G. Bou Tayeh, J. Azar, A. Makhoul, C. Guyeux, and J. Demerjian. A Wearable LoRa-Based Emergency System for Remote Safety Monitoring. Proceedings of IWCMC 2020, . Limassol (Cyprus), June 15-19, 2020. (Rank B (Core)). pp. ***-***.
S. Leya Cerna Nahuis, C. Guyeux, H. Arcolezi, R. Couturier, G. Royer, and A. Lotufo. A Comparison of LSTM and XGBoost for Predicting Firemen Interventions. Proceedings of WorldCist'20, 8th World Conference on Information Systems and Technologies. Budva (Montenegro), April 7-10, 2020. pp. ***-***.
R. Mallouhy, C. Abou Jaoude, C. Guyeux, and A. Makhoul. Major earthquake event prediction using various machine learning algorithms. Proceedings of ICT-DM 2019, 6th International Conference on Information and Communication Technologies for Disaster Management. Paris (France), December 18-20, 2019. pp. ***-***.
C. Guyeux. Predicting the firemen interventions: a concrete case study. Proceedings of ENBIS 2019, European Network for Business and Industrial Statistics. Budapest (Hungary), September 2-4, 2019. (Abstract selection). pp. ***-***.
C. Guyeux, J.-M. Nicod, C. Varnier, Z. Al Masry, N. Zerhouni, N. Omri, and G. Royer. Firemen prediction by using neural networks: a real case study. Proceedings of IntelliSys 2019, Intelligent Systems Conference. London (United Kingdom), September 5-6, 2019. pp. ***-***.
L. Marangio and C. Guyeux. Entropy and Security of Pseudorandom Number Generators based on Chaotic Iterations. Proceedings of SECRYPT 19, 16th International Joint Conference on e-Business and Telecommunications. Prague (Czech Republic), July 26-28, 2019. (Rank rank B (Core)). pp. ***-***.
J.-F. Couchot, C. Guyeux, and G. Royer. Anonymously forecasting the number and nature of firefighting operations. Proceedings of IDEAS 2019, 23rd International Database Engineering & Applications Symposium. Athens (Greece), June 10-12, 2019. (Rank Rank B (Core)). pp. ***-***.
C. Guyeux. An update on the topological properties of asynchronous iterations. Proceedings of Pareng'19, The Sixth International Conference on Parallel, Distributed, GPU and Cloud Computing for Engineering. Pècs (Hungary), June 4-5, 2019. pp. ***-***.
C. Guyeux. An overview of asynchronous delay iterations: mathematical analysis and algorithms. Proceedings of CHAOS19, 12th CHAOS 2019 International Conference. Chania (Crete) (Greece), June 18-21, 2019. (Abstract selection). pp. ***-***.
S. Chrétien and C. Guyeux. Robust route planning in random networks using the Schroedinger bridge approach. Proceedings of MT-ITS 2019, 6th International Conference on Models and Technologies for Intelligent Transportation Systems. Kraków (Poland), June 5-7, 2019. (Abstract selection). pp. ***-***.
S. Chrétien and C. Guyeux. Efficient online Laplacian eigenmap computation for dimensionality reduction in molecular phylogeny via optimisation on the sphere. Proceedings of IWBBIO19, 7th International Work-Conference on Bioinformatics and Biomedical Engineering. Granada (Spain), May 8-10, 2019. pp. ***-***.
S. Leya Cerna Nahuis, C. Guyeux, H. Hwang Arcolezi, A. Diva Plasencia Lotufo, R. Couturier, and G. Royer. Long Short-Term Memory for Predicting Firemen Interventions. Proceedings of CoDIT'19, 6th IEEE International Conference on Control, Decision and Information Technologies. Paris (France), April 23-26, 2019. pp. ***-***.
N. Boudargham, J. Bou Abdo, J. Demerjian, A. Makhoul, and C. Guyeux. Efficient Cluster Based Routing Protocol for Collaborative Body Sensor Networks. Proceedings of Sensornets 2019, 8th International Conference on Sensor Networks. Prague (Czech Republic), February 26-27, 2019. pp. ***-***.
S. Chrétien, C. Guyeux, and O. Ho. Average performance analysis of the projected gradient method for online PCA. Proceedings of LOD 2018, The Fourth International Conference on Machine Learning, Optimization, and Data Science. Volterra (Italy), September 13-16, 2018. pp. ***-***.
S. Chrétien, C. Guyeux, and S. Moulin. $\ell_1$-penalised ordinal polytomous regression estimators with application to gene expression studies. Proceedings of WABI 2018, 18th International Workshop on Algorithms in Bioinformatics. Helsinki (Finland), August 20-24, 2018. (Rank B (core)). pp. 17:1--17:13.
S. Chrétien and C. Guyeux. Online shortest paths with confidence intervals for routing in a time varying random network. Proceedings of IJCNN 2018, 2018 International Joint Conference on Neural Networks, hosted by IEEE WCCI 2018, bi-annual IEEE World Congress on Computational Intelligence. Rio de Janeiro (Brazil), July 8-13, 2018. (Rank A). pp. ***-***.
L. Marangio, C. Guyeux, and J. Bahi. On the Collision Property of Chaotic Iterations Based Post-Treatments over Cryptographic Pseudorandom Number Generator. Proceedings of MenaComm 2018, IEEE Middle East & North Africa COMMunications Conference. Jounieh (Lebanon), April 18-20, 2018. pp. ***-***.
A. Tannoury, R. Darazi, A. Makhoul, and C. Guyeux. Ideal Wireless Multimedia Sensor Network deployment for disparity map calculation. Proceedings of MenaComm 2018, IEEE Middle East & North Africa COMMunications Conference. Jounieh (Lebanon), April 18-20, 2018. pp. ***-***.
N. Boudargham, J. Bou Abdo, J. Demerjian, C. Guyeux, and A. Makhoul. Efficient Cluster-Based Routing Algorithm for Body Sensor Networks. Proceedings of MenaComm 2018, IEEE Middle East & North Africa COMMunications Conference. Jounieh (Lebanon), April 18-20, 2018. pp. ***-***.
N. Boudargham, J. Bou Abdo, J. Demerjian, C. Guyeux, and A. Makhoul. Collaborative Body Sensor Networks: Taxonomy and Open Challenges. Proceedings of MenaComm 2018, IEEE Middle East & North Africa COMMunications Conference. Jounieh (Lebanon), April 18-20, 2018. pp. ***-***.
E. Khoury, M. Medlej, C. Abou Jaoude, and C. Guyeux. Novel Order preserving encryption Scheme for Wireless Sensor Networks. Proceedings of MenaComm 2018, IEEE Middle East & North Africa COMMunications Conference. Jounieh (Lebanon), April 18-20, 2018. pp. ***-***.
A. Abidi, C. Guyeux, and M. Machhout. The Dynamics of the CBC Mode of Operation. Proceedings of NOLTA 2017, 2017 International Symposium on Nonlinear Theory & Its Applications. Cancun (Mexico), December 4-7, 2017. pp. ***-***.
A. Abidi, C. Guyeux, B. Bouallègue, and M. Machhout. Conditions to have a well-disordered dynamics in the CBC Mode of Operation. Proceedings of CIMN 2017, First International Symposium of Computing, Informatics, Multimedia & Networking, held in conjunction with 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications. Hammamet (Tunisia), October/November 30-03, 2017. pp. 226-231.
N. Boudargham, J. Bou Abdo, J. Demerjian, and C. Guyeux. Exhaustive Study on Medical Sensors. Proceedings of SENSORCOMM 2017, The Eleventh International Conference on Sensor Technologies and Applications. Rome (Italy), September 10-14, 2017. pp. ***-***.
A. Tannoury, R. Darazi, C. Guyeux, and A. Makhoul. Efficient and accurate monitoring of the depth information in a Wireless Multimedia Sensor Network based surveillance. Proceedings of SENSET 2017, First International Conference on Sensors, Networks, Smart and Emerging Technologies. Beirut (Lebanon), September 12-14, 2017. pp. ***-***.
R. Garnier, C. Guyeux, and S. Chrétien. Finding optimal finite biological sequences over finite alphabets: the OptiFin toolbox. Proceedings of CIBCB 2017, IEEE International Conference on Computational Intelligence in Bioinformatics and Computational Biology. Manchester (UK), August 23-25, 2017. (Rank C). pp. ***-***.
M. Bakiri, J.-F. Couchot, and C. Guyeux. One random jump and one permutation: sufficient conditions to chaotic, statistically faultless, and large throughput PRNG for FPGA. Proceedings of SECRYPT 2017, 14th International Conference on Security and Cryptography. Madrid (Spain), July 24-26, 2017. (Rank B). Vol. 6, pp. 295-302.
A. Abidi, C. Guyeux, J. Demerjian, B. Bouallègue, and M. Machhout. Lyapunov exponent evaluation of the CBC mode of operation. Proceedings of CHAOS 2017, 10th CHAOS International Conference. Barcelona (Spain), May/June 30-02, 2017. pp. ***-***.
C. Guyeux, B. Al-Nuaimi, B. AlKindy, J.-F. Couchot, and M. Salomon. On the Ability to Reconstruct Ancestral Genomes from Mycobacterium Genus. Proceedings of IWBBIO 2017, 5th International Work-Conference on Bioinformatics and Biomedical Engineering. Granada (Spain), April 26-28, 2017. pp. 642-658.
Z. Lin, C. Guyeux, S. Yu, and Q. Wang. Design and evaluation of chaotic iterations based keyed hash function. Proceedings of ICISA 2017, 8th iCatse Conference on Information Science and Applications. Macau (China), March 20-23, 2017. Vol. 424, pp. 404-414.
N. Boudargham, J. Bou Abdo, J. Demerjian, C. Guyeux, and A. Makhoul. Investigating Low Level Protocols for Wireless Body Sensor Networks. Proceedings of AICCSA 2016, 13th ACS/IEEE International Conference on Computer Systems and Applications. Agadir (Morocco), November/December 29-02, 2016. (Rank C). pp. ***-***.
B. Al-Nuaimi, C. Guyeux, B. AlKindy, J.-F. Couchot, and M. Salomon. Relation between Gene Content and Taxonomy in Chloroplasts. Proceedings of ICBSB 2016, International Conference on Biomedical Signal and Bioinformatics. Auckland (New Zealand), November 21-24, 2016. Vol. 7(1), pp. 41-50.
A. Farhat, A. Makhoul, C. Guyeux, R. Tawil, A. Jaber, and A. Hijazi. On the topology effects in wireless sensor networks based prognostics and health management. Proceedings of CSE 2016, 19th IEEE International Conference on Computational Science and Engineering. Paris (France), August 24-26, 2016. pp. 335--342.
Z. Lin, C. Guyeux, Q. Wang, and S. Yu. Diffusion and confusion of chaotic iteration based hash functions. Proceedings of CSE 2016, 19th IEEE International Conference on Computational Science and Engineering. Paris (France), August 24-26, 2016. pp. 444--447.
A. Abidi, S. Tawbi, C. Guyeux, B. Bouallègue, and M. Machhout. Summary of Topological Study of Chaotic CBC Mode of Operation. Proceedings of CSE 2016, 19th IEEE International Conference on Computational Science and Engineering. Paris (France), August 24-26, 2016. pp. 436--443.
S. Barakat, B. Al Bouna, M. Nassar, and C. Guyeux. On the Evaluation of the Privacy Breach in Disassociated Set-Valued Datasets. Proceedings of SECRYPT 2016, 13th International Conference on Security and Cryptography. Lisbon (Portugal), July 26-28, 2016. (Rank B). pp. 318-326.
