research.mangaki.frResearch @ Mangaki · Recommandation d'anime et de mangas

research.mangaki.fr Profile

Research.mangaki.fr is a subdomain of Mangaki.fr, which was created on 2014-10-21,making it 10 years ago.

Description:Nous cherchons à faire émerger par les algorithmes des pépites de la culture japonaise. Ce blog permet de rendre compte de nos...

Discover research.mangaki.fr website stats, rating, details and status online.Use our online tools to find owner and admin contact info. Find out where is server located.Read and write reviews or vote to improve it ranking. Check alliedvsaxis duplicates with related css, domain relations, most used words, social networks references. Go to regular site

research.mangaki.fr Information

HomePage size: 42.385 KB
Page Load Time: 0.363222 Seconds
Website IP Address: 185.199.110.153

research.mangaki.fr Similar Website

Gogoanime - Watch anime online, English anime online | Gogo Anime
ww4.gogoanime2.org
Spotify Research - Spotify’s official research blog : Spotify Research
research.atspotify.com
9anime - Watch Anime Online, Watch English Anime Online Subbed
ww.9animes.org
Anime-Sharing Lossless | Presenting the best in Anime and Eroge OSTs
koe.anime-sharing.com
Watch Drama anime online Drama Anime List - Animesmashnet
www4.animesmash.net
Dubbed Anime | Watch Anime Online
ww3.dubbedanime.net
Gogoanime - Watch Anime Online, English Anime Online HD ✔️
www3.gogoanimes.fi
AnimeTVN | ANIME HAY | ANIME TOP | PHIM ANIME | XEM ANIME ONLINE | ANIME VIETSUB | ANIME HD ONLINE
m.animetvn.com
Neko Kyou's Anime Blog » OSiRiS ANiMe
anime.osiristeam.net
Ler Online Mangás Livre - Nine Manga
br.ninemanga.com
RyuAnime: Dubbed Anime / Subbed Anime - Watch Anime Online
www1.ryuanime.com
Ayumilove Anime | Pick Anime By Season, Genre, Studio or Recommendation
anime.ayumilove.net
pin.anime.com | Your Anime Visual Discovery Tool
pin.anime.com
Anime Merch & Figures‎ | Anime Shop | Crunchyroll
store.crunchyroll.com.au
Gogoanime - Watch anime online, English anime online
ww2.gogoanime.com.co

research.mangaki.fr Httpheader

Connection: keep-alive
Content-Length: 35228
Server: GitHub.com
Content-Type: text/html; charset=utf-8
Last-Modified: Fri, 25 Feb 2022 20:03:01 GMT
Access-Control-Allow-Origin: *
ETag: "621935f5-899c"
expires: Mon, 13 May 2024 15:51:19 GMT
Cache-Control: max-age=600
x-proxy-cache: MISS
X-GitHub-Request-Id: 1186:E748E:149AB56:156DA24:6642349F
Accept-Ranges: bytes
Age: 0
Date: Mon, 13 May 2024 15:41:19 GMT
Via: 1.1 varnish
X-Served-By: cache-bur-kbur8200155-BUR
X-Cache: MISS
X-Cache-Hits: 0
X-Timer: S1715614879.378653,VS0,VE232
Vary: Accept-Encoding
X-Fastly-Request-ID: 0b036ad7862396a6a52a5b060e7d7ddf6c76d55d

research.mangaki.fr Meta Info

content="IE=edge" http-equiv="X-UA-Compatible"/
content="text/html; charset=utf-8" http-equiv="content-type"/
content="Research @ Mangaki · Recommandation d'anime et de mangas" property="og:title"
content="article" property="og:type"
content="http://research.mangaki.fr/" property="og:url"/
content="http://research.mangaki.fr/public/img/ratings.png" property="og:image"/
content="Nous cherchons à faire émerger par les algorithmes des pépites de la culture japonaise. Ce blog permet de rendre compte de nos découvertes." property="og:description"/
content="Nous cherchons à faire émerger par les algorithmes des pépites de la culture japonaise. Ce blog permet de rendre compte de nos découvertes." name="description"/
content="summary_large_image" name="twitter:card"/
content="@mangakifr" name="twitter:site"/
content="Research @ Mangaki · Recommandation d'anime et de mangas" name="twitter:title"/
content="Nous cherchons à faire émerger par les algorithmes des pépites de la culture japonaise. Ce blog permet de rendre compte de nos découvertes." name="twitter:description"/
content="http://research.mangaki.fr/public/img/ratings.png" name="twitter:image"/
content="width=device-width, initial-scale=1.0, maximum-scale=1" name="viewport"/

research.mangaki.fr Ip Information

Ip Country: United States
Latitude: 34.0544
Longitude: -118.244

research.mangaki.fr Html To Plain Text

Nous cherchons à faire émerger par les algorithmes des pépites de la culture japonaise. Ce blog permet de rendre compte de nos découvertes. Testez Mangaki ou forkez-nous . Follow @mangakifr Accueil Notre équipe Archives Bibliography Mangaki sur GitHub © 2022 Mangaki.fr Research @ Mangaki Recommandation d’anime et de mangas Our video: Deep Learning for Anime & Manga @ POSS 2019 [slides] . Comment coder un système de recommandation en Python , LinuxMag. Our research article BALSE was accepted at MANPU 2017 in Kyoto. The Mangaki Data Challenge is over. See the full results. Try Mangaki.fr or see what’s new ! Read our research article BALSE.pdf Follow @mangakifr Wanna join? Contact us or say hi on Twitter ! How To Securely Share Information 12 Feb 2022 We are writing a recommender system. Let’s give a typical use case. Meet Alice, she’ll be our reference user. She rates anime, telling us if she liked them or not. We call the data we gathered here Alice’s preferences . There are of course other persons, let’s call them the Bobs. The Bobs do the same as Alice, therefore we get a lot of preference data. Based on this data, we train a machine learning model that guesses what anime Alice may like. Then, we feed back the info. Alice now has a new anime list that she’s sure she will love. To make this design work, wee need to gather data that we can train models on. Ideally, this data would be the preferences of each user, that is the rating they gave to each movie (if they rated any movie). But we also value privacy, and we don’t want to leak our users’ information. Our goal here is to provide recommendation to our users without leaking their preferences to anyone, including ourselves. We propose a solution based on this paper written by Bonawitz et. al. . The problem our reference paper solves The goal of the work of Bonawitz et. al. is to train machine learning models on users’ machines in a privacy-preserving way. Each user has their own data that they do not want to reveal, but the model has to fit that data. The example they give is that of word guessing: users want to have a model that guesses the next word they are going to type, so that they can write faster, but they do not want anyone to know exactly what they are typing. The method is designed for gradient descent : a model is trained iteratively by slowly shifting its parameters in a direction that improves its accuracy. That direction” is the gradient that is computed at each step of the training. The computation is distributed on users’ devices, and a central server supervises the process. For each step, each user computes their gradient, then everyone agrees on the mean value of all the individual gradients, and the server uses the result to move to the next step. The paper of Bonawitz et. al. explains how to compute the mean of the gradients without anyone – not even the server – knowing the others’ gradients. It even goes a bit further than that: users can drop at any time during the training process, and the model will still be trained as long as a certain amount of users are still connected (this relies on secret sharing ). Using this to our advantage What out reference paper really explains is how to securely aggregate information as long as the information can be encoded as a vector. But in computer science, everything can be seen as a vector of bits, so we can transform this method in a method to anonymously collect messages from our users. To make an analogy, the aggregation process is like having a piece of paper and some magic ink that it is invisible until it is heated. People can write whatever they want on the paper and then reveal the result after they all finished to write. Because they use magic ink that is invisible until the paper is heated, they can’t read what the others wrote. Here, we want people to write their preferences and then reveal the list of all preferences without being able to guess the participants’ preferences. Concretely, let’s say we have four users, Alice, Beatrice, Christine and Dominique. Let’s say their preferences can be encoded over 4 bits 1 , and that the encoded preference is never null. Alice and her friends will build an 8 bits long message that will contain their preferences. We use 16 bits because the final message will contain four slots”, one for each individual message. Alice’s preferences are \({\mathtt{1001}}\), Beatrice’s are \({\mathtt{0110}}\), Christine prefers \({\mathtt{1010}}\) and Dominique votes \({\mathtt{0101}}\) (we can use any other non-null encoding). Alice, Beatrice, Christine and Dominique just need to know where to put their individual preferences in the final vector. Let’s say Alice will take the first 4 bits, Beatrice will take the next 4 bits, and so on. The final message will then be \({\mathtt{1001\,0110\,1010\,0101}}\), i.e. , with proper notation, \((\mathtt{1001} \mathtt{} 12) \wedge (\mathtt{0110} \mathtt{} 8) \wedge (\mathtt{1010} \mathtt{} 4) \wedge \mathtt{0101}\). Using the technique that is explained by Bonawitz et. al. , we can compute this securely 2 . We only have one problem: how do Alice, Beatrice, Christine and Dominique know in which slot to put their preferences ? To continue the magic ink analogy, when people are writing, they don’t know if they are writing at a place where someone else already wrote. The difficulty is that they need a way to find somewhere to write, without explicitly agreeing on which part of the paper belongs to whom since knowing where people write implies knowing what they write. So how do people know where to write without colliding with someone else’s data ? The solution is simple: they don’t! They randomly choose a place in the final vector. If two of them choose the same place, we’ll know, because the final vector will not make sense (one of the two four will be null). At the end, the preferences were randomly put in the final vector and no information on Alice’s, Beatrice’s, Christine’s or Dominique’s preferences has been leaked during the aggregation process. Therefore, when someone reads the final vector, they can’t know which encoded preference belongs to who: the result can be safely published without compromising the users’ privacy. Mathematically, we were just writing about vectors over the two element field. More detail The previous example is, of course, degenerate, because there are only four users, and our strategy to find slots for each user is too expensive. In practice, there are many users, therefore the only information one can ever have about the resulting dataset is that each collected preference vector belongs to some user that contributed, but no more information than that can be gathered, even by the server (except if there are many colluding users). The problem of privately finding a slot for each user is solved by starting with simpler rounds where users try to take a random slot, represented by a bit in a giant vector, and the users agree when they see there has been no collision. There is another problem: that of malevolent user trying to write everywhere (similar to ballot stuffing). This is sorted out by appending individual messages with hashes, so that when two messages are written in the same slot the hashed don’t match anymore. The protocol is also made more secure by requiring key exchanges and signed transactions, so that users know that the other users they see are not dummies controlled by a malicious server. These cryptographic schemes come from libraries that are essentially built on top of curve25519 cryptography. The protocol also uses Shamir Secret Sharing, so that if some user drops from the exchange the aggregation process can continue, as long as there are enough remaining users. We also use ChaCha for cryptographically secure random data generation. The libraries we used are: sss-rs x25519-dalek libsodium rand chacha Extra: An overview of the reference paper’s idea To put the idea more formally, we have parties \(\mathcal{U}_1,...

research.mangaki.fr Whois

domain: mangaki.fr status: ACTIVE eppstatus: active hold: NO holder-c: ANO00-FRNIC admin-c: ANO00-FRNIC tech-c: OVH5-FRNIC registrar: OVH Expiry Date: 2024-10-21T17:12:37Z created: 2014-10-21T17:12:37Z last-update: 2023-11-30T23:04:44.447444Z source: FRNIC nserver: dns110.ovh.net nserver: ns110.ovh.net source: FRNIC key1-tag: 51694 key1-algo: 8 [RSASHA256] key1-dgst-t: 2 [SHA256] key1-dgst: C75637A7E1FEFCB68F18220811917131C54C98532037389AD35EAF7BC2C10BB8 source: FRNIC registrar: OVH address: 2 Rue Kellermann address: 59100 ROUBAIX country: FR phone: +33.899701761 fax-no: +33.320200958 e-mail: support@ovh.net website: http://www.ovh.com anonymous: No registered: 1999-10-18T00:00:00Z source: FRNIC nic-hdl: OVH5-FRNIC type: ORGANIZATION contact: OVH NET address: OVH address: 140, quai du Sartel address: 59100 Roubaix country: FR phone: +33.899701761 e-mail: tech@ovh.net registrar: OVH anonymous: NO obsoleted: NO eppstatus: associated eppstatus: active eligstatus: not identified reachstatus: not identified source: FRNIC nic-hdl: ANO00-FRNIC type: PERSON contact: Ano Nymous registrar: OVH anonymous: YES obsoleted: NO eppstatus: associated eppstatus: active eligstatus: not identified reachstatus: not identified source: FRNIC nic-hdl: ANO00-FRNIC type: PERSON contact: Ano Nymous registrar: OVH anonymous: YES obsoleted: NO eppstatus: associated eppstatus: active eligstatus: not identified reachstatus: not identified source: FRNIC >>> Last update of WHOIS database: 2024-05-17T19:54:16.52529Z <<<