Michel Barbeau
Orcid: 0000-0003-3531-4926Affiliations:
- Carleton University, Ottawa, Canada
According to our database1,
Michel Barbeau
authored at least 137 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on github.com
On csauthors.net:
Bibliography
2024
Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm.
EURASIP J. Inf. Secur., December, 2024
Wirel. Networks, July, 2024
Proceedings of the IFIP Networking Conference, 2024
Location Optimization for Tethered Aerial Base Station Serving mmWave High Altitude UAVs.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2024
Optimal UAV-Trajectory Design in a Dynamic Environment Using NOMA and Deep Reinforcement Learning.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2024
2023
Repeated Purification versus Concatenated Error Correction in Fault Tolerant Quantum Networks.
CoRR, 2023
Proceedings of the 17th International Conference on Underwater Networks & Systems, 2023
Learning a Policy for Pursuit-Evasion Games Using Spiking Neural Networks and the STDP Algorithm.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2023
Proceedings of the IFIP Networking Conference, 2023
Analysis of Experimental Data Fusion Schemes for Underwater Communication over a Hydrophone Array.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2023
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2023
2022
Quantum Inf. Process., 2022
Quantum Inf. Process., 2022
Benchmark Performance of a New Quantum-Safe Multivariate Polynomial Digital Signature Algorithm.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2022
Proceedings of the 30th Mediterranean Conference on Control and Automation, 2022
Uplink Interference Management in Cellular-Connected UAV Networks Using Multi-Armed Bandit and NOMA.
Proceedings of the IEEE Latin-American Conference on Communications, 2022
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
Benchmark Performance of the Multivariate Polynomial Public Key Encapsulation Mechanism.
Proceedings of the Risks and Security of Internet and Systems, 2022
Proceedings of the 29th Computer & Electronics Security Application Rendezvous co-located with the 7th European Cyber Week (ECW 2022), 2022
2021
GPS-Free, Error Tolerant Path Planning for Swarms of Micro Aerial Vehicles with Quality Amplification ‡.
Sensors, 2021
IEEE Access, 2021
Performance Analysis of the Quantum Safe Multivariate Polynomial Public Key Algorithm.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2021
Performance of an Underwater Communication System in a Sea Trial Done in the Canadian Arctic<sup>*</sup>.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021
Pilot Contamination Attack Detection in 5G Massive MIMO Systems Using Generative Adversarial Networks.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021
Indistinguishability and Non-deterministic Encryption of the Quantum Safe Multivariate Polynomial Public Key Cryptographic System.
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021
Proceedings of the Ad Hoc Networks and Tools for IT - 13th EAI International Conference, 2021
2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2020
Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2020
2019
Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications.
Trans. Emerg. Telecommun. Technol., 2019
Quality Amplification of Error Prone Navigation for Swarms of Micro Aerial Vehicles (with Detailed Simulations).
CoRR, 2019
Proceedings of the IEEE INFOCOM 2019, 2019
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Faking and Discriminating the Navigation Data of a Micro Aerial Vehicle Using Quantum Generative Adversarial Networks.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
2018
Doppler Effect in the Acoustic Ultra Low Frequency Band for Wireless Underwater Networks.
Mob. Networks Appl., 2018
No-Key Semi-Quantum Direct Communication Protocol with Low Quantum Resource Requirements.
CoRR, 2018
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018
2017
Simulation and modeling of hydro acoustic communication channels with wide band attenuation and ambient noise.
Int. J. Parallel Emergent Distributed Syst., 2017
Proceedings of the International Conference on Underwater Networks & Systems, 2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the Quantum Technology and Optimization Problems, 2017
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017
The Sound of Communication in Underwater Acoustic Sensor Networks - (Position Paper).
Proceedings of the Ad Hoc Networks, 2017
Proceedings of the Ad Hoc Networks, 2017
2016
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016
Proceedings of the Ad Hoc Networks - 8th International Conference, 2016
2015
Quantum Computing Assisted Medium Access Control for Multiple Client Station Networks.
CoRR, 2015
Refracted Acoustic Communications in Wireless Underwater Sensor Networks with Mobility.
Proceedings of the SENSORNETS 2015, 2015
Simulation of communications using underwater acoustic signals impaired by wide band attenuation.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015
Simulation of underwater communications with a colored noise approximation and mobility.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 14th International Conference, 2015
2014
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014
A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model.
