Sorry, you need to enable JavaScript to visit this website.
Share

Publications

2025

  • Multi-view 3D surface reconstruction from SAR images by inverse rendering
    • Barbier--Renard Emile
    • Tupin Florence
    • Trouvé Nicolas
    • Denis Loïc
    IEEE Geoscience and Remote Sensing Letters, IEEE - Institute of Electrical and Electronics Engineers, 2025, 22, pp.4008805. 3D reconstruction of a scene from Synthetic Aperture Radar (SAR) images mainly relies on interferometric measurements, which involve strict constraints on the acquisition process. These last years, progress in deep learning has significantly advanced 3D reconstruction from multiple views in optical imaging, mainly through reconstruction-by-synthesis approaches popularized by Neural Radiance Fields. In this paper, we propose a new inverse rendering method for 3D reconstruction from a few incoherent SAR views, drawing inspiration from optical approaches. First, we introduce a new simplified differentiable SAR rendering model, able to synthetize images from a Digital Surface Model (DSM) and a radar backscattering coefficients map. Then, we introduce a coarse-to-fine strategy to reconstruct the DSM and the map of backscattering coefficients of a SAR scene starting only from a few SAR views. We use a neural field, i.e. a continuous parametric model based on a Multi-Layer Perceptron, to represent the SAR scene. Finally, we present preliminary results of DSM reconstruction from synthetic SAR images produced by ONERA's physically-based EMPRISE simulator, supporting the potential of applying inverse rendering approaches to SAR data in order to efficiently exploit geometric disparities in future applications such as multi-sensor data fusion. (10.1109/LGRS.2025.3572303)
    DOI : 10.1109/LGRS.2025.3572303
  • Efficient thermalization and universal quantum computing with quantum Gibbs samplers
    • Rouzé Cambyse
    • Stilck Franca Daniel
    • Alhambra Álvaro
    , 2024. The preparation of thermal states of matter is a crucial task in quantum simulation. In this work, we prove that a recently introduced, efficiently implementable dissipative evolution thermalizes to the Gibbs state in time scaling polynomially with system size at high enough temperatures for any Hamiltonian that satisfies a Lieb-Robinson bound, such as local Hamiltonians on a lattice. Furthermore, we show the efficient adiabatic preparation of the associated purifications or "thermofield double" states. To the best of our knowledge, these are the first results rigorously establishing the efficient preparation of high-temperature Gibbs states and their purifications. In the low-temperature regime, we show that implementing this family of dissipative evolutions for inverse temperatures polynomial in the system's size is computationally equivalent to standard quantum computations. On a technical level, for high temperatures, our proof makes use of the mapping of the generator of the evolution into a Hamiltonian, and then connecting its convergence to that of the infinite temperature limit. For low temperature, we instead perform a perturbation at zero temperature and resort to circuit-to-Hamiltonian mappings akin to the proof of universality of quantum adiabatic computing. Taken together, our results show that a family of quasi-local dissipative evolutions efficiently prepares a large class of quantum many-body states of interest, and has the potential to mirror the success of classical Monte Carlo methods for quantum many-body systems.
  • Did You Forkget It? Detecting One-Day Vulnerabilities in Open-source Forks With Global History Analysis
    • Lefeuvre Romain
    • Reux Charly
    • Zacchiroli Stefano
    • Barais Olivier
    • Combemale Benoit
    , 2025. Tracking vulnerabilities inherited from third-party open-source software is a well-known challenge, often addressed by tracing the threads of dependency information. However, vulnerabilities can also propagate through forking: a code repository forked after the introduction of a vulnerability, but before it is patched, may remain vulnerable long after the vulnerability has been fixed in the initial repository. History analysis approaches are used to track vulnerable software versions at scale. However, such approaches fail to track vulnerabilities in forks, leaving fork maintainers to identify them manually. This paper presents a global history analysis approach to help software developers identify one-day (known but unpatched) vulnerabilities in forked repositories. Leveraging the global graph of public code, as captured by the Software Heritage archive, our approach propagates vulnerability information at the commit level and performs automated impact analysis. Starting from 7162 repositories with vulnerable commits listed in OSV, we propagate vulnerability information to 2.2 million forks. We evaluate our approach by filtering forks with significant user bases whose latest commit is still potentially vulnerable, manually auditing the code, and contacting maintainers for confirmation and responsible disclosure. This process identified 135 high-severity one-day vulnerabilities, achieving a precision of 0.69, with 9 confirmed by maintainers.
