Synthical
Your space
Profile
Activity
Favorites
Folders
Feeds
All articles
Simple
Original
Articles by
Olga Taran
Self-Supervised Learning on MeerKAT Wide-Field Continuum Images
12 August 2024 by
Erica Lastufka
and
others
Instrumentation and Methods for Astrophysics
Unifying Geochemical Scenario for the Origin of a High Cellular Potassium to Sodium Ratio in Living Cells
9 August 2024 by
Olga Taran
Physical Chemistry
,
Earth, Space, and Environmental Chemistry
Anoxic photolysis as a Route to Primary Metabolites on Early Earth
8 May 2024 by
Olga Taran
and
Bülent Ünal
Earth, Space, and Environmental Chemistry
,
Hydrology and Water Chemistry
Radio-astronomical Image Reconstruction with Conditional Denoising Diffusion Model
20 February 2024 by
Mariia Drozdova
and
others
Instrumentation and Methods for Astrophysics
,
Artificial Intelligence
Stochastic Digital Twin for Copy Detection Patterns
28 September 2023 by
Yury Belousov
and
others
Computer Vision and Pattern Recognition
,
Image and Video Processing
Challenging interferometric imaging: Machine learning-based source localization from uv-plane observations
5 May 2023 by
O. Taran
and
others
Instrumentation and Methods for Astrophysics
Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns
14 December 2022 by
Joakim Tutt
and
others
Computer Vision and Pattern Recognition
,
Cryptography and Security
Digital twins of physical printing-imaging channel
28 October 2022 by
Yury Belousov
and
others
Computer Vision and Pattern Recognition
,
Machine Learning
Printing variability of copy detection patterns
11 October 2022 by
Roman Chaban
and
others
Cryptography and Security
,
Computer Vision and Pattern Recognition
Anomaly localization for copy detection patterns through print estimations
29 September 2022 by
Brian Pulfer
and
others
Computer Vision and Pattern Recognition
,
Cryptography and Security
Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
25 June 2022 by
Brian Pulfer
and
others
Cryptography and Security
,
Machine Learning
Mobile authentication of copy detection patterns
18 May 2022 by
Olga Taran
and
others
Cryptography and Security
,
Computer Vision and Pattern Recognition
Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
6 October 2021 by
Roman Chaban
and
others
at
University of Geneva
Cryptography and Security
,
Computer Vision and Pattern Recognition
Mobile authentication of copy detection patterns: how critical is to know fakes?
5 October 2021 by
Olga Taran
and
others
Cryptography and Security
,
Databases
ScatSimCLR: self-supervised contrastive learning with pretext task regularization for small-scale datasets
31 August 2021 by
Vitaliy Kinakh
and
others
Computer Vision and Pattern Recognition
Information bottleneck through variational glasses
5 December 2019 by
Slava Voloshynovskiy
and
others
Computer Vision and Pattern Recognition
Robustification of deep net classifiers by key based diversified aggregation with pre-filtering
14 May 2019 by
Olga Taran
and
others
Machine Learning
,
Cryptography and Security
Reconstruction of Privacy-Sensitive Data from Protected Templates
8 May 2019 by
Shideh Rezaeifar
and
others
Machine Learning
,
Cryptography and Security
Defending against adversarial attacks by randomized diversification
1 April 2019 by
Olga Taran
and
others
Machine Learning
,
Cryptography and Security
Clonability of anti-counterfeiting printable graphical codes: a machine learning approach
18 March 2019 by
Olga Taran
and
others
Cryptography and Security
,
Machine Learning
Classification by Re-generation: Towards Classification Based on Variational Inference
10 September 2018 by
Shideh Rezaeifar
and
others
Computer Vision and Pattern Recognition
Bridging machine learning and cryptography in defence against adversarial attacks
5 September 2018 by
Olga Taran
and
others
Cryptography and Security
,
Machine Learning
Privacy Preserving Identification Using Sparse Approximation with Ambiguization
29 September 2017 by
Behrooz Razeghi
and
others
Cryptography and Security
,
Machine Learning