Les publications scientifiques des CRPs Henri Tudor et Gabriel Lippmann publiées avant la création du LIST sont disponibles en ligne : télécharger le PDF du CRP Henri Tudor (910Ko) et le PDF du CRP - Gabriel Lippmann (1,3Ko).
A Multi-dataset Evaluation of Models for Automated Vulnerability Repair
Auteurs : Khan Z.A., Garg A., Tang Q. Référence : Lecture Notes in Computer Science, vol. 15994 LNCS, pp. 73-87, 2025
Lire la suite
A Blockchain-based data management approach for swarm-edge computing
Auteurs : Imeri A., Gharsallaoui O., Grandjean T., Roth U. Référence : 2025 12th IFIP International Conference on New Technologies Mobility and Security Ntms 2025, pp. 136-143, 2025
Connectivity-Aware Route Design and Frequency Setting for Connected and Automated Shuttles
Auteurs : Chaalal E., Stolfi D.H., Zaki-Hindi A., Faye S. Référence : IEEE Access, vol. 13, pp. 173939-173951, 2025
Integrating AIs With Body Tracking Technology for Human Behaviour Analysis: Challenges and Opportunities
Auteurs : Coppens A., Maquil V. Référence : Lecture Notes in Computer Science, vol. 15518 LNCS, pp. 43-54, 2025
Improved Visual Saliency of Graph Clusters with Orderable Node-Link Layouts
Auteurs : Al-Naami N., Medoc N., Magnani M., Ghoniem M. Référence : IEEE Transactions on Visualization and Computer Graphics, vol. 31, n° 1, pp. 1028-1038, 2025
Semantic Similarity Analysis of Scientific Papers in Scholarly Knowledge Graphs
Auteurs : Nguyen T.H., Pruski C., Silveira M.D. Référence : Ceur Workshop Proceedings, vol. 3977, 2025
Real-Time Kinematic Positioning and Optical See-Through Head-Mounted Display for Outdoor Tracking: Hybrid System and Preliminary Assessment
Auteurs : Ismael M., Cornil M. Référence : Proceedings of the International Joint Conference on Computer Vision Imaging and Computer Graphics Theory and Applications, vol. 2, pp. 659-666, 2025
Data and Models for Sunspots Detection in Solar Images Captured with Smart Telescopes
Auteurs : Parisot O. Référence : Communications in Computer and Information Science, vol. 2346 CCIS, pp. 153-163, 2025
Conventional Machine Learning-Based Android Malware Detectors
Auteurs : Daoudi N., Allix K., Bissyandé T.F., Klein J. Référence : Advances in Information Security, vol. 91, pp. 175-196, 2025
GDPR Compliance in Privacy Policies of Mobile Apps: An Overview of the State-of-Practice
Auteurs : Cejas O.A., Abualhaija S., Sannier N., Ceci M., Bianculli D. Référence : Proceedings of the IEEE International Conference on Requirements Engineering, pp. 320-331, 2025
Poster: Automated Dependency Mapping for Web API Security Testing Using Large Language Models
Auteurs : Li W., Guo Y. Référence : Ccs 2024 Proceedings of the 2024 ACM Sigsac Conference on Computer and Communications Security, pp. 5024-5026, 2024
Enhancing Throughput in 5G-NTN through Early RLC Layer Retransmissions
Auteurs : Kumar S., Turcanu I. Référence : ACM Mobicom 2024 Proceedings of the 30th International Conference on Mobile Computing and Networking, pp. 1733-1735, 2024