Skip to main content

Showing 1–50 of 59 results for author: Hoshen, Y

Searching in archive cs. Search in all archives.
.
  1. LightLab: Controlling Light Sources in Images with Diffusion Models

    Authors: Nadav Magar, Amir Hertz, Eric Tabellion, Yael Pritch, Alex Rav-Acha, Ariel Shamir, Yedid Hoshen

    Abstract: We present a simple, yet effective diffusion-based method for fine-grained, parametric control over light sources in an image. Existing relighting methods either rely on multiple input views to perform inverse rendering at inference time, or fail to provide explicit control over light changes. Our method fine-tunes a diffusion model on a small set of real raw photograph pairs, supplemented by synt… ▽ More

    Submitted 14 May, 2025; originally announced May 2025.

    Comments: Project Page: https://nadmag.github.io/LightLab/

  2. arXiv:2503.10633  [pdf, ps, other

    cs.LG cs.CL cs.CV

    We Should Chart an Atlas of All the World's Models

    Authors: Eliahu Horwitz, Nitzan Kurer, Jonathan Kahana, Liel Amar, Yedid Hoshen

    Abstract: Public model repositories now contain millions of models, yet most models remain undocumented and effectively lost. In this position paper, we advocate for charting the world's model population in a unified structure we call the Model Atlas: a graph that captures models, their attributes, and the weight transformations that connect them. The Model Atlas enables applications in model forensics, met… ▽ More

    Submitted 3 June, 2025; v1 submitted 13 March, 2025; originally announced March 2025.

    Comments: Project page: https://horwitz.ai/model-atlas

  3. arXiv:2502.09619  [pdf, other

    cs.LG cs.CV

    Can this Model Also Recognize Dogs? Zero-Shot Model Search from Weights

    Authors: Jonathan Kahana, Or Nathan, Eliahu Horwitz, Yedid Hoshen

    Abstract: With the increasing numbers of publicly available models, there are probably pretrained, online models for most tasks users require. However, current model search methods are rudimentary, essentially a text-based search in the documentation, thus users cannot find the relevant models. This paper presents ProbeLog, a method for retrieving classification models that can recognize a target concept, s… ▽ More

    Submitted 13 February, 2025; originally announced February 2025.

  4. arXiv:2412.08645  [pdf, other

    cs.CV

    ObjectMate: A Recurrence Prior for Object Insertion and Subject-Driven Generation

    Authors: Daniel Winter, Asaf Shul, Matan Cohen, Dana Berman, Yael Pritch, Alex Rav-Acha, Yedid Hoshen

    Abstract: This paper introduces a tuning-free method for both object insertion and subject-driven generation. The task involves composing an object, given multiple views, into a scene specified by either an image or text. Existing methods struggle to fully meet the task's challenging objectives: (i) seamlessly composing the object into the scene with photorealistic pose and lighting, and (ii) preserving the… ▽ More

    Submitted 11 December, 2024; originally announced December 2024.

  5. arXiv:2410.13569  [pdf, ps, other

    cs.LG cs.CV

    Learning on Model Weights using Tree Experts

    Authors: Eliahu Horwitz, Bar Cavia, Jonathan Kahana, Yedid Hoshen

    Abstract: The number of publicly available models is rapidly increasing, yet most remain undocumented. Users looking for suitable models for their tasks must first determine what each model does. Training machine learning models to infer missing documentation directly from model weights is challenging, as these weights often contain significant variation unrelated to model functionality (denoted nuisance).… ▽ More

    Submitted 3 June, 2025; v1 submitted 17 October, 2024; originally announced October 2024.

    Comments: CVPR 2025. Project page: https://horwitz.ai/probex/

  6. arXiv:2410.10811  [pdf, other

    cs.LG cs.CV

    Deep Linear Probe Generators for Weight Space Learning

    Authors: Jonathan Kahana, Eliahu Horwitz, Imri Shuval, Yedid Hoshen

    Abstract: Weight space learning aims to extract information about a neural network, such as its training dataset or generalization error. Recent approaches learn directly from model weights, but this presents many challenges as weights are high-dimensional and include permutation symmetries between neurons. An alternative approach, Probing, represents a model by passing a set of learned inputs (probes) thro… ▽ More

    Submitted 14 October, 2024; originally announced October 2024.

  7. arXiv:2406.19395  [pdf, other

    cs.CV

    Dataset Size Recovery from LoRA Weights

    Authors: Mohammad Salama, Jonathan Kahana, Eliahu Horwitz, Yedid Hoshen

    Abstract: Model inversion and membership inference attacks aim to reconstruct and verify the data which a model was trained on. However, they are not guaranteed to find all training samples as they do not know the size of the training set. In this paper, we introduce a new task: dataset size recovery, that aims to determine the number of samples used to train a model, directly from its weights. We then prop… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

  8. arXiv:2406.09398  [pdf, other

    cs.CV

    Real-Time Deepfake Detection in the Real-World

    Authors: Bar Cavia, Eliahu Horwitz, Tal Reiss, Yedid Hoshen

    Abstract: Recent improvements in generative AI made synthesizing fake images easy; as they can be used to cause harm, it is crucial to develop accurate techniques to identify them. This paper introduces "Locally Aware Deepfake Detection Algorithm" (LaDeDa), that accepts a single 9x9 image patch and outputs its deepfake score. The image deepfake score is the pooled score of its patches. With merely patch-lev… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  9. arXiv:2405.20341  [pdf, other

    cs.LG cs.CL

    From Zero to Hero: Cold-Start Anomaly Detection

    Authors: Tal Reiss, George Kour, Naama Zwerdling, Ateret Anaby-Tavor, Yedid Hoshen

    Abstract: When first deploying an anomaly detection system, e.g., to detect out-of-scope queries in chatbots, there are no observed data, making data-driven approaches ineffective. Zero-shot anomaly detection methods offer a solution to such "cold-start" cases, but unfortunately they are often not accurate enough. This paper studies the realistic but underexplored cold-start setting where an anomaly detecti… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: ACL 2024. Our code is available at https://github.com/talreiss/ColdFusion

  10. arXiv:2405.18432  [pdf, other

    cs.LG

    Unsupervised Model Tree Heritage Recovery

    Authors: Eliahu Horwitz, Asaf Shul, Yedid Hoshen

    Abstract: The number of models shared online has recently skyrocketed, with over one million public models available on Hugging Face. Sharing models allows other users to build on existing models, using them as initialization for fine-tuning, improving accuracy, and saving compute and energy. However, it also raises important intellectual property issues, as fine-tuning may violate the license terms of the… ▽ More

    Submitted 15 April, 2025; v1 submitted 28 May, 2024; originally announced May 2024.

    Comments: ICLR 2025. Project page: https://horwitz.ai/mother

  11. arXiv:2403.18818  [pdf, other

    cs.CV

    ObjectDrop: Bootstrapping Counterfactuals for Photorealistic Object Removal and Insertion

    Authors: Daniel Winter, Matan Cohen, Shlomi Fruchter, Yael Pritch, Alex Rav-Acha, Yedid Hoshen

    Abstract: Diffusion models have revolutionized image editing but often generate images that violate physical laws, particularly the effects of objects on the scene, e.g., occlusions, shadows, and reflections. By analyzing the limitations of self-supervised approaches, we propose a practical solution centered on a \q{counterfactual} dataset. Our method involves capturing a scene before and after removing a s… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  12. arXiv:2403.12040  [pdf, other

    cs.CV

    Distilling Datasets Into Less Than One Image

    Authors: Asaf Shul, Eliahu Horwitz, Yedid Hoshen

    Abstract: Dataset distillation aims to compress a dataset into a much smaller one so that a model trained on the distilled dataset achieves high accuracy. Current methods frame this as maximizing the distilled classification accuracy for a budget of K distilled images-per-class, where K is a positive integer. In this paper, we push the boundaries of dataset distillation, compressing the dataset into less th… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  13. arXiv:2402.10208  [pdf, other

    cs.LG cs.CL cs.CR cs.CV

    Recovering the Pre-Fine-Tuning Weights of Generative Models

    Authors: Eliahu Horwitz, Jonathan Kahana, Yedid Hoshen

    Abstract: The dominant paradigm in generative modeling consists of two steps: i) pre-training on a large-scale but unsafe dataset, ii) aligning the pre-trained model with human values via fine-tuning. This practice is considered safe, as no current method can recover the unsafe, pre-fine-tuning model weights. In this paper, we demonstrate that this assumption is often false. Concretely, we present Spectral… ▽ More

    Submitted 1 July, 2024; v1 submitted 15 February, 2024; originally announced February 2024.

