Profil

LEPREVOST Franck

University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)

Main Referenced Co-authors
VARRETTE, Sébastien  (12)
CHITIC, Ioana Raluca  (8)
TOPAL, Ali Osman  (8)
BERNARD, Nicolas  (6)
Roch, J.-L. (6)
Main Referenced Keywords
Black-box attack (3); Computer Science (all) (3); Convolutional Neural Network (3); Convolutional neural network (3); Evolutionary Algorithm (3);
Main Referenced Unit & Research Centers
ULHPC - University of Luxembourg: High Performance Computing (8)
University of Luxembourg: CSC (2)
Main Referenced Disciplines
Mathematics (40)
Computer science (34)
Arts & humanities: Multidisciplinary, general & others (2)
Business & economic sciences: Multidisciplinary, general & others (1)
Chemical engineering (1)

Publications (total 70)

The most downloaded
361 downloads
Thanapol, P., Lavangnananda, K., Bouvry, P., Pinel, F., & Leprevost, F. (2020). Reducing overfitting and improving generalization in training convolutional neural network under limited sample sizes in image recognition. In 5th International Conference on Information Technology, Bangsaen 21-22 October 2020 (pp. 300-305). https://hdl.handle.net/10993/45107

The most cited

70 citations (Scopus®)

Howe, E., Leprévost, F., & Poonen, B. (2000). Large torsion subgroups of split Jacobians of curves of genus two or three. Forum Mathematicum, 12, 315-364. doi:10.1515/form.2000.008 https://hdl.handle.net/10993/12613

LEPREVOST, F.* , TOPAL, A. O.* , MANCELLARI, E.* , & LAVANGNANANDA, K.*. (2023). Zone-of-Interest Strategy for the Creation of High-Resolution Adversarial Images Against Convolutional Neural Networks. In 2023 15th International Conference on Information Technology and Electrical Engineering, ICITEE 2023 (pp. 127-132). Institute of Electrical and Electronics Engineers Inc. doi:10.1109/ICITEE59582.2023.10317668
Peer reviewed
* These authors have contributed equally to this work.

Topal, A. O., Chitic, I. R., & Leprevost, F. (11 May 2023). One evolutionary algorithm deceives humans and ten convolutional neural networks trained on ImageNet at image recognition. Applied Soft Computing, 143, 110397. doi:10.1016/j.asoc.2023.110397
Peer Reviewed verified by ORBi

LEPREVOST, F. (2023). Sur quelques évolutions récentes en cryptologie post-quantique. 1024 : Bulletin de la Société Informatique de France, (21), 185-197. doi:10.48556/sif.1024.21.185
Editorial reviewed

Chitic, I. R., Topal, A. O., & Leprevost, F. (22 March 2023). ShuffleDetect: Detecting Adversarial Images against Convolutional Neural Networks. Applied Sciences, 13 (6), 4068. doi:10.3390/app13064068
Peer Reviewed verified by ORBi

THANAPOL, P., LAVANGNANANDA, K., LEPREVOST, F., SCHLEICH, J., & BOUVRY, P. (2023). Scheduling Deep Learning Training in GPU Cluster Using the Model-Similarity-Based Policy. In N. T. Nguyen & B. Hnatkowska (Eds.), Intelligent Information and Database Systems - 15th Asian Conference, ACIIDS 2023, Proceedings. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-981-99-5837-5_30
Peer reviewed

Pulido-Gaytan, B., Tchernykh, A., LEPREVOST, F., BOUVRY, P., & Goldman, A. (2023). Toward Understanding Efficient Privacy-Preserving Homomorphic Comparison. IEEE Access, 11, 102189 - 102206. doi:10.1109/ACCESS.2023.3315655
Peer Reviewed verified by ORBi

LEPREVOST, F., TOPAL, A. O., & MANCELLARI, E. (2023). Creating High-Resolution Adversarial Images Against Convolutional Neural Networks with the Noise Blowing-Up Method. In N. T. Nguyen & B. Hnatkowska (Eds.), Intelligent Information and Database Systems - 15th Asian Conference, ACIIDS 2023, Proceedings (pp. 121-134). Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-981-99-5834-4_10
Peer reviewed

