LEPREVOST, F.* , TOPAL, A. O.* , MANCELLARI, E.* , & LAVANGNANANDA, K.*. (2023). Zone-of-Interest Strategy for the Creation of High-Resolution Adversarial Images Against Convolutional Neural Networks. In 2023 15th International Conference on Information Technology and Electrical Engineering, ICITEE 2023 (pp. 127-132). Institute of Electrical and Electronics Engineers Inc. doi:10.1109/ICITEE59582.2023.10317668 Peer reviewed * These authors have contributed equally to this work. |
Topal, A. O., Chitic, I. R., & Leprevost, F. (11 May 2023). One evolutionary algorithm deceives humans and ten convolutional neural networks trained on ImageNet at image recognition. Applied Soft Computing, 143, 110397. doi:10.1016/j.asoc.2023.110397 Peer Reviewed verified by ORBi |
LEPREVOST, F. (2023). Sur quelques évolutions récentes en cryptologie post-quantique. 1024 : Bulletin de la Société Informatique de France, (21), 185-197. doi:10.48556/sif.1024.21.185 Editorial reviewed |
Chitic, I. R., Topal, A. O., & Leprevost, F. (22 March 2023). ShuffleDetect: Detecting Adversarial Images against Convolutional Neural Networks. Applied Sciences, 13 (6), 4068. doi:10.3390/app13064068 Peer Reviewed verified by ORBi |
THANAPOL, P., LAVANGNANANDA, K., LEPREVOST, F., SCHLEICH, J., & BOUVRY, P. (2023). Scheduling Deep Learning Training in GPU Cluster Using the Model-Similarity-Based Policy. In N. T. Nguyen & B. Hnatkowska (Eds.), Intelligent Information and Database Systems - 15th Asian Conference, ACIIDS 2023, Proceedings. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-981-99-5837-5_30 Peer reviewed |
Pulido-Gaytan, B., Tchernykh, A., LEPREVOST, F., BOUVRY, P., & Goldman, A. (2023). Toward Understanding Efficient Privacy-Preserving Homomorphic Comparison. IEEE Access, 11, 102189 - 102206. doi:10.1109/ACCESS.2023.3315655 Peer Reviewed verified by ORBi |
LEPREVOST, F., TOPAL, A. O., & MANCELLARI, E. (2023). Creating High-Resolution Adversarial Images Against Convolutional Neural Networks with the Noise Blowing-Up Method. In N. T. Nguyen & B. Hnatkowska (Eds.), Intelligent Information and Database Systems - 15th Asian Conference, ACIIDS 2023, Proceedings (pp. 121-134). Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-981-99-5834-4_10 Peer reviewed |
Leprevost, F., Topal, A. O., Avdusinovic, E., & Chitic, I. R. (2022). Strategy and Feasibility Study for the Construction of High Resolution Images Adversarial Against Convolutional Neural Networks. In ACIIDS 2022: Intelligent Information and Database Systems (pp. 285-298). Springer. doi:10.1007/978-3-031-21743-2_23 Peer reviewed |
Leprevost, F., Topal, A. O., Avdusinovic, E., & Chitic, I. R. (22 October 2022). A strategy creating high-resolution adversarial images against convolutional neural networks and a feasibility study on 10 CNNs. Journal of Information and Telecommunication, 7 (1), 89-119. doi:10.1080/24751839.2022.2132586 Peer Reviewed verified by ORBi |
Chitic, R., Topal, A. O., & Leprevost, F. (2022). Empirical Perturbation Analysis of Two Adversarial Attacks: Black Box versus White Box. Applied Sciences, 12 (14), 7339. doi:10.3390/app12147339 Peer reviewed |
Chitic, I. R., Topal, A. O., & Leprevost, F. (2021). Evolutionary Algorithm-based images, humanly indistinguishable and adversarial against Convolutional Neural Networks: efficiency and filter robustness. IEEE Access. doi:10.1109/ACCESS.2021.3131255 Peer Reviewed verified by ORBi |
