- Advanced Graph Neural Networks
- Graph Theory and Algorithms
- Security in Wireless Sensor Networks
- Complex Network Analysis Techniques
- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Data Management and Algorithms
- Network Security and Intrusion Detection
- Graph Labeling and Dimension Problems
- Opportunistic and Delay-Tolerant Networks
- Opinion Dynamics and Social Influence
- Advanced Graph Theory Research
- graph theory and CDMA systems
- Cryptography and Data Security
- Vehicular Ad Hoc Networks (VANETs)
- Energy Harvesting in Wireless Networks
- Web Data Mining and Analysis
- Advanced Authentication Protocols Security
- Service-Oriented Architecture and Web Services
- Graph theory and applications
- Advanced Image and Video Retrieval Techniques
- Anomaly Detection Techniques and Applications
- Air Traffic Management and Optimization
- Caching and Content Delivery
- IPv6, Mobility, Handover, Networks, Security
Centre National de la Recherche Scientifique
2015-2025
LabEx PERSYVAL-Lab
2014-2025
Université Claude Bernard Lyon 1
2016-2025
Laboratoire d'Informatique en Images et Systèmes d'Information
2016-2025
Institut National des Sciences Appliquées de Lyon
2022-2025
Université de Technologie de Compiègne
2004-2007
Bioingénierie et Dynamique Microbienne aux Interfaces Alimentaires
2006
Heuristics and Diagnostics for Complex Systems
2003-2005
École Nationale Supérieure d'Informatique
2003
The backbone extraction process is pivotal in expediting analysis and enhancing visualization network applications. This study systematically compares seven influential statistical hypothesis-testing edge filtering methods (Disparity Filter (DF), Polya Urn (PF), Marginal Likelihood (MLF), Noise Corrected (NC), Enhanced Configuration Model (ECM), Global Statistical Significance (GloSS), Locally Adaptive Network Sparsification (LANS)) across diverse networks. A similarity reveals that...
Advanced Persistent Threats (APTs) represent a significant challenge in cybersecurity due to their sophisticated and stealthy nature. Traditional Intrusion Detection Systems (IDS) often fall short detecting these multi-stage attacks. Recently, Graph Neural Networks (GNNs) have been employed enhance IDS capabilities by analyzing the complex relationships within networked data. However, existing GNN-based solutions are hampered high false positive rates substantial resource consumption. In...
Abstract Networks are essential for analyzing complex systems. However, their growing size necessitates backbone extraction techniques aimed at reducing while retaining critical features. In practice, selecting, implementing, and evaluating the most suitable method may be challenging. This paper introduces , a Python package designed assessing performance of in weighted networks. Its comparison framework is standout feature . Indeed, tool incorporates state-of-the-art techniques....
Data on how Stone Age communities conceived domestic and utilitarian structures are limited to a few examples of schematic non-accurate representations various-sized built spaces. Here, we report the exceptional discovery up-to-now oldest realistic plans that have been engraved stones. These engravings from Jordan Saudi Arabia depict ‘desert kites’, humanmade archaeological mega-traps dated at least 9,000 years ago for oldest. The extreme precision these is remarkable, representing gigantic...
Securing a wireless communication has generally vital importance, particularly when this is in hostile environment like sensor networks (WSNs). The problem how to create cryptographic keys between nodes ensure secure communications. Limited resources of make public key cryptosystem such as RSA not feasible. So, most solutions rely on symmetric cryptosystem. In paper, we propose new management scheme based cryptography which well adapted the specific properties WSNs. evaluation our solution...