Florence Sèdes
YOU?
Author Swipe
View article: Leveraging LLMs for Fair Data Labeling and Validation in Crowdsourcing Environments [Vision Paper]
Leveraging LLMs for Fair Data Labeling and Validation in Crowdsourcing Environments [Vision Paper] Open
International audience
View article: Toward Compositional Generalization With Neuro-Symbolic AI: A Comprehensive Overview
Toward Compositional Generalization With Neuro-Symbolic AI: A Comprehensive Overview Open
International audience
View article: Social Engineering and Security: From Human Vulnerabilities to Malicious Threats
Social Engineering and Security: From Human Vulnerabilities to Malicious Threats Open
International audience
View article: Exploring Large Language Models for Bias Mitigation and Fairness
Exploring Large Language Models for Bias Mitigation and Fairness Open
A workshop which aims to delve into the critical aspects of AI governance with a specific focus on the contribution of Large Language Models (LLMs) in shaping ethical and responsible AI practices.
View article: Security in IS and social engineering -- an overview and state of the art
Security in IS and social engineering -- an overview and state of the art Open
Major transformations related to information technologies affect InformationSystems (IS) that support the business processes of organizations and their actors. Deployment in a complex environment involving sensitive, massive and heterogene…
View article: Are Large Language Models the New Interface for Data Pipelines?
Are Large Language Models the New Interface for Data Pipelines? Open
A Language Model is a term that encompasses various types of models designed to understand and generate human communication. Large Language Models (LLMs) have gained significant attention due to their ability to process text with human-lik…
Security in IS and social engineering - an overview ans state of the art: Major transformations related to information technologies affect InformationSystems (IS) that support the business processes of organizations and their actors. Deployment in a complex environment involving sensitive, massive and heterogeneous data generates risks with legal, social and financial impacts. This context of transition and openness makes the security of these IS central to the concerns of organizations. The digitization of all processes and the opening to IoT devices (Internet of Things) has fostered the emergence of a new formof crime, i.e. cybercrime.This generic term covers a number of malicious acts, the majority of which are now perpetrated using social engineering strategies, a phenomenon enabling a combined exploitation of «human» vulnerabilities and digital tools. The maliciousness of such attacks lies in the fact that they turn users into facilitators of cyber-attacks, to the point of being perceived as the «weak link» of cybersecurity.As deployment policies prove insufficient, it is necessary to think about upstream steps: knowing how to anticipate, identifying weak signals and outliers, detect early and react quickly to computer crime are therefore priority issues requiring a prevention and cooperation approach.In this overview, we propose a synthesis of literature and professional practices on this subject. Open
View article: Entretien avec Chloé Camou, joueuse et entrepreneuse
Entretien avec Chloé Camou, joueuse et entrepreneuse Open
International audience
View article: Entretien avec Colin de la Higuera, chaire UNESCO
Entretien avec Colin de la Higuera, chaire UNESCO Open
International audience
View article: Publication du baromètre SheLeadsTech
Publication du baromètre SheLeadsTech Open
View article: Review of: "The Use of Generative AI in an Interdisciplinary Approach for Cultural Preservation"
Review of: "The Use of Generative AI in an Interdisciplinary Approach for Cultural Preservation" Open
View article: An exploration of future challenges for crowd sourced vulnerability detection
An exploration of future challenges for crowd sourced vulnerability detection Open
International audience
View article: Entretien avec Peggy Vicomte, déléguée générale de l'association Femmes@Numerique
Entretien avec Peggy Vicomte, déléguée générale de l'association Femmes@Numerique Open
International audience
View article: Une informaticienne élue présidente de Sorbonne Université !
Une informaticienne élue présidente de Sorbonne Université ! Open
View article: Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms
Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms Open
View article: Apache Spark Based Deep Learning for Social Transaction Analysis
Apache Spark Based Deep Learning for Social Transaction Analysis Open
International audience
View article: Méconduites académiques : exploration d’une distinction potentielle de genres
Méconduites académiques : exploration d’une distinction potentielle de genres Open
Gender bias, widely investigated in science on positive aspects such as obtaining funding or publications, remains unexplored on the « negative » aspects of science such as bad academic practices: if women are less visible in science, are …
View article: Méconduites académiques : exploration d’une distinction potentielle de genres
Méconduites académiques : exploration d’une distinction potentielle de genres Open
Thème : Les nouvelles frontières de l’intégrité
View article: Application de GNN sur des graphes non-attribués : Benchmark de performances
Application de GNN sur des graphes non-attribués : Benchmark de performances Open
Cet article a été soumis et accepté dans la session: Jeunes Chercheuses et Jeunes Chercheurs (JCJC) d'INFORSID2022
View article: Apprentissage adverse et algorithmes de détection d'évènements : une première typologie
Apprentissage adverse et algorithmes de détection d'évènements : une première typologie Open
View article: Extracting Guidelines for Security Education, Training and Awareness Programme from the Literature
Extracting Guidelines for Security Education, Training and Awareness Programme from the Literature Open
View article: Recommendation Generation Justified for Information Access Assistance Service (IAAS) : Study of Architectural Approaches
Recommendation Generation Justified for Information Access Assistance Service (IAAS) : Study of Architectural Approaches Open
Recommendation systems only provide more specific recommendations to users. They do not consider giving a justification for the recommendation. However, the justification for the recommendation allows the user to make the decision whether …
View article: A Survey of Middlewares for self-adaptation and context-aware in Cloud of Things environment
A Survey of Middlewares for self-adaptation and context-aware in Cloud of Things environment Open
International audience
View article: Applying PDCA to Security, Education, Training and Awareness Programs
Applying PDCA to Security, Education, Training and Awareness Programs Open
View article: Recommendation Generation Justified for Information Access Assistance Service (IAAS) : Study of Architectural Approaches
Recommendation Generation Justified for Information Access Assistance Service (IAAS) : Study of Architectural Approaches Open
Recommendation systems only provide more specific recommendations to users. They do not consider giving a justification for the recommendation. However, the justification for the recommendation allows the user to make the decision whether …
View article: Comparative Study of Justification Methods in Recommender Systems: Example of Information Access Assistance Service (IAAS)
Comparative Study of Justification Methods in Recommender Systems: Example of Information Access Assistance Service (IAAS) Open
Justification of recommendations increases trust between users and the system but also generates more relevant recommendations than recommendation systems that do not incorporate it. That is why, we conducted a justification study of the r…
View article: « Les décodeuses du numérique », une BD qui parle de, et fait parler de #femmesInformatique
« Les décodeuses du numérique », une BD qui parle de, et fait parler de #femmesInformatique Open
View article: Mendeleïeva : un jeu de plateau pour mettre en valeur les femmes en sciences
Mendeleïeva : un jeu de plateau pour mettre en valeur les femmes en sciences Open
Le jeu Mendeleieva permet de découvrir les éléments chimiques de votre vie de tous les jours et des femmes scientifiques étudiant ces éléments.