Skip to Main content Skip to Navigation
New interface

hal-03867187v1  Conference papers
Benjamin BinderMihail AsavoaeFlorian BrandnerBelgacem Ben HediaMathieu Jan. The Role of Causality in a Formal Definition of Timing Anomalies
2022 IEEE 28th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), Aug 2022, Taipei, France. pp.91-102, ⟨10.1109/RTCSA55878.2022.00016⟩
hal-03860813v1  Book sections
Mingming QiuElie NajmRémi SharrockBruno Traverson. PBRE: A Rule Extraction Method from Trained Neural Networks Designed for Smart Home Services
Christine Strauss; Alfredo Cuzzocrea; Gabriele Kotsis; A Min Tjoa; Ismail Khalil. Database and Expert Systems Applications. 33rd International Conference, DEXA 2022, Vienna, Austria, August 22–24, 2022, Proceedings, Part II, 13427, Springer International Publishing, pp.158-173, 2022, Lecture Notes in Computer Science, 978-3-031-12425-9. ⟨10.1007/978-3-031-12426-6_13⟩
hal-03814048v1  Conference papers
Kanvaly FadigaAda DiaconescuJean-Louis DessallesEtienne Houze. To do or not to do: finding causal relations in smart homes
2021 IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS), Sep 2021, Washington, France. pp.110-119, ⟨10.1109/ACSOS52086.2021.00030⟩
hal-03749355v1  Conference papers
Nan LiEric GoubaultLaurent PautetS. Putot. Autonomous racecar control in head-to-head competition using Mixed-Integer Quadratic Programming
Opportunities and challenges with autonomous racing, 2021 ICRA workshop, May 2021, Online, United States
hal-03801012v1  Conference papers
Hassan ChaitouJean LeneutreLaurent Pautet. Threats to Adversarial Training for IDSs and Mitigation
19th International Conference on Security and Cryptography, Jul 2022, Lisbon, France. pp.226-236, ⟨10.5220/0011277600003283⟩
hal-03779036v1  Book sections
Wojciech JamrogaDamian KurpiewskiVadim Malvone. Natural Strategic Abilities in Voting Protocols
Socio-Technical Aspects in Security and Trust, 12812, Springer International Publishing, pp.45-62, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-79318-0_3⟩
hal-03779034v1  Conference papers
Francesco BelardinelliBorja G. LeónVadim Malvone. Enabling Markovian Representations under Imperfect Information
14th International Conference on Agents and Artificial Intelligence (ICAART 2022), Feb 2022, Online Streaming, France. pp.450-457, ⟨10.5220/0010882200003116⟩
hal-03779030v1  Journal articles
Francesco BelardinelliAlessio LomuscioVadim MalvoneEmily Yu. Approximating Perfect Recall when Model Checking Strategic Abilities: Theory and Applications
Journal of Artificial Intelligence Research, Association for the Advancement of Artificial Intelligence, 2022, 73, pp.897-932. ⟨10.1613/jair.1.12539⟩
hal-03775550v1  Conference papers
Hassan ChaitouThomas RobertJean LeneutreLaurent Pautet. Assessing adversarial training effect on IDSs and GANs
2021 IEEE International Conference on Cyber Security and Resilience (CSR) Workshop on Resilient Artificial Intelligence, Jul 2021, Rhodes, France. pp.543-550, ⟨10.1109/CSR51186.2021.9527949⟩
hal-03758375v1  Conference papers
Maxime AyraultEtienne BordeUlrich KühneJean Leneutre. Moving Target Defense Strategy in Critical Embedded Systems: A Game-theoretic Approach
2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2021, Perth, Australia. pp.27-36, ⟨10.1109/PRDC53464.2021.00014⟩
hal-03735961v1  Conference papers
Daniele SerafiniStefano Zacchiroli. Efficient Prior Publication Identification for Open Source Code
18th International Conference on Open Source Systems (OSS 2022), Sep 2022, Madrid, Spain
hal-03723556v1  Conference papers
Zeinab Abou KhalilStefano Zacchiroli. Software Artifact Mining in Software Engineering Conferences: A Meta-Analysis
ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2022), Sep 2022, Helsinki, Finland. ⟨10.1145/3544902.3546239⟩
tel-03719946v1  Theses
Sameh Khalfaoui. Security bootstrapping for Internet of Things
Cryptography and Security [cs.CR]. Institut Polytechnique de Paris, 2022. English. ⟨NNT : 2022IPPAT023⟩
inserm-03719607v1  Journal articles
Martin KunevPetr KuznetsovDenis Sheynikhovich. Agreement in Spiking Neural Networks
Journal of Computational Biology, Mary Ann Liebert, 2022, 29 (4), pp.358 - 369. ⟨10.1089/cmb.2021.0365⟩
hal-03702493v1  Conference papers
Felipe Lisboa MalaquiasMihail AsavoaeFlorian Brandner. A Coq Framework for More Trustworthy DRAM Controllers
RTNS 2022: The 30th International Conference on Real-Time Networks and Systems, Jun 2022, Paris France, France. pp.140-150, ⟨10.1145/3534879.3534907⟩
hal-03623109v1  Conference papers
Zeinab Abou KhalilStefano Zacchiroli. The General Index of Software Engineering Papers
MSR 2022 - The 2022 Mining Software Repositories Conference, May 2022, Pittsburgh, Pennsylvania, United States. ⟨10.1145/3524842.3528494⟩
hal-03629047v1  Conference papers
Romain GratiaThomas RobertLaurent Pautet. Generalized mixed-criticality scheduling based on RUN
