Skip to Main content Skip to Navigation

Search by documents

hal-02348444v1  Conference papers
Jean-Philippe MonteuuisJonathan PetitJun ZhangHouda LabiodStefano Mafrica et al.  “My autonomous car is an elephant”: A Machine Learning based Detector for Implausible Dimension
2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), Oct 2018, Shanghai, France. pp.1-8, ⟨10.1109/SSIC.2018.8556651⟩
hal-02147191v1  Conference papers
Maryline LaurentJean LeneutreSophie ChabridonImane Laaouane. Authenticated and Privacy-Preserving Consent Management in the Internet of Things
ANT 2019: 10th International Conference on Ambient Systems, Networks and Technologies (ANT), Apr 2019, Leuven, Belgium. pp.256-263, ⟨10.1016/j.procs.2019.04.037⟩
hal-03540247v1  Conference papers
Xuan Thanh DoDuong Hieu PhanMoti yung. A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes
ACNS 2020 - International Conference on Applied Cryptography and Network Security, Nov 2020, Rome, Italy. pp.145-164, ⟨10.1007/978-3-030-57878-7_8⟩
hal-03354939v1  Journal articles
Olivier Hudry. Maximizing the Number of Scheduled Lightpath Demands in Optical Networks by Conflict Graphs
International Journal of Mathematics, Statistics and Operations Research, Academic Research Foundations, 2021
hal-03108570v1  Conference papers
Thomas Pellissier TanonGerhard WeikumFabian Suchanek. YAGO 4: A Reason-able Knowledge Base
European Semantic Web Conference, May 2020, virtual, Greece. pp.583--596, ⟨10.1007/978-3-030-49461-2_34⟩
hal-03048680v1  Journal articles
K. H. KimSihem Mesnager. Solving $x^{2^k+1}+x+a=0$ in $\mathbb{F}_{2^n}$ with $\gcd(n,k)=1$
Finite Fields and Their Applications, Elsevier, 2020
hal-03023190v1  Journal articles
Sihem MesnagerF. Zhang. Further study on the maximum number of bent components of vectorial functions
Designs, Codes and Cryptography, Springer Verlag, 2019
hal-03023262v1  Journal articles
Sihem MesnagerL. Qu. On two-to-one mappings over finite fields
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2019
hal-02910407v1  Conference papers
Nathanaël DenisPierre ChaffardonDenis ConanMaryline LaurentSophie Chabridon et al.  Privacy-preserving content-based publish/subscribe with encrypted matching and data splitting
SECRYPT 2020: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.405-414, ⟨10.5220/0009833204050414⟩
hal-03400151v3  Conference papers
Quang-Duy NguyenPatrick BellotPierre-Yves Petton. An OPC UA PubSub Implementation Approach for Memory-Constrained Sensor Devices
2022 IEEE 31st International Symposium on Industrial Electronics (ISIE), IEEE Industrial Electronics Society (IES), Jun 2022, Anchorage, Alaska, United States
hal-03089815v3  Reports
Gérard Memmi. Description de la méthode SCRUM à travers deux expériences en entreprise
[Rapport de recherche] LTCI - Laboratoire Traitement et Communication de l'Information [Paris]. 2020
hal-03628457v1  Directions of work or proceedings
Joaquin Garcia‐alfaroJean LeneutreNora CuppensReda Yaich. Risks and security of internet and systems
CRISIS 2020: 15th International Conference on Risks and Security of Internet and Systems, Nov 2020, Paris, France. 12528, Springer, pp.xi-378, 2021, Lecture Notes in Computer Science (LNCS), 978-3-030-68886-8. ⟨10.1007/978-3-030-68887-5⟩
hal-03329714v1  Conference papers
Halla H. OlafsdottirYves GuiardOlivier RioulSimon T. Perrault. A new test of throughput invariance in Fitts' law: Role of the intercept and of Jensen's inequality
26th BCS Conference on Human Computer Interaction (HCI 2012), Sep 2012, Birmingham, United Kingdom
hal-03048656v1  Journal articles
Sihem MesnagerA. Sinak. Several classes of minimal linear codes with few weights from weakly regular plateaued function
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2020
hal-03189496v1  Conference papers
Olivier Hudry. Resolution of a Routing and Wavelength Assignment Problem by Independent Sets in Conflict Graphs
7th International Conference on Control, Decision and Information Technologies (CoDIT’20), 2020, Prague, Czech Republic
hal-02916822v1  Journal articles
Mohan Krishna NutalapatiAmrit Singh BediKetan RajawatMarceau Coupechoux. Online Trajectory Optimization Using Inexact Gradient Feedback for Time-Varying Environments
IEEE Transactions on Signal Processing, Institute of Electrical and Electronics Engineers, 2020, 68, pp.4824-4838. ⟨10.1109/TSP.2020.3015276⟩
hal-03590199v1  Conference papers
Wen-Jie TsengElise BonnailMark McgillMohamed KhamisEric Lecolinet et al.  The Dark Side of Perceptual Manipulations in Virtual Reality
CHI Conference on Human Factors in Computing Systems (CHI '22), Apr 2022, New Orleans, LA, United States. ⟨10.1145/3491102.3517728⟩
hal-03035612v1  Conference papers
Sihem Mesnager. On good polynomials over finite fields for optimal locally recoverable codes
International Conference on Codes, Cryptology and Information Security (C2SI 2019), 2019, Rabat, Morocco
hal-03035649v1  Conference papers
Sihem MesnagerA. Sinak. Strongly regular graphs from weakly regular plateaued functions
Ninth International Workshop on Signal Design and its Applications in Communications (IWSDA 2019), 2019, Dongguan, China
hal-03295346v1  Conference papers
Mohammad El-HajjAhmad FadlallahMaroun ChamounAhmed Serhrouchni. Ethereum for Secure Authentication of IoT using Pre-Shared Keys (PSKs)
2019 International Conference on Wireless Networks and Mobile Communications (WINCOM), Oct 2019, Fez, Morocco. pp.1-7, ⟨10.1109/WINCOM47513.2019.8942487⟩