Cordy, Maxime

14 publications

ECML-PKDD 2025 KCLNet: Physics-Informed Power Flow Prediction via Constraints Projections Pantelis Dogoulis, Karim Tit, Maxime Cordy
ECML-PKDD 2025 Leveraging External Factors in Household-Level Electrical Consumption Forecasting Using Hypernetworks Fabien Bernier, Maxime Cordy, Yves Le Traon
NeurIPS 2024 Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data Thibault Simonetto, Salah Ghamizi, Maxime Cordy
ICLR 2024 How Realistic Is Your Synthetic Data? Constraining Deep Generative Models for Tabular Data Mihaela C Stoian, Salijona Dyrmishi, Maxime Cordy, Thomas Lukasiewicz, Eleonora Giunchiglia
ICMLW 2024 Robustness Analysis of AI Models in Critical Energy Systems Pantelis Dogoulis, Matthieu Jimenez, Maxime Cordy, Salah Ghamizi, Yves Le Traon
NeurIPS 2024 TabularBench: Benchmarking Adversarial Robustness for Tabular Deep Learning in Real-World Use-Cases Thibault Simonetto, Salah Ghamizi, Maxime Cordy
ICMLW 2024 Towards Adaptive Attacks on Constrained Tabular Machine Learning Thibault Simonetto, Salah Ghamizi, Maxime Cordy
ICML 2023 GAT: Guided Adversarial Training with Pareto-Optimal Auxiliary Tasks Salah Ghamizi, Jingfeng Zhang, Maxime Cordy, Mike Papadakis, Masashi Sugiyama, Yves Le Traon
IJCAI 2022 A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space Thibault Simonetto, Salijona Dyrmishi, Salah Ghamizi, Maxime Cordy, Yves Le Traon
AAAI 2022 Adversarial Robustness in Multi-Task Learning: Promises and Illusions Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon
UAI 2022 Efficient and Transferable Adversarial Examples from Bayesian Neural Networks Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen
NeurIPSW 2022 Faster and Cheaper Energy Demand Forecasting at Scale Fabien Bernier, Matthieu Jimenez, Maxime Cordy, Yves Le Traon
ECCV 2022 LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen
ICCVW 2021 Evasion Attack STeganography: Turning Vulnerability of Machine Learning to Adversarial Attacks into a Real-World Application Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon