Skip to main content

Showing 1–11 of 11 results for author: Kudinov, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.16728  [pdf, other

    cs.AI

    Improving Diffusion Models's Data-Corruption Resistance using Scheduled Pseudo-Huber Loss

    Authors: Artem Khrapov, Vadim Popov, Tasnima Sadekova, Assel Yermekova, Mikhail Kudinov

    Abstract: Diffusion models are known to be vulnerable to outliers in training data. In this paper we study an alternative diffusion loss function, which can preserve the high quality of generated data like the original squared $L_{2}$ loss while at the same time being robust to outliers. We propose to use pseudo-Huber loss function with a time-dependent parameter to allow for the trade-off between robustnes… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: 13 pages, 16 figures

  2. arXiv:2312.01092  [pdf, other

    cs.SD cs.LG eess.AS

    A Semi-Supervised Deep Learning Approach to Dataset Collection for Query-By-Humming Task

    Authors: Amantur Amatov, Dmitry Lamanov, Maksim Titov, Ivan Vovk, Ilya Makarov, Mikhail Kudinov

    Abstract: Query-by-Humming (QbH) is a task that involves finding the most relevant song based on a hummed or sung fragment. Despite recent successful commercial solutions, implementing QbH systems remains challenging due to the lack of high-quality datasets for training machine learning models. In this paper, we propose a deep learning data collection technique and introduce Covers and Hummings Aligned Data… ▽ More

    Submitted 2 December, 2023; originally announced December 2023.

  3. arXiv:2109.13821  [pdf, other

    cs.SD cs.LG stat.ML

    Diffusion-Based Voice Conversion with Fast Maximum Likelihood Sampling Scheme

    Authors: Vadim Popov, Ivan Vovk, Vladimir Gogoryan, Tasnima Sadekova, Mikhail Kudinov, Jiansheng Wei

    Abstract: Voice conversion is a common speech synthesis task which can be solved in different ways depending on a particular real-world scenario. The most challenging one often referred to as one-shot many-to-many voice conversion consists in copying the target voice from only one reference utterance in the most general case when both source and target speakers do not belong to the training dataset. We pres… ▽ More

    Submitted 4 August, 2022; v1 submitted 28 September, 2021; originally announced September 2021.

  4. arXiv:2105.06337  [pdf, other

    cs.LG cs.CL stat.ML

    Grad-TTS: A Diffusion Probabilistic Model for Text-to-Speech

    Authors: Vadim Popov, Ivan Vovk, Vladimir Gogoryan, Tasnima Sadekova, Mikhail Kudinov

    Abstract: Recently, denoising diffusion probabilistic models and generative score matching have shown high potential in modelling complex data distributions while stochastic calculus has provided a unified point of view on these techniques allowing for flexible inference schemes. In this paper we introduce Grad-TTS, a novel text-to-speech model with score-based decoder producing mel-spectrograms by graduall… ▽ More

    Submitted 5 August, 2021; v1 submitted 13 May, 2021; originally announced May 2021.

  5. Towards security recommendations for public-key infrastructures for production environments in the post-quantum era

    Authors: S. E. Yunakovsky, M. Kot, N. O. Pozhar, D. Nabokov, M. A. Kudinov, A. Guglya, E. O. Kiktenko, E. Kolycheva, A. Borisov, A. K. Fedorov

    Abstract: Quantum computing technologies pose a significant threat to the currently employed public-key cryptography protocols. In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of security systems for protecting production environments. We analyze security issues of existing models with a focus on requirements for a fast transition to… ▽ More

    Submitted 23 June, 2021; v1 submitted 4 May, 2021; originally announced May 2021.

