Frédéric Cérou’s research while affiliated with French National Centre for Scientific Research and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (48)


Figure 1: Detection region for zero-bit watermarking.
Figure 2: Theoretical and empirical relative standard deviations with 100 simulations.
Figure 3: 95% confidence intervals for p = 4.704 · 10 −11 with 100 simulations and N = 500 particles.
Figure 4: Theoretical and empirical relative standard deviations with 100 simulations for an example of Tardos code.
Figure 5: Distribution of the number of steps.

+1

Sequential Monte Carlo for rare event estimation
  • Article
  • Full-text available

May 2012

·

406 Reads

·

235 Citations

Statistics and Computing

Frédéric Cérou

·

·

·

Arnaud Guyader

This paper discusses a novel strategy for simulating rare events and an associated Monte Carlo estimation of tail probabilities. Our method uses a system of interacting particles and exploits a Feynman-Kac representation of that system to analyze their fluctuations. Our precise analysis of the variance of a standard multilevel splitting algorithm reveals an opportunity for improvement. This leads to a novel method that relies on adaptive levels and produces, in the limit of an idealized version of the algorithm, estimates with optimal variance. The motivation for this theoretical work comes from problems occurring in watermarking and fingerprinting of digital contents, which represents a new field of applications of rare event simulation techniques. Some numerical results show performance close to the idealized version of our technique for these practical applications. KeywordsRare event–Sequential importance sampling–Feynman-Kac formula–Metropolis-Hastings–Fingerprinting–Watermarking

Download

Table 3 : Performance of Enhanced Cloner Algorithm [16] for SAT 20 × 80 model.
On the Use of Smoothing to Improve the Performance of the Splitting Method

October 2011

·

64 Reads

·

6 Citations

Stochastic Models

We present an enhanced version of the splitting method, called the smoothed splitting method (SSM), for counting associated with complex sets, such as the set defined by the constraints of an integer program and in particular for counting the number of satisfiability assignments. Like the conventional splitting algorithms, ours uses a sequential sampling plan to decompose a “difficult” problem into a sequence of “easy” ones. The main difference between SSM and splitting is that it works with an auxiliary sequence of continuous sets instead of the original discrete ones. The rationale of doing so is that continuous sets are easier to handle. We show that while the proposed method and its standard splitting counterpart are similar in their CPU time and variability, the former is more robust and more flexible than the latter.


A nonasymptotic theorem for unnormalized Feynman–Kac particle models

August 2011

·

85 Reads

·

91 Citations

Annales de l Institut Henri Poincaré Probabilités et Statistiques

We present a nonasymptotic theorem for interacting particle approximations of unnormalized Feynman–Kac models. We provide an original stochastic analysis-based on Feynman–Kac semigroup techniques combined with recently developed coa-lescent tree-based functional representations of particle block distributions. We present some regularity conditions under which the L 2 -relative error of these weighted particle measures grows linearly with respect to the time horizon yielding what seems to be the first results of this type for this class of unnormalized models. We also illustrate these results in the context of particle absorption models, with a special interest in rare event analysis. Résumé. Nous présentons un théorème non asymptotique pour les approximation par systèmes de particules en interaction des modèles de Feynman–Kac non normalisés. Nous introduisons une analyse stochastique originale basée sur des techniques de semigroupes de Feynman–Kac, associées avec les représentation, récemment proposées, des distributions de blocks de particules, en terme de développement en arbre de coalescence. Nous présentons des conditions de régularité sous lesquelles l'erreur relative L 2 de ces mesures particulaires pondérées croît linéairement par rapport 'a l'horizon temporel, conduisant 'a ce qui semble être le premier résultat de ce type pour cette classe de modèles non normalisés. Nous illustrons ces résultats dans le contexte des mesures statiques de Boltzmann–Gibbs et des distributions restreintes, avec un intéret partuculier pour les événements rares.


A multiple replica approach to simulate reactive trajectories

February 2011

·

105 Reads

·

92 Citations

A method to generate reactive trajectories, namely equilibrium trajectories leaving a metastable state and ending in another one is proposed. The algorithm is based on simulating in parallel many copies of the system, and selecting the replicas which have reached the highest values along a chosen one-dimensional reaction coordinate. This reaction coordinate does not need to precisely describe all the metastabilities of the system for the method to give reliable results. An extension of the algorithm to compute transition times from one metastable state to another one is also presented. We demonstrate the interest of the method on two simple cases: a one-dimensional two-well potential and a two-dimensional potential exhibiting two channels to pass from one metastable state to another one.



