.png)
Research
Research Areas
Ce champ ne comporte pas de données en ce moment.
Research Networks
Ce champ ne comporte pas de données en ce moment.
Publications
of
2026
Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning
Youcef Korichi, Josée Desharnais, Sébastien Gambs, Nadia Tawbi
Youcef Korichi, Josée Desharnais, Sébastien Gambs, Nadia Tawbi
Chapitre de livre
Book chapter
2025
GRAND : Graph Reconstruction from Potential Partial Adjacency and Neighborhood Data
Sofiane Azogagh, Zelma Aubin Birba, Josée Desharnais, Sébastien Gambs, Marc-Olivier Killijian, Nadia Tawbi
Sofiane Azogagh, Zelma Aubin Birba, Josée Desharnais, Sébastien Gambs, Marc-Olivier Killijian, Nadia Tawbi
Document de conférence
Conference paper
2024
Guide sur les conditions et bonnes pratiques pour la mise en place d’une identité numérique nationale
Félix Gariépy, Benoit Dupont, Céline Castets-Renard, Hugo Loiseau, Lyse Langlois, Nadia Tawbi, et al.
Félix Gariépy, Benoit Dupont, Céline Castets-Renard, Hugo Loiseau, Lyse Langlois, Nadia Tawbi, et al.
Rapport
Report
2024
Leveraging Transformer Architecture for Effective Trajectory-User Linking (TUL) Attack and Its Mitigation
Youcef Korichi, Josée Desharnais, Sébastien Gambs, Nadia Tawbi
Youcef Korichi, Josée Desharnais, Sébastien Gambs, Nadia Tawbi
Chapitre de livre
Book chapter
2023
Unsupervised User-Based Insider Threat Detection Using Bayesian Gaussian Mixture Models
Bertrand S., Desharnais J., Tawbi N.
Bertrand S., Desharnais J., Tawbi N.
2023 20th Annual International Conference on Privacy, Security and Trust, PST 2023
Document de conférence
Conference paper
2022
Unsupervised User-Based Insider Threat Detection Using Bayesian Gaussian Mixture Models
Bertran S., Desharnai J., Tawbi N.
Bertran S., Desharnai J., Tawbi N.
arXiv
Autre
Other
2021
Toward Semantic-Based Android Malware Detection Using Model Checking and Machine Learning
El Hatib S., Ricaud L., Desharnais J., Tawbi N.
El Hatib S., Ricaud L., Desharnais J., Tawbi N.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Document de conférence
Conference paper
2020
Digital Waste Disposal: an automated framework for analysis of spam
emails
Tawbi N.
Tawbi N.
Int. J. Inf. Sec.
Article de revue
Journal article
2020
Toward Semantic-Based Android Malware Detection Using Model Checking
and Machine Learning
Tawbi N.
Tawbi N.
Risks and Security of Internet and Systems - 15th International Conference,
CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers
Document de conférence
Conference paper
Ce champ ne comporte pas de données en ce moment.
Fields of interest
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.