  • Optimal quantum algorithm for Gibbs state preparation
    • Rouzé Cambyse
    • Stilck Franca Daniel
    • Alhambra Alvaro
    , 2024. It is of great interest to understand the thermalization of open quantum many-body systems, and how quantum computers are able to efficiently simulate that process. A recently introduced disispative evolution, inspired by existing models of open system thermalization, has been shown to be efficiently implementable on a quantum computer. Here, we prove that, at high enough temperatures, this evolution reaches the Gibbs state in time scaling logarithmically with system size. The result holds for Hamiltonians that satisfy the Lieb-Robinson bound, such as local Hamiltonians on a lattice, and includes long-range systems. To the best of our knowledge, these are the first results rigorously establishing the rapid mixing property of high-temperature quantum Gibbs samplers, which is known to give the fastest possible speed for thermalization in the many-body setting. We then employ our result to the problem of estimating partition functions at high temperature, showing an improved performance over previous classical and quantum algorithms.
  • University Rents Enabling Corporate Innovation: Mapping Academic Researcher Coding and Discursive Labour in the R Language Ecosystem
    • Cai Xiaolan
    • O'Neil Mathieu
    • Zacchiroli Stefano
    Journal of Quantitative Description: Digital Media, University of Zurich, 2025, 5. This article explores the role of unrecognised labour in corporate innovation systems via an analysis of researcher coding and discursive contributions to R, one of the largest statistical software ecosystems. Studies of online platforms typically focus on how platform affordances constrain participants' actions, and profit from their labour. We innovate by connecting the labour performed inside digital platforms to the professional employment of participants. Our case study analyses 8,924 R package repositories on GitHub, examining commits and communications. Our quantitative findings show that researchers, alongside non-affiliated contributors, are the most frequent owners of R package repositories and their most active contributors. Researchers are more likely to hold official roles compared to the average, and to engage in collaborative problem-solving and support work during package development. This means there is, underneath the 'recognised' category of star researchers who transition between academia and industry and secure generous funding, an 'unrecognised' category of researchers who not only create and maintain key statistical infrastructure, but also provide support to industry employees, for no remuneration. Our qualitative findings show how this unrecognised labour affects practitioners. Finally, our analysis of the ideology and practice of free, libre and open source software (FLOSS) shows how this ideology and practice legitimate the use of 'university rents' by Big Tech. (10.51685/jqd.2025.025)
    DOI : 10.51685/jqd.2025.025
  • Long-time asymptotics of noisy SVGD outside the population limit
    • Priser Victor
    • Bianchi Pascal
    • Salim Adil
    ICLR International Conference on Learning Representations, 2025. Stein Variational Gradient Descent (SVGD) is a widely used sampling algorithm that has been successfully applied in several areas of Machine Learning. SVGD operates by iteratively moving a set of interacting particles (which represent the samples) to approximate the target distribution. Despite recent studies on the complexity of SVGD and its variants, their long-time asymptotic behavior (i.e., after numerous iterations ) is still not understood in the finite number of particles regime. We study the long-time asymptotic behavior of a noisy variant of SVGD. First, we establish that the limit set of noisy SVGD for large is well-defined. We then characterize this limit set, showing that it approaches the target distribution as increases. In particular, noisy SVGD provably avoids the variance collapse observed for SVGD. Our approach involves demonstrating that the trajectories of noisy SVGD closely resemble those described by a McKean-Vlasov process.
