Search Results for author: Teddy Furon

Found 31 papers, 13 papers with code

Watermarking Makes Language Models Radioactive

no code implementations22 Feb 2024 Tom Sander, Pierre Fernandez, Alain Durmus, Matthijs Douze, Teddy Furon

This paper investigates the radioactivity of LLM-generated texts, i. e. whether it is possible to detect that such input was used as training data.

Proactive Detection of Voice Cloning with Localized Watermarking

1 code implementation30 Jan 2024 Robin San Roman, Pierre Fernandez, Alexandre Défossez, Teddy Furon, Tuan Tran, Hady Elsahar

In the rapidly evolving field of speech generative models, there is a pressing need to ensure audio authenticity against the risks of voice cloning.

Voice Cloning

Functional Invariants to Watermark Large Transformers

no code implementations17 Oct 2023 Pierre Fernandez, Guillaume Couairon, Teddy Furon, Matthijs Douze

The rapid growth of transformer-based models increases the concerns about their integrity and ownership insurance.

Quantization

Three Bricks to Consolidate Watermarks for Large Language Models

3 code implementations26 Jul 2023 Pierre Fernandez, Antoine Chaffin, Karim TIT, Vivien Chappelier, Teddy Furon

The task of discerning between generated and natural texts is increasingly challenging.

valid

How to choose your best allies for a transferable attack?

1 code implementation ICCV 2023 Thibault Maho, Seyed-Mohsen Moosavi-Dezfooli, Teddy Furon

The transferability of adversarial examples is a key issue in the security of deep neural networks.

The Stable Signature: Rooting Watermarks in Latent Diffusion Models

1 code implementation ICCV 2023 Pierre Fernandez, Guillaume Couairon, Hervé Jégou, Matthijs Douze, Teddy Furon

For instance, it detects the origin of an image generated from a text prompt, then cropped to keep $10\%$ of the content, with $90$+$\%$ accuracy at a false positive rate below 10$^{-6}$.

Mixer: DNN Watermarking using Image Mixup

no code implementations6 Dec 2022 Kassem Kallas, Teddy Furon

It is crucial to protect the intellectual property rights of DNN models prior to their deployment.

Image Classification

Active Image Indexing

1 code implementation5 Oct 2022 Pierre Fernandez, Matthijs Douze, Hervé Jégou, Teddy Furon

First, a neural network maps an image to a vector representation, that is relatively robust to various transformations of the image.

Copy Detection Quantization +1

FBI: Fingerprinting models with Benign Inputs

no code implementations5 Aug 2022 Thibault Maho, Teddy Furon, Erwan Le Merrer

We achieve both goals by demonstrating that benign inputs, that are unmodified images, for instance, are sufficient material for both tasks.

Quantization

ROSE: A RObust and SEcure DNN Watermarking

no code implementations22 Jun 2022 Kassem Kallas, Teddy Furon

Protecting the Intellectual Property rights of DNN models is of primary importance prior to their deployment.

Image Classification

AggNet: Learning to Aggregate Faces for Group Membership Verification

no code implementations17 Jun 2022 Marzieh Gheisari, Javad Amirian, Teddy Furon, Laurent Amsaleg

In some face recognition applications, we are interested to verify whether an individual is a member of a group, without revealing their identity.

Face Recognition

Randomized Smoothing under Attack: How Good is it in Pratice?

no code implementations28 Apr 2022 Thibault Maho, Teddy Furon, Erwan Le Merrer

We first formally highlight the mismatch between a theoretical certification and the practice of attacks on classifiers.

Watermarking Images in Self-Supervised Latent Spaces

1 code implementation17 Dec 2021 Pierre Fernandez, Alexandre Sablayrolles, Teddy Furon, Hervé Jégou, Matthijs Douze

We revisit watermarking techniques based on pre-trained deep networks, in the light of self-supervised approaches.

Data Augmentation

Efficient Statistical Assessment of Neural Network Corruption Robustness

1 code implementation NeurIPS 2021 Karim TIT, Teddy Furon, Mathias Rousset

We quantify the robustness of a trained network to input uncertainties with a stochastic simulation inspired by the field of Statistical Reliability Engineering.

SurFree: a fast surrogate-free black-box attack

1 code implementation CVPR 2021 Thibault Maho, Teddy Furon, Erwan Le Merrer

This paper presents SurFree, a geometrical approach that achieves a similar drastic reduction in the amount of queries in the hardest setup: black box decision-based attacks (only the top-1 label is available).

