 2013, Saint Lucia, USA / Also published in LNCS, Volume 8145/2013
-
October 2013
Poster / Demo
Shape and color-aware privacy protection
MEDIAEVAL 2013, Multimedia Benchmark Workshop, October 18-19, 2013, Barcelona, Spain
-
October 2013
Conference
BFT storage with 2t + 1 data replicas
DISC 2013, 27th International Symposium on Distributed Computing, October 14-18, 2013, Jerusalem, Israel / Also published in LNCS 8205/2013
-
October 2013
Report
Hybris: Consistency hardening in robust hybrid cloud storage
Research Report RR-13-291
-
September 2013
Conference
Crowd density map estimation based on feature tracks
MMSP 2013, 15th International Workshop on Multimedia Signal Processing, September 30-October 2, 2013, Pula, Italy
-
September 2013
Conference
Privacy preserving similarity detection for data analysis
CSAR 2013, Collective Social Awareness and Relevance Workshop, co-located with the 3rd international conference on Social Computing and its Applications, 30 September-2 October 2013, Karlsruhe, Germany
-
September 2013
Conference
Facial cosmetics database and impact analysis on automatic face recognition
MMSP 2013, 15th International Workshop on Multimedia Signal Processing, September 30-October 2, 2013, Pula, Italy
-
September 2013
Conference
A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns
BTAS 2013, 6th IEEE International Conference on Biometrics: Theory, Applications and Systems, Washington, September 29-October 2, 2013, Washington DC, USA
-
September 2013
Conference
Framework for objective evaluation of privacy filters
Proc. SPIE 8856, Applications of Digital Image Processing XXXVI, 88560T, 26 September 2013, San Diego, California, United States
-
September 2013
Conference
3D perception for autonomous navigation of a low-cost MAV using minimal landmarks
IMAV 2013, International Micro Air Vehicle Conference and Flight Competition, September 17-20, 2013, Toulouse, France
-
September 2013
Conference
SysML-Sec: A model-driven environment for developing secure embedded systems
SAR-SSI 2013, 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, 16-18 Septembre 2013, Mont-de-Marsan, France
-
September 2013
Conference
A new multiclass SVM algorithm and its application to crowd density analysis using LBP features
ICIP 2013, IEEE International Conference on Image Processing, 15-18 September 2013, Melbourne, Australia
Top 10% Paper Recognition
-
September 2013
Conference
Privacy preserving delegated word-search in the cloud
TCLOUDS 2013, Workshop on Trustworthy Clouds, in connection with ESORICS 2013, 12-13 September 2013, Royal Holloway, University of London, United Kingdom
-
September 2013
Conference
SysML-sec: A sysML environment for the design and development of secure embedded systems
APCOSEC 2013, Asia-Pacific Council on Systems Engineering, September 8-11, 2013, Yokohama, Japan
-
September 2013
Report
ClouDedup: Secure deduplication with encrypted data for cloud storage
Research Report RR-13-288
-
September 2013
Invited paper in a conference
Elastic SIEM: elastic detector integrated with OSSIM
RASIEM 2013, 2nd International Workshop on Recent Advances in Security Information and Event Management, in conjunction with ARES 2013, 8th International Conference on Availability, Reliability and Security, 2-6 September 2013, Regensburg, Germany
-
August 2013
Conference
Enhancing human detection using crowd density measures and an adaptive correction filter
AVSS 2013, 10th IEEE International Conference on Advanced Video and Signal-Based Surveillance, August 27-30, 2013, Krakow, Poland
-
August 2013
Conference
Using linguistic information to detect overlapping speech
INTERSPEECH 2013, 14th Annual Conference of the International Speech Communication Association, August 25-29, 2013, Lyon, France
-
August 2013
Conference
Spoofing and countermeasures for automatic speaker verification
INTERSPEECH 2013, 14th Annual Conference of the International Speech Communication Association, August 25-29, 2013, Lyon, France
-
August 2013
Book
Data traffic monitoring and analysis from measurement, classification, and anomaly detection to quality of experience
Lecture Notes in Computer Science, Series: Computer Communication Networks and Telecommunications, 2013/7754
-
July 2013
Talk
Embedded devices security and firmware reverse engineering
BLACKHAT 2013, July 31-August 1st, 2013, Las Vegas, NV, USA
-
July 2013
Conference
Secure alert tracking in supply chain
SECRYPT 2013, 10th International Conference on Security and Cryptography, 29-31 July 2013, Reykjavik, Iceland
-
July 2013
Conference
Improving 802.11 fingerprinting of similar devices by cooperative fingerprinting
SECRYPT 2013, 10th International Conference on Security and Cryptography, 29-31 July 2013, Reykjavik, Iceland
-
July 2013
Conference
Multimodal kinect-supported interaction for visually impaired users
UAHCI 2013, Held as part of HCI 2013, 7th International Conference on Universal Access in Human-Computer Interaction: Design Methods, Tools, and Interaction Techniques for eInclusion, 21-26 July 2013, Las Vegas, NV, USA / Also published in Lecture Notes in Computer Science, Vol 8009/2013, PART 1
-
July 2013
Conference
PeerRush: mining for unwanted P2P traffic
DIMVA 2013, 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, July 17-19, 2013, Berlin, Germany / Also published in LNCS 7967/2013
Best Paper Award
-
July 2013
Conference
Crowd density analysis using subspace learning on local binary pattern
ICME 2013, IEEE International Workshop on Advances in Automated Multimedia Surveillance for Public Safety, July 15-19, 2013, San Jose, CA, USA
-
July 2013
Conference
Towards the model-driven engineering of security requirements for embedded systems
MODRE 2013, International Workshop on Model-Driven Requirements Engineering, 15 July 2013, Rio de Janeiro, Brazil
-
July 2013
Conference
The role of phone numbers in understanding cyber-crime schemes
PST 2013, 11th International Conference on Privacy, Security and Trust, July 10-12, 2013, Tarragona, Catalonia, Spain
-
July 2013
Conference
Reflectance analysis based countermeasure technique to detect face mask attacks
DSP 2013, 18th International Conference on Digital Signal Processing, 1-3 July 2013, Santorini, Greece
-
July 2013
Conference
Crowd context-dependent privacy protection filters
DSP 2013, 18th International Conference on Digital Signal Processing, 1-3 July 2013, Santorini, Greece
-
June 2013
Conference
Bringing common criteria certification to web services
SPE 2013, IEEE International Workshop on Security and Privacy Engineering, Assurance, and Certification, June 27th-July 2nd, 2013, Santa Clara, CA, USA
-
June 2013
Report
A simulator for data-intensive job scheduling
Research Report RR-13-282
-
June 2013
Conference
Shape and texture based countermeasure to protect face recognition systems against mask attacks
CVPR 2013, 26th IEEE Computer Vision and Pattern Recognition Workshop on Biometrics (In conjuction with CVPR 2013), 23-28 June 2013, Portland, Oregon, USA
-
May 2013
Conference
On the vulnerability of face recognition systems to spoofing mask attacks
ICASSP 2013, IEEE International Conference on Acoustics, Speech, and Signal Processing, 26-31 May 2013, Vancouver, Canada
-
May 2013
Conference
Open-set semi-supervised audio-visual speaker recognition using co-training LDA and sparse representation classifiers
ICASSP 2013, 38th IEEE International Conference on Acoustics, Speech, and Signal Processing, May 26-31, Vancouver, Canada
-
May 2013
Conference
An experimental framework for the derivation of perceptually-optimal noise suppression functions
ICASSP 2013, 38th IEEE International Conference on Acoustics, Speech, and Signal Processing, May 26-31, Vancouver, Canada
-
May 2013
Report
Asynchronous BFT storage with 2t + 1 data replicas
Technical Report / Also on Arxiv
-
May 2013
Conference
Inside the SCAM jungle: A closer look at 419 scam email operations
IWCC 2013, International Workshop on Cyber Crime (co-located with the 34th IEEE Symposium on Security and Privacy (IEEE S&P 2013), May 24, 2013, San Francisco, CA, USA
-
May 2013
Report
A P2P based usage control enforcement scheme resilient to re-injection attacks
Research Report RR-13-281
-
May 2013
Thesis
Personalizing trending content in social media
Thesis
-
May 2013
Journal
Spoofing and countermeasures for speaker verification: a need for standard corpora, protocols and metrics
IEEE Signal Processing Society Newsletter, May 2013
-
April 2013
Journal
A forensic case study on as hijacking: the attacker's perspective
ACM SIGCOMM Computer Communication Review, Volume 43, N°2, April 2013
-
April 2013
Conference
Countermeasure for the protection of face recognition systems against mask attacks
FG 2013, 10th IEEE International Conference on Automatic Face and Gesture Recognition, 22-26 April 2013, Shanghai, China
Best Student Paper Honorable Mention Award
-
April 2013
Poster / Demo
Live evaluation of quality of experience for video streaming and web browsing
INFOCOM 2013, 32nd IEEE International Conference on Computer, 14-19 April 2013, Turin, Italy
-
April 2013
Conference
Troubleshooting slow webpage downloads
TMA 2013, 5th IEEE International Traffic Monitoring and Analysis Workshop, in conjunction with INFOCOM 2013, 14-19 April 2013, Turin, Italy
-
April 2013
Thesis
Web performance analysis based on user experiences
Thesis
-
April 2013
Conference
DistBack: A low-overhead distributed back-up architecture with Snapshot support
LANMAN 2013, 19th IEEE International Workshop on Local and Metropolian Area Networks, April 10-12, 2013, Brussels, Belgium
-
March 2013
Book
Internet video delivery in youtube: From traffic measurements to quality of experience
Book chapter in "DataTraffic Monitoring and Analysis: From Measurement, Classification, and Anomaly Detection to Quality of Experience", Lecture Notes in Computer Science, Volume 7754/2013
-
March 2013
HDR
Contributions to image processing for security applications
Habilitation à diriger des recherches (French qualification for conducting Phd theses)
-
February 2013
Conference
Behind the scenes of online attacks: an analysis of exploitation behaviors on the web
NDSS 2013, 20th Annual Network and Distributed System Security Symposium, February 24-27, 2013, San Diego, CA, United States
-
February 2013
Report
The role of phone numbers in understanding cyber-crime
Research Report RR-13-277
-
February 2013
Conference
SpamTracer: How stealthy are spammers?
TMA 2013, 5th IEEE International Traffic Monitoring and Analysis Workshop, in conjunction with INFOCOM 2013, 19 April 2013, Turin, Italy
-
December 2012
Journal
HiPoLDS: A hierarchical security policy language for distributed systems
Information Security Technical Report, ISSN: 1363-4127
-
December 2012
Journal
HybridNN: An accurate and scalable network location service based on the inframetric model
Future Generation Computer Systems, December 2012
-
December 2012
Poster / Demo
How to prevent AS hijacking attacks
CONEXT Student 2012, ACM Conference on Conext Student Workshop, December 10, 2012, Nice, France
-
December 2012
Journal
Online non-negative convolutive pattern learning for speech signals
IEEE Transactions on Signal Processing, Volume 61, N°1, 2013, ISSN: 1053-587X
-
December 2012
Conference
DISCLOSURE: Detecting botnet command and control servers through large-scale netflow analysis
ACSAC 2012, 28th Annual Computer Security Applications Conference, December 3-7, 2012, Orlando, Florida, USA
-
December 2012
Conference
Analysis of the communication between colluding applications on modern smartphones
ACSAC 2012, 28th Annual Computer Security Applications Conference, December 3-7, 2012, Orlando, Florida, USA
-
December 2012
Conference
Enabling trusted scheduling in embedded systems
ACSAC 2012, 28th Annual Computer Security Applications Conference, December 3-7, 2012, Orlando, Florida, USA
-
December 2012
Conference
Towards network containment in malware analysis systems
ACSAC 2012, 28th Annual Computer Security Applications Conference, December 3-7, 2012, Orlando, Florida, USA
-
December 2012
Conference
Low level crowd analysis using frame-wise normalized feature for people counting
WIFS 2012, IEEE International Workshop on Information Forensics and Security, December 2-5, 2012, Tenerife, Spain
-
November 2012
Conference
Secure product tracking in supply chain
INSCRYPT 2012, 8th International Conference on Information Security and Cryptology, 28-30 November 2012, Pekin, China / Also published in LNCS 7763/2013
-
November 2012
Journal
A general scalable and accurate decentralized level monitoring method for large-scale dynamic service provision in hybrid clouds
Future Generation Computer Systems, Elsevier, 2012
-
November 2012
Patent
Methods for processing audio signals and circuit arrangements therefor
US Patent 13/676142, Novembre 2013
-
November 2012
Conference
Real-time 3D face identification from a depth camera
ICPR 2012, 21st International Conference on Pattern Recognition, November 11-15, 2012, Tsukuba International Congress Center, Tsukuba Science City, Japan
-
November 2012
Journal
PSP: Private and secure payment with RFID
Computer Communications, 2012
-
November 2012
Thesis
Security and privacy in automotive on-board networks
Thesis
-
November 2012
Conference
An efficient LBP-based descriptor for facial depth images applied to gender recognition using RGB-D face data
ACCV 2012, Workshop on Computer Vision with Local Binary Pattern Variants, Daejeon, Korea, November 5-9, 2012 / Published also as LNCS, Vol 7728, PART 1
-
November 2012
Journal
Visual analytics for BGP monitoring and prefix hijacking identification
IEEE Network Magazine, Special Issue on Computer Network Visualization, November/December 2012, Volume 26, N°6, ISSN: 0890-8044
-
October 2012
Thesis
Non-linear acoustic echo cancellation with loudspeaker modelling and pre-processing
Thesis
-
October 2012
Conference
VisTracer: a visual analytics tool to investigate routing anomalies in traceroutes
VIZSEC 2012, 9th International Symposium on Visualization for Cyber Security, October 15, 2012, Seattle, WA, USA
-
October 2012
Journal
Spammers operations: a multifaceted strategic analysis
Security and Communication Networks, October 2012
-
October 2012
Conference
MediaEval 2012: Scrambling faces for flexible privacy preservation using image background self-similarities
MEDIAEVAL 2012, CEUR Multimedia Benchmark Workshop, Volume 927, October 4-5, 2012, Pisa, Italy
-
October 2012
Journal
Privacy risks in named data networking: what is the cost of performance?
Computer Communication Review, Volume 42, N°5, October 2012
-
September 2012
Book
How can we determine if a device is infected or not?
Book chapter 7.8 in The death of the Internet, part of Chapter 7, Solutions to the problem, Wiley, 2012, ISBN: 9781118062418
-
September 2012
Conference
Inpainting of sparse occlusion in face recognition
ICIP 2012, IEEE International Conference on Image Processing, 30 September-3 October, 2012, Orlando, Florida, USA
-
September 2012
Thesis
A requirements engineering driven approach to security architecture design for distributed embedded systems
Thesis
-
September 2012
Thesis
Enterprise networks: Modern techniques for analysis, measurement and performance improvement
Thesis
-
September 2012
Conference
Applying Common Criteria (CC) to Service Oriented Architectures (SOA)
ICCC 2012, International Common Criteria Conference, September 18-20, 2012, Paris, France
-
September 2012
Conference
Subjective study of privacy filters in video surveillance
MMSP 2012, IEEE International Workshop on Multimedia Signal Processing, 17-19 September 2012, Banff, Canada
-
September 2012
Journal
An authentication flaw in browser-based single sign-on protocols: Impact and remediations
Computers and Security, Vol 33, March 2013, Elsevier, ISSN: 0167-4048
-
September 2012
Conference
Automating privacy enforcement in cloud platforms
DPM 2012, 7th International Workshop on Data Privacy Management, in conjunction with the 17th annual European research event in Computer Security symposium (ESORICS 2012), 13-14 September 2012, Pisa, Italy / Also published in LNCS, Springer, Vol 7731/2013
-
September 2012
Thesis
Security and privacy in RFID systems
Thesis
-
September 2012
Conference
Convolutive non-negative sparse coding and new features for speech overlap handling in speaker diarization
INTERSPEECH 2012, 13th Annual Conference of the International Speech Communication Association, Volume3, September 9-13, Portland, Oregon, USA
-
September 2012
Conference
Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals
INTERSPEECH 2012, 13th Annual Conference of the International Speech Communication Association, September 9-13, Portland, Oregon, USA
-
September 2012
Conference
Analyzing the impact of YouTube delivery policies on user experience
ITC 2012, 24th International Teletraffic Congress (ITC 24), September 4-7, 2012, Krakow, Poland
-
September 2012
Conference
Dual channel echo postfiltering for hands-free mobile terminals
IWAENC 2012, International Workshop on Acoustic Signal Enhancement, September 4-6, 2012, Aachen, Germany
-
September 2012
Book
Biométrie faciale douce pour l'identification des individus
Book chapter of "Traitement du signal et de l'image pour la biométrie"; Traité IC2, série Signal et Image dirigée par Henri Maître et Francis Castanié (sous la direction de Amine Naït-Ali and Régis Fournier); Hermes Science; Septembre 2012; ISBN: 9782746238992
-
September 2012
Journal
Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols
Peer-to-Peer Networking and Applications, Volume 5, N°3, September 2012
-
August 2012
Conference
What can computer vision tell you about your weight?
EUSIPCO 2012, 20th European Signal Processing Conference 2011, August 27-31, 2012, Bucharest, Romania
-
August 2012
Conference
A new cross-domain approach to synchronized adaptive echo cancellation and echo postfiltering
EUSIPCO 2012, European Signal Processing Conference, August, 27-31, 2012, Bucharest, Romania
-
August 2012
Conference
People counting system in crowded scenes based on feature regression
EUSIPCO 2012, European Signal Processing Conference, August, 27-31, 2012, Bucharest, Romania
-
August 2012
Conference
Multi-view semi-supervised discriminant analysis: A new approach to audio-visual person recognition
EUSIPCO 2012, European Signal Processing Conference, August, 27-31, 2012, Bucharest, Romania
-
August 2012
Conference
Speech overlap detection using convolutive non-negative sparse coding: New improvements and Insights
EUSIPCO 2012, European Signal Processing Conference, August, 27-31, 2012, Bucharest, Romania
-
August 2012
Conference
On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals
EUSIPCO 2012, European Signal Processing Conference, August, 27-31, 2012, Bucharest, Romania
-
August 2012
Conference
Towards assisted remediation of security vulnerabilities
SECURWARE 2012, 6th International Conference on Emerging Security Information, Systems and Technologies, August 19-24, 2012, Rome, Italy
Best Paper Award
-
August 2012
Report
A P2P based usage control enforcement scheme resilient to re-injection attacks
Research Report RR-12-273
-
August 2012
Conference
Preprocessing for classification of sparse data : Application to trajectory recognition
SSP 2012, IEEE Statistical Signal Processing Workshop, August 5-8, 2012, Ann Harbour, United States
-
July 2012
Talk
Ghost is in the Air(Traffic)
BLACKHAT 2012, July 21-26, 2012, Las Vegas, NV, USA
-
July 2012
Conference
Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices
BLACKHAT 2012, July 21-26, 2012, Las Vegas, NV, USA
-
July 2012
Conference
Preventing input validation vulnerabilities in web applications through automated type analysis
COMPSAC 2012, 36th Annual IEEE Computer Software and Applications Conference, July 16-20, 2012, Izmir, Turkey
-
July 2012
Conference
PRISM - Privacy-Preserving Search in MapReduce
PETS 2012, 12th Privacy Enhancing Technologies Symposium, July 11-13, 2012, Vigo, Spain / Also published in LNCS, Volume 7384/2012, Springer
-
July 2012
Thesis
Network tomography from an operator perspective
Thesis
-
July 2012
Conference
Co-LDA: A semi-supervised approach to audio-visual person recognition
ICME 2012, IEEE International Conference on Multimedia and Expo, 9-13 July, 2012, Melbourne, Australia
-
July 2012
Conference
Evaluation of visual privacy filters impact on video surveillance intelligibility
QOMEX 2012, 4th International Workshop on Quality of Multimedia Experience, 5-7 July 2012, Yarra Valley, VIC, Australia
-
July 2012
Book
Facial soft biometrics for person recognition
Book chapter 3 of "Signal and Image Processing for Biometrics" (Eds.: Amine Naït-Ali and Régis Fournier); Wiley; July 2012, ISBN: 978-1-84821-385-2
-
July 2012
Conference
T-MATCH: Privacy-preserving item matching for storage-only RFID tags
RFIDSEC 2012, 8th Workshop on RFID Security and Privacy, Also published in Cryptology ePrint Archive: Report 2012/465, Nijmegen, Netherlands, July 1-3, 2012, Also to be published in LNCS 7739/2013
-
June 2012
Conference
PRICE: PRivacy preserving Incentives for Cooperation Enforcement
WOWMOM 2012, 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, June 25-28, 2012, San Francisco, CA, USA
-
June 2012
Conference
Robust data sharing with key-value stores
DSN 2012, 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 25-28 June, 2012, Boston, MA, USA
-
June 2012
Conference
PPS: Privacy-preserving statistics using RFID tags
WOWMOM 2012, 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, June 25-28, 2012, San Francisco, California, USA
-
June 2012
Conference
Enabling message security for RESTful services
ICWS 2012, 19th IEEE International Conference on Web Services, June 24-29, 2012, Honolulu, Hawaii, USA
-
June 2012
Journal
Direct posterior confidence for out-of-vocabulary spoken term detection
ACM Transactions on Information Systems (TOIS), Vol 30, N°3, August 2012
-
June 2012
Conference
Security and privacy for in-vehicle networks
VCSC 2012, 1st IEEE SECON International Workshop on Vehicular Communications, Sensing, and Computing, 18th June, 2012, Seoul, Republic of Korea
-
June 2012
Conference
Quiver: a middleware for distributed gaming
NOSSDAV 2012, 22nd ACM Workshop on Network and Operating Systems Support for Digital Audio and Video, 7-8 June 2012, Toronto, Canada
-
May 2012
Conference
From model-checking to automated testing of security protocols: Bridging the gap
TAP 2012, 6th International Conference on Tests and Proofs, May 31-June 1, 2012, Prague, Czech Republic / Published also in LNCS, Volume 7305, 2012, Springer
-
May 2012
Conference
Improving identification by pruning: a case study on face recognition and body soft biometric
WIAMIS 2012, 13th International Workshop on Image Analysis for Multimedia Interactive Services, 23-25 May 2012, Dublin City University, Ireland
-
May 2012
Talk
PostScript: danger ahead?!
HITBSEC 2012, Hack In the Box Conference, May 22, 2012, Amsterdam, The Netherlands
-
May 2012
Conference
Classification of captured and recaptured images to detect photograph spoofing
ICIEV 2012, IEEE/IAPR International Conference on Informatics, Electronics and Vision, 18-19 May 2012, Dhaka, Bangladesh
-
May 2012
Conference
Robust foreground segmentation using improved Gaussian mixture model and optical flow
ICIEV 2012, IEEE/IAPR International Conference on Informatics, Electronics and Vision, 18-19 May 2012, Dhaka, Bangladesh
-
May 2012
Conference
Demographic classification: Do gender and ethnicity affect each other?
