Searched for: author%3A%22Decouchant%2C+J%C3%A9r%C3%A9mie%22
(1 - 16 of 16)
document
Shoker, Ali (author), Rahli, Vincent (author), Decouchant, Jérémie (author), Esteves-Veríssimo, Paulo (author)
Current vehicular Intrusion Detection and Prevention Systems either incur high false-positive rates or do not capture zero-day vulnerabilities, leading to safety-critical risks. In addition, prevention is limited to few primitive options like dropping network packets or extreme options, e.g., ECU Bus-off state. To fill this gap, we introduce the...
conference paper 2023
document
Nasrulin, B. (author), Ishmaev, G. (author), Decouchant, Jérémie (author), Pouwelse, J.A. (author)
Manipulation of user transactions by miners in permissionless blockchain systems is a growing concern. This problem is a pervasive and systemic issue that incurs high costs for users of decentralised applications and is known as Miner Extractable Value (MEV). Furthermore, transaction manipulations create other issues such as congestion,...
conference paper 2023
document
Decouchant, Jérémie (author), Kulahcioglu Ozkan, Burcu (author), Zhou, Yanzhuo (author)
Byzantine consensus protocols aim at maintaining safety guarantees under any network synchrony model and at providing liveness in partially or fully synchronous networks. However, several Byzantine consensus protocols have been shown to violate liveness properties under certain scenarios. Existing testing methods for checking the liveness of...
conference paper 2023
document
Fernandes, Maria (author), Decouchant, Jérémie (author), Couto, Francisco M. (author)
DNA computing is an emerging field that aims at enabling more efficient data storage and processing. One principle of DNA computing is to encode some information (e.g., image, video, programming scripts) into a digital DNA-like sequence and then synthesize the corresponding DNA molecule. Synthesizing this molecule using digital or real human...
book chapter 2023
document
Xu, J. (author), Hong, C. (author), Huang, J. (author), Chen, Lydia Y. (author), Decouchant, Jérémie (author)
Federated learning is a private-by-design distributed learning paradigm where clients train local models on their own data before a central server aggregates their local updates to compute a global model. Depending on the aggregation method used, the local updates are either the gradients or the weights of local learning models, e.g., FedAvg...
conference paper 2023
document
Pascoal, Túlio (author), Decouchant, Jérémie (author), Boutet, Antoine (author), Völp, Marcus (author)
Genome-wide Association Studies (GWASes) identify genomic variations that are statistically associated with a trait, such as a disease, in a group of individuals. Unfortunately, careless sharing of GWAS statistics might give rise to privacy attacks. Several works attempted to reconcile secure processing with privacy-preserving releases of GWASes...
conference paper 2022
document
Pascoal, Túlio (author), Decouchant, Jérémie (author), Völp, Marcus (author)
Genome-wide association studies (GWAS) identify correlations between the genetic variants and an observable characteristic such as a disease. Previous works presented privacy-preserving distributed algorithms for a federation of genome data holders that spans multiple institutional and legislative domains to securely compute GWAS results....
conference paper 2022
document
Cox, B.A. (author), Chen, Lydia Y. (author), Decouchant, Jérémie (author)
Federated Learning (FL) is a popular deep learning approach that prevents centralizing large amounts of data, and instead relies on clients that update a global model using their local datasets. Classical FL algorithms use a central federator that, for each training round, waits for all clients to send their model updates before aggregating them...
conference paper 2022
document
Bonomi, Silvia (author), Decouchant, Jérémie (author), Farina, Giovanni (author), Rahli, Vincent (author), Tixeuil, Sébastien (author)
Nous considérons un réseau (modélisé par un graphe) utilisé pour propager des informations. Dans ce contexte, une source d’information diffuse à l’ensemble du réseau un message. Si la source est fiable, c’est à dire qu’elle envoie le même message à tous ses voisins directs, on souhaite qu’un nombre limité de participants malveillants qui tentent...
conference paper 2022
document
Chotkan, R.M. (author), Decouchant, Jérémie (author), Pouwelse, J.A. (author)
Decentralised Autonomous Organisations (DAOs) have the capability of being a disruptive Web3 technology. Their usage of cryptographically secure distributed ledgers shows promise of replacing existing technical and financial intermediaries. However, this promise has not been fully materialised yet: existing attempts typically rely on...
conference paper 2022
document
Decouchant, Jérémie (author), Kozhaya, David (author), Rahli, Vincent (author), Yu, Jiangshan (author)
Recently, streamlined Byzantine Fault Tolerant (BFT) consensus protocols, such as HotStuff, have been proposed as a means to circumvent the inefficient view-changes of traditional BFT protocols, such as PBFT. Several works have detailed trusted components, and BFT protocols that leverage them to tolerate a minority of faulty nodes and use a...
conference paper 2022
document
Chotkan, R.M. (author), Decouchant, Jérémie (author), Pouwelse, J.A. (author)
Self-Sovereign Identity (SSI) aspires to create a standardised identity layer for the Internet by placing citizens at the centre of their data, thereby weakening the grip of big tech on current digital identities. However, as millions of both physical and digital identities are lost annually, it is also necessary for SSIs to possibly be revoked...
conference paper 2022
document
Simoes Silva, Douglas (author), Graczyk, Rafal (author), Decouchant, Jérémie (author), Völp, Marcus (author), Esteves-Veríssimo, Paulo (author)
Critical infrastructures have to withstand advanced and persistent threats, which can be addressed using Byzantine fault tolerant state-machine replication (BFT-SMR). In practice, unattended cyberdefense systems rely on threat level detectors that synchronously inform them of changing threat levels. However, to have a BFT-SMR protocol operate...
conference paper 2021
document
Cao, Tong (author), Decouchant, Jérémie (author), Yu, Jiangshan (author), Esteves-Veríssimo, Paulo (author)
While previous works have discussed the network delay upper bound that guarantees the consistency of Nakamoto consensus, measuring the actual network latencies and evaluating their impact on miners/pools in Bitcoin remain open questions. This paper fills this gap by: (1) defining metrics that quantify the impact of network latency on the mining...
conference paper 2021
document
Kozhaya, David (author), Decouchant, Jérémie (author), Rahli, Vincent (author), Esteves-Verissimo, Paulo (author)
The accelerated digitalisation of society along with technological evolution have extended the geographical span of cyber-physical systems. Two main threats have made the reliable and real-time control of these systems challenging: (i) uncertainty in the communication infrastructure induced by scale, and heterogeneity of the environment and...
journal article 2021
document
Bonomi, Silvia (author), Decouchant, Jérémie (author), Farina, Giovanni (author), Rahli, Vincent (author), Tixeuil, Sébastien (author)
In this paper, we consider the Byzantine reliable broadcast problem on authenticated and partially connected networks. The state-of-the-art method to solve this problem consists in combining two algorithms from the literature. Handling asynchrony and faulty senders is typically done thanks to Gabriel Bracha's authenticated double-echo...
conference paper 2021
Searched for: author%3A%22Decouchant%2C+J%C3%A9r%C3%A9mie%22
(1 - 16 of 16)