![]() | Monter d'un niveau |
Computer Security – ESORICS 2025 [Communication écrite] (septembre 2025). 30th European Symposium on Research in Computer Security (ESORICS 2025), Toulouse, France. Publié dans Lecture Notes in Computer Science, 16054. Lien externe
Abdalwhab, A. B. M., Beltrame, G., & St-Onge, D. (2026). Scalable Multi-Agent Reinforcement Learning Framework for Multi-Machine Tending. IEEE Robotics and Automation Letters, 11(3), 3135-3142. Lien externe
Al-Mallah, R., & Quintero, A. (2026). Toward Improved ICU Care - Phlebotomy Frequency Using Deep Learning. Inspire Intelligence Journal, 1(1), 9 pages. Lien externe
Alsheghri, A., Malaekah, A., Alhendawi, A., Tauheed, M., El Bsat, J., Valchanov, H., Braïlovski, V., & Guibault, F. (2026). Elastic Registration for Non-Destructive Testing of Additively Manufactured TPMS Lattice Structures. Journal of Nondestructive Evaluation, 45(2), 52 (22 pages). Lien externe
Bouakkaz, S., Suárez, L., Boulahia Cuppens, N., & Cuppens, F. (décembre 2025). Adaptive Layered Trustworthiness Assessment Model (ALTAM) for5G Services Deployment [Communication écrite]. 19th International Conference on Network and System Security (NSS 2025), Wuhan, China. Publié dans Lecture notes in computer science. Lien externe
Ceglia, A., Bailly, F., Puchaud, P., Séoud, L., & Begon, M. (2026). Fast Muscle-parameter Calibration using EMG and Markerless Kinematics for Neuromusculoskeletal Modeling: Application to Hand-cycling. IEEE Transactions on Biomedical Engineering, PP. Lien externe
Chitsazian, Z., Sedighian Kashi, S., & Nikanjam, A. (2026). Detecting concept drift in just-in-time software defect prediction using model interpretation. International Journal of Systems Assurance Engineering and Management, 22 pages. Lien externe
Deloumeau, N., Ould-Bachir, T., Evans, D., Handke, A., Sanderson, J., & Tétreault, F. (février 2026). Synchronized CPU-FPGA Tracing for Heterogeneous Platforms [Affiche]. 34th International Symposium on Field Programmable Gate Arrays (ISFPGA 26), Monterey, CA, USA. Lien externe
Doostinia, M., Falabretti, D., Verticale, G., & Bolouki, S. (2026). A Novel Centrality-Driven Machine Learning Approach for Clustering Critical Nodes in Cyber-Physical Power Systems. IEEE Transactions on Industry Applications, 1-12. Lien externe
Dorostkar, F., Dagenais, M., Tyagi, A., & Bridgers, V. (2026). ThreadMonitor: Low‐Overhead Data Race Detection Using Intel Processor Trace. Concurrency and Computation: Practice and Experience, 38(2), 14 pages. Lien externe
Erfan, F., Bellaïche, M., & Halabi, T. (mars 2025). Retaliation Game forMitigating Selfish Mining Attacks in Blockchain Networks [Communication écrite]. 13th EAI International Conference on Game Theory for Networks (GameNets 2025), Cambridge, UK. Publié dans Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 657. Lien externe
Erfan, F., Yahyatabar Arabi, M. E., Bellaïche, M., & Halabi, T. (2026). Fine-Tuned Large Language Model for Securing Ethereum Smart Contracts with Real-Time VSCode Auditing. Blockchain Research and Applications, 100466. Lien externe
Foundjem, A. T., Nganyewou Tidjon, L., Da Silva, L. M. P., & Khomh, F. (2026). Multi-Agent AI Framework for Threat Mitigation and Resilience in Machine Learning Systems. ACM Transactions on Software Engineering and Methodology. Lien externe
Gohring de Magalhaes, F. (septembre 2025). Dynamic Asynchronous Controller for Integrated Photonic Networks: Introducing CLAP [Communication écrite]. 36th International Workshop on Rapid System Prototyping (RSP 2025), Taipei, Taiwan. Lien externe
Imran, A., Varadharajan, V. S., Gomes Braga, R., Beltrame, G., & St-Onge, D. (2026). Swarm robotics localization: comparing methods from infrared to foundation models. Swarm Intelligence, 20(1), 23 pages. Lien externe
Jamshidi, S., Abdul Wahab, O., Herrero, R., Khomh, F., Bellaïche, M., Keivanpour, S., Shahabi, N., Nikanjam, A., & Wazed Nafi, K. (2026). Think Fast: Real-Time IoT Intrusion Reasoning Using IDS and LLMs at the Edge Gateway. IEEE Internet of Things Journal, 30 pages. Lien externe
Kabamba, H. M., Khouzam, M., & Dagenais, M. (2026). Node compass: runtime-based multilevel tracing and debugging of single-threaded environments. International Journal of Parallel Emergent and Distributed Systems, 33 pages. Lien externe
Kirana, M. C., Keyela, P., Rostamian, F., Tashman, D., & Cherkaoui, S. (2026). ML-Enabled Open RAN: A Comprehensive Survey of Architectures, Challenges, and Opportunities. IEEE Communications Surveys & Tutorials, 28, 4948-4979. Lien externe
Leblanc, T., Baghalizadeh Moghadam, N., Cuppens, F., & Boulahia Cuppens, N. (décembre 2025). Real-Time Anomaly Detection forEvent-Based Insider Threat Hunting [Communication écrite]. 19th International Conference on Network and System Security (NSS 2025), Wuhan, China. Publié dans Lecture notes in computer science. Lien externe
Liu, Q., Saunier, N., & Bilodeau, G.-A. (2026). Video analysis for surrogate measures of safety: Is deep learning good enough? Transportation Research Part C Emerging Technologies, 186, 105596 (24 pages). Lien externe
Lyu, Y., Li, H., Li, H., & Hassan, A. E. (2026). Can we recycle our old models? An empirical evaluation of model selection mechanisms for AIOps solutions. Empirical Software Engineering, 31(4), 89 (35 pages). Lien externe
Merei, A., Mcheick, H., Ghaddar, A., & Beltrame, G. (2026). EA-IPP2n: Energy-Aware Informative Path Planning Algorithm for UAVs. IEEE Access, 14, 42381-42392. Lien externe
Midingoyi, M. H., Meneses do Nascimento, A. E., & Aloise, D. (mai 2025). A Variable Neighborhood Search Heuristic forSemi-supervised Minimum Sum-of-Squares Clustering [Communication écrite]. 11th International Conference on Variable Neighborhood Search (ICVNS 2025), Montréal, QC, Canada. Publié dans Lecture notes in computer science. Lien externe
Olewicki, D., Da Silva, L. M. P., Ben Sghaier, O., Mujahid, S., Amini, A., Mah, B., Castelluccio, M., Habchi, S., Khomh, F., & Adams, B. (2026). Impact of an LLM-based Review Assistant in Practice: A Mixed Open-/Closed-source Case Study. IEEE Transactions on Software Engineering, 12 pages. Lien externe
Pesant, G. (janvier 2026). Constraint Programming -- A Personal Perspective [Présentation]. Dans BIRS Workshop, Banff, AB, Canada. Disponible
Pesant, G., & Saikali, D. (janvier 2026). 339 - Constrained Molecule Generation Modelled Using the Grammar Constraint [Affiche]. 40th AAAI Conference on Artificial Intelligence (AAAI-26), Singapore, Singapore. Lien externe
Pesant, G., & Saikali, D. (janvier 2026). Constrained Molecule Generation Modelled Using the Grammar Constraint [Communication écrite]. 40th AAAI Conference on Artificial Intelligence (AAAI-26), Singapore, Singapore. Lien externe
Qin, Q., Li, H., & Merlo, E. (2026). Unsupervised, robust, and lightweight detection of data pattern anomalies and outliers. Information and Software Technology, 192, 108035 (16 pages). Lien externe
Riordan, A., Aloise, D., & Martín-Santamaría, R. (mai 2025). Large Language Models forMetaheuristic Implementation: A Case Study withVariable Neighborhood Search [Communication écrite]. 11th International Conference on Variable Neighborhood Search (ICVNS 2025), Montréal, QC, Canada. Publié dans Lecture notes in computer science. Lien externe
Rodet, H., & Séoud, L. (2026). Body shape diversity in the training data and consequences on motion generation. Computer Vision and Image Understanding, 264, 104632 (17 pages). Lien externe
Saber, R., Carneiro, M., Montagnon, E., Tang, A., Turcotte, S., & Kadoury, S. (2026). Multi-omics fusion network for prediction of early recurrence in colorectal liver metastases. npj Precision Oncology. Lien externe
Saber, R., Tonneau, M., Salko, O., Liberman, M., Malo, J., Elkrief, A., Turcotte, S., Bouchard, N., Joubert, P., Kadoury, S., & Routy, B. (2026). Multi-Institutional CT Scan-Based Radiomics for Predicting Tumor PD-L1 Expression in Patients with Advanced and Limited Non-Small Cell Lung Cancer. Cancers, 18(4), 552. Lien externe
Škrlj, L., Kadoury, S., & Vrtovec, T. (septembre 2025). Transformer-Based Instance Detection in 3D Medical Images [Communication écrite]. 4th International Workshop on Applications of Medical Artificial Intelligence (AMAI 2025), Daejeon, South Korea. Publié dans Lecture notes in computer science. Lien externe
Tashman, D., & Cherkaoui, S. (2026). Trustworthy AI-Driven Dynamic Hybrid RIS: Joint Optimization and Reward Poisoning-Resilient Control in Cognitive MISO Networks. IEEE Transactions on Network and Service Management, 1 page. Lien externe
Yoshiaki Okano, E., Aloise, D., & Nascimento, M. C. V. (2026). An analytics framework for graph-based anomaly detection in healthcare time series. Healthcare Analytics, 100447. Lien externe
Zhang, X.R., Zhao, P., Jaskolka, J., Li, H., & Lu, R. (2026). SecMLOps: A comprehensive framework for integrating security throughout the machine learning operations lifecycle. Empirical Software Engineering, 31(3), 74 (48 pages). Lien externe
Zrelli, R., Amaral Misson, H., Kamkuimo, S., Ben Attia, M., Shabah, A., Gohring de Magalhaes, F., & Nicolescu, G. (2026). Integrating formal methods and automated tools for DO-178C compliance in UAV software. Information and Software Technology, 108068. Lien externe