Publications
2025
-
Graphically Speaking: Unmasking Abuse in Social Media with Conversation Insights
- Nouri Célia
- Cointet Jean-Philippe
- Clavel Chloé
-
StreamMLOps: Online Learning in Practice from Big Data Streams & Real-Time Applications
- Barry Mariam
- Montiel Jacob
- Bifet Albert
- Manchev Nikolay
- Wadkar Sameer
- Halford Max
- Chiky Raja
- El Jaouhari Saad
- Shakman Katherine B
- Al Fehaily Joudi
- Le Deit Fabrice
- Tran Vinh-Thuy
- Guerizec Eric
DOI : 10.1109/ICDE55515.2023.00272 -
Survey on forecasting for electric vehicle charging-power demand
- Yang Wen
- Laurenty Ignacio
- Fontaine Mathieu
- d'Alché-Buc Florence
-
Investigating Raman backscattering decay and the perspective of time-multiplexed quantum communications
- Verdier Pierre-Enguerrand
- Alléaume Romain
- Rivera Thomas
DOI : 10.1364/OE.561961 -
Don’t Forget Your Inverse DDIM for Image Editing
- Gomez-Trenado Guillermo
- Mesejo Pablo
- Cordón Oscar
- Lathuilière Stéphane
DOI : 10.1109/MCI.2025.3563859 -
Assessing the Vulnerabilities of RISC-V using the gem5 Simulator
- Khan Mahreen
- Mushtaq Maria
- Pacalet Renaud
- Apvrille Ludovic
-
Winner-takes-all for Multivariate Probabilistic Time Series Forecasting
- Cortés Adrien
- Rehm Rémi
- Letzelter Victor
-
Two-Stage MIMO Equalization for Long Haul Coupled Multi-Core Fiber Systems
- Darweesh Jamal
- Abouseif Akram
- Rekaya Ben Othman Ghaya
- Jaouën Yves
- Klaimi Rami
-
Beyond Low-rank Decomposition: A Shortcut Approach for Efficient On-Device Learning
- Nguyen Le-Trung
- Quélennec Aël
- Nguyen van Tam
- Tartaglione Enzo
-
To Each Metric Its Decoding: Post-Hoc Optimal Decision Rules of Probabilistic Hierarchical Classifiers
- Plaud Roman
- Perez-Lebel Alexandre
- Labeau Matthieu
- Saillenfest Antoine
- Bonald Thomas
-
Assessing the Vulnerabilities of RISC-V using the gem5 Simulator (Access-Retired)
- Khan Mahreen
- Mushtaq Maria
- Pacalet Renaud
- Apvrille Ludovic
-
U-DREAM: Unsupervised Dereverberation guided by a Reverberation Model
- Bahrman Louis
- Fontaine Mathieu
- Richard Gaël
-
DRST: a Non-Intrusive Framework for Performance Analysis in Softwarized Networks
- Liu Qiong
- Lin Jianke
- Zhang Tianzhu
- Linguaglossa Leonardo
-
Défi du GDR GPL ADaptation DYnamique et ConTinue ADDYCT
- Laval Jannik
- Philippe Jolan
- Cariou Eric
- Ameur-Boulifa Rabéa
- Guérin Sylvain
- Kouchnarenko Olga
- Guermouche Nawal
-
Deep Learning for Embedded Cybersecurity
- Varillon Arnaud
-
Planning Socio-Emotional Response Generation for Conversational Agents
- Vanel Lorraine
-
RESCUE: Multi-Robot Planning Under Resource Uncertainty and Objective Criticality
- Cordeiro Franco
- Tardieu Samuel
- Pautet Laurent
DOI : 10.4230/LIPIcs.ECRTS.2025.5 -
Side-Channel Attack Detection using gem5 and Machine Learning: A Case Study on Fault-based Attacks in RISC-V
- Khan Mahreen
- Mushtaq Maria
- Pacalet Renaud
- Apvrille Ludovic
-
Side-Channel Attack Detection using gem5 and ML: A Case Study on Fault-based Attacks in RISC-V
- Khan Mahreen
- Mushtaq Maria
- Pacalet Renaud
- Apvrille Ludovic
-
Neural networks for solition prediction in optical communication
- Mukhopadhyay Meghna
- Thedrez Bruno
-
Quantum-aware network planning and integration
- Ware Cédric
- Lourdiane Mounia
DOI : 10.1109/ICTON67126.2025.11125476 -
First Order Logic with Fuzzy Semantics for Describing and Recognizing Nerves in Medical Images
- Bloch Isabelle
- Bonnot Enzo
- Gori Pietro
- La Barbera Giammarco
- Sarnacki Sabine
-
Stein's method for max-stable random vectors
- Costacèque Bruno
- Decreusefond Laurent
DOI : 10.48550/arXiv.2507.00463 -
Arithmétisation de la partie entière et applications à la cryptographie
- Berthet Pierre-Augustin
- Tavernier Cédric
-
Cartographier l'intelligence artificielle : collecte et analyse d'un corpus de chartes et manifestes sur l'éthique de l'IA
- Viard Tiphaine
- Delarue Simon
- Gornet Mélanie
- Boritchev Maria