Search

Your search keyword '"Tredan, Gilles"' showing total 119 results

Search Constraints

Start Over You searched for: Author "Tredan, Gilles" Remove constraint Author: "Tredan, Gilles"
119 results on '"Tredan, Gilles"'

Search Results

1. LLMs hallucinate graphs too: a structural perspective

2. Under manipulations, are some AI models harder to audit?

3. Fairness Auditing with Multi-Agent Collaboration

4. Modeling Rabbit-Holes on YouTube

5. On the relevance of APIs facing fairwashed audits

6. On the Price of Locality in Static Fast Rerouting

7. Algorithmic audits of algorithms, and the law

10. Setting the Record Straighter on Shadow Banning

11. On the Feasibility of Perfect Resilience with Local Fast Failover

12. Collective Information Processing in Human Phase Separation

13. The Bouncer Problem: Challenges to Remote Explainability

14. TamperNN: Efficient Tampering Detection of Deployed Neural Nets

16. Adversarial Frontier Stitching for Remote Neural Network Watermarking

17. The topological face of recommendation: models and application to bias detection

19. Fast Abstracts and Student Forum Proceedings - EDCC 2016 - 12th European Dependable Computing Conference

20. Uncovering Influence Cookbooks : Reverse Engineering the Topological Impact in Peer Ranking Services

21. The Many Faces of Graph Dynamics

22. The Many Faces of Graph Dynamics

23. Modeling and Measuring Graph Similarity: The Case for Centrality Distance

24. Request Complexity of VNet Topology Extraction: Dictionary-Based Attacks

26. Revisiting Content Availability in Distributed Online Social Networks

27. Misleading Stars: What Cannot Be Measured in the Internet?

28. A generic trust framework for large-scale open systems using machine learning

29. How robust are gossip-based communication protocols?

30. Algorithmic audits of algorithms, and the law

32. Large-Scale Networked Systems: From Anarchy to Geometric Self-structuring

33. Byzantine Consensus with Few Synchronous Links

37. Evaluating the Quality of a Network Topology through Random Walks

39. On the Feasibility of Perfect Resilience with Local Fast Failover

45. Brief Announcement: Do VNet Embeddings Leak Information about ISP Topology?

46. Brief Announcement: What Can(Not) Be Perfectly Rerouted Locally

48. TamperNN: Efficient Tampering Detection of Deployed Neural Nets

Catalog

Books, media, physical & digital resources