Picture for Shideh Rezaeifar

Shideh Rezaeifar

VolTeMorph: Realtime, Controllable and Generalisable Animation of Volumetric Representations

Add code
Aug 01, 2022
Figure 1 for VolTeMorph: Realtime, Controllable and Generalisable Animation of Volumetric Representations
Figure 2 for VolTeMorph: Realtime, Controllable and Generalisable Animation of Volumetric Representations
Figure 3 for VolTeMorph: Realtime, Controllable and Generalisable Animation of Volumetric Representations
Figure 4 for VolTeMorph: Realtime, Controllable and Generalisable Animation of Volumetric Representations
Viaarxiv icon

Offline Reinforcement Learning as Anti-Exploration

Add code
Jun 11, 2021
Figure 1 for Offline Reinforcement Learning as Anti-Exploration
Figure 2 for Offline Reinforcement Learning as Anti-Exploration
Figure 3 for Offline Reinforcement Learning as Anti-Exploration
Figure 4 for Offline Reinforcement Learning as Anti-Exploration
Viaarxiv icon

Offline Reinforcement Learning with Pseudometric Learning

Add code
Mar 02, 2021
Figure 1 for Offline Reinforcement Learning with Pseudometric Learning
Figure 2 for Offline Reinforcement Learning with Pseudometric Learning
Figure 3 for Offline Reinforcement Learning with Pseudometric Learning
Figure 4 for Offline Reinforcement Learning with Pseudometric Learning
Viaarxiv icon

Information bottleneck through variational glasses

Add code
Dec 05, 2019
Figure 1 for Information bottleneck through variational glasses
Figure 2 for Information bottleneck through variational glasses
Figure 3 for Information bottleneck through variational glasses
Figure 4 for Information bottleneck through variational glasses
Viaarxiv icon

$ρ$-VAE: Autoregressive parametrization of the VAE encoder

Add code
Sep 13, 2019
Figure 1 for $ρ$-VAE: Autoregressive parametrization of the VAE encoder
Figure 2 for $ρ$-VAE: Autoregressive parametrization of the VAE encoder
Figure 3 for $ρ$-VAE: Autoregressive parametrization of the VAE encoder
Figure 4 for $ρ$-VAE: Autoregressive parametrization of the VAE encoder
Viaarxiv icon

Robustification of deep net classifiers by key based diversified aggregation with pre-filtering

Add code
May 14, 2019
Figure 1 for Robustification of deep net classifiers by key based diversified aggregation with pre-filtering
Figure 2 for Robustification of deep net classifiers by key based diversified aggregation with pre-filtering
Figure 3 for Robustification of deep net classifiers by key based diversified aggregation with pre-filtering
Figure 4 for Robustification of deep net classifiers by key based diversified aggregation with pre-filtering
Viaarxiv icon

Reconstruction of Privacy-Sensitive Data from Protected Templates

Add code
May 08, 2019
Figure 1 for Reconstruction of Privacy-Sensitive Data from Protected Templates
Figure 2 for Reconstruction of Privacy-Sensitive Data from Protected Templates
Figure 3 for Reconstruction of Privacy-Sensitive Data from Protected Templates
Viaarxiv icon

Defending against adversarial attacks by randomized diversification

Add code
Apr 01, 2019
Figure 1 for Defending against adversarial attacks by randomized diversification
Figure 2 for Defending against adversarial attacks by randomized diversification
Figure 3 for Defending against adversarial attacks by randomized diversification
Figure 4 for Defending against adversarial attacks by randomized diversification
Viaarxiv icon

Classification by Re-generation: Towards Classification Based on Variational Inference

Add code
Sep 10, 2018
Figure 1 for Classification by Re-generation: Towards Classification Based on Variational Inference
Figure 2 for Classification by Re-generation: Towards Classification Based on Variational Inference
Figure 3 for Classification by Re-generation: Towards Classification Based on Variational Inference
Figure 4 for Classification by Re-generation: Towards Classification Based on Variational Inference
Viaarxiv icon

Bridging machine learning and cryptography in defence against adversarial attacks

Add code
Sep 05, 2018
Figure 1 for Bridging machine learning and cryptography in defence against adversarial attacks
Figure 2 for Bridging machine learning and cryptography in defence against adversarial attacks
Figure 3 for Bridging machine learning and cryptography in defence against adversarial attacks
Figure 4 for Bridging machine learning and cryptography in defence against adversarial attacks
Viaarxiv icon