Rates of Convergence of the Functional -Nearest Neighbor Estimate

May 2010

·

51 Reads

·

72 Citations

IEEE Transactions on Information Theory

Let F be a separable Banach space, and let (X, Y) be a random pair taking values in F × R. Motivated by a broad range of potential applications, we investigate rates of convergence of the k-nearest neighbor estimate rn (x) of the regression function r(x) = E[Y|X = x], based on n independent copies of the pair (X, Y). Using compact embedding theory, we present explicit and general finite sample bounds on the expected squared difference E[rn(X) - r(X)]2, and particularize our results to classical function spaces such as Sobolev spaces, Besov spaces, and reproducing kernel Hilbert spaces.


Fig. 1. Structure of a watermark detector.  
Fig. 2. Filtering rate for 10 estimator runs, µ ∈ {0.7, 0.01}.  
Fig. 9. Error exponents experimental measurements. E f n against E f a . Solid line: Theoretical curves (without noise). Dash-dot line: Experimental curve (without noise). Dotted line: Experimental curve (with AGWN σ 2 N = 10.P e ).  
Fig. 8. Confidence intervals are smaller as n increases. Percentage of estimations over 1,000 runs for p = 3/4.  
Estimating the probability fo false alarm for a zero-bit watermarking technique

August 2009

·

110 Reads

·

8 Citations

Assessing that a probability of false alarm is below a given significance level is a crucial issue in watermarking. We propose an iterative and self-adapting algorithm which estimates very low probabilities of error. Some experimental investigations validates its performance for a rare detection scenario where there exists a close form formula of the probability of false alarm. Our algorithm appears to be much quicker and more accurate than a classical Monte Carlo estimator. It even allows the experimental measurement of error exponents.


Fig. 1. Mappings of the false positive probability (blue) and false negative probability to the power 4/c (red) against the threshold. m = 600, c ∈ {3, 4, 5}. The score of a particle is the max of the colluders scores. The collusion is the worst as given in (8).
Fig. 2. Code length needed to obtain 2 = c/4 1 for c = 3, 4 or 5 colluders (WCA), against function c 2 log −1 1 . The probability 2 has been estimated with the mean of the colluders' scores (solid lines) or their maximum (dotted lines). Aforementioned bounds appear in black: Tardos K = 50 (dotted line), Skoric et al. K = 2π 2 (solid line).  
Fig. 3. Code length needed to obtain 2 = c/4 1  
Fig. 4. Code length needed to obtain 2 = c/4 1  
Estimating the Minimal Length of Tardos Code

June 2009

·

83 Reads

·

32 Citations

Lecture Notes in Computer Science

This paper estimates the minimal length of a binary proba- bilistic traitor tracing code. We consider the code construction proposed by G. Tardos in 2003, with the symmetric accusation function as im- proved by B. Skoric et al. The length estimation is based on two pillars. First, we consider the Worst Case Attack that a group of c colluders can lead. This attack minimizes the mutual information between the code sequence of a colluder and the pirated sequence. Second, an algorithm pertaining to the field of rare event analysis is presented in order to es- timate the probabilities of error: the probability that an innocent user is framed, and the probabilities that all colluders are missed. Therefore, for a given collusion size, we are able to estimate the minimal length of the code satisfying some error probabilities constraints. This estimation is far lower than the known lower bounds.


Figure 1: Detection region. 
Figure 2: Relative bias. 
Figure 3: Normalized standard deviation. 
Rare event simulation for a static distribution

January 2009

·

181 Reads

·

25 Citations

This paper discusses the rare event simulation for a fixed probability law. The motivation comes from problems occurring in watermarking and fingerprinting of digital contents, which is a new application of rare event simulation techniques. We provide two versions of our algorithm, and discuss the convergence properties and implementation issues. A discussion on recent related works is also provided. Finally, we give some numerical results in watermarking context.