Leprevost, F., Topal, A. O., Avdusinovic, E., & Chitic, I. R. (2022). Strategy and Feasibility Study for the Construction of High Resolution Images Adversarial Against Convolutional Neural Networks. In ACIIDS 2022: Intelligent Information and Database Systems (pp. 285-298). Springer. doi:10.1007/978-3-031-21743-2_23
Peer reviewed

Leprevost, F., Topal, A. O., Avdusinovic, E., & Chitic, I. R. (22 October 2022). A strategy creating high-resolution adversarial images against convolutional neural networks and a feasibility study on 10 CNNs. Journal of Information and Telecommunication, 7 (1), 89-119. doi:10.1080/24751839.2022.2132586
Peer Reviewed verified by ORBi

Chitic, R., Topal, A. O., & Leprevost, F. (2022). Empirical Perturbation Analysis of Two Adversarial Attacks: Black Box versus White Box. Applied Sciences, 12 (14), 7339. doi:10.3390/app12147339
Peer reviewed

Chitic, I. R., Topal, A. O., & Leprevost, F. (2021). Evolutionary Algorithm-based images, humanly indistinguishable and adversarial against Convolutional Neural Networks: efficiency and filter robustness. IEEE Access. doi:10.1109/ACCESS.2021.3131255
Peer Reviewed verified by ORBi

Chitic, I. R., Deridder, N., Leprevost, F., & Bernard, N. (17 August 2021). Robustness of Adversarial Images against Filters. Optimization and Learning, 1443, 101-114.
Peer reviewed

Leprevost, F. (2021). Le rôle civilisationnel des universités. La Revue des Deux Mondes.

Leprevost, F. (2021). Universities and Civilizations. ISTE and Wiley.

Cortés-Mendoza, J., Tchernykh, A., Babenko, M., Pulido-Gaytan, L. B., Radchenko, G., Leprevost, F., Wang, X., & Avetisyan, A. (2020). Privacy-Preserving Logistic Regression as a Cloud Service Based on Residue Number System. In V. Voevodin & S. Sobolev (Eds.), 6th Russian Supercomputing Days, Moscow 21-22 September 2020 (pp. 598-610). Springer. doi:10.1007/978-3-030-64616-5_51
Peer reviewed

Chitic, I. R., Leprevost, F., & Bernard, N. (2020). Evolutionary algorithms deceive humans and machines at image classification: An extended proof of concept on two scenarios. Journal of Information and Telecommunication. doi:10.1080/24751839.2020.1829388
Peer Reviewed verified by ORBi

Thanapol, P., Lavangnananda, K., Bouvry, P., Pinel, F., & Leprevost, F. (2020). Reducing overfitting and improving generalization in training convolutional neural network under limited sample sizes in image recognition. In 5th International Conference on Information Technology, Bangsaen 21-22 October 2020 (pp. 300-305).
Peer reviewed

Leprevost, F. (2020). How big is big? How fast is fast? A Hands-On Tutorial on Mathematics of Computation. Amazon.

Chitic, R. I., Bernard, N., & Leprévost, F. (2020). A proof of concept to deceive humans and machines at image classification with evolutionary algorithms. In I. R. Chitic, N. Bernard, ... F. Leprévost, Proceedings of ACIIDS 2020 (pp. 467-480). Springer.
Peer reviewed

Bernard, N., & Leprévost, F. (2019). How Evolutionary Algorithms and Information Hiding deceive machines and humans for image recognition: A research program. In T. Theeramunkong, P. Bouvry (Ed.), ... P. Srichaikul (Ed.), Proceedings of the OLA'2019 International Conference on Optimization and Learning (Bangkok, Thailand, Jan 29-31, 2019) (pp. 12-15). Springer.
Peer reviewed

Bernard, N., & Leprévost, F. (2018). Evolutionary Algorithms for Convolutional Neural Network Visualisation. In E. Meneses, H. Castro, C. J. Barrios Hernández, ... R. Ramos-Pollan (Eds.), High Performance Computing -- 5th Latin American Conference, CARLA 2018, Piedecuesta, Colombia. Springer.
Peer reviewed

