Submit an internship offer

  1. Reconnaissance de programmes par réseaux de neurones de graphes
    Sid Touati et Christophe Alias (INRIA Sophia Antipolis ou INRIA Lyon)
  2. Formal Verification of Security Protocol
    Charlie Jacomme, Inria Nancy
    2.30, 2.7.2, 2.12.1
  3. Using Model Checking for verifying Nuclear Power Plant Operating Procedures
    Valentin RYCHKOV, Claudia PICOCO, 91120 EDF R&D, Palaiseau
    1.22 Basics of verification, 2.8.2 Cyber-physical systems and their verification
  4. Formal reasoning training example generation for large language models
    Damien Sileo - Lille
    Logic, Planning, Learning
  5. Pairs of square-free arithmetic progressions in infinite words
    Pascal Ochem and Matthieu Rosenfeld - at LIRMM, Montpellier
  6. Numerical Analysis and Optimization of Functional Array Programs
    Thomas Koehler and Eva Darulova – ICube Laboratory, Strasbourg, France or Uppsala University, Sweden
  7. Exploring Accuracy and Performance Trade-offs in Functional Array Programs
    Thomas Koehler and Eva Darulova – ICube Laboratory, Strasbourg, France or Uppsala University, Sweden
  8. Algorithmes d'énumération dans les graphes
    Pierre Bergé and Vincent Limouzy - CLERMONT-FERRAND
    Parameterized algorithms and complexity (2.11.1), Advanced graph theory (2.29.1)
  9. Optimizing Programs with Sketch-Guided Polyhedral Compilation
    Thomas Koehler and Christophe Alias – ICube Laboratory, Strasbourg or LIP Laboratory, Lyon
  10. Génération automatique de clé de détermination pédagogiques
    Simon Castellan (Inria Rennes) ; Agnès Schermann (EcoBio, Univ Rennes 1)
  11. Reproducing brain imaging pipelines to study analytical variability
    Boris Clénet, Camille Maumet, Unité Empenn U1228, INSERM, INRIA, Université Rennes, IRISA, UMR CNRS 6074
  12. Formal modeling of security ceremonies
    FILA Barbara, IRISA, Rennes
  13. Méthodes symboliques pour la bi-déduction dans le contexte de la vérification de protocoles de sécurité
    David Baelde (PR ENS Rennes) et Delaune Stéphanie (DR CNRS) - IRISA (Rennes)
    2.30; 1.33
  14. Analyse formelle de sécurité des protocoles DRM
    Stéphanie Delaune & Joseph Lallemand, IRISA, Rennes
    2.30
  15. Multi-Perspective Reasoning with Standpoint Logic
    Lucia Gomez Alvarez, Inria Centre at the University Grenoble Alpes
  16. Optimization of minimizer-based k-mer partitioning for genomic sequences
    Camille Marchet (CNRS), Florian Ingels - CRIStAL, Lille
  17. Vérification de propriétés sur les graphes temporels - vers un métathéorème
    Nathalie Sznajder, Binh-Minh Bui-Xuan – LIP6, SU UPMC.
  18. Causality-aware temporal graphs with connectivity constraints
    Binh-Minh Bui-Xuan, Marcelo Dias de Amorim – LIP6, SU UPMC.
  19. Reconstruction de mots par requêtes avec poids
    Gwenaël Richomme et Matthieu Rosenfeld
  20. Verification of probabilistic properties for AI
    Eric Goubault and Sylvie Putot - LIX, Palaiseau
  21. Quantified reachability properties for provably explainable AI
    Eric Goubault and Sylvie Putot - LIX, Palaiseau
  22. Modélisation informatique des erreurs de décisions d’un opérateur humain en aviation ou en médecine
    Pr. Frédéric Boulanger (LMF, CentraleSupélec, Université Paris-Saclay) and Pr. Nicolas Sabouret (LISN, Université Paris-Saclay)
    Logical Aspects of Artificial Intelligence,
  23. Verification of Unsafe Code in Rust Programs by Abstract Interpretation
    Antoine Miné - APR, LIP6, Sorbonne Université
    2.6
  24. On Byzantine fault tolerance in dynamic networks
    Binh-Minh Bui-Xuan, Sébastien Tixeuil – LIP6, SU UPMC.
