Search

Your search keyword '"Furon, Teddy"' showing total 40 results

Search Constraints

Start Over You searched for: Author "Furon, Teddy" Remove constraint Author: "Furon, Teddy" Publication Type Reports Remove constraint Publication Type: Reports
40 results on '"Furon, Teddy"'

Search Results

1. Evaluation of Security of ML-based Watermarking: Copy and Removal Attacks

2. SWIFT: Semantic Watermarking for Image Forgery Thwarting

3. WaterMax: breaking the LLM watermark detectability-robustness-quality trade-off

4. Watermarking Makes Language Models Radioactive

5. Proactive Detection of Voice Cloning with Localized Watermarking

6. Three Bricks to Consolidate Watermarks for Large Language Models

7. How to choose your best allies for a transferable attack?

8. The Stable Signature: Rooting Watermarks in Latent Diffusion Models

9. Mixer: DNN Watermarking using Image Mixup

10. Active Image Indexing

11. FBI: Fingerprinting models with Benign Inputs

12. ROSE: A RObust and SEcure DNN Watermarking

13. AggNet: Learning to Aggregate Faces for Group Membership Verification

14. Randomized Smoothing under Attack: How Good is it in Pratice?

15. Watermarking Images in Self-Supervised Latent Spaces

16. RoBIC: A benchmark suite for assessing classifiers robustness

17. SurFree: a fast surrogate-free black-box attack

18. Adversarial Images through Stega Glasses

19. An alternative proof of the vulnerability of retrieval in high intrinsic dimensionality neighborhood

20. Defending Adversarial Examples via DNN Bottleneck Reinforcement

21. Group Membership Verification with Privacy: Sparse or Dense?

22. Joint Learning of Assignment and Representation for Biometric Group Membership

23. Walking on the Edge: Fast, Low-Distortion Adversarial Examples

24. Privacy Preserving Group Membership Verification and Identification

25. Smooth Adversarial Examples

26. Aggregation and Embedding for Group Membership Verification

27. Hybrid Diffusion: Spectral-Temporal Graph Filtering for Manifold Ranking

28. Panorama to panorama matching for location recognition

29. Fast Spectral Ranking for Similarity Search

30. Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations

31. Automatic discovery of discriminative parts as a quadratic assignment problem

32. Memory vectors for similarity search in high-dimensional spaces

33. Orientation covariant aggregation of local descriptors with embeddings

34. The Effective Key Length of Watermarking Schemes

35. Anti-sparse coding for approximate nearest neighbor search

36. Towards joint decoding of binary Tardos fingerprinting codes

37. An Asymmetric Fingerprinting Scheme based on Tardos Codes

38. Worst case attacks against binary probabilistic traitor tracing codes

39. The Good, the Bad, and the Ugly: three different approaches to break their watermarking system

40. A constructive and unifying framework for zero-bit watermarking

Catalog

Books, media, physical & digital resources