23rd International Conference on Real-Time Networks and Systems (RTNS '15), Nov 2015, Lille France, France. pp.267-276, ⟨10.1145/2834848.2834873⟩
hal-03628457v1  Proceedings
Joaquin Garcia‐alfaroJean LeneutreNora CuppensReda Yaich. Risks and security of internet and systems
CRISIS 2020: 15th International Conference on Risks and Security of Internet and Systems, Nov 2020, Paris, France. 12528, Springer, pp.xi-378, 2021, Lecture Notes in Computer Science (LNCS), 978-3-030-68886-8. ⟨10.1007/978-3-030-68887-5⟩
hal-03624198v1  Conference papers
Stefano Zacchiroli. A Large-scale Dataset of (Open Source) License Text Variants
The 2022 Mining Software Repositories Conference, May 2022, Pittsburgh, Pennsylvania, United States. ⟨10.1145/3524842.3528491⟩
hal-03622621v1  Conference papers
Davide RossiStefano Zacchiroli. Geographic Diversity in Public Code Contributions
The 2022 Mining Software Repositories Conference, May 2022, Pittsburgh, Pennsylvania, United States. ⟨10.1145/3524842.3528471⟩
hal-02910407v1  Conference papers
Nathanaël DenisPierre ChaffardonDenis ConanMaryline LaurentSophie Chabridon et al.  Privacy-preserving content-based publish/subscribe with encrypted matching and data splitting
SECRYPT 2020: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.405-414, ⟨10.5220/0009833204050414⟩
tel-03583890v1  Theses
Antoine Durand. Consensus Byzantin et blockchain : Modèles unifiés et nouveaux protocoles
Data Structures and Algorithms [cs.DS]. Institut Polytechnique de Paris, 2021. English. ⟨NNT : 2021IPPAT025⟩
hal-03571837v1  Conference papers
Davide RossiStefano Zacchiroli. Worldwide Gender Differences in Public Code Contributions
44th International Conference on Software Engineering (ICSE 2022) - Software Engineering in Society (SEIS) Track, May 2022, Pittsburgh, PA, United States. ⟨10.1145/3510458.3513011⟩
hal-03569465v1  Journal articles
Sihem MesnagerBimal MandalMounira Msahli. Survey on recent trends towards generalized differential and boomerang uniformities
Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , Springer, 2021, ⟨10.1007/s12095-021-00551-6⟩
hal-03569438v1  Book sections
Laetitia DebesseSihem MesnagerMounira Msahli. POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack
Applied Cryptography and Network Security Workshops, 12809, Springer International Publishing, pp.485-489, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-81645-2_27⟩
hal-03569422v1  Conference papers
Mounira MsahliBadr Eddine BoukariAkshaya Ravi. Machine Learning Detection for SMiShing Frauds
2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), Jan 2021, Las Vegas, France. pp.1-2, ⟨10.1109/CCNC49032.2021.9369640⟩
hal-03560232v1  Conference papers
Petr KuznetsovVitaly AksenovVincent GramoliSrivatsan Ravi. Optimal Concurrency for List-Based Sets
Parallel Computing Technologies - 16th International Conference, Sep 2021, Kaliningrad, Russia
hal-03559899v1  Conference papers
Florian BrandnerBenjamin BinderMihail AsavoaeBelgacem Ben HediaMathieu Jan. Is This Still Normal? Putting Definitions of Timing Anomalies to the Test
2021 IEEE 27th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), Aug 2021, Houston, France. pp.139-148, ⟨10.1109/RTCSA52859.2021.00024⟩
hal-03559711v1  Conference papers
Dongmin SonSawsan Al ZahrGerard Memmi. Performance Analysis of an Energy Trading Platform Using the Ethereum Blockchain
2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), May 2021, Sydney, France. pp.1-3, ⟨10.1109/ICBC51069.2021.9461115⟩
hal-03559698v1  Journal articles
Han QiuTian DongTianwei ZhangJialiang LuGerard Memmi et al.  Adversarial Attacks Against Network Intrusion Detection in IoT Systems
IEEE Internet of Things Journal, IEEE, 2021, 8 (13), pp.10327-10335. ⟨10.1109/JIOT.2020.3048038⟩
hal-03559687v1  Conference papers
Xiao WuHan QiuShuyi ZhangGerard MemmiKeke Gai et al.  ChainIDE 2.0: Facilitating Smart Contract Development for Consortium Blockchain
IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Jul 2020, Toronto, France. pp.388-393, ⟨10.1109/INFOCOMWKSHPS50562.2020.9163051⟩
hal-03559661v1  Book sections
Qinkai ZhengHan QiuTianwei ZhangGerard MemmiMeikang Qiu et al.  Resisting Adversarial Examples via Wavelet Extension and Denoising
Smart Computing and Communication, 12608, Springer International Publishing, pp.204-214, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-74717-6_22⟩
hal-03559623v1  Conference papers
Petr KuznetsovAndrei TonkikhYan Zhang. Revisiting Optimal Resilience of Fast Byzantine Consensus
PODC '21: ACM Symposium on Principles of Distributed Computing, Jul 2021, Virtual Event Italy, France. pp.343-353, ⟨10.1145/3465084.3467924⟩
hal-03559549v1  Journal articles
Petr KuznetsovVitaly Aksenov. Review of the Third Summer School on the Practice and Theory of Distributed Computing SPTDC 2020
ACM SIGACT News, Association for Computing Machinery (ACM), 2020, 51 (4), pp.82-84. ⟨10.1145/3444815.3444828⟩