Sorry, you need to enable JavaScript to visit this website.
Partager

Publications

 

Les publications de nos enseignants-chercheurs sont sur la plateforme HAL :

 

Les publications des thèses des docteurs du LTCI sont sur la plateforme HAL :

 

Retrouver les publications figurant dans l'archive ouverte HAL par année :

2023

  • Iiro Honkala’s contributions to some conjectures on identifying codes
    • Hudry Olivier
    , 2023.
  • AI models for digital signal processing in future 6G-IoT networks
    • Larue Guillaume
    , 2023. Wireless technologies are of paramount importance to today's societies and future 6th generation communication networks are expected to address many societal and technological challenges. While communications infrastructures have a growing environmental impact that needs to be reduced, digital technologies also have a role to play in reducing the impact of all sectors of the economy. To this end, the future networks will not only have to enable more efficient information transfer, but also meet the growing need for data exchange capacity. This is particularly the role of the Internet of Things use cases, where a massive number of sensors allow to monitor complex systems. These use cases are associated with many constraints such as limited energy resources and complexity. Therefore, an efficient and low-complexity physical layer - responsible for the transmission of information between the network nodes - is absolutely crucial. In this regard, the use of artificial intelligence techniques is relevant. On the one hand, the mathematical framework of neural networks allows for efficient and low-cost generic hardware implementations. On the other hand, the application of learning procedures can improve the performance of certain algorithms. In this work, we are interested in the use of neural networks and machine learning for digital signal processing in the context of 6G-IoT networks. First, we are interested in the transcription of certain equalisation, demodulation and decoding algorithms from the digital communications literature into neural networks. Secondly, we are interested in the application of learning mechanisms on these neural network structures in order to improve their performance. A linear block decoder is proposed which allows the blind discovery of a decoding scheme whose performance is at least equivalent to that of the reference decoder. Finally, an end-to-end structure is presented, allowing joint learning of an encoding/decoding scheme with performance and complexity comparable to state-of-the-art solutions.
  • Function-valued regression with kernels : Improving speed, flexibility and robustness
    • Bouche Dimitri
    , 2023. With the increasing ubiquity of data-collecting devices, a great variety of phenomena is monitored with finer and finer accuracy, which constantly expands the scope of Machine Learning applications. Dealing with such volume of data efficiently is however challenging. Fortunately, as measurements get denser, they may become gradually redundant. We can then greatly reduce the burden by finding a representation which exploits properties of the generating process and/or is tailored for the application at hand.This thesis revolves around an aspect of this idea: functional data. Data indeed consist of discrete measurements, but sometimes thinking of those as functional, we can exploit prior knowledge on smoothness to obtain a better yet lower dimensional representation. The focus is on nonlinear models for functional output regression (FOR), relying on an extension of reproducing kernel Hilbert spaces for vector-valued functions (vv-RKHS), which is the cornerstone of many nonlinear existing FOR methods. We propose to challenge those in two aspects: their computational complexity with respect to the number of measurements per function and their focusing solely on the square loss.To that end, we introduce the new framework of kernel projection learning (KPL) combining vv-RKHSs and representation of signals in dictionaries. The loss remains functional, however the model predicts only a finite number of representation coefficients. This approach retains the many advantages of vv-RKHSs yet greatly alleviates the computational burden incurred by the functional outputs. We derive two estimators in closed-form using the square loss, one for fully observed functions and one for discretized ones. We show that both are consistent in terms of excess risk. We demonstrate as well the possibility to use other differentiable and convex losses, to combine this framework with large scale kernel methods and to automatically select the dictionary using a structured penalty.In another contribution, we propose to solve the regression problem in vv-RKHSs of function-valued functions for the family of convoluted losses which we introduce. Those losses can either promote sparsity or robustness with a parameter controlling the degree of locality of those properties. Thanks to their structure, they are particularly amenable to dual approaches which we investigate. We then overcome the challenges posed by the functional nature of the dual variables by proposing two possible representations and we propose corresponding algorithms.
