default search action
Teddy Furon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c98]Pierre Fernandez, Guillaume Couairon, Teddy Furon, Matthijs Douze:
Functional Invariants To Watermark Large Transformers. ICASSP 2024: 4815-4819 - [c97]Robin San Roman, Pierre Fernandez, Hady Elsahar, Alexandre Défossez, Teddy Furon, Tuan Tran:
Proactive Detection of Voice Cloning with Localized Watermarking. ICML 2024 - [c96]Quentin Le Roux, Kassem Kallas, Teddy Furon:
REStore: Exploring a Black-Box Defense against DNN Backdoors using Rare Event Simulation. SaTML 2024: 286-308 - [i39]Robin San Roman, Pierre Fernandez, Alexandre Défossez, Teddy Furon, Tuan Tran, Hady Elsahar:
Proactive Detection of Voice Cloning with Localized Watermarking. CoRR abs/2401.17264 (2024) - [i38]Tom Sander, Pierre Fernandez, Alain Durmus, Matthijs Douze, Teddy Furon:
Watermarking Makes Language Models Radioactive. CoRR abs/2402.14904 (2024) - [i37]Gautier Evennou, Vivien Chappelier, Ewa Kijak, Teddy Furon:
SWIFT: Semantic Watermarking for Image Forgery Thwarting. CoRR abs/2407.18995 (2024) - 2023
- [j24]Thibault Maho, Teddy Furon, Erwan Le Merrer:
Fingerprinting Classifiers With Benign Inputs. IEEE Trans. Inf. Forensics Secur. 18: 5459-5472 (2023) - [c95]Karim Tit, Teddy Furon, Mathias Rousset:
Gradient-Informed Neural Network Statistical Robustness Estimation. AISTATS 2023: 323-334 - [c94]Kassem Kallas, Teddy Furon:
Mixer: DNN Watermarking using Image Mixup. ICASSP 2023: 1-5 - [c93]Thibault Maho, Teddy Furon, Erwan Le Merrer:
Model Fingerprinting with Benign Inputs. ICASSP 2023: 1-5 - [c92]Thibault Maho, Seyed-Mohsen Moosavi-Dezfooli, Teddy Furon:
How to choose your best allies for a transferable attack? ICCV 2023: 4519-4528 - [c91]Pierre Fernandez, Guillaume Couairon, Hervé Jégou, Matthijs Douze, Teddy Furon:
The Stable Signature: Rooting Watermarks in Latent Diffusion Models. ICCV 2023: 22409-22420 - [c90]Pierre Fernandez, Matthijs Douze, Hervé Jégou, Teddy Furon:
Active Image Indexing. ICLR 2023 - [c89]Pierre Fernandez, Antoine Chaffin, Karim Tit, Vivien Chappelier, Teddy Furon:
Three Bricks to Consolidate Watermarks for Large Language Models. WIFS 2023: 1-6 - [i36]Pierre Fernandez, Guillaume Couairon, Hervé Jégou, Matthijs Douze, Teddy Furon:
The Stable Signature: Rooting Watermarks in Latent Diffusion Models. CoRR abs/2303.15435 (2023) - [i35]Thibault Maho, Seyed-Mohsen Moosavi-Dezfooli, Teddy Furon:
How to choose your best allies for a transferable attack? CoRR abs/2304.02312 (2023) - [i34]Pierre Fernandez, Antoine Chaffin, Karim Tit, Vivien Chappelier, Teddy Furon:
Three Bricks to Consolidate Watermarks for Large Language Models. CoRR abs/2308.00113 (2023) - [i33]Pierre Fernandez, Guillaume Couairon, Teddy Furon, Matthijs Douze:
Functional Invariants to Watermark Large Transformers. CoRR abs/2310.11446 (2023) - 2022
- [j23]Benoît Bonnet, Teddy Furon, Patrick Bas:
Generating Adversarial Images in Quantized Domains. IEEE Trans. Inf. Forensics Secur. 17: 373-385 (2022) - [c88]Thibault Maho, Teddy Furon, Erwan Le Merrer:
Randomized Smoothing Under Attack: How Good is it in Practice? ICASSP 2022: 3014-3018 - [c87]Pierre Fernandez, Alexandre Sablayrolles, Teddy Furon, Hervé Jégou, Matthijs Douze:
Watermarking Images in Self-Supervised Latent Spaces. ICASSP 2022: 3054-3058 - [c86]Benoît Bonnet, Teddy Furon, Patrick Bas:
Impact of Downscaling on Adversarial Images. ICIP 2022: 2256-2260 - [c85]Kassem Kallas, Teddy Furon:
ROSE: A RObust and SEcure DNN Watermarking. WIFS 2022: 1-6 - [i32]Thibault Maho, Teddy Furon, Erwan Le Merrer:
Randomized Smoothing under Attack: How Good is it in Pratice? CoRR abs/2204.14187 (2022) - [i31]Marzieh Gheisari, Javad Amirian, Teddy Furon, Laurent Amsaleg:
