-
DiffHPE: Robust, Coherent 3D Human Pose Lifting with Diffusion
Abstract: We present an innovative approach to 3D Human Pose Estimation (3D-HPE) by integrating cutting-edge diffusion models, which have revolutionized diverse fields, but are relatively unexplored in 3D-HPE. We show that diffusion models enhance the accuracy, robustness, and coherence of human pose estimations. We introduce DiffHPE, a novel strategy for harnessing diffusion models in 3D-HPE, and demonstra… ▽ More
Submitted 4 September, 2023; originally announced September 2023.
Comments: Accepted to 2023 International Conference on Computer Vision Workshop (Analysis and Modeling of Faces and Gestures)
-
arXiv:2303.08687 [pdf, ps, other]
Goppa-like AG codes from $C_{a,b}$ curves and their behaviour under squaring their dual
Abstract: In this paper, we introduce a family of codes that can be used in a McEliece cryptosystem, called Goppa--like AG codes. These codes generalize classical Goppa codes and can be constructed from any curve of genus $\mathfrak{g} \geq 0$. Focusing on codes from $C_{a,b}$ curves, we study the behaviour of the dimension of the square of their dual to determine their resistance to distinguisher attacks s… ▽ More
Submitted 14 April, 2023; v1 submitted 15 March, 2023; originally announced March 2023.
Comments: Minor changes: authors reordered alphabetically and missing parentheses added in Corollary 1.8
MSC Class: 11T71; 14G50; 14H05; 11G20
-
Empowering the trustworthiness of ML-based critical systems through engineering activities
Abstract: This paper reviews the entire engineering process of trustworthy Machine Learning (ML) algorithms designed to equip critical systems with advanced analytics and decision functions. We start from the fundamental principles of ML and describe the core elements conditioning its trust, particularly through its design: namely domain specification, data engineering, design of the ML algorithms, their im… ▽ More
Submitted 30 September, 2022; originally announced September 2022.
Comments: This work has been supported by the French government under the "France 2030" program, as part of the SystemX Technological Research Institute Research Institute
-
Estimating The Dimension Of The Subfield Subcodes of Hermitian Codes
Abstract: In this paper, we study the behavior of the true dimension of the subfield subcodes of Hermitian codes. Our motivation is to use these classes of linear codes to improve the parameters of the McEliece cryptosystem, such that key size and security level. The McEliece scheme is one of the promising alternative cryptographic schemes to the current public key schemes since in the last four decades, th… ▽ More
Submitted 1 April, 2020; originally announced April 2020.
MSC Class: 11T71; 14G50; 94B27
-
arXiv:1906.10444 [pdf, ps, other]
On The Dimension of The Subfield Subcodes of 1-Point Hermitian Codes
Abstract: Subfield subcodes of algebraic-geometric codes are good candidates for the use in post-quantum cryptosystems, provided their true parameters such as dimension and minimum distance can be determined. In this paper we present new values of the true dimension of subfield subcodes of $1$--point Hermitian codes, including the case when the subfield is not binary.
Submitted 9 September, 2019; v1 submitted 25 June, 2019; originally announced June 2019.
MSC Class: 11T71; 14G50; 94B27