  • Demonstration Of Performance For Low Cost Personal HSM
    • Urien Pascal
    , 2023, pp.879-880. This demonstration presents an original personal Hardware Secure Module (HSM) server, built from grid of secure elements and host system (Raspberry Pi), with internet connectivity. Each secure element is plugged in a board with a microcontroller providing I2C (Inter-Integrated Circuit) interface. The host system executes the open software IoSEv5 (Internet of Secure Elements version 5), which manages two T CP/IP daemons. First is used for downloading software in secure elements, second is a TLS front server that send/receive TLS packets to/from TLS backend servers running in secure elements. Applications hosted in secure elements implement a keystore, which stores cryptographic keys and computes signature over 256 bits elliptic curve. The demonstration shows the grid at work with 16 simultaneous TLS sessions performing signature operation. It shows that performance follows the Amdahl's law, with a speeding factor of about 50. (10.1109/CCNC51644.2023.10060586)
    DOI : 10.1109/CCNC51644.2023.10060586
  • Towards a centralized security architecture for SOME/IP automotive services
    • Khemissa Hamza
    • Urien Pascal
    , 2023, pp.977-978. Connected and autonomous vehicles (CAVs) consist of a number of networked computer components, called Electronic Control Units (ECUs). Scalable service-Oriented MiddlewarE over IP (SOME/IP) is a communication middleware standardized used to exchange various services between disjoint applications on distinct ECUs. However, it presents lack of authentication and confidentiality features. In this paper, we propose a centralized security architecture for SOME/IP automotive services. First, we present a lightweight symmetric cryptography based session key agreement scheme between each ECU and the manufacturer data center, which uses a random nonce, concatenation operator, a simple hash function and a keyedhash message authentication code (HMAC). Then, we define the security parameters between the different ECUs for the invehicle Ethernet-based communications. We propose the use of DTLS using pre-shared keys (DTLS-PSK) in order to secure the transmission of SOME/IP messages, (10.1109/CCNC51644.2023.10059950)
    DOI : 10.1109/CCNC51644.2023.10059950
  • Public-attention-based Adversarial Attack on Traffic Sign Recognition
    • Chi Lijun
    • Msahli Mounira
    • Memmi Gerard
    • Qiu Han
    , 2023, pp.740-745. Autonomous driving systems (ADS) can instantaneously and accurately recognize traffic signs by using deep neural networks (DNNs). Although adversarial attacks are well-known to easily fool DNNs by adding tiny but malicious perturbations, most attack methods require sufficient information about the victim models (white-box) to perform. In this paper, we propose a black-box attack in the recognition system of ADS, Public Attention Attacks (PAA), that can attack a black-box model by collecting the generic attention patterns of other white-box DNNs to transfer the attack. Particularly, we select multiple dual or triple attention patterns of white-box model combinations to generate the transferable adversarial perturbations for PAA attacks. We perform the experimentation on four well-trained models in different adversarial settings separately. The results indicate that when more white-box models the adversary collects to perform PAA, the higher the attack success rate (ASR) he can achieve to attack the target black-box model. (10.1109/CCNC51644.2023.10060485)
    DOI : 10.1109/CCNC51644.2023.10060485
  • Coalitional game-theoretical approach to coinvestment with application to edge computing
    • Patanè Rosario
    • Araldo Andrea
    • Chahed Tijani
    • Kiedanski Diego
    • Kofman Daniel
