jean-françois couchot
jean-françois couchot
Dr, Full Professor, Univ. of Bourgogne Franche-Comté, FEMTO-ST
Verified email at - Homepage
Cited by
Cited by
Survey on hardware implementation of random number generators on FPGA: Theory and experimental analyses
M Bakiri, C Guyeux, JF Couchot, AK Oudjida
Computer Science Review 27, 135-153, 2018
A hardware and secure pseudorandom generator for constrained devices
M Bakiri, C Guyeux, JF Couchot, L Marangio, S Galatolo
IEEE Transactions on Industrial Informatics 14 (8), 3754-3765, 2018
Using deep learning for image watermarking attack
MW Hatoum, JF Couchot, R Couturier, R Darazi
Signal Processing: Image Communication 90, 116019, 2021
Handling polymorphism in automated deduction
JF Couchot, S Lescuyer
International Conference on Automated Deduction, 263-278, 2007
Steganalysis via a convolutional neural network using large convolution filters for embedding process with same stego key: A deep learning approach for telemedicine
M Salomon, R Couturier, C Guyeux, JF Couchot, JM Bahi
European Research in Telemedicine/La Recherche Européenne en Télémédecine 6 …, 2017
Random sampling plus fake data: Multidimensional frequency estimates with local differential privacy
HH Arcolezi, JF Couchot, B Al Bouna, X Xiao
Proceedings of the 30th ACM International Conference on Information …, 2021
Blind digital watermarking in PDF documents using Spread Transform Dither Modulation
AW Bitar, R Darazi, JF Couchot, R Couturier
Multimedia Tools and Applications 76, 143-161, 2017
Forecasting the number of firefighter interventions per region with local-differential-privacy-based data
HH Arcolezi, JF Couchot, S Cerna, C Guyeux, G Royer, B Al Bouna, ...
Computers & Security 96, 101888, 2020
Scalable automated proving and debugging of set-based specifications
JF Couchot, D Déharbe, A Giorgetti, S Ranise
Journal of the Brazilian Computer Society 9, 17-36, 2003
Steganalysis via a convolutional neural network using large convolution filters for embedding process with same stego key
JF Couchot, R Couturier, C Guyeux, M Salomon
arXiv preprint arXiv:1605.07946, 2016
Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates
HH Arcolezi, JF Couchot, B Al Bouna, X Xiao
Digital Communications and Networks, 2022
Maximum network lifetime with optimal power/rate and routing trade-off for wireless multimedia sensor networks
N Khernane, JF Couchot, A Mostefaoui
Computer Communications 124, 1-16, 2018
CIPRNG: A VLSI Family of Chaotic Iterations Post-Processings for -Linear Pseudorandom Number Generation Based on Zynq MPSoC
M Bakiri, JF Couchot, C Guyeux
IEEE Transactions on Circuits and Systems I: Regular Papers 65 (5), 1628-1641, 2017
Steganography: a class of secure and robust algorithms
JM Bahi, JF Couchot, C Guyeux
The Computer Journal 55 (6), 653-666, 2012
Finding the core-genes of chloroplasts
B Alkindy, JF Couchot, C Guyeux, A Mouly, M Salomon, JM Bahi
arXiv preprint arXiv:1409.6369, 2014
Proving and debugging set-based specifications
JF Couchot, F Dadeau, D Déharbe, A Giorgetti, S Ranise
Electronic Notes in Theoretical Computer Science 95, 189-208, 2004
Anonymously forecasting the number and nature of firefighting operations
JF Couchot, C Guyeux, G Royer
Proceedings of the 23rd International Database Applications & Engineering …, 2019
On the link between strongly connected iteration graphs and chaotic boolean discrete-time dynamical systems
JM Bahi, JF Couchot, C Guyeux, A Richard
Fundamentals of Computation Theory: 18th International Symposium, FCT 2011 …, 2011
Gene similarity-based approaches for determining core-genes of chloroplasts
B AlKindy, C Guyeux, JF Couchot, M Salomon, JM Bahi
2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2014
Neural networks and chaos: Construction, evaluation of chaotic networks, and prediction of chaos with multilayer feedforward networks
JM Bahi, JF Couchot, C Guyeux, M Salomon
Chaos: An Interdisciplinary Journal of Nonlinear Science 22 (1), 2012
The system can't perform the operation now. Try again later.
Articles 1–20