Search Results - "Barrué, Grégoire"

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Layered Uploading for Quantum Convolutional Neural Networks by Barrué, Grégoire, Quertier, Tony

    Published 15-04-2024
    “…Continuing our analysis of quantum machine learning applied to our use-case of malware detection, we investigate the potential of quantum convolutional neural…”
    Get full text
    Journal Article
  2. 2

    Use of Multi-CNNs for Section Analysis in Static Malware Detection by Quertier, Tony, Barrué, Grégoire

    Published 06-02-2024
    “…Existing research on malware detection focuses almost exclusively on the detection rate. However, in some cases, it is also important to understand the results…”
    Get full text
    Journal Article
  3. 3

    Towards an in-depth detection of malware using distributed QCNN by Quertier, Tony, Barrué, Grégoire

    Published 19-12-2023
    “…Malware detection is an important topic of current cybersecurity, and Machine Learning appears to be one of the main considered solutions even if certain…”
    Get full text
    Journal Article
  4. 4

    Quantum Machine Learning for Malware Classification by Barrué, Grégoire, Quertier, Tony

    Published 09-05-2023
    “…In a context of malicious software detection, machine learning (ML) is widely used to generalize to new malware. However, it has been demonstrated that ML…”
    Get full text
    Journal Article
  5. 5

    From Stochastic Zakharov System to Multiplicative Stochastic Nonlinear Schr{\"o}dinger Equation by Barrué, Grégoire, de Bouard, Anne, Debussche, Arnaud

    Published 23-09-2024
    “…We study the convergence of a Zakharov system driven by a time white noise, colored in space, to a multiplicative stochastic nonlinear Schr{\"o}dinger…”
    Get full text
    Journal Article
  6. 6

    A Lean Transformer Model for Dynamic Malware Analysis and Detection by Quertier, Tony, Marais, Benjamin, Barrué, Grégoire, Morucci, Stéphane, Azé, Sévan, Salladin, Sébastien

    Published 05-08-2024
    “…Malware is a fast-growing threat to the modern computing world and existing lines of defense are not efficient enough to address this issue. This is mainly due…”
    Get full text
    Journal Article