Michel Barbeau

Orcid: 0000-0003-3531-4926

Affiliations:
  • Carleton University, Ottawa, Canada


According to our database1, Michel Barbeau authored at least 131 papers between 1988 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Repeated Purification versus Concatenated Error Correction in Fault Tolerant Quantum Networks.
CoRR, 2023

A Quantum Algorithm for Shapley Value Estimation.
CoRR, 2023

Learning a Policy for Pursuit-Evasion Games Using Spiking Neural Networks and the STDP Algorithm.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

Quantum Algorithms for Shapley Value Calculation.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2023

Exploring the Quantitative Resilience Analysis of Cyber-Physical Systems.
Proceedings of the IFIP Networking Conference, 2023

Analysis of Experimental Data Fusion Schemes for Underwater Communication over a Hydrophone Array.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2023

A Novel Underwater Packet Flooding Protocol.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2023

2022
Research Trends in Collaborative Drones.
Sensors, 2022

A new post-quantum multivariate polynomial public key encapsulation algorithm.
Quantum Inf. Process., 2022

Quantum permutation pad for universal quantum-safe cryptography.
Quantum Inf. Process., 2022

Cyber-Physical Defense in the Quantum Era.
CoRR, 2022

Benchmark Performance of a New Quantum-Safe Multivariate Polynomial Digital Signature Algorithm.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2022

Comparison of Cellular Network Controllers for Quadrotors Experiencing Time Delay.
Proceedings of the 30th Mediterranean Conference on Control and Automation, 2022

Uplink Interference Management in Cellular-Connected UAV Networks Using Multi-Armed Bandit and NOMA.
Proceedings of the IEEE Latin-American Conference on Communications, 2022

Underwater Confidential Communications in JANUS.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

Benchmark Performance of the Multivariate Polynomial Public Key Encapsulation Mechanism.
Proceedings of the Risks and Security of Internet and Systems, 2022

Resilience via Blackbox Self-Piloting Plants.
Proceedings of the 29th Computer & Electronics Security Application Rendezvous co-located with the 7th European Cyber Week (ECW 2022), 2022

2021
GPS-Free, Error Tolerant Path Planning for Swarms of Micro Aerial Vehicles with Quality Amplification ‡.
Sensors, 2021

Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics.
IEEE Access, 2021

Performance Analysis of the Quantum Safe Multivariate Polynomial Public Key Algorithm.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2021

Performance of an Underwater Communication System in a Sea Trial Done in the Canadian Arctic<sup>*</sup>.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021

Pilot Contamination Attack Detection in 5G Massive MIMO Systems Using Generative Adversarial Networks.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021

A Reverse Turing Like Test for Quad-copters.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021

Indistinguishability and Non-deterministic Encryption of the Quantum Safe Multivariate Polynomial Public Key Cryptographic System.
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021

Risky Zone Avoidance Strategies for Drones.
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021

Frame Design for Adaptability in Long-Range Underwater Communication.
Proceedings of the Ad Hoc Networks and Tools for IT - 13th EAI International Conference, 2021

2020
Metrics to Enhance the Resilience of Cyber-Physical Systems.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Capacity Requirements in Networks of Quantum Repeaters and Terminals.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2020

Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2020

2019
Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications.
Trans. Emerg. Telecommun. Technol., 2019

Next Generation Resilient Cyber-Physical Systems.
CoRR, 2019

Quality Amplification of Error Prone Navigation for Swarms of Micro Aerial Vehicles (with Detailed Simulations).
CoRR, 2019

Geocaching-inspired Resilient Path Planning for Drone Swarms.
Proceedings of the IEEE INFOCOM 2019, 2019

Quality Amplification of Error Prone Navigation for Swarms of Micro Aerial Vehicles.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Faking and Discriminating the Navigation Data of a Micro Aerial Vehicle Using Quantum Generative Adversarial Networks.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
Doppler Effect in the Acoustic Ultra Low Frequency Band for Wireless Underwater Networks.
Mob. Networks Appl., 2018

No-Key Semi-Quantum Direct Communication Protocol with Low Quantum Resource Requirements.
CoRR, 2018

Low Frequency Mobile Communications in Underwater Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018

2017
Secure Localization in the Presence of Colluders in WSNs.
Sensors, 2017

Simulation and modeling of hydro acoustic communication channels with wide band attenuation and ambient noise.
Int. J. Parallel Emergent Distributed Syst., 2017

