What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Teddy Furon
Google Scholar
ORCID:
0000-0002-1565-765X
22
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
On the Vulnerability of Retrieval in High Intrinsic Dimensionality Neighborhood.
Teddy Furon
2023
journals/tifs
Fingerprinting Classifiers With Benign Inputs.
Thibault Maho
Teddy Furon
Erwan Le Merrer
2022
journals/tifs
Generating Adversarial Images in Quantized Domains.
Benoît Bonnet
Teddy Furon
Patrick Bas
2021
journals/tifs
High Intrinsic Dimensionality Facilitates Adversarial Attack: Theoretical Evidence.
Laurent Amsaleg
James Bailey
Amélie Barbe
Sarah M. Erfani
Teddy Furon
Michael E. Houle
Milos Radovanovic
Xuan Vinh Nguyen
2021
journals/tifs
Walking on the Edge: Fast, Low-Distortion Adversarial Examples.
Hanwei Zhang
Yannis Avrithis
Teddy Furon
Laurent Amsaleg
2020
conf/ih
What if Adversarial Samples were Digital Images?
Benoît Bonnet
Teddy Furon
Patrick Bas
2019
conf/ih
Watermarking Error Exponents in the Presence of Noise: The Case of the Dual Hypercone Detector.
Teddy Furon
2016
conf/ih
Differentially Private Matrix Factorization using Sketching Techniques.
Raghavendran Balu
Teddy Furon
2016
conf/ih
Group Testing for Identification with Privacy.
Ahmet Iscen
Teddy Furon
2014
conf/esorics
Challenging Differential Privacy: The Case of Non-interactive Mechanisms.
Raghavendran Balu
Teddy Furon
Sébastien Gambs
2013
journals/tifs
A New Measure of Watermarking Security: The Effective Key Length.
Patrick Bas
Teddy Furon
2013
conf/ih
Secure and efficient approximate nearest neighbors search.
Benjamin Mathon
Teddy Furon
Laurent Amsaleg
Julien Bringer
2012
journals/tifs
Toward Practical Joint Decoding of Binary Tardos Fingerprinting Codes.
Peter Meerwald
Teddy Furon
2012
conf/ih
A New Measure of Watermarking Security Applied on QIM.
Teddy Furon
Patrick Bas
2011
conf/ih
Towards Joint Tardos Decoding: The 'Don Quixote' Algorithm.
Peter Meerwald
Teddy Furon
2011
conf/ih
An Asymmetric Fingerprinting Scheme Based on Tardos Codes.
Ana Charpentier
Caroline Fontaine
Teddy Furon
Ingemar J. Cox
2009
conf/ih
Estimating the Minimal Length of Tardos Code.
Teddy Furon
Luis Pérez-Freire
Arnaud Guyader
Frédéric Cérou
2008
conf/ih
On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes.
Teddy Furon
Arnaud Guyader
Frédéric Cérou
2007
journals/tifs
A Constructive and Unifying Framework for Zero-Bit Watermarking.
Teddy Furon
2006
journals/tifs
Security of Lattice-Based Data Hiding Against the Known Message Attack.
Luis Pérez-Freire
Fernando Pérez-González
Teddy Furon
Pedro Comesaña
2002
conf/ih
Robustness and Efficiency of Non-linear Side-Informed Watermarking.
Guenole C. M. Silvestre
Neil J. Hurley
Teddy Furon
1999
conf/ih
An Asymmetric Public Detection Watermarking Technique.
Teddy Furon
Pierre Duhamel
Coauthors
Ahmet Iscen
(1)
Amélie Barbe
(1)
Ana Charpentier
(1)
Arnaud Guyader
(2)
Benjamin Mathon
(1)
Benoît Bonnet
(2)
Caroline Fontaine
(1)
Erwan Le Merrer
(1)
Fernando Pérez-González
(1)
Frédéric Cérou
(2)
Guenole C. M. Silvestre
(1)
Hanwei Zhang
(1)
Ingemar J. Cox
(1)
James Bailey
(1)
Julien Bringer
(1)
Laurent Amsaleg
(3)
Luis Pérez-Freire
(2)
Michael E. Houle
(1)
Milos Radovanovic
(1)
Neil J. Hurley
(1)
Patrick Bas
(4)
Pedro Comesaña
(1)
Peter Meerwald
(2)
Pierre Duhamel
(1)
Raghavendran Balu
(2)
Sarah M. Erfani
(1)
Sébastien Gambs
(1)
Teddy Furon
(22)
Thibault Maho
(1)
Xuan Vinh Nguyen
(1)
Yannis Avrithis
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to