J.-F. Couchot, R. Couturier, Y. Fadil, and C. Guyeux. A Second Order Derivatives based Approach for Steganography. Proceedings of SECRYPT 2016, 13th International Conference on Security and Cryptography. Lisbon (Portugal), July 26-28, 2016. (Rank B, best poster award). Vol. 4, pp. 424-431.
M. Bakiri, J.-F. Couchot, and C. Guyeux. FPGA Implementation of F2-Linear Pseudorandom Number Generators based on Zynq MPSoC: A Chaotic Iterations Post Processing Case Study. Proceedings of SECRYPT 2016, 13th International Conference on Security and Cryptography. Lisbon (Portugal), July 26-28, 2016. (Rank B). Vol. 4, pp. ***-***.
A. Abidi, Q. Wang, B. Bouallègue, M. Machhout, and C. Guyeux. Quantitative Evaluation of Chaotic CBC Mode of Operation. Proceedings of ATSIP 2016, 2nd International Conference on Advanced Technologies for Signal and Image Processing. Monastir (Tunisia), March 21-24, 2016. pp. 88-92.
S. Chrétien and C. Guyeux. Using the Lasso for gene selection in bladder cancer data. Proceedings of CMStatistics 2015, 8th Int. Conf. of the ERCIM WG on Computational and Methodological Statistics. London (UK), December 12-14, 2015. (Extended abstract selection). pp. ***-***.
X. Fang, C. Guyeux, Q. Wang, and J. Bahi. Randomness and disorder of chaotic iterations. Applications in information security field. Proceedings of NOLTA 2015, 25th International Symposium on Nonlinear Theory and its Applications. Hong Kong (China), December 1-4, 2015. pp. 546-549.
S. Chrétien, C. Guyeux, M. Boyer-Guittaut, R. Delage-Mouroux, and F. Descôtes. Investigating gene expression array with outliers and missing data in bladder cancer. Proceedings of IWBHI 2015, International Workshop on Biomedical and Health Informatics, in conjunction with BIBM 2015. Washington D.C. (United States), November 2015. pp. 994-998.
Y. Fadil, J.-F. Couchot, R. Couturier, and C. Guyeux. Steganalyzer performances in operational contexts. Proceedings of IIH-MSP 2015, 11th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Adelaide (Australia), September 23-25, 2015. pp. 429-432.
R. Alsrraj, B. Alkindy, C. Guyeux, L. Philippe, and J.-F. Couchot. Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization. Proceedings of CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics. Naples (Italy), September 10-12, 2015. pp. ***-***.
B. Alkindy, C. Guyeux, J.-F. Couchot, M. Salomon, C. Parisod, and J. Bahi. Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes. Proceedings of AlCoB 2015, 2nd International Conference on Algorithms for Computational Biology. Mexico City (Mexico), August 2015. Vol. 9199, pp. 83-96.
H. Al-Nayyef, C. Guyeux, and J. Bahi. Taenia Biomolecular Phylogeny and the Impact of Mitochondrial Genes on this Latter. Proceedings of CIBCB 2015, 2015 IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology. Niagara Falls (Canada), August 12-15, 2015. (Rank C). pp. 1-7.
B. Alkindy, C. Guyeux, J.-F. Couchot, M. Salomon, and J. Bahi. Using Genetic Algorithm for Optimizing Phylogenetic Tree Inference in Plant Species. Proceedings of MCEB 2015, Mathematical and Computational Evolutionary Biology. Porquerolles Island (France), June 21-25, 2015. pp. ***-***.
S. Chrétien, C. Guyeux, B. Conesa, R. Delage-Mouroux, M. Jouvenot, P. Huetz, and F. Descôtes. Estimating features with missing values and outliers: a Bregman-proximal point algorithm for robust Non-negative Matrix Factorization with application to gene expression analysis. Proceedings of ISBRA 2015, Bioinformatics Research and Applications: 11th International Symposium on Bioinformatics Research and Applications. Norfolk, Virginia (USA), June 7-10, 2015. Vol. 9096, pp. 415.
