Search Results for author: Jérôme Rony

Found 13 papers, 13 papers with code

Proximal Splitting Adversarial Attack for Semantic Segmentation

1 code implementation CVPR 2023 Jérôme Rony, Jean-Christophe Pesquet, Ismail Ben Ayed

Classification has been the focal point of research on adversarial attacks, but only a few works investigate methods suited to denser prediction tasks, such as semantic segmentation.

Adversarial Attack Segmentation +1

Class Adaptive Network Calibration

1 code implementation CVPR 2023 Bingyuan Liu, Jérôme Rony, Adrian Galdran, Jose Dolz, Ismail Ben Ayed

Comprehensive evaluation and multiple comparisons on a variety of benchmarks, including standard and long-tailed image classification, semantic segmentation, and text classification, demonstrate the superiority of the proposed method.

Image Classification Semantic Segmentation +2

Proximal Splitting Adversarial Attacks for Semantic Segmentation

1 code implementation14 Jun 2022 Jérôme Rony, Jean-Christophe Pesquet, Ismail Ben Ayed

Classification has been the focal point of research on adversarial attacks, but only a few works investigate methods suited to denser prediction tasks, such as semantic segmentation.

Adversarial Attack Segmentation +1

Mutual-Information Based Few-Shot Classification

3 code implementations23 Jun 2021 Malik Boudiaf, Ziko Imtiaz Masud, Jérôme Rony, Jose Dolz, Ismail Ben Ayed, Pablo Piantanida

We motivate our transductive loss by deriving a formal relation between the classification accuracy and mutual-information maximization.

Benchmarking Classification +1

Augmented Lagrangian Adversarial Attacks

2 code implementations ICCV 2021 Jérôme Rony, Eric Granger, Marco Pedersoli, Ismail Ben Ayed

Our attack enjoys the generality of penalty methods and the computational efficiency of distance-customized algorithms, and can be readily used for a wide set of distances.

Adversarial Attack Computational Efficiency

Deep Interpretable Classification and Weakly-Supervised Segmentation of Histology Images via Max-Min Uncertainty

2 code implementations14 Nov 2020 Soufiane Belharbi, Jérôme Rony, Jose Dolz, Ismail Ben Ayed, Luke McCaffrey, Eric Granger

We propose novel regularization terms, which enable the model to seek both non-discriminative and discriminative regions, while discouraging unbalanced segmentations.

General Classification Weakly-supervised Learning +1

A unifying mutual information view of metric learning: cross-entropy vs. pairwise losses

1 code implementation ECCV 2020 Malik Boudiaf, Jérôme Rony, Imtiaz Masud Ziko, Eric Granger, Marco Pedersoli, Pablo Piantanida, Ismail Ben Ayed

Second, we show that, more generally, minimizing the cross-entropy is actually equivalent to maximizing the mutual information, to which we connect several well-known pairwise losses.

Ranked #12 on Metric Learning on CARS196 (using extra training data)

Metric Learning

Deep Weakly-Supervised Learning Methods for Classification and Localization in Histology Images: A Survey

1 code implementation8 Sep 2019 Jérôme Rony, Soufiane Belharbi, Jose Dolz, Ismail Ben Ayed, Luke McCaffrey, Eric Granger

Four key challenges are identified for the application of deep WSOL methods in histology -- under/over activation of CAMs, sensitivity to thresholding, and model selection.

General Classification Model Selection +2

Min-max Entropy for Weakly Supervised Pointwise Localization

1 code implementation25 Jul 2019 Soufiane Belharbi, Jérôme Rony, Jose Dolz, Ismail Ben Ayed, Luke McCaffrey, Eric Granger

Pointwise localization allows more precise localization and accurate interpretability, compared to bounding box, in applications where objects are highly unstructured such as in medical domain.

Weakly-Supervised Object Localization

Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses

5 code implementations23 Nov 2018 Jérôme Rony, Luiz G. Hafemann, Luiz S. Oliveira, Ismail Ben Ayed, Robert Sabourin, Eric Granger

Research on adversarial examples in computer vision tasks has shown that small, often imperceptible changes to an image can induce misclassification, which has security implications for a wide range of image processing systems.

Cannot find the paper you are looking for? You can Submit a new open access paper.