1. Bahi J, Guyeux C. Topological chaos and chaotic iterations, application to hash functions. In: IJCNN'10, Int. Joint Conf. on Neural Networks, joint to WCCI'10, IEEE World Congress on Computational Intelligence, Barcelona, Spain, July 2010. p. 1–7. [best paper award].
2. Bahi JM, Guyeux C. An improved watermarking algorithm for internet applications. In: INTERNET'2010. The 2nd Int. Conf. on Evolving Internet, Valencia, Spain, September 2010. p. 119–24.
3. Bahi J, Guyeux C. A new chaos-based watermarking algorithm. In: SECRYPT'10, Int. conf. on security and cryptography, SciTePress, Athens, Greece, July 2010. p. 455–58.
4. Bahi J, Guyeux C, Wang Q. A novel pseudo-random generator based on discrete chaotic iterations. In: INTERNET'2009, 1-st Int. Conf. on Evolving Internet, Cannes, France, August 2009. p. 71–76.
5. Evaluating quality of chaotic pseudo-random generators. application to information hiding;Bahi;IJAS, Int J Advances Security,2011