Adversarial Attack

An alternative proof of the vulnerability of retrieval in high intrinsic dimensionality neighborhood

no code implementations2 Oct 2020 Teddy Furon

This paper investigates the vulnerability of the nearest neighbors search, which is a pivotal tool in data analysis and machine learning.

Adversarial Attack Retrieval

Defending Adversarial Examples via DNN Bottleneck Reinforcement

no code implementations12 Aug 2020 Wenqing Liu, Miaojing Shi, Teddy Furon, Li Li

This paper presents a DNN bottleneck reinforcement scheme to alleviate the vulnerability of Deep Neural Networks (DNN) against adversarial attacks.

Group Membership Verification with Privacy: Sparse or Dense?

no code implementations24 Feb 2020 Marzieh Gheisari, Teddy Furon, Laurent Amsaleg

Group membership verification checks if a biometric trait corresponds to one member of a group without revealing the identity of that member.

Joint Learning of Assignment and Representation for Biometric Group Membership

no code implementations24 Feb 2020 Marzieh Gheisari, Teddy Furon, Laurent Amsaleg

This paper proposes a framework for group membership protocols preventing the curious but honest server from reconstructing the enrolled biometric signatures and inferring the identity of querying clients.

Walking on the Edge: Fast, Low-Distortion Adversarial Examples

1 code implementation4 Dec 2019 Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg

Adversarial examples of deep neural networks are receiving ever increasing attention because they help in understanding and reducing the sensitivity to their input.

Privacy Preserving Group Membership Verification and Identification

no code implementations23 Apr 2019 Marzieh Gheisari, Teddy Furon, Laurent Amsaleg

When convoking privacy, group membership verification checks if a biometric trait corresponds to one member of a group without revealing the identity of that member.

Face Recognition Privacy Preserving

Smooth Adversarial Examples

1 code implementation28 Mar 2019 Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg

This paper investigates the visual quality of the adversarial examples.

Hybrid Diffusion: Spectral-Temporal Graph Filtering for Manifold Ranking

no code implementations23 Jul 2018 Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondrej Chum

State of the art image retrieval performance is achieved with CNN features and manifold ranking using a k-NN similarity graph that is pre-computed off-line.

Image Retrieval Retrieval

Panorama to panorama matching for location recognition

no code implementations21 Apr 2017 Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, Teddy Furon, Ondrej Chum

Location recognition is commonly treated as visual instance retrieval on "street view" imagery.

Retrieval

Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations

3 code implementations CVPR 2017 Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, Teddy Furon, Ondrej Chum

The diffusion is carried out on descriptors of overlapping image regions rather than on a global image descriptor like in previous approaches.

Image Retrieval Retrieval

Automatic discovery of discriminative parts as a quadratic assignment problem

no code implementations14 Nov 2016 Ronan Sicre, Julien Rabin, Yannis Avrithis, Teddy Furon, Frederic Jurie

Part-based image classification consists in representing categories by small sets of discriminative parts upon which a representation of the images is built.

General Classification Image Classification

Efficient Large-Scale Similarity Search Using Matrix Factorization

no code implementations CVPR 2016 Ahmet Iscen, Michael Rabbat, Teddy Furon

Experiments with standard image search benchmarks, including the Yahoo100M dataset comprising 100 million images, show that our method gives comparable (and sometimes superior) accuracy compared to exhaustive search while requiring only 10% of the vector operations and memory.

Dictionary Learning Dimensionality Reduction +2

Memory vectors for similarity search in high-dimensional spaces

no code implementations10 Dec 2014 Ahmet Iscen, Teddy Furon, Vincent Gripon, Michael Rabbat, Hervé Jégou

We study an indexing architecture to store and search in a database of high-dimensional vectors from the perspective of statistical signal processing and decision theory.

Image Retrieval Vocal Bursts Intensity Prediction

Orientation covariant aggregation of local descriptors with embeddings

no code implementations8 Jul 2014 Giorgos Tolias, Teddy Furon, Hervé Jégou

Our geometric-aware aggregation strategy is effective for image search, as shown by experiments performed on standard benchmarks for image and particular object retrieval, namely Holidays and Oxford buildings.

Image Retrieval Retrieval

Cannot find the paper you are looking for? You can Submit a new open access paper.