no code implementations • 28 Apr 2022 • Thibault Maho, Teddy Furon, Erwan Le Merrer
We first formally highlight the mismatch between a theoretical certification and the practice of attacks on classifiers.
1 code implementation • 17 Dec 2021 • Pierre Fernandez, Alexandre Sablayrolles, Teddy Furon, Hervé Jégou, Matthijs Douze
We revisit watermarking techniques based on pre-trained deep networks, in the light of self-supervised approaches.
no code implementations • NeurIPS 2021 • Karim TIT, Teddy Furon, Mathias Rousset
We quantify the robustness of a trained network to input uncertainties with a stochastic simulation inspired by the field of Statistical Reliability Engineering.
1 code implementation • 10 Feb 2021 • Thibault Maho, Benoît Bonnet, Teddy Furon, Erwan Le Merrer
Many defenses have emerged with the development of adversarial attacks.
1 code implementation • CVPR 2021 • Thibault Maho, Teddy Furon, Erwan Le Merrer
This paper presents SurFree, a geometrical approach that achieves a similar drastic reduction in the amount of queries in the hardest setup: black box decision-based attacks (only the top-1 label is available).
no code implementations • 2 Oct 2020 • Teddy Furon
This document proposes an alternative proof of the result contained in article "High intrinsic dimensionality facilitates adversarial attack: Theoretical evidence", Amsaleg et a..
no code implementations • 12 Aug 2020 • Wenqing Liu, Miaojing Shi, Teddy Furon, Li Li
This paper presents a DNN bottleneck reinforcement scheme to alleviate the vulnerability of Deep Neural Networks (DNN) against adversarial attacks.
no code implementations • 24 Feb 2020 • Marzieh Gheisari, Teddy Furon, Laurent Amsaleg
Group membership verification checks if a biometric trait corresponds to one member of a group without revealing the identity of that member.
no code implementations • 24 Feb 2020 • Marzieh Gheisari, Teddy Furon, Laurent Amsaleg
This paper proposes a framework for group membership protocols preventing the curious but honest server from reconstructing the enrolled biometric signatures and inferring the identity of querying clients.
1 code implementation • 4 Dec 2019 • Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg
Adversarial examples of deep neural networks are receiving ever increasing attention because they help in understanding and reducing the sensitivity to their input.
no code implementations • 23 Apr 2019 • Marzieh Gheisari, Teddy Furon, Laurent Amsaleg
When convoking privacy, group membership verification checks if a biometric trait corresponds to one member of a group without revealing the identity of that member.
1 code implementation • 28 Mar 2019 • Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg
This paper investigates the visual quality of the adversarial examples.
no code implementations • 23 Jul 2018 • Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondrej Chum
State of the art image retrieval performance is achieved with CNN features and manifold ranking using a k-NN similarity graph that is pre-computed off-line.
no code implementations • 21 Apr 2017 • Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, Teddy Furon, Ondrej Chum
Location recognition is commonly treated as visual instance retrieval on "street view" imagery.
1 code implementation • CVPR 2018 • Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondrej Chum
This makes the Euclidean nearest neighbor search biased for this task.
3 code implementations • CVPR 2017 • Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, Teddy Furon, Ondrej Chum
The diffusion is carried out on descriptors of overlapping image regions rather than on a global image descriptor like in previous approaches.
no code implementations • 14 Nov 2016 • Ronan Sicre, Julien Rabin, Yannis Avrithis, Teddy Furon, Frederic Jurie
Part-based image classification consists in representing categories by small sets of discriminative parts upon which a representation of the images is built.
no code implementations • CVPR 2016 • Ahmet Iscen, Michael Rabbat, Teddy Furon
Experiments with standard image search benchmarks, including the Yahoo100M dataset comprising 100 million images, show that our method gives comparable (and sometimes superior) accuracy compared to exhaustive search while requiring only 10% of the vector operations and memory.
no code implementations • 10 Dec 2014 • Ahmet Iscen, Teddy Furon, Vincent Gripon, Michael Rabbat, Hervé Jégou
We study an indexing architecture to store and search in a database of high-dimensional vectors from the perspective of statistical signal processing and decision theory.
no code implementations • 8 Jul 2014 • Giorgos Tolias, Teddy Furon, Hervé Jégou
Our geometric-aware aggregation strategy is effective for image search, as shown by experiments performed on standard benchmarks for image and particular object retrieval, namely Holidays and Oxford buildings.