Christophe Guyeux

According to our database1, Christophe Guyeux authored at least 154 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
A Hardware and Secure Pseudorandom Generator for Constrained Devices.
IEEE Trans. Industrial Informatics, 2018

CIPRNG: A VLSI Family of Chaotic Iterations Post-Processings for $\mathbb {F}_{2}$ -Linear Pseudorandom Number Generation Based on Zynq MPSoC.
IEEE Trans. on Circuits and Systems, 2018

Survey on hardware implementation of random number generators on FPGA: Theory and experimental analyses.
Computer Science Review, 2018

Online shortest paths with confidence intervals for routing in a time varying random network.
CoRR, 2018

Average performance analysis of the stochastic gradient method for online PCA.
CoRR, 2018

A clustering package for nucleotide sequences using Laplacian Eigenmaps and Gaussian Mixture Model.
Comp. in Bio. and Med., 2018

Comparison of metaheuristics to measure gene effects on phylogenetic supports and topologies.
BMC Bioinformatics, 2018

l1-Penalised Ordinal Polytomous Regression Estimators with Application to Gene Expression Studies.
Proceedings of the 18th International Workshop on Algorithms in Bioinformatics, 2018

Wireless multimedia sensor network deployment for disparity map calculation.
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018

On the collision property of chaotic iterations based post-treatments over cryptographic pseudorandom number generators.
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018

Novel order preserving encryption scheme for wireless sensor networks.
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018

Collaborative body sensor networks: Taxonomy and open challenges.
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018

Efficient cluster-based routing algorithm for body sensor networks.
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018

Online Shortest Paths With Confidence Intervals for Routing in a Time Varying Random Network.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

2017
Efficient high degree polynomial root finding using GPU.
J. Comput. Science, 2017

Systematic investigations of gene effects on both topologies and supports: An Echinococcus illustration.
J. Bioinformatics and Computational Biology, 2017

Random Walk in a N-Cube Without Hamiltonian Cycle to Chaotic Pseudorandom Number Generation: Theoretical and Practical Considerations.
I. J. Bifurcation and Chaos, 2017

An improved watermarking scheme for Internet applications.
CoRR, 2017

On the topology effects in wireless sensor networks based prognostics and health management.
CoRR, 2017

Introducing the truly chaotic finite state machines and their applications in security field.
CoRR, 2017

Summary of Topological Study of Chaotic CBC Mode of Operation.
CoRR, 2017

Diffusion and confusion of chaotic iteration based hash functions.
CoRR, 2017

Efficient and accurate monitoring of the depth information in a Wireless Multimedia Sensor Network based surveillance.
CoRR, 2017

Design and evaluation of chaotic iterations based keyed hash function.
CoRR, 2017

A Security Framework for Wireless Sensor Networks: Theory and Practice.
CoRR, 2017

Finding optimal finite biological sequences over finite alphabets: the OptiFin toolbox.
CoRR, 2017

Random Forests for Industrial Device Functioning Diagnostics Using Wireless Sensor Networks.
CoRR, 2017

Dependability of Sensor Networks for Industrial Prognostics and Health Management.
CoRR, 2017

Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers.
CoRR, 2017

Random Walk in a N-cube Without Hamiltonian Cycle to Chaotic Pseudorandom Number Generation: Theoretical and Practical Considerations.
CoRR, 2017

One random jump and one permutation: sufficient conditions to chaotic, statistically faultless, and large throughput PRNG for FPGA.
CoRR, 2017

Low Cost Monitoring and Intruders Detection using Wireless Video Sensor Networks.
CoRR, 2017

A Cryptographic Approach for Steganography.
CoRR, 2017

Hash functions using chaotic iterations.
CoRR, 2017

An optimization technique on pseudorandom generators based on chaotic iterations.
CoRR, 2017

A Robust Data Hiding Process Contributing to the Development of a Semantic Web.
CoRR, 2017

Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization.
CoRR, 2017

On the usefulness of information hiding techniques for wireless sensor networks security.
CoRR, 2017

Lyapunov Exponent Evaluation of the CBC Mode of Operation.
CoRR, 2017

Simulation-based estimation of branching models for LTR retrotransposons.
Bioinformatics, 2017

One Random Jump and One Permutation: Sufficient Conditions to Chaotic, Statistically Faultless, and Large Throughput PRNG for FPGA.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

On the Ability to Reconstruct Ancestral Genomes from Mycobacterium Genus.
Proceedings of the Bioinformatics and Biomedical Engineering, 2017

Finding optimal finite biological sequences over finite alphabets: The OptiFin toolbox.
Proceedings of the IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology, 2017

Conditions to Have a Well-Disordered Dynamics in the CBC Mode of Operation.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
Using an Epidemiological Approach to Maximize Data Survival in the Internet of Things.
ACM Trans. Internet Techn., 2016

Theoretical Design and FPGA-Based Implementation of Higher-Dimensional Digital Chaotic Systems.
IEEE Trans. on Circuits and Systems, 2016

TSIRM: A two-stage iteration with least-squares residual minimization algorithm to solve large sparse linear and nonlinear systems.
J. Comput. Science, 2016

Proving Chaotic Behavior of CBC Mode of Operation.
I. J. Bifurcation and Chaos, 2016

Theoretical design and circuit implementation of integer domain chaotic systems.
CoRR, 2016

Using an epidemiological approach to maximize data survival in the internet of things.
CoRR, 2016

A Topological Study of Chaotic Iterations. Application to Hash Functions.
CoRR, 2016

Randomness and disorder of chaotic iterations. Applications in information security field.
CoRR, 2016

Steganalyzer performances in operational contexts.
CoRR, 2016

Steganalysis via a Convolutional Neural Network using Large Convolution Filters.
CoRR, 2016

A Second Order Derivatives based Approach for Steganography.
CoRR, 2016

Investigating Low Level Protocols for Wireless Body Sensor Networks.
CoRR, 2016

On the Evaluation of the Privacy Breach in Disassociated Set-Valued Datasets.
CoRR, 2016

FPGA Implementation of $\mathbb{F}_2$-Linear Pseudorandom Number Generators Based on Zynq MPSoC: a Chaotic Iterations Post Processing Case Study.
CoRR, 2016

Two Security Layers for Hierarchical Data Aggregation in Sensor Networks.
CoRR, 2016

Epidemiological Approach for Data Survivability in Unattended Wireless Sensor Networks.
CoRR, 2016

FPGA Design for Pseudorandom Number Generator Based on Chaotic Iteration used in Information Hiding Application.
CoRR, 2016

Resiliency in Distributed Sensor Networks for PHM of the Monitoring Targets.
CoRR, 2016

Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with Multilayer Feedforward Networks.
CoRR, 2016

Quality Analysis of a Chaotic Proven Keyed Hash Function.
CoRR, 2016

Binary Particle Swarm Optimization versus Hybrid Genetic Algorithm for Inferring Well Supported Phylogenetic Trees.
CoRR, 2016

Proving chaotic behaviour of CBC mode of operation.
CoRR, 2016

Quantitative Evaluation of Chaotic CBC Mode of Operation.
CoRR, 2016

The dynamics of the CBC Mode of Operation.
CoRR, 2016

Resiliency in Distributed Sensor Networks for Prognostics and Health Management of the Monitoring Targets.
Comput. J., 2016

A Bregman-proximal point algorithm for robust non-negative matrix factorization with possible missing values and outliers - application to gene expression analysis.
BMC Bioinformatics, 2016

FPGA Implementation of F2-Linear Pseudorandom Number Generators based on Zynq MPSoC: A Chaotic Iterations Post Processing Case Study.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

A Second Order Derivatives based Approach for Steganography.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Diffusion and Confusion of Chaotic Iteration Based Hash Functions.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