  25. Algorithmic aspects of arithmetic theories with division
    Alessio Mansutti - IMDEA Software Institute
  26. Analysing Petri Nets with Higher Dimensional Automata
    Hugo Bazille, Philippe Schlehuber-Caissier - Telecom SudParis (Courcourrones)
  27. Attaques par canaux auxilliaires en crypto fondée sur les réseaux
    Thomas Ricosset - Thales Gennevilliers
    2.12.1 2.12.2 2.13.1 2.13.2
  28. Optimal stopping theory with predictions
    Spyros Angelopoulos- ILLS, Montreal, Canada
    2-24-1, 2-11
  29. Energy Problems for ω-automata
    Philipp Schlehuber-Caissier, Sven Dziadek - Telecom SudParis
  30. Online storage management with predictions
    Christoph Dürr - Sorbonne University
    2-24-1
  31. Quantum Distributed Algorithms
    Marc-Olivier Renou
    2.18.1, 2.34.1
  32. Local rewrite rules in type theory
    Théo Winterhalter — ENS Paris Saclay
    2.7.1, 2.7.2
  33. Advanced Search Algorithms for Program Synthesis
    Nathanaël Fijalkow, Gabriel Bathie, Bordeaux
  34. Solving diversity problems
    Julien Baste - Université de Lille
  35. Fixed-point implementation of Falcon and FN-DSA
    Thomas Prest - PQShield SAS (Paris, FR)
    2.12.2 - Arithmetic algorithms for cryptology
  36. Implementation security of post-quantum digital signatures
    Antoon Purnal - PQShield (Remote, or Paris, France)
    2.12.2 - Arithmetic algorithms for cryptology
  37. Cryptographic watermarking for preventing deepfakes in media data
    Thomas Prest, Thomas Espitau, Pierre-Yves Strub, Adrian Thillard - PQShield SAS (Paris, France)
    2.12.2 - Arithmetic algorithms for cryptology
  38. Programme slicing pour Catala
    Vincent Botbol, Louis Gesbert, Romain Primet – Paris 1e=3e (INRIA)
    Abstract interpretation; Functional programming and type systems
  39. Data selection and Shapley value in the linear case
    Patrick Loiseau (FairPlay team: Inria Saclay / ENSAE / Criteo)
  40. Matching markets: the role of correlation on efficiency and equity
    Patrick Loiseau (FairPlay team: Inria Saclay / ENSAE / Criteo) and Bary Pradelski (Oxford / CNRS)
  41. Safe Composition of Jasmin & Rust for High-Assurance Cryptography
    Vincent Laporte, Inria Nancy
    2.4, 2.6, 2.36.1
  42. Reasoning over Bounded First-Order Logic Ontologies
    David Carral - Inria Montpellier
  43. Logic for differential privacy of functional programs
    Patrick Baillot - CRIStAL, Lille
    2.2, 2.7.1, 2.3.2
  44. Exploring the functoriality of approximate posteriors for sheaf-structured models
    Grégoire Sergeant-Perthuis, LCQB Sorbonne Université
  45. Kleene Algebra with Tests for probabilistic programs
    Patrick Baillot, Leandro Gomes - CRIStAL, Lille
  46. Reasoning on the execution time of programs with Kleene Algebra with Tests
    Patrick Baillot, Leandro Gomes - CRIStAL, Lille
  47. Semantics and types for synchronous programming with state machines in a multi-periodic setting
    Patrick Baillot, Julien Forget, Sylvain Salvati - CRIStAL, Lille
    2.23.1, 2.4
  48. Validated Numerical Software For Algebraic Curves with Singularities
    Adrien Poteaux and Florent Bréhard - CRIStAL (Lille)
  49. Bijections and counting of decorated planar maps
    Valentin Bonzom - LIGM, Université Gustave Eiffel
  50. Monotonous multi-thread programming
    Dumitru Potop-Butucaru, Jean-Marie Madiot - INRIA Paris
    2-36-1
  51. Incremental maintenance of queries on dynamic trees
    Antoine Amarilli, Charles Paperman, Inria Lille
    1-18
  52. Enumerating simple paths satisfying a regular path query
    Antoine Amarilli, Mikaël Monet, Inria Lille
  53. Compression of large dynamic graphs
    Binh-Minh Bui-Xuan and Mehdi Naima - Sorbonne Université, LIP6
  54. Analyse automatisée de documents pour lutte contre la fraude documentaire F/H
    Guillaume Bernard - MAIF - Niort (g.bernard@maif.fr)
  55. Anomaly Detection in Link Streams
    Maroua Bahri and Mehdi Naima
  56. Inter-Model Explanations for Student Modeling in AI for Education
    marie-Jeanne Lesot & Sebastien Lalle - LIP6, Sorbonne University
  57. Copoints enumeration in graph convexities
    Victor Chepoi, Oscar Defrain & Simon Vilmin, Aix-Marseille Université
    Graphes, combinatoire, complexité
  58. Attaques sur Système de Distributions de Clés Quantiques (QKD)
    Laurent Maingault, Loïc MANGIN - CEA Grenoble
    2-34-2
  59. Innovative Blockchain Internship Program at Nomadic Labs
    Yann Régis-Gianas, Head of Engineering - Paris, France
