Skip to main content

Showing 1–11 of 11 results for author: Guillaume, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.02979  [pdf, other

    cs.CR

    Multi-Screaming-Channel Attacks: Frequency Diversity for Enhanced Attacks

    Authors: Jeremy Guillaume, Maxime Pelcat, Amor Nafkha, Rubén Salvador

    Abstract: Side-channel attacks consist of retrieving internal data from a victim system by analyzing its leakage, which usually requires proximity to the victim in the range of a few millimetres. Screaming channels are EM side channels transmitted at a distance of a few meters. They appear on mixed-signal devices integrating an RF module on the same silicon die as the digital part. Consequently, the side ch… ▽ More

    Submitted 3 April, 2025; originally announced April 2025.

    Comments: Submitted to IEEE Transactions on Information Forensics and Security (TIFS), 11 pages, 8 figures

  2. arXiv:2410.05303  [pdf, other

    physics.soc-ph cs.CY

    Integrating problem structuring methods with formal design theory: collective water management policy design in Tunisia

    Authors: Berkay Tosunlu, Joseph H. A. Guillaume, Alexis Tsoukiàs, Emeline Hassenforder, Samia Chrii, Houssem Braiki, Irene Pluchinotta

    Abstract: Groundwater management, especially in regions like Tunisia, is challenging due to diverse stakeholder interests and the dry structure of climate, which is extremely challenging for the sustainability of water resources. This paper proposes an innovative approach to policy design by merging Problem Structuring Methods (PSMs) and the Policy-Knowledge, Concepts, Proposals (P-KCP) methodology. Utilizi… ▽ More

    Submitted 4 October, 2024; originally announced October 2024.

  3. arXiv:2312.07838  [pdf, other

    cs.AI

    Conflict Transformation and Management. From Cognitive Maps to Value Trees

    Authors: Berkay H. Tosunlu, Joseph H. A. Guillaume, Alexis Tsoukiàs

    Abstract: Conflict transformation and management are complex decision processes with extremely high stakes at hand and could greatly benefit from formal approaches to decision support. For this purpose we develop a general framework about how to use problem structuring methods for such purposes. More precisely we show how to transform cognitive maps to value trees in order to promote a more design-oriented… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

  4. Attacking at non-harmonic frequencies in screaming-channel attacks

    Authors: Jeremy Guillaume, Maxime Pelcat, Amor Nafkha, Ruben Salvador

    Abstract: Screaming-channel attacks enable Electromagnetic (EM) Side-Channel Attacks (SCAs) at larger distances due to higher EM leakage energies than traditional SCAs, relaxing the requirement of close access to the victim. This attack can be mounted on devices integrating Radio Frequency (RF) modules on the same die as digital circuits, where the RF can unintentionally capture, modulate, amplify, and tran… ▽ More

    Submitted 8 April, 2025; v1 submitted 27 November, 2023; originally announced November 2023.

    Comments: This version of the article has been accepted for publication, after peer review (when applicable) and is subject to Springer Nature's AM terms of use, but is not the Version of Record and does not reflect post-acceptance improvements, or any corrections. The Version of Record is available online at: http://dx.doi.org/10.1007/978-3-031-54409-5_5

    Journal ref: Smart Card Research and Advanced Applications. CARDIS 2023. Lecture Notes in Computer Science, vol 14530. Springer, Cham

  5. arXiv:2311.06047  [pdf, other

    physics.soc-ph cs.SI

    Fast unfolding of communities in large networks: 15 years later

    Authors: Vincent Blondel, Jean-Loup Guillaume, Renaud Lambiotte

    Abstract: The Louvain method was proposed 15 years ago as a heuristic method for the fast detection of communities in large networks. During this period, it has emerged as one of the most popular methods for community detection, the task of partitioning vertices of a network into dense groups, usually called communities or clusters. Here, after a short introduction to the method, we give an overview of the… ▽ More

    Submitted 10 November, 2023; originally announced November 2023.