  • Mathematical Foundations for Side-Channel Analysis of Cryptographic Systems
    • Cheng Wei
    • Guilley Sylvain
    • Rioul Olivier
    , 2025, pp.X-411. This book offers the reader a formalization, characterization and quantification of the real threat level posed by side-channel leaks from devices implementing cryptography. It exploits the best mathematical tools for quantifying information leakage and characterizing leakage-based attacks. The two possible approaches are described in detail. This includes the optimal attack strategy that can be derived (in specific contexts) or generic bounds regarding data complexity that can be computed. The tone of this book is essentially mathematical. It aims to establish formal foundations for techniques that are otherwise used as engineering recipes in industrial laboratories or empirical intuitions for deriving security levels from practical implementations. It is a systematization of knowledge and a compilation of relevant tools relating to the practice of side-channel analysis on embedded systems. This book provides an up-to-date and improved analysis and understanding of embedded devices that conceal secrets that can be extracted by an attacker. Typical attacks involve measuring the device's power consumption or radiated electromagnetic field. As a source of noisy information, this correlates it with secrets and enabling these secrets to be retrieved. The attacker in some cases, can purchase a blank device from the same series and learn about its leakage, particularly how it relates to the secrets. This book also covers how such information can enhance hardware attacks deployed on another device. Researchers and engineers working in the field of side-channel security for embedded systems and related countermeasures as well as hardware and software engineers focused on implementing cryptographic functionalities will want to purchase this book as a reference. Advanced-level students majoring in computer science and electrical engineering will find this book valuable as a secondary textbook. (10.1007/978-3-031-64399-6)
    DOI : 10.1007/978-3-031-64399-6
  • On the complexity of sabotage games for network security
    • Raju Dhananjay
    • Bakirtzis Georgios
    • Topcu Ufuk
    IEEE Transactions on Networking, ieee, 2025, 34, pp.2897-2910. (10.1109/TON.2025.3628015)
    DOI : 10.1109/TON.2025.3628015
  • White matter hyperintensities and their role in major depressive episodes: a cross-sectional study in adults under 65
    • Baudouin Édouard
    • Corruble Emmanuelle
    • Gori Pietro
    • Bloch Isabelle
    • Becquemont Laurent
    • Duron Emmanuelle
    • Colle Romain
    Brazilian Journal of Psychiatry, Brazilian Psychiatric Association, 2025.
  • Why honor heroes? The emergence of extreme altruistic behavior as a by-product of praisers' self-promotion
    • Dessalles Jean-Louis
    Evolution and Human Behavior, Elsevier, 2025, 46 (1), pp.106656. Heroes are people who perform costly altruistic acts. Few people turn out to be heroes, but many spontaneously honor heroes by commenting, applauding, or enthusiastically celebrating their deeds. The existence of a praising audience leads individuals to compete to attract the crowd's admiration. The outcome is a winner-take-all situation in which only one or a few individuals engage in extreme altruistic behavior. The more difficult part is to explain the crowd's propensity to pay tribute from an individual fitness optimization perspective. The model proposed here shows how heroic behavior and its celebration by a large audience may emerge together. This situation is possible if admirers use public praise as a social signal to promote their own commitment to the values displayed by the hero. (10.1016/j.evolhumbehav.2025.106656)
    DOI : 10.1016/j.evolhumbehav.2025.106656
  • Réélaboration des règles de sécurité en contextes interpersonnels : le cas du toucher en temps de Covid‑19
    • Héron Robin
    • Safin Stéphane
    • Baker Michael J
    • Zhang Zhuoming
    • Alvina Jessalyn
    • Lecolinet Éric
    • Détienne Françoise
    Activités, Association Recherches et Pratiques sur les ACTivités, 2025, 22-1. (10.4000/13ra9)
    DOI : 10.4000/13ra9
  • Resilience for Regular Path Queries: Towards a Complexity Classification
    • Amarilli Antoine
    • Gatterbauer Wolfgang
    • Makhija Neha
    • Monet Mikaël