    Comments: 24 pages, 1 figure

    Journal ref: EPJ Quantum Technol. 8, 14 (2021)

  6. Security analysis of the W-OTS$^+$ signature scheme: Updating security bounds

    Authors: M. A. Kudinov, E. O. Kiktenko, A. K. Fedorov

    Abstract: In this work, we discuss in detail a flaw in the original security proof of the W-OTS${^+}$ variant of the Winternitz one-time signature scheme, which is an important component for various stateless and stateful many-time hash-based digital signature schemes. We update the security proof for the W-OTS${^+}$ scheme and derive the corresponding security level. Our result is of importance for the sec… ▽ More

    Submitted 22 July, 2021; v1 submitted 18 February, 2020; originally announced February 2020.

    Comments: 16 pages, 1 figure, 1 table

    Journal ref: Mat. Vopr. Kriptogr. 12, 129 (2021)

  7. Advanced attribute-based protocol based on the modified secret sharing scheme

    Authors: M. A. Kudinov, A. A. Chilikov, E. O. Kiktenko, A. K. Fedorov

    Abstract: We construct a new protocol for attribute-based encryption with the use of the modification of the standard secret sharing scheme. In the suggested modification of the secret sharing scheme, only one master key for each user is required that is achieved by linearly enlarging public parameters in the access formula. We then use this scheme for designing an attribute-based encryption protocol relate… ▽ More

    Submitted 23 November, 2020; v1 submitted 6 December, 2019; originally announced December 2019.

    Comments: 15 pages

    Journal ref: J. Comput. Virol. Hacking Tech. 16, 333 (2020)

  8. Proof-of-forgery for hash-based signatures

    Authors: E. O. Kiktenko, M. A. Kudinov, A. A. Bulychev, A. K. Fedorov

    Abstract: In the present work, a peculiar property of hash-based signatures allowing detection of their forgery event is explored. This property relies on the fact that a successful forgery of a hash-based signature most likely results in a collision with respect to the employed hash function, while the demonstration of this collision could serve as convincing evidence of the forgery. Here we prove that wit… ▽ More

    Submitted 8 September, 2021; v1 submitted 30 May, 2019; originally announced May 2019.

    Comments: 17 pages, 4 figures

    Journal ref: Proceedings of the 18th International Conference on Security and Cryptography (SECRYPT 2021, July 6-8, 2021)

  9. Detecting brute-force attacks on cryptocurrency wallets

    Authors: E. O. Kiktenko, M. A. Kudinov, A. K. Fedorov

    Abstract: Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin. In this work, we consider a particular attack on wallets for collecting assets in a cryptocurrency network based on brute-force search attacks.… ▽ More

    Submitted 19 December, 2019; v1 submitted 15 April, 2019; originally announced April 2019.

    Comments: 10 pages, 2 figures; published version

    Journal ref: Lect. Notes Bus. Inf. 373, 232 (2019)

  10. arXiv:1811.04623  [pdf, ps, other

    cs.CL

    Fine-tuning of Language Models with Discriminator

    Authors: Vadim Popov, Mikhail Kudinov

    Abstract: Cross-entropy loss is a common choice when it comes to multiclass classification tasks and language modeling in particular. Minimizing this loss results in language models of very good quality. We show that it is possible to fine-tune these models and make them perform even better if they are fine-tuned with sum of cross-entropy loss and reverse Kullback-Leibler divergence. The latter is estimated… ▽ More

    Submitted 15 January, 2019; v1 submitted 12 November, 2018; originally announced November 2018.

  11. arXiv:1712.07473  [pdf, ps, other

    cs.CL cs.CR cs.LG

    Differentially Private Distributed Learning for Language Modeling Tasks

    Authors: Vadim Popov, Mikhail Kudinov, Irina Piontkovskaya, Petr Vytovtov, Alex Nevidomsky

    Abstract: One of the big challenges in machine learning applications is that training data can be different from the real-world data faced by the algorithm. In language modeling, users' language (e.g. in private messaging) could change in a year and be completely different from what we observe in publicly available data. At the same time, public data can be used for obtaining general knowledge (i.e. general… ▽ More

    Submitted 6 March, 2018; v1 submitted 20 December, 2017; originally announced December 2017.