  60. fine grain analysis of the implementations of classical algorithms and data structures in various contemporary programming languages
    Cyril Nicaud, Pablo Rotondo, LIGM, University Gustave Eiffel, Marne-la-Vallée
    2-10, 2-15
  61. Coalition manipulability of IRV in Impartial Culture
    François Durand, Élie de Panafieu, Nokia Massy
    2-10, 2-15
  62. Proving the equivalence of type and function definitions automatically in Coq
    Frédéric Blanqui - ENS Paris Saclay, Gif-sur-Yvette
    2-07-02,2-07-01
  63. Bridging the gap between a verified library and a proof assistant
    Guillaume Melquiond - Laboratoire Méthodes Formelles, Université Paris Saclay, Inria
    2.7.2, 2.36.1
  64. Vérification formelle des politiques de sécurité pour les protocoles IoT
    Quentin Peyras (IRIT) et Ghada Gharbi (Epita) - IRIT, Toulouse
  65. Towards formally verified configuration languages
    Helene Coullon, Frederic Loulergue - IMT Atlantique Nantes France
  66. Side-Channel Attacks on Elliptic Curve Cryptography
    Victor Lomné - Montpellier, France
  67. Side-Channel Attacks on Post-Quantum Cryptography and Hybridation
    Thomas Roche - NinjaLab - Montpellier, France
  68. Verification for the Varda distributed programming language
    Shapiro, Pagliari @LIP6 (Sorbonne-U, Jussieu)
  69. A Kubernetes-based backend for the Varda distributed programming language
    Shapiro, Pagliari @LIP6 (Sorbonne-U, Jussieu)
    2.17, 2.18.1, 2.03, 1.31
  70. Verification for the Varda distributed programming language
    Shapiro, Pagliari @LIP6 (Sorbonne-U, Jussieu)
    2.04, 2.18.1
  71. Rigorous development of database backends
    Shapiro, @LIP6-Sorbonne-Université
    2.09.2, 2.26.1, 2.36.1, 2.18.1
  72. Computer-Aided-Design of Zero-Waste Garment Patterns
    Adrien Bousseau, Inria Université Côte d'Azur
  73. Ensuring Correctness in Open Systems through Compatibility
    R. Ameur-Boulifa (Sophia-Antipolis) et M. Ouerdini (Toulouse)M
  74. Open Automata meet Session Types
    R. Ameur-Boulifa (Sophia) et L. Henrio (Lyon)
  75. Multi-Agent Reinforcement Learning Implementation
    Benedikt Bollig, Matthias Fuegger, Thomas Nowak, Zhuofan Xu (ENS Paris-Saclay)
  76. On-Line Parameter Estimation in Bioreactors
    Benedikt Bollig, Matthias Fuegger, Thomas Nowak, Mariapia D'Urso
  77. Clock Discipline Algorithm in Coq
    Benjamin Lion, Inria centre de l'université de Rennes
  78. Analyzing Mean Payoff Games Using Sums-of-Squares
    Mateusz Skomra - LAAS-CNRS (Toulouse)
    2.20.1
  79. Robust clustering
    Michaël Poss - Montpellier (LIRMM)
    2.24.1
  80. Traitement d’images spectrales de microscopie électronique assistée par IA appliqué à la classification de météorites.
    Guillaume Tochon (LRE EPITA) in partnership with Institut de Minéralogie, de Physique des Matériaux et de Cosmochimie (IMPMC)
  81. Post-Quantum Threshold Signature Scheme from Code-based Assumptions
    Victor Dyseryn / Duong Hieu Phan - Télécom Paris
    2.12.2, 2.13.2
  82. https://webusers.i3s.unice.fr/~elozes/sujet-stage-printemps-ete-2025.pdf
    Diagrammes de séquences et modèles de cohérence faible
  83. Evaluation of complex queries on large knowledge bases
    Louis Jachiet - Télécom Paris
    2.26.1 2.26.2 2.29.2
  84. Graphical Conditions ensuring Equality between Differential and Mean Stochastic Dynamics
    François Fages, Inria Saclay, Ecole Polytechnique, Francois.Fages@inria.fr
    C2-19
  85. Graphical Conditions ensuring EqGraphical display of biochemical reaction networks based on Petri Net invariants
    François Fages, Inria Saclay, Ecole Polytechnique, Francois.Fages@inria.fr
    C2-19
  86. Modeling single-cell reaction networks with cell-cycle transition kernels
    Jakob Ruess, Inria Saclay, Jakob.Ruess@inria.fr
    2.19
  87. Smoothed Analysis: Bridging Theory and Practice in Dynamic Networks
    Ami Paz. LISN: CNRS & Paris-Saclay University
    2-18-1 Algorithmique distribuée pour les reseaux
  88. Distributed Dynamic Graph Algorithms
    Ami Paz. LISN: CNRS & Paris-Saclay University
    2-18-1 Algorithmique distribuée pour les reseaux
  89. Auditing Practical Privacy Guarantees of Differentially Private Machine Learning Models
    Aurélien Bellet - Inria Montpellier
    Fondements de la confidentialité des données
  90. Formalisation et vérification d’un UIDL formel bigraphique dans Coq (M2 + doctorat)
    Xavier Thirioux (ISAE-Supaero, Toulouse), Celia Picard (ENAC, Toulouse), Cyril Allignol (ENAC, Toulouse)