no code implementations • 14 Feb 2024 • Augustin Godinot, Gilles Tredan, Erwan Le Merrer, Camilla Penzo, Francois Taïani
Auditors need robust methods to assess the compliance of web platforms with the law.
no code implementations • 13 Feb 2024 • Martijn de Vos, Akash Dhasade, Jade Garcia Bourrée, Anne-Marie Kermarrec, Erwan Le Merrer, Benoit Rottembourg, Gilles Tredan
Existing work in fairness auditing assumes that each audit is performed independently.
no code implementations • 23 May 2023 • Jade Garcia Bourrée, Erwan Le Merrer, Gilles Tredan, Benoît Rottembourg
We then simulate practical scenarios in which the auditor may mostly rely on the API to conveniently conduct the audit task, while maintaining her chances to detect a potential manipulation.
no code implementations • 5 Aug 2022 • Thibault Maho, Teddy Furon, Erwan Le Merrer
We achieve both goals by demonstrating that benign inputs, that are unmodified images, for instance, are sufficient material for both tasks.
no code implementations • 28 Apr 2022 • Thibault Maho, Teddy Furon, Erwan Le Merrer
We first formally highlight the mismatch between a theoretical certification and the practice of attacks on classifiers.
no code implementations • 15 Feb 2022 • Erwan Le Merrer, Ronan Pons, Gilles Trédan
In this paper, we focus on external audits that are conducted by interacting with the user side of the target algorithm, hence considered as a black box.
1 code implementation • 10 Feb 2021 • Thibault Maho, Benoît Bonnet, Teddy Furon, Erwan Le Merrer
Many defenses have emerged with the development of adversarial attacks.
no code implementations • 9 Dec 2020 • Erwan Le Merrer, Benoit Morgan, Gilles Trédan
Shadow banning consists for an online social network in limiting the visibility of some of its users, without them being aware of it.
1 code implementation • CVPR 2021 • Thibault Maho, Teddy Furon, Erwan Le Merrer
This paper presents SurFree, a geometrical approach that achieves a similar drastic reduction in the amount of queries in the hardest setup: black box decision-based attacks (only the top-1 label is available).
1 code implementation • 3 Oct 2019 • Erwan Le Merrer, Gilles Tredan
The concept of explainability is envisioned to satisfy society's demands for transparency on machine learning decisions.
no code implementations • 1 Mar 2019 • Erwan Le Merrer, Gilles Tredan
This has a critical impact on the security and reliability of those deployed devices.
3 code implementations • 9 Nov 2018 • Corentin Hardy, Erwan Le Merrer, Bruno Sericola
A recent technical breakthrough in the domain of machine learning is the discovery and the multiple applications of Generative Adversarial Networks (GANs).
no code implementations • 21 Aug 2018 • Adel Jaouen, Erwan Le Merrer
The training of deep neural network classifiers results in decision boundaries which geometry is still not well understood.
no code implementations • 16 Nov 2017 • Rachid Guerraoui, Erwan Le Merrer, Rhicheek Patra, Jean-Ronan Vigouroux
In this paper, we introduce the notion of consumed item pack (CIP) which enables to link users (or items) based on their implicit analogous consumption behavior.
1 code implementation • 6 Nov 2017 • Erwan Le Merrer, Patrick Perez, Gilles Trédan
The state of the art performance of deep learning models comes at a high cost for companies and institutions, due to the tedious data collection and the heavy processing requirements.
Cryptography and Security
no code implementations • 28 Apr 2017 • Erwan Le Merrer, Gilles Trédan
Recommendation plays a key role in e-commerce and in the entertainment industry.
Social and Information Networks Computers and Society Information Retrieval
1 code implementation • 15 Feb 2017 • Corentin Hardy, Erwan Le Merrer, Bruno Sericola
We report a reduction of the total amount of data sent by workers to the server by two order of magnitude (e. g., 191-fold reduction for a convolutional network on the MNIST dataset), when compared to a standard asynchronous stochastic gradient descent, while preserving model accuracy.