  6. Virtual Triggering: a Technique to Segment Cryptographic Processes in Side Channel Traces

    Authors: Jeremy Guillaume, Maxime Pelcat, Amor Nafkha, Rubén Salvador

    Abstract: Side-Channel Attacks (SCAs) exploit data correla-tion in signals leaked from devices to jeopardize confidentiality. Locating and synchronizing segments of interest in traces from Cryptographic Processes (CPs) is a key step of the attack. The most common method consists in generating a trigger signal to indicate to the attacker the start of a CP. This paper proposes a method called Virtual Triggeri… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: To appear at the IEEE International Workshop on Signal Processing Systems (SiPS) 2022. 6 pages, 11 figures, 2 algorithms

    Journal ref: 2022 IEEE Workshop on Signal Processing Systems (SiPS), 2022, pp. 1-6

  7. arXiv:2208.01743  [pdf, other

    cs.SI

    Sniffer deployment in urban area for human trajectory reconstruction and contact tracing

    Authors: Antoine Huchet, Jean-Loup Guillaume, Yacine Ghamri-Doudane

    Abstract: To study the propagation of information from individual to individual, we need mobility datasets. Existing datasets are not satisfactory because they are too small, inaccurate or target a homogeneous subset of population. To draw valid conclusions, we need sufficiently large and heterogeneous datasets. Thus we aim for a passive non-intrusive data collection method, based on sniffers that are to be… ▽ More

    Submitted 29 July, 2022; originally announced August 2022.

    Comments: Will be published to IEEE International Smart Cities Conference 2022

  8. arXiv:2111.04052  [pdf, other

    cs.CL

    How does a Pre-Trained Transformer Integrate Contextual Keywords? Application to Humanitarian Computing

    Authors: Barriere Valentin, Jacquet Guillaume

    Abstract: In a classification task, dealing with text snippets and metadata usually requires dealing with multimodal approaches. When those metadata are textual, it is tempting to use them intrinsically with a pre-trained transformer, in order to leverage the semantic information encoded inside the model. This paper describes how to improve a humanitarian classification task by adding the crisis event type… ▽ More

    Submitted 7 November, 2021; originally announced November 2021.

    Comments: Oral ISCRAM2021

  9. arXiv:1406.2518  [pdf, other

    cs.SI physics.soc-ph stat.AP

    A Generalized and Adaptive Method for Community Detection

    Authors: Romain Campigotto, Patricia Conde Céspedes, Jean-Loup Guillaume

    Abstract: Complex networks represent interactions between entities. They appear in various contexts such as sociology, biology, etc., and they generally contain highly connected subgroups called communities. Community detection is a well-studied problem and most of the algorithms aim to maximize the Newman-Girvan modularity function, the most popular being the Louvain method (it is well-suited on very large… ▽ More

    Submitted 10 June, 2014; originally announced June 2014.

    ACM Class: G.4; G.2.2; I.5.3

  10. arXiv:1207.7103  [pdf, other

    cs.NI

    Temporal Reachability Graphs

    Authors: John Whitbeck, Marcelo Dias de Amorim, Vania Conan, Jean-Loup Guillaume

    Abstract: While a natural fit for modeling and understanding mobile networks, time-varying graphs remain poorly understood. Indeed, many of the usual concepts of static graphs have no obvious counterpart in time-varying ones. In this paper, we introduce the notion of temporal reachability graphs. A (tau,delta)-reachability graph} is a time-varying directed graph derived from an existing connectivity graph.… ▽ More

    Submitted 30 July, 2012; originally announced July 2012.

    Comments: In proceedings ACM Mobicom 2012

    ACM Class: C.2.1; F.2.2; G.2.2

  11. arXiv:0803.0476  [pdf, ps, other

    physics.soc-ph cond-mat.stat-mech cs.CY cs.DS

    Fast unfolding of communities in large networks

    Authors: Vincent D. Blondel, Jean-Loup Guillaume, Renaud Lambiotte, Etienne Lefebvre

    Abstract: We propose a simple method to extract the community structure of large networks. Our method is a heuristic method that is based on modularity optimization. It is shown to outperform all other known community detection method in terms of computation time. Moreover, the quality of the communities detected is very good, as measured by the so-called modularity. This is shown first by identifying lan… ▽ More

    Submitted 25 July, 2008; v1 submitted 4 March, 2008; originally announced March 2008.

    Comments: 6 pages, 5 figures, 1 table; new version with new figures in order to clarify our method, where we look more carefully at the role played by the ordering of the nodes and where we compare our method with that of Wakita and Tsurumi

    Journal ref: J. Stat. Mech. (2008) P10008