ICIEV 2012, IEEE/IAPR International Conference on Informatics, Electronics & Vision, 18-19 May, 2012, Dhaka, Bangladesh
-
May 2012
Thesis
Securing web applications by design
Thesis
-
April 2012
Conference
Effective and efficient security policy engines for automotive on-board networks
Nets4 Cars/Nets4 Trains 2012, 4th International Workshop on Communications Technologies for Vehicles, April 25-27, 2012, Vilnius, Lithuania / Also published in LNCS 6596/2012
-
April 2012
Thesis
Anthropometry and soft biometrics for smart monitoring
Thesis
-
April 2012
Conference
Physical-layer attacks on chirp-based ranging systems
WISEC 2012, 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, April 16-18, 2012, Tucson, Arizona, USA
-
April 2012
Conference
CHECKER: On-site checking in RFID-based supply chains
WISEC 2012, 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, April 16-18, 2012, Tucson, Arizona, USA
-
April 2012
Conference
Privacy preserving picture sharing : Enforcing usage control in distributed on-line social networks
SNS 2012, 5th ACM Workshop on Social Network Systems, April 10, 2012, Bern, Switzerland
-
April 2012
Thesis
Security and privacy in online social networks
Thesis
-
March 2012
Conference
Moving face spoofing detection via 3D projective invariants
ICB 2012, 5th IAPR International Conference on Biometrics, 29 March-1 April 2012, New Delhi, India
-
March 2012
Report
On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals
Research Report RR-12-266
-
March 2012
Conference
A security analysis of amazon's elastic compute cloud service
SAC 2012, 27th ACM Symposium On Applied Computing, Security Track, March 26-30, 2012, Trento, Italy
-
March 2012
Conference
An empirical analysis of input validation mechanisms in web applications and languages
SAC 2012, 27th ACM Symposium On Applied Computing, Security Track, March 26-30, 2012, Trento, Italy
-
March 2012
Conference
Speech overlap detection and attribution using convolutive non-negative sparse coding
ICASSP 2012, 37th International Conference on Acoustics, Speech and Signal Processing, March 25-30, 2012, Kyoto, Japan
-
March 2012
Conference
Dual amplifier and loudspeaker compensation using fast convergent and cascaded approaches to non-linear acoustic echo cancellation
ICASSP 2012, 37th International Conference on Acoustics, Speech and Signal Processing, March 25-30, 2012, Kyoto, Japan
-
March 2012
Thesis
Utilization of 3D data in face recognition
Thesis
-
March 2012
Conference
Real time extraction of body soft biometric for telemedicine
GTTI MMSP 2012, Thematic Meeting on Multimedia Signal Processing, March 19-21, 2012, Courmayeur, Italy
Best Student Research Demonstration Award
-
March 2012
Poster / Demo
Cunetsim: A new simulation framework for large scale
SIMUTOOLS 2012, 5th International Conference on Simulation Tools and Techniques, March 19-23, 2012, Desenzano, Italy
-
March 2012
Conference
Distributed troubleshooting of web sessions using clustering
TMA 2012, 4th International Workshop on Traffic Monitoring and Analysis, March 12-14, 2012, Vienna, Austria / Also published in LNCS, 2012, Volume 7189/2012
-
February 2012
Journal
A survey on automated dynamic malware-analysis techniques and tools
ACM Computing Surveys, Volume 44, N°2, February 2012
-
February 2012
Conference
A longitudinal view of HTTP video streaming performance
MMSYS 2012, ACM Multimedia Systems, February 22-24, 2012, Chapel Hill, USA
-
February 2012
Book
Quorum systems: With applications to storage and consensus
Morgan and Claypool, Synthesis Lectures on Distributed Computing Theory, February 2012, ISBN: 978-1608456833
-
February 2012
Conference
Insights into user behavior in dealing with internet attacks
NDSS 2012, 19th Annual Network and Distributed System Security Symposium, February 5-8, 2012, San Diego, USA
-
February 2012
Conference
SMART: Secure and Minimal Architecture for (Establishing a Dynamic) Root of Trust
NDSS 2012, 19th Annual Network and Distributed System Security Symposium, February 5-8, San Diego, USA
Test of Time Award Winner 2024
-
February 2012
Journal
A comparative study of bottom-up and top-down approaches to speaker diarization
"IEEE Transactions On Audio Speech and Language Processing" (TASLP), special issue on "New Frontiers in Rich Transcription", February 2012, Volume 20, N°2, ISSN: 1558-7916
-
January 2012
Conference
Fusion d'experts pour une biométrie faciale 3D robuste aux déformations
RFIA 2012, Reconnaissance des Formes et l'Intelligence Artificielle, 24-27 Janvier 2012, Lyon, France
-
January 2012
Conference
Building the space scale or how to weigh a person with no gravity
ESPA 2012, IEEE 1st International Conference on Emerging Signal Processing Applications, January 12-14, 2012, Las Vegas, USA
-
January 2012
Report
On the relationship between QoS and QoE for web sessions
Research report RR-12-263
-
January 2012
Report
Improving identification by pruning: a case study on face recognition and body soft biometric
Research report RR-12-262
-
January 2012
Journal
Special section on security and social networking
Computer Communications, Vol 35, N°1, January 2012
-
December 2011
Journal
Local key management in opportunistic networks
International Journal of Communication Networks and Distributed Systems, 2012, Volume 9, N°1-2, Special Issue on Recent Advances in P2P Systems, ISSN:1754-3916
-
December 2011
Journal
Have things changed now? An empirical study on input validation vulnerabilities in web applications
"Computers and Security", 2012, ISSN: 0167-4048
-
December 2011
Book
Automatic security analysis of SAML-based single sign-on protocols
Book chapter N°10 in "Digital Identity and Access Management: Technologies and Framework", Business Science Reference, Editors: Raj Sharman, R., Das Smith, S, Gupta, M, December 2011, ISBN: 978-1613504987
-
December 2011
Conference
Digital image forensics : A two-step approach for identifying source and detecting forgeries
PCM 2011, Pacific-Rim Conference on Multimedia, December 20-22, 2011, Sydney, Australia / Also chapter book in "The Era of Interactive Media", Springer, ISBN: 978-1-4614-3500-6
Best Student Paper Award
-
December 2011
Thesis
Automated measurements of novel internet threats
Thesis
-
December 2011
Thesis
Network-based botnet detection
Thesis
-
December 2011
Thesis
Facial soft biometrics : Methods, applications, and solutions
Thesis
-
December 2011
Report
Online non-negative convolutive pattern learning for speech signals
Research Report RR-11-261
-
December 2011
Report
CHECKER: On-site checking in RFID-based supply chains
Cryptology ePrint Archive: Report 2011/651, December 2011
-
November 2011
Journal
3D face recognition: Where we are
IEEE COMSOC MMTC E-Letter, Vol 6, N°11, November 2011
-
November 2011
Conference
Real time extraction of body soft biometric from 3D videos
MM 2011, 19th ACM International Conference on Multimedia, 28 November-1 December, 2011, Scottsdale, USA
-
November 2011
Conference
Cap detection for moving people in entrance surveillance
MM 2011, 19th ACM International Conference on Multimedia, 28 November-1 December, 2011, Scottsdale, USA
-
November 2011
Talk
The EVITA project : securing the networked vehicle
ESCAR 2011, 9th International Conference on Embedded Security in Cars, November 9-10, 2011, Dresden, Germany
-
November 2011
Conference
Search pruning in video surveillance systems: Efficiency-reliability tradeoff
ICCV 2011, Workshop IWITINCVPR, 1st IEEE Workshop on Information Theory in Computer Vision and Pattern Recognition in the International Conference on Computer Vision, November 6-13, Barcelona, Spain
-
November 2011
Journal
Evolutionary discriminative confidence estimation for spoken term detection
"Multimedia Tools and Applications", Springer, November 4th, 2011
-
October 2011
Book
On the resilience of the dependability framework to the intrusion of new security threats
Book chapter in "Dependable and Historic Computing (essays dedicated to Brian Randell on the Occasion of his 75th Birthday)", Eds. Jones, Cliff B; Lloyd, John L; LNCS Vol 6875, Springer Verlag, ISBN:9783642245404
-
October 2011
Conference
Demo: The Ff hardware prototype for privacy-preserving authentication
CCS 2011, ACM Conference on Computer and Communications Security, October 17-21, 2011, Chicago, USA
-
October 2011
Conference
EphPub: Toward robust ephemeral publishing
ICNP 2011, IEEE International Conference on Network Protocols, October 17-20, Vancouver, Canada
-
October 2011
Conference
Non-linear acoustic echo cancellation using online loudspeaker linearization
WASPAA 2011, IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, October 16-19, 2011, New York, USA
-
October 2011
Conference
Securing car2X applications with effective hardware-software co-design for vehicular on-board networks
VDI Automotive Security ["27. VDI/VW-Gemeinschaftstagung Automotive Security"], VDI-Bericht 2131, October 11-12, 2011, Berlin, Germany
-
October 2011
Journal
Reducing repair traffic in P2P backup systems: Exact regenerating codes on hierarchical codes
"ACM Transactions on Storage (TOS)", Vol 7, N°3, October 2011
-
September 2011
Thesis
Application level performance in wired and wireless environments
Thesis
-
September 2011
Conference
Security vulnerabilities detection and protection using eclipse
ECLIPSE-IT 2011, 6th Workshop of the Italian Eclipse Community, September 22-23, 2011, Milano, Italy
-
September 2011
Report
PRICE: PRivacy preserving Incentives for Cooperation Enforcement
Research Report RR-11-260
-
September 2011
Conference
CrowdLoc : Wireless jammer localization with crowdsourcing measurements
UBICROWD 2011, 2nd International Workshop on Ubiquitous Crowdsouring, to be held in conjunction with 13th ACM International Conference on Ubiquitous Computing, September, 18-22, 2011, Beijing, China
-
September 2011
Conference
Evolving security requirements in multi-layered Service-Oriented-Architectures
SETOP 2011, 4th International Workshop on Autonomous and Spontaneous Security, in conjunction with the 16th annual European research event in Computer Security (ESORICS 2011) symposium, September 15-16, 2011, Leuven, Belgium / Also published in "Lecture Notes in Computer Science", 2012, Volume 7122/2012
-
September 2011
Conference
Semi-supervised face recognition with LDA self-training
ICIP 2011, IEEE International Conference on Image Processing, September 11-14, 2011, Brussels, Belgium
-
September 2011
Conference
Catch the jammer in wireless sensor network
PIMRC 2011, 22nd Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, September 11-14, 2011, Toronto, Canada
-
September 2011
Poster / Demo
Pytomo : A tool for analyzing playback quality of YouTube videos
ITC 2011, 23rd International Teletraffic Congress, September 6-8, 2011, San Francisco, USA
Best Student Poster Award
-
September 2011
Report
On the feasibility of data exfiltration with storage-device backdoors
IBM Research Report, # Z1106-001, September 06, 2011
-
September 2011
Conference
A formal methodology applied to secure over-the-air automotive applications
VTC-Fall2011, IEEE 74th Vehicular Technology Conference, 5-8 September 2011, San Francisco, USA
-
September 2011
Conference
Car2X communication : securing the last meter - A cost-effective approach for ensuring trust in Car2X applications using in-vehicle symmetric cryptography
WIVEC 2011, 4th IEEE International Symposium on Wireless Vehicular Communications, 5-6 September 2011, San Francisco, CA, United States
-
September 2011
Conference
Robust speech recognition in multi-source noise environments using convolutive non-negative matrix factorization
CHIME 2011, 1st International Workshop on Machine Listening in Multisource Environments, Interspeech, September 1st, 2011, Florence, Italy
-
August 2011
Journal
On the use of dynamic features in face biometrics: recent advances and challenges
"Signal, Image and Video Processing", Springer, 2011
-
August 2011
Conference
Frontal-to-side face re-identification based on hair, skin and clothes patches
AVSS 2011, IEEE International Conference on Advanced Video and Signal-Based Surveillance, August 30-September 2, 2011, Klagenfurt, Austria
-
August 2011
Conference
A co-training approach to automatic face recognition
EUSIPCO 2011, 19th European Signal Processing Conference 2011, August 29-September 2, 2011, Barcelona, Spain
-
August 2011
Conference
Parallel and hierarchical decision making for sparse coding in speech recognition
INTERSPEECH 2011, 12th Annual Conference of the International Speech Communication, August 28-31, Florence, Italy
-
August 2011
Conference
Online pattern learning for non-negative convolutive sparse coding accepted for publication
INTERSPEECH 2011, 12th Annual Conference of the International Speech Communication, August 28-31, Florence, Italy
-
August 2011
Conference
Synthetic and privacy-preserving visualization of video sensor network outputs
ICDSC 2011, 5th ACM/IEEE International Conference on Distributed Smart Cameras, August 22-25, 2011, Ghent, Belgium
-
August 2011
Report
A cascaded non-linear acoustic echo canceller combining power filtering and clipping compensation
Research Report RR-11-258
-
August 2011
Conference
Privacy preserving products tracking in clustered supply chain
SENSORCOMM 2011, 5th International Conference on Sensor Technologies and Applications, August 21-27, 2011, Nice/Saint Laurent du Var, France
Best Paper Award
-
August 2011
Conference
Adaptive security on service-based SCM control system
SENSORCOMM 2011, 5th International Conference on Sensor Technologies and Applications, August 21-27, 2011, Nice/Saint Laurent du Var, France
-
August 2011
Conference
Trouble shooting interactive web sessions in a home environment
SIGCOMM HomeNets 2011, ACM SIGCOMM Workshop on Home Networks, August, 15-19, 2011, Toronto, Canada
-
July 2011
Conference
Broker-based private matching
PETS 2011, The 11th Privacy Enhancing Technologies Symposium, July 27-29, 2011, Waterloo, Canada / Also published in "Lecture Notes in Computer Science", Vol 6794/2011
-
July 2011
Conference
Improved combination of LBP and sparse representation based classification (SRC) for face recognition
ICME 2011, IEEE International Conference for Multimedia and Expo, July 11-15, 2011, Barcelona, Spain
-
July 2011
Conference
Female facial aesthetics based on soft biometrics and photo-quality
ICME 2011, IEEE International Conference for Multimedia and Expo, July 11-15, 2011, Barcelona, Spain
Best Presentation Award
-
July 2011
Conference
Reverse social engineering attacks in online social networks
DIMVA 2011, 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 7-8th, 2011 Amsterdam, The Netherlands / Also published in "Lecture Notes in Computer Science", Vol 6739/2011
-
July 2011
Conference
Operating system interface obfuscation and the revealing of hidden operations
DIMVA 2011, 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, July 7-8th, 2011, Amsterdam, The Netherlands / Also published in "Lecture Notes in Computer Science", Vol 6739/2011
-
June 2011
Journal
Schutz von lieferketten mit RFID-tags
DIGMA, Vol. 11(2), 2011, ISSN: 1424-9944
-
June 2011
Conference
ROTIV : RFID ownership transfer with issuer verification
RFIDSEC 2011, 7th Workshop on RFID Security and Privacy 2011, June 26-28, 2011, Amherst, Massachusetts, USA / Also published in Springer "LCNS", 2012, Volume 7055/2012
-
June 2011
Conference
ROTIV: RFID ownership transfer with issuer verification
RFIDSec 2011, 7th International Workshop on Radio Frequency Identification: Security and Privacy Issues, 26-28 June 2011, Amherst, MA, USA / Also in Lecture Notes in Computer Science, vol 7055
-
June 2011
Report
Speech overlap detection using convolutive non-negative sparse coding
Research Report RR-11-257
-
June 2011
Conference
An evolutionary confidence measurement for spoken term detection
CBMI Conference, 9th International Workshop on Content-Based Multimedia Indexing, 13-15 June 2011, Madrid, Spain
-
June 2011
Conference
Robust data sharing with key-value stores
PODC 2011, 30th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, June 6-8, 2011, San Jose, CA, USA
-
June 2011
Conference
The complexity of robust atomic storage
PODC 2011, 30th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, June 6-8, 2011, San Jose, CA, USA
-
June 2011
Report
Search pruning with soft biometric systems : efficiency-reliability tradeoff
Research Report RR-11-255
-
May 2011
Journal
Honeypot trace forensics : The observation viewpoint matters
"Future Generation Computer Systems", Vol 27, N°5, May 2011, ISSN: 0167-739X
-
May 2011
Conference
Robust and low-cost cascaded non-linear acoustic echo cancellation
ICASSP 2011, 36th International Conference on Acoustics, Speech and Signal Processing, May 22-27, 2011, Prague, Czech Republic
-
May 2011
Conference
Handling overlaps in spoken term detection
ICASSP 2011, 36th International Conference on Acoustics, Speech and Signal Processing, May 22-27, 2011, Prague, Czech Republic
-
May 2011
Report
PRISM -- Privacy-Preserving Searches in MapReduce
Cryptology ePrint Archive : Report 2011/244, Mai 2011
-
May 2011
Conference
Automatic protocol signature generation framework for deep packet inspection
VALUETOOLS 2011, 5th International ICST Conference on Performance Evaluation Methodologies and Tools, May 16-20, 2011, Paris, France
-
April 2011
Talk
Intrusion-tolerant replication
METIS-CTDS 2011, 4th edition of the International Spring School on Distributed Systems, April 27-29, 2011, Marrakech, Morocco
-
April 2011
Conference
Understanding the impact of the access technology: the case of Web search services
TMA 2011, 3rd International Workshop on Traffic Monitoring and Analysis, 27 April 2011, Vienna, Austria / Also published in "Lecture Notes in Computer Science", 2011, Volume 6613/2011
-
April 2011
Conference
Thwarting real-time dynamic unpacking
EUROSEC 2011, 4th ACM European Workshop on System Security, April 10th, 2011, Salzburg, Austria
-
April 2011
Journal
The Ff-family of protocols for RFID-privacy and authentication
"IEEE Transactions on Dependable and Secure Computing", Vol 8, N°3, 2011, ISSN:1545-5971
-
April 2011
Thesis
Methods and algorithms for network traffic classification
Thesis
-
April 2011
Conference
Minimizing retrieval latency for content cloud
INFOCOM 2011, 30th IEEE International Conference on Computer Communications, April 10-15, 2011, Shanghai, China
-
March 2011
Conference
Exposing the lack of privacy in file hosting services
LEET 2011, 4th Usenix Workshop on Large-Scale Exploits and Emergent Threats, March 29th, 2011, Boston, USA
-
March 2011
Conference
Secure automotive on-board protocols : A case of over-the-air firmware updates
NETS4CARS/NETS4TRAINS 2011, 3rd International Workshop on Communications Technologies for Vehicles, March, 23-24, 2011, Oberpfaffenhofen, Germany / Also published in "LNCS" 6596/2011
-
March 2011
Conference
Improving the recognition of faces occluded by facial accessories
FG 2011, 9th IEEE Conference on Automatic Face and Gesture Recognition, March 21-25, 2011, Santa Barbara, CA, USA
-
February 2011
Conference
Quo vadis? A study of the evolution of input validation vulnerabilities in Web applications
FC 2011, 15th International Conference on Financial Cryptography and Data Security, February 28-March 4, 2011 Bay Gardens Beach Resort, St. Lucia / Also published as "LNCS", Volume 7035/2012
-
February 2011
Book
Security by virtualization : A novel antivirus for personal computers
"Security by virtualization: A novel antivirus for personal computers", VDM Verlag Dr. Müller e.K., ISBN 978-3-639-25624-6
-
February 2011
Journal
Exploring Second Life
"IEEE/ACM Transactions on Networking", Vol 19, N°1
-
February 2011
Conference
Tracker : security and privacy for RFID-based supply chains
NDSS 2011, 18th Annual Network and Distributed System Security Symposium, 6-9 February 2011, San Diego, CA, USA
-
February 2011
Conference
PiOS : Detecting privacy leaks in iOS applications
NDSS 2011, 18th Annual Network and Distributed System Security Symposium, 6-9 February 2011, San Diego, CA, USA
-
February 2011
Conference
EXPOSURE : Finding malicious domains using passive DNS analysis
NDSS 2011, 18th Annual Network and Distributed System Security Symposium, 6-9 February 2011, San Diego, CA, USA
-
February 2011
Conference
Automated discovery of parameter pollution vulnerabilities in web applications
NDSS 2011, 18th Annual Network and Distributed System Security Symposium, 6-9 February 2011, San Diego, CA, USA
Distinguished Paper Award
-
February 2011
Book
Introduction to biometry
Book chapter in "Multimedia Image and Video Processing" (2nd revised edition); CRC Press; 2012; ISBN:978-1439830864
-
January 2011
Conference
Improved depth map estimation in Stereo Vision
3DIP 2011, Electronic Imaging Conference on 3D Image Processing and Applications, January 24th, 2011, San Fransisco, CA, USA / Also published in "Stereoscopic Displays and Applications XXII; Volume 7863
-
January 2011
Conference
People re-identification in camera networks based on probabilistic color histograms
3DIP 2011, Electronic Imaging Conference on 3D Image Processing and Applications, Vol. 7882, 23-27 January, 2011, San Francisco, CA, USA
-
January 2011
Thesis
Game theoretic analysis of distributed systems : design and incentives
Thesis
-
January 2011
Conference
On the reliability of eye color as a soft biometric trait
WACV 2011, IEEE Workshop on Applications of Computer Vision, January 5-6, 2011, Kona, Hawaii
-
December 2010
Journal
Fast access to distributed atomic memory
SIAM Journal on Computing, Vol 39, N°8, December 2010
-
December 2010
Journal
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems
Journal of Network and Computer Applications, May 2011, Volume 34, N°3
-
December 2010
Conference
Federated secret handshakes with support for revocation
ICICS 2010, 12th International Conference on Information and Communications Security, December 15-17, 2010, Barcelona, Spain
-
December 2010
Conference
Determination of genetic network from micro-array data using neural network approach
ICCCD 2010, 19th International Conference on Communication, Computers and Devices, December 10-12, 2010, Kharagpur, India
-
December 2010
Conference
Safebook : privacy preserving online social network
Internet Privacy Workshop, IAB/W3C/ISOC/MIT 2010, 8-9 December 2010, Cambridge, USA
-
December 2010
Conference
G-Free : defeating return-oriented programming through gadget-less binaries
ACSAC 2010, Annual Computer Security Applications Conference, December 6-10, 2010, Austin, Texas, USA
-
December 2010
Poster / Demo
VAMPIRE : Future internet vulnerability assessment, monitoring and prevention
ARN "Colloque « Télécommunications ? réseaux du futur et services", December 6-8, 2010, Rennes, France
-
December 2010
Journal
Dependable filtering : Philosophy and realizations
ACM Transactions on Information Systems, Volume 29, N°1, December 2010
-
November 2010
Poster / Demo
Safebook : a decentralized on-line social network leveraging on real life trust
W3C 2010, Workshop on the Future of Social Networking, November 18th, 2010, Cambridge, UK
-
November 2010
Conference
A study of email usage and performance over cellular technology
COMNET 2010, 2nd International Conference on Communications and Networking, November 4-7, 2010, Tozeur, Tunisia
-
October 2010
Journal
Bag of soft biometrics for person identification : New trends and challenges
Mutimedia Tools and Applications, Springer, October 2010
-
October 2010
Conference
BIOFACE, a biometric face demonstrator
ACMMM 2010, ACM Multimedia 2010, October 25-29, 2010, Firenze, Italy
-
October 2010
Journal
Digital image forensics : a booklet for beginners
Multimedia Tools and Applications, October 2010
-
October 2010
Conference
A comparative assessment of noise and non-linear echo effects in acoustic echo cancellation
ICSP 2010, 4th International Conference on Signal Processing, October 24-28, 2010, Beijing, China
-
October 2010
Journal
Incentivizing the global wireless village
Computer Networks, Elsevier, October 2010
-
October 2010
Thesis
Content replication in mobile wireless networks
Thesis
-
October 2010
Conference
AccessMiner: using system-centric models for malware protection
CCS 2010, 17th ACM Conference on Computer and Communications Security, October 4-8, 2010, Chicago, IL, USA
-
October 2010
Conference
Person recognition using a bag of facial soft biometrics (BoFSB)
MMSP 2010, IEEE International Workshop on Multimedia Signal Processing, October 4-6, 2010, Saint-Malo, France
-
September 2010
Conference
Weight estimation from visual body appearance
BTAS 2010, 4th IEEE International Conference on Biometrics: Theory, Applications and Systems, September 27-29, 2010, Washington DC, USA
-
September 2010
Conference
Soft biometrics systems : Reliability and asymptotic bounds
BTAS 2010, 4th IEEE International Conference on Biometrics: Theory, Applications and Systems, September 27-29, 2010, Washington DC, USA
-
September 2010
Conference
Securing P2P storage with a self-organizing payment scheme
SETOP 2010, 3rd International Workshop on Autonomous and Spontaneous Security, September 23, 2010, Athens, Greece / Also published in "Lecture Notes in Computer Science", Volume 6514/2011
-
September 2010
Conference
Searchable encryption for outsourced data analytics
EUROPKI 2010, 7th European conference on Public key infrastructures, services and applications, September 23-24, 2010, Athens, Greece / Also published in "Lecture Notes in Computer Science", 2011, Volume 6711/2011
-
September 2010
Conference
Direct posterior confidence for out-of-vocabulary spoken term detection
SSCS 2010, ACM Workshop on Searching Spontaneous Conversational Speech, September 20-24, 2010, Firenze, Italy
-
September 2010
Conference
Multi fault laser attacks on protected CRT-RSA
FDTC 2010, 7th International Workshop on Fault Diagnosis and Tolerance in Cryptography, August 21, 2010, Santa Barbara, USA
-
September 2010
Conference
Abusing social networks for automated user profiling
RAID 2010, 13th International Symposium on Recent Advances in Intrusion Detection, September 15-17, 2010, Ottawa, Canada / Also published in "LNCS", Volume 6307/2010
-
September 2010
Conference
A summary of two practical attacks against social networks
ITWDC 2011, 21st International Tyrrhenian Workshop on Digital Communications: Trustworthy Internet, September 6-8, 2010, Island of Ponza, Italy / Also published as chapter book 13 of "Trustworthy internet", Springer, ISBN: 978-8847018174
-
September 2010
Report
A comparative study of bottom-up and top-down approaches to speaker diarization
Research Report RR-10-243, September 1st, 2010
-
August 2010
Conference
On the Security and Feasibility of Safebook : a Distributed privacy-preserving online social network
PrimeLife/IFIP Summer School 2010, 6th International Summer School, IFIP AICT 320, Privacy and Identity Management for Life, August 2-6, 2010, Helsingborg, Sweden
-
August 2010
Journal
A publish/subscribe model for secure content driven XML dissemination
Journal of Information Assurance and Security (JIAS), ISSN 1554-1010, Volume 6, Issue 1, 2011
-
August 2010
Conference
New models for characterizing mobile terminal loudspeaker distortions
IWAENC 2010, International Workshop on Acoustic Echo and Noise Control, August 30-September 2, 2010, Tel Aviv, Israel
-
August 2010
Conference
Low delay filtering for joint noise reduction and residual echo suppression
IWAENC 2010, International Workshop on Acoustic Echo and Noise Control, August 30-September 2nd, 2010, Tel Aviv, Israel
-
August 2010
Report
Acoustic echo cancellation in non-linear and noisy environment
Research report RR-10-240, May 25th, 2010
-
August 2010
Conference
A Multimodal approach to initialisation for top-down speaker diarization of television shows
EUSIPCO 2010, 18th European Signal Processing Conference, August 23-27, 2010, Aalborg, Denmark
-
August 2010
Conference
Efficient scarf detection prior to face recognition
EUSIPCO 2010, 18th European Signal Processing Conference, August 23-27, 2010, Aalborg, Denmark
-
August 2010
Conference
Efficient low delay filtering for residual echo suppression
EUSIPCO 2010, 18th European Signal Processing Conference, August 23-27, 2010, Aalborg, Denmark
-
August 2010
Conference
Temporally consistent key frame selection from video for face recognition
EUSIPCO 2010, 18th European Signal Processing Conference, August 23-27, 2010, Aalborg, Denmark
-
August 2010
Journal
An experience in testing the security of real-world electronic voting systems
IEEE Transactions on Software Engineering, July-August 2010, Vol 36, N°4
-
August 2010
Book
Peer-to-peer storage : security and protocols
Nova Science Publishers Inc, August 2010, ISBN :978-1616681999
-
August 2010
Conference
An efficient iris and eye corners extraction method
SSPR and SPR 2010, Structural, Syntactic, and Statistical Pattern Recognition - Joint IAPR International Workshop, Cesme, Izmir, Turkey, August 18-20, 2010 / Also published in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol 6218, 2010
-
August 2010
Conference
A peer-to-peer backup system with incentives
TSP 2010, 33rd International Conference on Telecommunications and Signal Processing, 17-20 August 2010, Vienna, Austria
-
August 2010
Journal
Static analysis for detecting taint-style vulnerabilities in web applications
Journal of Computer Security, Vol 18, N°5, August 2010
-
August 2010
Journal
Privacy and confidentiality in context-based and epidemic forwarding
"Computer Communications", Elsevier, Vol 33, N°13, August 2010
-
July 2010
Conference
Parallel bulk Insertion for large-scale analytics applications
LADIS 2010, 4th ACM SIGOPS/SIGACT Workshop on Large Scale Distributed Systems and Middleware, July 28-29, 2010, Zürich, Switzerland
-
July 2010
Journal
Stochastic pronunciation modeling for out-of-vocabulary spoken term detection
IEEE Transactions on Audio, Speech, and Language Processing, Vol.19, N°4, July 15th, 2010, ISSN:1558-7916
-
July 2010
Conference
Take a deep breath : a stealthy, resilient and cost-effective botnet using Skype
DIMVA 2010, 7th Conference on Detection of Intrusions and Malware and Vulnerability Assessment, July 8-9th, 2010, Bonn, Germany / Also published in "LNCS", 2010, Vol 6201/2010
-
July 2010
Conference
Combining edge detection and region segmentation for lip contour extraction
AMDO 2010, 6th Conference on Articulated Motion and Deformable Objects, July 7-9, 2010, Andratx, Mallorca, Spain / Also published in LNCS, Volume 6169/2010
-
July 2010
Conference
A Markov random field description of fuzzy color segmentation
IPTA 2010, 2nd International Conference on Image Processing Theory, Tools and Applications, July 7-10, 2010 Paris, France
-
July 2010
Conference
Secure on-board protocols
CAST 2010, Workshop on Mobile Security for Intelligent Cars, July 1, 2010, Darmstadt, Germany
-
June 2010
Thesis
Document-based agile workflows : Models, interoperability and security
Thesis
-
June 2010
Thesis
Secret handshake protocols
Thesis
-
June 2010
Conference
A first look at traffic classification in enterprise networks
TRAC 2010, 1st ACM International Workshop on Traffic Analysis and Classification, June 28th-July 2nd, 2010, Caen, France
-
June 2010
Thesis
Security in opportunistic communications
Thesis
-
June 2010
Conference
Exploiting diverse observation perspectives to get insights on the malware landscape
DSN 2010, 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, June 28-July 1, 2010, Fairmont Chicago, USA
-
June 2010
Conference
Least attained recent service for packet scheduling over wireless LANs
WOWMOM 2010, 11th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, June 14-17, 2010, Montreal, Canada
-
June 2010
Conference
Is the internet for porn? An insight into the online adult industry
WEIS 2010, 9th Workshop on the Economics of Information Security, 7-8 June 2010, Boston, USA
-
June 2010
Journal
Evaluating and improving the content access in KAD
Journal of Peer-to-Peer Networks and Applications, Vol 3, N°2, June 2010
-
June 2010
Conference
Second Life : a social network of humans and bots
NOSSDAV 2010, 20th International Workshop on Network and Operating Systems Support for Digital Audio and Video, June 2-4, 2010, Amsterdam, The Netherlands
-
May 2010
Conference
Performance footprints of heavy-users in 3G networks via empirical measurement
WINMEE 2010, 6th International workshop on Wireless Network Measurements, May 31st, 2010, Avignon, France
-
May 2010
Conference
Secure automotive on-board electronics network architecture
FISITA 2010, World Automotive Congress, 30 May-4 June 2010, Budapest, Hungary
-
May 2010
Conference
Color based soft biometry for hooligans detection
ISCAS 2010, IEEE International Symposium on Circuits and Systems, May 30th-June 2nd, 2010, Paris, France
-
May 2010
Conference
Security issues in vehicular systems : threats, emerging solutions and standards
SAR-SSI 2010, 5th Conference on Network Architectures and Information Systems Security, May 18-21, 2010, Menton, France
-
May 2010
Conference
A framework towards the efficient identification and modeling of security requirements
SAR-SSI 2010, 5th Conference on Network Architectures and Information Systems Security, May 18-21, 2010, Menton, France
-
May 2010
Conference
Identifying dormant functionality in malware programs
SP 2010, 31st IEEE Symposium on Security and Privacy, May 16-19, 2010, Oakland, CA, USA
-
May 2010
Conference
Inspector Gadget : automated extraction of proprietary gadgets from malware binaries
SP 2010, 31st IEEE Symposium on Security and Privacy, May 16-19, 2010, Oakland, CA, USA
-
May 2010
Conference
A practical attack to de-anonymize social network users
SP 2010, 31st IEEE Symposium on Security and Privacy, May 16-19, 2010, Oakland, CA, USA
-
May 2010
Report
A multimodal approach to initialisation for top-down speaker diarization of television shows
Research Report RR-10-239, May 5th, 2010
-
April 2010
Conference
Honeybot, your man in the middle for automated social engineering
LEET 2010, 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 27 April, 2010, San Jose, USA
-
April 2010
Conference
Extending Mondrian memory protection
NATO RTO IST-091 Symposium, April 2010, Antalya, Turkey
-
April 2010
Conference
The insecurity of sharing MY Life on the Web : The butterfly effect of images and videos in social networks
WEBSCI 2010, 2nd Web Science Conference, April 26-27, 2010, Raleigh, North Calorina, USA
-
April 2010
Report
Tracker : security and privacy for RFID-based supply chains
Cryptology ePrint archive, report 2010/219, April 2010
-
April 2010
Conference
A solution for the automated detection of clickjacking attacks
ASIACCS 2010, 5th Symposium on Information Computer and Communications Security, April 13-16, 2010, Beijing, China
-
April 2010
Report
Hybrid traffic identification
Research Report RR-10-238
-
April 2010
Conference
Traffic monitoring and analysis
TMA 2010, 2nd International Workshop, April 7, 2010, Zurich, Switzerland / Also published in "Lecture Notes in Computer Science", Vol 6003/2010
-
March 2010
Thesis
A multicriteria clustering approach to support attack attribution in cyberspace
Thesis
-
March 2010
Conference
Bootstrapping security associations in opportunistic networks
MP2P 2010, 6th International Workshop on Mobile Peer-to-Peer Computing, March 29-April 2, 2010, Mannheim, Germany / Also published in PerCOM 2010, 8th Annual IEEE International Conference on Pervasive Computing and Communications
-
March 2010
Conference
Secret interest groups (SIGs) in social networks with an implementation on Facebook
SAC 2010, 25th ACM Symposium On Applied Computing, March 22-26, 2010, Sierre, Switzerland
-
March 2010
Conference
CAPTCHA smuggling : Hijacking web browsing sessions to create CAPTCHA farms
SAC 2010, 25th ACM Symposium On Applied Computing, March 22-26, 2010, Sierre, Switzerland
-
March 2010
Conference
Improving the efficiency of dynamic malware analysis
SAC 2010, 25th ACM Symposium On Applied Computing, March 22-26, 2010, Sierre, Switzerland
-
March 2010
Conference
An assessment of linear adaptive filter performance with nonlinear distortions
ICASSP 2010, 35th International Conference on Acoustics, Speech, and Signal Processing, March 14-19, 2010, Dallas, Texas, USA
-
March 2010
Conference
Achieving life-cycle compliance of service-oriented architectures : Open issues and challenges
SETOP 2009, Lecture Notes in Computer Science, Springer, Volume 5939/2010, ISBN: 978-3-642-11206-5
-
March 2010
Report
Traffic classification in enterprise network : Preliminary results
Research Report RR-10-235
-
March 2010
Report
Abusing social networks for automated user profiling
Research Report RR-10-233
-
March 2010
Report
Traffic classification : Application-based feature selection using logistic regression
Research report RR-10-234
-
March 2010
Journal
Hierarchical codes : a flexible trade-off for erasure codes in peer-to-peer storage systems
"Peer-to-Peer Networking and Applications" Journal, Springer, March 2010, Vol.3 N°1, ISSN: 1936-6450
-
February 2010
Conference
Efficient detection of split personalities in malware
NDSS 2010, 17th Annual Network and Distributed System Security Symposium, February 28th-March 3rd, 2010, San Diego, USA
-
February 2010
Conference
Security issues in opportunistic networks
MOBIOPP 2010, 2nd ACM International Workshop on Mobile Opportunistic Networking, February 22-23, 2010, Pisa, Italy
-
February 2010
Book
Composing and coordinating transactional Web services
Book chapter in "Web Services Research for Emerging Applications: Discoveries and Trends". Editor : Liang-Jie Zhang, IGI Global Publication, ISBN: 978-1615206841
-
February 2010
Thesis
Lip analysis for person recognition
Thesis
-
February 2010
Journal
Flexible on-board stream processing for automotive sensor data
IEEE Transactions on Industrial Informatics, Vol 6, N°1, February 2010, ISSN: 1551-3203
-
January 2010
Journal
A provably secure secret handshake with dynamic controlled matching
Computers and Security, Volume 29, Issue 5, July 2010
-
January 2010
Conference
Data privacy management and autonomous spontaneous security
SETOP 2009, 4th International Workshop, DPM 2009 and Second International Workshop, September 24-25, 2009, Saint Malo, France / Also published as Springer : "Lecture Notes in Computer Science", Vol 5939, ISBN: 978-3-642-11206-5
-
January 2010
Journal
Secure P2P data storage and maintenance
International Journal of Digital Multimedia Broadcasting, Vol 2010, January 2010, Article ID 720251
-
January 2010
Conference
Realistic and animatable face models for expression simulations in 3D
3DIP 2010, Electronic Imaging Conference on 3D Image Processing and Applications, January 17-21, 2010, San Jose, CA, USA / Also published as "SPIE - The International Society for Optical Engineering", Volume 7526, 2010
-
January 2010
Conference
A statistical approach to culture colors distribution in video sensors
VPQM 2010, 5th International Workshop on Video Processing and Quality Metrics for Consumer Electronics, January 13-15, 2010, Scottsdale, USA
-
December 2009
Journal
Long term study of peer behavior in the KAD DHT
IEEE/ACM Transactions on Networking, Vol. 17, N°5, October 2009, ISSN:1063-6692
-
December 2009
Conference
Two attacks against the Ff RFID protocol
INDOCRYPT 2009, 10th International Conference on Cryptology, December 13-16, 2009, New Delhi, India / Also published as Springer "Lecture Notes in Computer Science", Vol 5922/2009, ISBN: 978-3-642-10627-9
-
December 2009
Conference
FIRE : Finding rogue networks
ACSAC 2009, 25th Annual Computer Security Applications Conference, December 7-11, 2009, Honolulu, Hawaii, USA
-
December 2009
Thesis
A peer-to-peer architecture for networked virtual environments
Thesis
-
December 2009
Conference
Secret handshakes with revocation support
ICISC 2009, 12th International Conference on Information Security and Cryptology, December 2-4, 2009, Seoul, Korea / Also published in "Lecture Notes in Computer Science", Vol 5984/2010
-
November 2009
Conference
Distributed avatar management for Second Life
NetGames 2009, 8th Annual Workshop on Network and Systems Support for Games, November 23-24, 2009, Paris, France
-
November 2009
Journal
The WOMBAT attack attribution method : Some results
Lecture Notes in Computer Science, Volume 5905/2009, ISSN : 0302-9743
-
November 2009
Conference
Secure in-VM monitoring using hardware virtualization
CCS 2009, 16th ACM Conference on Computer and communications security, November 9-13, 2009, Chicago, USA
-
November 2009
Conference
PSP : private and secure payment with RFID
WPES 2009, 8th ACM Workshop on Privacy in the Electronic Society, November 9, 2009, Hyatt Regency, Chicago, USA
-
November 2009
Conference
Challenging statistical classification for operational usage : the adsl case
IMC 2009, 9th ACM SIGCOMM Internet Measurement Conference, November 4-6, 2009, Chicago, USA
-
November 2009
Book
Assessing cybercrime through the eyes of the WOMBAT
Book chapter N°6 in "Cyber Situational Awareness : Issues and Research", Springer International Series on Advances in Information Security, Part 3, 2009. ISBN: 98-1-4419-0139-2
-
October 2009
Book
Behavioral analysis of zombie armies
Book chapter in "The Virtual Battlefield : Perspectives on Cyber Warfare", Vol. 3 of Cryptology and Information Security Series, October 2009, C. Czosseck and K. Geers ED., ISBN: 978-1-60750-060-5
-
October 2009
Conference
Proceedings of the ACM SIGKDD Workshop on cybersecurity and intelligence informatics
KDD 2009, 15th ACM SIGKDD Workshop on cybersecurity and intelligence informatics, June 28-July 1, 2009, Paris, France, ISBN:978-1-60558-669-4
-
October 2009
Journal
Client-side cross-site scripting protection
Computers and Security Journal, Vol. 28, N°7, October 2009
-
October 2009
Book
Cyber SA : situational awareness for cyber defense
Book chapter N°1 in "Cyber Situational Awareness : Issues and Research", Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang, eds., ISBN: 98-1-4419-0139-2, Springer International Series on Advances in Information Security, 2009.
