Profil

LEPREVOST Franck

University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)

Main Referenced Co-authors
VARRETTE, Sébastien  (12)
CHITIC, Ioana Raluca  (8)
TOPAL, Ali Osman  (8)
BERNARD, Nicolas  (6)
Roch, J.-L. (6)
Main Referenced Keywords
Black-box attack (3); Computer Science (all) (3); Convolutional Neural Network (3); Convolutional neural network (3); Evolutionary Algorithm (3);
Main Referenced Unit & Research Centers
ULHPC - University of Luxembourg: High Performance Computing (8)
University of Luxembourg: CSC (2)
Main Referenced Disciplines
Mathematics (40)
Computer science (34)
Arts & humanities: Multidisciplinary, general & others (2)
Business & economic sciences: Multidisciplinary, general & others (1)
Chemical engineering (1)

Publications (total 70)

The most downloaded
362 downloads
Thanapol, P., Lavangnananda, K., Bouvry, P., Pinel, F., & Leprevost, F. (2020). Reducing overfitting and improving generalization in training convolutional neural network under limited sample sizes in image recognition. In 5th International Conference on Information Technology, Bangsaen 21-22 October 2020 (pp. 300-305). https://hdl.handle.net/10993/45107

The most cited

70 citations (Scopus®)

Howe, E., Leprévost, F., & Poonen, B. (2000). Large torsion subgroups of split Jacobians of curves of genus two or three. Forum Mathematicum, 12, 315-364. doi:10.1515/form.2000.008 https://hdl.handle.net/10993/12613

LEPREVOST, F.* , TOPAL, A. O.* , MANCELLARI, E.* , & LAVANGNANANDA, K.*. (2023). Zone-of-Interest Strategy for the Creation of High-Resolution Adversarial Images Against Convolutional Neural Networks. In 2023 15th International Conference on Information Technology and Electrical Engineering, ICITEE 2023 (pp. 127-132). Institute of Electrical and Electronics Engineers Inc. doi:10.1109/ICITEE59582.2023.10317668
Peer reviewed
* These authors have contributed equally to this work.

Topal, A. O., Chitic, I. R., & Leprevost, F. (11 May 2023). One evolutionary algorithm deceives humans and ten convolutional neural networks trained on ImageNet at image recognition. Applied Soft Computing, 143, 110397. doi:10.1016/j.asoc.2023.110397
Peer Reviewed verified by ORBi

LEPREVOST, F. (2023). Sur quelques évolutions récentes en cryptologie post-quantique. 1024 : Bulletin de la Société Informatique de France, (21), 185-197. doi:10.48556/sif.1024.21.185
Editorial reviewed

Chitic, I. R., Topal, A. O., & Leprevost, F. (22 March 2023). ShuffleDetect: Detecting Adversarial Images against Convolutional Neural Networks. Applied Sciences, 13 (6), 4068. doi:10.3390/app13064068
Peer Reviewed verified by ORBi

THANAPOL, P., LAVANGNANANDA, K., LEPREVOST, F., SCHLEICH, J., & BOUVRY, P. (2023). Scheduling Deep Learning Training in GPU Cluster Using the Model-Similarity-Based Policy. In N. T. Nguyen & B. Hnatkowska (Eds.), Intelligent Information and Database Systems - 15th Asian Conference, ACIIDS 2023, Proceedings. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-981-99-5837-5_30
Peer reviewed

Pulido-Gaytan, B., Tchernykh, A., LEPREVOST, F., BOUVRY, P., & Goldman, A. (2023). Toward Understanding Efficient Privacy-Preserving Homomorphic Comparison. IEEE Access, 11, 102189 - 102206. doi:10.1109/ACCESS.2023.3315655
Peer Reviewed verified by ORBi

LEPREVOST, F., TOPAL, A. O., & MANCELLARI, E. (2023). Creating High-Resolution Adversarial Images Against Convolutional Neural Networks with the Noise Blowing-Up Method. In N. T. Nguyen & B. Hnatkowska (Eds.), Intelligent Information and Database Systems - 15th Asian Conference, ACIIDS 2023, Proceedings (pp. 121-134). Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-981-99-5834-4_10
Peer reviewed

