Experimental treatment with favipiravir for Ebola virus disease (the JIKI Trial): a historically controlled, single-arm proof-of-concept trial in Guinea D Sissoko, C Laouenan, E Folkesson, AB M’lebing, AH Beavogui, S Baize, ... PLoS medicine 13 (3), e1001967, 2016 | 610 | 2016 |
Compilation of a countermeasure against instruction-skip fault attacks T Barry, D Couroussé, B Robisson Proceedings of the Third Workshop on Cryptography and Security in Computing …, 2016 | 54 | 2016 |
Runtime code polymorphism as a protection against side channel attacks D Couroussé, T Barry, B Robisson, P Jaillon, O Potin, JL Lanet IFIP International Conference on Information Security Theory and Practice …, 2016 | 30 | 2016 |
Understanding long-term evolution and predictors of sequelae of Ebola virus disease survivors in Guinea: a 48-month prospective, longitudinal cohort study (PostEboGui) MSK Diallo, A Toure, MS Sow, C Kpamou, AK Keita, B Taverne, ... Clinical Infectious Diseases 73 (12), 2166-2174, 2021 | 22 | 2021 |
Pretr: Spatio-temporal non-autoregressive trajectory prediction transformer L Achaji, T Barry, T Fouqueray, J Moreau, F Aioun, F Charpillet 2022 IEEE 25th International Conference on Intelligent Transportation …, 2022 | 17 | 2022 |
Correction: experimental treatment with favipiravir for Ebola virus disease (the JIKI Trial): a historically controlled, single-arm proof-of-concept trial in Guinea D Sissoko, C Laouenan, E Folkesson, AB M’Lebing, AH Beavogui, ... PLoS medicine 13 (4), e1002009, 2016 | 16 | 2016 |
A template attack against VERIFY PIN algorithms H Le Bouder, T Barry, D Couroussé, JL Lanet, R Lashermes SECRYPT 2016, 231-238, 2016 | 14 | 2016 |
Automatic application of software countermeasures against physical attacks N Belleville, K Heydemann, D Couroussé, T Barry, B Robisson, A Seriai, ... Cyber-Physical Systems Security, 135-155, 2018 | 10 | 2018 |
COGITO: Code polymorphism to secure devices D Couroussé, B Robisson, JL Lanet, T Barry, H Noura, P Jaillon, ... 2014 11th International Conference on Security and Cryptography (SECRYPT), 1-6, 2014 | 5 | 2014 |
Souley Harouna D Sissoko, C Laouenan, E Folkesson, AB M’Lebing, AH Beavogui, ... Kighoma, PM, 0 | 5 | |
Cloud-based Private Querying of Databases by Means of Homomorphic Encryption. Y Abbar, P Aubry, T Barry, S Carpov, S Mallick, M Krichen, D Ligier, ... IoTBDS, 123-131, 2021 | 3 | 2021 |
3d nuclei segmentation by combining gan based image synthesis and existing 3d manual annotations X Galindo, T Barry, P Guyot, C Rivière, R Galland, F Levet bioRxiv, 2023.12. 06.570366, 2023 | 2 | 2023 |
Method for executing a machine code formed from blocks having instructions to be protected, each instruction associated with a construction instruction to modify a signature of … D Courousse, K Heydemann, T Barry US Patent 11,704,128, 2023 | 2 | 2023 |
All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems. D Couroussé, T Barry, B Robisson, N Belleville, P Jaillon, O Potin, ... CS2@ HiPEAC, 17-18, 2018 | 2 | 2018 |
Sécurisation à la compilation de logiciels contre les attaques en fautes T Barry Université de Lyon, 2017 | 2 | 2017 |
SalienceNet: an unsupervised Image-to-Image translation method for nuclei saliency enhancement in microscopy images B Emmanuel, E Lefevre, T Barry, F Levet, A Beghin, V Viasnoff, X Galindo, ... bioRxiv, 2022.10. 27.514030, 2022 | 1 | 2022 |
Automated Combination of Tolerance and Control Flow Integrity Countermeasures against Multiple Fault Attacks T Barry, D Couroussé, B Robisson, K Heydemann European LLVM Developers Meeting, 2017 | 1 | 2017 |
Experimental Treatment with Favipiravir for Ebola Virus Disease (the JIKI Trial): A Historically Controlled, Single-Arm Proof-of-Concept Trial in Guinea M Lipsitch, D Sissoko, C Laouenan, E Folkesson, AB M’Lebing, ... PLoS Medicine 13 (3), e1001967 [1, 2016 | 1 | 2016 |
FRI0447 FIRST COMPREHENSIVE LONG-TERM ASSESSMENT OF MUSCULOSKELETAL CONSEQUENCES AMONG EBOLA SURVIVORS YM Pers, A Dubois, TA Barry, MD Sall, L March, MS Sow, AK Keita, ... Annals of the Rheumatic Diseases 79, 821, 2020 | | 2020 |
SECURING SOFTWARE AGAINST FAULT ATTACKS AT COMPILE TIME T Barry < bound method Organization. get_name_with_acronym of< Organization: CEA …, 2017 | | 2017 |