Search

Your search keyword '"Tredan, Gilles"' showing total 118 results

Search Constraints

Start Over You searched for: Author "Tredan, Gilles" Remove constraint Author: "Tredan, Gilles"
118 results on '"Tredan, Gilles"'

Search Results

1. Under manipulations, are some AI models harder to audit?

2. Fairness Auditing with Multi-Agent Collaboration

3. Modeling Rabbit-Holes on YouTube

4. On the relevance of APIs facing fairwashed audits

6. On the Price of Locality in Static Fast Rerouting

7. Algorithmic audits of algorithms, and the law

9. Setting the Record Straighter on Shadow Banning

10. On the Feasibility of Perfect Resilience with Local Fast Failover

11. Collective Information Processing in Human Phase Separation

12. The Bouncer Problem: Challenges to Remote Explainability

14. TamperNN: Efficient Tampering Detection of Deployed Neural Nets

15. Adversarial Frontier Stitching for Remote Neural Network Watermarking

16. The topological face of recommendation: models and application to bias detection

17. Fast Abstracts and Student Forum Proceedings - EDCC 2016 - 12th European Dependable Computing Conference

18. Uncovering Influence Cookbooks : Reverse Engineering the Topological Impact in Peer Ranking Services

19. The Many Faces of Graph Dynamics

21. The Many Faces of Graph Dynamics

22. Modeling and Measuring Graph Similarity: The Case for Centrality Distance

23. Request Complexity of VNet Topology Extraction: Dictionary-Based Attacks

25. Revisiting Content Availability in Distributed Online Social Networks

26. Misleading Stars: What Cannot Be Measured in the Internet?

27. A generic trust framework for large-scale open systems using machine learning

28. How robust are gossip-based communication protocols?

32. Large-Scale Networked Systems: From Anarchy to Geometric Self-structuring

33. Byzantine Consensus with Few Synchronous Links

35. Evaluating the Quality of a Network Topology through Random Walks

38. On the Feasibility of Perfect Resilience with Local Fast Failover

43. Brief Announcement: Do VNet Embeddings Leak Information about ISP Topology?

44. Brief Announcement: What Can(Not) Be Perfectly Rerouted Locally

46. TamperNN: Efficient Tampering Detection of Deployed Neural Nets

Catalog

Books, media, physical & digital resources