Skip to main content

Showing 1–8 of 8 results for author: Fessant, F

.
  1. arXiv:2309.04284  [pdf, other

    cs.LG

    Viewing the process of generating counterfactuals as a source of knowledge: a new approach for explaining classifiers

    Authors: Vincent Lemaire, Nathan Le Boudec, Victor Guyomard, Françoise Fessant

    Abstract: There are now many explainable AI methods for understanding the decisions of a machine learning model. Among these are those based on counterfactual reasoning, which involve simulating features changes and observing the impact on the prediction. This article proposes to view this simulation process as a source of creating a certain amount of knowledge that can be stored to be used, later, in diffe… ▽ More

    Submitted 12 April, 2024; v1 submitted 8 September, 2023; originally announced September 2023.

    Comments: 8 pages

  2. arXiv:2304.12943  [pdf, other

    cs.LG cs.AI

    Generating robust counterfactual explanations

    Authors: Victor Guyomard, Françoise Fessant, Thomas Guyet, Tassadit Bouadi, Alexandre Termier

    Abstract: Counterfactual explanations have become a mainstay of the XAI field. This particularly intuitive statement allows the user to understand what small but necessary changes would have to be made to a given situation in order to change a model prediction. The quality of a counterfactual depends on several criteria: realism, actionability, validity, robustness, etc. In this paper, we are interested in… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

  3. arXiv:2212.10847  [pdf, other

    cs.AI cs.LG

    VCNet: A self-explaining model for realistic counterfactual generation

    Authors: Victor Guyomard, Françoise Fessant, Thomas Guyet, Tassadit Bouadi, Alexandre Termier

    Abstract: Counterfactual explanation is a common class of methods to make local explanations of machine learning decisions. For a given instance, these methods aim to find the smallest modification of feature values that changes the predicted decision made by a machine learning model. One of the challenges of counterfactual explanation is the efficient generation of realistic counterfactuals. To address thi… ▽ More

    Submitted 21 December, 2022; originally announced December 2022.

    Journal ref: ECML PKDD 2022 - European Conference on Machine Learning and Knowledge Discovery in Databases., Sep 2022, Grenoble, France

  4. arXiv:1903.12211  [pdf, other

    cs.CR

    Privacy in trajectory micro-data publishing : a survey

    Authors: Marco Fiore, Panagiota Katsikouli, Elli Zavou, Mathieu Cunche, Françoise Fessant, Dominique Le Hello, Ulrich Matchi Aivodji, Baptiste Olivier, Tony Quertier, Razvan Stanica

    Abstract: We survey the literature on the privacy of trajectory micro-data, i.e., spatiotemporal information about the mobility of individuals, whose collection is becoming increasingly simple and frequent thanks to emerging information and communication technologies. The focus of our review is on privacy-preserving data publishing (PPDP), i.e., the publication of databases of trajectory micro-data that pre… ▽ More

    Submitted 13 May, 2020; v1 submitted 26 March, 2019; originally announced March 2019.

    Comments: Accepted for publication at Transactions for Data Privacy

  5. arXiv:1209.1983  [pdf, other

    cs.IR cs.PF

    Toward a New Protocol to Evaluate Recommender Systems

    Authors: Frank Meyer, Françoise Fessant, Fabrice Clérot, Eric Gaussier

    Abstract: In this paper, we propose an approach to analyze the performance and the added value of automatic recommender systems in an industrial context. We show that recommender systems are multifaceted and can be organized around 4 structuring functions: help users to decide, help users to compare, help users to discover, help users to explore. A global off line protocol is then proposed to evaluate recom… ▽ More

    Submitted 10 September, 2012; originally announced September 2012.

    Comments: 6 pages. arXiv admin note: text overlap with arXiv:1203.4487

    ACM Class: H.3.3; H.3.4

  6. arXiv:1012.0379  [pdf, ps, other

    cs.CR math.PR math.ST

    Quality of Source Location Protection in Globally Attacked Sensor Networks

    Authors: Silvija Kokalj-Filipovic, Fabrice Le Fessant, Predrag Spasojevic

    Abstract: We propose an efficient scheme for generating fake network traffic to disguise the real event notification in the presence of a global eavesdropper, which is especially relevant for the quality of service in delay-intolerant applications monitoring rare and spatially sparse events, and deployed as large wireless sensor networks with single data collector. The efficiency of the scheme that provides… ▽ More

    Submitted 1 December, 2010; originally announced December 2010.

    Comments: shorter versiom

  7. arXiv:1012.0378  [pdf, ps, other

    cs.CR

    Some Important Aspects of Source Location Protection in Globally Attacked Sensor Networks

    Authors: Silvija Kokalj-Filipovic, Fabrice Le Fessant, Predrag Spasojevic

    Abstract: In the problem of location anonymity of the events exposed to a global eavesdropper, we highlight and analyze some aspects that are missing in the prior work, which is especially relevant for the quality of secure sensing in delay-intolerant applications monitoring rare and spatially sparse events, and deployed as large wireless sensor networks with single data collector. We propose an efficient s… ▽ More

    Submitted 1 December, 2010; originally announced December 2010.

    Comments: longer version

  8. arXiv:1004.0930  [pdf, ps, other

    cs.NI

    Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent

    Authors: Stevens Le Blond, Arnaud Legout, Fabrice Le Fessant, Walid Dabbous, Mohamed Ali Kaafar

    Abstract: This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using these exploits for a period of 103 days, we collected 148 million IPs downloading 2 billion copies of contents. We identify the IP address of the content providers for 70% of the BitTorrent contents we spied on. We show… ▽ More

    Submitted 6 April, 2010; originally announced April 2010.

    Journal ref: 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10), San Jose, CA : United States (2010)