R. Couturier, L. Ziane Khodja, and C. Guyeux. TSIRM: A Two-Stage Iteration with least-squares Residual Minimization algorithm to solve large sparse linear systems. Proceedings of IPDPSW 2015, 2015 IEEE International Parallel and Distributed Processing Symposium Workshop. Hyderabad (India), May 29, 2015. pp. 990-997.
H. Al'Nayyef, C. Guyeux, M. Petitjean, D. Hocquet, and J. Bahi. Relation between Insertion Sequences and Genome Rearrangements in Pseudomonas aeruginosa. Proceedings of IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering. Granada (Spain), April 15-17, 2015. Vol. 9043, pp. 426-437.
B. Alkindy, H. Al-Nayyef, C. Guyeux, J.-F. Couchot, M. Salomon, and J. Bahi. Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species. Proceedings of IWBBIO 2015, 3rd International Work-Conference on Bioinformatics and Biomedical Engineering. Granada (Spain), April 15-17, 2015. Vol. 9043, pp. 379-390.
W. Elghazel, K. Medjaher, N. Zerhouni, J. Bahi, A. Farhat, C. Guyeux, and M. Hakem. Random Forests for Industrial Device Functioning Diagnostics Using Wireless Sensor Networks. Proceedings of AERO 2015, 2015 IEEE Aerospace conference. Big Sky (Montana, USA), March 7-14, 2015. pp. 1-9.
B. Alkindy, C. Guyeux, J.-F. Couchot, M. Salomon, and J. Bahi. Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts. Proceedings of BIBM 2014, IEEE Int. Conf. on Bioinformatics and Biomedicine. Belfast (United Kingdom), November 2-5, 2014. pp. 71-74.
J.-F. Couchot, P.-C. Héam, C. Guyeux, Q. Wang, and J. Bahi. Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers. Proceedings of MONS 2014, 15th Mons Theoretical Computer Science Days. Nancy (France), September 23-26, 2014. (Extended abstract selection). pp. ***-***.
W. ElGhazel, K. Medjaher, C. Guyeux, M. Hakem, N. Zerhouni, and J. Bahi. Dependable wireless sensor networks for prognostics and health management: a survey. Proceedings of PHM 2014, Annual Conference of the Prognostics and Health Management Society. Fort Worth, Texas (USA), September/October 29-02, 2014. pp. ***-***.
C. Guyeux, Q. Wang, X. Fang, and J. Bahi. Introducing the truly chaotic finite state machines and theirs applications in security field. Proceedings of NOLTA 2014, 24th International Symposium on Nonlinear Theory and its Applications. Luzern (Switzerland), September 14-18, 2014. pp. ***-***.
H. Al'Nayyef, C. Guyeux, and J. Bahi. A Pipeline for Insertion Sequence Detection and Study for Bacterial Genome. Proceedings of GCB 2014, German Conference on Bioinformatics. Bielefeld (Germany), September/October 28-01, 2014. Vol. 235, pp. 85-98.
, and C. Guyeux. Chaotic Iteration Based Pseudorandom Number Generators. Proceedings of SDDE 2014, Symposium on Differential and Difference Equations 2014. Hamburg (Germany), September 5-8, 2014. (Abstract selection). pp. ***-***.
J.-F. Couchot, P.-C. Héam, C. Guyeux, Q. Wang, and J. Bahi. Pseudorandom Number Generators with Balanced Gray Codes. Proceedings of SECRYPT 2014, 11th Int. Conf. on Security and Cryptography. Vienna (Austria), August 28-30, 2014. (Rank B, poster). pp. 469-475.
R. Al-Sharif, C. Guyeux, Y. Fadil, A. Makhoul, and A. Jaber. On the usefulness of information hiding techniques for wireless sensor networks security. Proceedings of ADHOCNETS 2014, 6th Int. Conf. on Ad Hoc Networks. Rhodes (Greece), August 18-19, 2014. Vol. 140, pp. 51-62.
