-
Adversarial Attacks on the Interpretation of Neuron Activation Maximization
Authors:
Geraldin Nanfack,
Alexander Fulleringer,
Jonathan Marty,
Michael Eickenberg,
Eugene Belilovsky
Abstract:
The internal functional behavior of trained Deep Neural Networks is notoriously difficult to interpret. Activation-maximization approaches are one set of techniques used to interpret and analyze trained deep-learning models. These consist in finding inputs that maximally activate a given neuron or feature map. These inputs can be selected from a data set or obtained by optimization. However, inter…
▽ More
The internal functional behavior of trained Deep Neural Networks is notoriously difficult to interpret. Activation-maximization approaches are one set of techniques used to interpret and analyze trained deep-learning models. These consist in finding inputs that maximally activate a given neuron or feature map. These inputs can be selected from a data set or obtained by optimization. However, interpretability methods may be subject to being deceived. In this work, we consider the concept of an adversary manipulating a model for the purpose of deceiving the interpretation. We propose an optimization framework for performing this manipulation and demonstrate a number of ways that popular activation-maximization interpretation techniques associated with CNNs can be manipulated to change the interpretations, shedding light on the reliability of these methods.
△ Less
Submitted 12 June, 2023;
originally announced June 2023.
-
LIO*: Low Level Information Flow Control in F*
Authors:
Jean-Joseph Marty,
Lucas Franceschino,
Jean-Pierre Talpin,
Niki Vazou
Abstract:
We present Labeled Input Output in F* (LIO*), a verified framework that enforces information flow control (IFC) policies developed in F* and automatically extracted to C. Inspired by LIO, we encapsulated IFC policies into effects, but using F* we derived efficient, low level, and provably correct code. Concretely, runtime checks are lifted to static proof obligations, the developed code is automat…
▽ More
We present Labeled Input Output in F* (LIO*), a verified framework that enforces information flow control (IFC) policies developed in F* and automatically extracted to C. Inspired by LIO, we encapsulated IFC policies into effects, but using F* we derived efficient, low level, and provably correct code. Concretely, runtime checks are lifted to static proof obligations, the developed code is automatically extracted to C and proved non-interferent using metaprogramming. We benchmarked our framework on three clients and observed up to 54% speedup when IFC runtime checks are proved statically. Our framework is designed to aid development of embedded devices where both enforcement of security policies and low level efficient code is critical.
△ Less
Submitted 27 April, 2020;
originally announced April 2020.
-
How to promote informal learning in the workplace? The need for incremental design methods
Authors:
Carine Touré,
Christine Michel,
Jean-Charles Marty
Abstract:
Informal Learning in the Workplace (ILW) is ensured by the everyday work activities in which workers are engaged. It accounts for over 75 per cent of learning in the workplace. Enterprise Social Media (ESM) are increasingly used as informal learning environments. According to the results of an implementation we have conducted in real context, we show that ESM are appropriate to promote ILW. Nevert…
▽ More
Informal Learning in the Workplace (ILW) is ensured by the everyday work activities in which workers are engaged. It accounts for over 75 per cent of learning in the workplace. Enterprise Social Media (ESM) are increasingly used as informal learning environments. According to the results of an implementation we have conducted in real context, we show that ESM are appropriate to promote ILW. Nevertheless, social aspects must be reconsidered to address users' needs regarding content and access, quality information indicators, moderation and control.
△ Less
Submitted 28 September, 2017;
originally announced September 2017.
-
Adaptation des r{é}seaux sociaux d'entreprise pour favoriser l'apprentissage informel sur le lieu de travail
Authors:
Carine Touré,
Christine Michel,
Jean-Charles Marty
Abstract:
The informal learning in the workplace is realized during daily collaborators' activities and represent more than 75 % of the learning occurring in a company. Enterprise social networks are currently massively used to promote this type of learning. From a pilot study, we show that they are actually adapted concerning the social aspects, but that the design must be rethought to consider user contex…
▽ More
The informal learning in the workplace is realized during daily collaborators' activities and represent more than 75 % of the learning occurring in a company. Enterprise social networks are currently massively used to promote this type of learning. From a pilot study, we show that they are actually adapted concerning the social aspects, but that the design must be rethought to consider user contextual needs linked to the content and access to informational corpus, the information quality indicators and the forms of moderation and control.
