X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/bibliographie.git/blobdiff_plain/0a16bf2dd727ea39cde1630af90f877e26dffc43..a85693e5372004753aab7a5c0797f85634c90750:/bib/biblioand.bib?ds=sidebyside diff --git a/bib/biblioand.bib b/bib/biblioand.bib index b1d4b0b..9ba6cd0 100644 --- a/bib/biblioand.bib +++ b/bib/biblioand.bib @@ -1,6 +1,46 @@ -c% This file was created with JabRef 2.3.1. +% This file was created with JabRef 2.3.1. % Encoding: ANSI_X3.4-1968 + + + +@InProceedings{, + author = {Bassam Alkindy, Christophe Guyeux, Jean-François Couchot, +Michel Salomon, Jacques M Bahi}, + title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts}, + OPTcrossref = {}, + OPTkey = {}, + booktitle = {The IEEE International Conference on Bioinformatics and Biomedicine (BIBM)}, + OPTyear = {2014}, + OPTeditor = {}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + pages = {***--***}, + month = nov, + address = {Belfast, UK}, + OPTorganization = {}, + publisher = {IEE }, + note = {To appear}, + OPTannote = {} +} + +@inproceedings{chgw+14:oip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE}, +equipe = {ie}, +author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques}, +title = {Pseudorandom Number Generators with Balanced Gray Codes}, +booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography}, +pages = {469--475}, +address = {Vienna, Austria}, +month = aug, +date = aug, +year = 2014 +} + + + @INPROCEEDINGS{nusmv02, author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto @@ -502,7 +542,7 @@ year = 2006, -@BOOK{Dev89, +@BOOK{Devaney, title = {An Introduction to Chaotic Dynamical Systems}, publisher = {Redwood City: Addison-Wesley}, year = {1989}, @@ -513,6 +553,157 @@ year = 2006, } +@inproceedings{bgs11:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel}, +title = {Building a Chaotic Proven Neural Network}, +booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security}, +address = {Maldives, Maldives}, +month = may, +year = 2011, +} + +@ARTICLE{guyeux09, + author = {Bahi, Jacques M. and Guyeux, Christophe}, + title = {Hash Functions Using Chaotic Iterations}, + journal = {Journal of Algorithms \& Computational Technology}, + year = {2010}, + volume = {4}, + pages = {167--181}, + number = {2}, + classement = {ACLNI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + impact-factor = {#}, + inhal = {no}, + isi-acro = {#} +} + + + +@PHDTHESIS{GuyeuxThese10, + author = {Christophe Guyeux}, + title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e} + en s\'{e}curit\'{e} informatique}, + school = {Universit\'{e} de Franche-Comt\'{e}}, + year = {2010}, + owner = {christophe}, + timestamp = {2010.12.21} +} + +@INPROCEEDINGS{gfb10:ip, + author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.}, + title = {Chaotic iterations versus Spread-spectrum: chaos and stego security}, + booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and + Multimedia Signal Processing}, + year = {2010}, + pages = {208--211}, + address = {Darmstadt, Germany}, + month = oct, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + + +@ARTICLE{Adler65, + author = {R. L. Adler and A. G. Konheim and M. H. McAndrew}, + title = {Topological entropy}, + journal = {Transactions of the American Mathematical Society}, + year = {1965}, + volume = {114}, + pages = {309-319}, + owner = {guyeux}, + timestamp = {2008.05.29} +} + +@ARTICLE{Bowen, + author = {Rufus Bowen}, + title = {Entropy for group endomorphisms and homogeneous spaces}, + journal = {Transactions of the American Mathematical Society}, + year = {1971}, + volume = {153}, + pages = {401-414}, + owner = {guyeux}, + timestamp = {15/02/2008} +} + +@article{10.1109/CIMSiM.2010.36, +author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik}, +title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect}, +journal ={Computational Intelligence, Modelling and Simulation, International Conference on.}, +volume = {0}, +year = {2010}, +pages = {15-20}, +doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36}, +publisher = {IEEE Computer Society}, +address = {Los Alamitos, CA, USA}, +} +@article{10.1109/ICME.2003.1221665, +author = {Liu Shaohui and Yao Hongxun and Gao Wen}, +title = {Neural network based steganalysis in still images}, +journal ={Multimedia and Expo, IEEE International Conference on}, +volume = {2}, +year = {2003}, +pages = {509-512}, +doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665}, +publisher = {IEEE Computer Society}, +address = {Los Alamitos, CA, USA}, +} + +@ARTICLE{Sullivan06steganalysisfor, + author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. }, + title = {Steganalysis for Markov cover data with applications to images}, + journal = {IEEE Transactions on Information Forensics and Security}, + year = {2006}, + volume = {1}, + pages = {275--287} +} + + +@misc{Gray47, +year=1953, +author = "Gray, Frank", +title = "Pulse code communication", +note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"} + + + + +@INPROCEEDINGS{guyeux10ter, + author = {Bahi, Jacques M. and Guyeux, Christophe}, + title = {A new chaos-based watermarking algorithm}, + booktitle = {SECRYPT'10, International Conference on Security +and Cryptography}, + year = {2010}, + pages = {455--458}, + address = {Athens, Greece}, + month = jul, + publisher = {SciTePress}, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + + +@inproceedings{Qiao:2009:SM:1704555.1704664, + author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong}, + title = {Steganalysis of MP3Stego}, + booktitle = {Proceedings of the 2009 international joint conference on Neural Networks}, + series = {IJCNN'09}, + year = {2009}, + location = {Atlanta, Georgia, USA}, + pages = {2723--2728}, + numpages = {6}, + publisher = {IEEE Press} +} + + @article{byrd1995limited, author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou}, @@ -548,7 +739,21 @@ doi = {10.1017/S0962492900002841}, URL = {http://journals.cambridge.org/article_S0962492900002841}, } - +@article{Wang13, +year={2013}, +issn={0920-8542}, +journal={The Journal of Supercomputing}, +volume={64}, +number={3}, +doi={10.1007/s11227-010-0500-5}, +title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks}, +url={http://dx.doi.org/10.1007/s11227-010-0500-5}, +publisher={Springer US}, +keywords={Watermarking; Authentication; Wireless multimedia sensor network}, +author={Wang, Honggang}, +pages={883-897}, +language={English} +} @ARTICLE{HLG09, author={Yifeng He and Lee, I. and Ling Guan}, @@ -1396,3 +1601,157 @@ keywords = "Fuzzy edge detector" } + + +@article{MCErlang07, + author = {Fredlund, Lars-\AAke and Svensson, Hans}, + title = {McErlang: a model checker for a distributed functional programming language}, + journal = {SIGPLAN Not.}, + volume = {42}, + issue = {9}, + year = {2007}, + issn = {0362-1340}, + pages = {125--136}, + numpages = {12}, + publisher = {ACM}, +} +@inproceedings{Bogor03, + author = {Robby and + Matthew B. Dwyer and + John Hatcliff}, + title = {Bogor: an extensible and highly-modular software model checking + framework}, + booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations + of Software Engineering 2003}, + publisher = {ACM}, + year = {2003}, + pages = {267-276}, +} + + +@ARTICLE{Banks92, + author = {Banks, John and J. Brooks and G. Cairns and P. Stacey}, + title = {On Devaney's Definition of Chaos}, + journal = {Amer. Math. Monthly}, + year = {1992}, + volume = {99}, + pages = {332--334}, + keywords = {(c+),}, + owner = {guyeux}, + timestamp = {27/01/2008} +} + +@article{Crook2007267, +title = "Pattern recall in networks of chaotic neurons", +journal = "Biosystems", +volume = "87", +number = "2-3", +pages = "267 - 274", +year = "2007", +issn = "0303-2647", +doi = "DOI: 10.1016/j.biosystems.2006.09.022", +author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat", +keywords = "Chaos", +keywords = "Spiking neural network" +} + +@ARTICLE{Xiao10, + author = {Li, Yantao and Deng, Shaojiang and Xiao, Di}, + title = {A novel Hash algorithm construction based on chaotic neural network}, + journal = {Neural Computing and Applications}, + year = {2010}, + pages = {1-9}, + affiliation = {Chongqing University College of Computer Science 400044 Chongqing + China}, + issn = {0941-0643}, + keyword = {Computer Science}, + publisher = {Springer London} +} + +@ARTICLE{1309431, +author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.}, +journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography}, +year={2004}, +month=may, +volume={50}, +number={2}, +pages={ 587 - 590}, +keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;}, +doi={10.1109/TCE.2004.1309431}, +} + +@article{Zhang2005759, +title = "An image encryption approach based on chaotic maps", +journal = "Chaos, Solitons \& Fractals", +volume = "24", +number = "3", +pages = "759 - 765", +year = "2005", +note = "", +issn = "0960-0779", +doi = "10.1016/j.chaos.2004.09.035", +author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang" +} + +@article{Lian20091296, +title = "A block cipher based on chaotic neural networks", +journal = "Neurocomputing", +volume = "72", +number = "4-6", +pages = "1296 - 1301", +year = "2009", +issn = "0925-2312", +author = "Shiguo Lian", +keywords = "Neural network", +keywords = "Chaos", +keywords = "Security", +keywords = "Block cipher", +keywords = "Image encryption" +} + +@article{Cybenko89, + author = {George Cybenko}, + title = {Approximation by Superpositions of a Sigmoidal function}, + journal = {Mathematics of Control, Signals and Systems}, + volume = {2}, + year = {1989}, + pages = {303-314} +} + + +@article{DBLP:journals/nn/HornikSW89, + author = {Kurt Hornik and + Maxwell B. Stinchcombe and + Halbert White}, + title = {Multilayer feedforward networks are universal approximators}, + journal = {Neural Networks}, + volume = {2}, + number = {5}, + year = {1989}, + pages = {359-366}, + ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@article{dalkiran10, + author = {Ilker Dalkiran and Kenan Danisman}, + affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey}, + title = {Artificial neural network based chaotic generator for cryptology}, + journal = TESC, + volume = {18}, + number = {2}, + pages = {225-240}, + year = {2010} +} + +@article{springerlink:10.1007/s00521-010-0432-2, + author = {Li, Yantao and Deng, Shaojiang and Xiao, Di}, + affiliation = {Chongqing University College of Computer Science 400044 Chongqing China}, + title = {A novel Hash algorithm construction based on chaotic neural network}, + journal = {Neural Computing and Applications}, + publisher = {Springer}, + issn = {0941-0643}, + keyword = {Computer Science}, + pages = {1-9}, + year = {2010} +}