C. Guyeux, A. Makhoul, and J. Bahi. A Security Framework for Wireless Sensor Networks: Theory and Practice. Proceedings of WETICE 2014, 23rd IEEE WETICE Conference, 4th Track on Cyber Physical Society with SOA, BPM and Sensor Networks. Parma (Italy), June 23-25, 2014. (Rank B). pp. 269-274.
B. Alkindy, J.-F. Couchot, C. Guyeux, A. Mouly, M. Salomon, and J. Bahi. Finding the Core-Genes of Chloroplasts. Proceedings of ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science. Copenhagen (Denmark), June 18-20, 2014. Vol. 4(5), pp. 357-364.
J. Bahi, J.-F. Couchot, N. Friot, C. Guyeux, and K. Mazouzi. Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction. Proceedings of IIHMSP 2013, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing. Beijing (China), October 18-20, 2013. pp. 547-550.
J. Bahi, C. Guyeux, and P.-C. Héam. A Cryptographic Approach for Steganography. Proceedings of IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing. Beijing (China), October 18-20, 2013. pp. 518-521.
J. Bahi, N. Friot, and C. Guyeux. Topological study and Lyapunov exponent of a secure steganographic scheme. Proceedings of SECRYPT 2013, 10th Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE-The International Joint Conference on e-Business and Telecommunications. Reykjavik (Iceland), July 29-31, 2013. (Rank B). pp. 275-283.
J. Bahi, C. Guyeux, and A. Perasso. Predicting the Evolution of Gene ura3 in the Yeast Saccharomyces Cerevisiae. Proceedings of CSBio 2012, 3rd Int. Conf. on Computational Systems-Biology and Bioinformatics. Bangkok (Thailand), October 18-20, 2012. Vol. 11, pp. 4-16.
J. Bahi, N. Friot, and C. Guyeux. Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure. Proceedings of IIH-MSP 2012, 8-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing. Athens (Greece), July 18-20, 2012. pp. 359-362.
J. Bahi, J.-F. Couchot, N. Friot, and C. Guyeux. A Robust Data Hiding Process Contributing to the Development of a Semantic Web. Proceedings of INTERNET 2012, 4-th Int. Conf. on Evolving Internet. Venice (Italy), June 24-29, 2012. pp. 71-76.
J. Bahi, X. Fang, and C. Guyeux. An optimization technique on pseudorandom generators based on chaotic iterations. Proceedings of , 4-th Int. Conf. on Evolving Internet. Venice (Italy), June 24-29, 2012. pp. 31-36.
J. Bahi, J.-F. Couchot, and C. Guyeux. Steganography: a Class of Algorithms having Secure Properties. Proceedings of IIH-MSP 2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing. Dalian (China), October 14-16, 2011. pp. 109-112.
J. Bahi, X. Fang, C. Guyeux, and Q. Wang. On the design of a family of CI pseudo-random number generators. Proceedings of WICOM 2011, 7th Int. IEEE Conf. on Wireless Communications, Networking and Mobile Computing. Wuhan (China), September 14-16, 2011. (Rank B). pp. 1-4.
J. Bahi, C. Guyeux, A. Makhoul, and C. Pham. Secure scheduling of wireless video sensor nodes for surveillance applications. Proceedings of ADHOCNETS 11, 3rd Int. ICST Conference on Ad Hoc Networks. Paris (France), September 21-23, 2011. Vol. 89, pp. 1-15.
J. Bahi, J.-F. Couchot, C. Guyeux, and A. Richard. On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems. Proceedings of FCT 2011, 18th Int. Symp. on Fundamentals of Computation Theory. Oslo (Norway), August 22-25, 2011. (Rank A). Vol. 6914, pp. 126-137.
J. Bahi, N. Côté, and C. Guyeux. Chaos of Protein Folding. Proceedings of IJCNN 2011, Int. Joint Conf. on Neural Networks. San Jose, Californi (USA), July/August 31-5, 2011. pp. 1948-1954.