    , 2023, pp.517-522. We propose in this paper a coinvestment plan between several stakeholders of different types, namely a physical network owner, operating network nodes, e.g. a network operator or a tower company, and a set of service providers willing to use these resources to provide services as video streaming, augmented reality, autonomous driving assistance, etc. One such scenario is that of deployment of Edge Computing resources. Indeed, although the latter technology is ready, the high Capital Expenditure (CAPEX) cost of such resources is the barrier to its deployment. For this reason, a solid economical framework to guide the investment and the returns of the stakeholders is key to solve this issue. We formalize the coinvestment framework using coalitional game theory. We provide a solution to calculate how to divide the profits and costs among the stakeholders, taking into account their characteristics: traffic load, revenues, utility function. We prove that it is always possible to form the grand coalition composed of all the stakeholders, by showing that our game is convex. We derive the payoff of the stakeholders using the Shapley value concept, and elaborate on some properties of our game. We show our solution in simulation. (10.1109/CCNC51644.2023.10060093)
    DOI : 10.1109/CCNC51644.2023.10060093
  • Compressing Explicit Voxel Grid Representations: fast NeRFs become also small
    • Deng Chenxi Lola
    • Tartaglione Enzo
    , 2023, pp.1236-1245. (10.1109/WACV56688.2023.00129)
    DOI : 10.1109/WACV56688.2023.00129
  • Fuzzy Sets Methods in Image Processing and Understanding
    • Bloch Isabelle
    • Ralescu Anca
    , 2023. (10.1007/978-3-031-19425-2)
    DOI : 10.1007/978-3-031-19425-2
  • Learning finitely correlated states: stability of the spectral reconstruction
    • Fanizza Marco
    • Galke Niklas
    • Lumbreras Josep
    • Rouzé Cambyse
    • Winter Andreas
    , 2023. We show that marginals of subchains of length $t$ of any finitely correlated translation invariant state on a chain can be learned, in trace distance, with $O(t^2)$ copies -- with an explicit dependence on local dimension, memory dimension and spectral properties of a certain map constructed from the state -- and computational complexity polynomial in $t$. The algorithm requires only the estimation of a marginal of a controlled size, in the worst case bounded by a multiple of the minimum bond dimension, from which it reconstructs a translation invariant matrix product operator. In the analysis, a central role is played by the theory of operator systems. A refined error bound can be proven for $C^*$-finitely correlated states, which have an operational interpretation in terms of sequential quantum channels applied to the memory system. We can also obtain an analogous error bound for a class of matrix product density operators reconstructible by local marginals. In this case, a linear number of marginals must be estimated, obtaining a sample complexity of $\tilde{O}(t^3)$. The learning algorithm also works for states that are only close to a finitely correlated state, with the potential of providing competitive algorithms for other interesting families of states.
  • Procédé et système de placement automatique de données
    • Shaar Atef
    • Boukhatem Nadia
    • Baccouch Hana
    , 2023. L'invention concerne le domaine du placement de données pour les systèmes de stockage, et concerne plus particulièrement un procédé et un système de placement automatique de données.
  • Cooperative Self-Training for Multi-Target Adaptive Semantic Segmentation
    • Zhang Yangsong
    • Roy Subhankar
    • Lu Hongtao
    • Ricci Elisa
    • Lathuilière Stéphane
    , 2022. In this work we address multi-target domain adaptation (MTDA) in semantic segmentation, which consists in adapting a single model from an annotated source dataset to multiple unannotated target datasets that differ in their underlying data distributions. To address MTDA, we propose a self-training strategy that employs pseudo-labels to induce cooperation among multiple domain-specific classifiers. We employ feature stylization as an efficient way to generate image views that forms an integral part of self-training. Additionally, to prevent the network from overfitting to noisy pseudo-labels, we devise a rectification strategy that leverages the predictions from different classifiers to estimate the quality of pseudo-labels. Our extensive experiments on numerous settings, based on four different semantic segmentation datasets, validate the effectiveness of the proposed self-training strategy and show that our method outperforms state-of-the-art MTDA approaches. Code available at: https://github.com/Mael-zys/CoaST
  • Interband cascade technology for energy-efficient mid-infrared free-space communication
    • Didier Pierre
    • Knötig Hedwig
    • Spitz Olivier
    • Cerutti Laurent
    • Lardschneider Anna
    • Awwad Elie
    • Diaz-Thomas Daniel
    • Baranov A.