-
October 2009
Thesis
Data redundancy and maintenance for peer-to-peer file backup systems
Thesis
-
October 2009
Conference
Security requirements for automotive on-board networks
ITST 2009, 9th International Conference on ITS Telecommunications, October, 20-22, 2009, Lille, France
-
October 2009
Conference
Honeypot traces forensics : the observation view point matters
NSS 2009, 3rd International Conference on Network and System Security, October 19-21, 2009, Gold Cost, Australia
Best paper award
-
October 2009
Conference
Temporal normalization of videos using visual speech
MIFOR 2009, 1st ACM Workshop on Multimedia in Forensics, October 19-24, 2009, Beijing, China
-
October 2009
Conference
Face dynamics for biometric people recognition
MMSP 2009, IEEE International Workshop on Multimedia Signal Processing, October 5-7, 2009, Rio de Janeiro, Brazil
-
October 2009
Conference
Object detection with a minimal set of examples using convolutional PCA
MMSP 2009, IEEE International Workshop on Multimedia Signal Processing, October 5-7, 2009, Rio de Janeiro, Brazil
-
September 2009
Journal
Efficient access control for wireless sensor data
Ad hoc & sensor wireless networks, An International Journal, Volume 7, N°3-4, September 2009
-
September 2009
Book
Peer-to-peer content distribution
Book chapter in "Encyclopedia of database systems", September 2009, Springer, ISBN:9780387496160
-
September 2009
Thesis
Honeypot traces forensics by means of attack event identification
Thesis
-
September 2009
Report
AnSta : anonymous statistics using RFID tags
Cryptology ePrint Archive : Report 2009/481, September 2009
-
September 2009
Report
Computer aided design of a firmware flashing protocol for vehicular on-board networks
Research Report RR-09-235
-
September 2009
Conference
A measurement of mixing time in social networks
STM 2009, 5th International Workshop on Security and Trust Management, September 24-25, 2009, Saint Malo, France
-
September 2009
Conference
Document-based dynamic workflows : towards flexible and stateful services
SCC 2009, IEEE International Conference on Services Computing, September 21-25, 2009, Bangalore, India
-
September 2009
Conference
Automatically generating models for botnet detection
ESORICS 2009, 14th European Symposium on Research in Computer Security, September 21-23, 2009, Saint-Malo, France / Also published as Springer "Lecture Notes in Computer Science", Volume 5789/2009
-
September 2009
Conference
Layer 2 vs. Layer 3 mechanisms for improving TCP performance in 802.11 wireless lans
ITC 2009, 21st International Teletraffic Congress, September 15-17, 2009, Paris, France
-
September 2009
Conference
Automated spyware collection and analysis
ISC 2009, Information Security Conference, September 7-9, 2009, Pisa, Italy / Also published in LNCS, Volume 5735/2009, ISBN: 978-3-642-04473-1
-
September 2009
Conference
On the security and feasibility of safebook : A distributed privacy-preserving online social network
Keynote paper at 5th IFIP WG/PrimeLife International Summer School, September 9-11, 2009, Nice, France / Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 320)
-
September 2009
Journal
Technical perspective - They do click, don't they?
Communications of the ACM, Vol 52, N°9, September 2009
-
August 2009
Conference
Impostor detection using facial stereoscopic images
EUSIPCO 2009, 17th European Signal Processing Conference, August 24-28, 2009, Glasgow, Scotland
-
August 2009
Conference
Towards secure content based dissemination of XML documents
IAS 2009, 5th International Conference on Information Assurance and Security, August 18-20, 2009, Xi'an, China
-
July 2009
Report
Bootstrapping security associations in content-based opportunistic networks
Research Report RR-09-233
-
July 2009
Journal
Efficient access control for wireless sensor data
International Journal of Wireless Information Networks, Springer, Vol.16, N°3, September 2009
-
July 2009
Book
A semantic policy management environment for end-users and its empirical study
Book chapter in "Networked Knowledge-Networked Media", Book series "Studies in Computational Intelligence", Volume 221/2009, ISBN: 978-3-642-02183-1
-
July 2009
Conference
An experimental study of diversity with off-the-shelf antiVirus engines
NCA09, 8th IEEE International Symposium on Network Computing and Applications, July 9-11, 2009, Cambridge, MA USA
-
July 2009
Conference
Defending browsers against drive-by downloads : mitigating heap-spraying code injection attacks
DIMVA 2009, 6th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 9-10, 2009, Milano, Italy / Also published in Springer LNCS 5587/2009
-
July 2009
Conference
Traffic to protocol reverse engineering
CISDA 2009, 2nd IEEE Symposium on Computational Intelligence for Security and Defence Applications, July 8-10, 2009, Ottawa, Canada
-
July 2009
Book
Footstep recognition
Book chapter in "Encyclopedia of Biometrics", Part 6, Li, Stan Z. (Ed.), 2009, ISBN: 978-0-387-73002-8
-
June 2009
Journal
Person recognition using facial video information : A state of the art
Journal of Visual Languages, Volume 20, Issue 3, June 2009
-
June 2009
Conference
The Ff-family of protocols for RFID-privacy and authentication
RFIDSEC 2009, 5th Workshop on RFID Security, June 30-July 2, 2009, Leuven, Belgium
-
June 2009
Conference
A game theoretical approach in securing P2P storage against whitewashers
COPS 2009, 5th International WETICE Workshop on Collaborative Peer-to-Peer Systems, June 29-July 1st, 2009, Groningen, The Netherlands
Best paper award
-
June 2009
Conference
Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making
KDD 2009, 15th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Workshop on CyberSecurity and Intelligence Informatics, June 28th-July 1st, 2009, Paris, France
-
June 2009
Conference
The image text recognition graph (iTRG)
ICME 2009, IEEE International Conference on Multimedia and Expo, June 28-July 3, 2009, New York, USA
-
June 2009
Conference
A practical study of regenerating codes for peer-to-peer backup systems
ICDCS 2009, 29th IEEE International Conference on Distributed Computing Systems, June 22-26, 2009, Montreal, Canada
-
June 2009
Conference
A security pattern for untraceable secret handshakes
SECURWARE 2009, 3rd International Conference on Emerging Security Information, Systems and Technologies, June 18-23, 2009, Athens/Glyfada, Greece
-
June 2009
Thesis
Security and cooperation for peer-to-peer data storage
Thesis
-
June 2009
Conference
Privacy in context-based and epidemic forwarding
AOC 2009. 3rd IEEE International WoWMoM Workshop on Autonomic and Opportunistic Communications, June 15, 2009, Kos, Greece
-
June 2009
Conference
Effective and efficient malware detection at the end host
USENIX 2009, 18th Usenix Security Symposium, August 10-14, 2009, Montreal, Canada
-
June 2009
Conference
Wireless media streaming over IP-based in-vehicle networks
ICC 2009, IEEE Vehicular Networking & Applications Workshop, June 14-18, 2009, Dresden, Germany
-
June 2009
Poster / Demo
iTETRIS : the framework for large-scale research on the impact of cooperative wireless vehicular communications systems in traffic efficiency
ICT-MobileSummit 2009, 18th ICT-MobileSummit Conference, June 10-12, 2009, Santander, Spain
-
June 2009
Book
Assessment of a footstep biometric verification system
Book chapter in "Advances in Pattern Recognition, Handbook of Remote Biometrics", Springer, ISBN: 978-1-84882-384-6, June 2009
-
June 2009
Conference
Automatic cross-biometric footstep database labelling using speaker recognition
ICB 2009, 3rd IAPR/IEEE International Conference of Biometrics, June 2-5, 2009, Alghero, Sardinia Island, Italy | Also published as Springer "Lecture Notes in Computer Science", Vol. 5558/2009
-
May 2009
Conference
Privacy in content-based opportunistic networks
WON 2009, 2nd IEEE International Workshop on Opportunistic Networking, May 29, 2009, Bradford, UK
-
May 2009
Conference
The LIA-EURECOM RT`09 Speaker Diarization System
RT 2009, NIST Rich Transcription Workshop, May 28-29, 2009, Melbourne, USA
-
May 2009
Conference
Trustworthiness assessment of wireless sensor data for business applications
AINA 2009, 23rd IEEE International Conference on Advanced Information Networking and Applications, May 26-29, 2009, Bradford, UK
-
May 2009
Conference
A secure comparison technique for tree structured data
ICIW 2009, 4th International Conference on Internet and Web Applications and Services, May 24-28, 2009, Venice, Italy
-
May 2009
Conference
A provably secure secret handshake with dynamic controlled matching
IFIP SEC 2009, 24th International Information Security Conference, May 18-20, 2009, Pafos, Cyprus
Best Student Paper Award
-
May 2009
Conference
Ontology-based secure XML content distribution
IFIP SEC 2009, 24th International Information Security Conference, May 18-20, 2009, Pafos, Cyprus
-
May 2009
Conference
Privacy-preserving content-based publish/subscribe networks
IFIP SEC 2009, 24th International Information Security Conference, May 18-20, 2009, Pafos, Cyprus
-
May 2009
Conference
Prospex : protocol specification extraction
SP 2009, 30th IEEE Symposium on Security and Privacy, May 17-20, 2009, The Claremont Resort, Oakland, USA
-
May 2009
Conference
Automatic reverse engineering of malware emulators
SP 2009, 30th IEEE Symposium on Security and Privacy, May 17-20, 2009, Oakland, California
Best Student Paper Award
-
May 2009
Conference
SWAP : mitigating XSS attacks using a reverse proxy
SESS 2009, 5th International Workshop on Software Engineering for Secure Systems; ICSE'09, 31st International Conference on Software Engineering, IEEE Computer Society, May 16-24, 2009, Vancouver, Canada
-
May 2009
Conference
Removing web spam links from search engine results
EICAR 2009, 18th European Institute for Computer Antivirus Research Annual Conference, May 11-12, 2009, Berlin, Germany
-
May 2009
Conference
Revisiting the performance of short TCP transfers
Networking 2009, 8th IFIP International Conference on Networking, May 11-15, 2009, Aachen, Germany / Also published in "Lecture Notes in Computer Science", Vol 5550/2009, ISBN: 978-3-642-01398-0
-
May 2009
Conference
Revealing the unknown ADSL traffic using statistical methods
TMA 2009, 1st International Workshop on Traffic Monitoring and Analysis, May 11, 2009, Aachen, Germany / Also published in "Lecture Notes in Computer Science", Volume 5537/2009, ISBN: 978-3-642-01644-8
-
May 2009
Conference
Where is my peer ? Evaluation of the Vivaldi network coordinate system in Azureus
Networking 2009, 8th IFIP International Conference on Networking, May 11-15, 2009, Aachen, Germany, also published in "Lecture Notes in Computer Science", Volume 5550/2009
-
May 2009
Report
An efficient comparison technique for sanitized XML trees
Research Report RR-09-227
-
May 2009
Journal
Server-side bot detection in massively multiplayer online games
IEEE Security and Privacy, Vol 7, N°3, May-June 2009
-
April 2009
Report
PSP : private and secure payment with RFID
Cryptology ePrint archive, Report 2009/181, April 2009
-
April 2009
Conference
Mitigating drive-by download attacks : challenges and open problems, open research problems
INETSEC 2009, Open Research Problems in Network Security, 23-24 April 2009, Zurich, Switzerland / Also published in IFIP "Advances in Information and Communication Technology", Vol 309, ISSN: 1868-4238
-
April 2009
Conference
Leveraging social links for trust and privacy in networks
INETSEC 2009, Open Research Problems in Network Security, 23-24 April 2009, Zurich, Switzerland / Also published in IFIP "Advances in Information and Communication Technology", Vol 309, ISSN: 1868-4238
-
April 2009
Conference
New directions in RFID security
INETSEC 2009, Open Research Problems in Network Security, 23-24 April 2009, Zurich, Switzerland / Also published in IFIP "Advances in Information and Communication Technology", Vol 309, ISSN: 1868-4238
-
April 2009
Conference
Tailored security and safety for pervasive computing
INETSEC 2009, Open Research Problems in Network Security, 23-24 April 2009, Zurich, Switzerland | Also published in "IFIP Advances in Information and Communication Technology", Vol 309, 2009, ISSN: 1868-4238
-
April 2009
Journal
Hierarchical codes : a flexible trade-off for erasure codes
Journal of Peer-to-Peer Networks and Applications, Vol 2, March 2009.
-
April 2009
Conference
A view on current malware behaviors
LEET 2009, 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, April 21, 2009, Boston, USA
-
April 2009
Conference
All your contacts are belong to us : automated identity theft attacks on social networks
WWW 2009, 18th International World Wide Web Conference, April 20-24, Madrid, Spain
-
April 2009
Conference
P2P Second Life : experimental validation using Kad
Infocom 2009, 28th IEEE Conference on Computer Communications, April 19-25, 2009, Rio de Janeiro, Brazil
-
April 2009
Conference
A walkable kademlia network for virtual worlds
INFOCOM 2009, 28th IEEE Conference on Computer Communications, April 19-25, 2009, Rio de Janeiro, Brazil
-
April 2009
Report
A document-based dynamic workflow system
Research report RR-09-231
-
April 2009
Conference
Fast available bandwidth sampling for ADSL links : rethinking the estimation for larger-scale measurements
PAM 2009, 10th International Conference on Passive and Active Network Measurement, April 1-3rd, 2009, Seoul, South Korea, also published in Lecture Notes in Computer Science, Vol 5448/2009
-
April 2009
Journal
A framework for probabilistic, authentic aggregation in wireless sensor networks
PIK Vol. 32(2); April 2009; ISSN 0930-5157
-
April 2009
Book
Future threats to future trust
Book chapter in "Future of Trust in Computing", 2009, Springer, ISBN: 978-3-8348-9324-6
-
March 2009
Report
Content-driven secure and selective XML dissemination
Research Report RR-09-229
-
March 2009
Conference
RFID-based supply chain partner authentication and key agreement
WISEC 2009, 2nd ACM Conference on Wireless Network Security, March 16-18, 2009, Zurich, Switzerland
-
February 2009
Journal
Managing knowledge to enhance learning
Knowledge Management & E-Learning : An International Journal, Vol. 1, N°2, 2009
-
February 2009
Report
Privacy in context-based and epidemic forwarding
Research Report RR-09-228
-
February 2009
Report
Honeypot traces forensics : the observation view point matters
Research report RR-09-226
-
February 2009
Conference
Scalable, behavior-based malware clustering
NDSS 2009, 16th Annual Network and Distributed System Security Symposium, February 8-11, 2009, San Diego, USA
-
February 2009
Journal
Steganography in 3D geometries and images by adjacent bin mapping
EURASIP Journal on Information Security, Vol. 2009 (2009), Article ID 317165
-
January 2009
Report
Revisiting the performance of short TCP transfers
Research report RR-09-233, January 15th, 2009
-
January 2009
Journal
Optimally DoS resistant P2P topologies for live multimedia streaming
IEEE Transactions on Parallel and Distributed Systems, 2009, Vol.20 N°6, ISSN: 1045-9219
-
January 2009
Conference
Towards a new image-based spectrogram segmentation speech coder optimised for intelligibility
MMM 2009, 15th international Multimedia Modeling Conference, January 7-9, 2009, Sophia-Antipolis, France / Also published in Springer "LNCS" 5371/2009
-
January 2009
Journal
Confidentiality and integrity for data aggregation in WSN using peer monitoring
Security and Communication Networks, Vol 2, N°2, March/April 2009, Security in Wireless Sensor Networks
-
December 2008
Conference
A large scale footstep database for biometric studies created using cross-biometrics for labelling
ICARCV 2008, 10th International Conference on Control, Automation, Robotics and Vision, December 17-20, 2008, Hanoi, Vietnam
-
December 2008
Conference
On the impact of DoS attacks on secure service discovery
NCUS 2008, 4th IEEE/IFIP International Symposium on Network Centric Ubiquitous Systems, December 17-20, 2008, Shanghai, China
-
December 2008
Conference
Actionable knowledge discovery for threats intelligence support using a multi-dimensional data mining methodology
ICDM 2008, 8th IEEE International Conference on Data Mining, December 15-19, 2008, Pisa, Italy
-
December 2008
Conference
Validating peer-to-peer storage audits with evolutionary game theory
IWSOS 2008, 3rd International Workshop on Self-Organizing Systems, December 10-12, 2008, Vienna, Austria / Also published in Lecture Notes in Computer Sciences, Volume 5343/2008
-
December 2008
Conference
Is there life in Second Life?
CoNEXT 2008, 4th ACM International Conference on emerging Networking Experiments and Technologies, December 9, 2008, Madrid, Spain
-
December 2008
Conference
Capacity estimation of ADSL links
CONEXT 2008, 4th ACM International Conference on emerging Networking Experiments and Technologies, December 9, 2008, Madrid, Spain
-
December 2008
Thesis
Structures and algorithms for peer-to-peer cooperation
Thesis
-
December 2008
Thesis
Image and video text recognition using convolutional neural networks
Thesis
-
December 2008
Thesis
SGNET : automated protocol learning for the observation of malicious threats
Thesis
-
November 2008
Conference
Secure service discovery with distributed registries
SUPE 2008, 2nd IEEE Workshop on Service Discovery and Composition in Ubiquitous and Pervasive Environments, 30 November-04 December, 2008, New Orleans, LA, USA
-
November 2008
Report
Privacy-preserving content-based publish/Subscribe networks
Research report RR-08-232
-
November 2008
Conference
Physiological and behavioural approaches for person recognition using videos
IPTA 2008, 1st workshop on Image Processing Theory, Tools and Applications, 23-26 November, 2008, Sousse, Tunisia
-
November 2008
Report
The Ff-family of protocols for RFID-privacy and authentication
Cryptology ePrint archive, Report 2008/476, November 2008
-
November 2008
Report
A provably secure secret handshake with controlled matching
Research report RR-08-229
-
November 2008
Report
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems
Research report RR-08-230
-
October 2008
Conference
Improving flow level fairness and interactivity in WLANs using size-based scheduling policies
MSWiM 2008, 11th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, October 27-31, 2008, Vancouver, Canada
-
October 2008
Conference
Social networking for pervasive adaptation
SASO 2008, 2nd IEEE International Conference on Self-Adaptive and Self-Organizing Systems, October 20-21, 2008, Venice, Italy
-
October 2008
Conference
Facial gender recognition using multiple sources of visual information
MMSP 2008, 10th IEEE International Workshop on MultiMedia Signal Processing, October 8-10, 2008, Cairns, Queensland, Australia
-
October 2008
Conference
Reversible watermarking of 3D mesh models by prediction-error expansion
MMSP 2008, 10th IEEE International Workshop on MultiMedia Signal Processing, October 8-10, 2008, Cairns, Queensland, Australia
-
October 2008
Conference
Revisiting web traffic from a DSL provider perspective : the case of YouTube
ITC-SS 2008, 19th ITC Specialist Seminar 2008 on Network Usage and Traffic, October 8-9, 2008, Berlin, Germany
-
October 2008
Conference
Large scale malware collection : lessons learned
SRDS 2008, 27th International Symposium on Reliable Distributed Systems, October 6-8, 2008, Napoli, Italy
-
September 2008
Conference
Overbot - A botnet protocol based on Kademlia
SecureComm 2008, 4th International Conference on Security and Privacy in Communication Networks, September 22-25, 2008, Istanbul, Turkey
-
September 2008
Conference
Assessment of objective quality measures for speech intelligibility
INTERSPEECH 2008, 9th Annual Conference of the International Speech Communication Association, September 22-26, 2008, Brisbane, Australia
-
September 2008
Conference
Reputation and audits for self-organizing storage
SOSOC 2008, International Workshop on Security in Opportunistic and Social Networks at SecureComm 2008, September 22-25, 2008, Istanbul, Turkey
-
September 2008
Conference
A key management solution for overlay-live-streaming
SOSOC 2008, International Workshop on Security in Opportunistic and Social Networks at SecureComm 2008, September 22-25, 2008, Istanbul, Turkey
-
September 2008
Conference
Visual-similarity-based phishing detection
SecureComm 2008, 4th International Conference on Security and Privacy in Communication Networks, September 22-25th 2008, Istanbul, Turkey
-
September 2008
Book
Automating the analysis of honeypot data
Book chapter in "Recent Advances in Intrusion Detection", published as LNCS, Volume 5230/2008, ISBN:978-3-540-87402-7
-
September 2008
Book
Leveraging user interactions for in-depth testing of web applications
Book chapter in "Recent Advances in Intrusion Detection", published as LNCS, Volume 5230/2008, 978-3-540-87402-7
-
September 2008
Conference
Efficient access control for wireless sensor data
PIMRC 2008, IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 15-18 September, 2008, Cannes, France
-
September 2008
Conference
Distributed access control for XML document centric collaborations
EDOC 2008, 12th IEEE International Conference on Enterprise Distributed Object Computing, September 15-19, 2008, München, Germany
-
September 2008
Conference
Expanding human interactions for in-depth testing of web applications
RAID 2008, 11th Symposium on Recent Advances in Intrusion Detection, September 15-17 2008, Boston, USA | Also published as LNCS
-
September 2008
Conference
On the variance of the least attained service policy and its use in multiple bottleneck networks
NET-COOP 2008, 2nd Workshop on Network Control and Optimization, September 8-10, 2008, Paris, France / Also published in "Lecture Notes in Computer Science", Springer, Volume 5425/2009, ISBN: 978-3-642-00392-9
-
September 2008
Conference
A security protocol for self-organizing data storage
IFIP SEC 2008, 23rd International Information Security Conference, September 8-10, 2008, Milano, Italy / Also published in "IFIP International Federation for Information Processing", 2008, Volume 278/2008
-
September 2008
Conference
Faster content access in KAD
P2P 2008, 8th IEEE International Conference on Peer-to-Peer Computing, 8-11 September 2008, Aachen, Germany
-
September 2008
Conference
Hierarchical codes: how to make erasure codes attractive for peer-to-peer storage systems
P2P 2008, 8th IEEE International Conference on Peer-to-Peer Computing, 8-11 September 2008, Aachen, Germany
Best paper award
-
August 2008
Conference
An assessment of speech related information contained in GEMS signals
EUSIPCO 2008, 16th European Signal Processing Program, August 25-29, 2008, Lausanne, Switzerland
-
August 2008
Conference
Facial video based response registration system
EUSIPCO 2008, 16th European Signal Processing Conference, August 25-29, 2008, Lausanne, Switzerland
-
August 2008
Poster / Demo
Digging into KAD users' shared folders
SIGCOMM 2008, ACM annual conference of the Special Interest Group on Data Communications, August 18-22, 2008, Seattle, USA
-
August 2008
Conference
Use of semantic networks as learning material and evaluation of the approach by students
OLDE 2008, International Conference on Open Learning and Distance Education, August 13-15, 2008, Vienna, Austria, | Also published in "World Academy of Science, Engineering and Technology" proceedings, Vol. 31, ISSN 1307-6884
-
August 2008
Conference
Activity-related biometric authentication
ENTERFACE 2008, 4th Summer Workshop on Multimodal Interfaces, August 4th-29th, 2008, Paris, France
-
July 2008
Report
Privacy and confidentiality in content-based networking
Research report RR-08-227
-
July 2008
Report
Reputation and audits for self-organizing storage
Research report RR-08-226
-
July 2008
Report
Evolutionary game for peer-to-peer storage audits
Research report RR-08-225
-
July 2008
Conference
The quest for multi-headed worms
DIMVA 2008, 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 10-11th, 2008, Paris, France | Also published as LNCS Volume 5137
-
July 2008
Thesis
Spontaneous security services for ubiquitous computing
Thesis
-
June 2008
Conference
A comparative study of network transport protocols for in-vehicle media streaming
ICME 2008, IEEE International Conference on Multimedia & Expo, June 23-26 2008, Hannover, Germany
-
June 2008
Journal
A root cause analysis toolkit for TCP
Computer Networks. Volume 52, Issue 9, 26 June 2008
-
June 2008
Conference
Early stage denial of service attacks in BitTorrent: an experimental study
COPS 2008, WETICE Workshop on Collaborative Peer-to-Peer Systems, June 23-25, 2008, Roma, Italy
-
June 2008
Conference
Passive capacity estimation: comparison of existing tools
SPECTS 2008, International Symposium on Performance Evaluation of Computer and Telecommunication Systems, June 16-18, 2008, Edinburgh, UK
-
June 2008
Journal
A framework for attack patterns' discovery in honeynet data
DFRWS 2008, 8th Digital Forensics Research Conference, August 11-13, 2008, Baltimore, USA / Also published in "Digital Investigation", Volume 5, Supplement 1, September 2008
-
June 2008
Report
Crawling Azureus
Research report RR-08-223
-
May 2008
Conference
Securing ad hoc storage through probabilistic cooperation assessment
WCAN 2007, 3rd Workshop on Cryptography for Ad hoc Networks, July 8th, 2007, Wroclaw, Poland / Also published in Electronic Notes in theoretical computer science, Volume 192, N°2, 26 May 2008
-
May 2008
Conference
A data mapping method for steganography and its application to images
IH 2008, 10th International Worshop on Information Hiding, May 19-21, 2008, Santa Barbara, USA / Also published in LNCS Volume 5284/2008
-
May 2008
Report
A reputation system for self-organizing storage
Research report RR-08-222
-
May 2008
Conference
Saner: composing static and dynamic analysis to validate sanitization in web applications
SP 2008, IEEE Symposium on Security and Privacy, May 18-21, 2008, Oakland, USA
-
May 2008
Report
An experimental comparison of layer 2 and 3 mechanisms for improving user perceived performance of 802.11 wireless LANs
Research report RR-08-220
-
May 2008
Report
On the variance of the least attained service policy and its use in multiple bottleneck networks
Research report RR-08-224
-
May 2008
Conference
SGNET: a worldwide deployable framework to support the analysis of malware threat models
EDCC 2008, 7th European Dependable Computing Conference, May 7-9, 2008, Kaunas, Lituania
-
May 2008
Conference
A performance based approach to selecting a secure service discovery architecture
MWNS 2008, The Mobile and Wireless Networks Security Workshop joint with IFIP Networking 2008, May 5-9, 2008, Singapore
-
May 2008
Journal
The pervasive workflow: a decentralized workflow system supporting long running transactions
IEEE Transactions on Systems, Man and Cybernetics Part C - Applications ans reviews, Volume 38, N°3: Special issue on Enterprise services computing, May 2008
-
April 2008
Thesis
Video person recognition strategies using head motion and facial appearance
Thesis
-
April 2008
Report
A distributed access control framework for XML document centric collaborations
Research report RR-08-219
-
April 2008
Conference
The leurre.com project: collecting internet threats information using a worldwide distributed honeynet
WISTDCS 2008, 1st WOMBAT Workshop on Information Security Threats Data Collection and Sharing, April 21-22, 2008, Amsterdam, The Netherlands
-
April 2008
Conference
Non-cooperative available bandwidth estimation towards ADSL links
INFOCOM 2008, 11th IEEE Global Internet Symposium 2008, April 18, 2008, Phoenix, USA
-
April 2008
Conference
Measurements and mitigation of peer-to-peer-based botnets: a case study on storm wor
LEET 2008, 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats, April 15, 2008, San Francisco, USA
-
April 2008
Conference
SGNET: Implementation insights
NOMS 2008, IEEE/IFIP Network Operations and Management Symposium, April 7-11, 2008, Salvador da Bahia, Brazil
-
April 2008
Journal
Footstep recognition for a smart home environment
IJSH, International Journal of Smart Home, Volume 2, N°2, April 2008
-
March 2008
Conference
Tomofaces: eigenfaces extended to videos of speakers
ICASSP 2008, IEEE International Conférence on Acoustics, Speech, and Signal Processing, March 30-April 4, 2008, Las Vegas, USA
-
March 2008
Thesis
Multimedia security and 3D video objects
Thesis
-
March 2008
Report
A Markovian performance model for secure service discovery systems
Research report RR-08-214
-
March 2008
Journal
WG Requirements for network monitoring from an IDS perspective
Dagstuhlseminar on Network Attack Detection and Defense 2008, March 2-6, 2008, Dagstuhl, Germany
-
March 2008
Conference
WG Attack taxonomy
Dagstuhlseminar on Network Attack Detection and Defense 2008, March 2-6, 2008, Dagstuhl, Germany
-
March 2008
Conference
WG Intrusion and fraud detection for web services
Dagstuhlseminar on Network Attack Detection and Defense 2008, March 2-6, 2008, Dagstuhl, Germany
-
March 2008
Journal
Understanding threats:: A prerequisite to enhance survivability of computing systems
International Journal of Critical Infrastructures, Volume 4, N°1-2, 2008, p 153-171
-
February 2008
Report
General resource sharing problems in overlay networks
Research report RR-08-210
-
February 2008
Conference
Automatic network protocol analysis