Chitic, I. R., Deridder, N., Leprevost, F., & Bernard, N. (17 August 2021). Robustness of Adversarial Images against Filters. Optimization and Learning, 1443, 101-114. Peer reviewed |
Leprevost, F. (2021). Le rôle civilisationnel des universités. La Revue des Deux Mondes. |
Leprevost, F. (2021). Universities and Civilizations. ISTE and Wiley. |
Cortés-Mendoza, J., Tchernykh, A., Babenko, M., Pulido-Gaytan, L. B., Radchenko, G., Leprevost, F., Wang, X., & Avetisyan, A. (2020). Privacy-Preserving Logistic Regression as a Cloud Service Based on Residue Number System. In V. Voevodin & S. Sobolev (Eds.), 6th Russian Supercomputing Days, Moscow 21-22 September 2020 (pp. 598-610). Springer. doi:10.1007/978-3-030-64616-5_51 Peer reviewed |
Chitic, I. R., Leprevost, F., & Bernard, N. (2020). Evolutionary algorithms deceive humans and machines at image classification: An extended proof of concept on two scenarios. Journal of Information and Telecommunication. doi:10.1080/24751839.2020.1829388 Peer Reviewed verified by ORBi |
Thanapol, P., Lavangnananda, K., Bouvry, P., Pinel, F., & Leprevost, F. (2020). Reducing overfitting and improving generalization in training convolutional neural network under limited sample sizes in image recognition. In 5th International Conference on Information Technology, Bangsaen 21-22 October 2020 (pp. 300-305). Peer reviewed |
Leprevost, F. (2020). How big is big? How fast is fast? A Hands-On Tutorial on Mathematics of Computation. Amazon. |
Chitic, R. I., Bernard, N., & Leprévost, F. (2020). A proof of concept to deceive humans and machines at image classification with evolutionary algorithms. In I. R. Chitic, N. Bernard, ... F. Leprévost, Proceedings of ACIIDS 2020 (pp. 467-480). Springer. Peer reviewed |
Bernard, N., & Leprévost, F. (2019). How Evolutionary Algorithms and Information Hiding deceive machines and humans for image recognition: A research program. In T. Theeramunkong, P. Bouvry (Ed.), ... P. Srichaikul (Ed.), Proceedings of the OLA'2019 International Conference on Optimization and Learning (Bangkok, Thailand, Jan 29-31, 2019) (pp. 12-15). Springer. Peer reviewed |
Bernard, N., & Leprévost, F. (2018). Evolutionary Algorithms for Convolutional Neural Network Visualisation. In E. Meneses, H. Castro, C. J. Barrios Hernández, ... R. Ramos-Pollan (Eds.), High Performance Computing -- 5th Latin American Conference, CARLA 2018, Piedecuesta, Colombia. Springer. Peer reviewed |
Leprévost, F., Bernard, N., & Bouvry, P. (2018). Elliptic Curves Discrete Logarithm Problem over a Finite Field Fp and p-adic Approximations. Proceedings of the 3rd International Conference on Applications in Information Technology (ICAIT-2018), 9-15. doi:10.1145/3274856.3274860 Peer reviewed |
Leprévost, F. (2018). James Bond's Most Secret Weapon. Proceedings of the 3rd International Conference on Applications in Information Technology, 1-2. doi:10.1145/3274856.3274857 Peer reviewed |
Leprévost, F. (2018). The University of Luxembourg: A National Excellence Initiative. In P. Altbach, L. Reisberg, J. Salmi, ... I. Froumin (Eds.), Accelerated Universities: A ideas and Money Combine to Build Academic Excellence (pp. 152-173). Netherlands: Brill. Peer reviewed |
