Skip to main content

Showing 1–21 of 21 results for author: Tredan, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.09043  [pdf, ps, other

    cs.LG

    Under manipulations, are some AI models harder to audit?

    Authors: Augustin Godinot, Gilles Tredan, Erwan Le Merrer, Camilla Penzo, Francois Taïani

    Abstract: Auditors need robust methods to assess the compliance of web platforms with the law. However, since they hardly ever have access to the algorithm, implementation, or training data used by a platform, the problem is harder than a simple metric estimation. Within the recent framework of manipulation-proof auditing, we study in this paper the feasibility of robust audits in realistic settings, in whi… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: To appear in the IEEE Conference on Secure and Trustworthy Machine Learning, 2024

  2. arXiv:2402.08522  [pdf, other

    cs.LG

    Fairness Auditing with Multi-Agent Collaboration

    Authors: Martijn de Vos, Akash Dhasade, Jade Garcia Bourrée, Anne-Marie Kermarrec, Erwan Le Merrer, Benoit Rottembourg, Gilles Tredan

    Abstract: Existing work in fairness auditing assumes that each audit is performed independently. In this paper, we consider multiple agents working together, each auditing the same platform for different tasks. Agents have two levers: their collaboration strategy, with or without coordination beforehand, and their strategy for sampling appropriate data points. We theoretically compare the interplay of these… ▽ More

    Submitted 26 April, 2024; v1 submitted 13 February, 2024; originally announced February 2024.

    Comments: 13 pages, 6 figures

  3. Modeling Rabbit-Holes on YouTube

    Authors: Erwan Le Merrer, Gilles Tredan, Ali Yesilkanat

    Abstract: Numerous discussions have advocated the presence of a so called rabbit-hole (RH) phenomenon on social media, interested in advanced personalization to their users. This phenomenon is loosely understood as a collapse of mainstream recommendations, in favor of ultra personalized ones that lock users into narrow and specialized feeds. Yet quantitative studies are often ignoring personalization, are o… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

    Comments: To appear in Social Network Analysis and Mining (Springer)

    Journal ref: Social Network Analysis and Mining (2023) 13:100

  4. arXiv:2305.13883  [pdf, other

    cs.LG cs.CY cs.SE

    On the relevance of APIs facing fairwashed audits

    Authors: Jade Garcia Bourrée, Erwan Le Merrer, Gilles Tredan, Benoît Rottembourg

    Abstract: Recent legislation required AI platforms to provide APIs for regulators to assess their compliance with the law. Research has nevertheless shown that platforms can manipulate their API answers through fairwashing. Facing this threat for reliable auditing, this paper studies the benefits of the joint use of platform scra** and of APIs. In this setup, we elaborate on the use of scra** to detect… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

    Comments: 18 pages, 7 figures

  5. arXiv:2204.03413  [pdf, other

    cs.DC cs.NI

    On the Price of Locality in Static Fast Rerouting

    Authors: Klaus-Tycho Foerster, Juho Hirvonen, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Tredan

    Abstract: Modern communication networks feature fully decentralized flow rerouting mechanisms which allow them to quickly react to link failures. This paper revisits the fundamental algorithmic problem underlying such local fast rerouting mechanisms. Is it possible to achieve perfect resilience, i.e., to define local routing tables which preserve connectivity as long as the underlying network is still conne… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

    Comments: Accepted and to appear at the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'22)

  6. arXiv:2203.03711  [pdf, other

    cs.CY cs.AI

    Algorithmic audits of algorithms, and the law

    Authors: Erwan Le Merrer, Ronan Pons, Gilles Trédan

    Abstract: Algorithmic decision making is now widespread, ranging from health care allocation to more common actions such as recommendation or information ranking. The aim to audit these algorithms has grown alongside. In this paper, we focus on external audits that are conducted by interacting with the user side of the target algorithm, hence considered as a black box. Yet, the legal framework in which thes… ▽ More

    Submitted 15 February, 2022; originally announced March 2022.

  7. arXiv:2012.05101  [pdf, other

    cs.SI cs.CY cs.IR

    Setting the Record Straighter on Shadow Banning

    Authors: Erwan Le Merrer, Benoit Morgan, Gilles Trédan

    Abstract: Shadow banning consists for an online social network in limiting the visibility of some of its users, without them being aware of it. Twitter declares that it does not use such a practice, sometimes arguing about the occurrence of "bugs" to justify restrictions on some users. This paper is the first to address the plausibility or not of shadow banning on a major online platform, by adopting both a… ▽ More

    Submitted 13 April, 2021; v1 submitted 9 December, 2020; originally announced December 2020.