AggNet: Learning to Aggregate Faces for Group Membership Verification. CoRR abs/2206.08683 (2022) - [i30]Kassem Kallas, Teddy Furon:
ROSE: A RObust and SEcure DNN Watermarking. CoRR abs/2206.11024 (2022) - [i29]Thibault Maho, Teddy Furon, Erwan Le Merrer:
FBI: Fingerprinting models with Benign Inputs. CoRR abs/2208.03169 (2022) - [i28]Pierre Fernandez, Matthijs Douze, Hervé Jégou, Teddy Furon:
Active Image Indexing. CoRR abs/2210.10620 (2022) - [i27]Kassem Kallas, Teddy Furon:
Mixer: DNN Watermarking using Image Mixup. CoRR abs/2212.02814 (2022) - 2021
- [j22]Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg:
Walking on the Edge: Fast, Low-Distortion Adversarial Examples. IEEE Trans. Inf. Forensics Secur. 16: 701-713 (2021) - [j21]Laurent Amsaleg, James Bailey, Amélie Barbe, Sarah M. Erfani, Teddy Furon, Michael E. Houle, Milos Radovanovic, Xuan Vinh Nguyen:
High Intrinsic Dimensionality Facilitates Adversarial Attack: Theoretical Evidence. IEEE Trans. Inf. Forensics Secur. 16: 854-865 (2021) - [c84]Thibault Maho, Teddy Furon, Erwan Le Merrer:
SurFree: A Fast Surrogate-Free Black-Box Attack. CVPR 2021: 10430-10439 - [c83]Thibault Maho, Benoît Bonnet, Teddy Furon, Erwan Le Merrer:
RoBIC: A Benchmark Suite For Assessing Classifiers Robustness. ICIP 2021: 3612-3616 - [c82]Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg:
Patch Replacement: A Transformation-based Method to Improve Robustness against Adversarial Attacks. Trustworthy AI @ ACM Multimedia 2021: 9-17 - [c81]Teddy Furon, Jingen Liu, Yogesh S. Rawat, Wei Zhang, Qi Zhao:
Trustworthy AI'21: 1st International Workshop on Trustworthy AI for Multimedia Computing. ACM Multimedia 2021: 5708-5709 - [c80]Karim Tit, Teddy Furon, Mathias Rousset:
Efficient Statistical Assessment of Neural Network Corruption Robustness. NeurIPS 2021: 9253-9263 - [e2]Teddy Furon, Jingen Liu, Yogesh S. Rawat, Wei Zhang, Qi Zhao:
Trustworthy AI'21: Proceedings of the 1st International Workshop on Trustworthy AI for Multimedia Computing, Virtual Event, China, 24 October 2021. ACM 2021, ISBN 978-1-4503-8674-6 [contents] - [i26]Thibault Maho, Benoît Bonnet, Teddy Furon, Erwan Le Merrer:
RoBIC: A benchmark suite for assessing classifiers robustness. CoRR abs/2102.05368 (2021) - [i25]Pierre Fernandez, Alexandre Sablayrolles, Teddy Furon, Hervé Jégou, Matthijs Douze:
Watermarking Images in Self-Supervised Latent Spaces. CoRR abs/2112.09581 (2021) - 2020
- [j20]Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg:
Smooth adversarial examples. EURASIP J. Inf. Secur. 2020: 15 (2020) - [j19]Vedran Vukotic, Vivien Chappelier, Teddy Furon:
Are Classification Deep Neural Networks Good for Blind Image Watermarking? Entropy 22(2): 198 (2020) - [c79]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Joint Learning of Assignment and Representation for Biometric Group Membership. ICASSP 2020: 2922-2926 - [c78]Benoît Bonnet, Teddy Furon, Patrick Bas:
Forensics Through Stega Glasses: The Case of Adversarial Images. ICPR Workshops (6) 2020: 453-469 - [c77]Benoît Bonnet, Teddy Furon, Patrick Bas:
What if Adversarial Samples were Digital Images? IH&MMSec 2020: 55-66 - [c76]Benoît Bonnet, Teddy Furon, Patrick Bas:
Fooling an Automatic Image Quality Estimator. MediaEval 2020 - [c75]Wenqing Liu, Miaojing Shi, Teddy Furon, Li Li:
Defending Adversarial Examples via DNN Bottleneck Reinforcement. ACM Multimedia 2020: 1930-1938 - [i24]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Group Membership Verification with Privacy: Sparse or Dense? CoRR abs/2002.10362 (2020) - [i23]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Joint Learning of Assignment and Representation for Biometric Group Membership. CoRR abs/2002.10363 (2020) - [i22]Wenqing Liu, Miaojing Shi, Teddy Furon, Li Li:
