Search Results for author: Kostiantyn Khabarlak

Found 8 papers, 1 papers with code

Post-Train Adaptive U-Net for Image Segmentation

no code implementations16 Jan 2023 Kostiantyn Khabarlak

The final trained model can be switched at runtime between 6 PTA configurations, which differ by inference time and quality.

Image Segmentation Segmentation +1

Post-Train Adaptive MobileNet for Fast Anti-Spoofing

no code implementations27 Jul 2022 Kostiantyn Khabarlak

However, a single model might not give the best results for different device performance categories, while training multiple models is time consuming.

Face Anti-Spoofing

Faster Optimization-Based Meta-Learning Adaptation Phase

no code implementations13 Jun 2022 Kostiantyn Khabarlak

In certain cases, quality improvement is possible by a careful pattern selection.

Meta-Learning

Face Detection on Mobile: Five Implementations and Analysis

no code implementations11 May 2022 Kostiantyn Khabarlak

In many practical cases face detection on smartphones or other highly portable devices is a necessity.

Emotion Recognition Face Detection

Simultaneous Perturbation Method for Multi-Task Weight Optimization in One-Shot Meta-Learning

1 code implementation25 Oct 2021 Andrei Boiarov, Kostiantyn Khabarlak, Igor Yastrebov

We propose and investigate the use of methods from the family of Simultaneous Perturbation Stochastic Approximation (SPSA) for optimization of meta-train tasks weights.

Few-Shot Image Classification Multi-Task Learning +1

Mobile Access Control System Based on RFID Tags And Facial Information

no code implementations11 Mar 2021 Kostiantyn Khabarlak, Larysa Koriashkina

Also, we propose a mobile application that allows gate registration and serves as a door unlock key.

Cryptography and Security

Minimizing Perceived Image Quality Loss Through Adversarial Attack Scoping

no code implementations23 Apr 2019 Kostiantyn Khabarlak, Larysa Koriashkina

The presented adversarial attack analysis and the idea of attack scoping can be easily expanded to different datasets, thus making the paper's results applicable to a wide range of practical tasks.

Adversarial Attack Autonomous Vehicles +2

Cannot find the paper you are looking for? You can Submit a new open access paper.