Security and Systems

The LRE “Security and Systems” group aims at securing IT systems in three areas: the identification of vulnerabilities, the protection of software, operating systems and networks attack detection using Machine Learning and Graph Learning

security-systems/schema.svg

Fields of interest

The team leverages about 4 permanent researchers whose computer skills and research interests are complementary. They are brought together by the aim to produce added value from data (I.e., models, useful patterns or knowledge).

More specifically, the team is working on the following problems:

  • Speaker Recognition
  • Language Recognition
  • Speaker Diarization
  • Emotion Recognition
  • Supervised/unsupervised learning with and without constraints
  • Recommender systems
  • Subgroup Discovery / Exceptional Model Mining
  • User group Analytics
  • Output Space Sampling
  • Black Box model introspection

Our results are theoretical, methodological, algorithmic, software, and applications. Our guiding principle is to try to help data owners throughout the interactive process of knowledge discovery from data. Such processes require the combination of a wide range of paradigms of description or induction (pattern extraction, classification, statistical learning, deep learning, etc.).

Applications

Our research is developed in relation to real data analysis: the quantitative and qualitative empirical study on real data is fundamental to assessing the performance of the proposed methods. While AI research team develops methods and algorithms rather than applications, it works with owners of data from several environments: Neuroscience, Chemistry, Social Sciences, Industry, etc. This diversity shows our willingness to be centered “Methods” and develop generic algorithms applicable to a broad spectrum of applications.

Team Focuces

Highlighted Works

Seminar

Fixed-Point Theorems for Non-Transitive Relations

On Monday 26th of February, at 15:00, Jérémy Dubut-Kross will give a talk on “Fixed-Point Theorems for Non-Transitive Relations” during the seminar of the Automata and Application group.
 
Publication

Combining physical and network data for attack detection in water distribution networks

In Water distribution systems analysis (WDSA)/computing and control water industry (CCWI) joint conference.
 

Members

Placeholder image

Pierre Parrend

Professor

Complex Attack Detection
Placeholder image

Marc Espie

Expert

OpenBSD
Placeholder image

Elloh Adja

Associate Professor

Placeholder image

David Beserra

Associate Professor

Placeholder image

Walid Ghandour

Associate Professor

Placeholder image

Ghada Gharbi

Associate Professor

Placeholder image

Nidà Meddouri

Associate Professor

Placeholder image

Loïc Rouquette

Associate Professor

Algorithmic Boomerang Attacks Constraint Programming Differential Cryptanalysis
Placeholder image

Côme Frappé-Vialatoux

PhD Student

Placeholder image

Majed Jaber

PhD Student

Placeholder image

Julien Michel

PhD Student

tada todo
Placeholder image

Khaoula Sghaier

PhD Student