Alert button
Picture for Slava Voloshynovskiy

Slava Voloshynovskiy

Alert button

Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach

Jun 25, 2022
Brian Pulfer, Roman Chaban, Yury Belousov, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

Figure 1 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 2 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 3 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 4 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Viaarxiv icon

Mobile authentication of copy detection patterns

Mar 04, 2022
Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy

Figure 1 for Mobile authentication of copy detection patterns
Figure 2 for Mobile authentication of copy detection patterns
Figure 3 for Mobile authentication of copy detection patterns
Figure 4 for Mobile authentication of copy detection patterns
Viaarxiv icon

Turbo-Sim: a generalised generative model with a physical latent space

Dec 21, 2021
Guillaume Quétant, Mariia Drozdova, Vitaliy Kinakh, Tobias Golling, Slava Voloshynovskiy

Figure 1 for Turbo-Sim: a generalised generative model with a physical latent space
Figure 2 for Turbo-Sim: a generalised generative model with a physical latent space
Figure 3 for Turbo-Sim: a generalised generative model with a physical latent space
Viaarxiv icon

Information-theoretic stochastic contrastive conditional GAN: InfoSCC-GAN

Dec 17, 2021
Vitaliy Kinakh, Mariia Drozdova, Guillaume Quétant, Tobias Golling, Slava Voloshynovskiy

Figure 1 for Information-theoretic stochastic contrastive conditional GAN: InfoSCC-GAN
Figure 2 for Information-theoretic stochastic contrastive conditional GAN: InfoSCC-GAN
Figure 3 for Information-theoretic stochastic contrastive conditional GAN: InfoSCC-GAN
Figure 4 for Information-theoretic stochastic contrastive conditional GAN: InfoSCC-GAN
Viaarxiv icon

Generation of data on discontinuous manifolds via continuous stochastic non-invertible networks

Dec 17, 2021
Mariia Drozdova, Vitaliy Kinakh, Guillaume Quétant, Tobias Golling, Slava Voloshynovskiy

Figure 1 for Generation of data on discontinuous manifolds via continuous stochastic non-invertible networks
Figure 2 for Generation of data on discontinuous manifolds via continuous stochastic non-invertible networks
Figure 3 for Generation of data on discontinuous manifolds via continuous stochastic non-invertible networks
Figure 4 for Generation of data on discontinuous manifolds via continuous stochastic non-invertible networks
Viaarxiv icon

Funnels: Exact maximum likelihood with dimensionality reduction

Dec 15, 2021
Samuel Klein, John A. Raine, Sebastian Pina-Otey, Slava Voloshynovskiy, Tobias Golling

Figure 1 for Funnels: Exact maximum likelihood with dimensionality reduction
Figure 2 for Funnels: Exact maximum likelihood with dimensionality reduction
Figure 3 for Funnels: Exact maximum likelihood with dimensionality reduction
Figure 4 for Funnels: Exact maximum likelihood with dimensionality reduction
Viaarxiv icon

Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?

Oct 06, 2021
Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy

Figure 1 for Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
Figure 2 for Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
Figure 3 for Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
Figure 4 for Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
Viaarxiv icon

Variational Leakage: The Role of Information Complexity in Privacy Leakage

Jun 08, 2021
Amir Ahooye Atashin, Behrooz Razeghi, Deniz Gündüz, Slava Voloshynovskiy

Figure 1 for Variational Leakage: The Role of Information Complexity in Privacy Leakage
Figure 2 for Variational Leakage: The Role of Information Complexity in Privacy Leakage
Figure 3 for Variational Leakage: The Role of Information Complexity in Privacy Leakage
Figure 4 for Variational Leakage: The Role of Information Complexity in Privacy Leakage
Viaarxiv icon