Jean-Marc Robert

Orcid: 0000-0002-9495-8038

Affiliations:
  • École de Technologie Supérieure (ÉTS), Montréal, QC, Canada
  • Alcatel, Research and Innovation Centre - Security Group, Ottawa, ON, Canada (former)
  • Université du Québec à Chicoutimi, QC, Canada (former)
  • McGill University, Montréal, QC, Canada (former)


According to our database1, Jean-Marc Robert authored at least 49 papers between 1985 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Residual packet loss rate analysis of 2-D parity forward error correction.
Signal Process. Image Commun., 2022

2018
Location-Proof System based on Secure Multi-Party Computations.
IACR Cryptol. ePrint Arch., 2018

Entwining Sanitization and Personalization on Databases.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol.
IACR Cryptol. ePrint Arch., 2017

2016
Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process.
Secur. Commun. Networks, 2016

A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Enhancing malware detection for Android systems using a system call filtering and abstraction process.
Secur. Commun. Networks, 2015

2014
Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol.
Wirel. Pers. Commun., 2014

Mechanisms to locate noncooperative transmitters in wireless networks based on residual signal strengths.
Secur. Commun. Networks, 2014

Prover Anonymous and Deniable Distance-Bounding Authentication.
IACR Cryptol. ePrint Arch., 2014

2013
Detecting attacks in QoS-OLSR protocol.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Impact of Dataset Representation on Smartphone Malware Detection Performance.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

2012
Alertwheel: radial bipartite graph visualization applied to intrusion detection system alerts.
IEEE Netw., 2012

An adaptive tit-for-tat strategy for IEEE 802.11 CSMA/CA protocol.
Int. J. Secur. Networks, 2012

RBC-OLSR: Reputation-based clustering OLSR protocol for wireless ad hoc networks.
Comput. Commun., 2012

A distributed resource management model for Virtual Private Networks: Tit-for-Tat strategies.
Comput. Networks, 2012

Towards Smart Anti-Malwares for Battery-Powered Devices.
Proceedings of the 5th International Conference on New Technologies, 2012

Smartphone malware detection: From a survey towards taxonomy.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012

Mechanisms to Locate Non-cooperative Transmitters in Wireless Networks.
Proceedings of the Advanced Infocomm Technology - 5th IEEE International Conference, 2012

A novel reputation-based Tit-for-Tat strategy for IEEE 802.11 CSMA/CA protocol.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

Performance Evaluation of Multi-pattern Matching Algorithms on Smartphone.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

2011
Novel detection mechanisms for malicious attacks targeting the cluster-based OLSR protocol.
Proceedings of the IEEE 7th International Conference on Wireless and Mobile Computing, 2011

A cluster-based model for QoS-OLSR protocol.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Optimizing a Radial Layout of Bipartite Graphs for a Tool Visualizing Security Alerts.
Proceedings of the Graph Drawing - 19th International Symposium, 2011

2010
Quantifying the space-efficiency of 2D graphical representations of trees.
Inf. Vis., 2010

2009
SC-OLSR: Secure Clustering-Based OLSR Model for Ad Hoc Networks.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009

2008
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?.
Proceedings of the Computer Security, 2008

2006
A monitoring system for detecting repeated packets with applications to computer worms.
Int. J. Inf. Sec., 2006

Rogue-base station detection in WiMax/802.16 wireless access networks.
Ann. des Télécommunications, 2006

2005
Perfect identity concealment in UMTS over radio access links.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

2004
Worm Epidemics in High-Speed Networks.
Computer, 2004

IP traceback solutions based on time to live covert channel.
Proceedings of the 12th IEEE International Conference on Networks, 2004

2001
From Fixed-Length Messages to Arbitrary-Length Messages Practical RSA Signature Padding Schemes.
Proceedings of the Topics in Cryptology, 2001

1999
Convex tours of bounded curvature.
Comput. Geom., 1999

1997
Separating Translates in the Plane: Combinatorial Bounds and an Algorithm.
Int. J. Comput. Geom. Appl., 1997

Geometric Orderings of Intersecting Translates and Their Applications.
Comput. Geom., 1997

1996
An optimal algorithm for the (<= k)-levels, with applications to separation and transversal problems.
Int. J. Comput. Geom. Appl., 1996

The Exact Fitting Problem in Higher Dimensions.
Comput. Geom., 1996

1994
Linear Approximation of Simple Objects.
Comput. Geom., 1994

1993
Maximum distance between two sets of points in E<sup>d</sup>.
Pattern Recognit. Lett., 1993

Orthogonal Weighted Linear <i>L</i><sub>1</sub> and <i>L</i><sub>∞</sub> Approximation and Applications.
Discret. Appl. Math., 1993

Geometric Orderings and Helly-type Theorem for Intersecting Translates in the Plane.
Proceedings of the 5th Canadian Conference on Computational Geometry, 1993

1991
Optimal Algorithms for Some Smallest Intersection Radius Problems (Extended Abstract).
Proceedings of the Seventh Annual Symposium on Computational Geometry, 1991

1989
Weighted Orthogonal Linear L<sup>∞</sup>-Approximation and Applications.
Proceedings of the Algorithms and Data Structures, 1989

1988
Privacy Amplification by Public Discussion.
SIAM J. Comput., 1988

1986
Information Theoretic Reductions among Disclosure Problems
Proceedings of the 27th Annual Symposium on Foundations of Computer Science, 1986

All-or-Nothing Disclosure of Secrets.
Proceedings of the Advances in Cryptology, 1986

1985
How to Reduce Your Enemy's Information (Extended Abstract).
Proceedings of the Advances in Cryptology, 1985


  Loading...