    Proceedings of the ACM on Management of Data, ACM, 2025, 3 (2), pp.1-18. The resilience problem for a query and an input set or bag database is to compute the minimum number of facts to remove from the database to make the query false. In this paper, we study how to compute the resilience of Regular Path Queries (RPQs) over graph databases. Our goal is to characterize the regular languages $L$ for which it is tractable to compute the resilience of the existentially-quantified RPQ built from $L$. We show that computing the resilience in this sense is tractable (even in combined complexity) for all RPQs defined from so-called local languages. By contrast, we show hardness in data complexity for RPQs defined from the following language classes (after reducing the languages to eliminate redundant words): all finite languages featuring a word containing a repeated letter, and all languages featuring a specific kind of counterexample to being local (which we call four-legged languages). The latter include in particular all languages that are not star-free. Our results also imply hardness for all non-local languages with a so-called neutral letter. We also highlight some remaining obstacles towards a full dichotomy. In particular, for the RPQ $abc|be$, resilience is tractable but the only PTIME algorithm that we know uses submodular function optimization. (10.1145/3725245)
    DOI : 10.1145/3725245
  • Device Independent Quantum Key Activation
    • Ulu Bora
    • Brunner Nicolas
    • Weilenmann Mirjam
    Physical Review Letters, American Physical Society, 2025, 135 (19), pp.190801. Device-independent quantum key distribution (DIQKD) allows two distant parties to establish a secret key, based only on the observed Bell nonlocal distribution. It remains however, unclear what the minimal resources for enabling DIQKD are and how to maximize the key rate from a given distribution. In the present work, we consider a scenario where several copies of a given quantum distribution are jointly processed via a local and classical wiring operation. We find that, under few assumptions, it is possible to activate device-independent key. That is, starting from a distribution that is useless in a DIQKD protocol, we obtain a positive key rate by wiring several copies together. We coin this effect device-independent key activation. Our analysis focuses on the standard DIQKD protocol with one-way post-processing, and we resort to semi-definite programming techniques for computing lower bounds on the key rate. (10.1103/f8jc-q1kg)
    DOI : 10.1103/f8jc-q1kg
  • Additivity and chain rules for quantum entropies via multi-index Schatten norms
    • Fawzi Omar
    • Kochanowski Jan
    • Rouzé Cambyse
    • van Himbeeck Thomas
    , 2025. The primary entropic measures for quantum states are additive under the tensor product. In the analysis of quantum information processing tasks, the minimum entropy of a set of states, e.g., the minimum output entropy of a channel, often plays a crucial role. A fundamental question in quantum information and cryptography is whether the minimum output entropy remains additive under the tensor product of channels. Here, we establish a general additivity statement for the optimized sandwiched Rényi entropy of quantum channels. For that, we generalize the results of [Devetak, Junge, King, Ruskai, CMP 2006] to multi-index Schatten norms. As an application, we strengthen the additivity statement of [Van Himbeeck and Brown, 2025] thus allowing the analysis of time-adaptive quantum cryptographic protocols. In addition, we establish chain rules for Rényi conditional entropies that are similar to the ones used for the generalized entropy accumulation theorem of [Metger, Fawzi, Sutter, Renner, CMP 2024].
  • Computational aspects of the trace norm contraction coefficient
    • Delsol Idris
    • Fawzi Omar
    • Kochanowski Jan
    • Ramachandran Akshay
    , 2025. We show that approximating the trace norm contraction coefficient of a quantum channel within a constant factor is NP-hard. Equivalently, this shows that determining the optimal success probability for encoding a bit in a quantum system undergoing noise is NP-hard. This contrasts with the classical analogue of this problem that can clearly be solved efficiently. We also establish the NP-hardness of deciding if the contraction coefficient is equal to 1, i.e., the channel can perfectly preserve a bit. As a consequence, deciding if a non-commutative graph has an independence number of at least 2 is NPhard. In addition, we establish a converging hierarchy of semidefinite programming upper bounds on the contraction coefficient.
  • Routing Quantum Control of Causal Order
    • Grothus Maarten
    • Abbott Alastair A.
