Skip to main content

Showing 1–46 of 46 results for author: Voloshynovskiy, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.02552  [pdf, other

    astro-ph.SR astro-ph.IM cs.AI

    Solar synthetic imaging: Introducing denoising diffusion probabilistic models on SDO/AIA data

    Authors: Francesco P. Ramunno, S. Hackstein, V. Kinakh, M. Drozdova, G. Quetant, A. Csillaghy, S. Voloshynovskiy

    Abstract: Given the rarity of significant solar flares compared to smaller ones, training effective machine learning models for solar activity forecasting is challenging due to insufficient data. This study proposes using generative deep learning models, specifically a Denoising Diffusion Probabilistic Model (DDPM), to create synthetic images of solar phenomena, including flares of varying intensities. By e… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

    Comments: 16 pages, 10 figures. Accepted for publication in Astronomy and Astrophysics (A&A)

  2. arXiv:2402.10204  [pdf, other

    astro-ph.IM cs.AI cs.CV

    Radio-astronomical Image Reconstruction with Conditional Denoising Diffusion Model

    Authors: Mariia Drozdova, Vitaliy Kinakh, Omkar Bait, Olga Taran, Erica Lastufka, Miroslava Dessauges-Zavadsky, Taras Holotyak, Daniel Schaerer, Slava Voloshynovskiy

    Abstract: Reconstructing sky models from dirty radio images for accurate source localization and flux estimation is crucial for studying galaxy evolution at high redshift, especially in deep fields using instruments like the Atacama Large Millimetre Array (ALMA). With new projects like the Square Kilometre Array (SKA), there's a growing need for better source extraction methods. Current techniques, such as… ▽ More

    Submitted 20 February, 2024; v1 submitted 15 February, 2024; originally announced February 2024.

    Comments: In production in Astronomy&Astrophyics

  3. arXiv:2311.06527  [pdf, other

    cs.LG cs.CR cs.IT hep-ph

    TURBO: The Swiss Knife of Auto-Encoders

    Authors: Guillaume Quétant, Yury Belousov, Vitaliy Kinakh, Slava Voloshynovskiy

    Abstract: We present a novel information-theoretic framework, termed as TURBO, designed to systematically analyse and generalise auto-encoding methods. We start by examining the principles of information bottleneck and bottleneck-based networks in the auto-encoding setting and identifying their inherent limitations, which become more prominent for data with multiple relevant, physics-related representations… ▽ More

    Submitted 11 November, 2023; originally announced November 2023.

    Journal ref: Quétant, G.; Belousov, Y.; Kinakh, V.; Voloshynovskiy, S. TURBO: The Swiss Knife of Auto-Encoders. Entropy 2023, 25, 1471

  4. arXiv:2309.16866  [pdf, other

    cs.CV eess.IV

    Stochastic Digital Twin for Copy Detection Patterns

    Authors: Yury Belousov, Olga Taran, Vitaliy Kinakh, Slava Voloshynovskiy

    Abstract: Copy detection patterns (CDP) present an efficient technique for product protection against counterfeiting. However, the complexity of studying CDP production variability often results in time-consuming and costly procedures, limiting CDP scalability. Recent advancements in computer modelling, notably the concept of a "digital twin" for printing-imaging channels, allow for enhanced scalability and… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

    Comments: Paper accepted at the IEEE International Workshop on Information Forensics and Security (WIFS) 2023

  5. MV-MR: multi-views and multi-representations for self-supervised learning and knowledge distillation

    Authors: Vitaliy Kinakh, Mariia Drozdova, Slava Voloshynovskiy

    Abstract: We present a new method of self-supervised learning and knowledge distillation based on the multi-views and multi-representations (MV-MR). The MV-MR is based on the maximization of dependence between learnable embeddings from augmented and non-augmented views, jointly with the maximization of dependence between learnable embeddings from augmented view and multiple non-learnable representations fro… ▽ More

    Submitted 2 June, 2024; v1 submitted 21 March, 2023; originally announced March 2023.

