Erwan Le Merrer

Orcid: 0000-0001-8344-2135

According to our database1, Erwan Le Merrer authored at least 64 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Under manipulations, are some AI models harder to audit?
CoRR, 2024

Fairness Auditing with Multi-Agent Collaboration.
CoRR, 2024

2023
Modeling rabbit-holes on YouTube.
Soc. Netw. Anal. Min., December, 2023

Fingerprinting Classifiers With Benign Inputs.
IEEE Trans. Inf. Forensics Secur., 2023

On the relevance of APIs facing fairwashed audits.
CoRR, 2023

Model Fingerprinting with Benign Inputs.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
FBI: Fingerprinting models with Benign Inputs.
CoRR, 2022

Randomized Smoothing under Attack: How Good is it in Pratice?
CoRR, 2022

Algorithmic audits of algorithms, and the law.
CoRR, 2022

Randomized Smoothing Under Attack: How Good is it in Practice?
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
Setting the Record Straighter on Shadow Banning.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

RoBIC: A Benchmark Suite For Assessing Classifiers Robustness.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

SurFree: A Fast Surrogate-Free Black-Box Attack.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Adversarial frontier stitching for remote neural network watermarking.
Neural Comput. Appl., 2020

Remote explainability faces the bouncer problem.
Nat. Mach. Intell., 2020

The Imitation Game: Algorithm Selection by Exploiting Black-Box Recommenders.
Proceedings of the Networked Systems - 8th International Conference, 2020

FeGAN: Scaling Distributed GANs.
Proceedings of the Middleware '20: 21st International Middleware Conference, 2020

2019
The Bouncer Problem: Challenges to Remote Explainability.
CoRR, 2019

Application-Aware Adaptive Partitioning for Graph Processing Systems.
Proceedings of the 27th IEEE International Symposium on Modeling, 2019

TamperNN: Efficient Tampering Detection of Deployed Neural Nets.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

MD-GAN: Multi-Discriminator Generative Adversarial Networks for Distributed Datasets.
Proceedings of the 2019 IEEE International Parallel and Distributed Processing Symposium, 2019

Unified and Scalable Incremental Recommenders with Consumed Item Packs.
Proceedings of the Euro-Par 2019: Parallel Processing, 2019

2018
zoNNscan : a boundary-entropy index for zone inspection of neural models.
CoRR, 2018

Gossiping GANs: Position paper.
Proceedings of the Second Workshop on Distributed Infrastructures for Deep Learning, 2018

2017
Sequences, Items And Latent Links: Recommendation With Consumed Item Packs.
CoRR, 2017

The topological face of recommendation: models and application to bias detection.
CoRR, 2017

Distributed deep learning on edge-devices: Feasibility via adaptive compression.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Uncovering Influence Cookbooks: Reverse Engineering the Topological Impact in Peer Ranking Services.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

The Topological Face of Recommendation.
Proceedings of the Complex Networks & Their Applications VI, 2017

2016
Efficient and Transparent Wi-Fi Offloading for HTTP(S) POSTs.
IEEE Trans. Mob. Comput., 2016

Frugal topology construction for stream aggregation in the cloud.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Efficient User Opt-Out from Block Stores.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

Structuring Overlays for Distributed Computing: from Edge-Devices to the Clouds.
, 2016

2014
Heuristical top-k: fast estimation of centralities in complex networks.
Inf. Process. Lett., 2014

Performance evaluation of a peer-to-peer backup system using buffering at the edge.
Comput. Commun., 2014

Hoop: Offloading HTTP(S) POSTs from User Devices onto Residential Gateways.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

Archiving cold data in warehouses with clustered network coding.
Proceedings of the Ninth Eurosys Conference 2014, 2014

Anomaly Characterization in Large Scale Networks.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
(Re)partitioning for stream-enabled computation.
CoRR, 2013

Bitbox: Eventually Consistent File Sharing.
Proceedings of the Networked Systems - First International Conference, 2013

2012
Choosing partners based on availability in P2P networks.
ACM Trans. Auton. Adapt. Syst., 2012

Clustered Network Coding for Maintenance in Practical Storage Systems
CoRR, 2012

OAZE: A network-friendly distributed zapping system for peer-to-peer IPTV.
Comput. Networks, 2012

Availability-Based Methods for Distributed Storage Systems.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Distributed and Private Group Management.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Offline social networks: stepping away from the internet.
Proceedings of the Fifth Workshop on Social Network Systems, 2012

On the impact of users availability in OSNs.
Proceedings of the Fifth Workshop on Social Network Systems, 2012

FixMe: A Self-organizing Isolated Anomaly Detection Architecture for Large Scale Distributed Systems.
Proceedings of the Principles of Distributed Systems, 16th International Conference, 2012

2011
Pretty Private Group Management
CoRR, 2011

Second order centrality: Distributed assessment of nodes criticity in complex networks.
Comput. Commun., 2011

Brief Announcement: A Stable and Robust Membership Protocol.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011

Efficient peer-to-peer backup services through buffering at the edge.
Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, 2011

Distributed Overlay Maintenance with Application to Data Consistency.
Proceedings of the Data Management in Grid and Peer-to-Peer Systems, 2011

2009
Finding Good Partners in Availability-Aware P2P Networks.
Proceedings of the Stabilization, 2009

Centralities: capturing the fuzzy notion of importance in social graphs.
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 2009

Surfing Peer-to-Peer IPTV: Distributed Channel Switching.
Proceedings of the Euro-Par 2009 Parallel Processing, 2009

2008
Evaluating the Quality of a Network Topology through Random Walks.
Proceedings of the Distributed Computing, 22nd International Symposium, 2008

Distributed churn measurement in arbitrary networks.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

SONDe, a Self-Organizing Object Deployment Algorithm in Large-Scale Dynamic Systems.
Proceedings of the Seventh European Dependable Computing Conference, 2008

2007
Exploring the interdisciplinary connections of gossip-based systems.
ACM SIGOPS Oper. Syst. Rev., 2007

Peer counting and sampling in overlay networks based on random walks.
Distributed Comput., 2007

2006
Peer counting and sampling in overlay networks: random walk methods.
Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, 2006

Energy aware self-organizing density management in wireless sensor networks.
Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking, 2006

Peer to peer size estimation in large and dynamic networks: A comparative study.
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006


  Loading...