    • Vanrietvelde Augustin
    • Branciard Cyril
    , 2025. In recent years, various frameworks have been proposed for the study of quantum processes with indefinite causal order. In particular, quantum circuits with quantum control of causal order (QC-QCs) form a broad class of physical supermaps obtained from a bottom-up construction and are believed to represent all quantum processes physically realisable in a fixed spacetime. Complementarily, the formalism of routed quantum circuits introduces quantum operations constrained by "routes" to represent processes in terms of a more fine-grained routed circuit decomposition. This decomposition, formalised using a so-called routed graph, represents the information flow within the respective process. However, the existence of routed circuit decompositions has only been established for a small set of processes so far, including both certain specific QC-QCs and more exotic processes as examples. In this work, we remedy this fact by connecting these two frameworks. We prove that for any given $N$, one can use a single routed graph to systematically obtain a routed circuit decomposition for any QC-QC with $N$ parties. We detail this construction explicitly and contrast it with other routed circuit decompositions of QC-QCs, which we obtain from alternative routed graphs. We conclude by pointing out how this connection can be useful to tackle various open problems in the field of indefinite causal order, particularly establishing circuit representations of subclasses of QC-QCs.
  • Complexity of mixed Schatten norms of quantum maps
    • Kochanowski Jan
    • Fawzi Omar
    • Rouzé Cambyse
    , 2025. We study the complexity of computing the mixed Schatten $\|Φ\|_{q\to p}$ norms of linear maps $Φ$ between matrix spaces. When $Φ$ is completely positive, we show that $\| Φ\|_{q \to p}$ can be computed efficiently when $q \geq p$. The regime $q \geq p$ is known as the non-hypercontractive regime and is also known to be easy for the mixed vector norms $\ell_{q} \to \ell_{p}$ [Boyd, 1974]. However, even for entanglement-breaking completely-positive trace-preserving maps $Φ$, we show that computing $\| Φ\|_{1 \to p}$ is $\mathsf{NP}$-complete when $p>1$. Moving beyond the completely-positive case and considering $Φ$ to be difference of entanglement breaking completely-positive trace-preserving maps, we prove that computing $\| Φ\|^+_{1 \to 1}$ is $\mathsf{NP}$-complete. In contrast, for the completely-bounded (cb) case, we describe a polynomial-time algorithm to compute $\|Φ\|_{cb,1\to p}$ and $\|Φ\|^+_{cb,1\to p}$ for any linear map $Φ$ and $p\geq1$.
  • Self-Supervision Enhances Instance-based Multiple Instance Learning Methods in Digital Pathology: A Benchmark Study
    • Mammadov Ali
    • Le Folgoc Loic
    • Adam Julien
    • Buronfosse Anne
    • Hayem Gilles
    • Hocquet Guillaume
    • Gori Pietro
    Journal of Medical Imaging, SPIE Digital Library, 2025. Multiple Instance Learning (MIL) has emerged as the best solution for Whole Slide Image (WSI) classification. It consists of dividing each slide into patches, which are treated as a bag of instances labeled with a global label. MIL includes two main approaches: instance-based and embedding-based. In the former, each patch is classified independently, and then the patch scores are aggregated to predict the bag label. In the latter, bag classification is performed after aggregating patch embeddings. Even if instance-based methods are naturally more interpretable, embedding-based MILs have usually been preferred in the past due to their robustness to poor feature extractors. However, recently, the quality of feature embeddings has drastically increased using self-supervised learning (SSL). Nevertheless, many authors continue to endorse the superiority of embedding-based MIL. To investigate this further, we conduct 710 experiments across 4 datasets, comparing 10 MIL strategies, 6 self-supervised methods with 4 backbones, 4 foundation models, and various pathology-adapted techniques. Furthermore, we introduce 4 instance-based MIL methods never used before in the pathology domain. Through these extensive experiments, we show that with a good SSL feature extractor, simple instance-based MILs, with very few parameters, obtain similar or better performance than complex, state-of-the-art (SOTA) embedding-based MIL methods, setting new SOTA results on the BRACS and Camelyon16 datasets. Since simple instance-based MIL methods are naturally more interpretable and explainable to clinicians, our results suggest that more effort should be put into well-adapted SSL methods for WSI rather than into complex embedding-based MIL methods.
  • The role of Mrs. Gerber’s Lemma for evaluating the information leakage of secret sharing schemes
    • Rioul Olivier
    • Béguinot Julien
    , 2025.