    Journal ref: Entropy. 2024; 26(6):466

  6. arXiv:2212.07326  [pdf, other

    cs.CV cs.CR

    Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns

    Authors: Joakim Tutt, Olga Taran, Roman Chaban, Brian Pulfer, Yury Belousov, Taras Holotyak, Slava Voloshynovskiy

    Abstract: Nowadays, copy detection patterns (CDP) appear as a very promising anti-counterfeiting technology for physical object protection. However, the advent of deep learning as a powerful attacking tool has shown that the general authentication schemes are unable to compete and fail against such attacks. In this paper, we propose a new mathematical model of printing-imaging channel for the authentication… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

    Comments: Paper accepted at the IEEE International Workshop on Information Forensics and Security (WIFS) 2022

  7. arXiv:2210.17420  [pdf, other

    cs.CV cs.LG

    Digital twins of physical printing-imaging channel

    Authors: Yury Belousov, Brian Pulfer, Roman Chaban, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

    Abstract: In this paper, we address the problem of modeling a printing-imaging channel built on a machine learning approach a.k.a. digital twin for anti-counterfeiting applications based on copy detection patterns (CDP). The digital twin is formulated on an information-theoretic framework called Turbo that uses variational approximations of mutual information developed for both encoder and decoder in a two-… ▽ More

    Submitted 28 October, 2022; originally announced October 2022.

    Comments: Paper accepted at the IEEE International Workshop on Information Forensics and Security (WIFS) 2022

  8. arXiv:2210.05343  [pdf, other

    cs.CR cs.CV

    Printing variability of copy detection patterns

    Authors: Roman Chaban, Olga Taran, Joakim Tutt, Yury Belousov, Brian Pulfer, Taras Holotyak, Slava Voloshynovskiy

    Abstract: Copy detection pattern (CDP) is a novel solution for products' protection against counterfeiting, which gains its popularity in recent years. CDP attracts the anti-counterfeiting industry due to its numerous benefits in comparison to alternative protection techniques. Besides its attractiveness, there is an essential gap in the fundamental analysis of CDP authentication performance in large-scale… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

  9. arXiv:2209.15625  [pdf, other

    cs.CV cs.CR cs.LG

    Anomaly localization for copy detection patterns through print estimations

    Authors: Brian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

    Abstract: Copy detection patterns (CDP) are recent technologies for protecting products from counterfeiting. However, in contrast to traditional copy fakes, deep learning-based fakes have shown to be hardly distinguishable from originals by traditional authentication systems. Systems based on classical supervised learning and digital templates assume knowledge of fake CDP at training time and cannot general… ▽ More

    Submitted 29 September, 2022; originally announced September 2022.

  10. arXiv:2207.04895  [pdf, other

    cs.LG cs.CR cs.IT math.ST

    Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility

    Authors: Behrooz Razeghi, Flavio P. Calmon, Deniz Gunduz, Slava Voloshynovskiy

    Abstract: Bottleneck problems are an important class of optimization problems that have recently gained increasing attention in the domain of machine learning and information theory. They are widely used in generative models, fair machine learning algorithms, design of privacy-assuring mechanisms, and appear as information-theoretic performance bounds in various multi-user communication problems. In this wo… ▽ More

    Submitted 11 July, 2022; originally announced July 2022.

  11. arXiv:2206.11793  [pdf, other

    cs.CR cs.LG

    Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach

    Authors: Brian Pulfer, Roman Chaban, Yury Belousov, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

    Abstract: Copy detection patterns (CDP) are an attractive technology that allows manufacturers to defend their products against counterfeiting. The main assumption behind the protection mechanism of CDP is that these codes printed with the smallest symbol size (1x1) on an industrial printer cannot be copied or cloned with sufficient accuracy due to data processing inequality. However, previous works have sh… ▽ More

    Submitted 25 June, 2022; v1 submitted 23 June, 2022; originally announced June 2022.

    Comments: Paper accepted at the 29th IEEE International Conference on Image Processing (IEEE ICIP)

  12. arXiv:2203.02397  [pdf, other

    cs.CR cs.CV

    Mobile authentication of copy detection patterns

    Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy

    Abstract: In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the security of CDP in terms of their reproducibility by unauthorized parties or clonability remains largely unexplored. In this respect this paper addresses a problem… ▽ More

    Submitted 18 May, 2022; v1 submitted 4 March, 2022; originally announced March 2022.

  13. arXiv:2112.10629  [pdf, other

    cs.LG hep-ex stat.ML

    Turbo-Sim: a generalised generative model with a physical latent space

    Authors: Guillaume Quétant, Mariia Drozdova, Vitaliy Kinakh, Tobias Golling, Slava Voloshynovskiy

    Abstract: We present Turbo-Sim, a generalised autoencoder framework derived from principles of information theory that can be used as a generative model. By maximising the mutual information between the input and the output of both the encoder and the decoder, we are able to rediscover the loss terms usually found in adversarial autoencoders and generative adversarial networks, as well as various more sophi… ▽ More

    Submitted 21 December, 2021; v1 submitted 20 December, 2021; originally announced December 2021.