NDSS 2008, 15th Annual Network and Distributed System Security Symposium, February, 15-18 2008, San Diego, USA
-
February 2008
Journal
Stochastic graph processes for performance evaluation of content delivery applications in overlay networks
IEEE Transactions on parallel and distributed systems, Volume 19 N°2, February 2008
-
January 2008
Conference
Security and privacy issues in middleware for emergency and rescue applications
PERVASIVEHEALTH 2008, 2nd International Conference on Pervasive Computing Technologies for Healthcare, January 30-February 2, 2008, Tampere, Finland
-
January 2008
Report
A security protocol for self-organizing data storage
Research report RR-08-208
-
January 2008
Journal
Transactional composite applications
Chapter 8 of "Managing web services quality : measuring outcomes and effectiveness", ISBN: 978-1-60566-042-4, October 2008
-
January 2008
Book
3D Object Processing : Compression, Indexing and Watermarking
Wiley, April 2008, ISBN:9780470065426
-
January 2008
Report
Unveiling BitTyrant: when the devil is not so black as he is painted
Research report RR-08-209
-
January 2008
Journal
Automating the composition of transactional Web services
International Journal of Web Services Research, Volume 5, N°1, 2008
-
January 2008
Journal
Bridging security and fault management within distributed workflow management systems
IEEE Transactions on Services Computing, Vol. 1, N°1, January-March 2008, ISSN: 1939-1374
-
January 2008
Journal
Operational comparison of available bandwidth estimation tools
ACM SIGCOMM Computer Communications Review, Volume 38 N°1, January 2008
-
December 2007
Conference
A networked virtual environment over KAD
CoNEXT 2007, 3rd International Conference on emerging Networking EXperiments and Technologies, December 10-13, 2007, New York, USA
-
December 2007
Conference
Building a reliable P2P system out of unreliable P2P clients: the case of KAD
CoNEXT 2007, 3rd International Conference on emerging Networking EXperiments and Technologies, December 10-13, 2007, New York, USA
-
December 2007
Conference
Proactive replication in distributed storage systems using machine availability estimation
CoNEXT 2007, 3rd International Conference on emerging Networking EXperiments and Technologies, December 10-13, 2007, New York, USA
-
December 2007
Conference
Empirical study of the impact of metasploit-related attacks in 4 years of attack traces
ASIAN 2007, 12th Annual Asian Computing Science Conference Focusing on Computer and Network Security, December 9-11, 2007, Doha, Qatar
-
December 2007
Conference
Extracting inter-arrival time based behaviour from honeypot traffic using cliques
ADF 2007, 5th Australian Digital Forensics Conference, December 3rd, 2007, Mount Lawley, Australia
-
December 2007
Thesis
PULSE - an adaptive practical live streaming system
Thesis
-
December 2007
Journal
Push-to-peer video-on-demand system: Design and evaluation
IEEE Journal of Selected Areas in Communications, Volume 25, N°9, December 2007
-
December 2007
Journal
Graph based analysis of mesh overlay streaming systems
IEEE Journal of Selected Areas in Communications, Volume 25, N°9, December 2007
-
November 2007
Conference
Towards secure and trusted collaboration environment for European public sector
TrustCol 2007, 2nd International Workshop on Trusted Collaboration, November 12th-15th, 2007, New York, USA
-
November 2007
Conference
Introduction de paramètres dynamiques en reconnaissance faciale
CORESA 2007, 12èmes journées d'étude et d'échange COmpression et REprésentation des Signaux Audiovisuels, November 8-9, 2007, Montpellier, France
-
November 2007
Report
Improving flow level fairness and interactivity in WLANs using size-based scheduling policies
Research report RR-07-206
-
October 2007
Conference
A global view of KAD
IMC 2007, ACM SIGCOMM Internet Measurement Conference, October 23-26, 2007, San Diego, USA
-
October 2007
Journal
Geometric invariants for 2D/3D face recognition
Pattern Recognition Letters, Volume 28, N°14, October 2007
-
October 2007
Report
Passive capacity estimation: comparison of existing tools
Research report RR-07-204
-
October 2007
Report
Analyzing peer behavior in KAD
Research report RR-07-205
-
October 2007
Thesis
Pervasive workflows: architecture, reliability and security
Thesis
-
October 2007
Conference
Migrating a honeypot to hardware
SECURWARE 2007, International conference on Emerging Security Information, Systems and Technologies, October 14-20, 2007, Valencia, Spain
-
October 2007
Conference
Toward a 3D watermarking benchmark
MMSP 2007, IEEE International workshop on multimedia signal processing, October 1-3, 2007, Chania, Greece
-
October 2007
Journal
Editorial : Introduction to the special issue on intrinsic speech variations
Speech Communication, Volume 49, Issues 10-11, October-November 2007
-
October 2007
Journal
Exploiting KAD: possible uses and misuses
Computer communications review, Volume 37, N°5, October 2007
-
September 2007
Talk
Biometrics and multimedia
2nd ECRYPT Summer School on Multimedia Security, 24-27 September 2007, Thessaloniki, Greece
-
September 2007
Conference
Load reduction in the KAD peer-to-peer system
DBISP2P 2007, 5th International Workshop on Databases, Information Systems and Peer-to-Peer Computing, September, 24, 2007, Vienna, Austria
-
September 2007
Conference
Information confinement, privacy, and security in RFID systems
ESORICS 2007, 12th European Symposium On Research In Computer Security, September 24-26, 2007, Dresden, Germany / Also published in LNCS, Volume 4734/2008, ISBN: 978-3-540-74834-2
-
September 2007
Conference
Traceability and integrity of execution in distributed workflow management systems
ESORICS 2007, 12th European Symposium On Research In Computer Security, September 24-26, 2007, Dresden, Germany
-
September 2007
Conference
Dynamic clustering in Delaunay-based P2P networked virtual environments
Netgames 2007, 6th Annual Workshop on Network and Systems support for Games, September 19-20th, 2007, Melbourne, Australia
-
September 2007
Conference
Video face recognition: a physiological and behavioural multimodal approach
ICIP 2007, 14th IEEE International Conference on Image Processing, September 16-19, 2007, San Antonio, USA
-
September 2007
Report
SigNCode: A provably secure homomorphic signature scheme for network coding
Research report RR-07-202
-
September 2007
Journal
Secure and trusted in-network data processing in wireless sensor networks: a survey
JIAS, Journal of Information Assurance and Security, Volume 2, Issue 3 (Special Issue), September 2007
-
August 2007
Conference
Dynamic clustering in Delaunay-Based P2P networked virtual environments
SIGCOMM 2007, ACM Workshop on Online Social Networks, August 27-31, 2007, Kyoto, Japan
-
August 2007
Conference
Optimistic fair exchange for secure forwarding
SPEUCS 2007, 1st Workshop on the Security and Privacy of Emerging Ubiquitous Communication Systems, August 10, 2007, Philadelphia, USA
-
July 2007
Conference
Secure service publishing with untrusted registries - Securing Service Discovery
SECRYPT 2007, International conference on Security and Cryptography, July 28-31, 2007, Barcelona, Spain
-
July 2007
Conference
Multimodal services for remote communications: the vote-registration example
eNTERFACE 2007, 3rd SIMILAR Workshop on Multimodal Interfaces, July 16-August 10th, 2007, Istanbul, Turkey
-
July 2007
Conference
Aggregation dynamics in service overlay networks
SASO 2007, 1st IEEE/ACM International Conference on Self-Adaptive and Self-Organizing Systems, July 9-11, 2007, Boston, USA
-
July 2007
Conference
SOAP-based secure conversation and collaboration
ICWS 2007, IEEE International Conference on Web Services, July 9-13, 2007, Salt Lake City, Utah, USA
-
July 2007
Report
Swarming on optimized graphs for n-way broadcast
Boston university technical report, BUCS-TR-2007-009
-
July 2007
Journal
Watermark recovery from 2D views of a 3D object using texture or silhouette information
Journal of Electronic Imaging, July-August 2007
-
June 2007
Conference
A game theoretic model of a protocol for data possession verification
TSPUC 2007, IEEE International Workshop on Trust, Security and Privacy for Ubiquitous Computing, June 18-21, 2007, Helsinki, Finland
-
June 2007
Conference
On the interaction between Internet applications and TCP
ITC 20, 20th International Teletraffic Congress, June 17-21, 2007, Ottawa, Canada / Also published in LNCS, Volume 4516/2007, ISBN: 978-3-540-72989-1
-
June 2007
Report
Verifying self-organized storage with bilinear pairings
Research report RR-07-201
-
June 2007
Conference
Discovery: Threats and solutions
SAR-SSI 2007, 2nd Conference on Security in Network Architectures and Information Systems, 12-15 June 2007, Annecy, France
-
June 2007
Conference
Compliance proofs for collaborative interactions using aspect-oriented approach
SERVICES 2007, Modeling, Design, and Analysis for Service-oriented Architecture Workshop, in conjunction with 4th IEEE International Conference on Services Computing, July 9-13, 2007, Salt Lake City, USA
-
June 2007
Conference
Enforcing integrity of execution in distributed workflow management systems
SCC 2007, 4th IEEE International Conference on Services Computing, July 9-13, 2007, Salt Lake City, USA
-
May 2007
Conference
Context-aware security policy for the service discovery
SSNDS 2007, 3rd IEEE International Symposium on Security in Networks and Distributed Systems, May 21-23, 2007, Niagara Falls, Canada
-
May 2007
Conference
Modeling seed scheduling strategies in BitTorrent
NETWORKING 2007, 6th IFIP international conference on Networking, May 14-18, 2007, Atlanta, USA / Also published as LNCS, Volume 4479/2010, ISBN: 978-3-540-72605-0
-
May 2007
Conference
Graph based modeling of P2P streaming systems
Networking 2007, 6th IFIP international conference on Networking, May 14-18, 2007, Atlanta, USA
-
May 2007
Talk
Introduction to digital watermarking
Conference on Cryptology and Digital Content Security, May 14-18, 2007, Barcelona, Spain
-
May 2007
Report
Service discovery: reviewing threats and security architectures
Research report RR-07-197, 7 May 2007
-
May 2007
Book
Utilisation des informations contextuelles pour assurer la sécurité d'un processus collaboratif distribué : un exemple dans l'e-Santé
Book chapter N°13 in "Informatique Diffuse", Observatoire Francais des Techniques Avancees, Collection Arago 31, Paris, Mai 2007, ISBN: 2-906028-17-7
-
May 2007
Book
Sécurité, protection de la vie privée et disponibilité
Book chapter N°12 in "Informatique Diffuse", Observatoire Francais des Techniques Avancees, Collection Arago 31, Paris, Mai 2007, ISBN: 2-906028-17-7
-
April 2007
Thesis
Multiple hypothesis feedback for robust speech recognition with a microphone array input
Thesis
-
April 2007
Conference
Person recognition from video using facial mimics
ICASSP 2007, 32nd IEEE International Conference on Acoustics, Speech, and Signal Processing, April 15 - 20, 2007, Honolulu, USA
-
April 2007
Report
Confidentiality and integrity for data aggregation in WSN using peer monitoring
Research report RR-07-193, 16 April 2007
-
April 2007
Conference
Performance limitations of ADSL users : a case study
PAM 2007, 8th Passive and Active Measurement conference, April 5-6, 2007, Louvain-la-neuve, Belgium
-
April 2007
Report
Enforcing integrity of execution in distributed workflow management systems
Research report RR-07-192, 5 April 2007
-
March 2007
Journal
Scheduling in practice
ACM Sigmetrics Performance Evaluation Review, Volume 34, Issue 4, Special issue on new perspectives in scheduling, March 2007
-
February 2007
Conference
Actively monitoring peers in KAD
IPTPS 2007, 6th International Workshop on Peer-to-Peer Systems, February 26-27, 2007, Bellevue, USA
-
February 2007
Report
Diagnostics of speech recognition : on evaluating feature set performance
Research report RR-07-190
-
February 2007
Report
A game theoretic model of a protocol for data possession verification
Research report RR-07-189
-
February 2007
Report
Probabilistically secure cooperative distributed storage
Research report RR-07-188
-
February 2007
Report
On the operational comparison of available bandwidth estimation tools
Research report RR-07-186
-
February 2007
Report
SGNET: a distributed infrastructure to handle zero-day exploits
Research report RR-07-187 - Extended version of this paper at EDCC 2008
-
February 2007
Journal
Overlay architectures for file distribution: fundamental performance analysis for homogeneous and heterogeneous cases
Computer networks, Volume 51, N°3, February 2007
-
February 2007
Conference
Watermarking attack: BOWS contest
Security, Steganography, and Watermarking of Multimedia Contents IX part of Electronic Imaging, 28 January-1 February 2007, San Jose, USA | SPIE proceedings Volume 6505
-
January 2007
Conference
Secure data aggregation with multiple encryption
EWSN 2007, 4th European conference on Wireless Sensor Networks, January 29-31, 2007, Delft, The Netherlands | Also published as LNCS Volume 4373
-
January 2007
Conference
Performance analysis of cooperative content distribution for wireless ad hoc networks
WONS 2007, 4th Annual Conference on Wireless On demand Network Systems and Services, January 24-26, 2007, Obergurgl, Austria
-
January 2007
Journal
Challenges in peer-to-peer gaming
Computer Communication Review, Volume 37, Issue 1, January 2007, ISSN:0146-4833
-
December 2006
Report
Investigations into tandem features
Research report RR-06-185
-
December 2006
Report
Modeling and analysis of seed sheduling strategies in a BitTorrent network
Research report RR-06-184
-
December 2006
Conference
Improved video verification method using digital watermarking
IIH-MSP 2006, 2nd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, December 18-20, 2006, Pasadena, USA
Best paper award
-
December 2006
Conference
Speech recognition in reverberant environments using remote microphones
ISM 2006, 8th IEEE International Symposium on Multimedia, December 11-13, 2006, San Diego, USA
-
December 2006
HDR
De la qualité de service à l'analyse de trafic
Habilitation à diriger des recherches (French qualification for conducting Phd theses)
-
December 2006
Thesis
Policy-based cryptography : theory and applications
Thesis
-
December 2006
Report
Size-based scheduling to improve fairness and performance in 802.11 networks
Research report RR-06-183
-
December 2006
Report
DASR: A diagnostic tool for automatic speech recognition
Research report RR-06-182
-
December 2006
Conference
Secure Web service discovery: overcoming challenges of ubiquitous computing
ECOWS 2006, 4th IEEE European Conference on Web Services, 4-6 December, 2006, Zurich, Switzerland
Best paper award
-
December 2006
Conference
Shortcuts in a virtual world
CoNext 2006, 2nd Conference on Future Networking Technologies, 4-7 December 2006, Lisboa, Portugal
-
December 2006
Journal
La biométrie en mouvement
La Recherche N°403, Décembre 2006
-
December 2006
Book
Tatouage des données multimédia, enjeux et applications potentielles
Book chapter in "Encyclopédie de l'informatique et des systèmes d'information", Section Systèmes multimédias, Vuibert, ISBN: 978-2-7117-4846-4
-
November 2006
Conference
Fast stochastic exploration of P2P file distribution architectures
GLOBECOM 2006, 49th annual IEEE Global Telecommunications Conference, November 27-December 1st, 2006, San Francisco, USA
-
November 2006
Conference
Content delivery in overlay networks: a stochastic graph processes perspective
GLOBECOM 2006, 49th annual IEEE Global Telecommunications Conference, November 27-December 1, 2006, San Francisco, USA
Best Student Paper Award
-
November 2006
Conference
Diagnostics of speech recognition using classification phoneme diagnostic trees
CI 2006, 2nd IASTED International Conference on computational intelligence, Special Session on NLP, November 20-22, 2006 San Francisco, USA
-
November 2006
Poster / Demo
Securing cooperative backup for mobile systems
Programme Initiative du GET, "Réseaux autonomes et spontanés", 16- 17 Novembre 2006, Rennes, France
-
November 2006
Conference
Towards secure SOAP message exchange in a SOA
SWS 2006, 3rd ACM Workshop on Secure web services, November 3rd, 2006, Alexandria, Virginia, USA
-
November 2006
Journal
Least squares filtering of speech signals for robust ASR
Speech Communication, Volume 48, Issue 11, November 2006
-
October 2006
Thesis
Root cause analysis of TCP throughput : methodology, techniques and applications
Thesis
-
October 2006
Conference
Towards transactional pervasive workflows
EDOC 2006, 10th IEEE International EDOC Conference "The Enterprise Computing Conference", 16-20 October 2006, Hong-Kong, Hong Kong
-
October 2006
Report
Application-level performance of ADSL users
Research report RR-06-178
-
October 2006
Conference
Person recognition based on head and mouth dynamics
MMSP 2006, IEEE International Workshop on Multimedia Signal Processing, October 3-6, 2006, Victoria, Canada
-
October 2006
Journal
On the need for signal-coherent watermarks
IEEE Transactions on Multimedia, Volume 8, N°5, October 2006
-
September 2006
Conference
Collusion-free policy-based encryption
ISC 2006, 9th International Conference on Information Security, August 30-September 2, 2006, Samos, Greece / Also published in Lecture Notes in Computer Science, Volume 4176
-
September 2006
Thesis
Novel speech processing techniques for robust automatic speech recognition
Thesis, N°3637, 2006
-
September 2006
Report
Cooperation incentive schemes
Research report RR-06-176
-
September 2006
Conference
Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots
RAID 2006, 9th International Symposium on Recent Advances in Intrusion Detection, September 20-22, 2006, Hamburg, Germany / Also published in Lecture Notes in Computer Science, Volume 4219/2006
-
September 2006
Conference
Augmenting Web services composition with transactional requirements
ICWS 2006, IEEE International Conference on Web Services, September 18-22, 2006, Chicago, USA
Runners-up
-
September 2006
Poster / Demo
A size-based scheduling to improve fairness and performance in 802.11 networks
SIGCOMM 2006, ACM conference of the Special Interest Group on Data Communication, September 11-15, 2006, Pisa, Italy
-
September 2006
Conference
Proof-carrying proxy certificates
SCN 2006, 5th Conference on Security and Cryptography for Networks, September 6-8, 2006, Maiori, Italy / Also published as LNCS, Volume 4116/2006, ISBN: 978-3-540-38080-1
-
September 2006
Conference
N-Best parallel maximum likelihood beamformers for robust speech recognition
EUSIPCO 2006, European Signal Processing Conference, September 4-8, 2006, Firenze, Italy
-
September 2006
Conference
Using GPU for fast block-matching
EUSIPCO 2006, 14th European Signal Processing Conference, September 4-8, 2006, Florence, Italy
-
September 2006
Journal
On variable-scale piecewise stationary spectral analysis of speech signals for ASR
Speech Communication, Volume 48, Issue 9, September 2006
-
September 2006
Journal
Still image watermarking robust to local geometric distortions
IEEE Transactions on Image Processing, Volume 15, N°9, September 2006
-
September 2006
Journal
User-customized password speaker verification using multiple reference and background models
Speech Communication, Volume 48, Issue 9, September 2006
-
August 2006
Report
A survey of computational economics applied to computer networks
Research report RR-06-173
-
August 2006
Report
Performance analysis of cooperative content distribution for wireless ad hoc networks
Research report RR-06-172
-
July 2006
Conference
Establishment of ad-hoc communities through policy-based cryptography
WCAN 2006, 2nd Workshop on Cryptography for Ad hoc Networks, July 16th, 2006, Venice, Italy | Also published in Electronic Notes in Theoretical Computer Science, Volume 171, N°1
-
July 2006
Conference
Person recognition using human head motion information
AMDO 2006, Articulated Motion and Deformable Objects: 4th International Conference, July 11-14, 2006, Mallorca, Spain / Also published in LNCS Volume 4069
-
July 2006
Conference
A behavioural approach to person recognition
ICME 2006, IEEE International Conference on Multimedia & Expo, July 9-12, 2006, Toronto, Canada
-
July 2006
Conference
Protection of 3D object visual representations
ICME 2006, IEEE International Conference on Multimedia & Expo, July 9-12, 2006, Toronto, Canada
-
July 2006
Conference
Adaptive support of inter-domain collaborative protocols using web services and software agents
BALTIC DB&IS 2006, 7th international Baltic conference on databases and information systems, July 3-6, 2006, Vilnius, Lithuania / Also published as "Frontiers in Artificial Intelligence and Applications", Volume 155, 2007
-
June 2006
Conference
Empirical analysis and statistical modeling of attack processes based on honeypots
WEEDS 2006, Workshop on empirical evaluation of dependability and security (in conjunction with the international conference on dependable systems and networks, DSN 2006), June 25-28, 2006, Philadelphia,USA
-
June 2006
Conference
Improving robustness of a likelihood-based beamformer in a real environment for automatic speech recognition
SPECOM 2006, 11th International Conference Speech and Computer, June 25-29, 2006, Saint-Petersburg, Russia
-
June 2006
Conference
Impact of variabilities on speech recognition
SPECOM 2006, 11th International Conference Speech and Computer, June 25-29, 2006, Saint-Petersburg, Russia
-
June 2006
Conference
Emotional aspects of intrinsic speech variabilities in automatic speech recognition
SPECOM 2006, 11th International Conference Speech and Computer, June 25-29, 2006, Saint-Petersburg, Russia
-
June 2006
Conference
Time signatures to detect multi-headed stealthy attack tools
18th Annual FIRST Conference, June 25-30, 2006, Baltimore, USA
-
June 2006
Conference
Reconnaissance robuste de parole en environnement reél à l'aide d'un réseau de microphones à formation de voie adaptative basée sur un critère des N-best vraisemblance maximale
JEP 2006, Journées d'Etudes sur la Parole, 12-16 juin 2006, Dinard, France
-
June 2006
Report
Confidence measures for tandem connectionist feature extraction
Research report RR-06-166
-
June 2006
Conference
Simulation based performance evaluation of a user-centric group rekeying protocol
ICC 2006, IEEE International Conference on Communications, 11-15 June 2006, Istanbul, Turkey
-
June 2006
Book
Détection d'intrusions : état de l'art, faiblesses et problèmes ouverts
Book chapter N°3 in "Sécurité des systèmes d'information (Traité IC2, série Réseaux et télécoms) / ISBN: 2-7462-1259-5; Auteur(s): MÉ Ludovic; DESWARTE Yves"
-
June 2006
Report
MoSAIC: Mobile System Availability Integrity and Confidentiality
Research Report
-
May 2006
Conference
Cooperation dans les reseaux ad-hoc: Application de la theorie des jeux et de l'evolution dans le cadre d'observabilité imparfaite
SSTIC 2006, Symposium sur la sécurité des technologies de l'information et des communications, May 31st-June 2nd, 2006, Rennes, France
-
May 2006
Conference
An inline approach for secure SOAP requests and early validation
OWASP 2006, European Conference on Open Web Application Security Project, May 30-31, 2006, Leuven, Belgium
-
May 2006
Conference
Identity-based message authentication for dynamic networks
IFIP SEC 2006, 21st IFIP International Information Security Conference, Security and Privacy in Dynamic Environments, May 22-24, 2006, Karlstad, Sweden
-
May 2006
Conference
Comparative study of different features on OLLO logatome recognition task
SRIV 2006, ITRW on Speech Recognition and Intrinsic Variation, May 20, 2006, Toulouse, France
-
May 2006
Conference
Protection of 3D object through silhouette watermarking
ICASSP 2006, 31st International Conference on Acoustics, Speech, and Signal Processing, May 14-19, 2006, Toulouse, France
-
May 2006
Conference
Fepstrum and carrier signal decomposition of speech signals through homomorphic filtering
ICASSP 2006, 31st International Conference on Acoustics, Speech, and Signal Processing, Special session, Dealing with intrinsic speech variabilities in ASR, Volume 5, May 14-19, 2006, Toulouse, France
-
May 2006
Conference
Flexible feature spaces based on generalized heteroscedastic linear discriminant analysis
ICASSP 2006, 31st International Conference on Acoustics, Speech, and Signal Processing, May 14-19, 2006, Toulouse, France
-
May 2006
Book
MADSig: Enhancing digital signature to capture secure document processing requirements
Book chapter in ISSE 2006, Securing Electronics Business Processes, May 2006, ISBN: 978-3-8348-0213-2
-
May 2006
Conference
A peer-to-peer normative system to achieve social order
COIN 2006, Coordination, Organization, Institutions and Norms in agent systems Workshop at AAMAS 2006, 5th International Joint Conference on Autonomous Agents and Multiagent systems, 8-12 May, 2006, Hakodate, Japan
-
April 2006
Conference
DDC: A dynamic and distributed clustering algorithm for networked virtual environments based on P2P networks
INFOCOM 2006, 25th IEEE International Conference on Computer Communications, 23-29 April 2006, Barcelona, Spain
-
April 2006
Conference
PULSE, a flexible P2P live streaming system
GI 2006, 9th IEEE Global Internet Symposium 2006 in conjunction with IEEE Infocom 2006, 28-29 April 2006, Barcelona, Spain
-
April 2006
Report
Enabling secure discovery with attribute based encryption
Research report RR-06-164
-
April 2006
Conference
Impact of inner parameters and overlay structure on the performance of BitTorrent
GI 2006, 9th IEEE Global Internet Symposium 2006 in conjunction with IEEE Infocom 2006, 28-29 April 2006, Barcelona, Spain
-
April 2006
Conference
Enabling secure discovery in a pervasive environment
SPC 2006, 3rd International Conference on Security in Pervasive Computing, April 18-21, 2006, York, UK / Also published in LNCS, Volume 3934
-
April 2006
Report
State of the art in 3D face recognition
Research report RR-06-160, April 2006
-
April 2006
Conference
PPrate: a passive capacity estimation tool
E2EMON 2006, 4th IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services, April 3, 2006, Vancouver, Canada
-
April 2006
Conference
Object-relational DBMS for packet-level traffic analysis: case study on performance optimization
E2EMON 2006, 4th IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services, April 3, 2006, Vancouver, Canada
-
April 2006
Journal
MULTI+: a robust and topology-aware peer-to-peer multicast service
Computer communications Volume 29 N°7 Special issue on QofIS 2004 - Quality of Future Internet Services 2004
-
April 2006
Report
An application of policy-based signature: proof-carrying proxy certificates
Research report RR-06-169
-
April 2006
Report
Augmenting Web services composition with transactional requirements
Research report RR-06-156, April 2006
-
March 2006
Conference
Policy-based encryption schemes from bilinear pairings
ASIACCS 2006, ACM Symposium on InformAtion, Computer and Communications Security, March 21-24, 2006, Taipei, Taiwan
-
March 2006
Journal
Internet attack knowledge discovery via clusters and cliques of attack traces
Journal of Information Assurance and Security, Volume 1, Issue 1, March 2006
-
March 2006
Journal
From content distribution networks to content networks — issues and challenges
Computer Communications, E-NEXT Special Issue, Volume 29, N°5, 6 March 2006
-
March 2006
Report
Secure data aggregation with multiple encryption
Research report RR-06-181
-
February 2006
Report
Rarest first and choke algorithms are enough
INRIA Research report (inria-00001111, version 1-13, February 2006)
-
February 2006
Book
Ad hoc networks security
Book chapter in "Handbook of Information Security", 3-Volume Set, Hossein Bidgoli (Editor), ISBN: 0-471-64833-7
-
February 2006
Journal
Efficient ocular expression analysis for synthetic reproduction
IEEE Transactions on Multimedia, Volume 8, N°1, February 2006
-
January 2006
Thesis
Distributed system of honeypot sensors : discrimination and correlative analysis of attack processes
Thesis
-
January 2006
Conference
Watermarking of 3D objects based on 2D apparent contours
EI 2006, IS&T/SPIE 18th annual symposium on Electronic Imaging, 15-19 January 2006, San Jose, USA | Proc. SPIE Volume 6072
-
December 2005
Conference
Enabling pervasive execution of workflows
CollaborateCom 2005, 1st IEEE International Conference on Collaborative Computing:Networking, Applications and Worksharing, December 19-21, 2005, San Jose, USA
-
December 2005
Poster / Demo
A secure public sector workflow management system
ACSAC 2005, 21st Annual Computer Security Applications Conference, December 5-9, 2005, Tucson, USA
-
December 2005
Conference
ScriptGen: an automated script generation tool for honeyd
ACSAC 2005, 21st Annual Computer Security Applications Conference, December 5-9, 2005, Tucson, USA
-
December 2005
Journal
Collusion issue in video watermarking
"Traitement du Signal", Volume 22, N°6, December 2005
-
November 2005
Conference
Fepstrum representation of speech signal
ASRU 2005, IEEE Automatic Speech Recognition and Understanding Workshop, November 27-December 1, 2005, Cancun, Mexico
-
November 2005
Conference
Adaptive enhancement of speech signals for robust ASR
ASIDE 2005, COST 278 Final Workshop and ISCA Tutorial and Research Workshop, 10-11 November 2005, Aalborg, Denmark
-
November 2005
Report
Understanding BitTorrent: an experimental perspective
INRIA Research report (inria-00000156, version 3-9 November 2005)
-
November 2005
Conference
Tatouage d'objets 3D via la carte de profondeur cylindrique
CORESA 2005, 10èmes journées Compression et représentation des signaux audiovisuels, 7-8 Novembre 2005, Rennes, France
-
November 2005
Conference
Comparative survey of local honeypot sensors to assist network forensics
SADFE 2005, 1rst International Workshop on Systematic Approaches to Digital Forensic Engineering, November 7-9, 2005, Taipei, Taiwan
-
November 2005
Conference
The use of packet inter-arrival times for investigating unsolicited Internet traffic
SADFE 2005, 1rst International Workshop on Systematic Approaches to Digital Forensic Engineering, November 7-9, 2005, Taipei, Taiwan
-
November 2005
Conference
Online face detection and user authentication
MM 2005, ACM Multimedia 2005, November 6-11, 2005, Singapore
-
November 2005
Journal
Audio fingerprinting: nearest neighbor search in high dimensional binary spaces
The Journal of VLSI Signal Processing, Volume 41, N°3, Special Issue on Multimedia Signal Processing, November 2005
-
October 2005
Conference
Root cause analysis for long-lived TCP connections
CONEXT 2005, 1st ACM/e-NEXT International Conference on Future Networking Technologies, 24-27 October, 2005, Toulouse, France
-
October 2005
Conference
DDC: A dynamic and distributed clustering algorithm for networked virtual environments based on P2P networks
CONEXT 2005, 1st ACM/e-NEXT International Conference on Future Networking Technologies, 24-27 October, 2005, Toulouse, France
-
October 2005
Report
On the interaction between Internet applications and TCP
Research report RR-05-147
-
October 2005
Journal
Regroupement de modèles de locuteurs par méthode Bayesienne variationnelle: applications à la sélection de modèles par méthode variationnelle pour l'indexation audio
t.a.l., Traitement Automatique des Langues, Volume 45, N°3, Octobre 2005, Numero spécial des meilleurs articles JEP-TALN 2004
-
September 2005
Conference
Modelling and securing European justice workflows
Submitted to ISSE 2005, Information Security Solutions Europe, 27-29 September 2005, Budapest, Hungary
-
September 2005
Conference
Tatouage d'objets 3D et récupération 2D
TAIMA 2005, Traitement et Analyse de l'Information : Méthodes et Applications, 26 septembre-1er octobre 2005, Hammamet, Tunisie
-
September 2005
Thesis
Variational Bayesian methods for audio indexing
Thesis
-
September 2005
Thesis
Large scale diffusion of information in publish/subscribe systems
Thesis
-
September 2005
Conference
Collection and analysis of attack data based on honeypots deployed on the Internet
QOP 2005, 1st Workshop on Quality of Protection (collocated with ESORICS and METRICS), September 15, 2005, Milano, Italy / Also published in "Quality Of Protection, Security Measurements and Metrics", Springer Series: Advances in Information Security, Volume 23, Gollmann, Dieter; Massacci, Fabio; Yautsiukhin, Artsiom (Eds.), 2006, XII, 197 p, ISBN: 0-387-29016-8
-
September 2005
Conference
Towards person recognition using head dynamics
ISPA 2005, 4th IEEE International Symposium on Image and Signal Processing and Analysis, September 15-17, 2005, Zagreb, Croatia
-
September 2005
Conference
Countermeasures for collusion attacks exploiting host signal redundancy
IWDW 2005, International Workshop on Digital Watermarking, September 15-17, 2005, Siena, Italy / Also published in LNCS Volume 3710
-
September 2005
Conference
Extended Erlang-B law for performance evaluation of radio resources sharing in GSM/(E)GPRS networks
PIMRC 2005, 16th Annual IEEE International Symposium on Personal Indoor and Mobile Radio Communications September 11-14, 2005, Berlin, Germany
-
September 2005
Conference
A countermeasure to resist block replacement attacks
ICIP 2005, IEEE International Conference on Image Processing, September 11-14, 2005, Genova, Italy
-
September 2005
Conference
An efficient algorithm for informed embedding of dirty paper trellis codes for watermarking
ICIP 2005, IEEE International Conference on Image Processing, September 11-14, 2005, Genova, Italy
-
September 2005
Conference
Asymmetric 3D/2D processing: a novel approach for face recognition
ICIAP 2005, 13th International Conference on Image Analysis and Processing, September 6-8, 2005, Cagliari, Italy / Also published as Lecture Notes in Computer Science, Volume 3617/2005
-
September 2005
Conference
Variational Bayesian speaker change detection
Interspeech 2005, 9th European Conference on Speech Communication and Technology, September 4-8, 2005, Lisbon, Portugal
-
September 2005
Conference
On variable-scale piecewise stationary spectral analysis of speech signals for ASR
Interspeech 2005, 9th European Conference on Speech Communication and Technology, September 4-8, 2005, Lisbon, Portugal
-
September 2005
Book
Cooperative content distribution: scalability through self-organization
Book chapter in "Self-Star Properties in Complex Information Systems", in Lecture Notes in Computer Science, Springer-Verlag, Volume 3460/2005
-
July 2005
Conference
GMM-based multimodal biometric verification
ENTERFACE 2005, International Workshop on Multimodal Interfaces, July 18-August 12th, 2005, Mons, Belgium
-
July 2005
Conference
Real life experience of Cooperation Enforcement Based on Reputation (CORE) for MANETs
REALMAN 2005, IEEE ICPS Workshop on Multi-hop Ad hoc Networks: from theory to reality in conjunction with IEEE ICPS 2005, July 14, 2005, Santorini, Greece
-
July 2005
Conference
SKiMPy: a simple key management protocol for MANETs in emergency and rescue operations
ESAS 2005, 2nd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, July 13-14, 2005, Visegrad, Hungary / Also published in LNCS, Volume 3813/2005
-
July 2005
Conference
Variational Bayesian methods for audio indexing
MLMI 2005, 2nd Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms, July 11-13, 2005, Edinburgh, UK / Also published in LNCS Volume 3869/2006
-
July 2005
Conference
A variable-scale piecewise stationary spectral analysis technique applied to the ASR
MLMI 2005, 2nd Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms, July 11-13, 2005, Edinburgh, UK / Also published in LNCS, Volume 3869/2006, 978-3-540-32549-9
-
July 2005
Conference
Least squares filtering of speech signals for robust ASR
MLMI 2005, 2nd Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms, 11-13 July 2005, Edinburgh, UK - Also published as LNCS 3869
-
July 2005
Conference
A pointillist approach for comparing honeypots
DIMVA 2005, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 7-8, 2005, Vienna, Austria
-
July 2005
Thesis
Securing multicast communications in satellite networks: a user-centric approach
Thesis
-
July 2005
Journal
A probabilistic model of face mapping with local transformations and its application to person recognition
IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), Volume 27, Issue 7, July 2005
-
June 2005
Report
White paper: Integration of honeypot data into an alert correlation engine
Research report RR-05-142
-
June 2005
Conference
Stochastic learning feedback hybrid automata for dynamic power management in embedded systems
SMCia 2005, IEEE Mid-Summer Workshop on Soft Computing in Industrial Applications, June 28-30, 2005, Espoo, Finland
-
June 2005
Thesis
Security issue and collusion attacks in video watermarking
Thesis
-
June 2005
Conference
How to combat block replacement attacks?
IH 2005, 7th Information Hiding Workshop, June 6-8, 2005, Barcelona, Spain / Also published in LNCS, Volume 3727/2005, ISBN: 978-3-540-29039-1
-
June 2005
Conference
Can we take this off-line? Credentials for Web services supported nomadic applications
SAR 2005, 4th Conference on Security and Network Architectures, June 6-10, 2005, Batz-sur-Mer, France
-
June 2005
Conference
Leurré.com : retour d'expérience sur plusieurs mois d'utilisation d'un pot de miel distribué mondialement
SSTIC 2005, Symposium sur la Sécurité des Technologies de l'Information et des Communications, June 1-3, 2005, Rennes, France
-
May 2005
Conference
Distance-bounding proof of knowledge to avoid real-time attacks
IFIP SEC 2005, 20th IFIP International Information Security Conference, May 30-June 1, 2005, Chiba, Japan
-
May 2005
Conference
Modifications on NIST MarkIII array to improve coherence properties among input signals
AES 2005, 118th Audio Engineering Society Convention, May 28-31, 2005, Barcelona, Spain
-
May 2005
Conference
InTraBase: integrated traffic analysis based on a database management system
E2EMON 2005, Workshop on End-to-End Monitoring Techniques and Services, 9th IFIP/IEEE International Symposium on Integrated Network Management, May 15-19, 2005, Nice, France
-
May 2005
Report
Disambiguating network effects from edge effects in TCP connections
Research report RR-05-139
-
May 2005
Conference
A fully distributed peer to peer structure based on 3D Delaunay triangulation
ALGOTEL 2005, 7emes Rencontres Francophones sur les aspects Algorithmiques des Télécommunications, May 11-13, 2005, Giens, France
-
May 2005
Report
A distributed time stamping scheme
Research report RR-05-140
-
May 2005
Conference
Non cooperative forwarding in ad hoc networks
Networking 2005, 4th IFIP International Conferences on Networking, May 2-6, 2005, Waterloo, Canada / Also published in LNCS Volume 3462/2005
-
May 2005
Report
Provably secure policy-based cryptography
Research report RR-05-141
-
April 2005
Conference
CADHo: Collection and Analysis of Data from Honeypots
EDDC 2005, 5th European Dependable Computing Conference, April 20-22, 2005, Budapest, Hungary
-
April 2005
Conference
Some game-theoretic problems in wireless ad hoc networks
NGI 2005, 1st Conference on Next Generation Internet Networks, Traffic Engineering, April 18-20 2005, Rome, Italy / Also Published in Lecture Notes in Computer Science, Volume 3427
-
April 2005
Conference
Signal coherent watermarking in video
WIAMIS 2005, 6th International Workshop on Image Analysis for Multimedia Interactive Services, April 13-15, 2005, Montreux, Switzerland
-
March 2005
Conference
On the stationarity of TCP bulk data transfers
PAM 2005, 6th International Workshop on Passive and Active Network Measurement, March 31-April 1, 2005, Boston, Massachusetts, USA / Also published in LNCS Volume 3431
-
March 2005
Conference
Leurre.com: on the advantages of deploying a large scale distributed honeypot platform
ECCE 2005, E-Crime and Computer Conference, 29-30th March 2005, Monaco
-
March 2005
Conference
Clustering face images with application to image retrieval in large databases
Biometric Technology for Human Identification, SPIE International Symposium on Defense and Security, 28 March-1 April 2005, Orlando, USA / Also published in SPIE 5779, 256 (2005)
-
March 2005
Conference
Watermark resynchronization based on Elastic Graph Matching
SETIT 2005, 3rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, March 27-31, 2005, Sousse, Tunisia
-
March 2005
Conference
Variational bayesian feature saliency for audio type classification
ICASSP 2005, 30th IEEE International Conference on Acoustics, Speech, and Signal Processing, March 18-23, 2005- Philadelphia, USA
-
March 2005
Conference
Variational bayesian adaptation for speaker clustering
ICASSP 2005, 30th IEEE International Conference on Acoustics, Speech, and Signal Processing, March 18-23, 2005- Philadelphia, USA
-
March 2005
Conference
On desensitizing the Mel-cepstrum to spurious spectral components for robust speech recognition
ICASSP 2005, 30th IEEE International Conference on Acoustics, Speech, and Signal Processing, March 18-23, 2005- Philadelphia, USA
-
March 2005
Conference
On calibration and coherence signal analysis of the CHIL microphone network at IRST
HSCMA 2005, Workshop on Hands-Free Speech Communication and Microphone Arrays, March 17-18, 2005, Piscataway, USA
-
March 2005
Journal
Comparing the streaming of FGS encoded video at different aggregation levels: frame, GoP, and scene
International Journal of Communication Systems, Volume 18, Issue 5
-
March 2005
Conference
Policy-based cryptography and applications
FC 2005, 9th International Conference on Financial Cryptography and Data Security, 28 February-03 March 2005, Roseau, The Commonwealth of Dominica / Also published in LNCS Volume 3570
-
March 2005
Book
Sécurité des communications en multicast
Book chapter N°10 in "Multicast multimedia sur internet" Abderrahim Benslimane (ed.), (Traité IC2, série Réseaux et télécoms), Hermes Lavoisier, 2005
-
March 2005
Journal
Analysis of coalition formation and cooperation strategies in mobile ad hoc networks
Ad Hoc Networks, Volume 3, N°2, March 2005
-
March 2005
Journal
Structured peer-to-peer networks: faster, closer, smarter
IEEE Data Engineering Bulletin, Vol.28, N°1, March 2005, Special Issue on In-Network Query Processing
-
March 2005
Journal
Size-based scheduling to improve the performance of short TCP flows
IEEE Network magazine Volume 19 N° 1, January-February 2005, p 12-17
-
March 2005
Tutorial
Biometrics person authentication:from theory to practice
EURASIP Newsletter, Volume 16, Number 1, March 2005
-
February 2005
Report
The new MarkIII/IRST-Light microphone array
Research report RR-05-130
-
January 2005
Report
State of the art in 3d face recognition
Research report RR-05-126
-
January 2005
Report
A distributed time stamping scheme
Research report RR-05-125
-
January 2005
Conference
Collusion issue in video watermarking
Security, Steganography, and Watermarking of Multimedia Content VII, Proceedings of SPIE 5681, January 2005, San Jose, CA, USA
-
December 2004
Thesis
Cooperation enforcement and network security mechanisms for mobile ad hoc networks
Thesis
-
December 2004
Thesis
A hierarchical P2P network: design and applications
Thesis
-
December 2004
Conference
Understanding threats: a prerequisite to enhance survivability of computing systems
IISW 2004, International Infrastructure Survivability Workshop 2004, in conjunction with the 25th IEEE International Real-Time Systems Symposium (RTSS 04) December 5-8, 2004, Lisbon, Portugal
-
December 2004
Thesis
Approaches for scalable content distribution in the Internet
Thesis
-
December 2004
Journal
Secure mobile business applications - Framework, architecture, and implementation
Information Security Technical Report, Volume 9, Issue 4, Special issue on Mobile Security, 2004
-
November 2004
Conference
Reliable group rekeying with a customer perspective
GLOBECOM 2004, 47th annual IEEE Global Telecommunications Conference, November 29th-December 3rd, 2004 - Dallas, USA
-
November 2004
Thesis
A probabilistic model of face mapping applied to person recognition
Thesis
-
November 2004
Journal
Efficient search in unstructured peer-to-peer networks
European Transactions on Telecommunications, Special Issue on P2P Networking and P2P Services, Volume 15, Issue 6, November-December 2004
-
November 2004
Report
Semantic peer-to-peer overlays for publish/subscribe networks
Research report RR-04-123
-
October 2004
Report
OWL : Installation testing and validation
Research report RR-04-103
-
October 2004
Conference
A comparison of conventional and online fraud
CRIS 2004, 2nd International Conference on Critical Infrastructures, October 25-27, 2004, Grenoble, France
-
October 2004
Conference
Collaborative backup for dependable mobile applications
MPAC 2004, 2nd International Workshop on Middleware for Pervasive and Ad-Hoc Computing, October 18-22, 2004, Toronto, Canada / ACM International Conference Proceedings Series, Volume 77, ISBN:1-58113-951-9
-
October 2004
Conference
XNet: a reliable content based publish subscribe system
SRDS 2004, 23rd International Symposium on Reliable Distributed Systems, October 18-20, 2004, Florianopolis, Brazil
-
October 2004
Conference
Proactive hot spot avoidance for web server dependability
SRDS 2004, 23rd International Symposium on Reliable Distributed Systems, October 18-20, 2004, Florianopolis, Brazil
-
October 2004
Journal
Video waterscrambling: towards a video protection scheme based on the disturbance of motion vectors
EURASIP Journal of Applied Signal Processing special issue : Multimedia Security and Rights Management, Volume 2004, N°14, October 2004
-
October 2004
Thesis
Trust establishment protocols for communicating devices
Thesis
-
October 2004
Conference
Scoring unknown speaker clustering : VB vs. BIC
ICSLP 2004, 8th International Symposium on Chinese Spoken Language Processing, October 4-8, 2004, Jeju Island, Korea
-
October 2004
Journal
Security pitfalls of frame-by-frame approaches to video watermarking
IEEE Transactions on Signal Processing, supplement on Secure Media, Volume 52, N°10, October 2004
-
October 2004
Report
Honeypot platform : analyses and results
Research report RR-04-104
-
October 2004
Report
Cooperative strategies for file replication in P2P networks
Research report RR-04-098
-
September 2004
Conference
Progressive hiding of a 3D object into its texture image
MMSP 2004, IEEE international workshop on multimedia signal processing, September 29-October 1, 2004, Siena, Italy
-
September 2004
Conference
Performance analysis of peer-to-peer networks for file distribution
QOFIS 2004, 5th International Workshop on Quality of Future Internet Services, September 29-October 1, 2004, Barcelona, Spain / Also published in "LNCS", Volume 3266/2004
-
September 2004
Conference
MULTI+: building topology-aware overlay multicast trees
QOFIS 2004, 5th International Workshop on Quality of Future Internet Services, September 29-October 1, 2004, Barcelona, Spain Also published in LNCS Volume 3266
-
September 2004
Conference
Exploiting self-similarities to defeat digital watermarking systems - A case study on still images
ACM Multimedia and Security Workshop, September 20-21, 2004, Magdeburg, Germany
-
September 2004
Report
On multi-scale piecewise stationary spectral analysis of speech signals for robust ASR
Research report RR-04-118
-
September 2004
Report
On desensitizing the Mel-cepstrum to spurious spectral components for robust speech recognition
Research report RR-04-119
-
September 2004
Thesis
Support de la qualité de service dans les routeurs accès de l'Internet
Thesis
-
September 2004
Conference
Honeynets: foundations for the development of early warning information systems
The Cyberspace Security and Defense: Research Issues - NATO Advanced Research Workshop, September 6-9, 2004, Gdansk, Poland - Also published as a chapter of Cyberspace Security And Defense: Research Issues, Janusz S. Kowalik (Ed), ISBN: 1402033796
-
September 2004
Conference
A comparative study of different modes of perturbation for video watermarking based onmotion vectors
EUSIPCO 2004, 12th European Signal Processing Conference, September 6-10, 2004, Vienna, Austria
-
September 2004
Conference
Robust score normalization for relational approaches to face authentication
EUSIPCO 2004, 12th European Signal Processing Conference, September 6-10, 2004, Vienna, Austria
-
September 2004
Report
The MarkIII microphone array: the modified version realized at ITC-irst
Research report RR-04-129
-
August 2004
Conference
On de-emphasizing the spurious components in the spectral modulation for robust speech recognition
Robust 2004, COST 278 and ISCA Tutorial and Research Workshop Robustness Issues in Conversational Interaction 30-31 August 2004, Norwich, UK
-
August 2004
Report
Watermark resynchronization based on elastic graph matching for enhanced robustness against local geometric distortions
Research report RR-04-113
-
August 2004
Journal
Automatic detection and masking of non-atomic exception handling
IEEE Transactions on software engineering, Volume 30, N°8, August 2004
-
July 2004
Conference
Group rekeying with a customer perspective
ICPADS 2004, 10th International Conference on Parallel and Distributed Systems, July 7-9, 2004, Newport, USA
-
July 2004
Thesis
Texture-based watermarking of 3D objects
Thesis
-
July 2004
Book
Ad hoc networks security
Book chapter N°12 in "Mobile Ad Hoc Networking", Stefano Basagni (Editor), Marco Conti (Editor), Silvia Giordano (Editor), Ivan Stojmenovie; (Editor) ISBN: 0471373133, John Wiley & Sons, Hardcover: 416 pages, July 2004
-
July 2004
Report
IDHC: ID-based hash-chains for broadcast authentication in wireless nettworks
Research report RR-04-111
-
June 2004
Conference
A pull-based approach for a VoD service in P2P networks
HSNMC 2004, 7th IEEE International Conference on High Speed Networks and Multimedia Communications, June 30-July 2, 2004, Toulouse, France / Published in LNCS Volume 3079
-
June 2004
Conference
LAS scheduling approach to avoid bandwidth hogging in heterogeneous TCP networks
HSNMC 2004, 7th IEEE International Conference on High Speed Networks and Multimedia Communications, June 30-July 2, 2004, Toulouse, France / Also published as LNCS, Volume 3079/2004
-
June 2004
Conference
Applications and specificities of synthetic/synthetic projective registration
ICME 2004, IEEE International Conference on Multimedia and Expo, June 27-30, 2004, Taipei, Taiwan
-
June 2004
Conference
Efficient search in unstructured peer-to-peer networks
SPAA 2004, 16th annual ACM symposium on Parallelism in algorithms and architectures, June 27-30, 2004, Barcelona, Spain
-
June 2004
Conference
Protecting applications and devices in nomadic business environments
SAR 2004, 3rd Conference on Security and Network Architectures, June 21-25 2004, La Londe, France
-
June 2004
Conference
Denial of service prevention in satellite networks
ICC 2004, IEEE International Conference on Communications, June, 20-24 2004, Paris, France
-
June 2004
Conference
Performance analysis of LAS-based scheduling disciplines in a packet switched network
SIGMETRICS 2004, ACM International Conference on Measurement and Modeling of Computer Systems, June 12-16, 2004, New York, USA / Also published in ACM SIGMETRICS Performance Evaluation Review Homepage Volume 32 Issue 1, June 2004
-
June 2004
Journal
Applying informed coding and embedding to design a robust high-capacity watermark
IEEE Transactions on image processing, Volume 13, N°6, June 2004
-
May 2004
Conference
Self-scaling networks for content distribution
Self-* 2004, International Workshop on Self-* Properties in Complex Information Systems, May 31- June, 2nd 2004, Bertinoro, Italy
-
May 2004
Conference
Variational Bayesian speaker clustering
ODYSSEY 2004, The speaker and language recognition workshop, May 31-June 3, 2004, Toledo, Spain
-
May 2004
Conference
Un modèle probabiliste de transformation entre images appliqué à la reconnaissance de visages
CORESA 2004, 9èmes journées d'études et d'échanges "Compression et Représentation des Signaux Audiovisuels", 25-26 mai 2004, Lille, France
-
May 2004
Conference
SEMANTIC-3D: compression, indexation et tatouage de données 3D
CORESA 2004, 9èmes journées d'études et d'échanges "Compression et Représentation des Signaux Audiovisuels", 25-26 mai 2004, Lille, France
-
May 2004
Conference
Efficient subscription management in content based networks
DEBS 2004, International Workshop On Distributed Event Based Systems, May 24-25, 2004, Edinburgh, UK
-
May 2004
Conference
Honeypot-based forensics
AusCERT 2004, AusCERT Asia Pacific Information technology Security Conference 2004, 23-27 May 2004, Brisbane, Australia
-
May 2004
Conference
Danger of low-dimensional watermarking subspaces
ICASSP 2004, 29th IEEE International Conference on Acoustics, Speech, and Signal Processing, May 17-21, 2004, Montreal, Canada
-
May 2004
Conference
From turbo hidden Markov models to turbo state-space models
ICASSP 2004, 29th IEEE International Conference on Acoustics, Speech, and Signal Processing, May 17-21, 2004, Montreal, Canada
-
May 2004
Conference
Variational Bayesian feature selection for gaussian mixture models
ICASSP 2004, 29th IEEE International Conference on Acoustics, Speech, and Signal Processing, May 17-21, 2004, Montreal, Canada
-
May 2004
Conference
Sensitivity analysis of noise robustness methods
ICASSP 2004, 29th IEEE International Conference on Acoustics, Speech, and Signal Processing, May 17-21, 2004, Montreal, Canada
-
May 2004
Report
Distance-bounding proof of knowledge protocols to avoid terrorist fraud attacks
Research report RR-04-109
-
May 2004
Report
Can we take this off-line? How to deal with credentials in federations without global connectivity
Research report RR-04-105, May 2004
-
May 2004
Journal
Experiences, strategies and challenges in building fault-tolerant CORBA systems
"IEEE Transactions on Computers", Volume 53, N°5, May 2004
-
April 2004
Report
Performance analysis of peer-to-peer networks for file distribution
Research report RR-04-108
-
April 2004
Report
Towards a quantitative T-RAT
Research report RR-04-106
-
April 2004
Conference
Establishing trust with privacy
SPW 2004, 12th International Workshop on Security Protocols, 26-28 April 2004, Cambridge, Great-Britain / Also published in LNCS Volume 3957
-
April 2004
Conference
Using data stream management systems for traffic analysis - a case study
PAM 2004, 5th annual Passive & Active Measurement Workshop, April 19-20, 2004, Antibes Juan-les-Pins, France / Also Published in LNCS Volume 3015
-
April 2004
Conference
Dissecting BitTorrent: five months in a torrent's lifetime
PAM 2004, 5th annual Passive & Active Measurement Workshop, April 19-20, 2004, Antibes Juan-les-Pins, France / Also Published in LNCS, Volume 3015
-
April 2004
Conference
Regroupement bayesien variationnel des locuteurs
JEP 2004, 25èmes Journées d'Etude sur la Parole, 19-22 avril 2004, Fès, Maroc
-
April 2004
Conference
Attack processes found on the Internet
NATO Research and technology symposium IST-041 "Adaptive Defence in Unclassified Networks", 19 April 2004, Toulouse, France
-
April 2004
Report
Combining history-based trust establishment with distance-bounding protocols
Research report RR-04-100
-
April 2004
Report
Protecting applications and devices in nomadic business environments
Research report RR-04-101
-
April 2004
Journal
A probabilistic model for face transformation with application to person identification
EURASIP Journal on applied Signal Processing, Volume 2004, N°4, Special issue on biometric signal processing, April 2004
-
April 2004
Book
Techniques for face motion & expression analysis on monocular images
Book chapter N°6 in: 3D Modeling and Animation: Synthesis and Analysis Techniques for the Human Body, N. Sarris & M. G. Strintzis (Eds.) Idea Group Publishers, ISBN: 1931777985
-
April 2004
Report
MULTI+: building topology-aware overlay multicast trees
Research report RR-04-107
-
March 2004
Conference
History-based signature or how to trust anonymous documents
iTrust 2004, 2nd International Conference on Trust Management, 29th March- 1st April 2004, St. Anne's College, Oxford, UK / PAM'2004, 5th annual Passive & Active Measurement Workshop, April 19-20, 2004, Antibes Juan-les-Pins, France / Also Published in LNCS Volume 2995
-
March 2004
Conference
Data indexing in peer-to-peer DHT networks
ICDCS 2004, IEEE 24th international conference on distributed computing systems, March 23-26, 2004, Tokyo, Japan
-
March 2004
Conference
Efficient comparison of enterprise privacy policies
SAC 2004, ACM symposium on Applied computing, March 14-17, 2004, Nicosia, Cyprus / Published in Proceedings of the 2004 ACM symposium on Applied computing, ISBN:1-58113-812-1
-
March 2004
Conference
Untraceable secret credentials: trust establishment with privacy
PERSEC 2004, worshop at PerCom'04, 2nd IEEE International conference on Pervasive Computing and Communications Security, March 14-17, 2004, Orlando, USA
-
March 2004
Conference
One-time capabilities for authorizations without trust
PERCOM 2004, 2nd IEEE International conference on Pervasive Computing and Communications Security, March 14-17, 2004, Orlando, USA
-
March 2004
Conference
Unified framework for optimal video streaming
INFOCOM 2004, 23rd Annual IEEE Conference of on computer communications, March 7-11, 2004, Hong Kong
-
March 2004
Conference
Honeypots : practical means to validate malicious fault assumptions
PRDC 2004, 10th International symposium Pacific Rim Dependable Computing, March 3-5, 2004, Tahiti, French Polynesia
-
February 2004
Report
Analysis of cooperation strategies in mobile ad hoc networks with imperfect monitoring
Research report RR-04-099
-
January 2004
Conference
Security and trust issues in ubiquitous environments - The business-to-employee dimension
SAINT 2004, Conference Workshop on "Ubiquitous network and services, January 26-30, 2004, Tokyo, Japan / Published in 2004 Symposium on Applications and the Internet Workshops (SAINT 2004 Workshops), IEEE Computer Society Press, 2004, ISBN 0-7695-2050-2
-
January 2004
Conference
Secure background watermarking based on video mosaicing
EI 2004, lectronic imaging 2004, Security, Steganography, and Watermarking of Multimedia Contents, 18-22 January 2004, San Jose, USA, Proceedings of SPIE Volume 5306
-
January 2004
Journal
Editorial of Special issue on adaptation methods for speech recognition
Speech Communication, Volume 42, Issue 1, January 2004
-
December 2003
Report
Alert correlation
Research report RR-03-094
-
December 2003
Conference
A model of illumination variation for robust face recognition
MMUA 2003, Workshop on Multimodal User Authentication, December 11-12, 2003, Santa Barbara, USA
-
December 2003
Report
How to address secure multicast with a customer perspective?
