You are here

Publications

Found 36 results
Sort by: Author Title [ Type (Asc)] Year
Filters: Author is Bontempi, Gianluca  [Clear All Filters]
Book Chapter
Lerman L, Medeiros SF, Bontempi G, Markowitch O. A Machine Learning Approach Against a Masked AES. In: Francillon A, Rohatgi P Smart Card Research and Advanced Applications. Smart Card Research and Advanced Applications. ; p. 61-75.
Lopes M, Bontempi G. On the Null Distribution of the Precision and Recall Curve. In: Machine Learning and Knowledge Discovery in Databases. Vol. 8725. Machine Learning and Knowledge Discovery in Databases. ; 2014. p. 322-337.
Dal Pozzolo A, Caelen O, Waterschoot S, Bontempi G. Racing for unbalanced methods selection.
Lerman L, Bontempi G, Markowitch O. Side channel attack: an approach based on machine learning.
Lerman L, Bontempi G, Ben Taieb S, Markowitch O. A Time Series Approach for Profiling Attack. In: Gierlichs B, Guilley S, Mukhopadhyay D Security, Privacy, and Applied Cryptography Engineering. Vol. 8204. Security, Privacy, and Applied Cryptography Engineering. ; 2013. p. 75-94.
Journal Article
Trépo E, Nahon P, Bontempi G, Valenti L, Falleti E, Nischalke HD, Hamza S, Corradini SG, Burza MA, Guyot E, et al. Association between the PNPLA3 (rs738409 C> G) variant and hepatocellular carcinoma: evidence from a meta-analysis of individual participant data. Hepatology. 2013.
Trépo E, Nahon P, Bontempi G, Valenti L, Falleti E, Nischalke H-D, Hamza S, Corradini SG, Burza MA, Guyot E, et al. Association between the PNPLA3 (rs738409 C> G) variant and hepatocellular carcinoma: Evidence from a meta-analysis of individual participant data. Hepatology. 2014:2170–2177.
Lerman L, Bontempi G, Markowitch O. The bias-variance decomposition in profiled attacks. Journal of Cryptographic Engineering [Internet]. 2015:1-13.
Papillon-Cavanagh S, De Jay N, Hachem N, Olsen C, Bontempi G, Aerts H, Quackenbush J, Haibe-Kains B. Comparison and Validation of Genomic Predictors for Anticancer Drug Sensitivity. Journal of the American Medical Informatics Association. 2013.
Dedeurwaerder S, Defrance M, Bizet M, Calonne E, Bontempi G, Fuks F. A comprehensive overview of Infinium HumanMethylation450 data processing. Briefings in bioinformatics. 2013:bbt054.
Brohée S, Bontempi G. D-peaks: A visual tool to display ChIP-seq peaks along the genome. Transcription. 2012.
Lopes M, Bontempi G. Experimental assessment of static and dynamic algorithms for gene regulation inference from time series expression data. Frontiers in Genetics. 2013.
Olsen C, Fleming K, Prendergast N, Rubio R, Emmert-Streib F, Bontempi G, Haibe-Kains B, Quackenbush J. Inference and validation of predictive gene networks from biomedical literature and gene expression data. Genomics [Internet]. 2014:-.
Dal Pozzolo A, Caelen O, Borgne Y-AL, Waterschoot S, Bontempi G. Learned lessons in credit card fraud detection from a practitioner perspective. Expert Systems with Applications. 2014.
Lerman L, Bontempi G, Markowitch O. A machine learning approach against a masked AES. Journal of Cryptographic Engineering. 2014:1-17.
Lerman L, Bontempi G, Markowitch O. A machine learning approach against a masked AES - Reaching the limit of side-channel attacks with a learning model. J. Cryptographic Engineering [Internet]. 2015:123–139.
Bonnechere B, Wermenbol V, Dan B, Salvia P, Borgne Y-AL, Bontempi G, Vansummeren S, Sholukha V, Moiseev F, Jansen B, et al. Management and interpretation of medical data related to cerebral pasly: the ICT4 Rehab project. European journal of paediatric neurology. 2013:32.

Pages

Theme by Danetsoft and Danang Probo Sayekti inspired by Maksimer