Christophe Guyeux

Orcid: 0000-0003-0195-4378

According to our database1, Christophe Guyeux authored at least 182 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Combining a multi-feature neural network with multi-task learning for emergency calls severity prediction.
Array, March, 2024

Advancements and Challenges in Handwritten Text Recognition: A Comprehensive Survey.
J. Imaging, January, 2024

TSCAPE: time series clustering with curve analysis and projection on an Euclidean space.
Connect. Sci., 2024

2023
On the cryptanalysis of an image encryption algorithm with quantum chaotic map and DNA coding.
Multim. Tools Appl., November, 2023

Cross-Layer Federated Learning for Lightweight IoT Intrusion Detection Systems.
Sensors, August, 2023

Using data science to predict firemen interventions: a case study.
J. Supercomput., May, 2023

Characterization of a Driven Two-Level Quantum System by Supervised Learning.
Entropy, March, 2023

Application of Particle Detection Methods to Solve Particle Overlapping Problems.
Proceedings of the 3rd International Conference on Image Processing and Vision Engineering, 2023

A Methodology for Emergency Calls Severity Prediction: From Pre-processing to BERT-Based Classifiers.
Proceedings of the Artificial Intelligence Applications and Innovations, 2023

EMTE: An Enhanced Medical Terms Extractor Using Pattern Matching Rules.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

UTP: A Unified Term Presentation Tool for Clinical Textual Data Using Pattern-Matching Rules and Dictionary-Based Ontologies.
Proceedings of the Agents and Artificial Intelligence - 15th International Conference, 2023

2022
Impact of Insertion Sequences and RNAs on Genomic Inversions in <i>Pseudomonas aeruginosa</i>.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

Privacy-Preserving Prediction of Victim's Mortality and Their Need for Transportation to Health Facilities.
IEEE Trans. Ind. Informatics, 2022

The usefulness of NLP techniques for predicting peaks in firefighter interventions due to rare events.
Neural Comput. Appl., 2022

De-Identification of French Unstructured Clinical Notes for Machine Learning Tasks.
CoRR, 2022

Anomalies and Breakpoint Detection for a Dataset of Firefighters' Operations During the COVID-19 Period in France.
Proceedings of the Information Systems and Technologies, 2022

How to Predict Patient Arrival in the Emergency Room.
Proceedings of the Information Systems and Technologies, 2022

On the performance of data-driven approaches for energy efficiency on WiFi and LoRa-based sensors: an experimental study.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Predicting fire brigades' operations based on their type of interventions.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Spolmap: An Enriched Visualization of CRISPR Diversity.
Proceedings of the Bioinformatics and Biomedical Engineering, 2022

Study and predictions of emergency rescue in the Doubs department, France.
Proceedings of the IEEE 11th International Conference on Intelligent Systems, 2022

How to Build an Optimal and Operational Knowledge Base to Predict Firefighters' Interventions.
Proceedings of the Intelligent Systems and Applications, 2022

Machine Learning for Predicting Firefighters' Interventions Per Type of Mission.
Proceedings of the 8th International Conference on Control, 2022

Forecasting the Number of Firemen Interventions Using Exponential Smoothing Methods: A Case Study.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Constructing Higher-Dimensional Digital Chaotic Systems via Loop-State Contraction Algorithm.
IEEE Trans. Circuits Syst. I Regul. Pap., 2021

CRISPRbuilder-TB: "CRISPR-builder for tuberculosis". Exhaustive reconstruction of the CRISPR locus in mycobacterium tuberculosis complex using SRA.
PLoS Comput. Biol., 2021

An optimal cluster-based routing algorithm for UCBSNs.
Internet Technol. Lett., 2021

Anomaly-based intrusion detection systems: The requirements, methods, measurements, and datasets.
Trans. Emerg. Telecommun. Technol., 2021

Machine learning-based forecasting of firemen ambulances' turnaround time in hospitals, considering the COVID-19 impact.
Appl. Soft Comput., 2021

A Critical Review on the Implementation of Static Data Sampling Techniques to Detect Network Attacks.
IEEE Access, 2021

Impact of Eigensolvers on Spectral Clustering.
Proceedings of the 3rd IEEE Middle East and North Africa COMMunications Conference, 2021

A Personal LPWAN Remote Monitoring System.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Time Series Forecasting for the Number of Firefighters Interventions.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Fault tolerant data transmission reduction method for wireless sensor networks.
World Wide Web, 2020

Performance of low level protocols in high traffic wireless body sensor networks.
Peer-to-Peer Netw. Appl., 2020

Energy-efficiency and coverage quality management for reliable diagnostics in wireless sensor networks.
Int. J. Sens. Networks, 2020

Mobility aware and traffic adaptive hybrid MAC protocol for collaborative body sensor networks.
Int. J. Sens. Networks, 2020

Advances in the enumeration of foldable self-avoiding walks.
Int. J. Comput. Sci. Eng., 2020

Toward fast and accurate emergency cases detection in BSNs.
IET Wirel. Sens. Syst., 2020

Forecasting the number of firefighter interventions per region with local-differential-privacy-based data.
Comput. Secur., 2020

Efficient distributed average consensus in wireless sensor networks.
Comput. Commun., 2020

A Comparison of LSTM and XGBoost for Predicting Firemen Interventions.
Proceedings of the Trends and Innovations in Information Systems and Technologies, 2020

A Wearable LoRa-Based Emergency System for Remote Safety Monitoring.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

2019
Introducing and Comparing Recent Clustering Methods for Massive Data Management in the Internet of Things.
J. Sens. Actuator Networks, 2019

Impacts of wireless sensor networks strategies and topologies on prognostics and health management.
J. Intell. Manuf., 2019

Ancestral Reconstruction and Investigations of Genomic Recombination on some Pentapetalae Chloroplasts.
J. Integr. Bioinform., 2019

Efficient Chaotic Encryption Scheme with OFB Mode.
Int. J. Bifurc. Chaos, 2019

On the use of chaotic iterations to design keyed hash function.
Clust. Comput., 2019

Reliable diagnostics using wireless sensor networks.
Comput. Ind., 2019

SpCLUST: Towards a fast and reliable clustering for potentially divergent biological sequences.
Comput. Biol. Medicine, 2019

Efficient Cluster based Routing Protocol for Collaborative Body Sensor Networks.
Proceedings of the 8th International Conference on Sensor Networks, 2019

Efficient Online Laplacian Eigenmap Computation for Dimensionality Reduction in Molecular Phylogeny via Optimisation on the Sphere.
Proceedings of the Bioinformatics and Biomedical Engineering, 2019

Firemen Prediction by Using Neural Networks: A Real Case Study.
Proceedings of the Intelligent Systems and Applications, 2019

Anonymously forecasting the number and nature of firefighting operations.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019

Major earthquake event prediction using various machine learning algorithms.
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2019

Entropy and Security of Pseudorandom Number Generators based on Chaotic Iterations.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Long Short-Term Memory for Predicting Firemen Interventions.
Proceedings of the 6th International Conference on Control, 2019

2018
A Hardware and Secure Pseudorandom Generator for Constrained Devices.
IEEE Trans. Ind. Informatics, 2018

CIPRNG: A VLSI Family of Chaotic Iterations Post-Processings for $\mathbb {F}_{2}$ -Linear Pseudorandom Number Generation Based on Zynq MPSoC.
IEEE Trans. Circuits Syst. I Regul. Pap., 2018

Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks.
Sensors, 2018

On the coverage effects in wireless sensor networks based prognostic and health management.
Int. J. Sens. Networks, 2018

Survey on hardware implementation of random number generators on FPGA: Theory and experimental analyses.
Comput. Sci. Rev., 2018

A clustering package for nucleotide sequences using Laplacian Eigenmaps and Gaussian Mixture Model.
Comput. Biol. Medicine, 2018

On the reconstruction of the ancestral bacterial genomes in genus Mycobacterium and Brucella.
BMC Syst. Biol., 2018

