default search action
Gérard Memmi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Abdul Wahid, Mounira Msahli, Albert Bifet, Gérard Memmi:
NFA: A neural factorization autoencoder based online telephony fraud detection. Digit. Commun. Networks 10(1): 158-167 (2024) - [c49]Gérard Memmi, Han Qiu, Zakirul Alam:
Message from the Program Chairs; CSCloud2024. CSCloud 2024: xii - [c48]Qingjie Zhang, Lijun Chi, Di Wang, Mounira Msahli, Gérard Memmi, Tianwei Zhang, Chao Zhang, Han Qiu:
Laser Shield: a Physical Defense with Polarizer against Laser Attacks on Autonomous Driving Systems. DAC 2024: 65:1-65:6 - [i19]Gérard Memmi:
Home Spaces and Invariants to Analyze Parameterized Petri Nets. CoRR abs/2403.11779 (2024) - 2023
- [j17]Akshaya Ravi, Mounira Msahli, Han Qiu, Gérard Memmi, Albert Bifet, Meikang Qiu:
Wangiri Fraud: Pattern Analysis and Machine-Learning-Based Detection. IEEE Internet Things J. 10(8, April 15): 6794-6802 (2023) - [c47]Lijun Chi, Mounira Msahli, Gérard Memmi, Han Qiu:
Public-attention-based Adversarial Attack on Traffic Sign Recognition. CCNC 2023: 740-745 - [c46]Gérard Memmi:
Minimal Generating Sets for Semiflows. FORTE 2023: 189-205 - [c45]Qingjie Zhang, Maosen Zhang, Han Qiu, Tianwei Zhang, Mounira Msahli, Gérard Memmi:
ATTA: Adversarial Task-transferable Attacks on Autonomous Driving Systems. ICDM 2023: 798-807 - [c44]Ella Hamonic, Rémi Sharrock, Petra Bonfert-Taylor, Michael Goudzwaard, Gérard Memmi, Catherine Chow, Josh Meise:
Designing a unique revision loop updating courses simultaneously on different MOOC platforms. LWMOOCS 2023: 1-6 - [i18]Gérard Memmi:
Invariants and Home Spaces in Transition Systems and Petri Nets. CoRR abs/2306.07623 (2023) - 2022
- [c43]Antoine Durand, Gérard Memmi:
The Devil Hides in the Model: Reviewing Blockchain and BFT Protocols. BLOCKCHAIN 2022: 237-248 - [c42]Katarzyna Kapusta, Gérard Memmi:
PE-AONT: Partial Encryption All or Nothing Transform. SECRYPT 2022: 636-641 - [e4]Gérard Memmi, Baijian Yang, Linghe Kong, Tianwei Zhang, Meikang Qiu:
Knowledge Science, Engineering and Management - 15th International Conference, KSEM 2022, Singapore, August 6-8, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13368, Springer 2022, ISBN 978-3-031-10982-9 [contents] - [e3]Gérard Memmi, Baijian Yang, Linghe Kong, Tianwei Zhang, Meikang Qiu:
Knowledge Science, Engineering and Management - 15th International Conference, KSEM 2022, Singapore, August 6-8, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13369, Springer 2022, ISBN 978-3-031-10985-0 [contents] - [e2]Gérard Memmi, Baijian Yang, Linghe Kong, Tianwei Zhang, Meikang Qiu:
Knowledge Science, Engineering and Management - 15th International Conference, KSEM 2022, Singapore, August 6-8, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13370, Springer 2022, ISBN 978-3-031-10988-1 [contents] - [i17]Gérard Memmi:
Short Note on Generating Sets for Semiflows. CoRR abs/2211.10405 (2022) - 2021
- [j16]Han Qiu, Qinkai Zheng, Tianwei Zhang, Meikang Qiu, Gérard Memmi, Jialiang Lu:
Toward Secure and Efficient Deep Learning Inference in Dependable IoT Systems. IEEE Internet Things J. 8(5): 3180-3188 (2021) - [j15]Han Qiu, Tian Dong, Tianwei Zhang, Jialiang Lu, Gérard Memmi, Meikang Qiu:
Adversarial Attacks Against Network Intrusion Detection in IoT Systems. IEEE Internet Things J. 8(13): 10327-10335 (2021) - [j14]Han Qiu, Hassan N. Noura, Meikang Qiu, Zhong Ming, Gérard Memmi:
A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT. IEEE Trans. Cloud Comput. 9(4): 1293-1304 (2021) - [j13]Han Qiu, Qinkai Zheng, Gérard Memmi, Jialiang Lu, Meikang Qiu, Bhavani Thuraisingham:
Deep Residual Learning-Based Enhanced JPEG Compression in the Internet of Things. IEEE Trans. Ind. Informatics 17(3): 2124-2133 (2021) - [j12]Han Qiu, Qinkai Zheng, Mounira Msahli, Gérard Memmi, Meikang Qiu, Jialiang Lu:
Topological Graph Convolutional Network-Based Urban Traffic Flow and Density Prediction. IEEE Trans. Intell. Transp. Syst. 22(7): 4560-4569 (2021) - [c41]Dongmin Son, Sawsan Al Zahr, Gérard Memmi:
Performance Analysis of an Energy Trading Platform Using the Ethereum Blockchain. IEEE ICBC 2021: 1-3 - 2020
- [j11]Han Qiu, Meikang Qiu, Meiqin Liu, Gérard Memmi:
Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0. IEEE J. Biomed. Health Informatics 24(9): 2499-2505 (2020) - [c40]Antoine Durand, Guillaume Hébert, Khalifa Toumi, Gérard Memmi, Emmanuelle Anceaume:
The StakeCube blockchain : Instantiation, Evaluation & Applications. BCCA 2020: 9-15 - [c39]Katarzyna Kapusta, Matthieu Rambaud, Gérard Memmi:
Revisiting Shared Data Protection Against Key Exposure. AsiaCCS 2020: 165-177 - [c38]Keun Woo Lim, Katarzyna Kapusta, Gérard Memmi, Woo-Sung Jung:
Multi-hop Data Fragmentation in Energy Harvesting Wireless Sensor Networks. GIoTS 2020: 1-6 - [c37]Yi Zeng, Han Qiu, Gérard Memmi, Meikang Qiu:
A Data Augmentation-Based Defense Method Against Adversarial Attacks in Neural Networks. ICA3PP (2) 2020: 274-289 - [c36]Xiao Wu, Han Qiu, Shuyi Zhang, Gérard Memmi, Keke Gai, Wei Cai:
ChainIDE 2.0: Facilitating Smart Contract Development for Consortium Blockchain. INFOCOM Workshops 2020: 388-393 - [c35]Qinkai Zheng, Han Qiu, Tianwei Zhang, Gérard Memmi, Meikang Qiu, Jialiang Lu:
Resisting Adversarial Examples via Wavelet Extension and Denoising. SmartCom 2020: 204-214 - [i16]Qinkai Zheng, Han Qiu, Gérard Memmi, Isabelle Bloch:
Investigating Image Applications Based on Spatial-Frequency Transform and Deep Learning Techniques. CoRR abs/2004.02756 (2020) - [i15]Han Qiu, Yi Zeng, Qinkai Zheng, Tianwei Zhang, Meikang Qiu, Gérard Memmi:
Mitigating Advanced Adversarial Attacks with More Advanced Gradient Obfuscation Techniques. CoRR abs/2005.13712 (2020) - [i14]Yi Zeng, Han Qiu, Gérard Memmi, Meikang Qiu:
A Data Augmentation-based Defense Method Against Adversarial Attacks in Neural Networks. CoRR abs/2007.15290 (2020)
2010 – 2019
- 2019
- [j10]Katarzyna Kapusta, Gérard Memmi, Hassan Noura:
Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks. Ann. des Télécommunications 74(3-4): 157-165 (2019) - [j9]Han Qiu, Gérard Memmi, Xuan Chen, Jian Xiong:
DC coefficient recovery for JPEG images in ubiquitous communication systems. Future Gener. Comput. Syst. 96: 23-31 (2019) - [j8]Han Qiu, Meikang Qiu, Zhihui Lu, Gérard Memmi:
