Skip to Main content Skip to Navigation

hal-00705192v1  Conference papers
Gaël VaroquauxAlexandre GramfortBertrand Thirion. Small-sample brain mapping: sparse recovery on spatially correlated designs with randomization and clustering
International Conference on Machine Learning, Andrew McCallum, Jun 2012, Edimbourg, United Kingdom
hal-02394629v1  Conference papers
Guillaume CelosiaMathieu Cunche. Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism
MobiQuitous 2019 - 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Dec 2019, Houston, United States. pp.1-10, ⟨10.1145/3360774.3360777⟩
hal-02154148v1  Poster communications
Guillaume CelosiaMathieu Cunche. DEMO: Himiko: A human interface for monitoring and inferring knowledge on Bluetooth-Low-Energy objects
WiSec 2019 - 12th Conference on Security and Privacy in Wireless and Mobile Networks, May 2019, Miami, United States. ACM Press, pp.292-293, ⟨10.1145/3317549.3326297⟩
hal-02651398v1  Conference papers
Guillaume CelosiaMathieu Cunche. Valkyrie: A Generic Framework for Verifying Privacy Provisions in Wireless Networks
WiSec 2020 - 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jul 2020, Linz, Austria. pp.278-283, ⟨10.1145/3395351.3399340⟩
hal-03411842v1  Conference papers
Clément Lagneau-DonzelleMathieu Cunche. On the process of fixing privacy issues in Wi-Fi enabled devices
WSA 2021 - 25th International ITG Workshop on Smart Antennas, Nov 2021, Sophia-Antipolis, France. pp.1-6
hal-02651359v1  Poster communications
Guillaume CelosiaMathieu Cunche. DEMO: Venom: a Visual and Experimental Bluetooth Low Energy Tracking System
WiSec 2020 - 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jul 2020, Linz, Austria. ⟨10.1145/3395351.3401696⟩
hal-01183945v1  Conference papers
Michael L. GreenAlan KrinikCarrie MortensenGerardo RubinoRandall J. Swift. Transient Probability Functions: A Sample Path Approach
Discrete Random Walks, DRW'03, 2003, Paris, France. pp.127-136
inria-00337069v1  Conference papers
Martine Cadot. A Randomization Test for extracting Robust Association Rules
3rd world conference on Computational Statistics & Data Analysis - CSDA 2005, Oct 2005, Limassol, Cyprus
hal-01223022v1  Conference papers
Marc BaboulinJack DongarraAdrien RémyStanimire TomovIchitaro Yamazaki. Dense Symmetric Indefinite Factorization on GPU Accelerated Architectures
International Conference on Parallel Processing and Applied Mathematics, Sep 2015, Krakow, Poland. pp.86-95, ⟨10.1007/978-3-319-32149-3_9⟩
hal-02866753v1  Journal articles
Sarani BhattacharyaClémentine MauriceShivam BhasinDebdeep Mukhopadhyay. Branch Prediction Attack on Blinded Scalar Multiplication
IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2020, 69 (5), pp.633-648. ⟨10.1109/TC.2019.2958611⟩
hal-01237206v1  Conference papers
Youen PericaultCatherine PothierNicolas MegerChristophe RigottiFlavien Vernier et al.  A swap randomization approach for mining motion field time series over the Argentiere glacier
2015 8th International Workshop on the Analysis of Multitemporal Remote Sensing Images (Multi-Temp), Jul 2015, Annecy, France. pp.1-4, ⟨10.1109/Multi-Temp.2015.7245757⟩
hal-01426565v1  Journal articles
Marc FyrbiakSimon RokickiNicolai BissantzRussell TessierChristof Paar. Hybrid Obfuscation to Protect against Disclosure Attacks on Embedded Microprocessors
IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2017
hal-00685160v1  Journal articles
Arnaud MalapertHadrien CambazardChristelle GuéretNarendra JussienAndré Langevin et al.  An Optimal Constraint Programming Approach to the Open-Shop Problem
INFORMS Journal on Computing, Institute for Operations Research and the Management Sciences (INFORMS), 2012, - (24), pp.228 - 244. ⟨10.1287/ijoc.1100.0446⟩
hal-03336444v1  Conference papers
Meng LingJian ChenTorsten MöllerPetra IsenbergTobias Isenberg et al.  Document Domain Randomization for Deep Learning Document Layout Extraction
Proceedings of the 16th International Conference on Document Analysis and Recognition (ICDAR, September 5--10, Lausanne, Switzerland), Sep 2021, Lausanne, Switzerland. pp.497-513, ⟨10.1007/978-3-030-86549-8_32⟩
hal-01978181v1  Conference papers
Ronan LashermesHélène Le BouderGaël Thomas. Hardware-Assisted Program Execution Integrity: HAPEI
NordSec 2018 : 23rd Nordic Conference on Secure IT Systems, Nov 2018, Oslo, Norway. ⟨10.1007/978-3-030-03638-6_25⟩
hal-00272514v1  Journal articles
Khalil El Khamlichi DrissiP-C-K. LukBiao WangJulien Fontaine. Effects of symmetric distribution laws on spectral power density in randomized PWM.
IEEE Power Electronics Letters, Institute of Electrical and Electronics Engineers, 2003, 1 (2), pp.41-44. ⟨10.1109/LPEL.2003.820825⟩
tel-01921596v1  Theses
Célestin Matte. Wi-Fi tracking : Fingerprinting attacks and counter-measures
Networking and Internet Architecture [cs.NI]. Université de Lyon, 2017. English. ⟨NNT : 2017LYSEI114⟩
hal-02359914v1  Conference papers
Guillaume CelosiaMathieu Cunche. Fingerprinting Bluetooth-Low-Energy Devices Based on the Generic Attribute Profile
IoT S&P 2019 - 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, Nov 2019, London, United Kingdom. pp.24-31, ⟨10.1145/3338507.3358617⟩
hal-03449827v1  Conference papers
Vincent RaulinPierre-François GimenezYufei HanValérie Viet Triem TongLéopold Ouairy. GUI-Mimic, a cross-platform recorder and fuzzer of Graphical User Interface
GreHack 2021 - 9th International Symposium on Research in Grey-Hat Hacking, Nov 2021, Grenoble, France. pp.1-7
inria-00492231v1  Reports
Robin Genuer. Risk bounds for purely uniformly random forests
[Research Report] RR-7318, INRIA. 2010, pp.19