Alert button
Picture for Tomáš Pevný

Tomáš Pevný

Alert button

CTU

Leveraging Data Geometry to Mitigate CSM in Steganalysis

Add code
Bookmark button
Alert button
Oct 06, 2023
Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomáš Pevný

Figure 1 for Leveraging Data Geometry to Mitigate CSM in Steganalysis
Figure 2 for Leveraging Data Geometry to Mitigate CSM in Steganalysis
Figure 3 for Leveraging Data Geometry to Mitigate CSM in Steganalysis
Figure 4 for Leveraging Data Geometry to Mitigate CSM in Steganalysis
Viaarxiv icon

NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios

Add code
Bookmark button
Alert button
May 26, 2023
Jaromír Janisch, Tomáš Pevný, Viliam Lisý

Figure 1 for NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios
Figure 2 for NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios
Figure 3 for NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios
Figure 4 for NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios
Viaarxiv icon

Is AUC the best measure for practical comparison of anomaly detectors?

Add code
Bookmark button
Alert button
May 08, 2023
Vít Škvára, Tomáš Pevný, Václav Šmídl

Figure 1 for Is AUC the best measure for practical comparison of anomaly detectors?
Figure 2 for Is AUC the best measure for practical comparison of anomaly detectors?
Figure 3 for Is AUC the best measure for practical comparison of anomaly detectors?
Figure 4 for Is AUC the best measure for practical comparison of anomaly detectors?
Viaarxiv icon

Using Set Covering to Generate Databases for Holistic Steganalysis

Add code
Bookmark button
Alert button
Nov 07, 2022
Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomáš Pevný

Figure 1 for Using Set Covering to Generate Databases for Holistic Steganalysis
Figure 2 for Using Set Covering to Generate Databases for Holistic Steganalysis
Figure 3 for Using Set Covering to Generate Databases for Holistic Steganalysis
Figure 4 for Using Set Covering to Generate Databases for Holistic Steganalysis
Viaarxiv icon

Explaining Classifiers Trained on Raw Hierarchical Multiple-Instance Data

Add code
Bookmark button
Alert button
Aug 04, 2022
Tomáš Pevný, Viliam Lisý, Branislav Bošanský, Petr Somol, Michal Pěchouček

Figure 1 for Explaining Classifiers Trained on Raw Hierarchical Multiple-Instance Data
Figure 2 for Explaining Classifiers Trained on Raw Hierarchical Multiple-Instance Data
Figure 3 for Explaining Classifiers Trained on Raw Hierarchical Multiple-Instance Data
Figure 4 for Explaining Classifiers Trained on Raw Hierarchical Multiple-Instance Data
Viaarxiv icon

Fitting large mixture models using stochastic component selection

Add code
Bookmark button
Alert button
Oct 10, 2021
Milan Papež, Tomáš Pevný, Václav Šmídl

Figure 1 for Fitting large mixture models using stochastic component selection
Figure 2 for Fitting large mixture models using stochastic component selection
Figure 3 for Fitting large mixture models using stochastic component selection
Figure 4 for Fitting large mixture models using stochastic component selection
Viaarxiv icon

Mapping the Internet: Modelling Entity Interactions in Complex Heterogeneous Networks

Add code
Bookmark button
Alert button
Apr 19, 2021
Šimon Mandlík, Tomáš Pevný

Figure 1 for Mapping the Internet: Modelling Entity Interactions in Complex Heterogeneous Networks
Figure 2 for Mapping the Internet: Modelling Entity Interactions in Complex Heterogeneous Networks
Figure 3 for Mapping the Internet: Modelling Entity Interactions in Complex Heterogeneous Networks
Figure 4 for Mapping the Internet: Modelling Entity Interactions in Complex Heterogeneous Networks
Viaarxiv icon

Comparison of Anomaly Detectors: Context Matters

Add code
Bookmark button
Alert button
Dec 18, 2020
Vít Škvára, Jan Franců, Matěj Zorek, Tomáš Pevný, Václav Šmídl

Figure 1 for Comparison of Anomaly Detectors: Context Matters
Figure 2 for Comparison of Anomaly Detectors: Context Matters
Figure 3 for Comparison of Anomaly Detectors: Context Matters
Figure 4 for Comparison of Anomaly Detectors: Context Matters
Viaarxiv icon

Symbolic Relational Deep Reinforcement Learning based on Graph Neural Networks

Add code
Bookmark button
Alert button
Sep 25, 2020
Jaromír Janisch, Tomáš Pevný, Viliam Lisý

Figure 1 for Symbolic Relational Deep Reinforcement Learning based on Graph Neural Networks
Figure 2 for Symbolic Relational Deep Reinforcement Learning based on Graph Neural Networks
Figure 3 for Symbolic Relational Deep Reinforcement Learning based on Graph Neural Networks
Figure 4 for Symbolic Relational Deep Reinforcement Learning based on Graph Neural Networks
Viaarxiv icon