Learning to Communicate Underwater: An Exploration of Limited Mobility Agents.
Proceedings of the International Conference on Underwater Networks & Systems, 2017

An Experimental Baseline for Underwater Acoustic Broadcasts.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Secure Quantum Data Communications Using Classical Keying Material.
Proceedings of the Quantum Technology and Optimization Problems, 2017

Economic No-Key Semi-Quantum Direct Communication Protocol.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017

The Sound of Communication in Underwater Acoustic Sensor Networks - (Position Paper).
Proceedings of the Ad Hoc Networks, 2017

Doppler Effect in the Underwater Acoustic Ultra Low Frequency Band.
Proceedings of the Ad Hoc Networks, 2017

2016
Channel selection using a multiple radio model.
J. Netw. Comput. Appl., 2016

Delay and Reflection Attacks in Authenticated Semi-Quantum Direct Communications.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

Management of Surveillance Underwater Acoustic Networks.
Proceedings of the Ad Hoc Networks - 8th International Conference, 2016

2015
Quantum Computing Assisted Medium Access Control for Multiple Client Station Networks.
CoRR, 2015

Refracted Acoustic Communications in Wireless Underwater Sensor Networks with Mobility.
Proceedings of the SENSORNETS 2015, 2015

Simulation of communications using underwater acoustic signals impaired by wide band attenuation.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

Location-free link state routing for underwater acoustic sensor networks.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

Simulation of underwater communications with a colored noise approximation and mobility.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

Localization of a Mobile Node in Shaded Areas.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 14th International Conference, 2015

2014
The Bidirectional Algorithm for Channel Selection Using a Two-Radio Model.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model.
Proceedings of the IEEE International Conference on Communications, 2014

Revisiting the Performance of the Modular Clock Algorithm for Distributed Blind Rendezvous in Cognitive Radio Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, 2014

2013
A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs.
J. Netw. Comput. Appl., 2013

QaASs: QoS aware adaptive security scheme for video streaming in MANETs.
J. Inf. Secur. Appl., 2013

QoS and security in Link State Routing protocols for MANETs.
Proceedings of the IFIP Wireless Days, 2013

A new analytic model for the cognitive radio jump-stay algorithm.
Proceedings of the IFIP Wireless Days, 2013

Tracking an on the run vehicle in a metropolitan VANET.
Proceedings of the 2013 IEEE Intelligent Vehicles Symposium (IV), 2013

Non-cooperating vehicle tracking in VANETs using the conditional logit model.
Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, 2013

2012
Point-to-point voice over ad hoc networks: A survey.
Pervasive Mob. Comput., 2012

Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012

QoS Aware Adaptive Security Scheme for Video Streaming in MANETs.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

2011
Location-Oblivious Distributed Unit Disk Graph Coloring.
Algorithmica, 2011

Proactive Threshold Cryptosystem for EPC Tags.
Ad Hoc Sens. Wirel. Networks, 2011

Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes.
Ann. des Télécommunications, 2011

Simultaneous operation of multiple collocated radios and the scanning problem.
Proceedings of the IFIP Wireless Days Conference 2011, 2011

Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol.
Proceedings of the Foundations and Practice of Security, 2011

Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks.
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011

2010
Centroid Localization of Uncooperative Nodes in Wireless Networks Using a Relative Span Weighting Method.
EURASIP J. Wirel. Commun. Netw., 2010

Detection of the Evil ring attack in wireless sensor networks using cross verification.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Using time-of-day and location-based mobility profiles to improve scanning during handovers.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Assessment of the true risks to the protection of confidential information in the wireless home and office environment.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Mitigation of topology control traffic attacks in OLSR networks.
Proceedings of the CRiSIS 2010, 2010

Solution to the wireless evil-twin transmitter attack.
Proceedings of the CRiSIS 2010, 2010

Prioritized Access for Emergency Stations in Next Generation Broadband Wireless Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

2009
Probabilistic Evidence Aggregation for Malicious Node Position Bounding in Wireless Networks.
J. Networks, 2009

Probabilistic Localization and Tracking of Malicious Insiders Using Hyperbolic Position Bounding in Vehicular Networks.
EURASIP J. Wirel. Commun. Netw., 2009

Evaluation of Anonymized ONS Queries
CoRR, 2009

Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks.
Proceedings of the Wireless Algorithms, 2009

Security Threat Mitigation Trends in Low-Cost RFID Systems.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

2008
Insider attack attribution using signal strength-based hyperbolic location estimation.
Secur. Commun. Networks, 2008

Incremental Construction of k-Dominating Sets in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2008

Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks.
Proceedings of the LCN 2008, 2008

Security Threats on EPC Based RFID Systems.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Analysis of Threats to the Security of EPC Networks.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

2007
Secure Anonymous Broadcasting in Vehicular Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

Strategies for fast scanning and handovers in WiMAX/802.16.
Proceedings of the 2nd International ICST Conference on Access Networks, 2007

Principles of ad hoc networking.
Wiley, 2007

2006
Strategies for Service Discovery over Ad Hoc Networks.
Eng. Lett., 2006

Rogue-base station detection in WiMax/802.16 wireless access networks.
Ann. des Télécommunications, 2006

Incremental Construction of <i>k</i>-Dominating Sets in Wireless Sensor Networks.
Proceedings of the Principles of Distributed Systems, 10th International Conference, 2006

Detecting rogue devices in bluetooth networks using radio frequency fingerprinting.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2006

Threats to Security in DSRC/WAVE.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

2005
Anomaly-based intrusion detection using mobility profiles of public transportation users.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

Low-latency secure mobile communications.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

Perfect identity concealment in UMTS over radio access links.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

WiMax/802.16 threat analysis.
Proceedings of the Q2SWinet'05, 2005

Detecting Impersonation Attacks in Future Wireless and Mobile Networks.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

2004
Performance Evaluation of Service Discovery Strategies in Ad Hoc Networks.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Integrating Service Discovery Protocols with Presence-Based Communications for Ad Hoc Collaborative Scenarios.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Performance of Generative Programming Based Protocol Implementation.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Enhancing intrusion detection in wireless networks using radio frequency fingerprinting.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004

Improving Distance Based Geographic Location Techniques in Sensor Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, 2004

2003
Indoor Ad Hoc Proximity-Location Sensing for Service Provider Selection.
Telecommun. Syst., 2003

Modeling and Performance Analysis of Service Discovery Strategies in Ad Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2003

2002
A Protocol Stack Development Tool Using Generative Programming.
Proceedings of the Generative Programming and Component Engineering, 2002

2000
Bandwidth Usage Analysis of Service Location Protocol.
Proceedings of the 2000 International Workshop on Parallel Processing, 2000

1999
Synthesis of Controllers of Processes Modeled as Colored Petri Nets.
Discret. Event Dyn. Syst., 1999

Implementation of Two Approaches for the Reliable Multicast of Mobile Agents over Wireless Networks.
Proceedings of the 1999 International Symposium on Parallel Architectures, 1999

1998
A method for the synthesis of controllers to handle safety, liveness, and real-time constraints.
IEEE Trans. Autom. Control., 1998

1997
An Efficient Algorithm for Controller Synthesis under Full Observation.
J. Algorithms, 1997

Planning Control Rules for Reactive Agents.
Artif. Intell., 1997

1996
Specification and testing of the behavior of network management agents using SDL-92.
IEEE/ACM Trans. Netw., 1996

A Colored Petri Net-Based Format Method for the Design of Control Systems.
Proceedings of the COMPSAC '96, 1996

1995
An algorithm for computing the mask value of the supremal normal sublanguage of a legal language.
IEEE Trans. Autom. Control., 1995

An approach to conformance testing of MIB implementations.
Proceedings of the Integrated Network Management IV, 1995

Synthesizing Plant Controllers Using Real-time Goals.
Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, 1995

1994
Object-Oriented Analysis and Design of Repositories of Network Management Systems.
Proceedings of the Object-Oriented Technology for Database and Software Systems, 1994

The contract approach illustrated with a distributed routing protocol.
Proceedings of the 1994 Conference of the Centre for Advanced Studies on Collaborative Research, October 31, 1994

1993
A Subset of Lotos with the Computational Power of Place/Transition-Nets.
Proceedings of the Application and Theory of Petri Nets 1993, 1993

1992
Analysis and testing of application layer protocols with an application to FTAM.
IEEE Trans. Commun., 1992

1991
The Lotos Model of a Fault Protected System and its Verification Using a Petri Net Based Approach.
Proceedings of the Computer Aided Verification, 3rd International Workshop, 1991

1990
Extension of the Karp and Miller Procedure to Lotos Specifications.
Proceedings of the Computer Aided Verification, 2nd International Workshop, 1990

1989
FTAM Test Design Using an Automated Test Tool.
Proceedings of the Proceedings IEEE INFOCOM '89, 1989

1988
A computer-aided design tool for protocol testing.
Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?, 1988


  Loading...