On the Topology Effects in Wireless Sensor Networks Based Prognostics and Health Management.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

Summary of Topological Study of Chaotic CBC Mode of Operation.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

Quantitative evaluation of chaotic CBC mode of operation.
Proceedings of the 2nd International Conference on Advanced Technologies for Signal and Image Processing, 2016

Investigating low level protocols for Wireless Body Sensor Networks.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
Efficient and cryptographically secure generation of chaotic pseudorandom numbers on GPU.
The Journal of Supercomputing, 2015

The study of unfoldable self-avoiding walks - Application to protein structure prediction software.
J. Bioinformatics and Computational Biology, 2015

A Complete Security Framework for Wireless Sensor Networks: Theory and Practice.
IJITWE, 2015

Topological chaos and chaotic iterations. Application to Hash functions.
CoRR, 2015

A new chaos-based watermarking algorithm.
CoRR, 2015

Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes.
CoRR, 2015

Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species.
CoRR, 2015

Dependability of wireless sensor networks for industrial prognostics and health management.
Computers in Industry, 2015

STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost.
Annales des Télécommunications, 2015

Improved Core Genes Prediction for Constructing Well-Supported Phylogenetic Trees in Large Sets of Plant Species.
Proceedings of the Bioinformatics and Biomedical Engineering, 2015

Relation between Insertion Sequences and Genome Rearrangements in Pseudomonas aeruginosa.
Proceedings of the Bioinformatics and Biomedical Engineering, 2015

TSIRM: A Two-Stage Iteration with Least-Squares Residual Minimization Algorithm to Solve Large Sparse Linear Systems.
Proceedings of the 2015 IEEE International Parallel and Distributed Processing Symposium Workshop, 2015

Steganalyzer Performances in Operational Contexts.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Taenia biomolecular phylogeny and the impact of mitochondrial genes on this latter.
Proceedings of the IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology, 2015

Binary Particle Swarm Optimization Versus Hybrid Genetic Algorithm for Inferring Well Supported Phylogenetic Trees.
Proceedings of the Computational Intelligence Methods for Bioinformatics and Biostatistics, 2015

Investigating gene expression array with outliers and missing data in bladder cancer.
Proceedings of the 2015 IEEE International Conference on Bioinformatics and Biomedicine, 2015

Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees Based on Subsets of Chloroplastic Core Genes.
Proceedings of the Algorithms for Computational Biology, 2015

2014
Noise and Chaos Contributions in Fast Random Bit Sequence Generated From Broadband Optoelectronic Entropy Sources.
IEEE Trans. on Circuits and Systems, 2014

Epidemiological approach for data survivability in unattended wireless sensor networks.
J. Network and Computer Applications, 2014

Suitability of chaotic iterations schemes using XORshift for security applications.
J. Network and Computer Applications, 2014

Is protein Folding Problem Really a NP-Complete One? First Investigations.
J. Bioinformatics and Computational Biology, 2014

FPGA acceleration of a pseudorandom number generator based on chaotic iterations.
J. Inf. Sec. Appl., 2014

Theoretical Design and Circuit Implementation of Integer Domain Chaotic Systems.
I. J. Bifurcation and Chaos, 2014

Two security layers for hierarchical data aggregation in sensor networks.
IJAACS, 2014

Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts.
CoRR, 2014

Finding the Core-Genes of Chloroplasts.
CoRR, 2014

A Security Framework for Wireless Sensor Networks: Theory and Practice.
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014

Pseudorandom Number Generators with Balanced Gray Codes.
Proceedings of the SECRYPT 2014, 2014

A pipeline for insertion sequence detection and study for bacterial genome.
Proceedings of the German conference on bioinformatics 2014, September 28, 2014

Gene similarity-based approaches for determining core-genes of chloroplasts.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014

On the Usefulness of Information Hiding Techniques for Wireless Sensor Networks Security.
Proceedings of the Ad Hoc Networks - 6th International ICST Conference, 2014