    Comments: 8 pages, 2 figures, 1 table

  14. arXiv:2112.09653  [pdf, other

    cs.CV cs.LG

    Information-theoretic stochastic contrastive conditional GAN: InfoSCC-GAN

    Authors: Vitaliy Kinakh, Mariia Drozdova, Guillaume Quétant, Tobias Golling, Slava Voloshynovskiy

    Abstract: Conditional generation is a subclass of generative problems where the output of the generation is conditioned by the attribute information. In this paper, we present a stochastic contrastive conditional generative adversarial network (InfoSCC-GAN) with an explorable latent space. The InfoSCC-GAN architecture is based on an unsupervised contrastive encoder built on the InfoNCE paradigm, an attribut… ▽ More

    Submitted 17 December, 2021; originally announced December 2021.

  15. arXiv:2112.09646  [pdf, other

    cs.LG

    Generation of data on discontinuous manifolds via continuous stochastic non-invertible networks

    Authors: Mariia Drozdova, Vitaliy Kinakh, Guillaume Quétant, Tobias Golling, Slava Voloshynovskiy

    Abstract: The generation of discontinuous distributions is a difficult task for most known frameworks such as generative autoencoders and generative adversarial networks. Generative non-invertible models are unable to accurately generate such distributions, require long training and often are subject to mode collapse. Variational autoencoders (VAEs), which are based on the idea of kee** the latent space t… ▽ More

    Submitted 17 December, 2021; originally announced December 2021.

  16. arXiv:2112.08069  [pdf, other

    cs.LG stat.ML

    Funnels: Exact maximum likelihood with dimensionality reduction

    Authors: Samuel Klein, John A. Raine, Sebastian Pina-Otey, Slava Voloshynovskiy, Tobias Golling

    Abstract: Normalizing flows are diffeomorphic, typically dimension-preserving, models trained using the likelihood of the model. We use the SurVAE framework to construct dimension reducing surjective flows via a new layer, known as the funnel. We demonstrate its efficacy on a variety of datasets, and show it improves upon or matches the performance of existing flows while having a reduced latent space size.… ▽ More

    Submitted 15 December, 2021; originally announced December 2021.

    Comments: 16 pages, 5 figures, 8 tables

  17. arXiv:2110.02176  [pdf, other

    cs.CR cs.CV cs.LG

    Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?

    Authors: Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy

    Abstract: Nowadays, the modern economy critically requires reliable yet cheap protection solutions against product counterfeiting for the mass market. Copy detection patterns (CDP) are considered as such solution in several applications. It is assumed that being printed at the maximum achievable limit of a printing resolution of an industrial printer with the smallest symbol size 1x1 elements, the CDP canno… ▽ More

    Submitted 6 October, 2021; v1 submitted 5 October, 2021; originally announced October 2021.

  18. arXiv:2110.01864  [pdf, other

    cs.CR cs.DB

    Mobile authentication of copy detection patterns: how critical is to know fakes?

    Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy

    Abstract: Protection of physical objects against counterfeiting is an important task for the modern economies. In recent years, the high-quality counterfeits appear to be closer to originals thanks to the rapid advancement of digital technologies. To combat these counterfeits, an anti-counterfeiting technology based on hand-crafted randomness implemented in a form of copy detection patterns (CDP) is propose… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

  19. arXiv:2108.13939  [pdf, other

    cs.CV

    ScatSimCLR: self-supervised contrastive learning with pretext task regularization for small-scale datasets

    Authors: Vitaliy Kinakh, Olga Taran, Svyatoslav Voloshynovskiy

    Abstract: In this paper, we consider a problem of self-supervised learning for small-scale datasets based on contrastive loss between multiple views of the data, which demonstrates the state-of-the-art performance in classification task. Despite the reported results, such factors as the complexity of training requiring complex architectures, the needed number of views produced by data augmentation, and thei… ▽ More

    Submitted 31 August, 2021; originally announced August 2021.