N. Friot, C. Guyeux, and J. Bahi. Chaotic Iterations for Steganography -- Stego-security and chaos-security. Proceedings of SECRYPT 2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE-The International Joint Conference on e-Business and Telecommunications. Sevilla (Spain), July 18-21, 2011. (Rank B). pp. 218-227.
J. Bahi, J.-F. Couchot, and C. Guyeux. Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations. Proceedings of INTERNET 2011, 3-rd Int. Conf. on Evolving Internet. Luxembourg (Luxembourg), June 2011. (best article award). pp. 52-57.
J. Bahi, J.-F. Couchot, C. Guyeux, and Q. Wang. Class of Trustworthy Pseudo Random Number Generators. Proceedings of INTERNET 2011, 3-rd Int. Conf. on Evolving Internet. Luxembourg (Luxembourg), June 19-24, 2011. pp. 72-77.
J. Bahi, C. Guyeux, and M. Salomon. Building a Chaotic Proven Neural Network. Proceedings of ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security. Maldives (Maldives), May 27-29, 2011. pp. ***-***.
C. Guyeux, N. Friot, and J. Bahi. Chaotic iterations versus Spread-spectrum: chaos and stego security. Proceedings of IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing. Darmstadt (Germany), October 15-17, 2010. pp. 208-211.
J. Bahi, C. Guyeux, and Q. Wang. A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application to Watermarking. Proceedings of WISM 2010, Int. Conf. on Web Information Systems and Mining. Sanya (China), October 27-29, 2010. (Rank B). Vol. 6318, pp. 202-211.
J. Bahi, C. Guyeux, and Q. Wang. Improving random number generators by chaotic iterations. Application in data hiding. Proceedings of ICCASM 2010, Int. Conf. on Computer Application and System Modeling. Taiyuan (China), October 22-24, 2010. Vol. 13, pp. 643-647.
Q. Wang, J. Bahi, C. Guyeux, and X. Fang. Randomness quality of CI chaotic generators. Application to Internet security. Proceedings of INTERNET'2010, 2nd Int. Conf. on Evolving Internet. Valencia (Spain), September 20-25, 2010. (best article award). pp. 125-130.
C. Guyeux and J. Bahi. An improved watermarking algorithm for Internet applications. Proceedings of INTERNET'2010, 2nd Int. Conf. on Evolving Internet. Valencia (Spain), September 20-25, 2010. pp. 119-124.
J. Bahi, C. Guyeux, and A. Makhoul. Secure Data Aggregation in Wireless Sensor Networks. Homomorphism versus Watermarking Approach. Proceedings of ADHOCNETS 2010, 2nd Int. Conf. on Ad Hoc Networks. Victoria (Canada), August 18-20, 2010. Vol. 49, pp. 344-358.
J. Bahi and C. Guyeux. Topological chaos and chaotic iterations, application to Hash functions. Proceedings of IJCNN'10, Int. Joint Conf. on Neural Networks, joint to WCCI'10, IEEE World Congress on Computational Intelligence. Barcelona (Spain), July 18-23, 2010. (Rank A, best article award). pp. 1-7.
J. Bahi, C. Guyeux, and A. Makhoul. Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks. Proceedings of SENSORCOMM 2010, 4-th Int. Conf. on Sensor Technologies and Applications. Venice (Italy), July 18-25, 2010. pp. 472-477.
J. Bahi and C. Guyeux. A new chaos-based watermarking algorithm. Proceedings of SECRYPT 2010, Int. conf. on security and cryptography. Athens (Greece), July 26-28, 2010. (Rank B). pp. 455-458.
J. Bahi, C. Guyeux, and Q. Wang. A novel pseudo-random generator based on discrete chaotic iterations. Proceedings of INTERNET 2009, First International Conference on Evolving Internet. Cannes (France), August 23-29, 2009. pp. 71-76.