Skip to main content

Showing 1–22 of 22 results for author: Ghamizi, S

.
  1. arXiv:2506.15506  [pdf, ps, other

    cs.LG

    Insights on Adversarial Attacks for Tabular Machine Learning via a Systematic Literature Review

    Authors: Salijona Dyrmishi, Mohamed Djilani, Thibault Simonetto, Salah Ghamizi, Maxime Cordy

    Abstract: Adversarial attacks in machine learning have been extensively reviewed in areas like computer vision and NLP, but research on tabular data remains scattered. This paper provides the first systematic literature review focused on adversarial attacks targeting tabular machine learning models. We highlight key trends, categorize attack strategies and analyze how they address practical considerations f… ▽ More

    Submitted 18 June, 2025; originally announced June 2025.

    Comments: This paper is currently under review at ACM Computing Surveys

  2. arXiv:2506.13306  [pdf, ps, other

    eess.IV cs.CV

    Brain Imaging Foundation Models, Are We There Yet? A Systematic Review of Foundation Models for Brain Imaging and Biomedical Research

    Authors: Salah Ghamizi, Georgia Kanli, Yu Deng, Magali Perquin, Olivier Keunen

    Abstract: Foundation models (FMs), large neural networks pretrained on extensive and diverse datasets, have revolutionized artificial intelligence and shown significant promise in medical imaging by enabling robust performance with limited labeled data. Although numerous surveys have reviewed the application of FM in healthcare care, brain imaging remains underrepresented, despite its critical role in the d… ▽ More

    Submitted 16 June, 2025; originally announced June 2025.

  3. arXiv:2506.02978  [pdf, ps, other

    cs.LG

    On the Robustness of Tabular Foundation Models: Test-Time Attacks and In-Context Defenses

    Authors: Mohamed Djilani, Thibault Simonetto, Karim Tit, Florian Tambon, Paul Récamier, Salah Ghamizi, Maxime Cordy, Mike Papadakis

    Abstract: Recent tabular Foundational Models (FM) such as TabPFN and TabICL, leverage in-context learning to achieve strong performance without gradient updates or fine-tuning. However, their robustness to adversarial manipulation remains largely unexplored. In this work, we present a comprehensive study of the adversarial vulnerabilities of tabular FM, focusing on both their fragility to targeted test-time… ▽ More

    Submitted 3 June, 2025; originally announced June 2025.

  4. arXiv:2501.12427  [pdf, other

    cs.LG cs.AI

    SafePowerGraph-HIL: Real-Time HIL Validation of Heterogeneous GNNs for Bridging Sim-to-Real Gap in Power Grids

    Authors: Aoxiang Ma, Salah Ghamizi, Jun Cao, Pedro Rodriguez

    Abstract: As machine learning (ML) techniques gain prominence in power system research, validating these methods' effectiveness under real-world conditions requires real-time hardware-in-the-loop (HIL) simulations. HIL simulation platforms enable the integration of computational models with physical devices, allowing rigorous testing across diverse scenarios critical to system resilience and reliability. In… ▽ More

    Submitted 21 January, 2025; originally announced January 2025.

    Comments: 5 pages, 5 figures

  5. arXiv:2501.07639  [pdf, other

    cs.AI

    SafePowerGraph-LLM: Novel Power Grid Graph Embedding and Optimization with Large Language Models

    Authors: Fabien Bernier, Jun Cao, Maxime Cordy, Salah Ghamizi

    Abstract: Efficiently solving Optimal Power Flow (OPF) problems in power systems is crucial for operational planning and grid management. There is a growing need for scalable algorithms capable of handling the increasing variability, constraints, and uncertainties in modern power networks while providing accurate and fast solutions. To address this, machine learning techniques, particularly Graph Neural Net… ▽ More

    Submitted 13 January, 2025; originally announced January 2025.

  6. arXiv:2412.20987  [pdf, other

    cs.LG

    RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses

    Authors: Mohamed Djilani, Salah Ghamizi, Maxime Cordy

    Abstract: Although adversarial robustness has been extensively studied in white-box settings, recent advances in black-box attacks (including transfer- and query-based approaches) are primarily benchmarked against weak defenses, leaving a significant gap in the evaluation of their effectiveness against more recent and moderate robust models (e.g., those featured in the Robustbench leaderboard). In this pape… ▽ More

    Submitted 30 December, 2024; originally announced December 2024.

    ACM Class: I.2.6

  7. arXiv:2408.07579  [pdf, other

    cs.LG

    TabularBench: Benchmarking Adversarial Robustness for Tabular Deep Learning in Real-world Use-cases

    Authors: Thibault Simonetto, Salah Ghamizi, Maxime Cordy

    Abstract: While adversarial robustness in computer vision is a mature research field, fewer researchers have tackled the evasion attacks against tabular deep learning, and even fewer investigated robustification mechanisms and reliable defenses. We hypothesize that this lag in the research on tabular adversarial attacks is in part due to the lack of standardized benchmarks. To fill this gap, we propose Tabu… ▽ More

    Submitted 14 August, 2024; originally announced August 2024.