Leprévost, F., Bernard, N., & Bouvry, P. (2018). Elliptic Curves Discrete Logarithm Problem over a Finite Field Fp and p-adic Approximations. Proceedings of the 3rd International Conference on Applications in Information Technology (ICAIT-2018), 9-15. doi:10.1145/3274856.3274860
Peer reviewed

Leprévost, F. (2018). James Bond's Most Secret Weapon. Proceedings of the 3rd International Conference on Applications in Information Technology, 1-2. doi:10.1145/3274856.3274857
Peer reviewed

Leprévost, F. (2018). The University of Luxembourg: A National Excellence Initiative. In P. Altbach, L. Reisberg, J. Salmi, ... I. Froumin (Eds.), Accelerated Universities: A ideas and Money Combine to Build Academic Excellence (pp. 152-173). Netherlands: Brill.
Peer reviewed

Bernard, N., & Leprévost, F. (February 2013). Hardened Bloom Filters, with an Application to Unobservability. Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica, 12 (4), 11-22. doi:10.2478/v10065-012-0018-y
Peer reviewed

Klopotek, M., Leprévost, F., Marciniak, M., Mykowiecka, A., Rybinski, H., & Bouvry, P. (Eds.). (2012). Security and Intelligent Information Systems. Springer.

Bernard, N., & Leprévost, F. (2012). Beyond Tor: The TrueNyms Protocol. In Security and Intelligent Information Systems (pp. 68-84). Springer. doi:10.1007/978-3-642-25261-7_6
Peer reviewed

Leprévost, F., Pohst, M., & Uzunkol, O. (2011). On the Computation of Class Polynomials with "Thetanullwerte" and Its Applications to the Unit Group Computation. Experimental Mathematics, 20 (3), 271-281. doi:10.1080/10586458.2011.565234
Peer Reviewed verified by ORBi

Leprévost, F., Bernard, N., & Pohst, M. (2009). Jacobians of genus 2 curves with a rational point of order 11. Experimental Mathematics, 18 (1), 65-70. doi:10.1080/10586458.2009.10128884
Peer Reviewed verified by ORBi

Dumas, J.-G., Leprévost, F., Roch, J.-L., Savin, V., & Varrette, S. (2007). Cryptographie à Clef Publique. In T. Ebrahimi, F. Leprévost, ... B. Warusfel (Eds.), Cryptographie et sécurité des systèmes et réseaux, 2 (pp. 103-182). Cachan, Unknown/unspecified: Lavoisier.
Peer reviewed

Leprévost, F., Pohst, M., & Schöpp, A. (2007). Units in some parametric families of quartic fields. Acta Arithmetica, 127 (3), 205-216. doi:10.4064/aa127-3-1
Peer reviewed

Leprévost, F., Varrette, S., Roch, J.-L., & Dumas, J.-G. (2006). chap "Architectures PKI". In Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux. Lavoisier-Hermes.
Peer reviewed

Ebrahimi, T., Leprévost, F., & Warusfel, B. (Eds.). (2006). Cryptographie et sécurité des systèmes et réseaux. Hermès-Lavoisier.

Varrette, S., Roch, J.-L., & Leprévost, F. (2006). Applicative Solutions for Safe Computations in Distributed Environments. In Workshop "Trustworthy Software". Saarbrücken, Germany, Unknown/unspecified: Dagstuhl Research Online Publication Server (DROPS).
Peer reviewed

Ebrahimi, T., Leprévost, F., & Warusfel, B. (Eds.). (2006). Enjeux de la sécurité multimédia. Hermès-Lavoisier.

Leprévost, F., Ebrahimi, T., & Warusfel, B. (2006). Réalités de l'espionnage électronique. Lavoisier-Hermes.