2013
Computational investigations of folded self-avoiding walks related to protein folding.
Computational Biology and Chemistry, 2013

Topological Study and Lyapunov Exponent of a Secure Steganographic Scheme.
Proceedings of the SECRYPT 2013, 2013

A Cryptographic Approach for Steganography.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

The dynamics of complex systems. Studies and applications in computer science and biology.
, 2013

2012
A Topological Study of Chaotic Iterations Application to Hash Functions.
Proceedings of the Computational Intelligence for Privacy and Security, 2012

Predicting the Evolution of two Genes in the Yeast Saccharomyces Cerevisiae.
Proceedings of the 3rd International Conference on Computational Systems-Biology and Bioinformatics, 2012

Low-Cost Monitoring and Intruders Detection Using Wireless Video Sensor Networks.
IJDSN, 2012

The Metadata Anonymization Toolkit
CoRR, 2012

Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure
CoRR, 2012

Application of Steganography for Anonymity through the Internet
CoRR, 2012

Protein Folding in the 2D Hydrophobic-Hydrophilic (HP) Square Lattice Model is Chaotic.
Cognitive Computation, 2012

Steganography: A Class of Secure and Robust Algorithms.
Comput. J., 2012

Lyapunov Exponent Evaluation of a Digital Watermarking Scheme Proven to be Secure.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

2011
A Complexity Approach for Steganalysis
CoRR, 2011

Efficient and Cryptographically Secure Generation of Chaotic Pseudorandom Numbers on GPU
CoRR, 2011

Chaotic iterations versus Spread-spectrum: topological-security and stego-security
CoRR, 2011

Chaotic iterations for steganography: Stego-security and topological-security
CoRR, 2011

On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems
CoRR, 2011

Steganography: a Class of Algorithms having Secure Properties
CoRR, 2011

Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations
CoRR, 2011

Steganography: a class of secure and robust algorithms
CoRR, 2011

Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding
CoRR, 2011

On the design of a family of CI pseudo-random number generators
CoRR, 2011

Class of Trustworthy Pseudo-Random Number Generators
CoRR, 2011

Randomness Quality of CI Chaotic Generators: Applications to Internet Security
CoRR, 2011

Building a Chaotic Proved Neural Network
CoRR, 2011

Chaotic Iterations for Steganography - Stego-security and Chaos-security.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Chaos of protein folding.
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011

Steganography: A Class of Algorithms having Secure Properties.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

On the Link between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems.
Proceedings of the Fundamentals of Computation Theory - 18th International Symposium, 2011

Secure Scheduling of Wireless Video Sensor Nodes for Surveillance Applications.
Proceedings of the Ad Hoc Networks - Third International ICST Conference, 2011

2010
Le désordre des itérations chaotiques et leur utilité en sécurité informatique. (The disorder of chaotic iterations and its use in the computer science security field).
PhD thesis, 2010

A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application to Watermarking
CoRR, 2010

Improving random number generators by chaotic iterations. Application in data hiding
CoRR, 2010

Chaotic iterations versus Spread-spectrum: chaos and stego security
CoRR, 2010

A chaos-based approach for information hiding security
CoRR, 2010

A novel pseudo-random number generator based on discrete chaotic iterations
CoRR, 2010

A Pseudo Random Numbers Generator Based on Chaotic Iterations: Application to Watermarking.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

A New Chaos-based Watermarking Algorithm.
Proceedings of the SECRYPT 2010, 2010

Topological chaos and chaotic iterations application to hash functions.
Proceedings of the International Joint Conference on Neural Networks, 2010

Chaotic Iterations versus Spread-Spectrum: Chaos and Stego Security.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Secure Data Aggregation in Wireless Sensor Networks: Homomorphism versus Watermarking Approach.
Proceedings of the Ad Hoc Networks - Second International Conference, 2010

2008
A watermarking algorithm satisfying topological chaos properties
CoRR, 2008

A topological chaos framework for hash functions
CoRR, 2008


  Loading...