    Comments: Appearing in INFOCOM 2021

  8. arXiv:2006.06513  [pdf, other

    cs.NI cs.DC

    On the Feasibility of Perfect Resilience with Local Fast Failover

    Authors: Klaus-Tycho Foerster, Juho Hirvonen, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Tredan

    Abstract: In order to provide a high resilience and to react quickly to link failures, modern computer networks support fully decentralized flow rerouting, also known as local fast failover. In a nutshell, the task of a local fast failover algorithm is to pre-define fast failover rules for each node using locally available information only. These rules determine for each incoming link from which a packet ma… ▽ More

    Submitted 3 November, 2020; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: To appear in the proceedings of the 2nd Symposium on Algorithmic Principles of Computer Systems (APOCS) 2021

  9. arXiv:1910.01432  [pdf, other

    cs.LG cs.CR stat.ML

    The Bouncer Problem: Challenges to Remote Explainability

    Authors: Erwan Le Merrer, Gilles Tredan

    Abstract: The concept of explainability is envisioned to satisfy society's demands for transparency on machine learning decisions. The concept is simple: like humans, algorithms should explain the rationale behind their decisions so that their fairness can be assessed. While this approach is promising in a local context (e.g. to explain a model during debugging at training time), we argue that this reasonin… ▽ More

    Submitted 23 March, 2020; v1 submitted 3 October, 2019; originally announced October 2019.

    Journal ref: Nat Mach Intell (2020)

  10. arXiv:1903.00317  [pdf, other

    cs.CR cs.CV cs.LG

    TamperNN: Efficient Tampering Detection of Deployed Neural Nets

    Authors: Erwan Le Merrer, Gilles Tredan

    Abstract: Neural networks are powering the deployment of embedded devices and Internet of Things. Applications range from personal assistants to critical ones such as self-driving cars. It has been shown recently that models obtained from neural nets can be trojaned ; an attacker can then trigger an arbitrary model behavior facing crafted inputs. This has a critical impact on the security and reliability of… ▽ More

    Submitted 5 September, 2019; v1 submitted 1 March, 2019; originally announced March 2019.

    Comments: In the 30th International Symposium on Software Reliability Engineering (ISSRE 2019)

  11. Adversarial Frontier Stitching for Remote Neural Network Watermarking

    Authors: Erwan Le Merrer, Patrick Perez, Gilles Trédan

    Abstract: The state of the art performance of deep learning models comes at a high cost for companies and institutions, due to the tedious data collection and the heavy processing requirements. Recently, [35, 22] proposed to watermark convolutional neural networks for image classification, by embedding information into their weights. While this is a clear progress towards model protection, this technique so… ▽ More

    Submitted 7 August, 2019; v1 submitted 6 November, 2017; originally announced November 2017.

    Comments: To appear in the journal of Neural Computing and Applications, 2019

    Journal ref: Neural Computing and Applications, 2020, 32(13), 9233-9244

  12. arXiv:1704.08991  [pdf, other

    cs.SI cs.CY cs.IR

    The topological face of recommendation: models and application to bias detection

    Authors: Erwan Le Merrer, Gilles Trédan

    Abstract: Recommendation plays a key role in e-commerce and in the entertainment industry. We propose to consider successive recommendations to users under the form of graphs of recommendations. We give models for this representation. Motivated by the growing interest for algorithmic transparency, we then propose a first application for those graphs, that is the potential detection of introduced recommendat… ▽ More

    Submitted 28 April, 2017; originally announced April 2017.

  13. arXiv:1609.01055   

    cs.DC

    Fast Abstracts and Student Forum Proceedings - EDCC 2016 - 12th European Dependable Computing Conference

    Authors: Gilles Tredan, Hans Peter Schwefel

    Abstract: Fast Abstracts are short presentations of work in progress or opinion pieces and aim to serve as a rapid and flexible mechanism to (i) Report on current work that may or may not be complete; (ii) Introduce new ideas to the community; (iii) State positions on controversial issues or open problems. On the other hand, the goal of the Student Forum is to encourage students to attend EDCC and present t… ▽ More

    Submitted 5 September, 2016; originally announced September 2016.

    Comments: 12th European Dependable Computing Conference, Gothenburg, Sweden, September 5-9, 2016

  14. arXiv:1608.07481  [pdf, other

    cs.SI

    Uncovering Influence Cookbooks : Reverse Engineering the Topological Impact in Peer Ranking Services

    Authors: Erwan Le Merrer, Gilles Trédan

    Abstract: Ensuring the early detection of important social network users is a challenging task. Some peer ranking services are now well established, such as PeerIndex, Klout, or Kred. Their function is to rank users according to their influence. This notion of influence is however abstract, and the algorithms achieving this ranking are opaque. Following the rising demand for a more transparent web, we explo… ▽ More

    Submitted 7 October, 2016; v1 submitted 26 August, 2016; originally announced August 2016.