Defending Adversarial Examples via DNN Bottleneck Reinforcement. CoRR abs/2008.05230 (2020) - [i21]Teddy Furon:
Note: An alternative proof of the vulnerability of k-NN classifiers in high intrinsic dimensionality regions. CoRR abs/2010.00990 (2020) - [i20]Benoît Bonnet, Teddy Furon, Patrick Bas:
Adversarial Images through Stega Glasses. CoRR abs/2010.07542 (2020) - [i19]Thibault Maho, Teddy Furon, Erwan Le Merrer:
SurFree: a fast surrogate-free black-box attack. CoRR abs/2011.12807 (2020)
2010 – 2019
- 2019
- [c74]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Privacy Preserving Group Membership Verification and Identification. CVPR Workshops 2019: 74-82 - [c73]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy:
Aggregation and Embedding for Group Membership Verification. ICASSP 2019: 2592-2596 - [c72]Teddy Furon:
Watermarking Error Exponents in the Presence of Noise: The Case of the Dual Hypercone Detector. IH&MMSec 2019: 173-181 - [c71]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Group Membership Verification with Privacy: Sparse or Dense? WIFS 2019: 1-7 - [i18]Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg:
Smooth Adversarial Examples. CoRR abs/1903.11862 (2019) - [i17]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Privacy Preserving Group Membership Verification and Identification. CoRR abs/1904.10327 (2019) - [i16]Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg:
Walking on the Edge: Fast, Low-Distortion Adversarial Examples. CoRR abs/1912.02153 (2019) - 2018
- [b1]Teddy Furon:
Binary Tardos Codes and Zero-bit Watermarking. University of Rennes 1, France, 2018 - [j18]Laurent Amsaleg, Oussama Chelly, Teddy Furon, Stéphane Girard, Michael E. Houle, Ken-ichi Kawarabayashi, Michael Nett:
Extreme-value-theoretic estimation of local intrinsic dimensionality. Data Min. Knowl. Discov. 32(6): 1768-1805 (2018) - [j17]Ahmet Iscen, Teddy Furon, Vincent Gripon, Michael G. Rabbat, Hervé Jégou:
Memory Vectors for Similarity Search in High-Dimensional Spaces. IEEE Trans. Big Data 4(1): 65-77 (2018) - [c70]Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondrej Chum:
Hybrid Diffusion: Spectral-Temporal Graph Filtering for Manifold Ranking. ACCV (2) 2018: 301-316 - [c69]Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondrej Chum:
Fast Spectral Ranking for Similarity Search. CVPR 2018: 7632-7641 - [c68]Vedran Vukotic, Vivien Chappelier, Teddy Furon:
Are Deep Neural Networks good for blind image watermarking? WIFS 2018: 1-7 - [i15]Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondrej Chum:
Hybrid Diffusion: Spectral-Temporal Graph Filtering for Manifold Ranking. CoRR abs/1807.08692 (2018) - [i14]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy:
Aggregation and Embedding for Group Membership Verification. CoRR abs/1812.03943 (2018) - 2017
- [c67]Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, Teddy Furon, Ondrej Chum:
Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations. CVPR 2017: 926-935 - [c66]Teddy Furon:
About zero bitwatermarking error exponents. ICASSP 2017: 2132-2136 - [c65]Ronan Sicre, Julien Rabin, Yannis Avrithis, Teddy Furon, Frédéric Jurie, Ewa Kijak:
Automatic Discovery of Discriminative Parts as a Quadratic Assignment Problem. ICCV Workshops 2017: 1059-1068 - [c64]Ahmad Montaser Awal, Nabil Ghanmi, Ronan Sicre, Teddy Furon:
Complex Document Classification and Localization Application on Identity Document Images. ICDAR 2017: 426-431 - [c63]Ronan Sicre, Ahmad Montaser Awal, Teddy Furon:
Identity Documents Classification as an Image Classification Problem. ICIAP (2) 2017: 602-613 - [c62]Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, Teddy Furon, Ondrej Chum:
