Search Results for author: Erwan Le Merrer

Found 17 papers, 6 papers with code

Under manipulations, are some AI models harder to audit?

no code implementations14 Feb 2024 Augustin Godinot, Gilles Tredan, Erwan Le Merrer, Camilla Penzo, Francois Taïani

Auditors need robust methods to assess the compliance of web platforms with the law.

On the relevance of APIs facing fairwashed audits

no code implementations23 May 2023 Jade Garcia Bourrée, Erwan Le Merrer, Gilles Tredan, Benoît Rottembourg

We then simulate practical scenarios in which the auditor may mostly rely on the API to conveniently conduct the audit task, while maintaining her chances to detect a potential manipulation.

FBI: Fingerprinting models with Benign Inputs

no code implementations5 Aug 2022 Thibault Maho, Teddy Furon, Erwan Le Merrer

We achieve both goals by demonstrating that benign inputs, that are unmodified images, for instance, are sufficient material for both tasks.

Quantization

Randomized Smoothing under Attack: How Good is it in Pratice?

no code implementations28 Apr 2022 Thibault Maho, Teddy Furon, Erwan Le Merrer

We first formally highlight the mismatch between a theoretical certification and the practice of attacks on classifiers.

Algorithmic audits of algorithms, and the law

no code implementations15 Feb 2022 Erwan Le Merrer, Ronan Pons, Gilles Trédan

In this paper, we focus on external audits that are conducted by interacting with the user side of the target algorithm, hence considered as a black box.

Decision Making

Setting the Record Straighter on Shadow Banning

no code implementations9 Dec 2020 Erwan Le Merrer, Benoit Morgan, Gilles Trédan

Shadow banning consists for an online social network in limiting the visibility of some of its users, without them being aware of it.

SurFree: a fast surrogate-free black-box attack

1 code implementation CVPR 2021 Thibault Maho, Teddy Furon, Erwan Le Merrer

This paper presents SurFree, a geometrical approach that achieves a similar drastic reduction in the amount of queries in the hardest setup: black box decision-based attacks (only the top-1 label is available).

Adversarial Attack

The Bouncer Problem: Challenges to Remote Explainability

1 code implementation3 Oct 2019 Erwan Le Merrer, Gilles Tredan

The concept of explainability is envisioned to satisfy society's demands for transparency on machine learning decisions.

Fairness

MD-GAN: Multi-Discriminator Generative Adversarial Networks for Distributed Datasets

3 code implementations9 Nov 2018 Corentin Hardy, Erwan Le Merrer, Bruno Sericola

A recent technical breakthrough in the domain of machine learning is the discovery and the multiple applications of Generative Adversarial Networks (GANs).

Federated Learning

zoNNscan : a boundary-entropy index for zone inspection of neural models

no code implementations21 Aug 2018 Adel Jaouen, Erwan Le Merrer

The training of deep neural network classifiers results in decision boundaries which geometry is still not well understood.

General Classification

Sequences, Items And Latent Links: Recommendation With Consumed Item Packs

no code implementations16 Nov 2017 Rachid Guerraoui, Erwan Le Merrer, Rhicheek Patra, Jean-Ronan Vigouroux

In this paper, we introduce the notion of consumed item pack (CIP) which enables to link users (or items) based on their implicit analogous consumption behavior.

Collaborative Filtering

Adversarial Frontier Stitching for Remote Neural Network Watermarking

1 code implementation6 Nov 2017 Erwan Le Merrer, Patrick Perez, Gilles Trédan

The state of the art performance of deep learning models comes at a high cost for companies and institutions, due to the tedious data collection and the heavy processing requirements.

Cryptography and Security

The topological face of recommendation: models and application to bias detection

no code implementations28 Apr 2017 Erwan Le Merrer, Gilles Trédan

Recommendation plays a key role in e-commerce and in the entertainment industry.

Social and Information Networks Computers and Society Information Retrieval

Distributed deep learning on edge-devices: feasibility via adaptive compression

1 code implementation15 Feb 2017 Corentin Hardy, Erwan Le Merrer, Bruno Sericola

We report a reduction of the total amount of data sent by workers to the server by two order of magnitude (e. g., 191-fold reduction for a convolutional network on the MNIST dataset), when compared to a standard asynchronous stochastic gradient descent, while preserving model accuracy.

BIG-bench Machine Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.