Research report RR-03-095
-
December 2003
Journal
Hierarchical peer-to-peer systems
Parallel Processing Letters (PPL) Volume 13 N°4, December 2003
-
December 2003
Report
Alert correlation: Review of the state of the art
Research report RR-03-093
-
November 2003
Conference
Maximum entropy discrimination (MED) feature subset selection for speech recognition
ASRU 2003, IEEE Automatic Speech Recognition and Understanding Workshop, November 30-December 4, 2003, St Thomas, Virgin Islands, USA
-
November 2003
Patent
Method for hiding binary data in a digital image
Patent N°US6643383
-
November 2003
Conference
Semi-automatic parallelization of Java applications
DOA 2003, International Symposium on Distributed Objects and Applications, November 3-7, 2003, Catania, Sicily, Italy / Also published in Lecture Notes in Computer Science, Volume 2888, pages 1369-83
-
November 2003
Conference
Optimal streaming of layered video: joint scheduling and error concealment
MM 2003, 11th ACM international conference on Multimedia, Session Multimedia streaming and services, November 2-8, 2003, Berkeley, USA
-
October 2003
Report
Maximum entropy discrimination (MED) feature subset selection for speech recognition
Research report RR-03-086
-
October 2003
Thesis
Speaker identification by knowledge inheritance and eigenvoices
Thesis
-
October 2003
Conference
Secure video watermarking via embedding strength modulation
IWDW 2003, 2nd International Workshop on Digital Watermarking, October 20-22, 2003 Seoul, Korea / Also published as Lecture Notes in Computer Science, Volume 2939
-
October 2003
Conference
Security in wireless ad hoc networks
Invited keynote speech at CMS 2003, 7th IFIP Communications and Multimedia Security Conference, October 2-3, 2003, Turino, Italy
-
October 2003
Book
Authentification
Book chapter N°2 in "Sécurité des réseaux et systèmes répartis", Traité IC2 - série Réseaux et télécoms, sous la direction de Yves Deswartes et Ludovic Mé, Hermès Lavoisier, October 2003, ISBN 2-7462-0770-2
-
October 2003
Conference
Trust and authorization in pervasive B2E scenarios
ISC 2003, 6th Information Security Conference, October 1-3, 2003, Bristol, UK / Also published as LNCS, Volume 2851
-
October 2003
Report
Game theoretic analysis of cooperation enforcement in mobile ad hoc networks
Research report RR-03-092
-
October 2003
Report
Variational Bayesian features selection
Research report RR-03-087
-
September 2003
Conference
Architectural choices for video-on-demand systems
IWCW 2003, IEEE 8th International Workshop on Web Content Caching and Distribution, 29 September-1 October 2003, New York, USA / Also published in book "Web Content Caching and Distribution" part 3
-
September 2003
Conference
Security in ad hoc networks
PWC 2003, Ifip-Tc6 8th International Conferenceon Personal Wireless Communications, September 23-25, 2003, Venice, Italy | Also published as LNCS Volume 2775
-
September 2003
Report
Efficient search in unstructured peer-to-peer networks
Research report RR-03-090
-
September 2003
Thesis
Network and content adaptive streaming of layered-encoded video over the Internet
Thesis
-
September 2003
Conference
Topology-centric look-up service
NGC 2003, 5th International Workshop on Networked Group Communications, September 16-19, 2003, Munich, Germany
Best paper award
-
September 2003
Report
White paper: honeypot, honeynet: a comparative survey
Research report RR-03-082
-
September 2003
Report
White paper: honeypot, honeynet, honeytoken: terminological issues
Research report RR-03-081, September 2003
-
September 2003
Conference
Watermarking video, hierarchical embedding in motion vectors
ICIP 2003, IEEE International conference on image processing, September 14-17, 2003, Barcelona, Spain
-
September 2003
Conference
Deformable face mapping for person identification
ICIP 2003, IEEE International conference on image processing, September 14-17, 2003, Barcelona, Spain
Best Student Paper Award
-
September 2003
Conference
Discrete-state and fluid SPN models for open-loop video-on-demand systems: a comparative case study
PNPM 2003, 10th IEEE International Workshop on Petri Nets and Performance Models, September 2-5, 2003, Urbana, USA
-
September 2003
Book
Video watermarking : overview and challenges
Book chapter in "Handbook of Video Databases: Design and Applications" by Borko Furht, ISBN :084937006X, Publisher: CRC Press; (September 2003)
-
September 2003
Conference
Variational bayesian GMM for speech recognition
EUROSPEECH 2003, 8th european conference on speech communication and technology, September 1-4, 2003, Geneva, Switzerland
-
September 2003
Conference
Automated delivery of Web documents through a caching infrastructure
EUROMICRO 2003, 29th Euromicro Conference on Software Engineering and Advanced Applications, 1-6 September 2003, Belek-Antalya, Turkey
-
August 2003
Conference
Hybrid performance modeling of open-loop video distribution with vcr fonctionality
ITC 18, 18th International Teletraffic Congress, 31 August-5 September 2003, Berlin, Germany
-
August 2003
Conference
Hierarchical peer-to-peer systems
EURO-PAR 2003, International Conference on Parallel and Distributed Computing, 26-29 August 2003, Klagenfurt, Austria / Also published in Lecture Notes in Computer Science Volume 2790/2003
-
August 2003
Journal
Texture-based watermarking of 3-D video objects
IEEE transactions on Circuits and Systems for Video Technology, Volume 13, N°8, August 2003
-
August 2003
Report
An adaptive hybrid rekeying protocol for dynamic multicast groups
Research report RR-03-085
-
July 2003
Conference
New intra-video collusion attack using mosaicing
ICME 2003, IEEE International conference on Multimedia and Expo, July 6-9, 2003 - Baltimore, USA
-
July 2003
Report
Switching between orthogonal watermarks for enhanced security against collusion in video
Research report RR-03-080
-
July 2003
Report
Variational bayesian learning for gaussian mixture models and hidden markov models
Research report RR-03-079
-
June 2003
Conference
Architecture pour un extranet adaptatif
SAR 2003, 2nd French-speaking workshop on Security and network Architecture, June 30th-July 4th, 2003, Nancy, France
-
June 2003
Conference
Automatic detection and masking of non-atomic exception handling
DSN 2003, International Conference on Dependable Systems and Networks, June 22-25, 2003, San Francisco, USA
-
June 2003
Conference
Making machines understand facial motion and expressions like humans do
HCI 2003, 10th International Conference on Human Computer Interaction, June 21st-27th, 2003, Crete, Grece
-
June 2003
Report
Background signature for sensor networks
Research report RR-03-076
-
June 2003
Conference
Analysis of LAS scheduling for job size distributions with high variance
SIGMETRICS 2003, ACM International Conference on Measurement and Modeling of Computer Systems, June 10-14, 2003, San Diego, USA
-
June 2003
Conference
An introduction to biometrics and face recognition
IMAGE 2003, Learning, Understanding, Information Retrieval, Medical, June 9-10, 2003, Cagliari, Italy
-
June 2003
Conference
Discriminative face recognition
AVBPA 2003, 4th International Conference on Audio and Video-based Biometric Person Authentication, June 9-11, 2003, Guildford, UK / Also published as LNCS, Volume 2688/2003
-
June 2003
Report
Evaluating the streaming of FGS-encoded video with rate-distortion traces
Research report RR-03-078
-
June 2003
Journal
The many faces of publish/subscribe
ACM Computing Surveys (CSUR), Volume 35, N°2, June 2003
-
May 2003
Report
One-time authorization for off-line interactions
Research report RR-03-077
-
April 2003
Conference
A scalable protocol for content-based routing in overlay networks
NCA 2003, IEEE International Symposium on Network Computing and Applications, April 16-18, 2003, Cambridge, USA
-
April 2003
Patent
Process for providing non repudiation of receipt (NRR) in an electronic transaction environment
Patent N°EP1300980
-
April 2003
Report
Data indexing in peer-to-peer DHT networks
Research report RR-03-091
-
April 2003
Conference
Symbolic speaker adaptation with phone inventory expansion
ICASSP 2003, 28th IEEE International Conference on Acoustics, Speech, and Signal Processing, April 6-10, 2003, Hong Kong
-
April 2003
Conference
Iterative decoding of two-dimensional Hidden Markov Models
ICASSP 2003, 28th IEEE International Conference on Acoustics, Speech, and Signal Processing, April 6-10, 2003 - Hong Kong
-
April 2003
Conference
Minimum classification error /eigenvoices training for speaker identification
ICASSP 2003, 28th IEEE International Conference on Acoustics, Speech, and Signal Processing, April 6-10, 2003 - Hong Kong
-
April 2003
Journal
A guide tour of video watermarking
Signal Processing: Image Communication, Volume 18, N°4, April 2003
-
April 2003
Report
Analyzing the performance of TCP flows under LAS schedulers
Research report RR-03-075
-
March 2003
Conference
Embedding distance bounding protocols within intuitive interactions
SPC 2003, 1rst International Conference on Security in Pervasive Computing, March 12-13, 2003, Boppard, Germany / Also published as LNCS, Volume 2802/2003
-
March 2003
Conference
A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks
WIOPT 2003, Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, March 3-5, 2003, Sophia-Antipolis, France
Best Student Paper Award
-
March 2003
Conference
Algorithms for scalable content distribution
COST 263 Final Report, Quality of Future Internet Services / Also Published as "LNCS", Volume 2856/2003
-
March 2003
Journal
From still picture to real-time video watermarking
ST Journal of System Research, Volume 4, N°1, March 2003
-
March 2003
Journal
Ad hoc network security
ST Journal of System Research, Volume 4, N°1, March 2003
-
February 2003
Conference
Efficient multicast packet authentication
NDSS 2003, Network and Distributed System Security Symposium, 6-7 February 2003, San Diego, USA
-
February 2003
Report
A scalable protocol for content-based routing in overlay networks
Research report RR-03-074
-
February 2003
Thesis
Tatouage d'images : gain en robustesse et intégrité des images
Thesis
-
January 2003
Conference
Watermark recovery from 2D views of a 3D video object
EI 2003, Electronic Imaging 2003, 20-24 January 2003, Santa Clara, USA, Proceedings of SPIE, Volume 5020, Security and Watermarking of Multimedia Contents V, Edward J. Delp III, Ping W. Wong, Editors, June 2003
-
January 2003
Conference
Enhanced robustness in image watermarking using block turbo codes
EI 2003, Electronic Imaging 2003, 20-24 January 2003, Santa Clara, USA, Proceedings of SPIE, Volume 5020, Security and Watermarking of Multimedia Contents V, Edward J. Delp III, Ping W. Wong, Editors, June 2003
-
January 2003
Conference
Tatouage vidéo par marquage hiérarchique des vecteurs mouvements
CORESA 2003, 8èmes journées d'études et d'échanges Compression et Représentation des Signaux Audiovisuels, 16-17 Janvier 2003, Lyon, France
-
January 2003
Conference
Protection de l'utilisation d'un objet vidéo 3D par tatouage de sa texture
CORESA 2003, 8èmes journées d'études et d'échanges Compression et Représentation des Signaux Audiovisuels, 16-17 Janvier 2003, Lyon, France
-
January 2003
Journal
Scalable filtering of XML data for Web services
"IEEE Internet Computing", Volume 7, N°1, January-February 2003
-
January 2003
Journal
Editorial of Special issue on multimedia signal processing
EURASIP Journal on applied signal processing, Special issue on multimedia signal processing, Volume 2003, N°1, January 2003
-
December 2002
Thesis
Speaker adaptation : modelling variabilities
Thesis
-
December 2002
Tutorial
Sécurité des communications multicast
ECOTEL, 5ème ECOTEL logiciel pour les télécommunications, December 2-6, 2002, Antibes, France
-
December 2002
Conference
Online face analysis : coupling head pose-tracking with face expression analysis
MM 2002, 10th International ACM Conference on Multimedia, December 1-6, 2002, Juan-les-Pins, France
-
December 2002
Conference
A scrambling method based on disturbance of motion vectors
MM 2002, 10th International ACM Conference on Multimedia, December 1-6, 2002, Juan-les-Pins, France
-
December 2002
Journal
Introduction à la biométrie authentification des individus par traitement audio-vidéo
Traitement du signal, Volume 19, N°4, 2002
-
December 2002
Journal
EBBPS: an efficient weight assignment process for GPS servers
Annales des Télécommunications, Volume 57, N°11-12, Novembre-Décembre 2002
-
November 2002
Conference
Eyebrow movement analysis over real-time video sequences for synthetic representation
AMDO 2002, 2nd International workshop on articulated motion and defomable objects, November 21-23, 2002, Palma de Mallorca, Spain | LNCS Volume 2492
-
November 2002
Conference
Extending tamper-proof hardware security to untrusted execution environments
CARDIS 2002, 5th IFIP/USENIX International Conference on Smart Card Research and Advanced Applications, November 21-22, 2002, San Jose, USA
-
November 2002
Patent
Method of marking a multimedia document having improved robustness
Patent N°EP1259078
-
October 2002
Conference
Reconciling replication and transactions for the end-to-end reliability of CORBA applications
DOA 2002, Distributed object infrastructure conference, October 28-November 1st, 2002, Irvine, USA / Also published in: On the Move to Meaningful Internet Systems 2002, LNCS 2519
-
October 2002
Conference
Services évolués de signature et de contrôle d'accès basés sur de nouveaux concepts
Ateliers Sécurité RNRT-RNTL-RIAM, 24-25 octobre 2002, Toulouse, France
-
October 2002
Conference
Cost optimal dimensioning of a large scale video on demand system
NGC 2002, 4th international workshop on network group communication, 23-25 October, 2002, Boston, USA
-
October 2002
Conference
Probabilistic atomic broadcast
SRDS 2002, 21st International Symposium on Reliable Distributed Systems, October 13-16, 2002, Osaka, Japan
-
October 2002
Journal
Efficient filtering of XML documents with XPath expressions
VLDB Journal, Special Issue on XML, Volume 11, N°4, October 2002
-
September 2002
Conference
Authentication in ubiquitous computing
UBICOMP 2002, Workshop on Security in Ubiquitous Computing, September 29-October 1, 2002, Göteborg, Sweden | Also published as LNCS Volume 2498
-
September 2002
Conference
Dirty-paper trellis codes for watermarking
ICIP 2002, IEEE International Conference on Image Processing, September 22-25, 2002, New York, USA
-
September 2002
Conference
Toward generic image dewatermarking?
ICIP 2002, IEEE International Conference on Image Processing, September 22-25, 2002, New York, USA
-
September 2002
Conference
Lu factorization for feature transformation
ICSLP 2002, 7th International Conference on Spoken Language Processing, 16-20 September 2002, Denver, USA
-
September 2002
Conference
Symbolic speaker adaptation for pronunciation modeling
PMLA 2002, ISCA Tutorial and Research Workshop on Pronunciation Modeling and Lexicon Adaptation, September 14-15, 2002, Colorado, USA
-
September 2002
Conference
Protection of 3-D object usage through texture watermarking
EUSIPCO 2002, 11th European Signal Processing Conference September 3-6, 2002 Toulouse, France
-
September 2002
Journal
Parallel computation on interval graphs: algorithms and experiments
"Concurrency and computation, practice and experience", Volume 14, N°11, September 2002
-
September 2002
Journal
Guest editorial Internet proxy services
IEEE Journal on Selected Areas in Communications, Special Issue on Internet proxy services, Vol 20, N°7, September 2002
-
September 2002
Journal
Open-loop video distribution with support of VCR functionnality
Performance Evaluation, Special Issue on Performance 2002, Volume 49, N°1, September 2002
-
September 2002
Journal
Revisiting the fair queueing paradigm for end-to-end congestion control
IEEE Network Magazine Volume 16 N°5 Issue on Internet performance furure wireless systems, September/October 2002
-
August 2002
Conference
Facial expression analysis robust to 3D head pose motion
ICME 2002 - IEEE International Conference on Multimedia and Expo, August 26-29 2002, Lausanne, Switzerland
-
August 2002
Conference
Towards real-time video watermarking for system-on-chip
ICME 2002, IEEE International Conference on Multimedia and Expo, August 26-29, 2002, Lausanne, Switzerland
-
August 2002
Conference
Caching video objects : layers vs versions?
ICME 2002, IEEE International Conference on Multimedia and Expo, August 26-29, 2002, Lausanne, Switzerland
-
August 2002
Conference
Implementation of adaptive streaming of stored MPEG-4 FGS video over TCP
ICME 2002, IEEE International Conference on Multimedia and Expo, August 26-29, 2002, Lausanne, Switzerland
-
August 2002
Conference
Tree pattern aggregation for scalable XML data dissemination
VLDB 2002, 28th International Conference on Very Large Data Bases, August 20-23, 2002, Hong Kong, China
-
August 2002
Conference
CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
CMS 2002, Communication and Multimedia Security Conference, September 26-27, 2002, Portoroz, Slovenia / Also published in the book : Advanced Communications and Multimedia Security /Borka Jerman-Blazic & Tomaz Klobucar, editors, Kluwer Academic Publishers, ISBN 1-4020-7206-6, August 2002
-
August 2002
Conference
Enabling adaptive and secure extranets
CMS 2002, Communication and Multimedia Security Conference, September 26-27, 2002, Portoroz, Slovenia / Also published in the book : Advanced Communications and Multimedia Security /Borka Jerman-Blazic & Tomaz Klobucar, editors, Kluwer Academic Publishers, ISBN 1-4020-7206-6, August 2002
-
August 2002
Conference
Multiple layer encryption for multicast groups
CMS 2002, Communication and Multimedia Security Conference, September 26-27, 2002, Portoroz, Slovenia / Also published in the book : Advanced Communications and Multimedia Security /Borka Jerman-Blazic & Tomaz Klobucar, editors, Kluwer Academic Publishers, ISBN 1-4020-7206-6, August 2002
-
August 2002
Journal
Dynamic parallel-access to replicated content in the Internet
IEEE/ACM Transactions on Networking, Volume 10 N°4, August 2002
-
July 2002
Conference
Authenticating real time packet streams and multicasts
ISCC 2002, 7th IEEE International Symposium on Computers and Communications, July 1-4, 2002, Taormina, Italy
-
June 2002
Conference
Probabilistically-safe broadcast algorithms
DSN 2002, International Conference on Dependable Systems and Networks, June 23-26, 2002, Washington, USA
-
June 2002
Conference
Preventing denial of service and selfishness in ad hoc networks
Working Session on Security in Ad Hoc Networks, June 12, 2002, Lausanne, Switzerland
-
June 2002
Conference
Sécurité des communications multicast
Atelier sur la Cryptographie pour les applications spatiales Centre National d'Etudes Spatiales, July 4, 2002 - Toulouse, France
-
June 2002
Journal
A survey of watermarking algorithms for image authentication
EURASIP Journal on applied Signal Processing Volume 2002 N°6 - June 2002, special issue on image analysis for multimedia interactive services
-
June 2002
Journal
Distributing layered encoded video through caches
IEEE Transactions on Computers, Volume 51, N°6, June 2002
-
June 2002
Report
Analysis of a large library of MPEG-4 FGS rate-distortion traces for streaming video
Research report RR-02-068
-
June 2002
Journal
Queuing analysis of simple FEC schemes for voice over IP
Computer Networks, Volume 39, Issue 2-5, June 2002
-
May 2002
Tutorial
Network security in the multicast framework
Networking 2002, 2nd IFIP Conference, May 19-24, 2002, Pisa, Italy / Also published as LNCS Volume 2497
-
May 2002
Thesis
Multicast communication security
Thesis
-
May 2002
Conference
Piecewise linear constraints for model space adaptation
ICASSP 2002, 27th IEEE International Conference on Acoustics, Speech and Audio Processing, May 13-17, 2002, Orlando, USA
-
May 2002
Conference
Recent advances in biometric person authentication
ICASSP 2002, 27th IEEE International Conference on Acoustics, Speech and Audio Processing, May 13-17, 2002, Orlando, USA
-
May 2002
Conference
Adaptive rate control for streaming stored fine-grained scalable video
NOSSDAV 2002, International Workshop Network and Operating and Video, May 12-14, 2002, Miami, FL, USA
-
May 2002
Journal
Traffic engineering in a multipoint-to-point network
IEEE Journal on Selected Areas in Communications, Volume 20, N°4, May 2002
-
April 2002
Thesis
Internet content distribution
Thesis
-
April 2002
Conference
Size based scheduling with differentiated services to improve response time of highly varying flow
ITC 2002, 15th specialist seminar on Internet traffic engineering and traffic management, July 22-24, 2002, Würzburg, Germany
-
April 2002
Thesis
3D metaphoric information visualization
Thesis
-
April 2002
Report
An efficient scheduling policy for edge routers to speedup the Internet access
Research report RR-02-073
-
April 2002
Report
Game theoretic analysis of security in mobile ad hoc networks
Research report RR-02-070
-
March 2002
Report
Making greed work in mobile ad hoc networks
Research report RR-02-069
-
March 2002
Report
On reducing response time for VPN traffic
Research report RR-02-072
-
March 2002
Journal
Object replication strategies in content distribution networks
Computer Communications, Volume 25, N°4, March 2002
-
February 2002
Conference
Simulation-based analysis of security exposures in mobile ad hoc networks
EW 2002, European wireless 2002, February 25-28, 2002, Firenze, Italy
-
February 2002
Journal
Packet multiplexers with adversarial regulated traffic
Computer Communications, Volume 25, N°3, 15 February 2002
-
February 2002
Journal
A framework for guaranteeing statistical QoS
IEEE/ACM Transactions on Networking, Vol. 10, N°1, February 2002
-
January 2002
Report
Dewatermarking based on self-similarities
Research report RR-02-060
-
January 2002
Journal
Interactive video streaming with proxy servers
Information sciences, Volume 140, N°1-2, January 2002
-
January 2002
Book
Codage par transformation fractale
Book chapter N°7 in "Compression et codage des images et des videos" sous la direction de Michel Barlaud
-
January 2002
Journal
Bringing the web to the network edge: large caches and satellite distribution
MONET, Mobile networks and applications, Special issue on Satellite-based information services, Volume 7 N°1, January 2002
-
January 2002
Report
Data indexing and querying in P2P DHT networks
Research report RR-03-073
-
January 2002
Report
Topology centric lookup service
Working paper
-
January 2002
Report
Pose coupling with eye movement tracking
Research report RR-01-058
-
January 2002
Report
Adaptive replication and replacement in P2P caches
Working paper
-
January 2002
Report
Prevention of denial of service attacks and selfishness in mobile ad hoc networks
Research report RR-02-063
-
December 2001
Conference
Dynamic sharings of gaussian densities using phonetic features
ASRU 2001, IEEE Workshop on Automatic Speech Recognition and Understanding, December 9-13, 2001, Madonna di Campiglio, Trento, Italy
-
December 2001
Conference
Construction of model-space constraints
ASRU 2001, IEEE Workshop on Automatic Speech Recognition and Understanding, December 9-13, 2001, Madonna di Campiglio, Trento, Italy
-
December 2001
Thesis
Service discovery in transient ad-hoc wireless network
Thesis
-
December 2001
Conference
Guaranteeing deterministic QoS in a multipoint-to-point network
ITC 17, International Teletraffic Congress, December 2-7, 2001, Salvador da Bahia, Brazil / Also published in Teletraffic Science and Engineering, Vol.4, 2001
-
December 2001
Journal
Un panorama des méthodes de tatouage permettant d'assurer un service d'intégrité pour les images
"Traitement du signal", N° spécial Tatouage, Volume 18, N°4, 2001
-
December 2001
Report
CORE: A collaborative reputation mechanism to enforce node cooperation in mobile adhoc networks
Research report RR-02-062
-
December 2001
Report
Authenticating real time packet streams and multicasts
Extended version of an article for ISCC'2002
-
November 2001
Conference
Attaque malveillante d'images tatouées basée sur l'auto-similarité
CORESA 2001, 7èmes journées d'études et d'échanges Compression et Représentation des Signaux Audiovisuels, 12-13 Novembre 2001, Dijon, France
-
November 2001
Report
Protection of 3-d object usage through watermarking
Research report RR-01-056
-
November 2001
Report
Comparison of PS, SRPT, and FB scheduling policies under exponential and heavy tail job sizes
Research report RR-01-063B
-
October 2001
Conference
SEVA: a framework to dynamically set up and run secure extranet
Conference eWork & eComm 2001, October 17-19, 2001, Venice, Italy
-
October 2001
Conference
Inter-domain authorization and delegation for business-to-business e-commerce
e-2001: eBusiness and eWork Conference - 17-19 October 2001, Venice, Italy
-
October 2001
Conference
Eye state tracking for face cloning
ICIP 2001, IEEE International Conference Image Processing, October 7-10 2001, Thessaloniki, Greece
-
September 2001
Conference
DSS: a deterministic and scalable QoS provisioning scheme
COST 263, 2nd International Workshop on Quality of future Internet Services QofIS, September 24-26, 2001, Coimbra, Portugal | Also available as LNCS Volume 2156
-
September 2001
Conference
Dynamic lexicon using phonetic features
EUROSPEECH 2001, 7th European Conference on Speech Communication and Technology, September 3-7, 2001, Aalborg, Denmark
-
September 2001
Conference
Outils de navigation dans les fichiers audio
RJC 2001, Rencontres des Jeunes Chercheurs, Septembre 2001, Mons, Belgique
-
September 2001
Conference
On the utility of FEC mechanisms for multimedia applications
COST 263, 2nd International Workshop on Quality of future Internet Services QofIS, September 24-26, 2001, Coimbra, Portugal | Also available in print as Springer LNCS N°2156
-
August 2001
Journal
Integer multiflows and metric packings beyond the cut condition
Discrete Mathematics, 28 August 2001, Volume 239, N°1
-
August 2001
Conference
Self-adaptation using eigenvoices for large-vocabulary continuous speech recognition
ITRW 2001, Adaptation Methods for Automatic Speech Recognition, August 2001, Sophia-Antipolis, France
-
August 2001
Journal
Analysis and reproduction of facial expressions for realistic communicating clones
Journal of VLSI Signal Processing Systems, Volume 29, N°1/2, August/September 2001
-
August 2001
Journal
Coding efficiency of multi-ring and single-ring differential chain coding for telewriting application
IEE Proceedings in Vision, Image and Signal Processing, Volume 148, N°4, August 2001
-
August 2001
Journal
Analysis of Web caching architectures: hierarchical and distributed caching
IEEE/ACM Transactions on Networking, Vol. 9, N°4, August 2001
-
August 2001
Journal
Bandwidth allocation policies for unicast and multicast flows
IEEE/ACM Transactions on Networking, Volume 9 n°4, August 2001
-
July 2001
Journal
The ISCA technical and research workshop : adaptation methods in automatic speech recognition
The Phonetician, Number 84, 2001-II, International Society of Phonetic Sciences, Sophia-Antipolis, France
-
June 2001
Conference
Mocha : A quality adaptive multimedia proxy cache for Internet streaming
NOSSDAV 2001, 11th International Workshop on Network and Operating Systems Support for Digital Audio and Video, June 25-26, 2001, New York, USA
-
June 2001
Conference
Object replication strategies in content distribution networks
IWCW 2001, 6th International Web Caching and Content Distribution Workshop, June 20-22, 2001, Boston, USA
-
June 2001
Invited paper in a conference
Seamless navigation in audio files
ODYSSEY 2001: a speaker odyssey, June 18-22, 2001, Crete, Greece
-
June 2001
Thesis
Asynchronous multimedia messaging
Thesis
-
June 2001
Book
Serveurs vidéo : architecture et performance
Book chapter N°5 in "Systèmes multimédias communicants", Ed. Dabbous, Walid; Hermès; 2001; ISBN: 9782746202511
-
June 2001
Conference
Acquisition à faible coût de modèles 3D réalistes de visages
ORASIS 2001, Actes des journées francophones des jeunes chercheurs en analyse d'images et perception visuelle, June 5-8, 2001, Cahors, France
-
May 2001
Conference
Analysis-synthesis cooperation for MPEG-4 realistic clone animation
ICAV3D 2001, Euroimage International Conference on Augmented, Virtual Environments and Three-Dimensional Imaging, May 30th-June 1st, 2001, Mykonos, Greece
-
May 2001
Thesis
Traitement du signal audio dans le domaine codé : techniques et applications.
