Avital Shafran (@avitalshafran) 's Twitter Profile
Avital Shafran

@avitalshafran

PhD Student @CseHuji • Trustworthy and Secure ML

ID: 1200312158573285376

linkhttp://avital.shafran.co.il calendar_today29-11-2019 07:15:13

54 Tweet

160 Takipçi

158 Takip Edilen

Dvir Samuel (@dvir_samuel) 's Twitter Profile Photo

Thrilled to share that our paper, "Where's Waldo: Diffusion Features for Personalized Segmentation and Retrieval" has been accepted to NeurIPS 2024! 🎉 Paper: arxiv.org/abs/2405.18025 Project Page: dvirsamuel.github.io/pdm.github.io/ #NeurIPS2024 Gal Chechik Rami Ben-Ari Matan Levy

Thrilled to share that our paper, "Where's Waldo: Diffusion Features for Personalized Segmentation and Retrieval" has been accepted to NeurIPS 2024! 🎉
Paper: arxiv.org/abs/2405.18025
Project Page: dvirsamuel.github.io/pdm.github.io/
#NeurIPS2024
 <a href="/GalChechik/">Gal Chechik</a> <a href="/RamiBenAri1/">Rami Ben-Ari</a> <a href="/MatanLvy/">Matan Levy</a>
Omri Avrahami (@omriavr) 's Twitter Profile Photo

[1/10] 🚨 We present our recent Snap Inc. project: Stable Flow --- A training-free method that performs various types of image editing operations (e.g., non-rigid editing, object addition and replacement) using flow models. Project page: omriavrahami.com/stable-flow

Or Tal (@or__tal) 's Twitter Profile Photo

Release Announcement!📢💣 🥁🎷JASCO 🎶🪇 training & inference code + model weights are out! Paper📜: arxiv.org/abs/2406.10970 Samples🔊: pages.cs.huji.ac.il/adiyoss-lab/JA… Code🐍: github.com/facebookresear… Models🤗: huggingface.co/facebook/jasco… Alon Ziv Itai Gat Felix Kreuk Yossi Adi

Matan Levy (@matanlvy) 's Twitter Profile Photo

Who recognizes where it is? 🔥 Excited to share that our paper, led by Issar Tzachor, "EffoVPR: Effective Foundation Model Utilization for Visual Place Recognition," has been accepted at #ICLR2025! The VPR task aims to answer this question ⬇️

Who recognizes where it is?

🔥 Excited to share that our paper, led by Issar Tzachor, "EffoVPR: Effective Foundation Model Utilization for Visual Place Recognition," has been accepted at #ICLR2025!

The VPR task aims to answer this question ⬇️
Gallil Maimon (@gallilmaimon) 's Twitter Profile Photo

🗣️🧠 Speech Language Models require lots of compute to train, right? In our new paper, we test is it possible to train an SLM on 1xA5000 gpu in 24 hours? The results may surprise you (they even surprised us)! Tips, open source resources, full paper 👇🏻

🗣️🧠 Speech Language Models require lots of compute to train, right? 
In our new paper, we test is it possible to train an SLM on 1xA5000 gpu in 24 hours? 
The results may surprise you (they even surprised us)!
Tips, open source resources, full paper 👇🏻
Eliya Habba (@eliyahabba) 's Twitter Profile Photo

Care about LLM evaluation? 🤖 🤔 We bring you🕊️ DOVE a massive (250M!) collection of LLMs outputs On different prompts, domains, tokens, models... Join our community effort to expand it with YOUR model predictions & become a co-author!

Niv Cohen (@cohniv) 's Twitter Profile Photo

In our #ICLR2025 paper, we introduce WIND 🌬️ A method that embeds a distortion watermark directly in the diffusion noise! Our method ensures that the watermark in one image does not reveal information about the watermark in other images 🤫 📝 arxiv.org/abs/2412.04653 (1/5)

In our #ICLR2025 paper, we introduce WIND 🌬️  
A method that embeds a distortion watermark directly in the diffusion noise! Our method ensures that the watermark in one image does not reveal information about the watermark in other images 🤫
📝 arxiv.org/abs/2412.04653

(1/5)
Anubhav Jain (@anubhavj480) 's Twitter Profile Photo

Think your latent-noise diffusion watermarking method is robust? Think again! We show that they are susceptible to adversarial attacks that only require one watermarked example and an off-the-shelf encoder. This attack can forge and remove the watermark with very high accuracy

Think your latent-noise diffusion watermarking method is robust? Think again! 

We show that they are susceptible to adversarial attacks that only require one watermarked example and an off-the-shelf encoder. This attack can forge and remove the watermark with very high accuracy
Kevin Lu (@kevinlu4588) 's Twitter Profile Photo

When we "erase" a concept from a diffusion model, is that knowledge truly gone? 🤔 We investigated, and the answer is often 'no'! Using simple probing techniques, the knowledge traces of the erased concept can be easily resurfaced 🔍 Here is what we learned 🧵👇

When we "erase" a concept from a diffusion model, is that knowledge truly gone? 🤔

We investigated, and the answer is often 'no'!

Using simple probing techniques, the knowledge traces of the erased concept can be easily resurfaced 🔍

Here is what we learned 🧵👇