Search

Your search keyword '"Furon, Teddy"' showing total 190 results

Search Constraints

Start Over You searched for: Author "Furon, Teddy" Remove constraint Author: "Furon, Teddy" Search Limiters Full Text Remove constraint Search Limiters: Full Text
190 results on '"Furon, Teddy"'

Search Results

1. Evaluation of Security of ML-based Watermarking: Copy and Removal Attacks

2. SWIFT: Semantic Watermarking for Image Forgery Thwarting

3. WaterMax: breaking the LLM watermark detectability-robustness-quality trade-off

4. Watermarking Makes Language Models Radioactive

5. Proactive Detection of Voice Cloning with Localized Watermarking

6. Three Bricks to Consolidate Watermarks for Large Language Models

8. How to choose your best allies for a transferable attack?

9. The Stable Signature: Rooting Watermarks in Latent Diffusion Models

10. Mixer: DNN Watermarking using Image Mixup

11. Active Image Indexing

12. FBI: Fingerprinting models with Benign Inputs

13. ROSE: A RObust and SEcure DNN Watermarking

14. AggNet: Learning to Aggregate Faces for Group Membership Verification

15. Randomized Smoothing under Attack: How Good is it in Pratice?

16. Watermarking Images in Self-Supervised Latent Spaces

17. RoBIC: A benchmark suite for assessing classifiers robustness

18. SurFree: a fast surrogate-free black-box attack

19. Adversarial Images through Stega Glasses

20. An alternative proof of the vulnerability of retrieval in high intrinsic dimensionality neighborhood

21. Defending Adversarial Examples via DNN Bottleneck Reinforcement

22. Group Membership Verification with Privacy: Sparse or Dense?

23. Joint Learning of Assignment and Representation for Biometric Group Membership

24. Walking on the Edge: Fast, Low-Distortion Adversarial Examples

25. Privacy Preserving Group Membership Verification and Identification

26. Smooth Adversarial Examples

27. Aggregation and Embedding for Group Membership Verification

28. Hybrid Diffusion: Spectral-Temporal Graph Filtering for Manifold Ranking

29. Panorama to panorama matching for location recognition

30. Fast Spectral Ranking for Similarity Search

31. Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations

32. Automatic discovery of discriminative parts as a quadratic assignment problem

33. Memory vectors for similarity search in high-dimensional spaces

34. Orientation covariant aggregation of local descriptors with embeddings

35. The Effective Key Length of Watermarking Schemes

36. Anti-sparse coding for approximate nearest neighbor search

37. Towards joint decoding of binary Tardos fingerprinting codes

38. An Asymmetric Fingerprinting Scheme based on Tardos Codes

39. Worst case attacks against binary probabilistic traitor tracing codes

40. The Good, the Bad, and the Ugly: three different approaches to break their watermarking system

41. A constructive and unifying framework for zero-bit watermarking

43. Histoire Récente de la Sécurité des Contenus Multimédia Un Focus sur la Dissimulation d'Information

45. Functional Invariants to Watermark Large Transformers

46. Active image indexing

48. Empreinte de réseaux avec des entrées authentiques

49. Tatouage Numérique d'Images dans l'Espace Latent de Réseaux Auto-Supervisés

Catalog

Books, media, physical & digital resources