Contents
Academic literature on the topic 'Attaques par exemples contradictoires'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attaques par exemples contradictoires.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Attaques par exemples contradictoires"
Rhéault, Sylvie. "Domicile ou hébergement? Quand les croyances prennent le dessus." Service social 43, no. 1 (April 12, 2005): 33–46. http://dx.doi.org/10.7202/706641ar.
Full textClavier, Tatiana. "La Querelle des femmes au coeur de quatre « Institutions » de l’élite imprimées et largement diffusées en français dans la seconde moitié du XVIe siècle." Renaissance and Reformation 46, no. 3 (February 15, 2024): 163–89. http://dx.doi.org/10.33137/rr.v46i3.42640.
Full textMottier, Véronique. "État et contrôle de la sexualité reproductive : l’exemple des politiques eugénistes dans les démocraties libérales (Suisse, Suède et Royaume-Uni)1." Articles 31, no. 2 (February 22, 2013): 31–50. http://dx.doi.org/10.7202/1014350ar.
Full textKassühlke, Rudolph. "Gedanken zur Übersetzung poetischer Bibeltexte." Meta 32, no. 1 (September 30, 2002): 76–84. http://dx.doi.org/10.7202/003284ar.
Full textINGRAND, S., and B. DEDIEU. "Numéro spécial : Quelles innovations pour quels systèmes d'élevage ?" INRAE Productions Animales 27, no. 2 (June 1, 2014): 75–76. http://dx.doi.org/10.20870/productions-animales.2014.27.2.3055.
Full textLabrusse, Rémi. "Condition moderne et renversements du temps." Textes et contextes, no. 17-1 (July 15, 2022). http://dx.doi.org/10.58335/textesetcontextes.3473.
Full textDissertations / Theses on the topic "Attaques par exemples contradictoires"
Hamza, Anis Amazigh. "Improving cooperative non-orthogonal multiple access (CNOMA) and enhancing the physical layer security (PLS) for beyond 5G (B5G) and future eHealth wireless networks." Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2023. http://www.theses.fr/2023UPHF0006.
Full textThe fifth generation of cellular networks (5G) was a real revolution in radio access technologies and mobile networks, presenting itself as the breakthrough generation that allowed the coexistence of extremely diversified applications and usage scenarios, unified under the same standard. Nevertheless, 5G is just the beginning: new scenarios and challenges are emerging. Therefore, the research community is pushing the research ahead and preparing the ground for beyond 5G (B5G) cellular systems. In this regard, several enabling technologies are investigated. In addition to the cognitive radio (CR), mmWave, massive MIMO, or even the use of full-duplex (FD), non-orthogonal multiple access (NOMA) emerged as a promising technology that allows multiple users to share the same resource block and hence, optimizes resource allocation, reduces the end-to-end latency, and improves both spectrum and energy efficiencies. Those advantages make NOMA a serious candidate as a multiple access scheme for future B5G networks, especially for the demanding eHealth applications. Furthermore, NOMA can be flexibly combined with any wireless technology such as cooperative communication, FD, mmWave, and multicarrier modulation (MCM).Motivated by this treatise, this thesis provides a comprehensive and intensive examination of this emerging technology, particularly, cooperative NOMA (CNOMA) which is considered a promising enabling technology for future B5G eHealth networks, from the basic principles to its combination with the full-duplex technology, MCM transmission, to deep learning as well as enhancing the physical layer security (PLS).First, this thesis investigates the error rate performance of FD-CNOMA systems over wireless fading channels. New closed-form expressions of the exact bit error rates (BER) are derived. Moreover, high-SNR analyses are conducted, which reveals that FD-CNOMA has an error floor due to the successive interference cancellation (SIC) imperfections and residual self-interference (RSI). Based on the derived expressions, a novel selective relaying scheme is proposed to opportunistically improve the system performance using the minimal channel state information (CSI) overhead.Second, the MCM-based CNOMA is examined under doubly selective channels encountered in vehicular and railway wireless communications. In the eHealth context, this can be projected to ambulance emergency healthcare use cases. More importantly, this thesis presents a performance improvement method for cell-edge users of MCM-NOMA systems with imperfect SIC and imperfect CSI under doubly selective wireless channels. Two efficient iterative interference cancellation schemes are proposed to enable user relaying for MCM-based CNOMA. The proposed schemes are robust for high mobility scenarios with a relatively low computational complexity.Third and last, advances in machine learning based on deep neural networks (DNNs) attracted great attention in the wireless communication community (WCS). It is regarded as a key component of B5G networks. Deep learning has found a broad range of applications in wireless systems, e.g., spectrum sensing, waveform design, SIC, and channel estimation. However, DNNs are known to be highly susceptible to adversarial attacks. Many robust over-the-air adversarial attacks against DNN-based WCS have been proposed in the literature. This is becoming a major challenge facing the physical layer security (PLS) of DNN-based WCS. To overcome this vulnerability, this thesis proposes a novel robust defense approach. The objective of our defense is to protect the victim without significantly degrading the accuracy of its baseline model in the absence of the attack. The obtained results are very promising and confirm that the proposed defense technique can enhance significantly the PLS of future DNN-based WCS