An efficient key distribution system for data fusion in V2X heterogeneous networks. Inf. Fusion 50: 212-220 (2019) - [j7]Han Qiu, Katarzyna Kapusta, Zhihui Lu, Meikang Qiu, Gérard Memmi:
All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives. Inf. Sci. 502: 434-445 (2019) - [c34]Katarzyna Kapusta, Han Qiu, Gérard Memmi:
Reinforcing Protection Against Chosen-Plaintext Attack Using Ciphertext Fragmentation in Multi-cloud Environments. CSCloud/EdgeCom 2019: 7-9 - [c33]Katarzyna Kapusta, Han Qiu, Gérard Memmi:
Poster Abstract: Secure Data Sharing by Means of Fragmentation, Encryption, and Dispersion. INFOCOM Workshops 2019: 1051-1052 - [c32]Katarzyna Kapusta, Han Qiu, Gérard Memmi:
Secure Data Sharing with Fast Access Revocation through Untrusted Clouds. NTMS 2019: 1-5 - [c31]Han Qiu, Qinkai Zheng, Meikang Qiu, Gérard Memmi:
DC Coefficients Recovery from AC Coefficients in the JPEG Compression Scenario. SmartCom 2019: 266-276 - [p1]Gérard Memmi:
How Carl Adam Petri Deeply Influenced My Understanding of Invariance and Parallelism. Carl Adam Petri: Ideas, Personality, Impact 2019: 133-139 - [i13]Keun Woo Lim, Katarzyna Kapusta, Gérard Memmi, Woo-Sung Jung:
Multi-hop Data Fragmentation in Unattended Wireless Sensor Networks. CoRR abs/1901.05831 (2019) - [i12]Katarzyna Kapusta, Gérard Memmi, Matthieu Rambaud:
Circular All-Or-Nothing: Revisiting Data Protection Against Key Exposure. CoRR abs/1901.08083 (2019) - [i11]Antoine Durand, Elyes Ben Hamida, David Leporini, Gérard Memmi:
Asymptotic Performance Analysis of Blockchain Protocols. CoRR abs/1902.04363 (2019) - [i10]Han Qiu, Meikang Qiu, Meiqin Liu, Gérard Memmi:
Privacy-preserving Health Data Sharing for Medical Cyber-Physical Systems. CoRR abs/1904.08270 (2019) - 2018
- [c30]Katarzyna Kapusta, Gérard Memmi:
Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key Exposure. CCS 2018: 2231-2233 - [c29]Katarzyna Kapusta, Gérard Memmi:
Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure. CSS 2018: 181-193 - [c28]Han Qiu, Meikang Qiu, Gérard Memmi, Zhong Ming, Meiqin Liu:
A Dynamic Scalable Blockchain Based Communication Architecture for IoT. SmartBlock 2018: 159-166 - [c27]Han Qiu, Nathalie Enfrin, Gérard Memmi:
A Case Study for Practical Issues of DCT Based Bitmap Selective Encryption Methods. SSIC 2018: 1-7 - [c26]Katarzyna Kapusta, Gérard Memmi:
A Fast and Scalable Fragmentation Algorithm for Data Protection Using Multi-storage over Independent Locations. STM 2018: 54-69 - [c25]Katarzyna Kapusta, Gérard Memmi:
Enhancing Data Protection in a Distributed Storage Environment Using Structure-Wise Fragmentation and Dispersal of Encrypted Data. TrustCom/BigDataSE 2018: 385-390 - [i9]Katarzyna Kapusta, Gérard Memmi:
A Fast Fragmentation Algorithm For Data Protection In a Multi-Cloud Environment. CoRR abs/1804.01886 (2018) - [i8]Katarzyna Kapusta, Gérard Memmi:
PE-AONT: Partial Encryption combined with an All-or-Nothing Transform. CoRR abs/1811.09144 (2018) - 2017
- [j6]Karel De Vogeleer, Gérard Memmi, Pierre Jouvelot:
Parameter sensitivity analysis of the Energy/Frequency Convexity Rule for application processors. Sustain. Comput. Informatics Syst. 15: 16-27 (2017) - [c24]Han Qiu, Gérard Memmi, Hassan Noura:
An Efficient Secure Storage Scheme Based on Information Fragmentation. CSCloud 2017: 108-113 - [c23]Katarzyna Kapusta, Gérard Memmi, Hassan Noura:
Secure and resilient scheme for data protection in unattended wireless sensor networks. CSNet 2017: 1-8 - [c22]Kameswar Rao Vaddina, Florian Brandner, Gérard Memmi, Pierre Jouvelot:
Experimental energy profiling of energy-critical embedded applications. SoftCOM 2017: 1-6 - [c21]Karel De Vogeleer, Kameswar Rao Vaddina, Florian Brandner, Pierre Jouvelot, Gérard Memmi:
Modeling the energy consumption of programs: Thermal aspects and energy/frequency convexity rule (invited paper). WCSP 2017: 1-10 - [i7]Katarzyna Kapusta, Gérard Memmi, Hassan Noura:
An Efficient Keyless Fragmentation Algorithm for Data Protection. CoRR abs/1705.09872 (2017) - [i6]Katarzyna Kapusta, Gérard Memmi:
Data protection by means of fragmentation in various different distributed storage systems - a survey. CoRR abs/1706.05960 (2017) - 2016
- [c20]Katarzyna Kapusta, Gérard Memmi, Hassan Noura:
POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation. CCS 2016: 1745-1747 - [c19]Yanjun Sun, Gérard Memmi, Sylvie Vignes:
A Model-Based Testing Process for Enhancing Structural Coverage in Functional Testing. CSDM Asia 2016: 171-180 - [c18]Yanjun Sun, Gérard Memmi, Sylvie Vignes:
Model-Based Testing Directed by Structural Coverage and Functional Requirements. QRS Companion 2016: 284-291 - 2015
- [j5]Han Qiu, Gérard Memmi:
Fast Selective Encryption Methods for Bitmap Images. Int. J. Multim. Data Eng. Manag. 6(3): 51-69 (2015) - [c17]Katarzyna Kapusta, Gérard Memmi:
Data protection by means of fragmentation in distributed storage systems. CFIP/NOTERE 2015: 1-8 - [c16]Gérard Memmi, Katarzyna Kapusta, Han Qiu:
Data protection: Combining fragmentation, encryption, and dispersion. SSIC 2015: 1-9 - [i5]Karel De Vogeleer, Gérard Memmi, Pierre Jouvelot:
Parameter Sensitivity Analysis of the Energy/Frequency Convexity Rule for Nanometer-scale Application Processors. CoRR abs/1508.07740 (2015) - [i4]Gérard Memmi, Katarzyna Kapusta, Han Qiu:
Data Protection: Combining Fragmentation, Encryption, and Dispersion, an Intermediary report. CoRR abs/1512.02951 (2015) - 2014
- [c15]Han Qiu, Gérard Memmi:
Fast Selective Encryption Method for Bitmaps Based on GPU Acceleration. ISM 2014: 155-158 - [c14]Karel De Vogeleer, Gérard Memmi, Pierre Jouvelot, Fabien Coelho:
Modeling the temperature bias of power consumption for nanometer-scale CPUs in application processors. ICSAMOS 2014: 172-180 - [e1]Gérard Memmi, Ulf Blanke:
Mobile Computing, Applications, and Services - 5th International Conference, MobiCASE 2013, Paris, France, November 7-8, 2013, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 130, Springer 2014, ISBN 978-3-319-05451-3 [contents] - [i3]Karel De Vogeleer, Gérard Memmi, Pierre Jouvelot, Fabien Coelho:
