no code implementations • 1 Aug 2022 • Stephan J. Garbin, Marek Kowalski, Virginia Estellers, Stanislaw Szymanowicz, Shideh Rezaeifar, Jingjing Shen, Matthew Johnson, Julien Valentin
The recent increase in popularity of volumetric representations for scene reconstruction and novel view synthesis has put renewed focus on animating volumetric content at high visual quality and in real-time.
no code implementations • 11 Jun 2021 • Shideh Rezaeifar, Robert Dadashi, Nino Vieillard, Léonard Hussenot, Olivier Bachem, Olivier Pietquin, Matthieu Geist
This is the converse of exploration in RL, which favors such actions.
no code implementations • ICLR Workshop SSL-RL 2021 • Robert Dadashi, Shideh Rezaeifar, Nino Vieillard, Léonard Hussenot, Olivier Pietquin, Matthieu Geist
In the presence of function approximation, and under the assumption of limited coverage of the state-action space of the environment, it is necessary to enforce the policy to visit state-action pairs close to the support of logged transitions.
no code implementations • 2 Dec 2019 • Slava Voloshynovskiy, Mouad Kondah, Shideh Rezaeifar, Olga Taran, Taras Holotyak, Danilo Jimenez Rezende
In particular, we present a new interpretation of VAE family based on the IB framework using a direct decomposition of mutual information terms and show some interesting connections to existing methods such as VAE [2; 3], beta-VAE [11], AAE [12], InfoVAE [5] and VAE/GAN [13].
1 code implementation • 13 Sep 2019 • Sohrab Ferdowsi, Maurits Diephuis, Shideh Rezaeifar, Slava Voloshynovskiy
We make a minimal, but very effective alteration to the VAE model.
no code implementations • 14 May 2019 • Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy
The robustness of the system is achieved by a specially designed key based randomization.
no code implementations • 8 May 2019 • Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy
In this paper, we address the problem of data reconstruction from privacy-protected templates, based on recent concept of sparse ternary coding with ambiguization (STCA).
1 code implementation • CVPR 2019 • Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy
The vulnerability of machine learning systems to adversarial attacks questions their usage in many applications.
1 code implementation • 10 Sep 2018 • Shideh Rezaeifar, Olga Taran, Slava Voloshynovskiy
We also introduce a criterion based on Kullback-Leibler divergence to reject doubtful examples.
3 code implementations • 5 Sep 2018 • Olga Taran, Shideh Rezaeifar, Slava Voloshynovskiy
The majority of the proposed existing adversarial attacks are based on the differentiability of the DNN cost function. Defence strategies are mostly based on machine learning and signal processing principles that either try to detect-reject or filter out the adversarial perturbations and completely neglect the classical cryptographic component in the defence.