Search Results for author: Shideh Rezaeifar

Found 10 papers, 4 papers with code

VolTeMorph: Realtime, Controllable and Generalisable Animation of Volumetric Representations

no code implementations1 Aug 2022 Stephan J. Garbin, Marek Kowalski, Virginia Estellers, Stanislaw Szymanowicz, Shideh Rezaeifar, Jingjing Shen, Matthew Johnson, Julien Valentin

The recent increase in popularity of volumetric representations for scene reconstruction and novel view synthesis has put renewed focus on animating volumetric content at high visual quality and in real-time.

Novel View Synthesis

Offline Reinforcement Learning with Pseudometric Learning

no code implementations ICLR Workshop SSL-RL 2021 Robert Dadashi, Shideh Rezaeifar, Nino Vieillard, Léonard Hussenot, Olivier Pietquin, Matthieu Geist

In the presence of function approximation, and under the assumption of limited coverage of the state-action space of the environment, it is necessary to enforce the policy to visit state-action pairs close to the support of logged transitions.

reinforcement-learning Reinforcement Learning +1

Information bottleneck through variational glasses

no code implementations2 Dec 2019 Slava Voloshynovskiy, Mouad Kondah, Shideh Rezaeifar, Olga Taran, Taras Holotyak, Danilo Jimenez Rezende

In particular, we present a new interpretation of VAE family based on the IB framework using a direct decomposition of mutual information terms and show some interesting connections to existing methods such as VAE [2; 3], beta-VAE [11], AAE [12], InfoVAE [5] and VAE/GAN [13].

Novelty Detection

Reconstruction of Privacy-Sensitive Data from Protected Templates

no code implementations8 May 2019 Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

In this paper, we address the problem of data reconstruction from privacy-protected templates, based on recent concept of sparse ternary coding with ambiguization (STCA).

Privacy Preserving Quantization

Defending against adversarial attacks by randomized diversification

1 code implementation CVPR 2019 Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy

The vulnerability of machine learning systems to adversarial attacks questions their usage in many applications.

Bridging machine learning and cryptography in defence against adversarial attacks

3 code implementations5 Sep 2018 Olga Taran, Shideh Rezaeifar, Slava Voloshynovskiy

The majority of the proposed existing adversarial attacks are based on the differentiability of the DNN cost function. Defence strategies are mostly based on machine learning and signal processing principles that either try to detect-reject or filter out the adversarial perturbations and completely neglect the classical cryptographic component in the defence.

BIG-bench Machine Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.