Jean-François Couchot

Orcid: 0000-0001-6437-5598

According to our database1, Jean-François Couchot authored at least 73 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Combining a multi-feature neural network with multi-task learning for emergency calls severity prediction.
Array, March, 2024

2023
On the Risks of Collecting Multidimensional Data Under Local Differential Privacy.
Proc. VLDB Endow., 2023

A Methodology for Emergency Calls Severity Prediction: From Pre-processing to BERT-Based Classifiers.
Proceedings of the Artificial Intelligence Applications and Innovations, 2023

Automatic ICD-10 Code Association: A Challenging Task on French Clinical Texts.
Proceedings of the 36th IEEE International Symposium on Computer-Based Medical Systems, 2023

An Easy-to-Use and Robust Approach for the Differentially Private De-Identification of Clinical Textual Documents.
Proceedings of the 16th International Joint Conference on Biomedical Engineering Systems and Technologies, 2023

2D-ZasHen Chaotic Map-Based Medical Image Cryptographic Approach in IoT-Based Healthcare Monitoring.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023

2022
Privacy-Preserving Prediction of Victim's Mortality and Their Need for Transportation to Health Facilities.
IEEE Trans. Ind. Informatics, 2022

Differentially private multivariate time series forecasting of aggregated human mobility with deep learning: Input or gradient perturbation?
Neural Comput. Appl., 2022

In-stream Probabilistic Cardinality Estimation for Bloom Filters.
CoRR, 2022

De-Identification of French Unstructured Clinical Notes for Machine Learning Tasks.
CoRR, 2022

Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Using Deep learning for image watermarking attack.
Signal Process. Image Commun., 2021

Improving the Utility of Locally Differentially Private Protocols for Longitudinal and Multidimensional Frequency Estimates.
CoRR, 2021

Observing Road Freight Traffic from Mobile Network Signalling Data While Respecting Privacy and Business Confidentiality.
Proceedings of the Privacy and Identity Management. Between Data Protection and Security, 2021

Random Sampling Plus Fake Data: Multidimensional Frequency Estimates With Local Differential Privacy.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
Normalized blind STDM watermarking scheme for images and PDF documents robust against fixed gain attack.
Multim. Tools Appl., 2020

Publishing Anonymized Set-Valued Data via Disassociation towards Analysis.
Future Internet, 2020

Forecasting the number of firefighter interventions per region with local-differential-privacy-based data.
Comput. Secur., 2020

Longitudinal Collection and Analysis of Mobile Phone Data with Local Differential Privacy.
Proceedings of the Privacy and Identity Management: 15th IFIP WG 9.2, 2020

Mobility modeling through mobile data: generating an optimized and open dataset respecting privacy.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

2019
Safe disassociation of set-valued datasets.
J. Intell. Inf. Syst., 2019

Ancestral Reconstruction and Investigations of Genomic Recombination on some Pentapetalae Chloroplasts.
J. Integr. Bioinform., 2019

Optimal power/rate trade-off for internet of multimedia things lifetime maximization under dynamic links capacity.
Future Gener. Comput. Syst., 2019

Fast and robust PRNGs based on jumps in N-cubes for simulation, but not exclusively for that.
Proceedings of the 17th International Conference on High Performance Computing & Simulation, 2019

Anonymously forecasting the number and nature of firefighting operations.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019

Ant-driven clustering for utility-aware disassociation of set-valued datasets.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019

2018
A Hardware and Secure Pseudorandom Generator for Constrained Devices.
IEEE Trans. Ind. Informatics, 2018

CIPRNG: A VLSI Family of Chaotic Iterations Post-Processings for $\mathbb {F}_{2}$ -Linear Pseudorandom Number Generation Based on Zynq MPSoC.
IEEE Trans. Circuits Syst. I Regul. Pap., 2018

Survey on hardware implementation of random number generators on FPGA: Theory and experimental analyses.
Comput. Sci. Rev., 2018

Maximum network lifetime with optimal power/rate and routing trade-off for Wireless Multimedia Sensor Networks.
Comput. Commun., 2018

On the reconstruction of the ancestral bacterial genomes in genus Mycobacterium and Brucella.
BMC Syst. Biol., 2018

Comparison of metaheuristics to measure gene effects on phylogenetic supports and topologies.
BMC Bioinform., 2018

