![]() | Monter d'un niveau |
Computer Security – ESORICS 2025 [Communication écrite] (septembre 2025). 30th European Symposium on Research in Computer Security (ESORICS 2025), Toulouse, France. Publié dans Lecture Notes in Computer Science, 16054. Lien externe
Erfan, F., Bellaïche, M., & Halabi, T. (mars 2025). Retaliation Game forMitigating Selfish Mining Attacks inBlockchain Networks [Communication écrite]. 13th EAI International Conference (GameNets 2025), Cambridge, UK. Publié dans Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Lien externe
Rodet, H., & Séoud, L. (2026). Body shape diversity in the training data and consequences on motion generation. Computer Vision and Image Understanding, 264, 104632 (17 pages). Lien externe
Saber, R., Carneiro, M., Montagnon, E., Tang, A., Turcotte, S., & Kadoury, S. (2026). Multi-omics fusion network for prediction of early recurrence in colorectal liver metastases. npj Precision Oncology. Lien externe
Škrlj, L., Kadoury, S., & Vrtovec, T. (septembre 2025). Transformer-Based Instance Detection in 3D Medical Images [Communication écrite]. 4th International Workshop on Applications of Medical Artificial Intelligence (AMAI 2025), Daejeon, South Korea. Publié dans Lecture notes in computer science. Lien externe