Scientific publications
#
- 🇬🇧 2025 Tau-Eval: A Unified Evaluation Framework for Useful and Private Text Anonymization. Gabriel Loiseau, Damien Sileo, Damien Riquet, Maxime Meyer, Marc Tommasi. EMNLP 2025 (Conference on Empirical Methods in Natural Language Processing (EMNLP) Demo Track).
- 🇬🇧 2025 TAROT: Task-Oriented Authorship Obfuscation Using Policy Optimization Methods. Gabriel Loiseau, Damien Sileo, Damien Riquet, Maxime Meyer, Marc Tommasi. PrivateNLP 2025 (Sixth Workshop on Privacy in Natural Language Processing).
- 🇬🇧 2024 WikiPhish: A Diverse Wikipedia-Based Dataset for Phishing Website Detection. Gabriel Loiseau, Valentin Lefils, Maxime Meyer, Damien Riquet. CODASPY 2024 (ACM Conference on Data and Application Security and Privacy).
- 🇬🇧 2023 Targeted Attacks: Redefining Spear Phishing and Business Email Compromise. Sarah Wassermann, Maxime Meyer, Sébastien Goutal, Damien Riquet. arXiv Preprint.
- 🇫🇷 2015 DISCUS : Une architecture de détection d’intrusions réseau distribuée basée sur un langage dédié. Damien Riquet. PhD Thesis, Université Lille 1 - Sciences et Technologies.
- 🇫🇷 2014 DISCUS: A massively distributed IDS architecture using a DSL-based configuration. Damien Riquet, Gilles Grimaud, Michaël Hauspie. International Conference on Information Science, Electronics and Electrical Engineering, Sapporo, Japan.
- 🇫🇷 2014 Un langage pour la configuration de DISCUS, une architecture distribuée de solutions de sécurité. Damien Riquet, Gilles Grimaud, Michaël Hauspie. ComPAS: conférence en parallélisme, architecture et systèmes, Neuchâtel, Suisse.
- 🇫🇷 2012 Etude de l’impact des attaques distribuées et multi-chemins sur les solutions de sécurité réseaux. Damien Riquet, Gilles Grimaud, Michaël Hauspie. MAnifestation des JEunes Chercheurs en Sciences et Technologies de l’Information et de la Communication, Lille, France.
- 🇬🇧 2012 Large-Scale Coordinated Attacks: Impact on the Cloud Security. Damien Riquet, Gilles Grimaud, Michaël Hauspie. Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Palermo, Italy.
Others
#
Talks
#
- 🇬🇧 2025 Breaking and Securing LLMs: Understanding Information Leakage Risks and Defenses. The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG).
- 🇬🇧 2021 Detecting Malicious Images in Email with Computer Vision. The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG).
- 🇫🇷 2017 Ergonomie du poste de travail. 🔗
- 🇫🇷 2017 High availability at kernel-level in the Stormshield Network Security firewall. ComPAS : conférence en parallélisme, architecture et systèmes.
Work related publications
#
- 🇬🇧 2025 Detection of Cyberthreats with Computer Vision (Part 3). Hornetsecurity. 🔗
- 🇬🇧 2025 Detection of Cyberthreats with Computer Vision (Part 2). Hornetsecurity. 🔗
- 🇬🇧 2021 Remote Images Are Pushing Email Filters to Their Limits. Vade. 🔗
- 🇬🇧 2021 Three new forms of cyberattack to be worried about in 2022. Digital Journal. 🔗
- 🇬🇧 2021 Remote work strategies are needed to challenge cyberattacks. Digital Journal. 🔗
- 🇬🇧 2021 Email Security Predictions 2022: 4 Ways Hackers Will Target Businesses. Vade. 🔗
- 🇬🇧 2021 3 Email Hacking Techniques to Watch in 2021. Cyber Defense Magazine. 🔗
- 🇬🇧 2021 Auto-Remediate With Computer Vision Is Live in Vade for M365. Vade. 🔗
- 🇫🇷 2021 Phishing : comment Vade s’est mis à la Computer Vision. LeMagIT. 🔗
- 🇫🇷 2021 Pas la même chanson avec RIANA !. L’informaticien. 🔗
- 🇬🇧 2021 An Update on Logo Detection Technology. Vade. 🔗
- 🇬🇧 2020 Email Security Predictions: 6 Ways Hackers Target Businesses. Vade. 🔗