Alert button
Picture for Yves Le Traon

Yves Le Traon

Alert button

SnT, CSC

Adversarial Robustness in Multi-Task Learning: Promises and Illusions

Add code
Bookmark button
Alert button
Oct 26, 2021
Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon

Figure 1 for Adversarial Robustness in Multi-Task Learning: Promises and Illusions
Figure 2 for Adversarial Robustness in Multi-Task Learning: Promises and Illusions
Figure 3 for Adversarial Robustness in Multi-Task Learning: Promises and Illusions
Figure 4 for Adversarial Robustness in Multi-Task Learning: Promises and Illusions
Viaarxiv icon

MUTEN: Boosting Gradient-Based Adversarial Attacks via Mutant-Based Ensembles

Add code
Bookmark button
Alert button
Sep 27, 2021
Yuejun Guo, Qiang Hu, Maxime Cordy, Michail Papadakis, Yves Le Traon

Figure 1 for MUTEN: Boosting Gradient-Based Adversarial Attacks via Mutant-Based Ensembles
Figure 2 for MUTEN: Boosting Gradient-Based Adversarial Attacks via Mutant-Based Ensembles
Figure 3 for MUTEN: Boosting Gradient-Based Adversarial Attacks via Mutant-Based Ensembles
Figure 4 for MUTEN: Boosting Gradient-Based Adversarial Attacks via Mutant-Based Ensembles
Viaarxiv icon

Effective and Efficient Data Poisoning in Semi-Supervised Learning

Add code
Bookmark button
Alert button
Dec 14, 2020
Adriano Franci, Maxime Cordy, Martin Gubri, Mike Papadakis, Yves Le Traon

Figure 1 for Effective and Efficient Data Poisoning in Semi-Supervised Learning
Figure 2 for Effective and Efficient Data Poisoning in Semi-Supervised Learning
Figure 3 for Effective and Efficient Data Poisoning in Semi-Supervised Learning
Figure 4 for Effective and Efficient Data Poisoning in Semi-Supervised Learning
Viaarxiv icon

Efficient and Transferable Adversarial Examples from Bayesian Neural Networks

Add code
Bookmark button
Alert button
Nov 10, 2020
Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon

Figure 1 for Efficient and Transferable Adversarial Examples from Bayesian Neural Networks
Figure 2 for Efficient and Transferable Adversarial Examples from Bayesian Neural Networks
Figure 3 for Efficient and Transferable Adversarial Examples from Bayesian Neural Networks
Figure 4 for Efficient and Transferable Adversarial Examples from Bayesian Neural Networks
Viaarxiv icon

Adversarial Embedding: A robust and elusive Steganography and Watermarking technique

Add code
Bookmark button
Alert button
Nov 14, 2019
Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon

Figure 1 for Adversarial Embedding: A robust and elusive Steganography and Watermarking technique
Figure 2 for Adversarial Embedding: A robust and elusive Steganography and Watermarking technique
Figure 3 for Adversarial Embedding: A robust and elusive Steganography and Watermarking technique
Figure 4 for Adversarial Embedding: A robust and elusive Steganography and Watermarking technique
Viaarxiv icon

Test Selection for Deep Learning Systems

Add code
Bookmark button
Alert button
Apr 30, 2019
Wei Ma, Mike Papadakis, Anestis Tsakmalis, Maxime Cordy, Yves Le Traon

Figure 1 for Test Selection for Deep Learning Systems
Figure 2 for Test Selection for Deep Learning Systems
Figure 3 for Test Selection for Deep Learning Systems
Figure 4 for Test Selection for Deep Learning Systems
Viaarxiv icon

Automated Search for Configurations of Deep Neural Network Architectures

Add code
Bookmark button
Alert button
Apr 09, 2019
Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon

Figure 1 for Automated Search for Configurations of Deep Neural Network Architectures
Figure 2 for Automated Search for Configurations of Deep Neural Network Architectures
Figure 3 for Automated Search for Configurations of Deep Neural Network Architectures
Figure 4 for Automated Search for Configurations of Deep Neural Network Architectures
Viaarxiv icon

Artificial Mutation inspired Hyper-heuristic for Runtime Usage of Multi-objective Algorithms

Add code
Bookmark button
Alert button
Feb 18, 2014
Donia El Kateb, François Fouquet, Johann Bourcier, Yves Le Traon

Figure 1 for Artificial Mutation inspired Hyper-heuristic for Runtime Usage of Multi-objective Algorithms
Figure 2 for Artificial Mutation inspired Hyper-heuristic for Runtime Usage of Multi-objective Algorithms
Figure 3 for Artificial Mutation inspired Hyper-heuristic for Runtime Usage of Multi-objective Algorithms
Viaarxiv icon