    Comments: ICML 2024. Project page: https://vision.huji.ac.il/spectral_detuning/

  14. arXiv:2402.05934  [pdf, other

    cs.LG cs.SI

    Classifying Nodes in Graphs without GNNs

    Authors: Daniel Winter, Niv Cohen, Yedid Hoshen

    Abstract: Graph neural networks (GNNs) are the dominant paradigm for classifying nodes in a graph, but they have several undesirable attributes stemming from their message passing architecture. Recently, distillation methods succeeded in eliminating the use of GNNs at test time but they still require them during training. We perform a careful analysis of the role that GNNs play in distillation methods. This… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  15. arXiv:2311.14773  [pdf, other

    cs.CV cs.LG

    Set Features for Anomaly Detection

    Authors: Niv Cohen, Issar Tzachor, Yedid Hoshen

    Abstract: This paper proposes to use set features for detecting anomalies in samples that consist of unusual combinations of normal elements. Many leading methods discover anomalies by detecting an unusual part of a sample. For example, state-of-the-art segmentation-based approaches, first classify each element of the sample (e.g., image patch) as normal or anomalous and then classify the entire sample as a… ▽ More

    Submitted 18 March, 2025; v1 submitted 24 November, 2023; originally announced November 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2302.12245

  16. arXiv:2311.01458  [pdf, other

    cs.CV cs.LG

    Detecting Deepfakes Without Seeing Any

    Authors: Tal Reiss, Bar Cavia, Yedid Hoshen

    Abstract: Deepfake attacks, malicious manipulation of media containing people, are a serious concern for society. Conventional deepfake detection methods train supervised classifiers to distinguish real media from previously encountered deepfakes. Such techniques can only detect deepfakes similar to those previously seen, but not zero-day (previously unseen) attack types. As current deepfake generation tech… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

    Comments: Our code is available at https://github.com/talreiss/FACTOR

  17. arXiv:2307.11085  [pdf, ps, other

    cs.LG cs.CV

    Representation Learning in Anomaly Detection: Successes, Limits and a Grand Challenge

    Authors: Yedid Hoshen

    Abstract: In this perspective paper, we argue that the dominant paradigm in anomaly detection cannot scale indefinitely and will eventually hit fundamental limits. This is due to the a no free lunch principle for anomaly detection. These limitations can be overcome when there are strong tasks priors, as is the case for many industrial tasks. When such priors do not exists, the task is much harder for anomal… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

    Comments: Keynote talk at the Visual Anomaly and Novelty Detection Workshop, CVPR'23

  18. arXiv:2306.07284  [pdf, other

    cs.LG cs.CV

    No Free Lunch: The Hazards of Over-Expressive Representations in Anomaly Detection

    Authors: Tal Reiss, Niv Cohen, Yedid Hoshen

    Abstract: Anomaly detection methods, powered by deep learning, have recently been making significant progress, mostly due to improved representations. It is tempting to hypothesize that anomaly detection can improve indefinitely by increasing the scale of our networks, making their representations more expressive. In this paper, we provide theoretical and empirical evidence to the contrary. In fact, we empi… ▽ More

    Submitted 12 June, 2023; originally announced June 2023.

  19. arXiv:2304.00993  [pdf, other

    eess.AS cs.CL cs.LG cs.SD

    Unsupervised Word Segmentation Using Temporal Gradient Pseudo-Labels

    Authors: Tzeviya Sylvia Fuchs, Yedid Hoshen

    Abstract: Unsupervised word segmentation in audio utterances is challenging as, in speech, there is typically no gap between words. In a preliminary experiment, we show that recent deep self-supervised features are very effective for word segmentation but require supervision for training the classification head. To extend their effectiveness to unsupervised word segmentation, we propose a pseudo-labeling st… ▽ More

    Submitted 30 March, 2023; originally announced April 2023.

