关注
Christophe Guyeux
Christophe Guyeux
Femto-ST Institute, Université de Bourgogne Franche-Comté, France
在 univ-fcomte.fr 的电子邮件经过验证 - 首页
标题
引用次数
年份
100,000 Mycobacterium tuberculosis genomes, what for?
C Guyeux
International Work-Conference on Bioinformatics and Biomedical Engineering, 2022
2022
5G Impact on Biomedical Engineering-Wireless Technologies Applications
K Challita, N Boudargham, A Makhoul, C Guyeux
Management of Collaborative BSN in Smart Environments, 18, 2022
2022
A Bregman Proximal ADMM for NMF with Outliers: Estimating features with missing values and outliers: a Bregman-proximal point algorithm for robust Non-negative Matrix …
S Chrétien, C Guyeux, B Conesa, R Delage-Mouroux, M Jouvenot, ...
arXiv preprint arXiv:1502.02523, 2015
2015
A Bregman-proximal point algorithm for robust non-negative matrix factorization with possible missing values and outliers-application to gene expression analysis
S Chrétien, C Guyeux, B Conesa, R Delage-Mouroux, M Jouvenot, ...
BMC bioinformatics 17, 623-631, 2016
82016
A chaos-based approach for information hiding security
JM Bahi, C Guyeux
arXiv preprint arXiv:1005.0704, 2010
62010
A chaos-based approach for information hiding security. arXiv
JM Bahi, C Guyeux
April, 2010
62010
A chaos-based approach for information hiding security. arXiv No 0034939
JM Bahi, C Guyeux
April, 2010
82010
A clustering package for nucleotide sequences using Laplacian Eigenmaps and Gaussian Mixture Model
M Bruneau, T Mottet, S Moulin, M Kerbiriou, F Chouly, S Chretien, ...
Computers in biology and medicine 93, 66-74, 2018
142018
A clustering tool for nucleotide sequences using Laplacian Eigenmaps and Gaussian Mixture Models
M Bruneau, T Mottet, S Moulin, M Kerbiriou, F Chouly, S Chretien, ...
arXiv preprint arXiv:1610.08227, 2016
2016
A Comparative Stud of Predictive Models for Pharmaceutical Sales Data
J Renaud, R Couturier, C Guyeux, B Courjal, G Christine
2022 2nd International Conference on Computer, Control and Robotics (ICCCR …, 2022
32022
A comparison of LSTM and XGBoost for predicting firemen interventions
S Cerna, C Guyeux, HH Arcolezi, R Couturier, G Royer
World Conference on Information Systems and Technologies, 424-434, 2020
192020
A Complete Security Framework for Wireless Sensor Networks
C Guyeux, A Makhoul, S Tawbi, JM Bahi
A complete security framework for wireless sensor networks: theory and practice
C Guyeux, A Makhoul, I Atoui, S Tawbi, JM Bahi
International Journal of Information Technology and Web Engineering (IJITWE …, 2015
13*2015
A complexity approach for steganalysis
JM Bahi, C Guyeux, PC Heam
arXiv preprint arXiv:1112.5245, 2011
12011
A critical review on the implementation of static data sampling techniques to detect network attacks
S Hajj, R El Sibai, JB Abdo, J Demerjian, C Guyeux, A Makhoul, D Ginhac
IEEE Access 9, 138903-138938, 2021
62021
A cryptographic approach for steganography
JM Bahi, C Guyeux, PC Heam
2013 Ninth International Conference on Intelligent Information Hiding and …, 2013
32013
A data-driven approach to transfer operators in nonlinear dynamics using neural networks
L Marangio, C Guyeux
International Conference of the ERCIM WG on Computational and Methodological …, 2018
2018
A hardware and secure pseudorandom generator for constrained devices
M Bakiri, C Guyeux, JF Couchot, L Marangio, S Galatolo
IEEE Transactions on Industrial Informatics 14 (8), 3754-3765, 2018
562018
A methodology for emergency calls severity prediction: From pre-processing to BERT-based classifiers
M Abi Kanaan, JF Couchot, C Guyeux, D Laiymani, T Atechian, R Darazi
IFIP International Conference on Artificial Intelligence Applications and …, 2023
32023
A new chaos-based watermarking algorithm
C Guyeux, JM Bahi
2010 International Conference on Security and Cryptography (SECRYPT), 1-4, 2010
92010
系统目前无法执行此操作,请稍后再试。
文章 1–20