△ Less
Submitted 27 September, 2017;
originally announced September 2017.
-
Re-designing knowledge management systems : Towards user-centred design methods integrating information architecture
Authors:
Carine Touré,
Christine Michel,
Jean-Charles Marty
Abstract:
The work presented in this paper focuses on the improvement of corporate knowledge management systems. For the implementation of such systems, companies deploy can important means for small gains. Indeed, management services often notice very limited use compared to what they actually expect. We present a five-step redesigning approach which takes into account different factors to increase the use…
▽ More
The work presented in this paper focuses on the improvement of corporate knowledge management systems. For the implementation of such systems, companies deploy can important means for small gains. Indeed, management services often notice very limited use compared to what they actually expect. We present a five-step redesigning approach which takes into account different factors to increase the use of these systems. We use as an example the knowledge sharing platform implemented for the employees of Soci{é}t{é} du Canal de Provence (SCP). This system was taken into production but very occasionally used. We describe the reasons for this limited use and we propose a design methodology adapted to the context. Promoting the effective use of the system, our approach has been experimented and evaluated with a panel of users working at SCP.
△ Less
Submitted 29 January, 2016;
originally announced January 2016.
-
What if we considered awareness for sustainable Kwowledge Management ? Towards a model for self regulated knowledge management systems based on acceptance models of technologies and awareness
Authors:
Carine Touré,
Christine Michel,
Jean-Charles Marty
Abstract:
We propose, in this paper, a model of continuous use of corporate collaborative KMS. Companies do not always have the guaranty that their KMS will be continuously used. This statement can constitute an important obstacle for knowledge management processes. Our work is based on the analysis of classical models for initial and continuous use of technologies. We also analyse the regulation concept an…
▽ More
We propose, in this paper, a model of continuous use of corporate collaborative KMS. Companies do not always have the guaranty that their KMS will be continuously used. This statement can constitute an important obstacle for knowledge management processes. Our work is based on the analysis of classical models for initial and continuous use of technologies. We also analyse the regulation concept and explain how it is valuable to support a continuous use of KMS. We observed that awareness may be a regulation means that allows taking this problem into account. Awareness is a concept, which has been profusely used to improve user experience in collaborative environments. It is an important element for regulation of activity. In our model, we assume that one can integrate awareness in information systems to positively influence beliefs about them. The final objective of our work is to refine some concepts to fit the particularities of collaborative KMS and to propose an awareness regulation process using the traces of the users' interactions with the systems.
△ Less
Submitted 29 January, 2016;
originally announced January 2016.
-
Trans-gram, Fast Cross-lingual Word-embeddings
Authors:
Jocelyn Coulmance,
Jean-Marc Marty,
Guillaume Wenzek,
Amine Benhalloum
Abstract:
We introduce Trans-gram, a simple and computationally-efficient method to simultaneously learn and align wordembeddings for a variety of languages, using only monolingual data and a smaller set of sentence-aligned data. We use our new method to compute aligned wordembeddings for twenty-one languages using English as a pivot language. We show that some linguistic features are aligned across languag…
▽ More
We introduce Trans-gram, a simple and computationally-efficient method to simultaneously learn and align wordembeddings for a variety of languages, using only monolingual data and a smaller set of sentence-aligned data. We use our new method to compute aligned wordembeddings for twenty-one languages using English as a pivot language. We show that some linguistic features are aligned across languages for which we do not have aligned data, even though those properties do not exist in the pivot language. We also achieve state of the art results on standard cross-lingual text classification and word translation tasks.
△ Less
Submitted 11 January, 2016;
originally announced January 2016.