TH
Holotyak, Taras
Affiliation entities
| Title | Published in | Access level | OA Policy | Year | Views | Downloads | |
|---|---|---|---|---|---|---|---|
| Examining vision foundation models for classification and detection in optical and radio astronomy | Astronomy & astrophysics | 2025 | 6 | 196 | |||
| Self-supervised learning on MeerKAT wide-field continuum images | Astronomy & astrophysics | 2024 | 27 | 30 | |||
| Hubble Meets Webb: Image-to-Image Translation in Astronomy | Sensors | 2024 | 2 | 7 | |||
| A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection Patterns | IEEE transactions on information forensics and security | 2024 | 2 | 0 | |||
| Variational Information Bottleneck for Semi-Supervised Classification | Entropy | 2020 | 284 | 173 | |||
| Adversarial Detection of Counterfeited Printable Graphical Codes: Towards "Adversarial Games" In Physical World | 2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2020 | 2020 | 283 | 407 | |||
| Privacy-Preserving Image Sharing Via Sparsifying Layers on Convolutional Groups | 2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2020 | 2020 | 264 | 346 | |||
| Sparse ternary codes for similarity search have higher coding gain than dense binary codes | IEEE International Symposium on Information Theory (ISIT'17) | 2017 | 540 | 294 | |||
| PharmaPack: mobile fine-grained recognition of pharma packages | 25th European Signal Processing Conference (EUSIPCO) | 2017 | 503 | 777 | |||
| Physical object authentication: detection-theoretic comparison of natural and artificial randomness | IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016 | 2016 | 227 | 1 | |||
| Local active content fingerprint: solutions for general linear feature maps | International Conference on Pattern recognition, ICPR 2016 | 2016 | 212 | 235 | |||
| Local active content fingerprinting: Optimal solution under linear modulation | IEEE International Conference on Image Processing, ICIP 2016 | 2016 | 221 | 253 | |||
| Forensic authentication of banknotes on mobile phones | IS&T International Simposium, Electronic Imaging 2016, Media Watermarking, Security, and Forensics 2016 | 2016 | 420 | 439 | |||
| Fast content identification in high-dimensional feature spaces using Sparse Ternary Codes | IEEE International Workshop on Information Forensics and Security, WIFS 2016 | 2016 | 218 | 0 | |||
| Mobile visual object identification: from SIFT-BoF-RANSAC to SketchPrint | Media Watermarking, Security, and Forensics 2015 | 2015 | 573 | 361 | |||
| Active content fingerprinting: Shrinkage and lattice based modulations | 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) | 2013 | 502 | 1 | |||
| Information-theoretic analysis of privacy-preserving identification | 2012 | 787 | 807 | ||||
| Private content identification based on soft fingerprinting | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 612 | 346 | |||
| Information–Theoretic Multiclass Classification Based on Binary Classifiers | Journal of Signal Processing Systems | 2011 | 511 | 342 | |||
| Information-Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft Fingerprinting | Eighth International Conference on Computer Science and Information Technologies, CSIT 2011 | 2011 | 440 | 120 | |||
| Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital Identification | IEEE Information Theory Workshop (ITW) | 2011 | 588 | 359 | |||
| Trading-off privacy-complexity of identification problem | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 550 | 137 | |||
| Information-theoretic analysis of desynchronization invariant object identification | International Conference on Acoustics, Speech and Signal Processing, ICASSP2011 | 2011 | 542 | 330 | |||
| Fast physical object identification based on unclonable features and soft fingerprinting | International Conference on Acoustics, Speech and Signal Processing, ICASSP2011 | 2011 | 589 | 338 | |||
| Geometrically robust perceptual fingerprinting: an asymmetric case | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 504 | 295 | |||
| Privacy amplification of content identification based on fingerprint bit reliability | 2010 IEEE International Workshop on Information Forensics and Security (WIFS) | 2010 | 578 | 271 | |||
| On Accuracy, Privacy and Complexity in the Identification Problem | Proceedings of SPIE / Imaging and Printing in a Web 2.0 World; and Multimedia Content Access: Algorithms and Systems IV | 2010 | 518 | 281 | |||
| Fast identification of highly distorted images | Proceedings of SPIE / Media Forensics and Security II | 2010 | 619 | 1,011 | |||
| Information-Theoretical Analysis of Private Content Identification | 2010 IEEE Information Theory Workshop (ITW) | 2010 | 623 | 424 | |||
| Fast identification algorithms for forensic applications | First IEEE International Workshop on Information Forensics and Security, WIFS 2009 | 2009 | 553 | 379 | |||
| On privacy preserving search in large scale distributed systems : a signal processing view on searchable encryption | Proceedings of the International Workshop on Signal Processing in the EncryptEd Domain | 2009 | 614 | 428 | |||
| Privacy enhancement of common randomness based authentication: key rate maximized case | First IEEE International Workshop on Information Forensics and Security, WIFS 2009 | 2009 | 584 | 291 | |||
| Multi-class Classifiers based on Binary Classifiers : Performance, Efficiency, and Minimum Coding Matrix Distances | IEEE International Workshop on Machine Learning for Signal Processing, MLSP 2009 | 2009 | 571 | 323 | |||
| Binary Robust Hashing based on Probabilistic Bit Reliability | IEEE/SP 15th Workshop on Statistical Signal Processing, 2009. SSP '09 | 2009 | 536 | 250 | |||
| Multi-class Classification based on Binary Classifiers : On Coding Matrix Design, Reliability and Maximum Number of Classes | IEEE International Workshop on Machine Learning for Signal Processing, 2009, MLSP 2009 | 2009 | 602 | 290 | |||
| Information-theoretic analysis of steganalysis in real images | ACM Multimedia and Security Workshop 2006 | 2006 | 554 | 0 | |||
| Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics | 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005) | 2005 | 824 | 682 | |||
| Generalized radar/radiometry imaging problems | Journal of Telecommunications and Information Technology | 2001 | 574 | 270 | |||
| Surface image formation based on sparse arrays with nonlinear signal processing | IEEE Second International Conference "The detection of abandoned land mines" | 1998 | 550 | 284 | |||
| Adaptive aperture formation matched with radiometry image spatial spectrum | IEEE International Microwave and Radar Conference | 1998 | 469 | 262 |
