no code implementations • 20 Jun 2024 • Pantelis Dogoulis, Matthieu Jimenez, Salah Ghamizi, Maxime Cordy, Yves Le Traon
This paper analyzes the robustness of state-of-the-art AI-based models for power grid operations under the $N-1$ security criterion.
1 code implementation • 21 Dec 2020 • Aayush Garg, Renzo Degiovanni, Matthieu Jimenez, Maxime Cordy, Mike Papadakis, Yves Le Traon
To tackle these issues, we propose TROVON, a technique that learns from known vulnerable components rather than from vulnerable and non-vulnerable components, as typically performed.
Machine Translation
Cryptography and Security
Software Engineering