Bernard, N., & Leprévost, F. (February 2013). Hardened Bloom Filters, with an Application to Unobservability. Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica, 12 (4), 11-22. doi:10.2478/v10065-012-0018-y Peer reviewed |
Klopotek, M., Leprévost, F., Marciniak, M., Mykowiecka, A., Rybinski, H., & Bouvry, P. (Eds.). (2012). Security and Intelligent Information Systems. Springer. |
Bernard, N., & Leprévost, F. (2012). Beyond Tor: The TrueNyms Protocol. In Security and Intelligent Information Systems (pp. 68-84). Springer. doi:10.1007/978-3-642-25261-7_6 Peer reviewed |
Leprévost, F., Pohst, M., & Uzunkol, O. (2011). On the Computation of Class Polynomials with "Thetanullwerte" and Its Applications to the Unit Group Computation. Experimental Mathematics, 20 (3), 271-281. doi:10.1080/10586458.2011.565234 Peer Reviewed verified by ORBi |
Leprévost, F., Bernard, N., & Pohst, M. (2009). Jacobians of genus 2 curves with a rational point of order 11. Experimental Mathematics, 18 (1), 65-70. doi:10.1080/10586458.2009.10128884 Peer Reviewed verified by ORBi |
Dumas, J.-G., Leprévost, F., Roch, J.-L., Savin, V., & Varrette, S. (2007). Cryptographie à Clef Publique. In T. Ebrahimi, F. Leprévost, ... B. Warusfel (Eds.), Cryptographie et sécurité des systèmes et réseaux, 2 (pp. 103-182). Cachan, Unknown/unspecified: Lavoisier. Peer reviewed |
Leprévost, F., Pohst, M., & Schöpp, A. (2007). Units in some parametric families of quartic fields. Acta Arithmetica, 127 (3), 205-216. doi:10.4064/aa127-3-1 Peer reviewed |
Leprévost, F., Varrette, S., Roch, J.-L., & Dumas, J.-G. (2006). chap "Architectures PKI". In Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux. Lavoisier-Hermes. Peer reviewed |
Ebrahimi, T., Leprévost, F., & Warusfel, B. (Eds.). (2006). Cryptographie et sécurité des systèmes et réseaux. Hermès-Lavoisier. |
Varrette, S., Roch, J.-L., & Leprévost, F. (2006). Applicative Solutions for Safe Computations in Distributed Environments. In Workshop "Trustworthy Software". Saarbrücken, Germany, Unknown/unspecified: Dagstuhl Research Online Publication Server (DROPS). Peer reviewed |
Ebrahimi, T., Leprévost, F., & Warusfel, B. (Eds.). (2006). Enjeux de la sécurité multimédia. Hermès-Lavoisier. |
Leprévost, F., Ebrahimi, T., & Warusfel, B. (2006). Réalités de l'espionnage électronique. Lavoisier-Hermes. |
Dumas, J.-G., Leprévost, F., Roch, J.-L., Savin, V., & Varrette, S. (2006). chap. "Cryptographie à Clé Publique". In Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux (pp. 103--196). Hermès. Peer reviewed |
Varrette, S., Roch, J.-L., Montagnat, J., Seitz, L., Pierson, J.-M., & Leprévost, F. (2006). Safe Distributed Architecture for Image-based Computer Assisted Diagnosis. In Proc. of the IEEE Intl. Conf. on Pervasive Services, Workshop on Health Pervasive Systems (HPS'06). Lyon, France, Unknown/unspecified: IEEE Computer Society. doi:10.1109/PERSER.2006.1652198 Peer reviewed |
Varrette, S., Georget, S., Montagnat, J., Roch, J.-L., & Leprévost, F. (2005). Distributed Authentication in GRID5000. In Proc. of OTM Confederated Int. Workshops on Grid Computing and its Application to Data Analysis (GADA'05) (pp. 314-326). LNCS. doi:10.1007/11575863_51 Peer reviewed |
