Alert button
Picture for Nurislam Tursynbek

Nurislam Tursynbek

Alert button

Unsupervised Discovery of 3D Hierarchical Structure with Generative Diffusion Features

Add code
Bookmark button
Alert button
Apr 28, 2023
Nurislam Tursynbek, Marc Niethammer

Figure 1 for Unsupervised Discovery of 3D Hierarchical Structure with Generative Diffusion Features
Figure 2 for Unsupervised Discovery of 3D Hierarchical Structure with Generative Diffusion Features
Figure 3 for Unsupervised Discovery of 3D Hierarchical Structure with Generative Diffusion Features
Figure 4 for Unsupervised Discovery of 3D Hierarchical Structure with Generative Diffusion Features
Viaarxiv icon

Smoothed Embeddings for Certified Few-Shot Learning

Add code
Bookmark button
Alert button
Feb 02, 2022
Mikhail Pautov, Olesya Kuznetsova, Nurislam Tursynbek, Aleksandr Petiushko, Ivan Oseledets

Figure 1 for Smoothed Embeddings for Certified Few-Shot Learning
Figure 2 for Smoothed Embeddings for Certified Few-Shot Learning
Figure 3 for Smoothed Embeddings for Certified Few-Shot Learning
Figure 4 for Smoothed Embeddings for Certified Few-Shot Learning
Viaarxiv icon

CC-Cert: A Probabilistic Approach to Certify General Robustness of Neural Networks

Add code
Bookmark button
Alert button
Sep 22, 2021
Mikhail Pautov, Nurislam Tursynbek, Marina Munkhoeva, Nikita Muravev, Aleksandr Petiushko, Ivan Oseledets

Figure 1 for CC-Cert: A Probabilistic Approach to Certify General Robustness of Neural Networks
Figure 2 for CC-Cert: A Probabilistic Approach to Certify General Robustness of Neural Networks
Figure 3 for CC-Cert: A Probabilistic Approach to Certify General Robustness of Neural Networks
Figure 4 for CC-Cert: A Probabilistic Approach to Certify General Robustness of Neural Networks
Viaarxiv icon

Robustness Threats of Differential Privacy

Add code
Bookmark button
Alert button
Dec 14, 2020
Nurislam Tursynbek, Aleksandr Petiushko, Ivan Oseledets

Figure 1 for Robustness Threats of Differential Privacy
Figure 2 for Robustness Threats of Differential Privacy
Figure 3 for Robustness Threats of Differential Privacy
Figure 4 for Robustness Threats of Differential Privacy
Viaarxiv icon

Adversarial Turing Patterns from Cellular Automata

Add code
Bookmark button
Alert button
Nov 18, 2020
Nurislam Tursynbek, Ilya Vilkoviskiy, Maria Sindeeva, Ivan Oseledets

Figure 1 for Adversarial Turing Patterns from Cellular Automata
Figure 2 for Adversarial Turing Patterns from Cellular Automata
Figure 3 for Adversarial Turing Patterns from Cellular Automata
Figure 4 for Adversarial Turing Patterns from Cellular Automata
Viaarxiv icon

Black-Box Face Recovery from Identity Features

Add code
Bookmark button
Alert button
Jul 30, 2020
Anton Razzhigaev, Klim Kireev, Edgar Kaziakhmedov, Nurislam Tursynbek, Aleksandr Petiushko

Figure 1 for Black-Box Face Recovery from Identity Features
Figure 2 for Black-Box Face Recovery from Identity Features
Figure 3 for Black-Box Face Recovery from Identity Features
Figure 4 for Black-Box Face Recovery from Identity Features
Viaarxiv icon

Follow the bisector: a simple method for multi-objective optimization

Add code
Bookmark button
Alert button
Jul 14, 2020
Alexandr Katrutsa, Daniil Merkulov, Nurislam Tursynbek, Ivan Oseledets

Viaarxiv icon

Geometry-Inspired Top-k Adversarial Perturbations

Add code
Bookmark button
Alert button
Jun 28, 2020
Nurislam Tursynbek, Aleksandr Petiushko, Ivan Oseledets

Figure 1 for Geometry-Inspired Top-k Adversarial Perturbations
Figure 2 for Geometry-Inspired Top-k Adversarial Perturbations
Figure 3 for Geometry-Inspired Top-k Adversarial Perturbations
Figure 4 for Geometry-Inspired Top-k Adversarial Perturbations
Viaarxiv icon