Comparison of metaheuristics to measure gene effects on phylogenetic supports and topologies.
BMC Bioinform., 2018

panISa: ab initio detection of insertion sequences in bacterial genomes from short read sequence data.
Bioinform., 2018

l1-Penalised Ordinal Polytomous Regression Estimators with Application to Gene Expression Studies.
Proceedings of the 18th International Workshop on Algorithms in Bioinformatics, 2018

Average Performance Analysis of the Stochastic Gradient Method for Online PCA.
Proceedings of the Machine Learning, Optimization, and Data Science, 2018

Wireless multimedia sensor network deployment for disparity map calculation.
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018

On the collision property of chaotic iterations based post-treatments over cryptographic pseudorandom number generators.
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018

Novel order preserving encryption scheme for wireless sensor networks.
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018

Collaborative body sensor networks: Taxonomy and open challenges.
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018

Efficient cluster-based routing algorithm for body sensor networks.
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018

Online Shortest Paths With Confidence Intervals for Routing in a Time Varying Random Network.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

2017
Efficient high degree polynomial root finding using GPU.
J. Comput. Sci., 2017

Systematic investigations of gene effects on both topologies and supports: An <i>Echinococcus</i> illustration.
J. Bioinform. Comput. Biol., 2017

Random Walk in a N-Cube Without Hamiltonian Cycle to Chaotic Pseudorandom Number Generation: Theoretical and Practical Considerations.
Int. J. Bifurc. Chaos, 2017

An improved watermarking scheme for Internet applications.
CoRR, 2017

Introducing the truly chaotic finite state machines and their applications in security field.
CoRR, 2017

Efficient and accurate monitoring of the depth information in a Wireless Multimedia Sensor Network based surveillance.
CoRR, 2017

Random Forests for Industrial Device Functioning Diagnostics Using Wireless Sensor Networks.
CoRR, 2017

Dependability of Sensor Networks for Industrial Prognostics and Health Management.
CoRR, 2017

Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers.
CoRR, 2017

Hash functions using chaotic iterations.
CoRR, 2017

An optimization technique on pseudorandom generators based on chaotic iterations.
CoRR, 2017

A Robust Data Hiding Process Contributing to the Development of a Semantic Web.
CoRR, 2017

Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization.
CoRR, 2017

Lyapunov Exponent Evaluation of the CBC Mode of Operation.
CoRR, 2017

Simulation-based estimation of branching models for LTR retrotransposons.
Bioinform., 2017

One Random Jump and One Permutation: Sufficient Conditions to Chaotic, Statistically Faultless, and Large Throughput PRNG for FPGA.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

On the Ability to Reconstruct Ancestral Genomes from Mycobacterium Genus.
Proceedings of the Bioinformatics and Biomedical Engineering, 2017

Design and Evaluation of Chaotic Iterations Based Keyed Hash Function.
Proceedings of the Information Science and Applications 2017, 2017

Finding optimal finite biological sequences over finite alphabets: The OptiFin toolbox.
Proceedings of the IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology, 2017

Conditions to Have a Well-Disordered Dynamics in the CBC Mode of Operation.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
Using an Epidemiological Approach to Maximize Data Survival in the Internet of Things.
ACM Trans. Internet Techn., 2016

Theoretical Design and FPGA-Based Implementation of Higher-Dimensional Digital Chaotic Systems.
IEEE Trans. Circuits Syst. I Regul. Pap., 2016

TSIRM: A two-stage iteration with least-squares residual minimization algorithm to solve large sparse linear and nonlinear systems.
J. Comput. Sci., 2016

Proving Chaotic Behavior of CBC Mode of Operation.
Int. J. Bifurc. Chaos, 2016

A Topological Study of Chaotic Iterations. Application to Hash Functions.
CoRR, 2016

Randomness and disorder of chaotic iterations. Applications in information security field.
CoRR, 2016

Steganalysis via a Convolutional Neural Network using Large Convolution Filters.
CoRR, 2016

FPGA Implementation of $\mathbb{F}_2$-Linear Pseudorandom Number Generators Based on Zynq MPSoC: a Chaotic Iterations Post Processing Case Study.
CoRR, 2016

FPGA Design for Pseudorandom Number Generator Based on Chaotic Iteration used in Information Hiding Application.
CoRR, 2016