Dumas, J.-G., Leprévost, F., Roch, J.-L., Savin, V., & Varrette, S. (2006). chap. "Cryptographie à Clé Publique". In Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux (pp. 103--196). Hermès.
Peer reviewed

Varrette, S., Roch, J.-L., Montagnat, J., Seitz, L., Pierson, J.-M., & Leprévost, F. (2006). Safe Distributed Architecture for Image-based Computer Assisted Diagnosis. In Proc. of the IEEE Intl. Conf. on Pervasive Services, Workshop on Health Pervasive Systems (HPS'06). Lyon, France, Unknown/unspecified: IEEE Computer Society. doi:10.1109/PERSER.2006.1652198
Peer reviewed

Varrette, S., Georget, S., Montagnat, J., Roch, J.-L., & Leprévost, F. (2005). Distributed Authentication in GRID5000. In Proc. of OTM Confederated Int. Workshops on Grid Computing and its Application to Data Analysis (GADA'05) (pp. 314-326). LNCS. doi:10.1007/11575863_51
Peer reviewed

Leprévost, F., Monnerat, J., Varrette, S., & Vaudenay, S. (2005). Generating anomalous elliptic curves. Information Processing Letters, 93, 225-230. doi:10.1016/j.ipl.2004.11.008
Peer Reviewed verified by ORBi

Varrette, S., Georget, S., Roch, J.-L., & Leprévost, F. (2005). Authentification Distribuée sur Grille de Grappes basée sur LDAP. In Proc. des 16èmes rencontres francophones du parallélisme (RenPar'16).
Peer reviewed

Varrette, S., Roch, J.-L., & Leprévost, F. (2004). FlowCert : Probabilistic certification for parallel processing on the grid. IEEE, editor. Proceedings of the 16th Symposium on Computer Architecture and High Performance Computing. IEEE-SBAC PAD 2004, Foz do Iguaçu, Brésil, octobre 2004, 108-115.
Peer reviewed

Varrette, S., Roch, J.-L., Denneulin, Y., & Leprévost, F. (2004). Secure architectures for clusters and grid computations. Proceedings de CRIS 2004 (2nd International Conference on Critical Infrastructures), Grenoble, France, Octobre 2004.
Peer reviewed

Leprévost, F., Pohst, M., & Schöpp, A. (2004). Rational torsion of J_0(N) for hyperelliptic modular curves and families of Jacobians of genus 2 and genus 3 curves with a rational point of order 5, 7 or 10. Abhandlungen aus dem Mathematischen Seminar der Universität Hamburg, 74, 193-203. doi:10.1007/BF02941535
Peer reviewed

Varrette, S., Roch, J.-L., Denneulin, Y., & Leprévost, F. (2004). Secure Architecture for Clusters and Grids. In Proc. of the 2nd Int. Conf. on Critical Infrastructures (CRIS 2004). Grenoble, France, Unknown/unspecified: IEEE.
Peer reviewed

Varrette, S., Roch, J.-L., & Leprévost, F. (2004). FlowCert : Probabilistic Certification for Peer-to-Peer Computations. In Proc. of the 16th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2004) (pp. 108--115). Foz do Iguaçu, Brazil, Unknown/unspecified: IEEE Computer Society. doi:10.1109/SBAC-PAD.2004.17
Peer reviewed

Leprévost, F., Pohst, M., & Schöpp, A. (2003). Familles de polynômes liées aux courbes modulaires X_1(l) unicursales et points rationnels non-triviaux de courbes elliptiques quotient. Acta Arithmetica, 110 (4), 401-410. doi:10.4064/aa110-4-6
Peer reviewed

Gillard, R., Leprévost, F., Pantchichkine, A., & Roblot, X. (2003). Utilisation des modules elliptiques de Drinfeld en cryptologie. Comptes Rendus. Mathématique, 336 (11), 879-882.
Peer Reviewed verified by ORBi

Leprévost, F. (2003). An Overview Of Public-Key Cryptology. DPP 2003: International Conference on Digital Production Printing and Industrial Applications.
Peer reviewed

Warusfel, B., & Leprévost, F. (2002). Cryptographie et lutte contre le terrorisme : éviter les fausses solutions sécuritaires. Droit et Défense.
Peer reviewed

Flynn, E. V., Leprévost, F., Schaefer, E. F., Stein, W., Stoll, M., & Wetherell, J. L. (2001). Empirical evidence for the Birch and Swinnerton-Dyer conjectures for the modular Jacobians of genus 2 curves. Mathematics of Computation, 70 (236), 1675-1697. doi:10.1090/S0025-5718-01-01320-5
Peer reviewed

Leprévost, F., & Warusfel, B. (2001). Echelon: origines et perspectives d'un débat transnational. Annuaire Français des Relations Internationales, 2, 865-888.
Peer reviewed

