1 code implementation • 17 Nov 2021 • Paul Jacob, Éloi Zablocki, Hédi Ben-Younes, Mickaël Chen, Patrick Pérez, Matthieu Cord
In this work, we address the problem of producing counterfactual explanations for high-quality images and complex scenes.
no code implementations • 26 Oct 2017 • Brian Lee, Roman Vanickis, Franklin Rogelio, Paul Jacob
As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT), enterprises are moving away from traditional perimeter based security models toward so called zero trust networking (ZTN) models that treat both the intranet and Internet as equally untrustworthy.
Cryptography and Security