📢 Announcement: LRE Students Seminar 🎓
Attention all EPITA students and faculty members! We are thrilled to invite you to the upcoming EPITA Research Laboratory (LRE) Seminar, where the LRE Research Students will expose their work.
📅 Jan 24, 10th ⏰ 10.00 - 12.00 and 16.00 - 18.00 🏠 KB 402
Schedule
- ❶ 10.00 - 12.00 AA,Image,Secu 📹 Lien Teams
- âť· 16.00 - 18.00 IA 📹 Lien Teams
Time | Team | Student | Subjet |
---|---|---|---|
10:00 ↦ 10:25 | AA | Rostan Tabet | Combining reactive synthesis and motion planning to control complex systems |
10:30 ↦ 10:55 | AA | Simon Scatton | SAT-Based learning for CTL formulas |
11:00 ↦ 11:25 | Image | Célien Aubry | Implémenter des capacités de perception basées sur la vision sur des robots d’exploration |
11:30 ↦ 11:55 | Secu | Younes Benreguieg | ???? |
16:00 ↦ 16:25 | IA | Elouan Vincent | Explicabilité des réseaux de neurones sur graphe au niveau des embeddings |
16:30 ↦ 17:55 | IA | Victor Miara | Self supervised learning for speaker verification |
17:00 ↦ 17:25 | IA | Noe Audemard | Détection d’usurpation d’identité dans l’audio |
Abstracts
10:00 ↦ 10:25: Combining reactive synthesis and motion planning to control complex systems, Rostan Tabet
?????
10:30 ↦ 10:55: SAT-Based learning for CTL formulas, Simon Scatton
?????
11:00 ↦ 11:25: ImplĂ©menter des capacitĂ©s de perception basĂ©es vision de l’environnement proche en frugalitĂ© embarquĂ©e, CĂ©lien Aubry
Percevoir son environnement est essentiel pour un robot mobile car il doit se dĂ©placer dans un monde qui lui est inconnu ou changeant. Il s’agit dans ce projet de recherche de se focaliser sur les solutions Ă forte frugalitĂ© embarquĂ©e et implĂ©menter les plus prometteuses tout en restant compatible avec Ros2.
11:30 ↦ 11:55: ????, Younes Benreguieg
?????
16:00 ↦ 16:25: Explicabilité des réseaux de neurones sur graphe au niveau des embeddings, Elouan Vincent
While Graph Neural Networks (GNNs) excel in learning node representations and exhibit remarkable performance on graph-related tasks, they grapple with the challenge of opaqueness, commonly referred as the “black-box” problem. Motivated by the need for transparency and interpretability in these models, this research is dedicated to enhancing our understanding of their inner workings. In previous work, we have formulated a method that integrates Hamiache-Navarro techniques and pattern mining, strategically tailored to construct representative graph of an activation rule within GNNs. In this extensive study, we thoroughly evaluate this approach, including a comprehensive exploration of its application on various GNN tasks, such as graph and node classification, and an in-depth analysis of the impact of different hyperparameters.
16:30 ↦ 17:55: Fine tuning of Automatic Speech Recognition Models for Self Supervised Speaker Verification, Victor Miara
Automatic Speech Recognition (ASR) models, characterized by their expansive size and training by corporations with substantial computational resources, inherently grasp extensive auditory information during training. This comprehension spans two major levels: speaker’s information and phonetic information.Though ASR models primarily utilize phonetic information, this study highlights their potential in speaker verification tasks when fine-tuned.The current state of the art in speaker verification on the SUPERB benchmark is Microsoft’s Wav-LM Large model. We are therefore seeking to utilize a pre-trained ASR model like Wav-LM for speaker verification tasks using a self-supervised approach. Techniques such as employing contrastive loss or utilizing pseudo labels generated by another self-supervised speaker verification model are considered, and could offer a robust, enhanced, and self-reliant system for speaker verification.
17:00 ↦ 17:25: Détection d’usurpation d’identité dans l’audio, Noe Audemard
Speaker verifications systems are vulnerable to spoofing attacks in various forms. Namely, voice conversion, voice synthesis and replay attacks. Many countermeasures to such attacks have been developed but remain vulnerable to unseen attacks or conditions different from the training data. In this work, we will try to propose a method to detect spoofing, and classify the attack according to the method used to generate the audio file.