Maxime Meyer

ORCID: 0000-0002-8652-597X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Malware Detection Techniques
  • Topic Modeling
  • Multimodal Machine Learning Applications
  • Spam and Phishing Detection
  • Natural Language Processing Techniques
  • Cryptography and Data Security
  • French Urban and Social Studies
  • European Political History Analysis
  • Wireless Body Area Networks
  • Sexuality, Behavior, and Technology
  • Wireless Communication Networks Research
  • Scottish History and National Identity
  • Wireless Sensor Networks for Data Analysis
  • Fault Detection and Control Systems
  • IoT and Edge/Fog Computing
  • Misinformation and Its Impacts
  • Security and Verification in Computing
  • Authorship Attribution and Profiling
  • Network Security and Intrusion Detection
  • Multiculturalism, Politics, Migration, Gender
  • Opportunistic and Delay-Tolerant Networks
  • Embedded Systems and FPGA Design
  • Context-Aware Activity Recognition Systems
  • Cybercrime and Law Enforcement Studies
Kaustubh Dhole Varun Gangal Sebastian Gehrmann Aadesh Gupta Zhenhao Li and 95 more Saad Mahamood Abinaya Mahendiran Simon Mille Ashish Shrivastava Samson Tan Tongshuang Wu Jascha Sohl‐Dickstein Jinho D. Choi Eduard Hovy Ondřej Dušek Sebastian Ruder Sajant Anand Nagender Aneja Rabin Banjade Lisa Barthe Hanna Behnke Ian Berlot-Attwell Connor Boyle Caroline Brun Marco Antonio Sobrevilla Cabezudo Samuel Cahyawijaya Émile Chapuis Wanxiang Che Mukund Choudhary Christian Clauss Pierre Colombo Filip Cornell Gautier Dagan Mayukh Das Tanay Dixit Thomas Dopierre Paul-Alexis Dray Suchitra Dubey Tatiana Ekeinhor Marco Di Giovanni Tanya Goyal Rishabh Gupta Rishabh Gupta Louanes Hamla Sang Wook Han Fabrice Harel-Canada Antoine Honoré Ishan Jindal Przemyslaw K. Joniak Denis Kleyko Venelin Kovatchev Kalpesh Krishna Ashutosh Kumar Stefan Langer Seungjae Ryan Lee Corey James Levinson Hualou Liang Kaizhao Liang Zhexiong Liu Andrey Lukyanenko Vukosi Marivate Gerard de Melo Simon Méoni Maxime Meyer Afnan Mir Nafise Sadat Moosavi Niklas Muennighoff Timothy Sum Hon Mun Kenton Murray Marcin Namysł Maria Obedkova Priti Oli Nivranshu Pasricha Jan Pfister Richard Plant Vinay Prabhu Vasile Păiș Libo Qin Shahab Raji Pawan Kumar Rajpoot Vikas Raunak Roy Rinberg Nicolas Roberts Juan Diego Rodríguez Claude Roux P. H. S. Vasconcellos Ananya B. Sai Robin M. Schmidt Thomas Scialom Tshephisho Joseph Sefara Saqib Shamsi Xudong Shen Haoyue Shi Yiwen Shi Анна Швец Nick Siegel Damien Sileo Jamie Simon Chandan Singh Roman Sitelew

Data augmentation is an important component in the robustness evaluation of models natural language processing (NLP) and enhancing diversity data they are trained on. In this paper, we present NL-Augmenter, a new participatory Python-based framework which supports creation both transformations (modifications to data) filters (data splits according specific features). We describe initial set 117 23 for variety tasks. demonstrate efficacy NL-Augmenter by using several its analyze popular...

10.48550/arxiv.2112.02721 preprint EN cc-by arXiv (Cornell University) 2021-01-01

Text data augmentation, i.e., the creation of new textual from an existing text, is challenging. Indeed, augmentation transformations should take into account language complexity while being relevant to target Natural Language Processing (NLP) task (e.g., Machine Translation, Classification). Initially motivated by application Business Email Compromise (BEC) detection, we propose a corpus and agnostic framework used as service augment English texts within our company. Our proposal combines...

10.48550/arxiv.2007.02033 preprint EN other-oa arXiv (Cornell University) 2020-01-01

10.1016/j.ipl.2018.11.001 article EN Information Processing Letters 2018-11-06

M2M devices are ubiquitous, and there is a growing tendency to connect such mobile networks. Network operators investigating new solutions lower their costs address usability issues. Embedded SIM cards with remote provisioning capability one of the most promising solutions. GSMA, leading consortium on network standards, has proposed specification for an embedded card, called eUICC. The describes eUICC architecture mechanism. Embodiments this have potential disrupt telecommunications market:...

10.48550/arxiv.1906.02254 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Election systems must ensure that representatives are chosen by voters. Moreover, each voter should have equal influence. Traditionally, this has been achieved permitting voters to cast at most one ballot. More recently, tallying the last ballot voter. We show is not Helios election system, because an adversary can cause a other than voter's be tallied. we how choose contents of such ballot, thus unduly influence selection representatives.

10.48550/arxiv.1612.04099 preprint EN other-oa arXiv (Cornell University) 2016-01-01

Tatarstan : a Paradigm for the Old Autonomous Regions of Russia, by Maxime Meyer This article deals with Russia's relations its former autonomous régions, which now aspire to independence. Tatarstan, most powerful, strongest tendencies in this direction, is used here as an example demonstrate problems. The author analyses political situation and forces at work republic.

10.3406/polit.1992.4096 article EN Politique étrangère 1992-01-01
Coming Soon ...