Skip to main content

Showing 1–18 of 18 results for author: Amsaleg, L

.
  1. arXiv:2311.05538  [pdf, other

    cs.LG cs.CV

    Embedding Space Interpolation Beyond Mini-Batch, Beyond Pairs and Beyond Examples

    Authors: Shashanka Venkataramanan, Ewa Kijak, Laurent Amsaleg, Yannis Avrithis

    Abstract: Mixup refers to interpolation-based data augmentation, originally motivated as a way to go beyond empirical risk minimization (ERM). Its extensions mostly focus on the definition of interpolation and the space (input or feature) where it takes place, while the augmentation process itself is less studied. In most methods, the number of generated examples is limited to the mini-batch size and the nu… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

    Comments: Accepted to NeurIPS 2023. arXiv admin note: substantial text overlap with arXiv:2206.14868

  2. arXiv:2310.11850  [pdf, other

    cs.CR cs.CV cs.LG

    Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights

    Authors: Zhengyu Zhao, Hanwei Zhang, Renjue Li, Ronan Sicre, Laurent Amsaleg, Michael Backes, Qi Li, Chao Shen

    Abstract: Transferable adversarial examples raise critical security concerns in real-world, black-box attack scenarios. However, in this work, we identify two main problems in common evaluation practices: (1) For attack transferability, lack of systematic, one-to-one attack comparison and fair hyperparameter settings. (2) For attack stealthiness, simply no comparisons. To address these problems, we establis… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

    Comments: Code is available at https://github.com/ZhengyuZhao/TransferAttackEval

  3. arXiv:2211.09565  [pdf, other

    cs.CR cs.CV cs.LG

    Towards Good Practices in Evaluating Transfer Adversarial Attacks

    Authors: Zhengyu Zhao, Hanwei Zhang, Renjue Li, Ronan Sicre, Laurent Amsaleg, Michael Backes

    Abstract: Transfer adversarial attacks raise critical security concerns in real-world, black-box scenarios. However, the actual progress of this field is difficult to assess due to two common limitations in existing evaluations. First, different methods are often not systematically and fairly evaluated in a one-to-one comparison. Second, only transferability is evaluated but another key attack property, ste… ▽ More

    Submitted 28 October, 2023; v1 submitted 17 November, 2022; originally announced November 2022.

    Comments: An extended version can be found at arXiv:2310.11850. Code and a list of categorized attacks are available at https://github.com/ZhengyuZhao/TransferAttackEval

  4. arXiv:2209.14475  [pdf, other

    cs.LG cs.CV cs.NE

    Intrinsic Dimensionality Estimation within Tight Localities: A Theoretical and Experimental Analysis

    Authors: Laurent Amsaleg, Oussama Chelly, Michael E. Houle, Ken-ichi Kawarabayashi, Miloš Radovanović, Weeris Treeratanajaru

    Abstract: Accurate estimation of Intrinsic Dimensionality (ID) is of crucial importance in many data mining and machine learning tasks, including dimensionality reduction, outlier detection, similarity search and subspace clustering. However, since their convergence generally requires sample sizes (that is, neighborhood sizes) on the order of hundreds of points, existing ID estimation methods may have only… ▽ More

    Submitted 28 September, 2022; originally announced September 2022.

    Comments: 21 pages, 16 figures, 3 tables

  5. arXiv:2206.14868  [pdf, other

    cs.LG cs.CV

    Teach me how to Interpolate a Myriad of Embeddings

    Authors: Shashanka Venkataramanan, Ewa Kijak, Laurent Amsaleg, Yannis Avrithis

    Abstract: Mixup refers to interpolation-based data augmentation, originally motivated as a way to go beyond empirical risk minimization (ERM). Yet, its extensions focus on the definition of interpolation and the space where it takes place, while the augmentation itself is less studied: For a mini-batch of size $m$, most methods interpolate between $m$ pairs with a single scalar interpolation factor $λ$. I… ▽ More

    Submitted 29 June, 2022; originally announced June 2022.