Howe, E., Leprévost, F., & Poonen, B. (2000). Large torsion subgroups of split Jacobians of curves of genus two or three. Forum Mathematicum, 12, 315-364. doi:10.1515/form.2000.008
Peer reviewed

Boxall, J., Grant, D., & Leprévost, F. (2000). Five torsion points on curves of genus two. Proceedings of the London Mathematical Society.
Peer Reviewed verified by ORBi

Ebrahimi, T., Erard, R., Kutter, M., Leprévost, F., & Santa Cruz, D. (2000). How to bypass the Wassenaar Arrangement: A new application for watermarking. Abstract book of 8th ACM International Multimedia Conference on Multimedia and Security, 161-164.
Peer reviewed

Leprévost, F. (1999). Sur certaines surfaces elliptiques et courbes elliptiques de Mordell de rang non-nul associées à des discriminants de polynômes cubiques ou quartiques. Journal of Number Theory, 78, 149-160.
Peer reviewed

Fermigier, S., Leprévost, F., & FIEKER, C. (1999). Appendice : quelques données statistiques. Journal of Number Theory, 78, 160-165.
Peer reviewed

Leprévost, F. (1999). AES und IEEE-P1363, die kryptographischen Standards des 21. Jahrhunderts. Tagungsband des 6. Deutschen IT-Sicherheitskongresses des BSI, 485-491.
Peer reviewed

Kutter, M., & Leprévost, F. (1999). Symbiose von Kryptographie und digitalen Wasserzeichen: effizienter Schutz des Urheberrechtes digitaler Medien. Tagungsband des 6. Deutschen IT-Sicherheitskongresses des BSI, 479-484.
Peer reviewed

Leprévost, F., & Markushevich, D. (1999). An infinite tower of genus 2 curves related to the Kowalewski top. Journal für die Reine und Angewandte Mathematik, 514, 103-111.
Peer reviewed

Leprévost, F. (1999). The modular points of a genus 2 quotient of X_0(67). Proceedings of the Finite Field Conference of the American Mathematical Society (Contemporary Mathematics), 245, 181-187.
Peer reviewed

Leprévost, F. (1999). Les standards cryptographiques du XXI-eme siecle : AES et IEEE-P1363. Gazette des Mathématiciens.
Peer reviewed

Leprévost, F. (1999). Peter Shor, prix Nevanlinna 1998. Gazette des Mathématiciens, 81.
Peer reviewed

Leprévost, F. (1997). Sur certains sous-groupes de torsion de Jacobiennes de courbes hyperelliptiques de genre g > 0. Manuscripta Mathematica, 92 (I), 47-63. doi:10.1007/BF02678180
Peer Reviewed verified by ORBi

Leprévost, F., & Morain, F. (1997). Revêtements de courbes elliptiques à multiplication complexe par des courbes hyperelliptiques et sommes de caractères. Journal of Number Theory, 64 (2), 165-182. doi:10.1006/jnth.1997.2070
Peer reviewed

Leprévost, F. (1997). Une caractérisation différentielle des points de Weierstrass généralisés d'une surface de Riemann compacte de genre g > 1. Journal de Mathématiques Pures et Appliquées, 76, 801-804. doi:10.1016/S0021-7824(97)89970-9
Peer Reviewed verified by ORBi

Leprévost, F. (1996). Sur une conjecture sur les points de torsion rationnels des Jacobiennes de courbes. Journal für die Reine und Angewandte Mathematik, 473, 59-68. doi:10.1515/crll.1995.473.59
Peer reviewed

Leprévost, F. (1995). Jacobiennes de certaines courbes de genre 2 : torsion et simplicité. Journal de Théorie des Nombres de Bordeaux, 7, 283-306.
Peer Reviewed verified by ORBi

Leprévost, F. (1992). Famille de courbes hyperelliptiques de genre g munies d'une classe de diviseurs rationnels d'ordre 2g^2+4g+1. Séminaire de Théorie des Nombres, 116, 107-119.
Peer reviewed

Leprévost, F. (1992). Torsion sur des familles de courbes de genre g. Manuscripta Mathematica, 75, 303-326. doi:10.1007/BF02567087
Peer Reviewed verified by ORBi

Contact ORBilu