Resiliency in Distributed Sensor Networks for PHM of the Monitoring Targets.
CoRR, 2016

Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with Multilayer Feedforward Networks.
CoRR, 2016

Quality Analysis of a Chaotic Proven Keyed Hash Function.
CoRR, 2016

Proving chaotic behaviour of CBC mode of operation.
CoRR, 2016

The dynamics of the CBC Mode of Operation.
CoRR, 2016

Resiliency in Distributed Sensor Networks for Prognostics and Health Management of the Monitoring Targets.
Comput. J., 2016

A Bregman-proximal point algorithm for robust non-negative matrix factorization with possible missing values and outliers - application to gene expression analysis.
BMC Bioinform., 2016

FPGA Implementation of F2-Linear Pseudorandom Number Generators based on Zynq MPSoC: A Chaotic Iterations Post Processing Case Study.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

A Second Order Derivatives based Approach for Steganography.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Diffusion and Confusion of Chaotic Iteration Based Hash Functions.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

On the Topology Effects in Wireless Sensor Networks Based Prognostics and Health Management.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

Summary of Topological Study of Chaotic CBC Mode of Operation.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

Quantitative evaluation of chaotic CBC mode of operation.
Proceedings of the 2nd International Conference on Advanced Technologies for Signal and Image Processing, 2016

Investigating low level protocols for Wireless Body Sensor Networks.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
Efficient and cryptographically secure generation of chaotic pseudorandom numbers on GPU.
J. Supercomput., 2015

The study of unfoldable self-avoiding walks - Application to protein structure prediction software.
J. Bioinform. Comput. Biol., 2015

A Complete Security Framework for Wireless Sensor Networks: Theory and Practice.
Int. J. Inf. Technol. Web Eng., 2015

Dependability of wireless sensor networks for industrial prognostics and health management.
Comput. Ind., 2015

STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost.
Ann. des Télécommunications, 2015

Improved Core Genes Prediction for Constructing Well-Supported Phylogenetic Trees in Large Sets of Plant Species.
Proceedings of the Bioinformatics and Biomedical Engineering, 2015

Relation between Insertion Sequences and Genome Rearrangements in Pseudomonas aeruginosa.
Proceedings of the Bioinformatics and Biomedical Engineering, 2015

TSIRM: A Two-Stage Iteration with Least-Squares Residual Minimization Algorithm to Solve Large Sparse Linear Systems.
Proceedings of the 2015 IEEE International Parallel and Distributed Processing Symposium Workshop, 2015

Steganalyzer Performances in Operational Contexts.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Taenia biomolecular phylogeny and the impact of mitochondrial genes on this latter.
Proceedings of the IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology, 2015

Binary Particle Swarm Optimization Versus Hybrid Genetic Algorithm for Inferring Well Supported Phylogenetic Trees.
Proceedings of the Computational Intelligence Methods for Bioinformatics and Biostatistics, 2015

Investigating gene expression array with outliers and missing data in bladder cancer.
Proceedings of the 2015 IEEE International Conference on Bioinformatics and Biomedicine, 2015

Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees Based on Subsets of Chloroplastic Core Genes.
Proceedings of the Algorithms for Computational Biology, 2015

2014
Noise and Chaos Contributions in Fast Random Bit Sequence Generated From Broadband Optoelectronic Entropy Sources.
IEEE Trans. Circuits Syst. I Regul. Pap., 2014

Epidemiological approach for data survivability in unattended wireless sensor networks.
J. Netw. Comput. Appl., 2014

Suitability of chaotic iterations schemes using XORshift for security applications.
J. Netw. Comput. Appl., 2014

Is protein Folding Problem Really a NP-Complete One? First Investigations.
J. Bioinform. Comput. Biol., 2014

FPGA acceleration of a pseudorandom number generator based on chaotic iterations.
J. Inf. Secur. Appl., 2014

Theoretical Design and Circuit Implementation of Integer Domain Chaotic Systems.
Int. J. Bifurc. Chaos, 2014

Two security layers for hierarchical data aggregation in sensor networks.
Int. J. Auton. Adapt. Commun. Syst., 2014