Thesis
-
May 2001
Conference
3D talking head customization by adapting a generic model to one uncalibrated picture
ISCAS 2001, IEEE International Symposium on Circuits and Systems, May 6-9, 2001, Sydney, Australia
-
May 2001
Journal
Protocoles d'authentification
Revue de l'électricité et de l'électronique (REE), N°5, mai 2001
-
April 2001
Conference
Adaptive streaming of stored video in a TCP-friendly context : multiple versions or multiple layers
PV 2001, International Packet Video Workshop, April 30 - May 1, 2001, Kyongju, Korea
-
April 2001
Conference
Queueing analysis of simple FEC schemes for IP telephony
INFOCOM 2001, 20th IEEE Annual Conference on Computer Communications, April 22-26, 2001, Anchorage, USA
-
April 2001
Conference
Distributing layered encoded video through caches
INFOCOM 2001, 20th IEEE Annual Conference on Computer Communications, April 22-26, 2001, Anchorage, USA
-
April 2001
Conference
Low cost 3D face acquisition and modeling
ITCC 2001, IEEE International Conference on Information Technology: Coding and Computing, April 2-4, 2001, Las Vegas, USA
-
April 2001
Report
Bandwidth allocation policies for unicast and multicast flows
Research report RR-00-054, extended version of the article published in IEEE/ACM Transactions on networking
-
April 2001
Journal
A comprehensive architecture for continuous media email
IEEE Multimedia, Volume 8, N°2, April-June 2001
-
March 2001
Thesis
Détection d'intrusions : une nouvelle approche par systèmes multi-agents
Thesis
-
March 2001
Thesis
Vidéo spatialisation : algorithmique et visualisation
Thesis
-
March 2001
Report
A video conference system under MPEG-4 Overview of face animation in MPEG-4 and study of the compliance level of Eurecom's face animation-teleconferencing system
Research report RR-01-053, March 2001
-
March 2001
Journal
Survey and taxonomy of IP address lookup algorithms
IEEE Network Magazine, Volume 15, N° 2, March/April 2001
-
February 2001
Journal
Secure data collection with updates
Electronic Commerce Research, Volume 1, N°1-2, February/March 2001
-
February 2001
Journal
A visual analysis/synthesis feedback loop for accurate face tracking
Signal Processing: Image Communication, Volume 16, N°6, February 2001
-
February 2001
Journal
TPOT: translucent proxying of TCP
Computer Communications, Vol. 24, N°2, 1 February 2001
-
January 2001
Thesis
Mobile code protection
Thesis
-
January 2001
Patent
Process for securing the execution of a mobile code in an untrusted environment
Patent N°EP1065593
-
January 2001
Journal
Adaptive streaming of layer-encoded multimedia presentations
Journal of VLSI Signal Processing, Special issue on multimedia communications, Volume 34 N°1, 2003
-
December 2000
Journal
Towards a new approach for intrusion detection with intelligent agents
NIS, Networking and Information Systems, Ingénierie des systèmes d'informations, Volume 2 N°5-6
-
November 2000
Conference
Un système multi-agents pour la détection d’intrusions
JDIR 2000, Journées Doctorales en Informatique et Réseaux, Novembre 6-8, 2000, Paris, France
-
November 2000
Book
Computer networking : a top-down approach featuring the Internet
Addison-Wesley, 1st ed., 11/2000, ISBN: 0201477114
-
October 2000
Conference
Image watermaking for owner and content authentication
MM 2000, 8th ACM international conference on Multimedia, October 30-November 03, 2000, Marina del Rey, USA
-
October 2000
Thesis
Multicast congestion control for best effort networks
Thesis
-
October 2000
Thesis
Scalable content distribution in the Internet
Thesis
-
October 2000
Conference
Acquisition et animation de clones réalistes pour les télécommunications
CORESA 2000, COmpression et REpresentation des Signaux Audiovisuels, 19-20 Octobre 2000, Poitiers, France
-
October 2000
Conference
Regroupement par locuteur de messages vocaux
CORESA 2000, COmpression et REpresentation des Signaux Audiovisuels, 19-20 Octobre 2000, Poitiers, France
-
October 2000
Conference
A distributed access control model for Java
ESORICS 2000, European Symposium On Research In Computer Security, 4-6 Octobre 2000, Toulouse, France / Also published as LNCS, Volume 1895/2000
-
October 2000
Thesis
Software engineering techniques for support of communication protocol implementation
Thesis
-
September 2000
Thesis
Software agents in network management
Thesis
-
September 2000
Conference
A multi-agents system for network security management
SMARTNET 2000, 6th IFIP Conference on Intelligence in Networks, September 18-22, 2000, Vienna, Austria
-
September 2000
Thesis
La segmentation et le regroupement par locuteurs pour l'indexation de documents audio
Thesis
-
September 2000
Journal
A software agent architecture for network management : case studies and experience-gained
Journal of Network and Systems Management, Volume 8, N°3, September 2000
-
September 2000
Journal
DISTBIC : A speaker-based segmentation for audio data indexing
Speech Communication, Volume 32, N°1-2, 2000
-
August 2000
Patent
Process for marking a multimedia document, such as an image, by generating a mark
Patent N°EP1031944
-
August 2000
Journal
Continuous media e-mail on the Internet : infrastructure inadequacies and a sender-side solution
IEEE Network Magazine, Volume 14, N°4, July-August 2000
-
August 2000
Journal
Scalable multicast security with dynamic recipient groups
ACM Transactions on Information and System Security, Voume 3, N°3, August 2000
-
July 2000
Conference
Real time 3D navigation in a static virtualized scene from a limited set of 2D data
ICME 2000, IEEE International Conference on Multimedia and Expo, July 30-August 2, 2000, New York, USA
-
July 2000
Conference
Optimal streaming of layer-encoded multimedia presentations
ICME 2000, IEEE International Conference on Multimedia and Expo, July 30-August 2, 2000, New York, USA
-
July 2000
Thesis
Agent intelligent : émergence d'une nouvelle technologie pour la gestion de réseaux
Thesis
-
July 2000
Conference
Order-worker-entry: a system of patterns to structure communication protocol software
EUROPLOP 2000, European Conference on Pattern Languages of Programs, 6-8 July 2000, Bad Irsee, Germany
-
July 2000
Journal
Editorial : sécurité dans les réseaux
Annales des télécommunications, Volume 55, N°7-8, Juillet- août 2000
-
June 2000
Conference
Pathological behaviors for RLM and RLC
NOSSDAV 2000, 10th International Workshop on Network and Operating Systems Support for Digital Audio and Video, 26-28 June, 2000, Chapel Hill, USA
-
June 2000
Conference
Streaming stored continuous media over fair-share bandwidth
NOSSDAV 2000, 10th International Workshop on Network and Operating System Support for Digital Audio and Video, 26-28 June, 2000, Chapel Hill, USA
-
June 2000
Conference
SPREAD: Scalable Platform for Reliable and Efficient Automated Distribution
WWW 2000, 9th international WWW conference, May 15-19, 2000, Amsterdam, The Netherlands
-
June 2000
Conference
An intelligent agent approach for security management
HP-OVUA, 7th Plenary Workshop HP Openview University Association, June 12-14, 2000, Santorini, Greece
-
June 2000
Conference
How layering protocol software violates separation of concerns
ECOOP 2000, Workshop on Aspects and Dimensions of Concerns (ADC), June 12-16, 2000, Cannes, France | Also published as LNCS volume 1964
-
June 2000
Conference
Managing Web servers with SNMP
HP-OVUA 2000, 7th Plenary Workshop HP Openview University Association, June 12-14, 2000, Santorini, Greece
-
June 2000
Conference
Audio-visual intent-to-speak detection for human-computer interaction
ICASSP 2000, 25th IEEE International conference on acoustic, speech and signal, June 5-9, 2000, Istanbul, Turkey
-
June 2000
Conference
A speaker tracking system based on speaker turn detection for NIST evaluation
ICASSP 2000, 25th IEEE International conference on acoustic, speech and signal, June 5-9, 2000, Istanbul, Turkey
-
June 2000
Conference
PLM: Fast convergence for cumulative layered multicast transmission schemes
SIGMETRICS 2000, ACM International Conference on Measurement and Modeling of Computer Systems, June 2000, Santa Clara, USA / Also available in ACM SIGMETRICS Performance Evaluation Review, Volume 28, Issue 1, June 2000
-
June 2000
Conference
Mobile code, Internet security and E-commerce
ECOOP 2000, Workshop on Aspects and Dimensions of Concerns (ADC), June 12-16, 2000, Cannes, France | Also published as LNCS volume 1964
-
June 2000
Conference
Safe aspect composition
ECOOP 2000, Workshop on Aspects and Dimensions of Concerns (ADC), June 12-16, 2000, Cannes, France | Also published as LNCS volume 1964
-
June 2000
Conference
Mobile code protection with Smartcards
ECOOP 2000, Workshop on QoS for Distributed Object Systems, June 2000, Cannes, France / Also published as LNCS volume 1964
-
June 2000
Conference
QoS for distributed objects by generating tailored protocols
ECOOP 2000, Workshop on QoS for Distributed Object Systems, June 12-16 2000, Cannes, France / Also published as LNCS Volume 1964
-
June 2000
Journal
SPREAD: Scalable Platform for Reliable and Efficient Automated Distribution
Computer Networks, Volume 33, Issues 1-6, June 2000
-
May 2000
Conference
Performance evaluation of redirection schemes in content distribution networks
WCW 2000, 5th Web Caching Workshop, May 22-24, 2000, Lisbon, Portugal
-
May 2000
Conference
TPOT: Translucent Proxying of TCP
WCW 2000, 5th Web Caching Workshop, May 22-24, 2000, Lisbon, Portugal
-
May 2000
Conference
Experimenting service-oriented 3D metaphors for managing networks using virtual reality
VRIC 2000, Virtual reality international conference, 18-19 May 2000, Laval, France
-
May 2000
Conference
A graduate program in integrated communication systems
EWME 2000, 3rd European Workshop on Microelectronics Education, May 18-19, 2000, Fuveau, France / Also published as Microelectronics Education, Courtois, B.; Guillemot, N.; Kamarinos, G.; Stéhelin, G. (Eds.) 2000, 336 p., ISBN: 978-0-7923-6456-6
-
May 2000
Conference
Millau: an encoding format for efficient representation and exchange of XML over the Web
WWW 2000, 9th international World Wide Web conference, May 15-19, 2000, Amsterdam, Netherlands / Also published on Computer Networks, N°1-6, June 2000
-
May 2000
Book
Agents intelligents et gestion de réseaux
Book chapter N°13 in "Logiciel et Réseaux de Communication", Observatoire Français des Techniques Avancées, ARAGO 23
-
May 2000
Conference
SPREAD: scalable platform for reliable and efficient automated distribution
NETWORKING 2000, Broadband Communications, High Performance Networking, and Performance of Communication Networks, IFIP-TC6 / European Commission International Conference, May 14-19, 2000, Paris, France / Also published in Computer Networks, Vol 33, N°1-6, June 2000
-
May 2000
Conference
Performance study of satellite-linked web caches and filtering policies
NETWORKING 2000, Broadband Communications, High Performance Networking, and Performance of Communication Networks, IFIP-TC6 / European Commission International Conference, May 14-19, 2000, Paris, France / Also published as Lecture notes in computer science Volume 1815
-
April 2000
Conference
Network security management with intelligent agents
NOMS 2000, IEEE/IFIP Network Operations and Management Symposium, 08-14 avril 2000, Honolulu, Hawaii
-
April 2000
Conference
When management agents become autonomous, how to ensure their reliability?
NOMS 2000, IEEE/IFIP Network Operations and Management Symposium, 08-14 avril 2000, Honolulu, Hawaii
-
April 2000
Conference
Automatic configuration of PVCs in ATM networks with software agents
NOMS 2000, IEEE/IFIP Network Operations and Management Symposium, 08-14 avril 2000, Honolulu, Hawaii
-
April 2000
Conference
An efficient polling layer for SNMP
NOMS 2000, IEEE/IFIP Network Operations and Management Symposium,08-14 April 2000, Honolulu, Hawaii
-
April 2000
Conference
Blind detection of malicious alterations on still images using robust watermarks
IEEE Secure Images and Image Authentication colloquium, April 10, 2000, London, UK
-
April 2000
Journal
Performance comparision of centralized versus distributed error recovery for reliable multicast
IEEE/ACM Transactions on Networking, Volume 8, N°2 - April 2000
-
April 2000
Conference
A component-based architecture for software communication systems
ECBS 2000, 7th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems, 3-5 April 2000, Edinburgh, UK
-
April 2000
Journal
CyberNet: A framework for managing networks using 3D metaphoric worlds
Annales des télécommunications, Volume 55, N°3-4, Avril 2000
-
March 2000
Conference
A replicated architecture for the Domain Name System
INFOCOM 2000, 19th Annual IEEE Conference on computer communications, March 26-30, 2000, Tel Aviv, Israel
-
March 2000
Conference
Replicating the DNS using satellite broadcast
INFOCOM 2000, 19th Annual IEEE Conference on computer communications, March 26 - 30, 2000, Tel Aviv, Israel
-
March 2000
Conference
Optimal streaming of layered video
INFOCOM 2000, 19th Annual IEEE Conference on computer communications, March 26-30, 2000, Tel Aviv, Israel
-
March 2000
Conference
Parallel-access for mirror sites in the Internet
INFOCOM 2000, 19th Annual IEEE Conference on computer communications, March 26-30, 2000, Tel Aviv, Israel
-
March 2000
Journal
Eigenvoices : a compact representation of speakers in a model space
Annales des télécommunications, Volume 55, N°3-4, Mars-avril 2000
-
March 2000
Journal
A fractals-inspired approach to binary image database indexing and retrieval
Annales des télécommunications, Volume 55, N°3-4, Mars-avril 2000
-
March 2000
Journal
Technologies du tatouage pour l'authentification et la protection des images
Annales des Télécommunications, Volume 55, n°3-4, Mars-Avril 2000
-
March 2000
Journal
Un panorama sur l'indexation d'images fixes
Journal marocain d'automatique, d'informatique et de traitement du signal, Mars 2000
-
March 2000
Conference
When network management agents become autonomous, how to ensure their reliability?
ACIDCA 2000, 1st International Conference on Artificial and Computational Intelligence For Decision, Control and Automation In Engineering and Industrial Applications, March 2000, Monastir, Tunisia
-
February 2000
Conference
Différentes stratégies pour le suivi de locuteur
RFIA 2000, Reconnaissance des Formes et Intelligence Artificelle, February 1-3, 2000, Paris, France
-
February 2000
Journal
Face tracking and realistic animations for telecommunicant clones
IEEE Multimedia Magazine, Volume 7, N°1, January-March 2000
-
February 2000
Journal
Modeling and performance comparison of reliability strategies for distributed video servers
IEEE Transactions on Parallel and Distributed Systems, Volume 11, N°4, April 2000
-
February 2000
Tutorial
Mobile code security
ISYPAR 2000 (4ème Ecole d'Informatique des Systèmes Parallèles et Répartis), 1-3 février 2000, Toulouse, France
-
February 2000
Journal
Performance evaluation of redirection schemes in content distribution networks
Computer Communications, Volume 24, N°2, 1 February 2000
-
January 2000
Conference
Possible counter-attacks against random geometric distortions
SPIE Security and Watermarking of Multimedia Contents II, 22 January 2000, San Jose, USA / Proceedings of SPIE, Volume 3971 Security and Watermarking of Multimedia Contents II, Ping W. Wong, Edward J. Delp III, Editors, May 2000
-
December 1999
Journal
Clonage de visage et spatialisation vidéo : outils pour la téléconférence virtuelle
Traitement du Signal, Volume 16, N°1, Special 1999 : Réalité Virtuelle
-
December 1999
Patent
Signature technique for electronically transmitted document
Patent N°FR2779592
-
December 1999
Conference
Using BDI-oriented agents for network management
GLOBECOM 1999, IEEE Global Telecommunications Conference, December 5-7, 1999, Rio de Janeiro, Brazil
-
December 1999
Conference
Distributed network security management using intelligent agents
LANOMS 1999, IEEE Latin American Network Operations and Management Symposium, 3-5 December 1999, Rio de Janeiro, Brazil
-
December 1999
Conference
Secure data collections with updates
IAT 1999, Workshop on Agents on Electronic Commerce, 1rst Asia Pacific Conference on Intelligent agent technology, December 1999, Hong-Kong
-
November 1999
Thesis
Design and performance of large scale video servers
Thesis
-
November 1999
Report
Beyond TCP-friendliness: a new paradigm for end-to-end congestion control
Research report RR-00-055
-
November 1999
Conference
Optimal streaming of synchronized multimedia presentations with layered objects
MM 1999, 7th ACM International Multimedia Conference, October 30th-November 5th, 1999, Orlando, USA
-
November 1999
Thesis
Analyse, synthèse et animation de clones dans un contexte de téléréunion virtuelle
Thesis
-
November 1999
Conference
Segmentation et indexation par locuteurs d'un document audio
RJC 1999, Rencontre Jeunes Chercheurs, November 1999, Avignon, France
-
November 1999
Conference
Séparation des sources d'informations caractéristiques du locuteur
RJC 1999, Rencontre Jeunes Chercheurs, November 1999, Avignon, France
-
November 1999
Report
A visual analysis/synthesis feedback loop for unconstrained face tracking
Research report RR-99-051
-
November 1999
Conference
Privacy for mobile code
OOPSLA 1999, Workshop on Distributed object security, November, 2nd 1999, Denver, Colorado, USA
-
November 1999
Conference
L'internationalisation par les télécommunications et pour les télécommunications
Journées des Techniques de l'Information et de la Communication, November 1999, Nice, France
-
November 1999
Conference
Scalable multicast security in dynamic groups
CCS 1999, 6th ACM Conference on Computer and Communications Security, 1-4 November 1999, Singapore, Singapore
-
October 1999
Conference
A first step into speaker-based indexing
CBMI 1999, 1st European Workshop on Content-Based Multimedia Indexing, October 25-27 1999, Toulouse, France
-
October 1999
Conference
A fractals-inspired approach to content-based image indexing
ICIP 1999, IEEE International conference on image processing, October 24, 1999, Kobe, Japan
-
October 1999
Conference
A novel replica placement strategy for video servers
IDMS 1999, International Workshop on Interactive Distributed Multimedia Systems and Telecommunication Services, October 12-15, 1999, Toulouse, France / Also published in LNCS, Volume 1718/1999
-
October 1999
Thesis
Performances des applications de transfert de données sur ATM
Thesis
-
October 1999
Book
A survey of current watermarking techniques
Book chapter in "Information hiding techniques for steganography and digital watermarking", Editors : Katzenbeisser, Stefan, Petitcolas, Fabien, Artech House 1st ed., 10/1999, p. 240, ISBN : 1580530354
-
September 1999
Conference
A novel indexing approach for multimedia image databases
MMSP 1999, IEEE Workshop on Multimedia Signal Processing, September 13, 1999, Copenhagen, Denmark
-
September 1999
Conference
A fractal-inspired approach to data embedding in digital images for authentication services
MMSP 1999, IEEE Workshop on Multimedia Signal Processing, September 13, 1999, Copenhagen, Denmark
-
September 1999
Conference
Analysis and reproduction of facial expressions for communicating clones
MMSP 1999, IEEE Workshop on Multimedia Signal Processing, September 13, 1999, Copenhagen, Denmark
-
September 1999
Conference
Maximum likelihood eigenspace and MLLR for speech recognition in noisy environments
EUROSPEECH 1999, ISCA Conference on Speech Communication and Technology, 4-10 September 1999, Budapest, Hungary
-
September 1999
Conference
Detection of speaker changes in an audio document
EUROSPEECH 1999, ISCA Conference on Speech Communication and Technology, 4-10 September 1999, Budapest, Hungary
-
August 1999
Conference
Asynchronous audio conferencing on the Web
ISIMADE 1999, International Symposium on Intelligent Media and Distance Education, August 2-7, 1999, Baden-Baden, Germany
-
July 1999
Patent
Method of administration of computer network with the aid of intelligent agents
Patent N°FR2774191
-
July 1999
Conference
Function hiding based on error correcting codes
CRYPTEC 1999, International Workshop on Cryptographic Techniques and E-Commerce, July 1999, Hong-Kong, Hong-Kong
-
June 1999
Conference
MA-NID : a multi-agent system for network intrusion detection
ICIS 1999, 8th International Conference on Intelligent Systems, June 24-26, 1999, Denver, Colorado
-
June 1999
Conference
Indexation d'images par fractale Viterbi
CORESA 1999, 5èmes journées d'téudes et d'échanges COmpression et REprésentation des Signaux Audiovisuels, June 14-15, 1999, Sophia-Antipolis, France
-
June 1999
Conference
Amélioration des taux de reconnaissance par filtrage de données
CORESA 1999, 5èmes journées d'téudes et d'échanges COmpression et REprésentation des Signaux Audiovisuels, June 14-15, 1999, Sophia-Antipolis, France
-
June 1999
Conference
Voix propres: Une représentation compacte de locuteurs dans l'espace des modèles
CORESA 1999, 5èmes journées d'téudes et d'échanges COmpression et REprésentation des Signaux Audiovisuels, June 14-15, 1999, Sophia-Antipolis, France
-
June 1999
Conference
Introduction au tatouage d'images
CORESA 1999, 5èmes journées d'études et d'échanges COmpression et REprésentation des Signaux Audiovisuels, June 14-15, 1999, Sophia-Antipolis, France
-
June 1999
Conference
Performance and reliability study for distributed video servers: mirroring or parity?
ICMCS 1999, IEEE International Conference on Multimedia Computing and Systems, June 7-11, 1999, Florence, Italy
-
June 1999
Conference
Virtual 3D interactions between 2D real multi-views
ICMCS 1999, IEEE International Conference on Multimedia Computing and Systems, June 7-11, 1999, Florence, Italy
-
June 1999
Journal
Scalable feedback for large groups
IEEE/ACM Transactions on Networking, Volume 7 N°3, June 1999
-
June 1999
Conference
Flexible software agents for the automatic provision of PVCS in ATM networks
2nd IFIP WG6.1 International working Conference, June 28-July 1, 1999, Helsinki, Finland
-
June 1999
Conference
Face tracking and realistic animations for telecommunicant clones
ICMCS 1999, IEEE International Conference on Multimedia Computing and Systems, June 7-11, 1999, Florence, Italy
-
June 1999
Conference
Audio data indexing : use of second order statistics for speaker-based segmentation
ICMCS 1999, IEEE International Conference on Multimedia Computing and Systems, June 7-11, 1999, Florence, Italy
-
June 1999
Conference
Network management and virtual reality
7ème journée du GT Réalité virtuelle, 3-4 juin 1999, Laval, France
-
June 1999
Conference
Un modèle de surveillance utilisant des agents intelligents
GRES 1999, 3e Colloque Francophone sur la Gestion de Réseaux et de Services, 2 Juin 1999, Montreal, Canada
-
June 1999
Conference
Agents intelligents et gestion de réseaux ATM
GRES 1999, 3ème colloque francophone sur la gestion de réseaux et de services, Juin 1999, Montréal, Canada
-
June 1999
Conference
Segmentation en locuteurs d'un document audio
CORESA 1999, 5èmes journées d'études et d'échanges COmpression et REprésentation des Signaux Audiovisuels, June 14-15, 1999, Sophia-Antipolis, France
-
June 1999
Conference
Fractal transform based large digital watermark embedding and robust full blind extraction
ICMCS 1999, IEEE International Conference on Multimedia Computing and Systems, June 7-11, 1999, Florence, Italy
-
May 1999
Conference
Intelligent agents for networks management : a fault detection experiment
INM 1999, 6th IFIP/IEEE, International symposium on integrated network management, 24-28 May, 1999, Boston, USA
-
May 1999
Conference
Improving reliability of intelligent agents for network management
INM 1999, 6th IFIP/IEEE, International symposium on integrated network management, 24-28 may 1999 - Boston, USA
-
May 1999
Thesis
Mécanismes de sécurité liés à la diffusion des images : tatouage d'image
Thesis
-
May 1999
Conference
Striping for interactive video: is it worth it?
ICMCS 1999, IEEE International Conference on Multimedia Computing and Systems, June 7-11, 1999, Florence, Italy
-
April 1999
Conference
Synthetic natural hybrid video processings for virtual teleconferencing systems
PCS 1999, IEEE Picture Coding Symposium, April 21-23, 1999, Portland, Oregon, USA
-
April 1999
Journal
Internet security architecture
Computer Networks & ISDN Systems Journal, Vol 31 N°8 - April 1999
-
April 1999
Conference
Fractal-based video coding and slow motion replay
PCS 1999, IEEE Picture Coding Symposium, April 21-23, 1999, Portland Oregon, USA
-
April 1999
Conference
Speaker-based segmentation for audio data indexing
ISCA Workshop on accessing information in audio data, April 19-20, 1999, Cambridge, UK
-
March 1999
Conference
Locating copies of objects using the Domain Name System
WCW 1999, 4th Web Caching Workshop, March 31-April 2, 1999, San Diego, CA, USA
-
March 1999
Conference
Cybernet : utilisation de métaphores et des techniques de réalité virtuelle pour la représentation de données Application à la gestion de réseau
Actes des 6èmes Journées de Travail du GT Réalité Virtuelle, 12-13 mars, 1998, Issy-les-Moulineaux, France
-
March 1999
Conference
Performance and cost comparison of mirroring and parity-based reliability schemes for video servers
KIVS 1999, Kommunikation in Verteilten Systemen, March 2-5, 1999, Darmstadt, Germany
-
March 1999
Conference
Fast speaker adaptation using "a priori" knowledge
ICASSP 1999, 24th IEEE International Conference on Acoustics, Speech and Signal Processing, March 15-19, 1999, Phoenix, USA
-
March 1999
Conference
N-best based supervised and unsupervised adaptation for native and non-native speakers in cars
ICASSP 1999, 24th IEEE International Conference on Acoustics, Speech and Signal Processing, March 15-19, 1999, Phoenix, USA
-
March 1999
Conference
Implementing network protocols in Java - A framework for rapid prototyping
ICEIS 1999, International Conference on Enterprise Information Systems, March, 27-30, 1999, Sétubal, Portugal
-
March 1999
Conference
Bandwidth allocation policies for unicast and multicast flows
INFOCOM 1999, 18th Annual IEEE Conference on computer communications, March 21-25, 1999, New York, USA
-
March 1999
Conference
Web caching architectures: hierarchical and distributed caching
WCW 1999, 4th International Caching Workshop, 31 March-2 April 1999, San Diego, USA
-
March 1999
Conference
Reliable multicast via satellite : uni-directional vs. bi-directional communication
KIVS 1999, Kommunikation in Verteilten Systemen, 2-5 March 1999, Darmstadt, Germany
-
March 1999
Conference
Guaranteeing statistical QoS to regulated traffic: the single node case
INFOCOM 1999, 18th Annual IEEE Conference on computer communications, March 21-25, 1999, New York, USA
-
January 1999
Journal
Synchronized delivery and playout of distributed stored multimedia streams
Multimedia Systems, Volume 7, N°1, January 1999
-
January 1999
Journal
Data striping and reliablity aspects in distributed video servers
Cluster Computing: Networks, The Journal of Networks, Software Tools and Applications, Volume 2, N°1, March 1999
-
December 1998
Conference
Guaranteeing statistical QoS to regulated traffic: the single node case
CDC 1998, 37th IEEE Conference on Decision and Control, December 16-18, 1998, Tampa, USA
-
December 1998
Thesis
Architecture multimédia interactive et multipoint supportant le travail coopératif sur Internet
Thesis
-
December 1998
Conference
Les agents intelligents et leur rôle en administration de réseaux
DNAC 1998, De nouvelles architectures pour les Communications : les architectures intelligentes de réseaux, 1-3 décembre 1998, Paris, France
-
December 1998
Conference
Image watermarking based on the fractal transform : a draft demonstration
MMSP 1998, IEEE 2nd Workshop on Multimedia Signal Processing, December 7-9, 1998, Los Angeles, USA
-
December 1998
Conference
Eigenfaces and eigenvoices: dimensionality reduction for specialized pattern recognition
MMSP 1998, IEEE 2nd Workshop on Multimedia Signal Processing, December 7-9, 1998, Los Angeles, USA
-
December 1998
Report
Improving reliability of intelligent agents for network management
Research report RR-98-045
-
November 1998
Conference
Enhanced ASR by acoustic feature filtering
ICSLP 1998, 5th International Conference on Spoken Language Processing, 30 November-4 December 1998, Sydney, Australia
-
November 1998
Conference
The use of Meta-HMM in multistream HMM training for automatic speech recognition
ICSLP 1998, 5th International Conference on Spoken Language Processing, 30 November-4 December 1998, Sydney, Australia
-
November 1998
Conference
Eigenvoices for speaker adaptation
ICSLP 1998, 5th International Conference on Spoken Language Processing, 30 November-4 December 1998, Sydney, Australia
-
November 1998
Patent
Secret routing of messages in computer or cellular radio communications
Patent N°FR2763770
-
November 1998
Journal
Improving the WWW: caching or multicast?
Computer Networks and ISDN Systems, Volume 30, Issues 22-23, 25 November 1998
-
November 1998
Conference
Subsidiarité de l'intelligence dans les grands systèmes
Entretiens Science et défense, Cité des sciences et de l'industrie, November 4-5, 1998, Paris, France
-
November 1998
Journal
High-performance prefetching protocols for VBR prerecorded video
"IEEE Network Magazine", Volume 12, N°6, November-December 1998
-
October 1998
Conference
Design and implementation of a scalable, reliable, and distributed VOD-server
AFRICOM-CCDC, 5th joint IFIP & ICCC Conference on Computer Communications, October 20-24, 1998, Tunis, Tunisia
-
October 1998
Conference
A CORBA-based architecture and synchronization support for distributed multimedia services
AFRICOM-CCDC, 5th joint IFIP & ICCC Conference on Computer Communications, October 20-24, 1998, Tunis, Tunisia
-
October 1998
Conference
3D face modeling and encoding for virtual teleconferencing
VLBV 1998, International workshop on very low bitrate video coding, 1998, Urbana, USA
-
October 1998
Conference
Bringing the web to the network edge: large caches and satellite distribution
WOSBIS 1998, ACM/IEEE MobiCom Workshop on Satellite-based Information Services, October 1998, Dallas, USA
-
September 1998
Poster / Demo
Distributed multimedia services based on a Corba-platform
MIDDLEWARE 1998, IFIP international conference on distributed systems, platforms and open distributed processing, 15-18 September 1998, Lake District, UK
-
September 1998
Conference
Parallel computation on interval graphs using PC clusters: Algorithms and experiments
EURO-PAR 1998, 4th International Conference on Parallel Processing, 1-4 September 1998, Southampton, UK / Lecture Notes in Computer Science, Vol 1470/1998
-
August 1998
Journal
Parity-based loss recovery for reliable multicast transmission
IEEE/ACM Transactions on Networking, Volume 6, N°4, August 1998
IEEE Communications Society William R. Bennett best paper award
-
July 1998
Conference
Shared window system for large groups based on multicast
INET 1998, Internet Summit, July 21-24, 1998, Geneva, Switzerland
-
July 1998
Conference
A mobile agent-based security architecture for Intranets
WMSCI 1998, World Multi-Conference on Systemics, Cybernetics and Informatics, July 12-16, 1998, Orlando, USA
-
July 1998
Conference
Cost-optimal data retrieval for video servers with variable bit rate video streams
NOSSDAV 1998, 8th International Workshop on Network and Operating Systems Support for Digital Audio and Video, 8-10 July, 1998, Cambridge, UK
-
July 1998
Conference
A more attractive and interactive TV
W3C, Workshop on Television and the Web, July 1998, Sophia-Antipolis, France
-
July 1998
Conference
Visual spatialization of meeting room from 2D uncalibrated views
IMDSP 1998, 10th Image and Multimedia Digital Signal Processing Workshop, July 12-16, 1998, Alpbach, Austria
-
July 1998
Journal
The impact of routing on multicast error recovery
Computer Communications, Volume 21, N°10, July 1998
-
June 1998
Thesis
Reliable multicast transport to large groups
Thesis
-
June 1998
Conference
An analysis/synthesis cooperation for head tracking and video face cloning
ECCV workshop on perception of human action, June 1998, Freiburg, Germany
-
June 1998
Conference
Improving the WWW : caching or multicast ?
