Teddy Furon
Researcher @ Inria
The task of discerning between generated and natural texts is increasing...
The transferability of adversarial examples is a key issue in the securi...
Generative image modeling enables a wide range of applications but raise...
It is crucial to protect the intellectual property rights of DNN models ...
Image copy detection and retrieval from large databases leverage two
com...
Recent advances in the fingerprinting of deep neural networks detect
ins...
Protecting the Intellectual Property rights of DNN models is of primary
...
In some face recognition applications, we are interested to verify wheth...
Randomized smoothing is a recent and celebrated solution to certify the
...
We revisit watermarking techniques based on pre-trained deep networks, i...
Many defenses have emerged with the development of adversarial attacks.
...
Machine learning classifiers are critically prone to evasion attacks.
Ad...
This paper explores the connection between steganography and adversarial...
This document proposes an alternative proof of the result contained in
a...
This paper presents a DNN bottleneck reinforcement scheme to alleviate t...
This paper proposes a framework for group membership protocols preventin...
Group membership verification checks if a biometric trait corresponds to...
Adversarial examples of deep neural networks are receiving ever increasi...
When convoking privacy, group membership verification checks if a biomet...
This paper investigates the visual quality of the adversarial examples.
...
This paper proposes a group membership verification protocol preventing ...
State of the art image retrieval performance is achieved with CNN featur...
Despite the success of deep learning on representing images for particul...
Query expansion is a popular method to improve the quality of image retr...
Part-based image classification consists in representing categories by s...
We study an indexing architecture to store and search in a database of
h...
Image search systems based on local descriptors typically achieve orient...
This paper proposes a binarization scheme for vectors of high dimension ...
The Good is Blondie, a wandering gunman with a strong personal sense of
...