no code implementations • 16 Jul 2024 • Eduardo Fernandes Montesuma, Fabiola Espinoza Castellon, Fred Ngolè Mboula, Aurélien Mayoue, Antoine Souloumiac, Cédric Gouy-Pailler
Multi-Source Domain Adaptation (MSDA) is a challenging scenario where multiple related and heterogeneous source datasets must be adapted to an unlabeled target dataset.
no code implementations • 14 Sep 2023 • Fabiola Espinoza Castellon, Eduardo Fernandes Montesuma, Fred Ngolè Mboula, Aurélien Mayoue, Antoine Souloumiac, Cédric Gouy-Pailler
The proposed framework, FedDaDiL, tackles the resulting challenge through dictionary learning of empirical distributions.
no code implementations • 6 Apr 2023 • Arnaud Grivet Sébert, Martin Zuber, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler
While machine learning has become pervasive in as diversified fields as industry, healthcare, social networks, privacy concerns regarding the training data have gained a critical importance.
no code implementations • 9 May 2022 • Arnaud Grivet Sébert, Renaud Sirdey, Oana Stan, Cédric Gouy-Pailler
This paper tackles the problem of ensuring training data privacy in a federated learning context.
no code implementations • 22 Feb 2021 • Rafael Pinot, Laurent Meunier, Florian Yger, Cédric Gouy-Pailler, Yann Chevaleyre, Jamal Atif
This paper investigates the theory of robustness against adversarial attacks.
no code implementations • 16 Jun 2020 • Arnaud Grivet Sébert, Rafael Pinot, Martin Zuber, Cédric Gouy-Pailler, Renaud Sirdey
Based on collaborative learning, differential privacy and homomorphic encryption, the proposed approach advances state-of-the-art of private deep learning against a wider range of threats, in particular the honest-but-curious server assumption.
no code implementations • 19 Jun 2019 • Rafael Pinot, Florian Yger, Cédric Gouy-Pailler, Jamal Atif
This short note highlights some links between two lines of research within the emerging topic of trustworthy machine learning: differential privacy and robustness to adversarial examples.
1 code implementation • NeurIPS 2019 • Rafael Pinot, Laurent Meunier, Alexandre Araujo, Hisashi Kashima, Florian Yger, Cédric Gouy-Pailler, Jamal Atif
This paper investigates the theory of robustness against adversarial attacks.
no code implementations • 10 Mar 2018 • Rafael Pinot, Anne Morvan, Florian Yger, Cédric Gouy-Pailler, Jamal Atif
In this paper, we present the first differentially private clustering method for arbitrary-shaped node clusters in a graph.
no code implementations • 12 Feb 2018 • Anne Morvan, Antoine Souloumiac, Krzysztof Choromanski, Cédric Gouy-Pailler, Jamal Atif
The aim of this paper is to endow the well-known family of hypercubic quantization hashing methods with theoretical guarantees.
no code implementations • 22 May 2017 • Anne Morvan, Antoine Souloumiac, Cédric Gouy-Pailler, Jamal Atif
We demonstrate the quality of our binary sketches through experiments on real data for the nearest neighbors search task in the online setting.
1 code implementation • 7 Mar 2017 • Anne Morvan, Krzysztof Choromanski, Cédric Gouy-Pailler, Jamal Atif
In this paper, we address the problem of recovering arbitrary-shaped data clusters from datasets while facing \emph{high space constraints}, as this is for instance the case in many real-world applications when analysis algorithms are directly deployed on resources-limited mobile devices collecting the data.
no code implementations • 29 Sep 2016 • Yoann Isaac, Quentin Barthélemy, Cédric Gouy-Pailler, Michèle Sebag, Jamal Atif
This paper addresses the structurally-constrained sparse decomposition of multi-dimensional signals onto overcomplete families of vectors, called dictionaries.
no code implementations • 21 Mar 2013 • Yoann Isaac, Quentin Barthélemy, Jamal Atif, Cédric Gouy-Pailler, Michèle Sebag
An extensive empirical evaluation shows how the proposed approach compares to the state of the art depending on the signal features.