Joint routing/encoding-power for network lifetime maximization in WMSN.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Blind PDF Document Watermarking Robust Against PCA and ICA Attacks.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
Blind digital watermarking in PDF documents using Spread Transform Dither Modulation.
Multim. Tools Appl., 2017

Random Walk in a N-Cube Without Hamiltonian Cycle to Chaotic Pseudorandom Number Generation: Theoretical and Practical Considerations.
Int. J. Bifurc. Chaos, 2017

Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers.
CoRR, 2017

A Robust Data Hiding Process Contributing to the Development of a Semantic Web.
CoRR, 2017

Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization.
CoRR, 2017

One Random Jump and One Permutation: Sufficient Conditions to Chaotic, Statistically Faultless, and Large Throughput PRNG for FPGA.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Improving Blind Steganalysis in Spatial Domain Using a Criterion to Choose the Appropriate Steganalyzer Between CNN and SRM+EC.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Routing impact on network lifetime maximization using power/rate trade-off in WVSN.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

On the Ability to Reconstruct Ancestral Genomes from Mycobacterium Genus.
Proceedings of the Bioinformatics and Biomedical Engineering, 2017

Canonical Form of Gray Codes in N-cubes.
Proceedings of the Cellular Automata and Discrete Complex Systems, 2017

2016
Steganalysis via a Convolutional Neural Network using Large Convolution Filters.
CoRR, 2016

FPGA Implementation of $\mathbb{F}_2$-Linear Pseudorandom Number Generators Based on Zynq MPSoC: a Chaotic Iterations Post Processing Case Study.
CoRR, 2016

Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with Multilayer Feedforward Networks.
CoRR, 2016

Quality Analysis of a Chaotic Proven Keyed Hash Function.
CoRR, 2016

FPGA Implementation of F2-Linear Pseudorandom Number Generators based on Zynq MPSoC: A Chaotic Iterations Post Processing Case Study.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

A Second Order Derivatives based Approach for Steganography.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Maximizing Network Lifetime in Wireless Video Sensor Networks Under Quality Constraints.
Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access, 2016

2015
STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost.
Ann. des Télécommunications, 2015

Improved Core Genes Prediction for Constructing Well-Supported Phylogenetic Trees in Large Sets of Plant Species.
Proceedings of the Bioinformatics and Biomedical Engineering, 2015

Steganalyzer Performances in Operational Contexts.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Binary Particle Swarm Optimization Versus Hybrid Genetic Algorithm for Inferring Well Supported Phylogenetic Trees.
Proceedings of the Computational Intelligence Methods for Bioinformatics and Biostatistics, 2015

Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees Based on Subsets of Chloroplastic Core Genes.
Proceedings of the Algorithms for Computational Biology, 2015

2014
Finding the Core-Genes of Chloroplasts.
CoRR, 2014

Pseudorandom Number Generators with Balanced Gray Codes.
Proceedings of the SECRYPT 2014, 2014

Gene similarity-based approaches for determining core-genes of chloroplasts.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014

2013
Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

2012
Application of Steganography for Anonymity through the Internet
CoRR, 2012

Steganography: A Class of Secure and Robust Algorithms.
Comput. J., 2012

2011
Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations
CoRR, 2011

Class of Trustworthy Pseudo-Random Number Generators
CoRR, 2011

Steganography: A Class of Algorithms having Secure Properties.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

On the Link between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems.
Proceedings of the Fundamentals of Computation Theory - 18th International Symposium, 2011

2009
Graph Based Reduction of Program Verification Conditions
CoRR, 2009

2007
Guiding the Correction of Parameterized Specifications.
Proceedings of the Integrated Formal Methods, 6th International Conference, 2007

Handling Polymorphism in Automated Deduction.
Proceedings of the Automated Deduction, 2007

Instantiation of Parameterized Data Structures for Model-Based Testing.
Proceedings of the B 2007: Formal Specification and Development in B, 2007

2005
A uniform deductive approach for parameterized protocol safety.
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005

2004
Scalable Automated Proving and Debugging of Set-Based Specifications.
J. Braz. Comput. Soc., 2004

2003
Proving and Debugging Set-Based Specifications.
Proceedings of the 6th Brazilian Workshop on Formal Methods, 2003


  Loading...