Leprévost, F., Monnerat, J., Varrette, S., & Vaudenay, S. (2005). Generating anomalous elliptic curves. Information Processing Letters, 93, 225-230. doi:10.1016/j.ipl.2004.11.008 Peer Reviewed verified by ORBi |
Varrette, S., Georget, S., Roch, J.-L., & Leprévost, F. (2005). Authentification Distribuée sur Grille de Grappes basée sur LDAP. In Proc. des 16èmes rencontres francophones du parallélisme (RenPar'16). Peer reviewed |
Varrette, S., Roch, J.-L., & Leprévost, F. (2004). FlowCert : Probabilistic certification for parallel processing on the grid. IEEE, editor. Proceedings of the 16th Symposium on Computer Architecture and High Performance Computing. IEEE-SBAC PAD 2004, Foz do Iguaçu, Brésil, octobre 2004, 108-115. Peer reviewed |
Varrette, S., Roch, J.-L., Denneulin, Y., & Leprévost, F. (2004). Secure architectures for clusters and grid computations. Proceedings de CRIS 2004 (2nd International Conference on Critical Infrastructures), Grenoble, France, Octobre 2004. Peer reviewed |
Leprévost, F., Pohst, M., & Schöpp, A. (2004). Rational torsion of J_0(N) for hyperelliptic modular curves and families of Jacobians of genus 2 and genus 3 curves with a rational point of order 5, 7 or 10. Abhandlungen aus dem Mathematischen Seminar der Universität Hamburg, 74, 193-203. doi:10.1007/BF02941535 Peer reviewed |
Varrette, S., Roch, J.-L., Denneulin, Y., & Leprévost, F. (2004). Secure Architecture for Clusters and Grids. In Proc. of the 2nd Int. Conf. on Critical Infrastructures (CRIS 2004). Grenoble, France, Unknown/unspecified: IEEE. Peer reviewed |
Varrette, S., Roch, J.-L., & Leprévost, F. (2004). FlowCert : Probabilistic Certification for Peer-to-Peer Computations. In Proc. of the 16th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2004) (pp. 108--115). Foz do Iguaçu, Brazil, Unknown/unspecified: IEEE Computer Society. doi:10.1109/SBAC-PAD.2004.17 Peer reviewed |
Leprévost, F., Pohst, M., & Schöpp, A. (2003). Familles de polynômes liées aux courbes modulaires X_1(l) unicursales et points rationnels non-triviaux de courbes elliptiques quotient. Acta Arithmetica, 110 (4), 401-410. doi:10.4064/aa110-4-6 Peer reviewed |
Gillard, R., Leprévost, F., Pantchichkine, A., & Roblot, X. (2003). Utilisation des modules elliptiques de Drinfeld en cryptologie. Comptes Rendus. Mathématique, 336 (11), 879-882. Peer Reviewed verified by ORBi |
Leprévost, F. (2003). An Overview Of Public-Key Cryptology. DPP 2003: International Conference on Digital Production Printing and Industrial Applications. Peer reviewed |
Warusfel, B., & Leprévost, F. (2002). Cryptographie et lutte contre le terrorisme : éviter les fausses solutions sécuritaires. Droit et Défense. Peer reviewed |
Flynn, E. V., Leprévost, F., Schaefer, E. F., Stein, W., Stoll, M., & Wetherell, J. L. (2001). Empirical evidence for the Birch and Swinnerton-Dyer conjectures for the modular Jacobians of genus 2 curves. Mathematics of Computation, 70 (236), 1675-1697. doi:10.1090/S0025-5718-01-01320-5 Peer reviewed |
Leprévost, F., & Warusfel, B. (2001). Echelon: origines et perspectives d'un débat transnational. Annuaire Français des Relations Internationales, 2, 865-888. Peer reviewed |
Howe, E., Leprévost, F., & Poonen, B. (2000). Large torsion subgroups of split Jacobians of curves of genus two or three. Forum Mathematicum, 12, 315-364. doi:10.1515/form.2000.008 Peer reviewed |
