Picture for Teddy Furon

Teddy Furon

INRIA

Backdoor Attacks on Deep Learning Face Detection

Add code
Aug 01, 2025
Viaarxiv icon

Survivability of Backdoor Attacks on Unconstrained Face Recognition Systems

Add code
Jul 02, 2025
Viaarxiv icon

Task-Agnostic Attacks Against Vision Foundation Models

Add code
Mar 05, 2025
Figure 1 for Task-Agnostic Attacks Against Vision Foundation Models
Figure 2 for Task-Agnostic Attacks Against Vision Foundation Models
Figure 3 for Task-Agnostic Attacks Against Vision Foundation Models
Figure 4 for Task-Agnostic Attacks Against Vision Foundation Models
Viaarxiv icon

Watermark Anything with Localized Messages

Add code
Nov 11, 2024
Figure 1 for Watermark Anything with Localized Messages
Figure 2 for Watermark Anything with Localized Messages
Figure 3 for Watermark Anything with Localized Messages
Figure 4 for Watermark Anything with Localized Messages
Viaarxiv icon

Evaluation of Security of ML-based Watermarking: Copy and Removal Attacks

Add code
Sep 26, 2024
Figure 1 for Evaluation of Security of ML-based Watermarking: Copy and Removal Attacks
Figure 2 for Evaluation of Security of ML-based Watermarking: Copy and Removal Attacks
Figure 3 for Evaluation of Security of ML-based Watermarking: Copy and Removal Attacks
Figure 4 for Evaluation of Security of ML-based Watermarking: Copy and Removal Attacks
Viaarxiv icon

SWIFT: Semantic Watermarking for Image Forgery Thwarting

Add code
Jul 26, 2024
Viaarxiv icon

Watermarking Makes Language Models Radioactive

Add code
Feb 22, 2024
Figure 1 for Watermarking Makes Language Models Radioactive
Figure 2 for Watermarking Makes Language Models Radioactive
Figure 3 for Watermarking Makes Language Models Radioactive
Figure 4 for Watermarking Makes Language Models Radioactive
Viaarxiv icon

Proactive Detection of Voice Cloning with Localized Watermarking

Add code
Jan 30, 2024
Viaarxiv icon

Three Bricks to Consolidate Watermarks for Large Language Models

Add code
Jul 26, 2023
Viaarxiv icon

How to choose your best allies for a transferable attack?

Add code
Apr 05, 2023
Figure 1 for How to choose your best allies for a transferable attack?
Figure 2 for How to choose your best allies for a transferable attack?
Figure 3 for How to choose your best allies for a transferable attack?
Figure 4 for How to choose your best allies for a transferable attack?
Viaarxiv icon