Sorry, you need to enable JavaScript to visit this website.
Share

Publications

2018

  • Shannon et la théorie de l'information
    • Rioul Olivier
    , 2018. Analyse de la publication de C.E. Shannon, &quot;A mathematical Theory of Communication&quot;, The Bell System Technical Journal, Vol. 27, pp. 379–423, 623-656, July, October, 1948 (55 pages)</p> Dans ce texte fondateur de la théorie de l’information, Shannon définit la notion de communication, la fonde sur celle de probabilité, définit le terme bit comme mesure logarithmique de l’information, ainsi que la notion d’entropie informatique (par analogie avec celle de Boltzmann en physique statistique). Il définit aussi mathématiquement la capacité d’un canal de transmission : on peut transmettre l’information de façon fiable tant que le débit ne dépasse pas cette capacité – le bruit présent dans le canal ne limite pas la qualité de la communication, mais uniquement le débit de transmission.</p>
  • Experimental investigation of practical unforgeable quantum money
    • Bozzio Mathieu
    • Orieux Adeline
    • Trigo Vidarte Luis
    • Zaquine Isabelle
    • Kerenidis Iordanis
    • Diamanti Eleni
    npj Quantum Information, Nature, 2018, 4 (1). Wiesner's unforgeable quantum money scheme is widely celebrated as the first quantum information application. Based on the no-cloning property of quantum mechanics, this scheme allows for the creation of credit cards used in authenticated transactions offering security guarantees impossible to achieve by classical means. However, despite its central role in quantum cryptography, its experimental implementation has remained elusive because of the lack of quantum memories and of practical verification techniques. Here, we experimentally implement a quantum money protocol relying on classical verification that rigorously satises the security condition for unforgeability. Our system exploits polarization encoding of weak coherent states of light and operates under conditions that ensure compatibility with state-of-the-art quantum memories. We derive working regimes for our system using a security analysis taking into account all practical imperfections. Our results constitute a major step towards a real-world realization of this milestone protocol. (10.1038/s41534-018-0058-2)
    DOI : 10.1038/s41534-018-0058-2
  • Phase evolution of the direct detection noise figure of a nondegenerate fiber phase-sensitive amplifier
    • Labidi Tarek
    • Fsaifes Ihsan
    • Xie Weilin
    • Chatterjee Debanuj
    • Goldfarb Fabienne
    • Bretenaker Fabien
    Optics Letters, Optical Society of America - OSA Publishing, 2018, 43 (18), pp.4546. We experimentally investigate the evolution of the direct detection noise figure of a nondegenerate phase-sensitive amplifier based on a nonlinear fiber, as a function of the relative phase between the signal, idler, and pump, all other parameters remaining fixed. The use of a fiber with a high stimulated Brillouin scattering threshold permits us to investigate the full range of phase-sensitive gain and noise figure without pump dithering. Good agreement is found with theory, both for signal only and combined signal and idler direct detections. (10.1364/OL.43.004546)
    DOI : 10.1364/OL.43.004546
  • Attribute‐based broadcast encryption scheme for lightweight devices
    • Canard Sébastien
    • Hieu Phan Duong
    • Trinh Viet Cuong
    IET Information Security, Institution of Engineering and Technology, 2018, 12 (1), pp.52-59. (10.1049/iet-ifs.2017.0157)
    DOI : 10.1049/iet-ifs.2017.0157
  • Segmentation of pelvic vessels in pediatric MRI using a patch-based deep learning approach
    • Virzi Alessio
    • Gori Pietro
    • Muller Cécile
    • Mille Eva
    • Peyrot Quoc
    • Berteloot Laureline
    • Boddaert Nathalie
    • Sarnacki Sabine
    • Bloch Isabelle
    , 2018, LNCS 11076, pp.97-106. In this paper, we propose a patch-based deep learning ap- proach to segment pelvic vessels in 3D MRI images of pediatric patients. For a given T2 weighted MRI volume, a set of 2D axial patches are extracted using a limited number of user-selected landmarks. In order to take into account the volumetric information, successive 2D axial patches are combined together, producing a set of pseudo RGB color images. These RGB images are then used as input for a convolutional neural network (CNN), pre-trained on the ImageNet dataset, which re- sults into both segmentation and vessel labeling as veins or arteries. The proposed method is evaluated on 35 MRI volumes of pediatric patients, obtaining an average segmentation accuracy in terms of Average Sym- metric Surface Distance of ASSD = 0.89 ± 0.07 mm and Dice Index of DC = 0.79 ± 0.02.
  • Nonnegative Matrix Factorization
    • Badeau Roland
    • Virtanen Tuomas
    , 2018, pp.131-160.
  • Remembered events are unexpected (Commentary on Mahr \& Csibra: Why do we remember? The communicative function of episodic memory)
    • Dessalles Jean-Louis
    Behavioral and Brain Sciences, Cambridge University Press (CUP), 2018, 41, pp.22. We remember a small proportion of our experiences as events. Are these events selected because they are useful and can be proven true, or rather because they are unexpected? (10.1017/S0140525X17001315)
    DOI : 10.1017/S0140525X17001315
  • «Informathique»
    • Zayana Karim
    • Croix Edwige
    Au fil des maths, APMEP, 2018. Essai sur la didactique de l'informatique, en lien avec les mathématiques
  • Lecture on Continuous-Variable Quantum Key Distribution
    • Alleaume Romain
    , 2018.
  • Ultrafast and nonlinear dynamics of InAs/GaAs semiconductor quantum dot lasers
    • Grillot Frédéric
    • Arsenijevic Dejan
    • Huang Heming
    • Bimberg Dieter
    , 2018.
  • Bubbles of Trust: a decentralized Blockchain-based authentication system for IoT
    • Hammi Mohamed T.
    • Hammi Badis
    • Bellot Patrick
    • Serhrouchni Ahmed
    Computers & Security, Elsevier, 2018, pp.15. Internet of Things becomes a major part of our lives, billions of autonomous devices are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes the boundaries between the real and the virtual worlds. The Wireless Sensor Networks are a masterpiece of the success of this technology, using limited capacity sensors and actuators, industrial, medical, agricultural and many other environments can be covered and managed automatically. This autonomous interacting things should authenticate each other, and communicate securely. Otherwise malicious users can cause serious damages on such systems. In this paper we propose a robust, transparent, flexible and energy efficient blockchain-based authentication mechanism called BCTrust, which is designed especially for devices with computational, storage and energy consumption constraints. In order to evaluate our approach, we realized a real implementation with C programming language, and Ethereum Blockchain.
  • A Safe Communication Protocol for IoT Devices
    • Hammi Mohamed T.
    • Livolant Erwan
    • Bellot Patrick
    • Minet Pascale
    • Serhrouchni Ahmed
    Annals of Telecommunications - annales des télécommunications, Springer, 2018, pp.15. The Internet of Things (IoT) has overturned the information technology world. This new phenomenon is becoming inescapable and already covers almost all fields, from watchmaking to automated factories. IoT simplifies our everyday life and creates value for people and businesses. Things, also called entities, are very heterogeneous, use different communication technologies and, generally, are limited capacity devices. Therefore securing such systems raises many challenges. Communicating entities should authenticate each other and protect the integrity and the confidentiality of the data they exchange while using lightweight, fast and energy-efficient algorithms. In this paper, we propose a robust security protocol, designed especially for constrained IoT devices. We carried out a real implementation and the obtained results prove the efficiency of our protocol.
  • Behaviour Driven Development for Hardware Design
    • Diepenbeck Melanie
    • Kühne Ulrich
    • Soeken Mathias
    • Grosse Daniel
    • Drechsler Rolf
    IPSJ Transactions on System LSI Design Methodology, 2018, 11, pp.29-45. (10.2197/ipsjtsldm.11.29)
    DOI : 10.2197/ipsjtsldm.11.29
  • Weakly Supervised Representation Learning for Unsynchronized Audio-Visual Events
    • Parekh Sanjeel
    • Essid Slim
    • Ozerov Alexey
    • Duong Ngoc Q K
    • Pérez Patrick
    • Richard Gael
    , 2018. Audiovisual representation learning is an important task from the perspective of designing machines with the ability to understand complex events. To this end, we propose a novel multimodal framework that instantiates multiple instance learning. We show that the learnt representations are useful for classifying events and localizing their characteristic audiovisual elements. The system is trained using only video-level event labels without any timing information. An important feature of our method is its capacity to learn from unsynchronized audiovisual events. We achieve state-of-the-art results on a large-scale dataset of weakly-labeled audio event videos. Visualizations of localized visual regions and audio segments substantiate our system's efficacy, especially when dealing with noisy situations where modality-specific cues appear asynchronously.
  • Semiconductor quantum dot lasers epitaxially grown on silicon with low linewidth enhancement factor
    • Duan J.
    • Huang H.
    • Jung D.
    • Zhang Z.
    • Norman J.
    • Bowers J. E.
    • Grillot F.
    Applied Physics Letters, American Institute of Physics, 2018, 112 (25), pp.251111. This work reports on the ultra-low linewidth enhancement factor (αH-factor) of semiconductor quantum dot lasers epitaxially grown on silicon. Owing to the low density of threading dislocations and resultant high gain, an αH value of 0.13 that is rather independent of the temperature range (288 K–308 K) is measured. Above the laser threshold, the linewidth enhancement factor does not increase extensively with the bias current which is very promising for the realization of future integrated circuits including high performance laser sources. (10.1063/1.5025879)
    DOI : 10.1063/1.5025879
  • High-speed per-flow software monitoring with limited resources
    • Zhang Tianzhu
    • Linguaglossa Leonardo
    • Gallo Massimo
    • Giaccone Paolo
    • Rossi Dario
    , 2018.
  • Practical Random Linear Coding for MultiPath TCP: MPC-TCP
    • Paul-Louis Ageneau
    • Boukhatem Nadia
    • Gerla Mario
    , 2018. MPTCP is a TCP extension that enables transparent multipath for multihomed hosts. However, MPTCP is subject to head-of-line blocking, a problem that degrades delay and throughput. This problem is especially critical when used in wireless environments. On wireless, unreliable links, for example, traffic can get stalled on one path, slowing down the entire flow. A related problem is rescheduling the packets in other subflows too early, which could result in increased overhead. Random linear network coding is a potential approach to solve this problem among others, and we choose to focus in its practical capability to attenuate performance drops caused by blocking while guaranteeing full network compatibility. We have developed a version of MPTCP with network coding, MPC-TCP (MultiPath Coded TCP) and implemented it in the Linux kernel. This scheme offers a simple, practical implementation of network coding across subflows, requires minimal changes to MPTCP and preserves the TCP subflows compatibility with middleboxes. We then use our implementation to investigate the network scenarios where efficiency gains are the highest compared to vanilla MPTCP.
  • Integral estimation based on Markovian design
    • Azaïs Romain
    • Delyon Bernard
    • Portier François
    Advances in Applied Probability, Applied Probability Trust, 2018, 50 (3), pp.833-857. Suppose that a mobile sensor describes a Markovian trajectory in the ambient space. At each time the sensor measures an attribute of interest, e.g., the temperature. Using only the location history of the sensor and the associated measurements, the aim is to estimate the average value of the attribute over the space. In contrast to classical probabilistic integration methods, e.g., Monte Carlo, the proposed approach does not require any knowledge on the distribution of the sensor trajectory. Probabilistic bounds on the convergence rates of the estimator are established. These rates are better than the traditional "root n"-rate, where n is the sample size, attached to other probabilistic integration methods. For finite sample sizes, the good behaviour of the procedure is demonstrated through simulations and an application to the evaluation of the average temperature of oceans is considered. (10.1017/apr.2018.38)
    DOI : 10.1017/apr.2018.38
  • Training and Compensation of Class-conditioned NMF Bases for Speech Enhancement
    • Chung Hanwook
    • Badeau Roland
    • Plourde Eric
    • Champagne Benoît
    Neurocomputing, Elsevier, 2018. In this paper, we introduce a training and compensation algorithm of the class-conditioned basis vectors in the non-negative matrix factorization (NMF) model for single-channel speech enhancement. The main goal is to estimate the basis vectors of different signal sources in a way that prevents them from representing other sources, in order to reduce the residual noise components that have features similar to the speech signal. During the proposed training stage, the basis matrices for the clean speech and noises are estimated jointly by constraining them to belong to different classes. To this end, we employ the probabilistic generative model (PGM) of classification, specified by class-conditional densities, as an a priori distribution for the basis vectors. The update rules of the NMF and the PGM parameters of classification are jointly obtained by using the variational Bayesian expectation-maximization (VBEM) algorithm, which guarantees convergence to a stationary point. Another goal of the proposed algorithm is to handle a mismatch between the characteristics of the training and test data. This is accomplished during the proposed enhancement stage, where we implement a basis compensation scheme. Specifically, we use extra free basis vectors to capture the features which are not included in the training data. Objective experimental results for different combination of speaker and noise types show that the proposed algorithm can provide better speech enhancement performance than the benchmark algorithms under various conditions.
  • Perceived dynamic range of HDR images with no semantic information
    • Hulusic Vedad
    • Valenzise Giuseppe
    • Dufaux Frédéric
    , 2018, 30 (14), pp.1-6. Computing dynamic range of high dynamic range (HDR) content is an important procedure when selecting the test material , designing and validating algorithms, or analyzing aesthetic attributes of HDR content. It can be computed on a pixel-based level, measured through subjective tests or predicted using a mathematical model. However, all these methods have certain limitations. This paper investigates whether dynamic range of modeled images with no semantic information, but with the same first order statistics as the original, natural content, is perceived the same as for the corresponding natural images. If so, it would be possible to improve the perceived dynamic range (PDR) pre-dictor model by using additional objective metrics, more suitable for such synthetic content. Within the subjective study, three experiments were conducted with 43 participants. The results show significant correlation between the mean opinion scores for the two image groups. Nevertheless, natural images still seem to provide better cues for evaluation of PDR. (10.2352/ISSN.2470-1173.2018.14.HVEI-507)
    DOI : 10.2352/ISSN.2470-1173.2018.14.HVEI-507
  • Parallel Combining: Benefits of Explicit Synchronization
    • Aksenov Vitaly
    • Kuznetsov Petr
    • Shalyto Anatoly
    , 2018, pp.11:1-11:16. (10.4230/LIPIcs.OPODIS.2018.11)
    DOI : 10.4230/LIPIcs.OPODIS.2018.11
  • Task Computability in Unreliable Anonymous Networks
    • Kuznetsov Petr
    • Yanagisawa Nayuta
    , 2018, pp.23:1-23:13. (10.4230/LIPIcs.OPODIS.2018.23)
    DOI : 10.4230/LIPIcs.OPODIS.2018.23
  • Method, device, and computer program for improving transmission of encoded media data
    • Denoual Franck
    • Mazé Frédéric
    • Le Feuvre J.
    • Ouedraogo Nael
    , 2018.
  • Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures
    • Bringer Julien
    • Chabanne Hervé
    • Le Métayer Daniel
    • Lescuyer Roch
    Transactions on Data Privacy, IIIA-CSIC, 2018, 11 (2), pp.111-137. The goal of the work presented in this paper is to show the applicability of the privacy by design approach to biometric systems and the benefit of using formal methods to this end. We build on a general framework for the definition and verification of privacy architectures introduced at STM 2014 and show how it can be adapted to biometrics. The choice of particular techniques and the role of the components (central server, secure module, biometric terminal, smart card, etc.) in the architecture have a strong impact on the privacy guarantees provided by a biometric system. Some architectures have already been analysed but on a case by case basis, which makes it difficult to draw comparisons and to provide a rationale for the choice of specific options. In this paper, we describe the application of a general privacy architecture framework to specify different design options for biometric systems and to reason about them in a formal way.
  • Spoofing Attack and Surveillance Game in Geo-location Database Driven Spectrum Sharing
    • Nguyen-Thanh Nhan
    • Ta Duc-Tuyen
    • Nguyen van Tam
    IET Communications, Institution of Engineering and Technology, 2018. The geo-location database (GDB) driven is the enforcement method for dynamic spectrum sharing in TV White Space and 3.5 GHz spectrum bands, as well as a preferred option for the other spectrum sharing applications. Although providing accurate and reliable spectrum information services, the GDB driven spectrum sharing suffers from a critical security threat of spoofing attack. Under a spoofing attack, an adversary could spoof either the identification (ID) or the location information in its request messages. This breaks the fairness and reduces the efficiency of the GDB driven spectrum sharing system. In order to counteract the location and ID spoofing attacks, we consider the location verification of request messages and the ID verification of communicating data. Because a resource manager and an adversary are independent and self-interested, we formulate two corresponding surveillance games to analyze the conflict interaction between spoofing attack and the countermeasures. By expressing the surveillance game on requests’ location in a strategic form and representing the surveillance game on data ID in a sequence form, we find out Nash equilibrium. The analytical and numerical results show that a resource manager can mitigate the spoofing attack by adequately adapting its penalty policy and surveillance strategy.