Leprevost, F., Topal, A. O., Avdusinovic, E., & Chitic, I. R. (2022). Strategy and Feasibility Study for the Construction of High Resolution Images Adversarial Against Convolutional Neural Networks. In ACIIDS 2022: Intelligent Information and Database Systems (pp. 285-298). Springer. doi:10.1007/978-3-031-21743-2_23
Peer reviewed

Leprevost, F., Topal, A. O., Avdusinovic, E., & Chitic, I. R. (22 October 2022). A strategy creating high-resolution adversarial images against convolutional neural networks and a feasibility study on 10 CNNs. Journal of Information and Telecommunication, 7 (1), 89-119. doi:10.1080/24751839.2022.2132586
Peer Reviewed verified by ORBi

Chitic, R., Topal, A. O., & Leprevost, F. (2022). Empirical Perturbation Analysis of Two Adversarial Attacks: Black Box versus White Box. Applied Sciences, 12 (14), 7339. doi:10.3390/app12147339
Peer reviewed

Chitic, I. R., Topal, A. O., & Leprevost, F. (2021). Evolutionary Algorithm-based images, humanly indistinguishable and adversarial against Convolutional Neural Networks: efficiency and filter robustness. IEEE Access. doi:10.1109/ACCESS.2021.3131255
Peer Reviewed verified by ORBi

Chitic, I. R., Deridder, N., Leprevost, F., & Bernard, N. (17 August 2021). Robustness of Adversarial Images against Filters. Optimization and Learning, 1443, 101-114.
Peer reviewed

Leprevost, F. (2021). Le rôle civilisationnel des universités. La Revue des Deux Mondes.

Leprevost, F. (2021). Universities and Civilizations. ISTE and Wiley.

Cortés-Mendoza, J., Tchernykh, A., Babenko, M., Pulido-Gaytan, L. B., Radchenko, G., Leprevost, F., Wang, X., & Avetisyan, A. (2020). Privacy-Preserving Logistic Regression as a Cloud Service Based on Residue Number System. In V. Voevodin & S. Sobolev (Eds.), 6th Russian Supercomputing Days, Moscow 21-22 September 2020 (pp. 598-610). Springer. doi:10.1007/978-3-030-64616-5_51
Peer reviewed

Chitic, I. R., Leprevost, F., & Bernard, N. (2020). Evolutionary algorithms deceive humans and machines at image classification: An extended proof of concept on two scenarios. Journal of Information and Telecommunication. doi:10.1080/24751839.2020.1829388
Peer Reviewed verified by ORBi

Thanapol, P., Lavangnananda, K., Bouvry, P., Pinel, F., & Leprevost, F. (2020). Reducing overfitting and improving generalization in training convolutional neural network under limited sample sizes in image recognition. In 5th International Conference on Information Technology, Bangsaen 21-22 October 2020 (pp. 300-305).
Peer reviewed

Leprevost, F. (2020). How big is big? How fast is fast? A Hands-On Tutorial on Mathematics of Computation. Amazon.

Chitic, R. I., Bernard, N., & Leprévost, F. (2020). A proof of concept to deceive humans and machines at image classification with evolutionary algorithms. In I. R. Chitic, N. Bernard, ... F. Leprévost, Proceedings of ACIIDS 2020 (pp. 467-480). Springer.
Peer reviewed

Bernard, N., & Leprévost, F. (2019). How Evolutionary Algorithms and Information Hiding deceive machines and humans for image recognition: A research program. In T. Theeramunkong, P. Bouvry (Ed.), ... P. Srichaikul (Ed.), Proceedings of the OLA'2019 International Conference on Optimization and Learning (Bangkok, Thailand, Jan 29-31, 2019) (pp. 12-15). Springer.
Peer reviewed

Bernard, N., & Leprévost, F. (2018). Evolutionary Algorithms for Convolutional Neural Network Visualisation. In E. Meneses, H. Castro, C. J. Barrios Hernández, ... R. Ramos-Pollan (Eds.), High Performance Computing -- 5th Latin American Conference, CARLA 2018, Piedecuesta, Colombia. Springer.
Peer reviewed

Leprévost, F. (2018). The University of Luxembourg: A National Excellence Initiative. In P. Altbach, L. Reisberg, J. Salmi, ... I. Froumin (Eds.), Accelerated Universities: A ideas and Money Combine to Build Academic Excellence (pp. 152-173). Netherlands: Brill.
Peer reviewed

Leprévost, F., Bernard, N., & Bouvry, P. (2018). Elliptic Curves Discrete Logarithm Problem over a Finite Field Fp and p-adic Approximations. Proceedings of the 3rd International Conference on Applications in Information Technology (ICAIT-2018), 9-15. doi:10.1145/3274856.3274860
Peer reviewed

Leprévost, F. (2018). James Bond's Most Secret Weapon. Proceedings of the 3rd International Conference on Applications in Information Technology, 1-2. doi:10.1145/3274856.3274857
Peer reviewed

Bernard, N., & Leprévost, F. (February 2013). Hardened Bloom Filters, with an Application to Unobservability. Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica, 12 (4), 11-22. doi:10.2478/v10065-012-0018-y
Peer reviewed

Klopotek, M., Leprévost, F., Marciniak, M., Mykowiecka, A., Rybinski, H., & Bouvry, P. (Eds.). (2012). Security and Intelligent Information Systems. Springer.

Bernard, N., & Leprévost, F. (2012). Beyond Tor: The TrueNyms Protocol. In Security and Intelligent Information Systems (pp. 68-84). Springer. doi:10.1007/978-3-642-25261-7_6
Peer reviewed

Leprévost, F., Pohst, M., & Uzunkol, O. (2011). On the Computation of Class Polynomials with "Thetanullwerte" and Its Applications to the Unit Group Computation. Experimental Mathematics, 20 (3), 271-281. doi:10.1080/10586458.2011.565234
Peer Reviewed verified by ORBi

Leprévost, F., Bernard, N., & Pohst, M. (2009). Jacobians of genus 2 curves with a rational point of order 11. Experimental Mathematics, 18 (1), 65-70. doi:10.1080/10586458.2009.10128884
Peer Reviewed verified by ORBi

Dumas, J.-G., Leprévost, F., Roch, J.-L., Savin, V., & Varrette, S. (2007). Cryptographie à Clef Publique. In T. Ebrahimi, F. Leprévost, ... B. Warusfel (Eds.), Cryptographie et sécurité des systèmes et réseaux, 2 (pp. 103-182). Cachan, Unknown/unspecified: Lavoisier.
Peer reviewed

Leprévost, F., Pohst, M., & Schöpp, A. (2007). Units in some parametric families of quartic fields. Acta Arithmetica, 127 (3), 205-216. doi:10.4064/aa127-3-1
Peer reviewed

Leprévost, F., Varrette, S., Roch, J.-L., & Dumas, J.-G. (2006). chap "Architectures PKI". In Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux. Lavoisier-Hermes.
Peer reviewed

Dumas, J.-G., Leprévost, F., Roch, J.-L., Savin, V., & Varrette, S. (2006). chap. "Cryptographie à Clé Publique". In Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux (pp. 103--196). Hermès.
Peer reviewed

Ebrahimi, T., Leprévost, F., & Warusfel, B. (Eds.). (2006). Cryptographie et sécurité des systèmes et réseaux. Hermès-Lavoisier.

Ebrahimi, T., Leprévost, F., & Warusfel, B. (Eds.). (2006). Enjeux de la sécurité multimédia. Hermès-Lavoisier.

Leprévost, F., Ebrahimi, T., & Warusfel, B. (2006). Réalités de l'espionnage électronique. Lavoisier-Hermes.

Varrette, S., Roch, J.-L., Montagnat, J., Seitz, L., Pierson, J.-M., & Leprévost, F. (2006). Safe Distributed Architecture for Image-based Computer Assisted Diagnosis. In Proc. of the IEEE Intl. Conf. on Pervasive Services, Workshop on Health Pervasive Systems (HPS'06). Lyon, France, Unknown/unspecified: IEEE Computer Society. doi:10.1109/PERSER.2006.1652198
Peer reviewed

Varrette, S., Roch, J.-L., & Leprévost, F. (2006). Applicative Solutions for Safe Computations in Distributed Environments. In Workshop "Trustworthy Software". Saarbrücken, Germany, Unknown/unspecified: Dagstuhl Research Online Publication Server (DROPS).
Peer reviewed