  6. arXiv:2206.08683  [pdf, other

    cs.CV

    AggNet: Learning to Aggregate Faces for Group Membership Verification

    Authors: Marzieh Gheisari, Javad Amirian, Teddy Furon, Laurent Amsaleg

    Abstract: In some face recognition applications, we are interested to verify whether an individual is a member of a group, without revealing their identity. Some existing methods, propose a mechanism for quantizing precomputed face descriptors into discrete embeddings and aggregating them into one group representation. However, this mechanism is only optimized for a given closed set of individuals and needs… ▽ More

    Submitted 17 June, 2022; originally announced June 2022.

  7. arXiv:2106.04990  [pdf, other

    cs.LG cs.CV

    It Takes Two to Tango: Mixup for Deep Metric Learning

    Authors: Shashanka Venkataramanan, Bill Psomas, Ewa Kijak, Laurent Amsaleg, Konstantinos Karantzalos, Yannis Avrithis

    Abstract: Metric learning involves learning a discriminative representation such that embeddings of similar classes are encouraged to be close, while embeddings of dissimilar classes are pushed far apart. State-of-the-art methods focus mostly on sophisticated loss functions or mining strategies. On the one hand, metric learning losses consider two or more examples at a time. On the other hand, modern data a… ▽ More

    Submitted 28 February, 2022; v1 submitted 9 June, 2021; originally announced June 2021.

    Comments: Accepted to ICLR 2022

  8. arXiv:2103.15375  [pdf, other

    cs.CV

    AlignMixup: Improving Representations By Interpolating Aligned Features

    Authors: Shashanka Venkataramanan, Ewa Kijak, Laurent Amsaleg, Yannis Avrithis

    Abstract: Mixup is a powerful data augmentation method that interpolates between two or more examples in the input or feature space and between the corresponding target labels. Many recent mixup methods focus on cutting and pasting two or more objects into one image, which is more about efficient processing than interpolation. However, how to best interpolate images is not well defined. In this sense, mixup… ▽ More

    Submitted 25 March, 2022; v1 submitted 29 March, 2021; originally announced March 2021.

    Comments: Accepted to CVPR 2022

  9. arXiv:2002.10363  [pdf, other

    cs.CV cs.CR

    Joint Learning of Assignment and Representation for Biometric Group Membership

    Authors: Marzieh Gheisari, Teddy Furon, Laurent Amsaleg

    Abstract: This paper proposes a framework for group membership protocols preventing the curious but honest server from reconstructing the enrolled biometric signatures and inferring the identity of querying clients. This framework learns the embedding parameters, group representations and assignments simultaneously. Experiments show the trade-off between security/privacy and verification/identification perf… ▽ More

    Submitted 24 February, 2020; originally announced February 2020.

  10. arXiv:2002.10362  [pdf, other

    cs.CR cs.CV

    Group Membership Verification with Privacy: Sparse or Dense?

    Authors: Marzieh Gheisari, Teddy Furon, Laurent Amsaleg

    Abstract: Group membership verification checks if a biometric trait corresponds to one member of a group without revealing the identity of that member. Recent contributions provide privacy for group membership protocols through the joint use of two mechanisms: quantizing templates into discrete embeddings and aggregating several templates into one group representation. However, this scheme has one drawback:… ▽ More

    Submitted 24 February, 2020; originally announced February 2020.

  11. Walking on the Edge: Fast, Low-Distortion Adversarial Examples

    Authors: Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg

    Abstract: Adversarial examples of deep neural networks are receiving ever increasing attention because they help in understanding and reducing the sensitivity to their input. This is natural given the increasing applications of deep neural networks in our everyday lives. When white-box attacks are almost always successful, it is typically only the distortion of the perturbations that matters in their evalua… ▽ More

    Submitted 5 December, 2019; v1 submitted 4 December, 2019; originally announced December 2019.

    Comments: 13 pages, 9 figures

  12. arXiv:1904.10327  [pdf, other

    cs.CV

    Privacy Preserving Group Membership Verification and Identification

    Authors: Marzieh Gheisari, Teddy Furon, Laurent Amsaleg

    Abstract: When convoking privacy, group membership verification checks if a biometric trait corresponds to one member of a group without revealing the identity of that member. Similarly, group membership identification states which group the individual belongs to, without knowing his/her identity. A recent contribution provides privacy and security for group membership protocols through the joint use of two… ▽ More

    Submitted 23 April, 2019; originally announced April 2019.

