Grégory Blanc
YOU?
Author Swipe
PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing Open
In distributed networks, participants often face diverse and fast-evolving cyberattacks. This makes techniques based on Federated Learning (FL) a promising mitigation strategy. By only exchanging model updates, FL participants can collabor…
View article: The MUSE view of the Sculptor galaxy: Survey overview and the luminosity function of planetary nebulae
The MUSE view of the Sculptor galaxy: Survey overview and the luminosity function of planetary nebulae Open
The Sculptor galaxy, NGC 253, is the southern massive star-forming disk galaxy that is closest to the Milky Way. We present a new 103-pointing MUSE mosaic of this galaxy that covers most of its star-forming disk up to 0.75 × R 25 . With an…
Xai-driven black-box adversarial attacks on network intrusion detectors Open
Deep Learning (DL) technologies have recently gained significant attention and have been applied to Network Intrusion Detection Systems (NIDS). However, DL is known to be vulnerable to adversarial attacks, which evade detection by introduc…
DAMS: Double Deep Q-Network Approach for DDoS Attack Mitigation in SDN Open
International audience
FlowChronicle: Synthetic Network Flow Generation through Pattern Set Mining Open
Network traffic datasets are regularly criticized, notably for the lack of realism and diversity in their attack or benign traffic. Generating synthetic network traffic using generative machine learning techniques is a recent area of resea…
A Model-based Approach for Assessing the Security of Cyber-Physical Systems Open
International audience
SoK: Federated Learning based Network Intrusion Detection in 5G: Context, State of the Art and Challenges Open
International audience
A Tale of Two Methods: Unveiling the Limitations of GAN and the Rise of Bayesian Networks for Synthetic Network Traffic Generation Open
International audience
DDoS Mitigation while Preserving QoS: A Deep Reinforcement Learning-Based Approach Open
International audience
View article: XAI-driven Adversarial Attacks on Network Intrusion Detectors
XAI-driven Adversarial Attacks on Network Intrusion Detectors Open
International audience
OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect Open
International audience
Explainable artificial intelligence for cybersecurity: a literature survey Open
With the extensive application of deep learning (DL) algorithms in recent years, e.g., for detecting Android malware or vulnerable source code, artificial intelligence (AI) and machine learning (ML) are increasingly becoming essential in t…
A Survey of Smart Home IoT Device Classification Using Machine Learning-Based Network Traffic Analysis Open
Smart home IoT devices lack proper security, raising safety and privacy concerns. One-size-fits-all network administration is ineffective because of the diverse QoS requirements of IoT devices. Device classification can improve IoT adminis…
Generative Deep Learning for Internet of Things Network Traffic Generation Open
International audience
Optimizing Resource Allocation for Secure SDN-based Virtual Network Migration Open
International audience
Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders Open
Nowadays, IoT devices have been widely deployed for enabling various smart services, such as, smart home or e-healthcare. However, security remains as one of the paramount concern as many IoT devices are vulnerable. Moreover, IoT malware a…
Designing Security-Aware Service Requests for NFV-Enabled Networks Open
International audience
Machine learning for IoT network monitoring Open
International audience
An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents Open
Phishing attacks have been persistent for more than two decades despite mitigation efforts from academia and industry. We believe that users fall victim to attacks not only because of lack of knowledge and awareness, but also because they …
IoT Devices Recognition Through Network Traffic Analysis Open
International audience