The Energy/Frequency Convexity Rule: Modeling and Experimental Validation on Mobile Devices. CoRR abs/1401.4655 (2014) - [i2]Karel De Vogeleer, Gérard Memmi, Pierre Jouvelot, Fabien Coelho:
Modeling the Temperature Bias of Power Consumption for Nanometer-Scale CPUs in Application Processors. CoRR abs/1404.3381 (2014) - [i1]Karel De Vogeleer, Gérard Memmi, Pierre Jouvelot, Fabien Coelho:
The Impact of Surface Size on the Radiative Thermal Behavior of Embedded Systems. CoRR abs/1410.0628 (2014) - 2013
- [c13]Karel De Vogeleer, Gérard Memmi, Pierre Jouvelot, Fabien Coelho:
The Energy/Frequency Convexity Rule: Modeling and Experimental Validation on Mobile Devices. PPAM (1) 2013: 793-803
2000 – 2009
- 2006
- [c12]Miron Abramovici, Paul Bradley, Kumar N. Dwarakanath, Peter Levin, Gérard Memmi, Dave Miller:
A reconfigurable design-for-debug infrastructure for SoCs. DAC 2006: 7-12 - 2001
- [c11]Noel R. Strader, Gérard Memmi, Carl Pixley:
Application of Formal Verification to Design Creation and Implementation. ISQED 2001: 11
1990 – 1999
- 1997
- [j4]John Gintell, Gérard Memmi:
Lessons learned with ACME an environment integration experiment. ACM SIGSOFT Softw. Eng. Notes 22(2): 77-81 (1997) - 1994
- [c10]Li-Tao Chen, Gérard Memmi, Pascal Petit, Patrick Denimal:
Experiment and Performance Evaluation of a Distributed Collaboration System. MASCOTS 1994: 393-394 - 1993
- [c9]John Gintell, John E. Arnold, Michael Houde, Jacek Kruszelnicki, Roland McKenney, Gérard Memmi:
Scrutiny: A Collaborative Inspection and Review System. ESEC 1993: 344-360
1980 – 1989
- 1989
- [c8]Younes Souissi, Gérard Memmi:
Composition of nets via a communication medium. Applications and Theory of Petri Nets 1989: 457-470 - 1986
- [c7]Gérard Memmi, Jacques Vautherin:
Analysing Nets by the Invariant Method. Advances in Petri Nets 1986: 300-336 - 1985
- [j3]Gérard Memmi, Alain Finkel:
An Introduction to Fifo Nets-Monogeneous Nets: A Subclass of Fifo Nets. Theor. Comput. Sci. 35: 191-214 (1985) - 1984
- [c6]Jacques Vautherin, Gérard Memmi:
Computation of flows for unary-predicates/transition-nets. European Workshop on Applications and Theory in Petri Nets 1984: 455-467 - 1983
- [c5]Alain Finkel, Gérard Memmi:
Fifo nets: a new model of parallel computation. Theoretical Computer Science 1983: 111-121 - 1982
- [j2]Gérard Memmi, Yves Raillard:
Some New Results About the (d, k) Graph Problem. IEEE Trans. Computers 31(8): 784-791 (1982) - [c4]Gérard Memmi:
A Graph Theoretical Porperty for Minimal Deadlock. European Workshop on Applications and Theory of Petri Nets 1982: 221-228 - 1981
- [c3]Gérard Memmi:
Leakage Notion. Selected Papers from the First and the Second European Workshop on Application and Theory of Petri Nets 1981: 172-177
1970 – 1979
- 1979
- [c2]Gérard Memmi, Gérard Roucairol:
Linear Algebra in Net Theory. Advanced Course: Net Theory and Applications 1979: 213-223 - [c1]Gérard Memmi:
Notion de Dualité et de Symétrie dans les Réseuaux de Pétri. Semantics of Concurrent Computation 1979: 91-108 - 1978
- [j1]Gérard Memmi:
Fuites dans les réseaux de Petri. RAIRO Theor. Informatics Appl. 12(2): 125-144 (1978)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint