Skip to Main content Skip to Navigation

hal-02651398v1  Conference papers
Guillaume CelosiaMathieu Cunche. Valkyrie: A Generic Framework for Verifying Privacy Provisions in Wireless Networks
WiSec 2020 - 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jul 2020, Linz, Austria. ⟨10.1145/3395351.3399340⟩
hal-02651359v1  Poster communications
Guillaume CelosiaMathieu Cunche. DEMO: Venom: a Visual and Experimental Bluetooth Low Energy Tracking System
WiSec 2020 - 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jul 2020, Linz, Austria. ⟨10.1145/3395351.3401696⟩
tel-00169842v1  Theses
Hervé Rivano. Algorithmique et télécommunications : Coloration et multiflot approchés et applications aux réseaux d'infrastructure
Réseaux et télécommunications [cs.NI]. Université Nice Sophia Antipolis, 2003. Français
hal-02394629v1  Conference papers
Guillaume CelosiaMathieu Cunche. Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism
MobiQuitous 2019 - 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Dec 2019, Houston, United States. pp.1-10, ⟨10.1145/3360774.3360777⟩
hal-02154148v1  Poster communications
Guillaume CelosiaMathieu Cunche. DEMO: Himiko: A human interface for monitoring and inferring knowledge on Bluetooth-Low-Energy objects
WiSec 2019 - 12th Conference on Security and Privacy in Wireless and Mobile Networks, May 2019, Miami, United States. ACM Press, pp.292-293, ⟨10.1145/3317549.3326297⟩
hal-02127273v1  Conference papers
Alexander EiselmayerChat WacharamanothamMichel Beaudouin-LafonWendy E. Mackay. Touchstone2: An Interactive Environment for Exploring Trade-offs in HCI Experiment Design
CHI 2019 - The ACM CHI Conference on Human Factors in Computing Systems, ACM, May 2019, Glasgow, United Kingdom. pp.1--11
hal-00705192v1  Conference papers
Gaël VaroquauxAlexandre GramfortBertrand Thirion. Small-sample brain mapping: sparse recovery on spatially correlated designs with randomization and clustering
International Conference on Machine Learning, Andrew McCallum, Jun 2012, Edimbourg, United Kingdom
hal-02866753v1  Journal articles
Sarani BhattacharyaClémentine MauriceShivam BhasinDebdeep Mukhopadhyay. Branch Prediction Attack on Blinded Scalar Multiplication
IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2020, 69 (5), pp.633-648. ⟨10.1109/TC.2019.2958611⟩
hal-02359914v1  Conference papers
Guillaume CelosiaMathieu Cunche. Fingerprinting Bluetooth-Low-Energy Devices Based on the Generic Attribute Profile
IoT S&P 2019 - 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, Nov 2019, London, United Kingdom. pp.24-31, ⟨10.1145/3338507.3358617⟩
hal-00908496v1  Journal articles
Marc BaboulinJack DongarraJulien HerrmannStanimire Tomov. Accelerating linear system solutions using randomization technique
ACM Transactions on Mathematical Software, Association for Computing Machinery, 2013, 39 (2), ⟨10.1145/2427023.2427025⟩
hal-01223022v1  Conference papers
Marc BaboulinJack DongarraAdrien RémyStanimire TomovIchitaro Yamazaki. Dense Symmetric Indefinite Factorization on GPU Accelerated Architectures
International Conference on Parallel Processing and Applied Mathematics, Sep 2015, Krakow, Poland. pp.86-95, ⟨10.1007/978-3-319-32149-3_9⟩
hal-01426565v1  Journal articles
Marc FyrbiakSimon RokickiNicolai BissantzRussell TessierChristof Paar. Hybrid Obfuscation to Protect against Disclosure Attacks on Embedded Microprocessors
IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2017
hal-01183945v1  Conference papers
Michael L. GreenAlan KrinikCarrie MortensenGerardo RubinoRandall J. Swift. Transient Probability Functions: A Sample Path Approach
Discrete Random Walks, DRW'03, 2003, Paris, France. pp.127-136
tel-01921596v1  Theses
Célestin Matte. Wi-Fi tracking : Fingerprinting attacks and counter-measures
Networking and Internet Architecture [cs.NI]. Université de Lyon, 2017. English. ⟨NNT : 2017LYSEI114⟩
hal-00773436v1  Conference papers
Alain LeluMartine Cadot. A Proposition for Fixing the Dimensionality of a Laplacian Low-rank Approximation of any Binary Data-matrix
The Fifth International Conference on Information, Process, and Knowledge Management - eKNOW 2013, Feb 2013, Nice, France. pp.70-73
hal-01978181v1  Conference papers
Ronan LashermesHélène Le BouderGaël Thomas. Hardware-Assisted Program Execution Integrity: HAPEI
NordSec 2018 : 23rd Nordic Conference on Secure IT Systems, Nov 2018, Oslo, Norway. ⟨10.1007/978-3-030-03638-6_25⟩
hal-00272514v1  Journal articles
Khalil El Khamlichi DrissiP-C-K. LukBiao WangJulien Fontaine. Effects of symmetric distribution laws on spectral power density in randomized PWM.
IEEE Power Electronics Letters, Institute of Electrical and Electronics Engineers, 2003, 1 (2), pp.41-44. ⟨10.1109/LPEL.2003.820825⟩
hal-00685160v1  Journal articles
Arnaud MalapertHadrien CambazardChristelle GuéretNarendra JussienAndré Langevin et al.  An Optimal Constraint Programming Approach to the Open-Shop Problem
INFORMS Journal on Computing, Institute for Operations Research and the Management Sciences (INFORMS), 2012, - (24), pp.228 - 244. ⟨10.1287/ijoc.1100.0446⟩
inria-00492231v1  Reports
Robin Genuer. Risk bounds for purely uniformly random forests
[Research Report] RR-7318, INRIA. 2010, pp.19
inria-00337069v1  Conference papers
Martine Cadot. A Randomization Test for extracting Robust Association Rules
3rd world conference on Computational Statistics & Data Analysis - CSDA 2005, Oct 2005, Limassol, Cyprus