    • Weih Robert
    • Koeth Johannes
    • Schwarz Benedikt
    • Grillot Frédéric
    Photonics research, Optical Society of America, 2023, 11 (4), pp.582. Space-to-ground high-speed transmission is of utmost importance for the development of a worldwide broadband network. Mid-infrared wavelengths offer numerous advantages for building such a system, spanning from low atmospheric attenuation to eye-safe operation and resistance to inclement weather conditions. We demonstrate a full interband cascade system for high-speed transmission around a wavelength of 4.18 µm. The low-power consumption of both the laser and the detector in combination with a large modulation bandwidth and sufficient output power makes this technology ideal for a free-space optical communication application. Our proof-of-concept experiment employs a radio-frequency optimized Fabry–Perot interband cascade laser and an interband cascade infrared photodetector based on a type-II InAs/GaSb superlattice. The bandwidth of the system is evaluated to be around 1.5 GHz. It allows us to achieve data rates of 12 Gbit/s with an on–off keying scheme and 14 Gbit/s with a 4-level pulse amplitude modulation scheme. The quality of the transmission is enhanced by conventional pre- and post-processing in order to be compatible with standard error-code correction. (10.1364/PRJ.478776)
    DOI : 10.1364/PRJ.478776
  • Limitations of local update recovery in stabilizer-GKP codes: a quantum optimal transport approach
    • Koenig Robert
    • Rouzé Cambyse
    , 2023. Local update recovery seeks to maintain quantum information by applying local correction maps alternating with and compensating for the action of noise. Motivated by recent constructions based on quantum LDPC codes in the finite-dimensional setting, we establish an analytic upper bound on the fault-tolerance threshold for concatenated GKP-stabilizer codes with local update recovery. Our bound applies to noise channels that are tensor products of one-mode beamsplitters with arbitrary environment states, capturing, in particular, photon loss occurring independently in each mode. It shows that for loss rates above a threshold given explicitly as a function of the locality of the recovery maps, encoded information is lost at an exponential rate. This extends an early result by Razborov from discrete to continuous variable (CV) quantum systems. To prove our result, we study a metric on bosonic states akin to the Wasserstein distance between two CV density functions, which we call the bosonic Wasserstein distance. It can be thought of as a CV extension of a quantum Wasserstein distance of order 1 recently introduced by De Palma et al. in the context of qudit systems, in the sense that it captures the notion of locality in a CV setting. We establish several basic properties, including a relation to the trace distance and diameter bounds for states with finite average photon number. We then study its contraction properties under quantum channels, including tensorization, locality and strict contraction under beamsplitter-type noise channels. Due to the simplicity of its formulation, and the established wide applicability of its finite-dimensional counterpart, we believe that the bosonic Wasserstein distance will become a versatile tool in the study of CV quantum systems. (10.48550/arXiv.2309.16241)
    DOI : 10.48550/arXiv.2309.16241
  • MPEG immersive video
    • Garus Patrick
    • Milovanović Marta
    • Jung Joël
    • Cagnazzo Marco
    , 2023, pp.327-356. MPEG immersive video (MIV) is a novel standard, enabling the compression of volumetric video content. In this chapter, we describe MIV, its tools, and its profiles. Given that MIV is a video-based solution, the texture and geometry information is coded using available 2D video codecs, which are independent of MIV. We present the performance of MIV with several state-of-the-art 2D codecs: VVC, AV1, and AVS3, highlighting that the eventual success of MIV does not depend on the market share of any particular 2D codec. However, using suitable tools for the coding of MIV texture or depth map atlases is an important requirement for efficient compression of immersive video. In this context, we present results related to screen content coding tools of VVC and show their potential for the compression of MIV atlases. (10.1016/B978-0-32-391755-1.00018-3)
    DOI : 10.1016/B978-0-32-391755-1.00018-3
  • Efficient learning of the structure and parameters of local Pauli noise channels
    • Rouzé Cambyse
    • Stilck Franca Daniel
    , 2023. The unavoidable presence of noise is a crucial roadblock for the development of large-scale quantum computers and the ability to characterize quantum noise reliably and efficiently with high precision is essential to scale quantum technologies further. Although estimating an arbitrary quantum channel requires exponential resources, it is expected that physically relevant noise has some underlying local structure, for instance that errors across different qubits have a conditional independence structure. Previous works showed how it is possible to estimate Pauli noise channels with an efficient number of samples in a way that is robust to state preparation and measurement errors, albeit departing from a known conditional independence structure. We present a novel approach for learning Pauli noise channels over n qubits that addresses this shortcoming. Unlike previous works that focused on learning