Picture for Cristian Canton Ferrer

Cristian Canton Ferrer

Jack

A Whac-A-Mole Dilemma: Shortcuts Come in Multiples Where Mitigating One Amplifies Others

Add code
Dec 09, 2022
Figure 1 for A Whac-A-Mole Dilemma: Shortcuts Come in Multiples Where Mitigating One Amplifies Others
Figure 2 for A Whac-A-Mole Dilemma: Shortcuts Come in Multiples Where Mitigating One Amplifies Others
Figure 3 for A Whac-A-Mole Dilemma: Shortcuts Come in Multiples Where Mitigating One Amplifies Others
Figure 4 for A Whac-A-Mole Dilemma: Shortcuts Come in Multiples Where Mitigating One Amplifies Others
Viaarxiv icon

Casual Conversations v2: Designing a large consent-driven dataset to measure algorithmic bias and robustness

Add code
Nov 10, 2022
Figure 1 for Casual Conversations v2: Designing a large consent-driven dataset to measure algorithmic bias and robustness
Figure 2 for Casual Conversations v2: Designing a large consent-driven dataset to measure algorithmic bias and robustness
Figure 3 for Casual Conversations v2: Designing a large consent-driven dataset to measure algorithmic bias and robustness
Figure 4 for Casual Conversations v2: Designing a large consent-driven dataset to measure algorithmic bias and robustness
Viaarxiv icon

Generating High Fidelity Data from Low-density Regions using Diffusion Models

Add code
Mar 31, 2022
Figure 1 for Generating High Fidelity Data from Low-density Regions using Diffusion Models
Figure 2 for Generating High Fidelity Data from Low-density Regions using Diffusion Models
Figure 3 for Generating High Fidelity Data from Low-density Regions using Diffusion Models
Figure 4 for Generating High Fidelity Data from Low-density Regions using Diffusion Models
Viaarxiv icon

Results and findings of the 2021 Image Similarity Challenge

Add code
Feb 08, 2022
Figure 1 for Results and findings of the 2021 Image Similarity Challenge
Figure 2 for Results and findings of the 2021 Image Similarity Challenge
Figure 3 for Results and findings of the 2021 Image Similarity Challenge
Figure 4 for Results and findings of the 2021 Image Similarity Challenge
Viaarxiv icon

The 2021 Image Similarity Dataset and Challenge

Add code
Jul 01, 2021
Figure 1 for The 2021 Image Similarity Dataset and Challenge
Figure 2 for The 2021 Image Similarity Dataset and Challenge
Figure 3 for The 2021 Image Similarity Dataset and Challenge
Figure 4 for The 2021 Image Similarity Dataset and Challenge
Viaarxiv icon

Localized Uncertainty Attacks

Add code
Jun 17, 2021
Figure 1 for Localized Uncertainty Attacks
Figure 2 for Localized Uncertainty Attacks
Figure 3 for Localized Uncertainty Attacks
Figure 4 for Localized Uncertainty Attacks
Viaarxiv icon

Towards measuring fairness in AI: the Casual Conversations dataset

Add code
Apr 06, 2021
Figure 1 for Towards measuring fairness in AI: the Casual Conversations dataset
Figure 2 for Towards measuring fairness in AI: the Casual Conversations dataset
Figure 3 for Towards measuring fairness in AI: the Casual Conversations dataset
Figure 4 for Towards measuring fairness in AI: the Casual Conversations dataset
Viaarxiv icon

Adversarial Evaluation of Multimodal Models under Realistic Gray Box Assumption

Add code
Nov 26, 2020
Figure 1 for Adversarial Evaluation of Multimodal Models under Realistic Gray Box Assumption
Figure 2 for Adversarial Evaluation of Multimodal Models under Realistic Gray Box Assumption
Figure 3 for Adversarial Evaluation of Multimodal Models under Realistic Gray Box Assumption
Figure 4 for Adversarial Evaluation of Multimodal Models under Realistic Gray Box Assumption
Viaarxiv icon

Adversarial Threats to DeepFake Detection: A Practical Perspective

Add code
Nov 19, 2020
Figure 1 for Adversarial Threats to DeepFake Detection: A Practical Perspective
Figure 2 for Adversarial Threats to DeepFake Detection: A Practical Perspective
Figure 3 for Adversarial Threats to DeepFake Detection: A Practical Perspective
Figure 4 for Adversarial Threats to DeepFake Detection: A Practical Perspective
Viaarxiv icon

Adversarial collision attacks on image hashing functions

Add code
Nov 18, 2020
Figure 1 for Adversarial collision attacks on image hashing functions
Figure 2 for Adversarial collision attacks on image hashing functions
Figure 3 for Adversarial collision attacks on image hashing functions
Figure 4 for Adversarial collision attacks on image hashing functions
Viaarxiv icon