    Comments: ICASSP 2023

  20. arXiv:2302.12245  [pdf, other

    cs.CV cs.LG

    Set Features for Fine-grained Anomaly Detection

    Authors: Niv Cohen, Issar Tzachor, Yedid Hoshen

    Abstract: Fine-grained anomaly detection has recently been dominated by segmentation based approaches. These approaches first classify each element of the sample (e.g., image patch) as normal or anomalous and then classify the entire sample as anomalous if it contains anomalous elements. However, such approaches do not extend to scenarios where the anomalies are expressed by an unusual combination of normal… ▽ More

    Submitted 2 March, 2023; v1 submitted 23 February, 2023; originally announced February 2023.

  21. arXiv:2302.01329  [pdf, other

    cs.CV

    Dreamix: Video Diffusion Models are General Video Editors

    Authors: Eyal Molad, Eliahu Horwitz, Dani Valevski, Alex Rav Acha, Yossi Matias, Yael Pritch, Yaniv Leviathan, Yedid Hoshen

    Abstract: Text-driven image and video diffusion models have recently achieved unprecedented generation realism. While diffusion models have been successfully applied for image editing, very few works have done so for video editing. We present the first diffusion-based method that is able to perform text-based motion and appearance editing of general videos. Our approach uses a video diffusion model to combi… ▽ More

    Submitted 2 February, 2023; originally announced February 2023.

  22. arXiv:2212.00789  [pdf, other

    cs.CV cs.LG

    An Attribute-based Method for Video Anomaly Detection

    Authors: Tal Reiss, Yedid Hoshen

    Abstract: Video anomaly detection (VAD) identifies suspicious events in videos, which is critical for crime prevention and homeland security. In this paper, we propose a simple but highly effective VAD method that relies on attribute-based representations. The base version of our method represents every object by its velocity and pose, and computes anomaly scores by density estimation. Surprisingly, this si… ▽ More

    Submitted 26 January, 2025; v1 submitted 1 December, 2022; originally announced December 2022.

    Comments: TMLR 2025. Our code is available at https://github.com/talreiss/Accurate-Interpretable-VAD

  23. arXiv:2212.00784  [pdf, other

    cs.CV cs.LG

    Improving Zero-Shot Models with Label Distribution Priors

    Authors: Jonathan Kahana, Niv Cohen, Yedid Hoshen

    Abstract: Labeling large image datasets with attributes such as facial age or object type is tedious and sometimes infeasible. Supervised machine learning methods provide a highly accurate solution, but require manual labels which are often unavailable. Zero-shot models (e.g., CLIP) do not require manual labels but are not as accurate as supervised ones, particularly when the attribute is numeric. We propos… ▽ More

    Submitted 1 December, 2022; originally announced December 2022.

  24. arXiv:2211.09795  [pdf, other

    cs.CV

    Conffusion: Confidence Intervals for Diffusion Models

    Authors: Eliahu Horwitz, Yedid Hoshen

    Abstract: Diffusion models have become the go-to method for many generative tasks, particularly for image-to-image generation tasks such as super-resolution and inpainting. Current diffusion-based methods do not provide statistical guarantees regarding the generated results, often preventing their use in high-stakes situations. To bridge this gap, we construct a confidence interval around each generated pix… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

  25. arXiv:2210.10773  [pdf, other

    cs.LG cs.CV

    Anomaly Detection Requires Better Representations

    Authors: Tal Reiss, Niv Cohen, Eliahu Horwitz, Ron Abutbul, Yedid Hoshen

    Abstract: Anomaly detection seeks to identify unusual phenomena, a central task in science and industry. The task is inherently unsupervised as anomalies are unexpected and unknown during training. Recent advances in self-supervised representation learning have directly driven improvements in anomaly detection. In this position paper, we first explain how self-supervised representations can be easily used t… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

    Comments: Accepted to ECCV SSLWIN Workshop (2022)