  20. Variational Leakage: The Role of Information Complexity in Privacy Leakage

    Authors: Amir Ahooye Atashin, Behrooz Razeghi, Deniz Gündüz, Slava Voloshynovskiy

    Abstract: We study the role of information complexity in privacy leakage about an attribute of an adversary's interest, which is not known a priori to the system designer. Considering the supervised representation learning setup and using neural networks to parameterize the variational bounds of information quantities, we study the impact of the following factors on the amount of information leakage: inform… ▽ More

    Submitted 8 June, 2021; v1 submitted 5 June, 2021; originally announced June 2021.

  21. arXiv:2102.04274  [pdf, other

    cs.IR

    Privacy-Preserving Near Neighbor Search via Sparse Coding with Ambiguation

    Authors: Behrooz Razeghi, Sohrab Ferdowsi, Dimche Kostadinov, Flavio. P. Calmon, Slava Voloshynovskiy

    Abstract: In this paper, we propose a framework for privacy-preserving approximate near neighbor search via stochastic sparsifying encoding. The core of the framework relies on sparse coding with ambiguation (SCA) mechanism that introduces the notion of inherent shared secrecy based on the support intersection of sparse codes. This approach is `fairness-aware', in the sense that any point in the neighborhoo… ▽ More

    Submitted 8 February, 2021; originally announced February 2021.

    Comments: To be presented at 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2021)

  22. arXiv:2009.04157  [pdf, other

    cs.IT cs.CR math.PR

    On Perfect Obfuscation: Local Information Geometry Analysis

    Authors: Behrooz Razeghi, Flavio. P. Calmon, Deniz Gunduz, Slava Voloshynovskiy

    Abstract: We consider the problem of privacy-preserving data release for a specific utility task under perfect obfuscation constraint. We establish the necessary and sufficient condition to extract features of the original data that carry as much information about a utility attribute as possible, while not revealing any information about the sensitive attribute. This problem formulation generalizes both the… ▽ More

    Submitted 9 September, 2020; originally announced September 2020.

  23. arXiv:2002.01469  [pdf, other

    cs.CV cs.CR eess.IV

    Privacy-Preserving Image Sharing via Sparsifying Layers on Convolutional Groups

    Authors: Sohrab Ferdowsi, Behrooz Razeghi, Taras Holotyak, Flavio P. Calmon, Slava Voloshynovskiy

    Abstract: We propose a practical framework to address the problem of privacy-aware image sharing in large-scale setups. We argue that, while compactness is always desired at scale, this need is more severe when trying to furthermore protect the privacy-sensitive content. We therefore encode images, such that, from one hand, representations are stored in the public domain without paying the huge cost of priv… ▽ More

    Submitted 4 February, 2020; originally announced February 2020.

    Comments: Accepted as an oral presentation for ICASSP 2020

  24. arXiv:1912.00830  [pdf, other

    cs.CV

    Information bottleneck through variational glasses

    Authors: Slava Voloshynovskiy, Mouad Kondah, Shideh Rezaeifar, Olga Taran, Taras Holotyak, Danilo Jimenez Rezende

    Abstract: Information bottleneck (IB) principle [1] has become an important element in information-theoretic analysis of deep models. Many state-of-the-art generative models of both Variational Autoencoder (VAE) [2; 3] and Generative Adversarial Networks (GAN) [4] families use various bounds on mutual information terms to introduce certain regularization constraints [5; 6; 7; 8; 9; 10]. Accordingly, the mai… ▽ More

    Submitted 5 December, 2019; v1 submitted 2 December, 2019; originally announced December 2019.

  25. arXiv:1909.06236  [pdf, other

    cs.LG cs.CV stat.ML

    $ρ$-VAE: Autoregressive parametrization of the VAE encoder

    Authors: Sohrab Ferdowsi, Maurits Diephuis, Shideh Rezaeifar, Slava Voloshynovskiy

    Abstract: We make a minimal, but very effective alteration to the VAE model. This is about a drop-in replacement for the (sample-dependent) approximate posterior to change it from the standard white Gaussian with diagonal covariance to the first-order autoregressive Gaussian. We argue that this is a more reasonable choice to adopt for natural signals like images, as it does not force the existing correlatio… ▽ More

    Submitted 13 September, 2019; originally announced September 2019.

