Frédéric Besson

635 total citations
13 papers, 119 citations indexed

About

Frédéric Besson is a scholar working on Artificial Intelligence, Signal Processing and Computational Theory and Mathematics. According to data from OpenAlex, Frédéric Besson has authored 13 papers receiving a total of 119 indexed citations (citations by other indexed papers that have themselves been cited), including 13 papers in Artificial Intelligence, 4 papers in Signal Processing and 4 papers in Computational Theory and Mathematics. Recurrent topics in Frédéric Besson's work include Logic, programming, and type systems (9 papers), Security and Verification in Computing (8 papers) and Formal Methods in Verification (4 papers). Frédéric Besson is often cited by papers focused on Logic, programming, and type systems (9 papers), Security and Verification in Computing (8 papers) and Formal Methods in Verification (4 papers). Frédéric Besson collaborates with scholars based in France, United States and Denmark. Frédéric Besson's co-authors include Thomas Wiben Jensen, Daniel Le Métayer, Tommy Thorn, David Pichardie, Andrew D. Gordon, Sandrine Blazy and Cédric Fournet and has published in prestigious journals such as Theoretical Computer Science, Journal of Computer Security and Journal of Functional Programming.

In The Last Decade

Frédéric Besson

13 papers receiving 107 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Frédéric Besson France 7 101 42 40 28 27 13 119
Nicholas Kidd United States 6 49 0.5× 32 0.8× 20 0.5× 33 1.2× 18 0.7× 13 103
David Pichardie France 8 109 1.1× 36 0.9× 61 1.5× 27 1.0× 27 1.0× 26 133
Dilian Gurov Sweden 7 91 0.9× 14 0.3× 92 2.3× 47 1.7× 33 1.2× 38 140
Brian Monahan United States 6 46 0.5× 14 0.3× 33 0.8× 22 0.8× 34 1.3× 21 112
Florian Kammüller United Kingdom 7 66 0.7× 36 0.9× 23 0.6× 10 0.4× 52 1.9× 31 128
Ştefan Ciobâcă Romania 7 77 0.8× 24 0.6× 23 0.6× 30 1.1× 53 2.0× 11 123
Matthew Fairbairn United Kingdom 4 64 0.6× 17 0.4× 40 1.0× 45 1.6× 75 2.8× 7 126
Joel Weinberger United States 9 133 1.3× 94 2.2× 30 0.8× 28 1.0× 31 1.1× 14 197
Corin Pitcher United States 7 98 1.0× 16 0.4× 34 0.8× 7 0.3× 60 2.2× 11 132
Hendrik Tews Germany 8 144 1.4× 15 0.4× 88 2.2× 29 1.0× 29 1.1× 18 167

Countries citing papers authored by Frédéric Besson

Since Specialization
Citations

This map shows the geographic impact of Frédéric Besson's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Frédéric Besson with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Frédéric Besson more than expected).

Fields of papers citing papers by Frédéric Besson

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Frédéric Besson. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Frédéric Besson. The network helps show where Frédéric Besson may publish in the future.

Co-authorship network of co-authors of Frédéric Besson

This figure shows the co-authorship network connecting the top 25 collaborators of Frédéric Besson. A scholar is included among the top collaborators of Frédéric Besson based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Frédéric Besson. Frédéric Besson is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

13 of 13 papers shown
1.
Besson, Frédéric, et al.. (2024). PfComp: A Verified Compiler for Packet Filtering Leveraging Binary Decision Diagrams. SPIRE - Sciences Po Institutional REpository. 89–102. 2 indexed citations
2.
Besson, Frédéric, et al.. (2018). CompCertS: A Memory-Aware Verified C Compiler Using a Pointer as Integer Semantics. Journal of Automated Reasoning. 63(2). 369–392. 9 indexed citations
3.
Besson, Frédéric, et al.. (2017). A Verified CompCert Front-End for a Memory Model Supporting Pointer Arithmetic and Uninitialised Data. Journal of Automated Reasoning. 62(4). 433–480. 4 indexed citations
4.
Besson, Frédéric, et al.. (2010). Verifying resource access control on mobile interactive devices. Journal of Computer Security. 18(6). 971–998. 1 indexed citations
5.
Besson, Frédéric. (2010). On using an inexact floating-point LP solver for deciding linear arithmetic in an SMT solver. HAL (Le Centre pour la Communication Scientifique Directe). 2 indexed citations
6.
Besson, Frédéric, et al.. (2007). Result certification for relational program analysis. HAL (Le Centre pour la Communication Scientifique Directe). 32. 1 indexed citations
7.
Besson, Frédéric, Thomas Wiben Jensen, & David Pichardie. (2006). Proof-carrying code from certified abstract interpretation and fixpoint compression. Theoretical Computer Science. 364(3). 273–291. 12 indexed citations
8.
Besson, Frédéric, et al.. (2005). Interfaces for stack inspection. Journal of Functional Programming. 15(2). 179–217. 6 indexed citations
9.
Besson, Frédéric, Thomas Wiben Jensen, & David Pichardie. (2005). A PCC Architecture based on Certified Abstract Interpretation. HAL (Le Centre pour la Communication Scientifique Directe). 35. 2 indexed citations
10.
Besson, Frédéric, et al.. (2004). From stack inspection to access control: a security analysis for libraries. 61–75. 14 indexed citations
11.
Besson, Frédéric & Thomas Wiben Jensen. (2003). Modular class analysis with DATALOG. 19–36. 6 indexed citations
12.
Besson, Frédéric, et al.. (2002). Secure calling contexts for stack inspection. 76–87. 19 indexed citations
13.
Besson, Frédéric, Thomas Wiben Jensen, Daniel Le Métayer, & Tommy Thorn. (2001). Model checking security properties of control flow graphs. Journal of Computer Security. 9(3). 217–250. 41 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026