  26. arXiv:2207.03478  [pdf, other

    cs.CV cs.LG

    Red PANDA: Disambiguating Anomaly Detection by Removing Nuisance Factors

    Authors: Niv Cohen, Jonathan Kahana, Yedid Hoshen

    Abstract: Anomaly detection methods strive to discover patterns that differ from the norm in a semantic way. This goal is ambiguous as a data point differing from the norm by an attribute e.g., age, race or gender, may be considered anomalous by some operators while others may consider this attribute irrelevant. Breaking from previous research, we present a new anomaly detection method that allows operators… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

  27. arXiv:2204.13094  [pdf, other

    cs.SD eess.AS

    Unsupervised Word Segmentation using K Nearest Neighbors

    Authors: Tzeviya Sylvia Fuchs, Yedid Hoshen, Joseph Keshet

    Abstract: In this paper, we propose an unsupervised kNN-based approach for word segmentation in speech utterances. Our method relies on self-supervised pre-trained speech representations, and compares each audio segment of a given utterance to its K nearest neighbors within the training set. Our main assumption is that a segment containing more than one word would occur less often than a segment containing… ▽ More

    Submitted 27 April, 2022; originally announced April 2022.

    Comments: Submitted to interspeech 2022

  28. arXiv:2203.11284  [pdf, other

    cs.CV cs.LG

    A Contrastive Objective for Learning Disentangled Representations

    Authors: Jonathan Kahana, Yedid Hoshen

    Abstract: Learning representations of images that are invariant to sensitive or unwanted attributes is important for many tasks including bias removal and cross domain retrieval. Here, our objective is to learn representations that are invariant to the domain (sensitive attribute) for which labels are provided, while being informative over all other image attributes, which are unlabeled. We present a new ap… ▽ More

    Submitted 21 March, 2022; originally announced March 2022.

  29. arXiv:2203.05550  [pdf, other

    cs.CV

    Back to the Feature: Classical 3D Features are (Almost) All You Need for 3D Anomaly Detection

    Authors: Eliahu Horwitz, Yedid Hoshen

    Abstract: Despite significant advances in image anomaly detection and segmentation, few methods use 3D information. We utilize a recently introduced 3D anomaly detection dataset to evaluate whether or not using 3D information is a lost opportunity. First, we present a surprising finding: standard color-only methods outperform all current methods that are explicitly designed to exploit 3D information. This i… ▽ More

    Submitted 28 November, 2022; v1 submitted 10 March, 2022; originally announced March 2022.

    Comments: Project page: https://www.vision.huji.ac.il/3d_ads/

  30. arXiv:2202.04067  [pdf, other

    cs.LG

    Time Series Anomaly Detection by Cumulative Radon Features

    Authors: Yedid Hoshen

    Abstract: Detecting anomalous time series is key for scientific, medical and industrial tasks, but is challenging due to its inherent unsupervised nature. In recent years, progress has been made on this task by learning increasingly more complex features, often using deep neural networks. In this work, we argue that shallow features suffice when combined with distribution distance measures. Our approach mod… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

  31. arXiv:2112.07662  [pdf, other

    cs.CV cs.LG

    Out-of-Distribution Detection Without Class Labels

    Authors: Niv Cohen, Ron Abutbul, Yedid Hoshen

    Abstract: Out-of-distribution detection seeks to identify novelties, samples that deviate from the norm. The task has been found to be quite challenging, particularly in the case where the normal data distribution consists of multiple semantic classes (e.g., multiple object categories). To overcome this challenge, current approaches require manual labeling of the normal images provided during training. In t… ▽ More

    Submitted 22 September, 2022; v1 submitted 14 December, 2021; originally announced December 2021.