    Comments: Submitted to NeurIPS workshop on Bayesian deep learning

  26. arXiv:1907.06388  [pdf, other

    cs.IT cs.CR cs.IR

    Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation

    Authors: Behrooz Razeghi, Taras Stanko, Boris Škorić, Slava Voloshynovskiy

    Abstract: We investigate the privacy of two approaches to (biometric) template protection: Helper Data Systems and Sparse Ternary Coding with Ambiguization. In particular, we focus on a privacy property that is often overlooked, namely how much leakage exists about one specific binary property of one component of the feature vector. This property is e.g. the sign or an indicator that a threshold is exceeded… ▽ More

    Submitted 1 October, 2019; v1 submitted 15 July, 2019; originally announced July 2019.

  27. arXiv:1905.05454  [pdf, other

    cs.LG cs.CR stat.ML

    Robustification of deep net classifiers by key based diversified aggregation with pre-filtering

    Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy

    Abstract: In this paper, we address a problem of machine learning system vulnerability to adversarial attacks. We propose and investigate a Key based Diversified Aggregation (KDA) mechanism as a defense strategy. The KDA assumes that the attacker (i) knows the architecture of classifier and the used defense strategy, (ii) has an access to the training data set but (iii) does not know the secret key. The rob… ▽ More

    Submitted 14 May, 2019; originally announced May 2019.

  28. arXiv:1905.03282  [pdf, other

    cs.LG cs.CR cs.IR stat.ML

    Reconstruction of Privacy-Sensitive Data from Protected Templates

    Authors: Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

    Abstract: In this paper, we address the problem of data reconstruction from privacy-protected templates, based on recent concept of sparse ternary coding with ambiguization (STCA). The STCA is a generalization of randomization techniques which includes random projections, lossy quantization, and addition of ambiguization noise to satisfy the privacy-utility trade-off requirements. The theoretical privacy-pr… ▽ More

    Submitted 8 May, 2019; originally announced May 2019.

    Comments: accepted at ICIP 2019

  29. arXiv:1904.00689  [pdf, other

    cs.LG cs.CR stat.ML

    Defending against adversarial attacks by randomized diversification

    Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy

    Abstract: The vulnerability of machine learning systems to adversarial attacks questions their usage in many applications. In this paper, we propose a randomized diversification as a defense strategy. We introduce a multi-channel architecture in a gray-box scenario, which assumes that the architecture of the classifier and the training data set are known to the attacker. The attacker does not only have acce… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

  30. arXiv:1903.07359  [pdf, other

    cs.CR cs.LG stat.ML

    Clonability of anti-counterfeiting printable graphical codes: a machine learning approach

    Authors: Olga Taran, Slavi Bonev, Slava Voloshynovskiy

    Abstract: In recent years, printable graphical codes have attracted a lot of attention enabling a link between the physical and digital worlds, which is of great interest for the IoT and brand protection applications. The security of printable codes in terms of their reproducibility by unauthorized parties or clonability is largely unexplored. In this paper, we try to investigate the clonability of printabl… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

  31. arXiv:1902.00016  [pdf, other

    cs.LG cs.AI cs.DC cs.NE stat.ML

    Network Parameter Learning Using Nonlinear Transforms, Local Representation Goals and Local Propagation Constraints

    Authors: Dimche Kostadinov, Behrooz Razdehi, Slava Voloshynovskiy

    Abstract: In this paper, we introduce a novel concept for learning of the parameters in a neural network. Our idea is grounded on modeling a learning problem that addresses a trade-off between (i) satisfying local objectives at each node and (ii) achieving desired data propagation through the network under (iii) local propagation constraints. We consider two types of nonlinear transforms which describe the… ▽ More

    Submitted 31 January, 2019; originally announced February 2019.

    Comments: arXiv admin note: text overlap with arXiv:1805.07802

  32. arXiv:1901.10760  [pdf, ps, other

    cs.LG stat.ML

    Clustering with Jointly Learned Nonlinear Transforms Over Discriminating Min-Max Similarity/Dissimilarity Assignment

    Authors: Dimche Kostadinov, Behrooz Razeghi, Taras Holotyak, Slava Voloshynovskiy

    Abstract: This paper presents a novel clustering concept that is based on jointly learned nonlinear transforms (NTs) with priors on the information loss and the discrimination. We introduce a clustering principle that is based on evaluation of a parametric min-max measure for the discriminative prior. The decomposition of the prior measure allows to break down the assignment into two steps. In the first ste… ▽ More

    Submitted 30 January, 2019; originally announced January 2019.

