Samuel Marchal

Orcid: 0000-0002-8522-2707

According to our database1, Samuel Marchal authored at least 42 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning Applications.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
A systematic review of artificial intelligence impact assessments.
Artif. Intell. Rev., November, 2023

2022
A Survey on XAI for Beyond 5G Security: Technical Aspects, Use Cases, Challenges and Research Directions.
CoRR, 2022


Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Access Control for Implantable Medical Devices.
IEEE Trans. Emerg. Top. Comput., 2021

FLGUARD: Secure and Private Federated Learning.
IACR Cryptol. ePrint Arch., 2021

SAFELearn: Secure Aggregation for private FEderated Learning.
IACR Cryptol. ePrint Arch., 2021

Real-time Attacks Against Deep Reinforcement Learning Policies.
CoRR, 2021

WAFFLE: Watermarking in Federated Learning.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

DAWN: Dynamic Adversarial Watermarking of Neural Networks.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021

2019
AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication.
IEEE J. Sel. Areas Commun., 2019

Extraction of Complex DNN Models: Real Threat or Boogeyman?
CoRR, 2019

PrivICN: Privacy-preserving content retrieval in information-centric networking.
Comput. Networks, 2019

DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

PRADA: Protecting Against DNN Model Stealing Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Detecting organized eCommerce fraud using scalable categorical clustering.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
PRADA: Protecting against DNN Model Stealing Attacks.
CoRR, 2018

DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
CoRR, 2018

On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World.
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018

chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change.
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018

2017
Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application.
IEEE Trans. Computers, 2017

Advanced interest flooding attacks in named-data networking.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Profiling Users by Modeling Web Transactions.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Efficient Learning of Communication Profiles from IP Flow Records.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Real-Time Client-Side Phishing Prevention Add-On.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Behavioral clustering of non-stationary IP flow record data.
Proceedings of the 12th International Conference on Network and Service Management, 2016

2015
DNS and Semantic Analysis for Phishing Detection ; Analyse du DNS et Analyse Sémantique pour la Détection de l'Hameçonnage.
PhD thesis, 2015

Mitigating Mimicry Attacks Against the Session Initiation Protocol.
IEEE Trans. Netw. Serv. Manag., 2015

2014
PhishStorm: Detecting Phishing With Streaming Analytics.
IEEE Trans. Netw. Serv. Manag., 2014

PhishScore: Hacking phishers' minds.
Proceedings of the 10th International Conference on Network and Service Management, 2014

A Big Data Architecture for Large Scale Security Monitoring.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

2013
Advanced Detection Tool for PDF Threats.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

2012
Semantic based DNS forensics.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Proactive Discovery of Phishing Related Domain Names.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

DNSSM: A large scale passive DNS security monitoring framework.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Semantic Exploration of DNS.
Proceedings of the NETWORKING 2012, 2012

Large Scale DNS Analysis.
Proceedings of the Dependable Networks and Services, 2012


  Loading...