    Comments: Accepted to ECCV L2ID Workshop (2022)

  32. arXiv:2112.03185  [pdf, other

    cs.CV

    Semantic Segmentation In-the-Wild Without Seeing Any Segmentation Examples

    Authors: Nir Zabari, Yedid Hoshen

    Abstract: Semantic segmentation is a key computer vision task that has been actively researched for decades. In recent years, supervised methods have reached unprecedented accuracy, however they require many pixel-level annotations for every new class category which is very time-consuming and expensive. Additionally, the ability of current semantic segmentation networks to handle a large number of categorie… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

  33. arXiv:2110.04541  [pdf, other

    cs.CL cs.LG

    The Inductive Bias of In-Context Learning: Rethinking Pretraining Example Design

    Authors: Yoav Levine, Noam Wies, Daniel Jannai, Dan Navon, Yedid Hoshen, Amnon Shashua

    Abstract: Pretraining Neural Language Models (NLMs) over a large corpus involves chunking the text into training examples, which are contiguous text segments of sizes processable by the neural architecture. We highlight a bias introduced by this common practice: we prove that the pretrained NLM can model much stronger dependencies between text segments that appeared in the same training example, than it can… ▽ More

    Submitted 21 March, 2022; v1 submitted 9 October, 2021; originally announced October 2021.

  34. arXiv:2109.06151   

    cs.CV

    Image Shape Manipulation from a Single Augmented Training Sample

    Authors: Yael Vinker, Eliahu Horwitz, Nir Zabari, Yedid Hoshen

    Abstract: In this paper, we present DeepSIM, a generative model for conditional image manipulation based on a single image. We find that extensive augmentation is key for enabling single image training, and incorporate the use of thin-plate-spline (TPS) as an effective augmentation. Our network learns to map between a primitive representation of the image to the image itself. The choice of a primitive repre… ▽ More

    Submitted 25 November, 2021; v1 submitted 13 September, 2021; originally announced September 2021.

    Comments: The paper is available as arXiv:2007.01289 This paper has been withdrawn by the author due to duplication and merged with the existing submission. The project page for the paper is http://www.vision.huji.ac.il/deepsim/

  35. arXiv:2106.15610  [pdf, other

    cs.CV cs.LG

    An Image is Worth More Than a Thousand Words: Towards Disentanglement in the Wild

    Authors: Aviv Gabbay, Niv Cohen, Yedid Hoshen

    Abstract: Unsupervised disentanglement has been shown to be theoretically impossible without inductive biases on the models and the data. As an alternative approach, recent methods rely on limited supervision to disentangle the factors of variation and allow their identifiability. While annotating the true generative factors is only required for a limited number of observations, we argue that it is infeasib… ▽ More

    Submitted 25 October, 2021; v1 submitted 29 June, 2021; originally announced June 2021.

    Comments: NeurIPS 2021. Project page: http://www.vision.huji.ac.il/zerodim

  36. arXiv:2106.03844  [pdf, other

    cs.CV cs.LG

    Mean-Shifted Contrastive Loss for Anomaly Detection

    Authors: Tal Reiss, Yedid Hoshen

    Abstract: Deep anomaly detection methods learn representations that separate between normal and anomalous images. Although self-supervised representation learning is commonly used, small dataset sizes limit its effectiveness. It was previously shown that utilizing external, generic datasets (e.g. ImageNet classification) can significantly improve anomaly detection performance. One approach is outlier exposu… ▽ More

    Submitted 28 November, 2022; v1 submitted 7 June, 2021; originally announced June 2021.

    Comments: AAAI 2023

  37. arXiv:2104.03952  [pdf, other

    cs.CV cs.CL cs.LG

    Dataset Summarization by K Principal Concepts

    Authors: Niv Cohen, Yedid Hoshen

    Abstract: We propose the new task of K principal concept identification for dataset summarizarion. The objective is to find a set of K concepts that best explain the variation within the dataset. Concepts are high-level human interpretable terms such as "tiger", "kayaking" or "happy". The K concepts are selected from a (potentially long) input list of candidates, which we denote the concept-bank. The concep… ▽ More

    Submitted 29 September, 2022; v1 submitted 8 April, 2021; originally announced April 2021.

  38. arXiv:2103.14017  [pdf, other

    cs.CV cs.LG

    Scaling-up Disentanglement for Image Translation

    Authors: Aviv Gabbay, Yedid Hoshen

    Abstract: Image translation methods typically aim to manipulate a set of labeled attributes (given as supervision at training time e.g. domain label) while leaving the unlabeled attributes intact. Current methods achieve either: (i) disentanglement, which exhibits low visual fidelity and can only be satisfied where the attributes are perfectly uncorrelated. (ii) visually-plausible translations, which are cl… ▽ More

    Submitted 8 September, 2021; v1 submitted 25 March, 2021; originally announced March 2021.