  • Rate Meta-Distribution in Millimeter Wave URLLC Device-to-Device Networks With Beam Misalignment
    • Quan Yibo
    • Coupechoux Marceau
    • Kélif Jean-Marc
    IEEE Transactions on Vehicular Technology, Institute of Electrical and Electronics Engineers, 2025, 74 (1), pp.657-673. <div><p>Using the stochastic geometry framework, we study a millimeter wave (mmWave) Device-to-Device (D2D) network dedicated to Ultra-Reliable Low Latency Communications (URLLC), where users employ multiple antennas to perform beamforming. We leverage the notion of meta-distribution in order to capture the reliability requirement of URLLC. The packet transmission process is divided into two phases: a beam training phase, during which exhaustive beam sweeping is adopted, and a data transmission phase. The paper investigates the misalignment error distribution resulting from an imperfect training phase, due to the finite codebooks resolution and the fast variation of the channel. For the data transmission phase, closed-form expressions for all the moments of the conditional rate coverage probability are derived, and the meta-distribution is approximated using the beta approximation. The study evaluates the overall network performance through the effective rate metadistribution, which accounts for the training overhead and beam misalignment errors. The results show the detrimental impact of misalignment errors when URLLC requirements are stringent and highlight the trade-off between the training overhead and the gain brought by multiple antennas. Insights are provided for optimally and jointly choosing the codebook size and tbe number of antennas.</p></div> (10.1109/TVT.2024.3451487)
    DOI : 10.1109/TVT.2024.3451487
  • Efficient Hamiltonian, structure and trace distance learning of Gaussian states
    • Fanizza Marco
    • Rouzé Cambyse
    • Stilck Franca Daniel
    , 2024. In this work, we initiate the study of Hamiltonian learning for positive temperature bosonic Gaussian states, the quantum generalization of the widely studied problem of learning Gaussian graphical models. We obtain efficient protocols, both in sample and computational complexity, for the task of inferring the parameters of their underlying quadratic Hamiltonian under the assumption of bounded temperature, squeezing, displacement and maximal degree of the interaction graph. Our protocol only requires heterodyne measurements, which are often experimentally feasible, and has a sample complexity that scales logarithmically with the number of modes. Furthermore, we show that it is possible to learn the underlying interaction graph in a similar setting and sample complexity. Taken together, our results put the status of the quantum Hamiltonian learning problem for continuous variable systems in a much more advanced state when compared to spins, where state-of-the-art results are either unavailable or quantitatively inferior to ours. In addition, we use our techniques to obtain the first results on learning Gaussian states in trace distance with a quadratic scaling in precision and polynomial in the number of modes, albeit imposing certain restrictions on the Gaussian states. Our main technical innovations are several continuity bounds for the covariance and Hamiltonian matrix of a Gaussian state, which are of independent interest, combined with what we call the local inversion technique. In essence, the local inversion technique allows us to reliably infer the Hamiltonian of a Gaussian state by only estimating in parallel submatrices of the covariance matrix whose size scales with the desired precision, but not the number of modes. This way we bypass the need to obtain precise global estimates of the covariance matrix, controlling the sample complexity.
  • ding-01 :ARG0 Un corpus AMR pour le français parlé spontané
    • Kang Jeongwoo
    • Boritchev Maria
    • Coavoux Maximin
    , 2025, pp.791-801. Nous présentons notre travail en cours sur l'annotation d'un corpus sémantique du français. Nous annotons le corpus DinG, constitué de transcriptions de dialogues spontanés en français enregistrées pendant des parties du jeu de plateau Catan , en Abstract Meaning Representation (AMR), un formalisme de représentation sémantique. Comme AMR a une couverture insuffisante de la dynamique de la parole spontanée, nous étendons le formalisme pour mieux représenter la parole spontanée et les structures de phrases spécifiques au français. En outre, nous diffusons un guide d'annotation détaillant ces extensions. Enfin, nous publions notre corpus sous licence libre (CC-SA-BY). Notre travail contribue au développement de ressources sémantiques pour le dialogue en français.