Finding the Core-Genes of Chloroplasts.
CoRR, 2014

A Security Framework for Wireless Sensor Networks: Theory and Practice.
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014

Pseudorandom Number Generators with Balanced Gray Codes.
Proceedings of the SECRYPT 2014, 2014

A pipeline for insertion sequence detection and study for bacterial genome.
Proceedings of the German conference on bioinformatics 2014, September 28, 2014

Gene similarity-based approaches for determining core-genes of chloroplasts.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014

On the Usefulness of Information Hiding Techniques for Wireless Sensor Networks Security.
Proceedings of the Ad Hoc Networks - 6th International ICST Conference, 2014

2013
Computational investigations of folded self-avoiding walks related to protein folding.
Comput. Biol. Chem., 2013

Topological Study and Lyapunov Exponent of a Secure Steganographic Scheme.
Proceedings of the SECRYPT 2013, 2013

A Cryptographic Approach for Steganography.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

The dynamics of complex systems. Studies and applications in computer science and biology.
, 2013

2012
A Topological Study of Chaotic Iterations Application to Hash Functions.
Proceedings of the Computational Intelligence for Privacy and Security, 2012

Predicting the Evolution of two Genes in the Yeast Saccharomyces Cerevisiae.
Proceedings of the 3rd International Conference on Computational Systems-Biology and Bioinformatics, 2012

Low-Cost Monitoring and Intruders Detection Using Wireless Video Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

The Metadata Anonymization Toolkit
CoRR, 2012

Application of Steganography for Anonymity through the Internet
CoRR, 2012

Protein Folding in the 2D Hydrophobic-Hydrophilic (HP) Square Lattice Model is Chaotic.
Cogn. Comput., 2012

Steganography: A Class of Secure and Robust Algorithms.
Comput. J., 2012

Lyapunov Exponent Evaluation of a Digital Watermarking Scheme Proven to be Secure.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

2011
A Complexity Approach for Steganalysis
CoRR, 2011

Chaotic iterations versus Spread-spectrum: topological-security and stego-security
CoRR, 2011

Chaotic iterations for steganography: Stego-security and topological-security
CoRR, 2011

Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations
CoRR, 2011

Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding
CoRR, 2011

On the design of a family of CI pseudo-random number generators
CoRR, 2011

Class of Trustworthy Pseudo-Random Number Generators
CoRR, 2011

Randomness Quality of CI Chaotic Generators: Applications to Internet Security
CoRR, 2011

Building a Chaotic Proved Neural Network
CoRR, 2011

Chaotic Iterations for Steganography - Stego-security and Chaos-security.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Chaos of protein folding.
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011

Steganography: A Class of Algorithms having Secure Properties.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

On the Link between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems.
Proceedings of the Fundamentals of Computation Theory - 18th International Symposium, 2011

Secure Scheduling of Wireless Video Sensor Nodes for Surveillance Applications.
Proceedings of the Ad Hoc Networks - Third International ICST Conference, 2011

2010
Le désordre des itérations chaotiques et leur utilité en sécurité informatique. (The disorder of chaotic iterations and its use in the computer science security field).
PhD thesis, 2010

Improving random number generators by chaotic iterations. Application in data hiding
CoRR, 2010

A chaos-based approach for information hiding security
CoRR, 2010

A novel pseudo-random number generator based on discrete chaotic iterations
CoRR, 2010

A Pseudo Random Numbers Generator Based on Chaotic Iterations: Application to Watermarking.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

A New Chaos-based Watermarking Algorithm.
Proceedings of the SECRYPT 2010, 2010

Topological chaos and chaotic iterations application to hash functions.
Proceedings of the International Joint Conference on Neural Networks, 2010

Chaotic Iterations versus Spread-Spectrum: Chaos and Stego Security.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Secure Data Aggregation in Wireless Sensor Networks: Homomorphism versus Watermarking Approach.
Proceedings of the Ad Hoc Networks - Second International Conference, 2010

2008
A watermarking algorithm satisfying topological chaos properties
CoRR, 2008

A topological chaos framework for hash functions
CoRR, 2008


  Loading...