    Comments: ICCV 2021. Project page: http://www.vision.huji.ac.il/overlord

  39. arXiv:2102.07762  [pdf, other

    cs.LG cs.CR

    Membership Inference Attacks are Easier on Difficult Problems

    Authors: Avital Shafran, Shmuel Peleg, Yedid Hoshen

    Abstract: Membership inference attacks (MIA) try to detect if data samples were used to train a neural network model, e.g. to detect copyright abuses. We show that models with higher dimensional input and output are more vulnerable to MIA, and address in more detail models for image translation and semantic segmentation, including medical image segmentation. We show that reconstruction-errors can lead to ve… ▽ More

    Submitted 18 August, 2021; v1 submitted 15 February, 2021; originally announced February 2021.

  40. arXiv:2010.05903  [pdf, other

    cs.CV cs.LG

    PANDA: Adapting Pretrained Features for Anomaly Detection and Segmentation

    Authors: Tal Reiss, Niv Cohen, Liron Bergman, Yedid Hoshen

    Abstract: Anomaly detection methods require high-quality features. In recent years, the anomaly detection community has attempted to obtain better features using advances in deep self-supervised feature learning. Surprisingly, a very promising direction, using pretrained deep features, has been mostly overlooked. In this paper, we first empirically establish the perhaps expected, but unreported result, that… ▽ More

    Submitted 12 August, 2021; v1 submitted 12 October, 2020; originally announced October 2020.

    Comments: CVPR 2021

  41. arXiv:2007.04964  [pdf, other

    cs.CV cs.LG

    Improving Style-Content Disentanglement in Image-to-Image Translation

    Authors: Aviv Gabbay, Yedid Hoshen

    Abstract: Unsupervised image-to-image translation methods have achieved tremendous success in recent years. However, it can be easily observed that their models contain significant entanglement which often hurts the translation performance. In this work, we propose a principled approach for improving style-content disentanglement in image-to-image translation. By considering the information flow into each o… ▽ More

    Submitted 9 July, 2020; originally announced July 2020.

    Comments: Project page: http://www.vision.huji.ac.il/style-content-disentanglement

  42. arXiv:2007.01289  [pdf, other

    cs.CV cs.LG

    Image Shape Manipulation from a Single Augmented Training Sample

    Authors: Yael Vinker, Eliahu Horwitz, Nir Zabari, Yedid Hoshen

    Abstract: In this paper, we present DeepSIM, a generative model for conditional image manipulation based on a single image. We find that extensive augmentation is key for enabling single image training, and incorporate the use of thin-plate-spline (TPS) as an effective augmentation. Our network learns to map between a primitive representation of the image to the image itself. The choice of a primitive repre… ▽ More

    Submitted 25 November, 2021; v1 submitted 2 July, 2020; originally announced July 2020.

    Comments: ICCV 2021 (Oral). Project page: http://www.vision.huji.ac.il/deepsim/

  43. arXiv:2005.02359  [pdf, other

    cs.LG cs.CV stat.ML

    Classification-Based Anomaly Detection for General Data

    Authors: Liron Bergman, Yedid Hoshen

    Abstract: Anomaly detection, finding patterns that substantially deviate from those seen previously, is one of the fundamental problems of artificial intelligence. Recently, classification-based methods were shown to achieve superior results on this task. In this work, we present a unifying view and propose an open-set method, GOAD, to relax current generalization assumptions. Furthermore, we extend the app… ▽ More

    Submitted 5 May, 2020; originally announced May 2020.

    Comments: ICLR'20

  44. arXiv:2005.02357  [pdf, other

    cs.CV cs.LG

    Sub-Image Anomaly Detection with Deep Pyramid Correspondences

    Authors: Niv Cohen, Yedid Hoshen

    Abstract: Nearest neighbor (kNN) methods utilizing deep pre-trained features exhibit very strong anomaly detection performance when applied to entire images. A limitation of kNN methods is the lack of segmentation map describing where the anomaly lies inside the image. In this work we present a novel anomaly segmentation approach based on alignment between an anomalous image and a constant number of the sim… ▽ More

    Submitted 3 February, 2021; v1 submitted 5 May, 2020; originally announced May 2020.