Panorama to Panorama Matching for Location Recognition. ICMR 2017: 392-396 - [i13]Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondrej Chum:
Fast Spectral Ranking for Similarity Search. CoRR abs/1703.06935 (2017) - [i12]Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, Teddy Furon, Ondrej Chum:
Panorama to panorama matching for location recognition. CoRR abs/1704.06591 (2017) - 2016
- [j16]Li Weng, Laurent Amsaleg, Teddy Furon:
Privacy-Preserving Outsourced Media Search. IEEE Trans. Knowl. Data Eng. 28(10): 2738-2751 (2016) - [c61]Ahmet Iscen, Michael G. Rabbat, Teddy Furon:
Efficient Large-Scale Similarity Search Using Matrix Factorization. CVPR 2016: 2073-2081 - [c60]Raghavendran Balu, Teddy Furon, Laurent Amsaleg:
Sketching Techniques for Very Large Matrix Factorization. ECIR 2016: 782-788 - [c59]Ahmet Iscen, Teddy Furon:
Group Testing for Identification with Privacy. IH&MMSec 2016: 51-56 - [c58]Raghavendran Balu, Teddy Furon:
Differentially Private Matrix Factorization using Sketching Techniques. IH&MMSec 2016: 57-62 - [c57]Ahmet Iscen, Laurent Amsaleg, Teddy Furon:
Scaling Group Testing Similarity Search. ICMR 2016: 213-220 - [i11]Ronan Sicre, Julien Rabin, Yannis Avrithis, Teddy Furon, Frédéric Jurie:
Automatic discovery of discriminative parts as a quadratic assignment problem. CoRR abs/1611.04413 (2016) - [i10]Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, Teddy Furon, Ondrej Chum:
Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations. CoRR abs/1611.05113 (2016) - 2015
- [j15]Giorgos Tolias, Andrei Bursuc, Teddy Furon, Hervé Jégou:
Rotation and translation covariant match kernels for image retrieval. Comput. Vis. Image Underst. 140: 9-20 (2015) - [c56]Laurent Amsaleg, Oussama Chelly, Teddy Furon, Stéphane Girard, Michael E. Houle, Ken-ichi Kawarabayashi, Michael Nett:
Estimating Local Intrinsic Dimensionality. KDD 2015: 29-38 - 2014
- [c55]Giorgos Tolias, Teddy Furon, Hervé Jégou:
Orientation Covariant Aggregation of Local Descriptors with Embeddings. ECCV (6) 2014: 382-397 - [c54]Raghavendran Balu, Teddy Furon, Sébastien Gambs:
Challenging Differential Privacy: The Case of Non-interactive Mechanisms. ESORICS (2) 2014: 146-164 - [c53]Raghavendran Balu, Teddy Furon, Hervé Jégou:
Beyond "project and sign" for cosine estimation with binary codes. ICASSP 2014: 6884-6888 - [c52]Josip Krapac, Florent Perronnin, Teddy Furon, Hervé Jégou:
Instance classification with prototype selection. ICMR 2014: 431 - [c51]Miaojing Shi, Teddy Furon, Hervé Jégou:
A Group Testing Framework for Similarity Search in High-dimensional Spaces. ACM Multimedia 2014: 407-416 - [c50]Teddy Furon, Mathieu Desoubeaux:
Tardos codes for real. WIFS 2014: 24-29 - [c49]Binod Bhattarai, Alexis Mignon, Frédéric Jurie, Teddy Furon:
Puzzling face verification algorithms for privacy protection. WIFS 2014: 66-71 - [i9]Giorgos Tolias, Teddy Furon, Hervé Jégou:
Orientation covariant aggregation of local descriptors with embeddings. CoRR abs/1407.2170 (2014) - [i8]Ahmet Iscen, Teddy Furon, Vincent Gripon, Michael G. Rabbat, Hervé Jégou:
Memory vectors for similarity search in high-dimensional spaces. CoRR abs/1412.3328 (2014) - 2013
- [j14]Patrick Bas, Teddy Furon:
A New Measure of Watermarking Security: The Effective Key Length. IEEE Trans. Inf. Forensics Secur. 8(8): 1306-1317 (2013) - [c48]Benjamin Mathon, Teddy Furon, Laurent Amsaleg, Julien Bringer:
Secure and efficient approximate nearest neighbors search. IH&MMSec 2013: 175-180 - [c47]Teddy Furon, Hervé Jégou, Laurent Amsaleg, Benjamin Mathon:
Fast and secure similarity search in high dimensional space. WIFS 2013: 73-78 - 2012
- [j13]Frédéric Cérou, Pierre Del Moral, Teddy Furon, Arnaud Guyader:
Sequential Monte Carlo for rare event estimation. Stat. Comput. 22(3): 795-808 (2012) - [j12]Peter Meerwald, Teddy Furon:
Toward Practical Joint Decoding of Binary Tardos Fingerprinting Codes. IEEE Trans. Inf. Forensics Secur. 7(4): 1168-1180 (2012) - [c46]Patrick Bas, Teddy Furon:
Are 128 Bits Long Keys Possible in Watermarking? Communications and Multimedia Security 2012: 191 - [c45]Patrick Bas, Teddy Furon:
Key length estimation of zero-bit watermarking schemes. EUSIPCO 2012: 1693-1697 - [c44]Patrick Bas, Teddy Furon, François Cayre:
Practical key length of watermarking systems. ICASSP 2012: 1769-1772 - [c43]Thanh-Toan Do, Ewa Kijak, Laurent Amsaleg, Teddy Furon:
Enlarging hacker's toolbox: Deluding image recognition by attacking keypoint orientations. ICASSP 2012: 1817-1820 - [c42]Hervé Jégou, Teddy Furon, Jean-Jacques Fuchs:
Anti-sparse coding for approximate nearest neighbor search. ICASSP 2012: 2029-2032 - [c41]Teddy Furon, Patrick Bas:
A New Measure of Watermarking Security Applied on QIM. Information Hiding 2012: 207-223 - [c40]Thanh-Toan Do, Ewa Kijak, Laurent Amsaleg, Teddy Furon:
Security-oriented picture-in-picture visual modifications. ICMR 2012: 13 - [c39]Teddy Furon, Arnaud Guyader, Frédéric Cérou:
Decoding fingerprints using the Markov Chain Monte Carlo method. WIFS 2012: 187-192 - [i7]Patrick Bas, Teddy Furon:
The Effective Key Length of Watermarking Schemes. CoRR abs/1202.3562 (2012) - 2011
- [c38]Peter Meerwald, Teddy Furon:
Group testing meets traitor tracing. ICASSP 2011: 4204-4207 - [c37]Peter Meerwald, Teddy Furon:
Iterative single tardos decoder with controlled probability of false positive. ICME 2011: 1-6 - [c36]Peter Meerwald, Teddy Furon:
Towards Joint Tardos Decoding: The 'Don Quixote' Algorithm. Information Hiding 2011: 28-42 - [c35]Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar J. Cox:
An Asymmetric Fingerprinting Scheme Based on Tardos Codes. Information Hiding 2011: 43-58 - [i6]Peter Meerwald, Teddy Furon:
Towards joint decoding of Tardos fingerprinting codes. CoRR abs/1104.5616 (2011) - [i5]Hervé Jégou, Teddy Furon, Jean-Jacques Fuchs:
Anti-sparse coding for approximate nearest neighbor search. CoRR abs/1110.3767 (2011) - 2010
- [j11]Teddy Furon, Gwenaël J. Doërr:
Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread. IEEE Secur. Priv. 8(5): 69-71 (2010) - [j10]Ana Charpentier, Caroline Fontaine, Teddy Furon:
Décodage EM du code de Tardos pour le fingerprinting. Traitement du Signal 27(2): 127-146 (2010) - [c34]Fuchun Xie, Teddy Furon, Caroline Fontaine:
Better security levels for broken arrows. Media Forensics and Security 2010: 75410H - [c33]Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Amsaleg:
Deluding image recognition in sift-based cbir systems. MiFor@MM 2010: 7-12 - [c32]Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Amsaleg:
Understanding the security and robustness of SIFT. ACM Multimedia 2010: 1195-1198 - [c31]Fuchun Xie, Teddy Furon, Caroline Fontaine:
Towards robust and secure watermarking. MM&Sec 2010: 153-160 - [c30]Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Amsaleg:
Challenging the security of Content-Based Image Retrieval systems. MMSP 2010: 52-57 - [i4]Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar J. Cox:
An Asymmetric Fingerprinting Scheme based on Tardos Codes. CoRR abs/1010.2621 (2010)
2000 – 2009
- 2009
- [c29]Teddy Furon, Cyrille Jégourel, Arnaud Guyader, Frédéric Cérou:
Estimating the probability fo false alarm for a zero-bit watermarking technique. DPS 2009: 1-8 - [c28]Teddy Furon, Luis Pérez-Freire, Arnaud Guyader, Frédéric Cérou:
Estimating the Minimal Length of Tardos Code. Information Hiding 2009: 176-190 - [c27]Ana Charpentier, Fuchun Xie, Caroline Fontaine, Teddy Furon:
Expectation maximization decoding of Tardos probabilistic fingerprinting code. Media Forensics and Security 2009: 72540E - [c26]