  8. arXiv:2407.12421  [pdf, other

    cs.LG cs.AI

    SafePowerGraph: Safety-aware Evaluation of Graph Neural Networks for Transmission Power Grids

    Authors: Salah Ghamizi, Aleksandar Bojchevski, Aoxiang Ma, Jun Cao

    Abstract: Power grids are critical infrastructures of paramount importance to modern society and their rapid evolution and interconnections has heightened the complexity of power systems (PS) operations. Traditional methods for grid analysis struggle with the computational demands of large-scale RES and ES integration, prompting the adoption of machine learning (ML) techniques, particularly Graph Neural Net… ▽ More

    Submitted 17 July, 2024; originally announced July 2024.

  9. arXiv:2406.14361  [pdf, other

    cs.AI eess.SY

    Robustness Analysis of AI Models in Critical Energy Systems

    Authors: Pantelis Dogoulis, Matthieu Jimenez, Salah Ghamizi, Maxime Cordy, Yves Le Traon

    Abstract: This paper analyzes the robustness of state-of-the-art AI-based models for power grid operations under the $N-1$ security criterion. While these models perform well in regular grid settings, our results highlight a significant loss in accuracy following the disconnection of a line.%under this security criterion. Using graph theory-based analysis, we demonstrate the impact of node connectivity on t… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

  10. arXiv:2406.00775  [pdf, other

    cs.LG cs.CR

    Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data

    Authors: Thibault Simonetto, Salah Ghamizi, Maxime Cordy

    Abstract: State-of-the-art deep learning models for tabular data have recently achieved acceptable performance to be deployed in industrial settings. However, the robustness of these models remains scarcely explored. Contrary to computer vision, there are no effective attacks to properly evaluate the adversarial robustness of deep tabular models due to intrinsic properties of tabular data, such as categoric… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

  11. arXiv:2403.00892  [pdf, other

    eess.SY cs.LG

    PowerFlowMultiNet: Multigraph Neural Networks for Unbalanced Three-Phase Distribution Systems

    Authors: Salah Ghamizi, Jun Cao, Aoxiang Ma, Pedro Rodriguez

    Abstract: Efficiently solving unbalanced three-phase power flow in distribution grids is pivotal for grid analysis and simulation. There is a pressing need for scalable algorithms capable of handling large-scale unbalanced power grids that can provide accurate and fast solutions. To address this, deep learning techniques, especially Graph Neural Networks (GNNs), have emerged. However, existing literature pr… ▽ More

    Submitted 6 September, 2024; v1 submitted 1 March, 2024; originally announced March 2024.

  12. arXiv:2311.04503  [pdf, other

    cs.LG

    Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data

    Authors: Thibault Simonetto, Salah Ghamizi, Antoine Desjardins, Maxime Cordy, Yves Le Traon

    Abstract: State-of-the-art deep learning models for tabular data have recently achieved acceptable performance to be deployed in industrial settings. However, the robustness of these models remains scarcely explored. Contrary to computer vision, there is to date no realistic protocol to properly evaluate the adversarial robustness of deep tabular models due to intrinsic properties of tabular data such as ca… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

  13. arXiv:2309.05381  [pdf, other

    cs.SE cs.AI

    Hazards in Deep Learning Testing: Prevalence, Impact and Recommendations

    Authors: Salah Ghamizi, Maxime Cordy, Yuejun Guo, Mike Papadakis, And Yves Le Traon

    Abstract: Much research on Machine Learning testing relies on empirical studies that evaluate and show their potential. However, in this context empirical results are sensitive to a number of parameters that can adversely impact the results of the experiments and potentially lead to wrong conclusions (Type I errors, i.e., incorrectly rejecting the Null Hypothesis). To this end, we survey the related literat… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

  14. arXiv:2305.15587  [pdf, other

    cs.CL cs.AI

    How do humans perceive adversarial text? A reality check on the validity and naturalness of word-based adversarial attacks

    Authors: Salijona Dyrmishi, Salah Ghamizi, Maxime Cordy

    Abstract: Natural Language Processing (NLP) models based on Machine Learning (ML) are susceptible to adversarial attacks -- malicious algorithms that imperceptibly modify input text to force models into making incorrect predictions. However, evaluations of these attacks ignore the property of imperceptibility or study it under limited settings. This entails that adversarial perturbations would not pass any… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

    Comments: ACL 2023

  15. arXiv:2302.02907  [pdf, other

    cs.CV cs.CR cs.LG

    GAT: Guided Adversarial Training with Pareto-optimal Auxiliary Tasks

    Authors: Salah Ghamizi, Jingfeng Zhang, Maxime Cordy, Mike Papadakis, Masashi Sugiyama, Yves Le Traon

    Abstract: While leveraging additional training data is well established to improve adversarial robustness, it incurs the unavoidable cost of data collection and the heavy computation to train models. To mitigate the costs, we propose Guided Adversarial Training (GAT), a novel adversarial training technique that exploits auxiliary tasks under a limited set of training data. Our approach extends single-task m… ▽ More

    Submitted 25 May, 2023; v1 submitted 6 February, 2023; originally announced February 2023.