  45. arXiv:2004.06014  [pdf, other

    cs.CV cs.LG eess.IV stat.ML

    Training End-to-end Single Image Generators without GANs

    Authors: Yael Vinker, Nir Zabari, Yedid Hoshen

    Abstract: We present AugurOne, a novel approach for training single image generative models. Our approach trains an upscaling neural network using non-affine augmentations of the (single) input image, particularly including non-rigid thin plate spline image warps. The extensive augmentations significantly increase the in-sample distribution for the upsampling network enabling the upscaling of highly variabl… ▽ More

    Submitted 7 April, 2020; originally announced April 2020.

    Comments: Project page: http://www.vision.huji.ac.il/augurone

  46. arXiv:2002.10445  [pdf, other

    cs.LG cs.CV stat.ML

    Deep Nearest Neighbor Anomaly Detection

    Authors: Liron Bergman, Niv Cohen, Yedid Hoshen

    Abstract: Nearest neighbors is a successful and long-standing technique for anomaly detection. Significant progress has been recently achieved by self-supervised deep methods (e.g. RotNet). Self-supervised features however typically under-perform Imagenet pre-trained features. In this work, we investigate whether the recent progress can indeed outperform nearest-neighbor methods operating on an Imagenet pre… ▽ More

    Submitted 24 February, 2020; originally announced February 2020.

  47. arXiv:1911.12322  [pdf, other

    cs.LG cs.CR stat.ML

    Crypto-Oriented Neural Architecture Design

    Authors: Avital Shafran, Gil Segev, Shmuel Peleg, Yedid Hoshen

    Abstract: As neural networks revolutionize many applications, significant privacy conflicts between model users and providers emerge. The cryptography community developed a variety of techniques for secure computation to address such privacy issues. As generic techniques for secure computation are typically prohibitively ineffective, many efforts focus on optimizing their underlying cryptographic tools. Dif… ▽ More

    Submitted 16 February, 2021; v1 submitted 27 November, 2019; originally announced November 2019.

    Comments: Full version (shorter version published in ICASSP'21)

  48. arXiv:1906.11880  [pdf, other

    cs.CV cs.LG stat.ML

    Style Generator Inversion for Image Enhancement and Animation

    Authors: Aviv Gabbay, Yedid Hoshen

    Abstract: One of the main motivations for training high quality image generative models is their potential use as tools for image manipulation. Recently, generative adversarial networks (GANs) have been able to generate images of remarkable quality. Unfortunately, adversarially-trained unconditional generator networks have not been successful as image priors. One of the main requirements for a network to ac… ▽ More

    Submitted 5 June, 2019; originally announced June 2019.

    Comments: Project page: http://www.vision.huji.ac.il/style-image-prior

  49. arXiv:1906.11796  [pdf, other

    cs.LG cs.CV stat.ML

    Demystifying Inter-Class Disentanglement

    Authors: Aviv Gabbay, Yedid Hoshen

    Abstract: Learning to disentangle the hidden factors of variations within a set of observations is a key task for artificial intelligence. We present a unified formulation for class and content disentanglement and use it to illustrate the limitations of current methods. We therefore introduce LORD, a novel method based on Latent Optimization for Representation Disentanglement. We find that latent optimizati… ▽ More

    Submitted 18 February, 2020; v1 submitted 27 June, 2019; originally announced June 2019.

    Comments: ICLR 2020. Project page: http://www.vision.huji.ac.il/lord

  50. arXiv:1812.08985  [pdf, other

    cs.LG cs.CV stat.ML

    Non-Adversarial Image Synthesis with Generative Latent Nearest Neighbors

    Authors: Yedid Hoshen, Jitendra Malik

    Abstract: Unconditional image generation has recently been dominated by generative adversarial networks (GANs). GAN methods train a generator which regresses images from random noise vectors, as well as a discriminator that attempts to differentiate between the generated images and a training set of real images. GANs have shown amazing results at generating realistic looking images. Despite their success, G… ▽ More

    Submitted 21 December, 2018; originally announced December 2018.