Picture for Behrooz Razeghi

Behrooz Razeghi

Principles Do Not Apply Themselves: A Hermeneutic Perspective on AI Alignment

Add code
Apr 12, 2026
Viaarxiv icon

On the Capacity of Distinguishable Synthetic Identity Generation under Face Verification

Add code
Apr 12, 2026
Viaarxiv icon

Synthetic to Authentic: Transferring Realism to 3D Face Renderings for Boosting Face Recognition

Add code
Jul 10, 2024
Figure 1 for Synthetic to Authentic: Transferring Realism to 3D Face Renderings for Boosting Face Recognition
Figure 2 for Synthetic to Authentic: Transferring Realism to 3D Face Renderings for Boosting Face Recognition
Figure 3 for Synthetic to Authentic: Transferring Realism to 3D Face Renderings for Boosting Face Recognition
Figure 4 for Synthetic to Authentic: Transferring Realism to 3D Face Renderings for Boosting Face Recognition
Viaarxiv icon

Deep Privacy Funnel Model: From a Discriminative to a Generative Approach with an Application to Face Recognition

Add code
Apr 03, 2024
Figure 1 for Deep Privacy Funnel Model: From a Discriminative to a Generative Approach with an Application to Face Recognition
Figure 2 for Deep Privacy Funnel Model: From a Discriminative to a Generative Approach with an Application to Face Recognition
Figure 3 for Deep Privacy Funnel Model: From a Discriminative to a Generative Approach with an Application to Face Recognition
Figure 4 for Deep Privacy Funnel Model: From a Discriminative to a Generative Approach with an Application to Face Recognition
Viaarxiv icon

Deep Variational Privacy Funnel: General Modeling with Applications in Face Recognition

Add code
Jan 26, 2024
Figure 1 for Deep Variational Privacy Funnel: General Modeling with Applications in Face Recognition
Figure 2 for Deep Variational Privacy Funnel: General Modeling with Applications in Face Recognition
Figure 3 for Deep Variational Privacy Funnel: General Modeling with Applications in Face Recognition
Viaarxiv icon

Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility

Add code
Jul 11, 2022
Figure 1 for Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility
Figure 2 for Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility
Figure 3 for Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility
Figure 4 for Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility
Viaarxiv icon

Variational Leakage: The Role of Information Complexity in Privacy Leakage

Add code
Jun 08, 2021
Figure 1 for Variational Leakage: The Role of Information Complexity in Privacy Leakage
Figure 2 for Variational Leakage: The Role of Information Complexity in Privacy Leakage
Figure 3 for Variational Leakage: The Role of Information Complexity in Privacy Leakage
Figure 4 for Variational Leakage: The Role of Information Complexity in Privacy Leakage
Viaarxiv icon

Privacy-Preserving Near Neighbor Search via Sparse Coding with Ambiguation

Add code
Feb 08, 2021
Figure 1 for Privacy-Preserving Near Neighbor Search via Sparse Coding with Ambiguation
Figure 2 for Privacy-Preserving Near Neighbor Search via Sparse Coding with Ambiguation
Figure 3 for Privacy-Preserving Near Neighbor Search via Sparse Coding with Ambiguation
Figure 4 for Privacy-Preserving Near Neighbor Search via Sparse Coding with Ambiguation
Viaarxiv icon

Privacy-Preserving Image Sharing via Sparsifying Layers on Convolutional Groups

Add code
Feb 04, 2020
Figure 1 for Privacy-Preserving Image Sharing via Sparsifying Layers on Convolutional Groups
Figure 2 for Privacy-Preserving Image Sharing via Sparsifying Layers on Convolutional Groups
Figure 3 for Privacy-Preserving Image Sharing via Sparsifying Layers on Convolutional Groups
Figure 4 for Privacy-Preserving Image Sharing via Sparsifying Layers on Convolutional Groups
Viaarxiv icon

Reconstruction of Privacy-Sensitive Data from Protected Templates

Add code
May 08, 2019
Figure 1 for Reconstruction of Privacy-Sensitive Data from Protected Templates
Figure 2 for Reconstruction of Privacy-Sensitive Data from Protected Templates
Figure 3 for Reconstruction of Privacy-Sensitive Data from Protected Templates
Viaarxiv icon