Proceedings of the IEEE International Conference on Communications, 2014
Revisiting the Performance of the Modular Clock Algorithm for Distributed Blind Rendezvous in Cognitive Radio Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, 2014
2013
A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs.
J. Netw. Comput. Appl., 2013
J. Inf. Secur. Appl., 2013
Proceedings of the IFIP Wireless Days, 2013
Proceedings of the IFIP Wireless Days, 2013
Proceedings of the 2013 IEEE Intelligent Vehicles Symposium (IV), 2013
Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, 2013
2012
Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
2011
Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes.
Ann. des Télécommunications, 2011
Proceedings of the IFIP Wireless Days Conference 2011, 2011
Proceedings of the Foundations and Practice of Security, 2011
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011
2010
Centroid Localization of Uncooperative Nodes in Wireless Networks Using a Relative Span Weighting Method.
EURASIP J. Wirel. Commun. Netw., 2010
Detection of the Evil ring attack in wireless sensor networks using cross verification.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Using time-of-day and location-based mobility profiles to improve scanning during handovers.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Assessment of the true risks to the protection of confidential information in the wireless home and office environment.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Proceedings of the CRiSIS 2010, 2010
Proceedings of the CRiSIS 2010, 2010
Prioritized Access for Emergency Stations in Next Generation Broadband Wireless Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010
2009
Probabilistic Evidence Aggregation for Malicious Node Position Bounding in Wireless Networks.
J. Networks, 2009
Probabilistic Localization and Tracking of Malicious Insiders Using Hyperbolic Position Bounding in Vehicular Networks.
EURASIP J. Wirel. Commun. Netw., 2009
Proceedings of the Wireless Algorithms, 2009
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009
Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009
2008
Insider attack attribution using signal strength-based hyperbolic location estimation.
Secur. Commun. Networks, 2008
Ad Hoc Sens. Wirel. Networks, 2008
Proceedings of the LCN 2008, 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008
2007
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007
Proceedings of the 2nd International ICST Conference on Access Networks, 2007
Principles of ad hoc networking.
Wiley, 2007
2006
Ann. des Télécommunications, 2006
Proceedings of the Principles of Distributed Systems, 10th International Conference, 2006
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2006
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006
2005
Anomaly-based intrusion detection using mobility profiles of public transportation users.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
2004
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004
Integrating Service Discovery Protocols with Presence-Based Communications for Ad Hoc Collaborative Scenarios.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004
Enhancing intrusion detection in wireless networks using radio frequency fingerprinting.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, 2004
2003
Telecommun. Syst., 2003
Modeling and Performance Analysis of Service Discovery Strategies in Ad Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2003
2002
Proceedings of the Generative Programming and Component Engineering, 2002
2000
Proceedings of the 2000 International Workshop on Parallel Processing, 2000
1999
Discret. Event Dyn. Syst., 1999
Implementation of Two Approaches for the Reliable Multicast of Mobile Agents over Wireless Networks.
Proceedings of the 1999 International Symposium on Parallel Architectures, 1999
1998
A method for the synthesis of controllers to handle safety, liveness, and real-time constraints.
IEEE Trans. Autom. Control., 1998
1997
J. Algorithms, 1997
1996
IEEE/ACM Trans. Netw., 1996
Proceedings of the COMPSAC '96, 1996
1995
An algorithm for computing the mask value of the supremal normal sublanguage of a legal language.
IEEE Trans. Autom. Control., 1995
An approach to conformance testing of MIB implementations.
Proceedings of the Integrated Network Management IV, 1995
Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, 1995
1994
Object-Oriented Analysis and Design of Repositories of Network Management Systems.
Proceedings of the Object-Oriented Technology for Database and Software Systems, 1994
Proceedings of the 1994 Conference of the Centre for Advanced Studies on Collaborative Research, October 31, 1994
1993
Proceedings of the Application and Theory of Petri Nets 1993, 1993
1992
IEEE Trans. Commun., 1992
1991
The Lotos Model of a Fault Protected System and its Verification Using a Petri Net Based Approach.
Proceedings of the Computer Aided Verification, 3rd International Workshop, 1991
1990
Proceedings of the Computer Aided Verification, 2nd International Workshop, 1990
1989
Proceedings of the Proceedings IEEE INFOCOM '89, 1989
1988
Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?, 1988