Varrette, S., Georget, S., Montagnat, J., Roch, J.-L., & Leprévost, F. (2005). Distributed Authentication in GRID5000. In Proc. of OTM Confederated Int. Workshops on Grid Computing and its Application to Data Analysis (GADA'05) (pp. 314-326). LNCS. doi:10.1007/11575863_51
Peer reviewed

Leprévost, F., Monnerat, J., Varrette, S., & Vaudenay, S. (2005). Generating anomalous elliptic curves. Information Processing Letters, 93, 225-230. doi:10.1016/j.ipl.2004.11.008
Peer Reviewed verified by ORBi

Varrette, S., Georget, S., Roch, J.-L., & Leprévost, F. (2005). Authentification Distribuée sur Grille de Grappes basée sur LDAP. In Proc. des 16èmes rencontres francophones du parallélisme (RenPar'16).
Peer reviewed

Varrette, S., Roch, J.-L., & Leprévost, F. (2004). FlowCert : Probabilistic certification for parallel processing on the grid. IEEE, editor. Proceedings of the 16th Symposium on Computer Architecture and High Performance Computing. IEEE-SBAC PAD 2004, Foz do Iguaçu, Brésil, octobre 2004, 108-115.
Peer reviewed

Leprévost, F., Pohst, M., & Schöpp, A. (2004). Rational torsion of J_0(N) for hyperelliptic modular curves and families of Jacobians of genus 2 and genus 3 curves with a rational point of order 5, 7 or 10. Abhandlungen aus dem Mathematischen Seminar der Universität Hamburg, 74, 193-203. doi:10.1007/BF02941535
Peer reviewed

Varrette, S., Roch, J.-L., Denneulin, Y., & Leprévost, F. (2004). Secure architectures for clusters and grid computations. Proceedings de CRIS 2004 (2nd International Conference on Critical Infrastructures), Grenoble, France, Octobre 2004.
Peer reviewed

Varrette, S., Roch, J.-L., Denneulin, Y., & Leprévost, F. (2004). Secure Architecture for Clusters and Grids. In Proc. of the 2nd Int. Conf. on Critical Infrastructures (CRIS 2004). Grenoble, France, Unknown/unspecified: IEEE.
Peer reviewed

Varrette, S., Roch, J.-L., & Leprévost, F. (2004). FlowCert : Probabilistic Certification for Peer-to-Peer Computations. In Proc. of the 16th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2004) (pp. 108--115). Foz do Iguaçu, Brazil, Unknown/unspecified: IEEE Computer Society. doi:10.1109/SBAC-PAD.2004.17
Peer reviewed

Leprévost, F. (2003). An Overview Of Public-Key Cryptology. DPP 2003: International Conference on Digital Production Printing and Industrial Applications.
Peer reviewed

Gillard, R., Leprévost, F., Pantchichkine, A., & Roblot, X. (2003). Utilisation des modules elliptiques de Drinfeld en cryptologie. Comptes Rendus. Mathématique, 336 (11), 879-882.
Peer Reviewed verified by ORBi

Leprévost, F., Pohst, M., & Schöpp, A. (2003). Familles de polynômes liées aux courbes modulaires X_1(l) unicursales et points rationnels non-triviaux de courbes elliptiques quotient. Acta Arithmetica, 110 (4), 401-410. doi:10.4064/aa110-4-6
Peer reviewed

Warusfel, B., & Leprévost, F. (2002). Cryptographie et lutte contre le terrorisme : éviter les fausses solutions sécuritaires. Droit et Défense.
Peer reviewed

Leprévost, F., & Warusfel, B. (2001). Echelon: origines et perspectives d'un débat transnational. Annuaire Français des Relations Internationales, 2, 865-888.
Peer reviewed

Flynn, E. V., Leprévost, F., Schaefer, E. F., Stein, W., Stoll, M., & Wetherell, J. L. (2001). Empirical evidence for the Birch and Swinnerton-Dyer conjectures for the modular Jacobians of genus 2 curves. Mathematics of Computation, 70 (236), 1675-1697. doi:10.1090/S0025-5718-01-01320-5
Peer reviewed