WCW 1998, 3rd International WWW caching workshop, June 15-17, 1998, Manchester, UK
-
June 1998
Report
Scalable key distribution for secure multicast
Research report RR-98-044, also Master thesis, DEA RSD Université de Nice Sophia Antipolis, June 1998
-
June 1998
Journal
A dynamic programming methodology for managing prerecorded VBR sources in packet-switched networks
Telecommunication Systems, Volume 9, N°2, June 1998
-
May 1998
Conference
A decentralized prefetching for VBR video on demand
ECMAST 1998, Multimedia Applications, Services and Techniques, 26-28 May 1998, Berlin, Germany / Lecture notes in computer science N°1425
-
May 1998
Report
Geometric and photometric head modelingfor facial analysis technologies
Research report RR-98-041
-
May 1998
Journal
A performance comparison between graph and hypergraph : Topologies for passive star WDM lightwave networks
Computer Networks and ISDN Systems, Volume 30, Issue 8, May 1998
-
April 1998
Conference
Managing SNMP environments using mobile SnmpSql
SMW 1998, 3rd IEEE International Workshop on Systems Management, April 21-23, 1998, Newport, USA
-
April 1998
Conference
Network management system with intelligent agents, a first step with SLD
HP-OVUA 1998, HP Openview University Association Workshop, April 18-21, 1998, Rennes, France
-
April 1998
Conference
Optimal multicast feedback
INFOCOM 1998, 17th Annual IEEE Conference on computer communications, Gateway to the 21st century, 29 March-2 April 1998, San Francisco, USA
-
April 1998
Conference
Packet multiplexers with adversarial regulated traffic
INFOCOM 1998, 17th Annual IEEE Conference on computer communications, Gateway to the 21st century, 29 March-2 April 1998, San Francisco, USA
-
April 1998
Journal
Secret sets and applications
Information processing letters, Volume 65, N°1, April 1998
-
March 1998
Conference
How bad is reliable multicast without local recovery?
INFOCOM 1998, 17th Annual IEEE Conference on computer communications, Gateway to the 21st century, 29 March-2 April 1998, San Francisco, USA
-
March 1998
Conference
Vers la téléconférence virtuelle
6èmes journées de travail du GT Réalité Virtuelle, 12-13 Mars 1998, CNET, Issy-les-Moulineaux, France
-
March 1998
Journal
Continuous multicast push of web documents over the Internet
IEEE Network Magazine, Volume 12, N°2, March-April 1998
-
February 1998
Conference
MANIA Project : managing awareness in networks through intelligent agents
NOMS 1998, IEEE/IFIP Network Operations and Management Symposium, February 15-20, 1998, New Orleans, Louisiana, USA
-
January 1998
Thesis
Gestion des réseaux avec connaissance des besoins : utilisation des agents logiciel
Thesis
-
January 1998
Conference
Introduction to speech recognition using neural networks
ESANN 1998, 6th European Symposium on Artificial Neural Networks, April 22-24, 1998, Brussels, Belgium
-
January 1998
Journal
Intelligent agents in network management : a state of the art
Networking and Information Systems, Volume 1, N°1, 1998
-
December 1997
Journal
Survey of error recovery techniques for IP-based audio-visual multicast applications
IEEE Network Magazine, Volume 11, N°6, November-December 1997
-
November 1997
Conference
Scalable asynchronous interaction based on selective recording and replaying of X-protocol streams
PROMS-MMNET 1997, IEEE Conference on Protocols for Multimedia Systems, Multimedia Networking, November 24-27, 1997, Santiago, Chile
-
November 1997
Conference
Asynchronous multicast push : AMP
ICCC 1997, 13th international conference on computer communication, "Key to a mature information society", November 18-21, 1997, Cannes, France
-
November 1997
Journal
Hash-routing for collections of shared Web caches
"IEEE Network Magazine", Volume 11, N°6, November/December 1997
-
November 1997
Conference
Keyword spotting for multimedia document indexing
SPIE 1997, SPIE's International Symposium and Education Program on Voice, Video, and Data Communications, Volume 3229, November 1997, Dallas, USA
-
October 1997
Thesis
Validation of functional behavior specifications of distributed object frameworks
Thesis
-
October 1997
Conference
Enhanced fractal image coding by combining IFS and VQ
ICIP 1997, IEEE International Conference on Image Processing, Volume 3, October 26-29, 1997, Santa Barbara, USA
-
October 1997
Thesis
Platform support for development and deployment of multipoint multimedia applications
Thesis
-
October 1997
Thesis
Spécification et génération de tests du comportement dynamique des systèmes à objets répartis
Thesis
-
October 1997
Report
Agent's sensors and effectors
Internal report
-
October 1997
Conference
Impact of buffer sharing in multiple disk video server architectures
HSN 1997, 6th Open Workshop on High Speed Networks, October 8-9, 1997, Stuttgart, Germany
-
October 1997
Conference
Reliable ordered multicast service (ROMS) over NBMA networks
HSN 1997, 6th Open Workshop on High Speed Networks, October 8-9, 1997, Stuttgart, Germany
-
September 1997
Conference
Parity-based loss recovery for reliable multicast transmission
SIGCOMM 1997, ACM conference on Applications, technologies, architectures, and protocols for computer communication, September 14-18, 1997, Cannes, France
-
September 1997
Conference
Real ATM traffic performance analysis in Beteus
SIGCOMM 1997, ACM conference on Applications, technologies, architectures, and protocols for computer communication, September 14-18, 1997, Cannes, France
-
September 1997
Journal
IDAMN : an intrusion detection architecture for mobile networks
IEEE Journal on Selected Areas in Communications, Volume 15, N°7, September 1997
-
June 1997
Conference
Error control for real-time audio-visual services
Seminar on High Performance Networks for Multimedia Applications, 16-20 June, 1997, Dagstuhl, Germany
-
June 1997
Conference
Precise semantics for a behavior model in the context of object based distributed systems
ECOOP 1997, Workshop on Precise Semantics for Object-Oriented Modeling Techniques, published as technical report of the technical university of Munich (TUM-I9725), éd Kilov, September 2nd, 1997, Jyväskylä, Finland
-
June 1997
Journal
Réunion virtuelle : aspects du traitement vidéo
Revue de l'Electricité et de l'Electronique (REE), n°6, juin 1997
-
May 1997
Conference
A multi-site teleconferencing system using VR paradigms
ECMAST 1997, 2nd European Conference on Multimedia Applications, Services and Techniques, May 28-29, 1997, Milan, Italy
-
May 1997
Conference
Design and testing of information models in a virtual environment
IM 1997, 5th IFIP/IEEE International Symposium on Integrated Network Management, 12-16 May 1997, San Diego, USA
-
April 1997
Conference
Model-based coding and virtual teleconferencing
2nd Erlangen symposium on Advances in digital image communication, April 25, 1997, Erlangen, Germany
-
April 1997
Conference
REMAP for video soundtrack indexing
ICASSP 1997, 22nd IEEE International conference on acoustics, speech, and signal processing, April 21-24 1997, Munich, Germany
-
April 1997
Journal
A development and runtime platform for teleconferencing applications
IEEE Journal on Selected Areas in Communications, special issue on network support for multipoint communication, Volume 15, N°3, April 1997
-
April 1997
Conference
Center placement algorithms for large multicast groups
HPN 1997, 11th IFIP conference on high performance networking, April 1997, White plains, USA
-
April 1997
Conference
Performance modeling of reliable multicast transmission
INFOCOM 1997, 16th Annual IEEE Conference on computer communications, April 7-12, 1997, Kobe, Japan
-
April 1997
Journal
Zooming using iterated function systems
Fractals, Volume 5, Supplementary Issue, April 1997
-
March 1997
Conference
Mécanismes de sécurité liés à la transmission des images
CORESA 1997, 3èmes journées d'études et d'échanges COmpression et REpresentation des Signaux Audiovisuels, 26-27 mars 1997, Issy les Moulineaux, France
-
March 1997
Conference
Clonage de visages dans un contexte de téléréunion
CORESA 1997, 3èmes journées d'études et d'échanges COmpression et REpresentation des Signaux Audiovisuels, 26-27 mars 1997, Issy les Moulineaux, France
-
February 1997
Conference
Fault-tolerant video server using combined RAID 5 and mirroring
MMCN 1997, Multimedia computing and networking, February 10-11, 1997, San Jose, USA
-
February 1997
Conference
A CORBA-based platform for distributed multimedia applications
MMCN 1997, SPIE 3020, Multimedia computing and networking, February 10-11, 1997, San Jose, USA
-
January 1997
Conference
Scalable feedback for satellite broadcasts
WOSBIS 1997, 2nd International Workshop on Satellite-based Information Services, An ACM/IEEE MobiCom'97 Workshop, October 1, 1997, Budapest, Hungary
-
January 1997
Conference
Towards a "good" functional and executable behavior model
ECOOP 1997, Workshop on object oriented technology for telecommunications services engineering, June 1997, Jyväskylä, Finland / Also published as LNCS Volume 1357/1998
-
January 1997
Journal
Asynchronous interaction method for a remote teleteaching session
International Journal of Educational Telecommunication, Volume 3, Number 1, 1997, ISSN 1077-9124
-
January 1997
Conference
A new approach for a restricted concentrator location problem
International Conference on Industrial Engineering and Production Management, Lyon, France
-
December 1996
Conference
Méthode d'interaction asynchrone dans un environnement X-Window
DNAC 1996 : De nouvelles architectures pour les communications, 3-5 décembre 1996, Versailles, France
-
November 1996
Conference
New class of constant data length retrieval algorithms for video servers with variable bit rate streams
SPIE Photonics East 1996, Multimedia storage and archiving systems, 18-19 november, 1996, Boston, USA
-
November 1996
Conference
Statistical admission control in video servers with constant data length retrieval of variable bit rate streams
MMM 1996, Multimedia modeling, towards the information superhighway, November 12-15, 1996, Toulouse, France
-
November 1996
Conference
Iterated function systems for still image processing
IWISP 1996, 3rd International Workshop on Image and Signal Processing, 4-7 November 1996, Manchester, UK
-
November 1996
Conference
From intelligent agents towards management by request
ICIN 1996, International Conference in Intelligence on Networks, November 1996, Bordeaux, France
-
October 1996
Thesis
Méthodologie de conception de réseaux locaux embarqués ATM et application à la marine nationale
Thesis
-
October 1996
Conference
Telecommunicating via CYBERWARE interfaces and virtual images
ICOMT 1996, International conference on multimedia technology and digital telecommunication services, 28-30 octobre 1996, Budapest, Hungary
-
October 1996
Conference
Reliable multicast : where to use FEC
PFHSN 1996, 5th international Workshop on Protocols for high-speed networks, 28-30 October 1996, Sophia Antipolis, France
-
October 1996
Conference
Les activités d'EURECOM en imagerie virtuelle pour les télécommunications
Journées nationale-réalité virtuelle, 16-17 octobre 1996, Toulouse, France
-
October 1996
Conference
Obtention of abstract views of state graphs labelled with probabilities and time distributions
IFIP WG 6.3 workshop, 13-14 October 1996, Budapest, Hungary
-
October 1996
Conference
Keyword spotting enhancement for video soundtrack indexing
ICSLP 1996, IEEE 4th International Symposium on Chinese Spoken Language Processing, October 3-6, 1996, Philadelphia, USA
-
October 1996
Book
A comparative study of existing approaches for moving picture fractal coding using IFS
Book chapter in "Multimedia communications and video coding", Plenum Press, October 1996, ISBN: 978-0-306-45367-0
-
October 1996
Conference
A generic and executable model for the specification and validation of distributed behaviors
TREDS 1996, International Workshop on Trends in distributed systems, CORBA and Beyond, October 1-2, 1996, Aachen, Germany
-
September 1996
Conference
Image sequence coding using 3-D IFS
ICIP 1996, IEEE International Conference on Image Processing, September 16-19, 1996, Lausanne, Switzerland
-
September 1996
Conference
Multi-resolution access control algorithm based on fractal coding
ICIP 1996, IEEE International Conference on Image Processing, September 16-19, 1996, Lausanne, Switzerland
-
September 1996
Conference
Agents intelligents pour une gestion à la demande
JDIR 1996, Journées Doctorales en Informatique et Réseaux, September 11-13, 1996, Paris, France
-
September 1996
Conference
Etude de protocole de sécurisation de services à très fortes contraintes
JDIR 1996, Journées Doctorales en Informatique et Réseaux, September 11-13, 1996, Paris, France
-
September 1996
Conference
Moving picture fractal coding using a mixed approach IFS and motion
EUSIPCO 1996, European signal processing conference, 10-13 september 1996, Trieste, Italy
-
September 1996
Conference
Statistical admission control in video servers with variable bit rate streams and constant time length retrieval
EUROMICRO 1996, 22nd IEEE Euromicro Conference on Software Engineering and Advanced Applications, September 2-5, 1996, Prague, Czech Republic
-
September 1996
Conference
Enseignement à distance sur les autoroutes de l'information: pluralité des modèles
UNESCO, Septembre 96. Valladolid, Spain
-
August 1996
Conference
A scheme-based toolkit for the fast prototyping of TMN-systems
DSOM 1996, 7th IFIP/IEEE International Workshop on Distributed Systems: Operations & Management, 1996, Roma, Italy
-
August 1996
Conference
Intelligent agents a new management style
DSOM 1996, 7th IFIP/IEEE International Workshop on Distributed Systems: Operations & Management, 1996, Roma, Italy
-
July 1996
Tutorial
TIMS (a TMN-based Information Model Simulator) features and applications
EUNICE 1996, Summer School on Telecommunications Services, Lausanne, Switzerland
-
July 1996
Conference
Guidelines for the specification of managed object behaviors with TIMS
ECOOP 1996, 10th workshop : use of object-oriented technology for network design and management, July 1996, Linz, Austria | Also published as LNCS Volume 1098
-
July 1996
Tutorial
Using TIMS for the prototyping of SMFs
EUNICE 1996, Summer School on Telecommunications Services, Lausanne, Switzerland
-
July 1996
Conference
Towards an asynchronous application sharing system
1rst TSS/ASTA International Conference on Technology Parks and Transfer of Knowledge, July 1996, Tunis, Tunisia
-
June 1996
Conference
Customized network management based on applications requirements
ENW 1996, 1st IEEE International Workshop on Enterprise Networking, 27 June 1996, Dallas, USA
-
June 1996
Conference
Constant data length retrieval for video servers with variable bit rate streams
ICMCS 1996, IEEE International Conference on Multimedia Computing and Systems, June 17-23, 1996, Hiroshima, Japan
-
June 1996
Conference
Intra and inter-stream synchronisation for stored multimedia streams
ICMCS 1996, IEEE International Conference on Multimedia Computing and Systems, June 17-23, 1996, Hiroshima, Japan
Outstanding paper award
-
June 1996
Conference
Recording and replaying of an X-session: an approach for an asynchronous interaction method
ED-MEDIA/ED-TELECOM 96, Conference on Educational Multimedia and Hypermedia & World Conference on Educational Telecommunications, June 17- 22, 1996 Boston, USA
-
June 1996
Conference
Beteus : Multipoint teleconferencing over the european ATM pilot
NOC 1996, European Conference on Networks and Optical Communications, June 1996, Heidelberg, Germany
-
May 1996
Conference
Traitements vidéo et espaces virtuels de réunion
L'interface des mondes réels & virtuels, May 21-24, 1996, Montpellier, France
-
May 1996
Conference
Image reconstruction and interpolation in trinocular vision
IMAGECOM 1996, 3eme Colloque international sur les chaînes professionnelles de l'Image, 20-24 Mai 1996, Bordeaux, France
-
May 1996
Conference
Keyword spotting for video soundtrack indexing
ICASSP 1996, 21st IEEE international conference on acoustics, speech, and signal proceedings, May 7-10, 1996, Atlanta, USA
-
May 1996
Report
About contractivity constraints when coding still grey-level images using fractal transforms
Research report RR-96-31
-
April 1996
Conference
Executable TMN specifications in TIMS
NOMS 1996, IFIP/IEEE International Conference on Network Operations & Management, April 15-19, 1996, Kyoto, Japan
-
March 1996
Patent
Predetermined criterion verification method for cellular telephone network
Patent N°FR2724796
-
March 1996
Conference
Asynchronous interaction method for a remote teleteaching session
SITE 1996, 7th International Conference on the Society for Information Technology and Teacher Education, March 13-16 1996, Phoenix, USA
-
March 1996
Conference
Deterministic admission control strategies in video servers with variable bit rate streams
IDMS 1996, International Workshop on Interactive Distributed Multimedia Systems and Telecommunication Services, March 4-6, 1996, Berlin, Germany / Also available in LNCS Volume 1045
-
March 1996
Conference
A synchronization scheme for stored multimedia streams
IDMS 1996, International Workshop on Interactive Distributed Multimedia Systems and Telecommunication Services, March 4-6, 1996, Berlin, Germany / Also available in LNCS Volume 1045
-
March 1996
Conference
A software platform for distributed multimedia applications
MMSD 1996, IEEE International Workshop on Multimedia Software Development, March 25-26, 1996, Berlin, Germany
-
March 1996
Conference
A CORBA-based connection management Sheme for a multimedia platform with stream configuration support
5th open workshop on high-speed networks, March 1996, Paris, France
-
March 1996
Book
The server array: a scalable video server architecture
Book chapter in "High speed networking for multimedia applications", Effelsberg, Wolfgang, Kluwer Academic Publishers, ISBN: 0-7923-9681-2, 1996
-
February 1996
Report
Défocalisation en spatialisation vidéo à partir de trois vues de référence
Research report RR-96-019
-
February 1996
Conference
Spatialisation vidéo
CORESA 1996, 2èmes journées d'études et d'échanges COmpression et REprésentation des Signaux Audiovisuels, 15-16 février 1996, Grenoble, France
-
February 1996
Conference
Codage par IFS de séquences video
CORESA 1996, 2èmes journées d'études et d'échanges COmpression et REprésentation des Signaux Audiovisuels, 15-16 février 1996, Grenoble, France
-
January 1996
Thesis
Indexation et représentation des documents video
Thesis
-
January 1996
Thesis
Architecture de sécurité pour réseaux mobiles
Thesis
-
January 1996
Conference
An ATM WAN for CSCW applications: The BETEUS Network (Broadband Exchange for Trans-European USage)
OPNET 1996, Communications and Networks International Conference, 1996, Paris, France
-
January 1996
Conference
Generation automatique de tests pour les systemes du RGT
JDIR 1996, Journées Doctorales en Informatique et Réseaux, September 1996, Paris, France
-
January 1996
Report
Moving picture fractal coding using IFS : a review
Research report
-
January 1996
Journal
Demultiplexing on the ATM adapter : experiments with internet protocols in user space
Journal of High speed networks, special issue : Hipparch, Volume 5, n°2, 1996
-
November 1995
Conference
Control and performance monitoring of a multimedia platform over the ATM Pilot
IDC 1995, 1rst International Symposium on Intelligent Distributed Computing, November 16-17, 1995, Madeira, Portugal
-
November 1995
Conference
A semi-distributed platform for the support of CSCW applications
IDC 1995, 1rst International Distributed Conference, November 16-17, 1995, Madeira, Portugal
-
November 1995
Conference
Untraceability in mobile networks
MOBICOM 1995, ACM International Conference on Mobile Computing and Networking, 13-15 November 1995, Berkeley, USA
-
October 1995
Conference
Intelligent agents : a way to reduce the gap between applications and networks
WFCS 1995, 1st IEEE International Workshop on Factory Communications Systems, 4-6 October, 1995, Leysin, Switzerland
-
October 1995
Conference
TIMS : a TMN-based information model simulator, principles and application to a simple case study
DSOM 1995, 6th International Workshop on Distributed Systems: Operations & Management, October 16-18, 1995, Ottawa, Canada
-
October 1995
Conference
Proposition d'une solution pour le télé-tuteurat sur ATM
CNED, Octobre 1995, Poitiers, France
-
September 1995
Conference
Génération d'une simulation de réseau à partir des descriptions GDMO
GRES 1995, 1er Colloque Francophone sur la Gestion de Réseau Et de Service, September 27-29, 1995, Paris, France
-
September 1995
Conference
Behavior simulation and analysis techniques for ntegration of management action policies within TIMS
SMDS 1995, International Workshop of Services for Managing Distributed Systems, September 20-21, 1995, Karlsruhe, Germany
-
September 1995
Conference
Active contours for lipreading- combining snakes with templates
GRETSI 1995, 13eme colloque sur le traitement du signal et des images, 18-21 septembre 1995, Juan-Les-Pins, France
-
September 1995
Report
Stream synchronization in a scalable video server array
Research report
-
August 1995
Conference
Management object behavior inheritance and distribution support in TIMS
ECOOP 1995, European Conference on Object-Oriented Programming, August 7-11, 1995, Aarhus, Denmark | Also published as LNCS volume 952
-
July 1995
Conference
Zooming using iterated function systems
NATO ASI on image coding and analysis, July 8-17, 1995, Trondheim, Norway / Also published in Fractals, Vol 5, N°1, April 1997
-
July 1995
Conference
A coding scheme for stereoscopic television sequences based on motion estimation-compensation using a 3D approach
ICIP 1995, IEEE 5th International conference on Image processing and its applications, July 4-6, 1995, Edinburgh, UK
-
July 1995
Conference
Schedeling policies for protocol stacks for user application requierements
SICON 1995, ICIE International conference on information engineering, 3-7 July 1995, Singapore
-
June 1995
Conference
Improvements in IFS formulation for its use in still image codings
NSIP 1995, IEEE Workshop on Nonlinear Signal and Image Processing, June 20-22, 1995, Halkidiki, Greece
-
June 1995
Conference
Performance management for a real full scale ATM network
BRAVE Workshop "ATM Hot Topics on Traffic and Performance", June 1995, Milano, Italy
-
May 1995
Conference
An N-best strategy, dynamic grammars and selectively trained neural networks for real-time recognition of continuously spelled names over the telephone
ICASSP 1995, IEEE International Conference on Acoustics, Speech, and Signal Processing, May 9-12, 1995, Detroit, Michigan, USA
-
May 1995
Journal
Robust and secure password and key change method
Special issue of the Journal of Computer Security, May 1995
-
April 1995
Conference
Edge detection on ultrasound cardiac images for assisting medical diagnosis
1st international symposium about scientific imagery and image processing, 4-6 april, 1995, Cannes, France
-
April 1995
Conference
WAVE : a new multicast routing algorithm for static and dynamic multicast groups
NOSSDAV 1995, 5th International Workshop on Networking and Operating System Support for Digital Audio and Video, April 18-22, 1995, Durham, USA | Also available as LNCS Volume 1018
-
March 1995
Conference
Video representation tools using a unified object and perspective-based approach
Storage and Retrieval for Image and Video Databases III, March 1995, San Jose, USA / SPIE Proceedings, Volume 2420
-
February 1995
Journal
KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking, Vol. 3, N°1, February 1995
-
January 1995
Conference
Analysis of the performance of a distributed simulator
MASCOTS 1995, IEEE 3rd International workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, 18-20 January, 1995, Durham, North Carolina, USA
-
January 1995
Conference
Compression fractale
CORESA 1995, 1ères journées d'études et d'échanges COmpréssion et REprésentation des Signaux Audiovisuels, 12-13 janvier 1995, Rennes, France
-
January 1995
Book
Expérience de télé-enseignement dans le cadre du projet BETEL
Book chapter in "L'Internet professionnel : Témoignages, expériences, conseils pratiques, de la communauté enseignement & recherche", CNRS Editions, LMB monographie, ISSN 1264-1596, Volume 1, ISBN: 2-271-05256-4
-
January 1995
Thesis
Formalisation et simulation de comportements pour le test d'objets gérés
Thesis
-
January 1995
Conference
A practical method for the synchronization of life continuous media streams
OPNET 1995, January 1995, Paris, France
-
January 1995
Conference
A scalable video server : architecture, design, and implentation
Real time systems workshop, January 1995, Paris, France
-
December 1994
Conference
A method providing identity privacy to mobile users during authentication
WMCSA 1994, 1st IEEE Workshop on Mobile Computing Systems and Applications, December 8-9, 1994, Santa Cruz, USA
-
November 1994
Report
Edge detection on ultrasound cardiac images using mathematical morphology and active contours
Research report RR-94-017
-
November 1994
Conference
Application access control at network level
CCS 1994, 2nd ACM Conference on Computer and Communications Security, November 2-4, 1994, Fairfax, USA
-
October 1994
Report
A video server architecture based on server arrays
Research report
-
October 1994
Report
Authentication of mobile users
Research report RR-94-013
-
October 1994
Report
Untraceability in mobile networks
Research report RR-94-012
-
October 1994
Conference
Heterogeneous network management tutorial
ICIN 1994, 3rd International Conference on Intelligence in Networks, October 1994, Bordeaux, France
-
September 1994
Conference
Strong authentication in intelligent networks
ICUPC 1994, 3rd IEEE Annual International Conference on Universal Personal Communications, 27 September-1 October, 1994, San Diego, USA
-
September 1994
Conference
Multimedia teletutoring over a trans-european ATM network
IWACA 1994, 2nd International Workshop on Advanced Teleservices and High-Speed Communication Architectures, September 26-28, 1994, Heidelberg, Germany / Also published in "LNCS" Volume 868/1994
-
September 1994
Conference
An architecture for a network management simulator
4th Open Workshop on High Speed Networks, September 1994, Brest, France
-
August 1994
Report
Méthode de calcul d'Alias pour utilisateur mobile
Research report RR-94-010
-
July 1994
Conference
A terminal-based approach to multimedia service provision
ICCS 1994, 1st International workshop on community networking, July 13-14, 1994, San Francisco, USA
-
June 1994
Report
Teletutoring over a trans-European broadband network : BETEL (Broadband Exchange over Trans-European Links)
Research report RR-94-007
-
April 1994
Conference
Architectures of multimedia communication subsystems
IFIP C-23, Information Networks and Data Communication V, 18-21 April 1994, Funchal, Portugal
-
April 1994
Report
A terminal-based approach for distributed multimedia applications
Research report RR-94-008
-
March 1994
Conference
Teletutoring over the BETEL network
SPEEDUP 1994, 15th Speedup Workshop on High-Performance Computing, March 17-18, 1994, Cadro-Lugano, Italy / Also published in Speedup Journal, Volume 8, Number 1
-
March 1994
Journal
Authentication of mobile users
IEEE Network Magazine, Special issue on Mobile Communications, Volume 8, N°2, March-April 1994
-
January 1994
Conference
An authentication protocol for mobile users
IEE Colloquium on Security and Cryptography Applications to Radio Systems, June 1994, London, UK
-
September 1993
Poster / Demo
2D and 3D motion estimation from binocular sequences by cooperation between motion and disparity in 3DTV context
IMDSP 1993, 8th workshop on Image and Multidimensional Signal Processing, September 8-10, 1993, Cannes, France
-
September 1993
Report
Improved hidden Markov models for speech recognition through neural network learning
Research report RR-94-016
-
July 1993
Journal
A timer-based connection management protocol with synchronized clocks and its verification
Computer networks and ISDN systems, Volume 25, N°12, July 1993
-
June 1993
Conference
Improved hidden Markov models for speech recognition through neural network learning
From statistics to neural networks: theory and pattern recognition applications, June 21-July 2, 1993, Les Arcs, France
-
June 1993
Journal
Systematic design of a family of attack-resistant authentication protocols
IEEE Journal on Selected Areas in Communications, Volume 11 N°5, June 1993
-
May 1993
Journal
Performance evaluation of forward error correction in an ATM environment
IEEE Journal on Selected Areas in Communications, Volume 11, N°4, May 1993
-
May 1993
Conference
Authentication method with impersonal token cards
RISP 1993, IEEE Symposium on Research in Security and Privacy, May 24-26, 1993, Oakland, USA
-
February 1993
Journal
Performance of the IEEE 802.2 type-2 logical link protocol with selective retransmission
IEEE Transactions on Communications, Volume 41 N°2, February 1993
-
October 1992
Report
Authentication method with impersonal token cards
Research report RR-92-002
-
August 1992
Report
Protocoles d'authentification dans le réseau intelligent : contribution au premier rapport semestriel Ernestine II
Research report RR-92-000
-
August 1992
Conference
Performance evaluation of forward error correction in ATM networks
SIGCOMM 1992, Communications architectures & protocols conference, August 17-20, 1992, Baltimore, USA
-
January 1992
Conference
KryptoKnight authentication and Key distribution system
ESORICS 1992, 2nd European Symposium on Research in Computer Security, November 23-25, 1992, Toulouse, France / Also published as LNCS Volume 648