Gérard Memmi

Orcid: 0000-0002-3380-8394

According to our database1, Gérard Memmi authored at least 81 papers between 1978 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Home Spaces and Invariants to Analyze Parameterized Petri Nets.
CoRR, 2024

2023
Wangiri Fraud: Pattern Analysis and Machine-Learning-Based Detection.
IEEE Internet Things J., 2023

Invariants and Home Spaces in Transition Systems and Petri Nets.
CoRR, 2023

Designing a unique revision loop updating courses simultaneously on different MOOC platforms.
Proceedings of the IEEE Learning with MOOCS, 2023

ATTA: Adversarial Task-transferable Attacks on Autonomous Driving Systems.
Proceedings of the IEEE International Conference on Data Mining, 2023

Minimal Generating Sets for Semiflows.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2023

Public-attention-based Adversarial Attack on Traffic Sign Recognition.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
Short Note on Generating Sets for Semiflows.
CoRR, 2022

PE-AONT: Partial Encryption All or Nothing Transform.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

The Devil Hides in the Model: Reviewing Blockchain and BFT Protocols.
Proceedings of the Blockchain and Applications, 4th International Congress, 2022

2021
Topological Graph Convolutional Network-Based Urban Traffic Flow and Density Prediction.
IEEE Trans. Intell. Transp. Syst., 2021

Deep Residual Learning-Based Enhanced JPEG Compression in the Internet of Things.
IEEE Trans. Ind. Informatics, 2021

A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT.
IEEE Trans. Cloud Comput., 2021

Toward Secure and Efficient Deep Learning Inference in Dependable IoT Systems.
IEEE Internet Things J., 2021

Adversarial Attacks Against Network Intrusion Detection in IoT Systems.
IEEE Internet Things J., 2021

Performance Analysis of an Energy Trading Platform Using the Ethereum Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

2020
Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0.
IEEE J. Biomed. Health Informatics, 2020

Mitigating Advanced Adversarial Attacks with More Advanced Gradient Obfuscation Techniques.
CoRR, 2020

Investigating Image Applications Based on Spatial-Frequency Transform and Deep Learning Techniques.
CoRR, 2020

Resisting Adversarial Examples via Wavelet Extension and Denoising.
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020

ChainIDE 2.0: Facilitating Smart Contract Development for Consortium Blockchain.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Data Augmentation-Based Defense Method Against Adversarial Attacks in Neural Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Multi-hop Data Fragmentation in Energy Harvesting Wireless Sensor Networks.
Proceedings of the 2020 Global Internet of Things Summit, 2020

Revisiting Shared Data Protection Against Key Exposure.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

The StakeCube blockchain : Instantiation, Evaluation & Applications.
Proceedings of the 2020 Second International Conference on Blockchain Computing and Applications, 2020

2019
All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives.
Inf. Sci., 2019

An efficient key distribution system for data fusion in V2X heterogeneous networks.
Inf. Fusion, 2019

DC coefficient recovery for JPEG images in ubiquitous communication systems.
Future Gener. Comput. Syst., 2019

Privacy-preserving Health Data Sharing for Medical Cyber-Physical Systems.
CoRR, 2019

Asymptotic Performance Analysis of Blockchain Protocols.
CoRR, 2019

Circular All-Or-Nothing: Revisiting Data Protection Against Key Exposure.
CoRR, 2019

Multi-hop Data Fragmentation in Unattended Wireless Sensor Networks.
CoRR, 2019

Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks.
Ann. des Télécommunications, 2019

DC Coefficients Recovery from AC Coefficients in the JPEG Compression Scenario.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

Secure Data Sharing with Fast Access Revocation through Untrusted Clouds.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Poster Abstract: Secure Data Sharing by Means of Fragmentation, Encryption, and Dispersion.
Proceedings of the IEEE INFOCOM 2019, 2019

Reinforcing Protection Against Chosen-Plaintext Attack Using Ciphertext Fragmentation in Multi-cloud Environments.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

How Carl Adam Petri Deeply Influenced My Understanding of Invariance and Parallelism.
Proceedings of the Carl Adam Petri: Ideas, Personality, Impact, 2019

2018
PE-AONT: Partial Encryption combined with an All-or-Nothing Transform.
CoRR, 2018

A Fast Fragmentation Algorithm For Data Protection In a Multi-Cloud Environment.
CoRR, 2018

Enhancing Data Protection in a Distributed Storage Environment Using Structure-Wise Fragmentation and Dispersal of Encrypted Data.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Fast and Scalable Fragmentation Algorithm for Data Protection Using Multi-storage over Independent Locations.
Proceedings of the Security and Trust Management - 14th International Workshop, 2018

A Case Study for Practical Issues of DCT Based Bitmap Selective Encryption Methods.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

A Dynamic Scalable Blockchain Based Communication Architecture for IoT.
Proceedings of the Smart Blockchain - First International Conference, 2018

Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key Exposure.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Parameter sensitivity analysis of the Energy/Frequency Convexity Rule for application processors.
Sustain. Comput. Informatics Syst., 2017

An Efficient Keyless Fragmentation Algorithm for Data Protection.
CoRR, 2017

Data protection by means of fragmentation in various different distributed storage systems - a survey.
CoRR, 2017

Modeling the energy consumption of programs: Thermal aspects and energy/frequency convexity rule (invited paper).
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Experimental energy profiling of energy-critical embedded applications.
Proceedings of the 25th International Conference on Software, 2017

Secure and resilient scheme for data protection in unattended wireless sensor networks.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

An Efficient Secure Storage Scheme Based on Information Fragmentation.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

2016
Model-Based Testing Directed by Structural Coverage and Functional Requirements.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

A Model-Based Testing Process for Enhancing Structural Coverage in Functional Testing.
Proceedings of the Complex Systems Design & Management Asia - Smart Nations, 2016

POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Fast Selective Encryption Methods for Bitmap Images.
Int. J. Multim. Data Eng. Manag., 2015

Parameter Sensitivity Analysis of the Energy/Frequency Convexity Rule for Nanometer-scale Application Processors.
CoRR, 2015

Data Protection: Combining Fragmentation, Encryption, and Dispersion, an Intermediary report.
CoRR, 2015

Data protection: Combining fragmentation, encryption, and dispersion.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Data protection by means of fragmentation in distributed storage systems.
Proceedings of the International Conference on Protocol Engineering, 2015

2014
The Impact of Surface Size on the Radiative Thermal Behavior of Embedded Systems.
CoRR, 2014

Modeling the temperature bias of power consumption for nanometer-scale CPUs in application processors.
Proceedings of the XIVth International Conference on Embedded Computer Systems: Architectures, 2014

Fast Selective Encryption Method for Bitmaps Based on GPU Acceleration.
Proceedings of the 2014 IEEE International Symposium on Multimedia, 2014

2013
The Energy/Frequency Convexity Rule: Modeling and Experimental Validation on Mobile Devices.
Proceedings of the Parallel Processing and Applied Mathematics, 2013

2006
A reconfigurable design-for-debug infrastructure for SoCs.
Proceedings of the 43rd Design Automation Conference, 2006

2001
Application of Formal Verification to Design Creation and Implementation.
Proceedings of the 2nd International Symposium on Quality of Electronic Design (ISQED 2001), 2001

1997
Lessons learned with ACME an environment integration experiment.
ACM SIGSOFT Softw. Eng. Notes, 1997

1994
Experiment and Performance Evaluation of a Distributed Collaboration System.
Proceedings of the MASCOTS '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31, 1994

1993
Scrutiny: A Collaborative Inspection and Review System.
Proceedings of the Software Engineering, 1993

1989
Composition of nets via a communication medium.
Proceedings of the Advances in Petri Nets 1990 [10th International Conference on Applications and Theory of Petri Nets, 1989

1986
Analysing Nets by the Invariant Method.
Proceedings of the Petri Nets: Central Models and Their Properties, 1986

1985
An Introduction to Fifo Nets-Monogeneous Nets: A Subclass of Fifo Nets.
Theor. Comput. Sci., 1985

1984
Computation of flows for unary-predicates/transition-nets.
Proceedings of the Advances in Petri Nets 1984, 1984

1983
Fifo nets: a new model of parallel computation.
Proceedings of the Theoretical Computer Science, 1983

1982
Some New Results About the (<i>d, k</i>) Graph Problem.
IEEE Trans. Computers, 1982

A Graph Theoretical Porperty for Minimal Deadlock.
Proceedings of the Applications and Theory of Petri Nets, 1982

1981
Leakage Notion.
Proceedings of the Application and Theory of Petri Nets, 1981

1979
Notion de Dualité et de Symétrie dans les Réseuaux de Pétri.
Proceedings of the Semantics of Concurrent Computation, 1979

Linear Algebra in Net Theory.
Proceedings of the Net Theory and Applications, 1979

1978
Fuites dans les réseaux de Petri.
RAIRO Theor. Informatics Appl., 1978


  Loading...