100,000 Mycobacterium tuberculosis genomes, what for? C Guyeux International Work-Conference on Bioinformatics and Biomedical Engineering, 2022 | | 2022 |
5G Impact on Biomedical Engineering-Wireless Technologies Applications K Challita, N Boudargham, A Makhoul, C Guyeux Management of Collaborative BSN in Smart Environments, 18, 2022 | | 2022 |
A Bregman Proximal ADMM for NMF with Outliers: Estimating features with missing values and outliers: a Bregman-proximal point algorithm for robust Non-negative Matrix … S Chrétien, C Guyeux, B Conesa, R Delage-Mouroux, M Jouvenot, ... arXiv preprint arXiv:1502.02523, 2015 | | 2015 |
A Bregman-proximal point algorithm for robust non-negative matrix factorization with possible missing values and outliers-application to gene expression analysis S Chrétien, C Guyeux, B Conesa, R Delage-Mouroux, M Jouvenot, ... BMC bioinformatics 17, 623-631, 2016 | 8 | 2016 |
A chaos-based approach for information hiding security JM Bahi, C Guyeux arXiv preprint arXiv:1005.0704, 2010 | 6 | 2010 |
A chaos-based approach for information hiding security. arXiv JM Bahi, C Guyeux April, 2010 | 6 | 2010 |
A chaos-based approach for information hiding security. arXiv No 0034939 JM Bahi, C Guyeux April, 2010 | 8 | 2010 |
A clustering package for nucleotide sequences using Laplacian Eigenmaps and Gaussian Mixture Model M Bruneau, T Mottet, S Moulin, M Kerbiriou, F Chouly, S Chretien, ... Computers in biology and medicine 93, 66-74, 2018 | 14 | 2018 |
A clustering tool for nucleotide sequences using Laplacian Eigenmaps and Gaussian Mixture Models M Bruneau, T Mottet, S Moulin, M Kerbiriou, F Chouly, S Chretien, ... arXiv preprint arXiv:1610.08227, 2016 | | 2016 |
A Comparative Stud of Predictive Models for Pharmaceutical Sales Data J Renaud, R Couturier, C Guyeux, B Courjal, G Christine 2022 2nd International Conference on Computer, Control and Robotics (ICCCR …, 2022 | 3 | 2022 |
A comparison of LSTM and XGBoost for predicting firemen interventions S Cerna, C Guyeux, HH Arcolezi, R Couturier, G Royer World Conference on Information Systems and Technologies, 424-434, 2020 | 19 | 2020 |
A Complete Security Framework for Wireless Sensor Networks C Guyeux, A Makhoul, S Tawbi, JM Bahi | | |
A complete security framework for wireless sensor networks: theory and practice C Guyeux, A Makhoul, I Atoui, S Tawbi, JM Bahi International Journal of Information Technology and Web Engineering (IJITWE …, 2015 | 13* | 2015 |
A complexity approach for steganalysis JM Bahi, C Guyeux, PC Heam arXiv preprint arXiv:1112.5245, 2011 | 1 | 2011 |
A critical review on the implementation of static data sampling techniques to detect network attacks S Hajj, R El Sibai, JB Abdo, J Demerjian, C Guyeux, A Makhoul, D Ginhac IEEE Access 9, 138903-138938, 2021 | 6 | 2021 |
A cryptographic approach for steganography JM Bahi, C Guyeux, PC Heam 2013 Ninth International Conference on Intelligent Information Hiding and …, 2013 | 3 | 2013 |
A data-driven approach to transfer operators in nonlinear dynamics using neural networks L Marangio, C Guyeux International Conference of the ERCIM WG on Computational and Methodological …, 2018 | | 2018 |
A hardware and secure pseudorandom generator for constrained devices M Bakiri, C Guyeux, JF Couchot, L Marangio, S Galatolo IEEE Transactions on Industrial Informatics 14 (8), 3754-3765, 2018 | 56 | 2018 |
A methodology for emergency calls severity prediction: From pre-processing to BERT-based classifiers M Abi Kanaan, JF Couchot, C Guyeux, D Laiymani, T Atechian, R Darazi IFIP International Conference on Artificial Intelligence Applications and …, 2023 | 3 | 2023 |
A new chaos-based watermarking algorithm C Guyeux, JM Bahi 2010 International Conference on Security and Cryptography (SECRYPT), 1-4, 2010 | 9 | 2010 |