no code implementations • 11 Nov 2023 • Guillaume Quétant, Yury Belousov, Vitaliy Kinakh, Slava Voloshynovskiy
We present a novel information-theoretic framework, termed as TURBO, designed to systematically analyse and generalise auto-encoding methods.
no code implementations • 28 Sep 2023 • Yury Belousov, Olga Taran, Vitaliy Kinakh, Slava Voloshynovskiy
Copy detection patterns (CDP) present an efficient technique for product protection against counterfeiting.
no code implementations • 14 Dec 2022 • Joakim Tutt, Olga Taran, Roman Chaban, Brian Pulfer, Yury Belousov, Taras Holotyak, Slava Voloshynovskiy
Nowadays, copy detection patterns (CDP) appear as a very promising anti-counterfeiting technology for physical object protection.
1 code implementation • 5 Dec 2022 • Yury Belousov, Sergey Polezhaev, Brian Pulfer
Accurately forecasting the weather is an important task, as many real-world processes and decisions depend on future meteorological conditions.
no code implementations • 28 Oct 2022 • Yury Belousov, Brian Pulfer, Roman Chaban, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy
In this paper, we address the problem of modeling a printing-imaging channel built on a machine learning approach a. k. a.
no code implementations • 11 Oct 2022 • Roman Chaban, Olga Taran, Joakim Tutt, Yury Belousov, Brian Pulfer, Taras Holotyak, Slava Voloshynovskiy
Since digital off-set printing represents great flexibility in terms of product personalized in comparison with traditional off-set printing, it looks very interesting to address the above concerns for digital off-set printers that are used by several companies for the CDP protection of physical objects.
no code implementations • 29 Sep 2022 • Brian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak, Slava Voloshynovskiy
Systems based on classical supervised learning and digital templates assume knowledge of fake CDP at training time and cannot generalize to unseen types of fakes.
no code implementations • 23 Jun 2022 • Brian Pulfer, Roman Chaban, Yury Belousov, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy
While Deep Learning (DL) can be used as a part of the authentication system, to the best of our knowledge, none of the previous works has studied the performance of a DL-based authentication system against ML-based attacks on CDP with 1x1 symbol size.
no code implementations • 17 Feb 2022 • Anssi Kanervisto, Stephanie Milani, Karolis Ramanauskas, Nicholay Topin, Zichuan Lin, Junyou Li, Jianing Shi, Deheng Ye, Qiang Fu, Wei Yang, Weijun Hong, Zhongyue Huang, Haicheng Chen, Guangjun Zeng, Yue Lin, Vincent Micheli, Eloi Alonso, François Fleuret, Alexander Nikulin, Yury Belousov, Oleg Svidchenko, Aleksei Shpilman
With this in mind, we hosted the third edition of the MineRL ObtainDiamond competition, MineRL Diamond 2021, with a separate track in which we permitted any solution to promote the participation of newcomers.
1 code implementation • 18 Dec 2020 • Mikita Sazanovich, Anastasiya Nikolskaya, Yury Belousov, Aleksei Shpilman
Black-box optimization is one of the vital tasks in machine learning, since it approximates real-world conditions, in that we do not always know all the properties of a given system, up to knowing almost nothing but the results.