{"id":24,"date":"2022-02-06T18:23:52","date_gmt":"2022-02-06T18:23:52","guid":{"rendered":"https:\/\/lrsi.uqo.ca\/?page_id=24"},"modified":"2022-02-15T02:24:27","modified_gmt":"2022-02-15T02:24:27","slug":"projets-de-recherche","status":"publish","type":"page","link":"https:\/\/lrsi.uqo.ca\/index.php\/projets-de-recherche\/","title":{"rendered":"Projets de recherche"},"content":{"rendered":"\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-black-color has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-1ecd681b6dc3569d32cde8baed6fb889 is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<h2 class=\"has-text-align-left has-medium-font-size wp-block-heading\" id=\"preservation-de-la-vie-privee-dans-les-contrats-intelligents-utilisant-des-blockchain-publiques\" style=\"font-style:normal;font-weight:600\">Pr\u00e9servation de la vie priv\u00e9e dans les contrats intelligents utilisant des blockchain publiques.<\/h2>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1.5\"> <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-ed528f4204860c29b7ae577e178f2c41 is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#000000;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<h2 class=\"has-text-align-left has-medium-font-size wp-block-heading\" id=\"analyse-de-donnees-pour-la-prediction-des-menaces-informatiques\" style=\"font-style:normal;font-weight:600\">Intelligence artificielle pour la pr\u00e9diction des menaces informatiques. <\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-black-color has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-7c713aca411858b7e5639f5c5815cae6 is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<h2 class=\"has-text-align-left has-medium-font-size wp-block-heading\" id=\"securite-des-algorithmes-d-apprentissage-automatique\" style=\"font-style:normal;font-weight:600\">S\u00e9curit\u00e9 des algorithmes d\u2019apprentissage automatique.<\/h2>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1.5\"> <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-3da2a816e4a216b443a01fbb330e95ce is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#000000;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<h2 class=\"has-text-align-left has-medium-font-size wp-block-heading\" id=\"analyse-de-donnees-pour-la-prediction-des-menaces-informatiques\" style=\"font-style:normal;font-weight:600\">G\u00e9n\u00e9ration automatique de r\u00e9seaux s\u00e9curis\u00e9s \u00e0 partir de politiques de s\u00e9curit\u00e9 de haut niveau.<\/h2>\n\n\n\n<p class=\"has-normal-font-size\" style=\"line-height:1.5\"><\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>S\u00e9curit\u00e9 des algorithmes d\u2019apprentissage automatique. G\u00e9n\u00e9ration automatique de r\u00e9seaux s\u00e9curis\u00e9s \u00e0 partir de politiques de s\u00e9curit\u00e9 de haut niveau.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-24","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/lrsi.uqo.ca\/index.php\/wp-json\/wp\/v2\/pages\/24","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lrsi.uqo.ca\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lrsi.uqo.ca\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lrsi.uqo.ca\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lrsi.uqo.ca\/index.php\/wp-json\/wp\/v2\/comments?post=24"}],"version-history":[{"count":3,"href":"https:\/\/lrsi.uqo.ca\/index.php\/wp-json\/wp\/v2\/pages\/24\/revisions"}],"predecessor-version":[{"id":373,"href":"https:\/\/lrsi.uqo.ca\/index.php\/wp-json\/wp\/v2\/pages\/24\/revisions\/373"}],"wp:attachment":[{"href":"https:\/\/lrsi.uqo.ca\/index.php\/wp-json\/wp\/v2\/media?parent=24"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}