    Comments: Accepted at CVPR Workshops 2019

  13. arXiv:1904.08689  [pdf, other

    cs.MM cs.IR

    Exquisitor: Interactive Learning at Large

    Authors: Björn Þór Jónsson, Omar Shahbaz Khan, Hanna Ragnarsdóttir, Þórhildur Þorleiksdóttir, Jan Zahálka, Stevan Rudinac, Gylfi Þór Guðmundsson, Laurent Amsaleg, Marcel Worring

    Abstract: Increasing scale is a dominant trend in today's multimedia collections, which especially impacts interactive applications. To facilitate interactive exploration of large multimedia collections, new approaches are needed that are capable of learning on the fly new analytic categories based on the visual and textual content. To facilitate general use on standard desktops, laptops, and mobile devices… ▽ More

    Submitted 17 July, 2019; v1 submitted 18 April, 2019; originally announced April 2019.

  14. Smooth Adversarial Examples

    Authors: Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg

    Abstract: This paper investigates the visual quality of the adversarial examples. Recent papers propose to smooth the perturbations to get rid of high frequency artefacts. In this work, smoothing has a different meaning as it perceptually shapes the perturbation according to the visual content of the image to be attacked. The perturbation becomes locally smooth on the flat areas of the input image, but it m… ▽ More

    Submitted 28 March, 2019; originally announced March 2019.

  15. arXiv:1812.03943  [pdf, other

    cs.CR

    Aggregation and Embedding for Group Membership Verification

    Authors: Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy

    Abstract: This paper proposes a group membership verification protocol preventing the curious but honest server from reconstructing the enrolled signatures and inferring the identity of querying clients. The protocol quantizes the signatures into discrete embeddings, making reconstruction difficult. It also aggregates multiple embeddings into representative values, impeding identification. Theoretical and e… ▽ More

    Submitted 23 April, 2019; v1 submitted 10 December, 2018; originally announced December 2018.

    Comments: accepted at ICASSP 2019

  16. arXiv:1805.10942  [pdf, other

    cs.DB cs.MM

    Dynamicity and Durability in Scalable Visual Instance Search

    Authors: Herwig Lejsek, Björn Þór Jónsson, Laurent Amsaleg, Friðrik Heiðar Ásmundsson

    Abstract: Visual instance search involves retrieving from a collection of images the ones that contain an instance of a visual query. Systems designed for visual instance search face the major challenge of scalability: a collection of a few million images used for instance search typically creates a few billion features that must be indexed. Furthermore, as real image collections grow rapidly, systems must… ▽ More

    Submitted 16 July, 2019; v1 submitted 25 May, 2018; originally announced May 2018.

  17. arXiv:1102.3828  [pdf, ps, other

    cs.IR cs.CV

    Searching in one billion vectors: re-rank with source coding

    Authors: Hervé Jégou, Romain Tavenard, Matthijs Douze, Laurent Amsaleg

    Abstract: Recent indexing techniques inspired by source coding have been shown successful to index billions of high-dimensional vectors in memory. In this paper, we propose an approach that re-ranks the neighbor hypotheses obtained by these compressed-domain indexing methods. In contrast to the usual post-verification scheme, which performs exact distance calculation on the short-list of hypotheses, the est… ▽ More

    Submitted 18 February, 2011; originally announced February 2011.

    Comments: International Conference on Acoustics, Speech and Signal Processing, Prague : Czech Republic (2011)

  18. arXiv:1009.4739  [pdf, ps, other

    cs.CV

    Balancing clusters to reduce response time variability in large scale image search

    Authors: Romain Tavenard, Laurent Amsaleg, Hervé Jégou

    Abstract: Many algorithms for approximate nearest neighbor search in high-dimensional spaces partition the data into clusters. At query time, in order to avoid exhaustive search, an index selects the few (or a single) clusters nearest to the query point. Clusters are often produced by the well-known $k$-means approach since it has several desirable properties. On the downside, it tends to produce clusters h… ▽ More

    Submitted 21 September, 2010; originally announced September 2010.

    Report number: RR-7387