default search action
Olivier Bettan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c9]Mohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux:
A White-Box Watermarking Modulation for Encrypted DNN in Homomorphic Federated Learning. SECRYPT 2024: 186-197 - 2023
- [j2]Mohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux:
When Federated Learning Meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection. Mach. Learn. Knowl. Extr. 5(4): 1382-1406 (2023) - [i2]Mohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux:
When Federated Learning meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection. CoRR abs/2308.03573 (2023) - 2021
- [c8]Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Hugo Beguinet, Hugo Senet:
A Protocol for Secure Verification of Watermarks Embedded into Machine Learning Models. IH&MMSec 2021: 171-176 - 2020
- [c7]Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan:
Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space. WIFS 2020: 1-6
2010 – 2019
- 2019
- [j1]Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan:
Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic. IEEE Trans. Netw. Serv. Manag. 16(3): 842-856 (2019) - [c6]Charles Xosanavongsa, Eric Totel, Olivier Bettan:
Discovering Correlations: A Formal Definition of Causal Dependency Among Heterogeneous Events. EuroS&P 2019: 340-355 - 2018
- [c5]Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan:
Passive Monitoring of HTTPS Service Use. CNSM 2018: 219-225 - 2016
- [c4]François-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, Hervé Debar:
Hybrid Risk Assessment Model Based on Bayesian Networks. IWSEC 2016: 21-40 - [c3]François Reynaud, François-Xavier Aguessy, Olivier Bettan, Mathieu Bouet, Vania Conan:
Attacks against Network Functions Virtualization and Software-Defined Networking: State-of-the-art. NetSoft 2016: 471-476 - [i1]François-Xavier Aguessy, Olivier Bettan, Grégory Blanc, Vania Conan, Hervé Debar:
Bayesian Attack Model for Dynamic Risk Assessment. CoRR abs/1606.09042 (2016) - 2015
- [c2]Bertrand Mathieu, Guillaume Doyen, Wissam Mallouli, Thomas Silverston, Olivier Bettan, François-Xavier Aguessy, Thibault Cholez, Abdelkader Lahmadi, Patrick Truong, Edgardo Montes de Oca:
Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment. ARES 2015: 741-748 - [c1]François-Xavier Aguessy, Olivier Bettan, Romuald Dobigny, Claire Laudy, Gaëlle Lortal, David Faure:
Adjustable Fusion to Support Cyber Security Operators. HCI (22) 2015: 143-153
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 02:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint