Gérard Memmi
Articles
Experimental Assessment and Biaffine Modeling of the Impact of Ambient Temperature on SoC Power Requirements,
SAMOS 2024, Samos (Greece), Greece
SAMOS 2024, Samos (Greece), Greece
Designing a unique revision loop updating courses simultaneously on different MOOC platforms,
LWMOOCS 2023, Cambridge (MA), US, United States
LWMOOCS 2023, Cambridge (MA), US, United States
The Devil Hides in the Model: Reviewing Blockchain and BFT Protocols,
BLOCKCHAIN 2022, L'Aquila, Italy
BLOCKCHAIN 2022, L'Aquila, Italy
Blockchain Performance Benchmarking: a VCG Auction Smart Contract Use Case for Ethereum and Tezos (Short Paper),
FAB 2021 - Fourth International Symposium on Foundations and Applications of Blockchain 2021, Davis / Virtual, United States
FAB 2021 - Fourth International Symposium on Foundations and Applications of Blockchain 2021, Davis / Virtual, United States
The StakeCube blockchain : Instantiation, Evaluation & Applications,
BCCA 2020 - International Conference on Blockchain Computing and Applications 2020, Virtual, Türkiye
BCCA 2020 - International Conference on Blockchain Computing and Applications 2020, Virtual, Türkiye
ChainIDE 2.0: Facilitating Smart Contract Development for Consortium Blockchain,
INFOCOM Workshops 2020
INFOCOM Workshops 2020
DC Coefficients Recovery from AC Coefficients in the JPEG Compression Scenario,
SmartCom 2019, Birmingham, United Kingdom
SmartCom 2019, Birmingham, United Kingdom
Secure Data Sharing with Fast Access Revocation through Untrusted Clouds,
NTMS 2019, CANARY ISLANDS, France
NTMS 2019, CANARY ISLANDS, France
Poster Abstract: Secure Data Sharing by Means of Fragmentation, Encryption, and Dispersion,
INFOCOM Workshops 2019, Paris, France
INFOCOM Workshops 2019, Paris, France
Reinforcing Protection Against Chosen-Plaintext Attack Using Ciphertext Fragmentation in Multi-cloud Environments,
CSCloud/EdgeCom 2019, Paris, France
CSCloud/EdgeCom 2019, Paris, France
A Fast and Scalable Fragmentation Algorithm For Data Protection For Multi-Storage Over Independent Locations,
Esorics’18, STM workshop 2018, Barcelona, Spain
Esorics’18, STM workshop 2018, Barcelona, Spain
A Dynamic Scalable Blockchain Based Communication Architecture for IoT,
SmartBlock 2018, Tokyo, Japan
SmartBlock 2018, Tokyo, Japan
POSTER: Circular AON: A very fast Scheme to protect Encrypted Data Against Key Exposure,
ACM CCS’18 2018, Toronto, Canada
ACM CCS’18 2018, Toronto, Canada
Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure,
CSS 2018, Amalfi, Italy
CSS 2018, Amalfi, Italy
Enhancing data protection with a structure-wise fragmentation and dispersal of encrypted data,
TrustCom'18 2018, New-York, United States
TrustCom'18 2018, New-York, United States
Secure and Resilient Scheme for Data Protection in Unattanded Wireless Sensor Networks,
1st IEEE-IFIP CSNet 2017, Rio de Janero, Brazil
1st IEEE-IFIP CSNet 2017, Rio de Janero, Brazil
An Efficient Secure Storage Scheme Based on Information Fragmentation,
CSCloud 2017, New-York, United States
CSCloud 2017, New-York, United States
Experimental energy profiling of energy-critical embedded applications,
SoftCOM 2017, Radisson Blu Resort Split, Croatia
SoftCOM 2017, Radisson Blu Resort Split, Croatia
Modeling the energy consumption of programs: thermal aspects and Energy/Frequency Convexity Rule,
The Ninth International Conference on Wireless Communications and Signal Processing (WCSP 2017) 2017, Nanjing, China
The Ninth International Conference on Wireless Communications and Signal Processing (WCSP 2017) 2017, Nanjing, China
POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation,
CCS 2016, Vienna, Austria
CCS 2016, Vienna, Austria
A Model-Based Testing Process for Enhancing Structural Coverage in Functional Testing,
CSDM Asia 2016, Singapore, Singapore
CSDM Asia 2016, Singapore, Singapore
Model-Based Verification Directed by Structural Coverage and Functional Requirements,
Model-Based Verification & Validation (MVV) 2016, Vienna, Austria
Model-Based Verification & Validation (MVV) 2016, Vienna, Austria
Data protection by means of fragmentation in distributed storage systems,
CFIP/NOTERE 2015, Paris, France
CFIP/NOTERE 2015, Paris, France
Modeling the temperature bias of power consumption for nanometer-scale CPUs in application processors,
ICSAMOS 2014, Samos, Greece
ICSAMOS 2014, Samos, Greece
Computation of flows for unary-predicates/transition-nets,
European Workshop on Applications and Theory in Petri Nets 1984
European Workshop on Applications and Theory in Petri Nets 1984
Journal articles
NFA: A neural factorization autoencoder based online telephony fraud detection,
Digit. Commun. Networks 2024
Digit. Commun. Networks 2024
Wangiri Fraud: Pattern Analysis and Machine-Learning-Based Detection,
IEEE Internet of Things Journal 2023
IEEE Internet of Things Journal 2023
Adversarial Attacks Against Network Intrusion Detection in IoT Systems,
IEEE Internet Things J. 2021
IEEE Internet Things J. 2021
Toward Secure and Efficient Deep Learning Inference in Dependable IoT Systems,
IEEE Internet Things J. 2021
IEEE Internet Things J. 2021
A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT,
IEEE Trans. Cloud Comput. 2021
IEEE Trans. Cloud Comput. 2021
Deep Residual Learning-Based Enhanced JPEG Compression in the Internet of Things,
IEEE Trans. Ind. Informatics 2021
IEEE Trans. Ind. Informatics 2021
Topological Graph Convolutional Network-Based Urban Traffic Flow and Density Prediction,
IEEE Trans. Intell. Transp. Syst. 2021
IEEE Trans. Intell. Transp. Syst. 2021
Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0,
IEEE J. Biomed. Health Informatics 2020
IEEE J. Biomed. Health Informatics 2020
All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives,
Information Sciences 2019
Information Sciences 2019
An efficient key distribution system for data fusion in V2X heterogeneous networks,
Information Fusion 2019
Information Fusion 2019
Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks,
Annals of Telecommunications - annales des télécommunications 2019
Annals of Telecommunications - annales des télécommunications 2019
DC coefficient recovery for JPEG images in ubiquitous communication systems,
Future Generation Computer Systems 2019
Future Generation Computer Systems 2019
Parameter sensitivity analysis of the Energy/Frequency Convexity Rule for application processors,
Journal of Sustainable Computing, Informatics and Systems 2017
Journal of Sustainable Computing, Informatics and Systems 2017
CONNEXION : Éléments de méthodologie de vérification et validation. Épisode 1 : relever les principaux défis,
Génie logiciel : le magazine de l'ingénierie du logiciel et des systèmes 2014
Génie logiciel : le magazine de l'ingénierie du logiciel et des systèmes 2014
Deux retours d’expérience avec la méthodologie SCRUM,
Génie logiciel : le magazine de l'ingénierie du logiciel et des systèmes 2011
Génie logiciel : le magazine de l'ingénierie du logiciel et des systèmes 2011
Reports
Editorships
Knowledge Science, Engineering and Management - 15th International Conference, KSEM 2022, Singapore, August 6-8, 2022, Proceedings, Part I,
['KSEM', 'Lecture Notes in Computer Science'] 2022
['KSEM', 'Lecture Notes in Computer Science'] 2022
Knowledge Science, Engineering and Management - 15th International Conference, KSEM 2022, Singapore, August 6-8, 2022, Proceedings, Part II,
['KSEM', 'Lecture Notes in Computer Science'] 2022
['KSEM', 'Lecture Notes in Computer Science'] 2022
Knowledge Science, Engineering and Management - 15th International Conference, KSEM 2022, Singapore, August 6-8, 2022, Proceedings, Part III,
['KSEM', 'Lecture Notes in Computer Science'] 2022
['KSEM', 'Lecture Notes in Computer Science'] 2022
Mobile Computing, Applications, and Services - 5th International Conference, MobiCASE 2013, Paris, France, November 7-8, 2013, Revised Selected Papers,
['MobiCASE', 'Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering'] 2014
['MobiCASE', 'Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering'] 2014
Generated using
minifold
and minifold-lincs
at 2025-03-31 17:01.