Boxall, J., Grant, D., & Leprévost, F. (2000). Five torsion points on curves of genus two. Proceedings of the London Mathematical Society. Peer Reviewed verified by ORBi |
Ebrahimi, T., Erard, R., Kutter, M., Leprévost, F., & Santa Cruz, D. (2000). How to bypass the Wassenaar Arrangement: A new application for watermarking. Abstract book of 8th ACM International Multimedia Conference on Multimedia and Security, 161-164. Peer reviewed |
Leprévost, F. (1999). Sur certaines surfaces elliptiques et courbes elliptiques de Mordell de rang non-nul associées à des discriminants de polynômes cubiques ou quartiques. Journal of Number Theory, 78, 149-160. Peer reviewed |
Fermigier, S., Leprévost, F., & FIEKER, C. (1999). Appendice : quelques données statistiques. Journal of Number Theory, 78, 160-165. Peer reviewed |
Leprévost, F. (1999). AES und IEEE-P1363, die kryptographischen Standards des 21. Jahrhunderts. Tagungsband des 6. Deutschen IT-Sicherheitskongresses des BSI, 485-491. Peer reviewed |
Kutter, M., & Leprévost, F. (1999). Symbiose von Kryptographie und digitalen Wasserzeichen: effizienter Schutz des Urheberrechtes digitaler Medien. Tagungsband des 6. Deutschen IT-Sicherheitskongresses des BSI, 479-484. Peer reviewed |
Leprévost, F., & Markushevich, D. (1999). An infinite tower of genus 2 curves related to the Kowalewski top. Journal für die Reine und Angewandte Mathematik, 514, 103-111. Peer reviewed |
Leprévost, F. (1999). The modular points of a genus 2 quotient of X_0(67). Proceedings of the Finite Field Conference of the American Mathematical Society (Contemporary Mathematics), 245, 181-187. Peer reviewed |
Leprévost, F. (1999). Les standards cryptographiques du XXI-eme siecle : AES et IEEE-P1363. Gazette des Mathématiciens. Peer reviewed |
Leprévost, F. (1999). Peter Shor, prix Nevanlinna 1998. Gazette des Mathématiciens, 81. Peer reviewed |
Leprévost, F. (1997). Sur certains sous-groupes de torsion de Jacobiennes de courbes hyperelliptiques de genre g > 0. Manuscripta Mathematica, 92 (I), 47-63. doi:10.1007/BF02678180 Peer Reviewed verified by ORBi |
Leprévost, F., & Morain, F. (1997). Revêtements de courbes elliptiques à multiplication complexe par des courbes hyperelliptiques et sommes de caractères. Journal of Number Theory, 64 (2), 165-182. doi:10.1006/jnth.1997.2070 Peer reviewed |
Leprévost, F. (1997). Une caractérisation différentielle des points de Weierstrass généralisés d'une surface de Riemann compacte de genre g > 1. Journal de Mathématiques Pures et Appliquées, 76, 801-804. doi:10.1016/S0021-7824(97)89970-9 Peer Reviewed verified by ORBi |
Leprévost, F. (1996). Sur une conjecture sur les points de torsion rationnels des Jacobiennes de courbes. Journal für die Reine und Angewandte Mathematik, 473, 59-68. doi:10.1515/crll.1995.473.59 Peer reviewed |
Leprévost, F. (1995). Jacobiennes de certaines courbes de genre 2 : torsion et simplicité. Journal de Théorie des Nombres de Bordeaux, 7, 283-306. Peer Reviewed verified by ORBi |
Leprévost, F. (1992). Famille de courbes hyperelliptiques de genre g munies d'une classe de diviseurs rationnels d'ordre 2g^2+4g+1. Séminaire de Théorie des Nombres, 116, 107-119. Peer reviewed |
Leprévost, F. (1992). Torsion sur des familles de courbes de genre g. Manuscripta Mathematica, 75, 303-326. doi:10.1007/BF02567087 Peer Reviewed verified by ORBi |