  • Réélaboration des règles de sécurité en contextes interpersonnels : le cas du toucher en temps de Covid‑19
    • Héron Robin
    • Safin Stéphane
    • Baker Michael J
    • Zhang Zhuoming
    • Alvina Jessalyn
    • Lecolinet Éric
    • Détienne Françoise
    Activités, Association Recherches et Pratiques sur les ACTivités, 2025, 22-1. In this article, we study how the health safety rules relating to social touching, established during the pandemic, have been redefined with regard to interpersonal interactions. According to the adaptative safety framework, rules are theorised as resources, which are adapted in context. To better understand the processes for the re-elaboration of safety rules in interpersonal contexts, we conducted a study consisting of an online questionnaire on social touching habits before and after the lockdown, followed by in-depth interviews with selected participants. Our results highlight (1) reduced touching practices, especially for semi-intimate relationships such as colleagues, casual friends, close friends, and extended family; (2) two processes of re-elaborating pandemic-related safety rules: explicit deliberation, behavioural alignment, as well as reflexive processes; and (3) two dimensions of justifications given for the re-elaboration of those rules, preserving physical health/vulnerability concerns and maintaining social relations, and their relative weight according to the relationships (family versus friends) between the interactants. While recommended health and safety rules were mostly followed leading to large decrease in touching behaviours, it appears that people re-elaborate the rule depending on the relationship they share with one another. Through the re-elaboration of the official health and safety rules people strike a balance between safety measures in order to preserve their wellbeing and/or the relationship. (10.4000/13ra9)
    DOI : 10.4000/13ra9
  • A bipartite ranking approach to the two-sample problem
    • Clémençon Stéphan
    • Limnios Myrto
    • Vayatis Nicolas
    Electronic Journal of Statistics, Shaker Heights, OH : Institute of Mathematical Statistics, 2025, 19 (1), pp.2733–2779. The two-sample problem consists in testing whether two independent samples are drawn from the same (unknown) distribution. Its study in high-dimension is the subject of much attention, especially because the information acquisition processes at work in the Big Data era often involve various poorly controlled sources, leading to datasets possibly exhibiting strong sampling bias. While the efficiency of classic methods relying on computing a discrepancy measure between the empirical distributions of each sample, is negatively impacted by increasing dimensionality, we develop a two-step approach based on statistical learning and an extension of rank tests. By dividing the initial samples in two, a bipartite ranking algorithm first learns a real-valued scoring function inducing a preorder on the multivariate space. Then, a rank statistic based on the scores of the remaining observations, tests for differences in distribution. Because the ranking algorithm learns how to map the data onto the real line as the likelihood ratio between the original multivariate distributions, the approach resists to large dimensions (ignoring ranking model bias issues) and preserves the advantages of univariate rank tests. We prove nonasymptotic error bounds based on recent results for two-sample linear rank-processes, and experimentally show how the promoted approach surpasses state-of-the-art methods. (10.1214/25-EJS2392)
    DOI : 10.1214/25-EJS2392
  • Just Project! Multi-Channel Despeckling, the Easy Way
    • Denis Loïc
    • Dalsasso Emanuele
    • Tupin Florence
    IEEE Transactions on Geoscience and Remote Sensing, Institute of Electrical and Electronics Engineers, 2025, 63, pp.1-11. Reducing speckle fluctuations in multi-channel SAR images is essential in many applications of SAR imaging such as polarimetric classification or interferometric height estimation. While single-channel despeckling has widely benefited from the application of deep learning techniques, extensions to multi-channel SAR images are much more challenging. This paper introduces MuChaPro, a generic framework that exploits existing single-channel despeckling methods. The key idea is to generate numerous single-channel projections, restore these projections, and recombine them into the final multi-channel estimate. This simple approach is shown to be effective in polarimetric and/or interferometric modalities. A special appeal of MuChaPro is the possibility to apply a self-supervised training strategy to learn sensor-specific networks for single-channel despeckling. (10.1109/TGRS.2025.3531957)
    DOI : 10.1109/TGRS.2025.3531957