coefficients with a known conditional independence structure, our method learns both the coefficients and the underlying structure. We achieve our results by leveraging a groundbreaking result by Bresler for efficiently learning Gibbs measures and obtain an optimal sample complexity of O(log(n)) to learn the unknown structure of the noise acting on n qubits. This information can then be leveraged to obtain a description of the channel that is close in diamond distance from O(poly(n)) samples. Furthermore, our method is efficient both in the number of samples and postprocessing without giving up on other desirable features such as SPAM-robustness, and only requires the implementation of single qubit Cliffords. In light of this, our novel approach enables the large-scale characterization of Pauli noise in quantum devices under minimal experimental requirements and assumptions. (10.48550/arXiv.2307.02959)
    DOI : 10.48550/arXiv.2307.02959
  • Integration of heterogeneous components for co-simulation
    • Jerray Jawher
    • Ameur-Boulifa Rabéa
    • Apvrille Ludovic
    , 2023. Because of their complexity, embedded systems are designed with sub-systems or components taken in charge by different development teams or entities and with different modeling frameworks and simulation tools, depending on the characteristics of each component. Unfortunately, this diversity of tools and semantics makes the integration of these heterogeneous components difficult. Thus, to evaluate their integration before their hardware or software is available, one solution would be to merge them into a common modeling framework. Yet, such a holistic environment supporting many computation and computation semantics seems hard to settle. Another solution we investigate in this paper is to generically link their respective simulation environments in order to keep the strength and semantics of each component environment. The paper presents a method to simulate heterogeneous components of embedded systems in real-time. These components can be described at any abstraction level. Our main contribution is a generic glue that can analyze in real-time the state of different simulation environments and accordingly enforce the correct communication semantics between components. Once presented in a generic way, our glue is illustrated with Apache Kafka as the communication facility between simulation engines. It is then applied to two model and simulation frameworks: TTool and SystemC. Finally, Zigbee serves as a case study to illustrate the strengths of our approach.
  • (Adversarial) Electromagnetic Disturbance in the Industry
    • Beckers Arthur
    • Guilley Sylvain
    • Maurine Philippe
    • O'Flynn Colin
    • Picek Stjepan
    IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2023, 72 (2), pp.414-422. Faults occur naturally and are responsible for reliability concerns. Faults are also an interesting tool for attackers to extract sensitive information from secure chips. In particular, non-invasive fault attacks have received a fair amount of attention. One easy way to perturb a chip without altering it is the so-called Electromagnetic Fault Injection (EMFI). Such attack has been studied in great depth, and nowadays, it is part and parcel of the state-of-the-art. Indeed, new capabilities have emerged where EM experimental benches are used to cryptanalyze chips. The progress of this "field" is fast, in terms of reproducibility, accuracy, and number of use-cases. However, there is too little awareness about such advances. In this paper, we aim to expose the true harmfulness of EMFI (including reproducibility) to enable reasonable security quotations. We also analyze protections (at hardware/firmware/system levels) in light of their efficiency. We characterize the specificity of EM fault injection compared to other injection means (laser, glitch, probing). (10.1109/TC.2022.3224373)
    DOI : 10.1109/TC.2022.3224373
  • PROCÉDÉ D'ÉVALUATION DE L'ÉTAT RELATIF D'UN MOTEUR D'AÉRONEF
    • Pineau Edouard
    • Razakarivony Sébastien
    • Bonald Thomas
    , 2023.
  • Localization in 1D non-parametric latent space models from pairwise affinities
    • Giraud Christophe
    • Issartel Yann
    • Verzelen Nicolas
    Electronic Journal of Statistics, Shaker Heights, OH : Institute of Mathematical Statistics, 2023, 17 (1), pp.1587-1662. We consider the problem of estimating latent positions in a one-dimensional torus from pairwise affinities. The observed affinity between a pair of items is modeled as a noisy observation of a function f (x*i , x*j) of the latent positions x*i, x*j of the two items on the torus. The affinity func-tion f is unknown, and it is only assumed to fulfill some shape constraints ensuring that f(x, y) is large when the distance between x and y is small, and vice-versa. This non-parametric modeling offers a good flexibility to fit data. We introduce an estimation procedure that provably localizes all the latent positions with a maximum error of the order of log(n)/n, with high-probability. This rate is proven to be minimax optimal. A computa-tionally efficient variant of the procedure is also analyzed under some more restrictive assumptions. Our general results can be instantiated to the prob-lem of statistical seriation, leading to new bounds for the maximum error in the ordering. (10.1214/23-ejs2134)
    DOI : 10.1214/23-ejs2134
  • Next generation of Bluetooth and Wi-Fi networks
    • Lim Keun-Woo
    , 2023.