  16. arXiv:2212.08130  [pdf, other

    eess.IV cs.CV cs.LG

    On Evaluating Adversarial Robustness of Chest X-ray Classification: Pitfalls and Best Practices

    Authors: Salah Ghamizi, Maxime Cordy, Michail Papadakis, Yves Le Traon

    Abstract: Vulnerability to adversarial attacks is a well-known weakness of Deep Neural Networks. While most of the studies focus on natural images with standardized benchmarks like ImageNet and CIFAR, little research has considered real world applications, in particular in the medical domain. Our research shows that, contrary to previous claims, robustness of chest x-ray classification is much harder to eva… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

  17. arXiv:2202.03277  [pdf, other

    cs.LG cs.CR

    On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks

    Authors: Salijona Dyrmishi, Salah Ghamizi, Thibault Simonetto, Yves Le Traon, Maxime Cordy

    Abstract: While the literature on security attacks and defense of Machine Learning (ML) systems mostly focuses on unrealistic adversarial examples, recent research has raised concern about the under-explored field of realistic adversarial attacks and their implications on the robustness of real-world systems. Our paper paves the way for a better understanding of adversarial robustness against realistic atta… ▽ More

    Submitted 21 May, 2023; v1 submitted 7 February, 2022; originally announced February 2022.

    Comments: S&P 2023

  18. arXiv:2112.01156  [pdf, other

    cs.AI cs.LG

    A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space

    Authors: Thibault Simonetto, Salijona Dyrmishi, Salah Ghamizi, Maxime Cordy, Yves Le Traon

    Abstract: The generation of feasible adversarial examples is necessary for properly assessing models that work in constrained feature space. However, it remains a challenging task to enforce constraints into attacks that were designed for computer vision. We propose a unified framework to generate feasible adversarial examples that satisfy given domain constraints. Our framework can handle both linear and n… ▽ More

    Submitted 3 May, 2022; v1 submitted 2 December, 2021; originally announced December 2021.

  19. arXiv:2110.15053  [pdf, other

    cs.LG cs.AI cs.CV

    Adversarial Robustness in Multi-Task Learning: Promises and Illusions

    Authors: Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon

    Abstract: Vulnerability to adversarial attacks is a well-known weakness of Deep Neural networks. While most of the studies focus on single-task neural networks with computer vision datasets, very little research has considered complex multi-task models that are common in real applications. In this paper, we evaluate the design choices that impact the robustness of multi-task deep learning networks. We provi… ▽ More

    Submitted 26 October, 2021; originally announced October 2021.

  20. arXiv:2006.07087  [pdf, other

    cs.CY physics.soc-ph q-bio.PE

    Data-driven Simulation and Optimization for Covid-19 Exit Strategies

    Authors: Salah Ghamizi, Renaud Rwemalika, Lisa Veiber, Maxime Cordy, Tegawende F. Bissyande, Mike Papadakis, Jacques Klein, Yves Le Traon

    Abstract: The rapid spread of the Coronavirus SARS-2 is a major challenge that led almost all governments worldwide to take drastic measures to respond to the tragedy. Chief among those measures is the massive lockdown of entire countries and cities, which beyond its global economic impact has created some deep social and psychological tensions within populations. While the adopted mitigation measures (incl… ▽ More

    Submitted 12 June, 2020; originally announced June 2020.

  21. arXiv:1912.01487  [pdf, other

    cs.CR cs.LG

    Adversarial Embedding: A robust and elusive Steganography and Watermarking technique

    Authors: Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon

    Abstract: We propose adversarial embedding, a new steganography and watermarking technique that embeds secret information within images. The key idea of our method is to use deep neural networks for image classification and adversarial attacks to embed secret information within images. Thus, we use the attacks to embed an encoding of the message within images and the related deep neural network outputs to e… ▽ More

    Submitted 14 November, 2019; originally announced December 2019.

  22. arXiv:1904.04612  [pdf, other

    cs.LG cs.CV

    Automated Search for Configurations of Deep Neural Network Architectures

    Authors: Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon

    Abstract: Deep Neural Networks (DNNs) are intensively used to solve a wide variety of complex problems. Although powerful, such systems require manual configuration and tuning. To this end, we view DNNs as configurable systems and propose an end-to-end framework that allows the configuration, evaluation and automated search for DNN architectures. Therefore, our contribution is threefold. First, we model the… ▽ More

    Submitted 9 April, 2019; originally announced April 2019.