Howe, E., Leprévost, F., & Poonen, B. (2000). Large torsion subgroups of split Jacobians of curves of genus two or three. Forum Mathematicum, 12, 315-364. doi:10.1515/form.2000.008
Peer reviewed

Boxall, J., Grant, D., & Leprévost, F. (2000). Five torsion points on curves of genus two. Proceedings of the London Mathematical Society.
Peer Reviewed verified by ORBi

Ebrahimi, T., Erard, R., Kutter, M., Leprévost, F., & Santa Cruz, D. (2000). How to bypass the Wassenaar Arrangement: A new application for watermarking. Abstract book of 8th ACM International Multimedia Conference on Multimedia and Security, 161-164.
Peer reviewed

Leprévost, F., & Markushevich, D. (1999). An infinite tower of genus 2 curves related to the Kowalewski top. Journal für die Reine und Angewandte Mathematik, 514, 103-111.
Peer reviewed

Leprévost, F. (1999). Sur certaines surfaces elliptiques et courbes elliptiques de Mordell de rang non-nul associées à des discriminants de polynômes cubiques ou quartiques. Journal of Number Theory, 78, 149-160.
Peer reviewed

Leprévost, F. (1999). AES und IEEE-P1363, die kryptographischen Standards des 21. Jahrhunderts. Tagungsband des 6. Deutschen IT-Sicherheitskongresses des BSI, 485-491.
Peer reviewed

Kutter, M., & Leprévost, F. (1999). Symbiose von Kryptographie und digitalen Wasserzeichen: effizienter Schutz des Urheberrechtes digitaler Medien. Tagungsband des 6. Deutschen IT-Sicherheitskongresses des BSI, 479-484.
Peer reviewed

Fermigier, S., Leprévost, F., & FIEKER, C. (1999). Appendice : quelques données statistiques. Journal of Number Theory, 78, 160-165.
Peer reviewed

Leprévost, F. (1999). The modular points of a genus 2 quotient of X_0(67). Proceedings of the Finite Field Conference of the American Mathematical Society (Contemporary Mathematics), 245, 181-187.
Peer reviewed

Leprévost, F. (1999). Les standards cryptographiques du XXI-eme siecle : AES et IEEE-P1363. Gazette des Mathématiciens.
Peer reviewed

Leprévost, F. (1999). Peter Shor, prix Nevanlinna 1998. Gazette des Mathématiciens, 81.
Peer reviewed

Leprévost, F., & Morain, F. (1997). Revêtements de courbes elliptiques à multiplication complexe par des courbes hyperelliptiques et sommes de caractères. Journal of Number Theory, 64 (2), 165-182. doi:10.1006/jnth.1997.2070
Peer reviewed

Leprévost, F. (1997). Une caractérisation différentielle des points de Weierstrass généralisés d'une surface de Riemann compacte de genre g > 1. Journal de Mathématiques Pures et Appliquées, 76, 801-804. doi:10.1016/S0021-7824(97)89970-9
Peer Reviewed verified by ORBi

Leprévost, F. (1997). Sur certains sous-groupes de torsion de Jacobiennes de courbes hyperelliptiques de genre g > 0. Manuscripta Mathematica, 92 (I), 47-63. doi:10.1007/BF02678180
Peer Reviewed verified by ORBi

Leprévost, F. (1996). Sur une conjecture sur les points de torsion rationnels des Jacobiennes de courbes. Journal für die Reine und Angewandte Mathematik, 473, 59-68. doi:10.1515/crll.1995.473.59
Peer reviewed

Leprévost, F. (1995). Jacobiennes de certaines courbes de genre 2 : torsion et simplicité. Journal de Théorie des Nombres de Bordeaux, 7, 283-306.
Peer Reviewed verified by ORBi

Leprévost, F. (1992). Famille de courbes hyperelliptiques de genre g munies d'une classe de diviseurs rationnels d'ordre 2g^2+4g+1. Séminaire de Théorie des Nombres, 116, 107-119.
Peer reviewed

Leprévost, F. (1992). Torsion sur des familles de courbes de genre g. Manuscripta Mathematica, 75, 303-326. doi:10.1007/BF02567087
Peer Reviewed verified by ORBi

Contact ORBilu