    Comments: To appear in CSCW 2017 (The 20th ACM Conference on Computer-Supported Cooperative Work and Social Computing)

  15. arXiv:1608.01911   

    cs.SI physics.data-an physics.soc-ph

    The Many Faces of Graph Dynamics

    Authors: Yvonne Anne Pignolet, Matthieu Roy, Stefan Schmid, Gilles Tredan

    Abstract: The topological structure of complex networks has fascinated researchers for several decades, resulting in the discovery of many universal properties and reoccurring characteristics of different kinds of networks. However, much less is known today about the network dynamics: indeed, complex networks in reality are not static, but rather dynamically evolve over time. Our paper is motivated by the… ▽ More

    Submitted 12 October, 2016; v1 submitted 5 August, 2016; originally announced August 2016.

    Comments: This paper is withdrawn because it should have replaced 1506.01565 instead of creating a duplicate. This version will now appear as a new version of 1506.01565

  16. arXiv:1506.01565  [pdf, other

    cs.SI physics.soc-ph

    The Many Faces of Graph Dynamics

    Authors: Yvonne Anne Pignolet, Matthieu Roy, Stefan Schmid, Gilles Tredan

    Abstract: The topological structure of complex networks has fascinated researchers for several decades, resulting in the discovery of many universal properties and reoccurring characteristics of different kinds of networks. However, much less is known today about the network dynamics: indeed, complex networks in reality are not static, but rather dynamically evolve over time. Our paper is motivated by the… ▽ More

    Submitted 1 March, 2017; v1 submitted 4 June, 2015; originally announced June 2015.

    Comments: 18 pages, 8 figures

  17. arXiv:1406.5481  [pdf, other

    cs.SI cs.DS physics.soc-ph

    Modeling and Measuring Graph Similarity: The Case for Centrality Distance

    Authors: Matthieu Roy, Stefan Schmid, Gilles Trédan

    Abstract: The study of the topological structure of complex networks has fascinated researchers for several decades, and today we have a fairly good understanding of the types and reoccurring characteristics of many different complex networks. However, surprisingly little is known today about models to compare complex graphs, and quantitatively measure their similarity. This paper proposes a natural similar… ▽ More

    Submitted 20 June, 2014; originally announced June 2014.

    Comments: FOMC 2014, 10th ACM International Workshop on Foundations of Mobile Computing, Philadelphia : United States (2014)

  18. arXiv:1304.5799  [pdf, other

    cs.NI cs.DS

    Request Complexity of VNet Topology Extraction: Dictionary-Based Attacks

    Authors: Yvonne-Anne Pignolet, Stefan Schmid, Gilles Tredan

    Abstract: The network virtualization paradigm envisions an Internet where arbitrary virtual networks (VNets) can be specified and embedded over a shared substrate (e.g., the physical infrastructure). As VNets can be requested at short notice and for a desired time period only, the paradigm enables a flexible service deployment and an efficient resource utilization. This paper investigates the security imp… ▽ More

    Submitted 21 April, 2013; originally announced April 2013.

    Comments: full version of paper at NETYS 2013

  19. arXiv:1210.1394  [pdf, ps, other

    cs.NI cs.SI

    Revisiting Content Availability in Distributed Online Social Networks

    Authors: Doris Schiöberg, Fabian Schneider, Gilles Tredan, Steve Uhlig, Anja Feldmann

    Abstract: Online Social Networks (OSN) are among the most popular applications in today's Internet. Decentralized online social networks (DOSNs), a special class of OSNs, promise better privacy and autonomy than traditional centralized OSNs. However, ensuring availability of content when the content owner is not online remains a major challenge. In this paper, we rely on the structure of the social graphs u… ▽ More

    Submitted 4 October, 2012; originally announced October 2012.

    Comments: 11pages, 12 figures; Technical report at TU Berlin, Department of Electrical Engineering and Computer Science (ISSN 1436-9915)

    Report number: TU Berlin/EECS TR No. 2012 - 05

  20. arXiv:1105.5236  [pdf, other

    cs.NI

    Misleading Stars: What Cannot Be Measured in the Internet?

    Authors: Yvonne Anne Pignolet, Stefan Schmid, Gilles Tredan

    Abstract: Traceroute measurements are one of our main instruments to shed light onto the structure and properties of today's complex networks such as the Internet. This paper studies the feasibility and infeasibility of inferring the network topology given traceroute data from a worst-case perspective, i.e., without any probabilistic assumptions on, e.g., the nodes' degree distribution. We attend to a scena… ▽ More

    Submitted 19 June, 2011; v1 submitted 26 May, 2011; originally announced May 2011.

  21. arXiv:1103.0086  [pdf, ps, other

    cs.DC cs.CR cs.LG

    A generic trust framework for large-scale open systems using machine learning

    Authors: Xin Liu, Gilles Tredan, Anwitaman Datta

    Abstract: In many large scale distributed systems and on the web, agents need to interact with other unknown agents to carry out some tasks or transactions. The ability to reason about and assess the potential risks in carrying out such transactions is essential for providing a safe and reliable environment. A traditional approach to reason about the trustworthiness of a transaction is to determine the trus… ▽ More

    Submitted 1 March, 2011; originally announced March 2011.

    Comments: 30 pages