Alert button
Picture for Slava Voloshynovskiy

Slava Voloshynovskiy

Alert button

Radio-astronomical Image Reconstruction with Conditional Denoising Diffusion Model

Feb 15, 2024
Mariia Drozdova, Vitaliy Kinakh, Omkar Bait, Olga Taran, Erica Lastufka, Miroslava Dessauges-Zavadsky, Taras Holotyak, Daniel Schaerer, Slava Voloshynovskiy

Viaarxiv icon

TURBO: The Swiss Knife of Auto-Encoders

Nov 11, 2023
Guillaume Quétant, Yury Belousov, Vitaliy Kinakh, Slava Voloshynovskiy

Viaarxiv icon

Stochastic Digital Twin for Copy Detection Patterns

Sep 28, 2023
Yury Belousov, Olga Taran, Vitaliy Kinakh, Slava Voloshynovskiy

Viaarxiv icon

MV-MR: multi-views and multi-representations for self-supervised learning and knowledge distillation

Mar 21, 2023
Vitaliy Kinakh, Mariia Drozdova, Slava Voloshynovskiy

Figure 1 for MV-MR: multi-views and multi-representations for self-supervised learning and knowledge distillation
Figure 2 for MV-MR: multi-views and multi-representations for self-supervised learning and knowledge distillation
Figure 3 for MV-MR: multi-views and multi-representations for self-supervised learning and knowledge distillation
Figure 4 for MV-MR: multi-views and multi-representations for self-supervised learning and knowledge distillation
Viaarxiv icon

Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns

Dec 14, 2022
Joakim Tutt, Olga Taran, Roman Chaban, Brian Pulfer, Yury Belousov, Taras Holotyak, Slava Voloshynovskiy

Figure 1 for Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns
Figure 2 for Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns
Figure 3 for Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns
Figure 4 for Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns
Viaarxiv icon

Digital twins of physical printing-imaging channel

Oct 28, 2022
Yury Belousov, Brian Pulfer, Roman Chaban, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

Figure 1 for Digital twins of physical printing-imaging channel
Figure 2 for Digital twins of physical printing-imaging channel
Figure 3 for Digital twins of physical printing-imaging channel
Figure 4 for Digital twins of physical printing-imaging channel
Viaarxiv icon

Printing variability of copy detection patterns

Oct 11, 2022
Roman Chaban, Olga Taran, Joakim Tutt, Yury Belousov, Brian Pulfer, Taras Holotyak, Slava Voloshynovskiy

Figure 1 for Printing variability of copy detection patterns
Figure 2 for Printing variability of copy detection patterns
Figure 3 for Printing variability of copy detection patterns
Figure 4 for Printing variability of copy detection patterns
Viaarxiv icon

Anomaly localization for copy detection patterns through print estimations

Sep 29, 2022
Brian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

Figure 1 for Anomaly localization for copy detection patterns through print estimations
Figure 2 for Anomaly localization for copy detection patterns through print estimations
Figure 3 for Anomaly localization for copy detection patterns through print estimations
Figure 4 for Anomaly localization for copy detection patterns through print estimations
Viaarxiv icon

Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility

Jul 11, 2022
Behrooz Razeghi, Flavio P. Calmon, Deniz Gunduz, Slava Voloshynovskiy

Figure 1 for Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility
Figure 2 for Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility
Figure 3 for Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility
Figure 4 for Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility
Viaarxiv icon

Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach

Jun 25, 2022
Brian Pulfer, Roman Chaban, Yury Belousov, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

Figure 1 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 2 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 3 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 4 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Viaarxiv icon