  • Nonatomic Non-Cooperative Neighbourhood Balancing Games
    • Auger David
    • Cohen Johanne
    • Lobstein Antoine
    , 2023. We introduce a game where players selfishly choose a resource and endure a cost depending on the number of players choosing nearby resources. We model the influences among resources by a weighted graph, directed or not. These games are generalizations of well-known games like Wardrop and congestion games. We study the conditions of equilibria existence and their efficiency if they exist. We conclude with studies of games whose influences among resources can be modelled by simple graphs. (10.48550/arXiv.2303.08507)
    DOI : 10.48550/arXiv.2303.08507
  • Using the Uniqueness of Global Identifiers to Determine the Provenance of Python Software Source Code
    • Sun Yiming
    • German Daniel M.
    • Zacchiroli Stefano
    Empirical Software Engineering, Springer Verlag, 2023. We consider the problem of identifying the provenance of free/open source software (FOSS) and specifically the need of identifying where reused source code has been copied from. We propose a lightweight approach to solve the problem based on software identifiers—such as the names of variables, classes, and functions chosen by programmers. The proposed approach is able to efficiently narrow down to a small set of candidate origin products, to be further analyzed with more expensive techniques to make a final provenance determination. By analyzing the PyPI (Python Packaging Index) open source ecosystem we find that globally defined identifiers are very distinct. Across PyPI's 244 K packages we found 11.2 M different global identifiers (classes and method/function names—with only 0.6% of identifiers shared among the two types of entities); 76% of identifiers were used only in one package, and 93% in at most 3. Randomly selecting 3 non-frequent global identifiers from an input product is enough to narrow down its origins to a maximum of 3 products within 89% of the cases. We validate the proposed approach by mapping Debian source packages implemented in Python to the corresponding PyPI packages; this approach uses at most five trials, where each trial uses three randomly chosen global identifiers from a randomly chosen python file of the subject software package, then ranks results using a popularity index and requires to inspect only the top result. In our experiments, this method is effective at finding the true origin of a project with a recall of 0.9 and precision of 0.77. (10.1007/s10664-023-10317-8)
    DOI : 10.1007/s10664-023-10317-8
  • Multi-Agent Systems
    • Malvone Vadim
    • Murano Aniello
    , 2023, 14282, pp.XX-554. This volume LNCS 14282 constitutes the refereed proceedings of the 20th European Conference EUMAS 2023, held in Naples, Italy, during September 2023. This volume includes 24 full papers and 5 short papers, carefully selected from 47 submissions. Additionally, the volume features 16 short papers, rigorously reviewed from 20 submissions for the PhD day. The conference focused on the theory and practice of autonomous agents and multi-agent systems, covering a wide range of topics. (10.1007/978-3-031-43264-4)
    DOI : 10.1007/978-3-031-43264-4
  • Scaling by subsampling for big data, with applications to statistical learning
    • Bertail Patrice
    • Bouchouia Mohammed
    • Jelassi Ons
    • Tressou Jessica
    • Zetlaoui Mélanie
    Journal of Nonparametric Statistics, American Statistical Association, 2023, 36 (1), pp.78-117. Handling large datasets and calculating complex statistics on huge datasets require important computing resources. Using subsampling methods to calculate statistics of interest on small samples is often used in practice to reduce computational complexity, for instance using the divide and conquer strategy. In this article, we recall some results on subsampling distributions and derive a precise rate of convergence for these quantities and the corresponding quantiles. We also develop some standardization techniques based on subsampling unstandardized statistics in the framework of large datasets. It is argued that using several subsampling distributions with different subsampling sizes brings a lot of information on the behavior of statistical learning procedures: subsampling allows to estimate the rate of convergence of different algorithms, to estimate the variability of complex statistics, to estimate confidence intervals for out-of-sample errors and interpolate their values at larger scales. These results are illustrated on simulations, but also on two important datasets, frequently analyzed in the statistical learning community, EMNIST (recognition of digits) and VeReMi (analysis of Network Vehicular Reference Misbehavior). (10.1080/10485252.2023.2219782)
    DOI : 10.1080/10485252.2023.2219782