On some corruptions of the doctrine of homeostasis. Tackling Adaptive Corruptions in Multicast Encryption Protocols Robust Matrix Decomposition With Sparse Corruptions Robust Matrix Decomposition With Sparse Corruptions Watermarking enhanced to withstand anticipated corruptions Low-cost program-level detectors for reducing silent data corruptions Low-cost program-level detectors for reducing silent data corruptions Baseband attacks: remote exploitation of memory corruptions in cellular protocol stacks Processing scanned security documents notwithstanding corruptions such as rotation Compressed Sensing and Matrix Completion with Constant Proportion of Corruptions