On the Rate of Convergence of the Functional k-NN Estimates

January 2009

·

13 Reads

Let F\mathcal F be a general separable metric space and denote by \mathcal D_n=\{(\bX_1,Y_1), \hdots, (\bX_n,Y_n)\} independent and identically distributed F×R\mathcal F\times \mathbb R-valued random variables with the same distribution as a generic pair (\bX, Y). In the regression function estimation problem, the goal is to estimate, for fixed \bx \in \mathcal F, the regression function r(\bx)=\mathbb E[Y|\bX=\bx] using the data Dn\mathcal D_n. Motivated by a broad range of potential applications, we propose, in the present contribution, to investigate the properties of the so-called knk_n-nearest neighbor regression estimate. We present explicit general finite sample upper bounds, and particularize our results to important function spaces, such as reproducing kernel Hilbert spaces, Sobolev spaces or Besov spaces.


Citations (35)


... Synergistic use of both methods is adopted by NOAA's operational algorithm for AMV production. It is worth noting that sampling approaches (Héas et al. 2023a) for estimating AMVs together with their errors are important for quantitative applications such as improving forecasts through assimilating these winds into NWP models, and such approaches should be further explored and applied to wind estimation. ...

Reference:

Tracking Atmospheric Motions for Obtaining Wind Estimates Using Satellite Observations—From 2D to 3D
Chilled sampling for uncertainty quantification: a motivation from a meteorological inverse problem

... In [7], a similar formula is given for the large sample size variance of all estimators, see Corollary 2.8 and Theorem 2.13. The extension to the case k > 1 under the same assumptions, where k is fixed and N → +∞ can be obtained using the results of [10]. ...

On synchronized Fleming–Viot particle systems
  • Citing Article
  • March 2021

Theory of Probability and Mathematical Statistics

... Estimating the probabilities of rare but impactful events, an important problem throughout science and engineering, is usually done through -generally expensive -Monte Carlo methods such as importance sampling [1] or importance splitting methods [2,3]. A simple alternative approach, which is principled and sampling-free but only asymptotically exact under certain assumptions, consists of using a Laplace approximation, see e.g. ...

Adaptive Multilevel Splitting: Historical Perspective and Recent Results
  • Citing Article
  • April 2019

... = τ {ξ l} (x), the estimator of the rare event probability associated with level l, where I N l is the random number of iterations required so that all clones have reached the target set {ξ l}. The estimator p N l,ams (as well as other nonnormalized estimators) is unbiased E p N l,ams = p ε l (see [7,2]). The empirical distribution of clones at iteration I = Law(X ε | τ l (X ε ) < τ A (X ε )). ...

On the Asymptotic Normality of Adaptive Multilevel Splitting
  • Citing Article
  • April 2018

SIAM/ASA Journal on Uncertainty Quantification

... Moreover, we only consider soft killing at some continuous rate, and no hard killing which would correspond to the case where T is the escape time from some sub-domain (see e.g. [4,21]). Finally, as will be seen below, as far as the long-time behaviour of the process is concerned we will work in a perturbative regime, namely we will assume that the variations of λ are small with respect to the mixing time of the diffusion (1.1) (while λ ∞ itself is not required to be small). ...

A Central Limit Theorem for Fleming-Viot Particle Systems with Hard Killing
  • Citing Article
  • September 2017

... For both standard and reduced estimates (ARMS and ART's IS estimate), we observe approximately a unitary negative slope (on a logarithmic scale) of the variance as a function of cost, implying that the product of variance and cost is constant. Such a behavior suggests asymptotic normality of the proposed IS estimate, as it has been demonstrated for AMS [9]. ...

Fluctuation analysis of adaptive multilevel splitting
  • Citing Article
  • December 2016

... Notably, besides [IZ21], we are not aware of any other theoretical work on MCMC methods for Bernoulli group testing. On the other hand, multiple applied papers have used MCMC methods for group testing [STR03, KST96,FGC12] and it is the general understanding that their "…empirical performance appears strong in simulations " [AJS19, Section 3.3.1]. To buttress these claims, it is essential to pursue an improved theoretical understanding of MCMC methods for informationtheoretic optimal designs such as Bernoulli group testing, which is the central focus of this work. ...

Decoding Fingerprinting Using the Markov Chain Monte Carlo Method