  33. arXiv:1812.03943  [pdf, other

    cs.CR

    Aggregation and Embedding for Group Membership Verification

    Authors: Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy

    Abstract: This paper proposes a group membership verification protocol preventing the curious but honest server from reconstructing the enrolled signatures and inferring the identity of querying clients. The protocol quantizes the signatures into discrete embeddings, making reconstruction difficult. It also aggregates multiple embeddings into representative values, impeding identification. Theoretical and e… ▽ More

    Submitted 23 April, 2019; v1 submitted 10 December, 2018; originally announced December 2018.

    Comments: accepted at ICASSP 2019

  34. arXiv:1809.03259  [pdf, other

    cs.CV

    Classification by Re-generation: Towards Classification Based on Variational Inference

    Authors: Shideh Rezaeifar, Olga Taran, Slava Voloshynovskiy

    Abstract: As Deep Neural Networks (DNNs) are considered the state-of-the-art in many classification tasks, the question of their semantic generalizations has been raised. To address semantic interpretability of learned features, we introduce a novel idea of classification by re-generation based on variational autoencoder (VAE) in which a separate encoder-decoder pair of VAE is trained for each class. Moreov… ▽ More

    Submitted 10 September, 2018; originally announced September 2018.

  35. arXiv:1809.01715  [pdf, other

    cs.CR cs.LG stat.ML

    Bridging machine learning and cryptography in defence against adversarial attacks

    Authors: Olga Taran, Shideh Rezaeifar, Slava Voloshynovskiy

    Abstract: In the last decade, deep learning algorithms have become very popular thanks to the achieved performance in many machine learning and computer vision tasks. However, most of the deep learning architectures are vulnerable to so called adversarial examples. This questions the security of deep neural networks (DNN) for many security- and trust-sensitive domains. The majority of the proposed existing… ▽ More

    Submitted 5 September, 2018; originally announced September 2018.

  36. arXiv:1806.08658  [pdf, ps, other

    cs.IT cs.CR cs.DB cs.DC cs.DS

    Privacy-Preserving Identification via Layered Sparse Code Design: Distributed Servers and Multiple Access Authorization

    Authors: Behrooz Razeghi, Slava Voloshynovskiy, Sohrab Ferdowsi, Dimche Kostadinov

    Abstract: We propose a new computationally efficient privacy-preserving identification framework based on layered sparse coding. The key idea of the proposed framework is a sparsifying transform learning with ambiguization, which consists of a trained linear map, a component-wise nonlinearity and a privacy amplification. We introduce a practical identification framework, which consists of two phases: public… ▽ More

    Submitted 7 June, 2018; originally announced June 2018.

    Comments: EUSIPCO 2018

  37. arXiv:1805.07802  [pdf, other

    cs.LG cs.AI cs.NE stat.ML

    Network Learning with Local Propagation

    Authors: Dimche Kostadinov, Behrooz Razeghi, Sohrab Ferdowsi, Slava Voloshynovskiy

    Abstract: This paper presents a locally decoupled network parameter learning with local propagation. Three elements are taken into account: (i) sets of nonlinear transforms that describe the representations at all nodes, (ii) a local objective at each node related to the corresponding local representation goal, and (iii) a local propagation model that relates the nonlinear error vectors at each node with th… ▽ More

    Submitted 20 May, 2018; originally announced May 2018.

    Comments: preprint, a similar version submitted to NIPS 2018

  38. arXiv:1710.11510  [pdf, other

    cs.CV cs.IT

    A multi-layer network based on Sparse Ternary Codes for universal vector compression

    Authors: Sohrab Ferdowsi, Slava Voloshynovskiy, Dimche Kostadinov

    Abstract: We present the multi-layer extension of the Sparse Ternary Codes (STC) for fast similarity search where we focus on the reconstruction of the database vectors from the ternary codes. To consider the trade-offs between the compactness of the STC and the quality of the reconstructed vectors, we study the rate-distortion behavior of these codes under different setups. We show that a single-layer code… ▽ More

    Submitted 31 October, 2017; originally announced October 2017.

    Comments: Submitted to ICASSP 2018

  39. arXiv:1709.10297  [pdf, other

    cs.CR cs.LG stat.ML

    Privacy Preserving Identification Using Sparse Approximation with Ambiguization

    Authors: Behrooz Razeghi, Slava Voloshynovskiy, Dimche Kostadinov, Olga Taran

    Abstract: In this paper, we consider a privacy preserving encoding framework for identification applications covering biometrics, physical object security and the Internet of Things (IoT). The proposed framework is based on a sparsifying transform, which consists of a trained linear map, an element-wise nonlinearity, and privacy amplification. The sparsifying transform and privacy amplification are not symm… ▽ More

    Submitted 29 September, 2017; originally announced September 2017.

    Comments: submitted to WIFS 2017

  40. arXiv:1707.02194  [pdf, other

    cs.CV

    A multi-layer image representation using Regularized Residual Quantization: application to compression and denoising

    Authors: Sohrab Ferdowsi, Slava Voloshynovskiy, Dimche Kostadinov

    Abstract: A learning-based framework for representation of domain-specific images is proposed where joint compression and denoising can be done using a VQ-based multi-layer network. While it learns to compress the images from a training set, the compression performance is very well generalized on images from a test set. Moreover, when fed with noisy versions of the test set, since it has priors from clean i… ▽ More

    Submitted 7 July, 2017; originally announced July 2017.

    Comments: At the International Conference on Image Processing 2017 (ICIP'17), Bei**g, China

  41. arXiv:1705.00522  [pdf, other

    cs.LG cs.CV

    Regularized Residual Quantization: a multi-layer sparse dictionary learning approach

    Authors: Sohrab Ferdowsi, Slava Voloshynovskiy, Dimche Kostadinov

    Abstract: The Residual Quantization (RQ) framework is revisited where the quantization distortion is being successively reduced in multi-layers. Inspired by the reverse-water-filling paradigm in rate-distortion theory, an efficient regularization on the variances of the codewords is introduced which allows to extend the RQ for very large numbers of layers and also for high dimensional data, without getting… ▽ More

    Submitted 1 May, 2017; originally announced May 2017.

    Comments: To be presented at SPARS 2017, Lisbon, Portugal

  42. arXiv:1701.07675  [pdf, other

    cs.IT cs.CV cs.IR

    Sparse Ternary Codes for similarity search have higher coding gain than dense binary codes

    Authors: Sohrab Ferdowsi, Slava Voloshynovskiy, Dimche Kostadinov, Taras Holotyak

    Abstract: This paper addresses the problem of Approximate Nearest Neighbor (ANN) search in pattern recognition where feature vectors in a database are encoded as compact codes in order to speed-up the similarity search in large-scale databases. Considering the ANN problem from an information-theoretic perspective, we interpret it as an encoding, which maps the original feature vectors to a less entropic spa… ▽ More

    Submitted 25 April, 2017; v1 submitted 26 January, 2017; originally announced January 2017.

    Comments: Accepted at 2017 IEEE International Symposium on Information Theory (ISIT'17)

  43. arXiv:1506.03998  [pdf, ps, other

    cs.CV cs.IT

    Sparse Multi-layer Image Approximation: Facial Image Compression

    Authors: Sohrab Ferdowsi, Svyatoslav Voloshynovskiy, Dimche Kostadinov

    Abstract: We propose a scheme for multi-layer representation of images. The problem is first treated from an information-theoretic viewpoint where we analyze the behavior of different sources of information under a multi-layer data compression framework and compare it with a single-stage (shallow) structure. We then consider the image data as the source of information and link the proposed representation sc… ▽ More

    Submitted 12 June, 2015; originally announced June 2015.

    Comments: Submitted to the MLSP 2015

  44. Multi-layer Architecture For Storing Visual Data Based on WCF and Microsoft SQL Server Database

    Authors: Rafal Grycuk, Marcin Gabryel, Rafal Scherer, Sviatoslav Voloshynovskiy

    Abstract: In this paper we present a novel architecture for storing visual data. Effective storing, browsing and searching collections of images is one of the most important challenges of computer science. The design of architecture for storing such data requires a set of tools and frameworks such as SQL database management systems and service-oriented frameworks. The proposed solution is based on a multi-l… ▽ More

    Submitted 26 April, 2015; originally announced April 2015.

    Comments: Accepted for the 14th International Conference on Artificial Intelligence and Soft Computing, ICAISC, June 14-18, 2015, Zakopane, Poland

  45. arXiv:1504.06864  [pdf, other

    cs.CV

    Fast Dictionary Matching for Content-based Image Retrieval

    Authors: Patryk Najgebauer, Janusz Rygal, Tomasz Nowak, Jakub Romanowski, Leszek Rutkowski, Sviatoslav Voloshynovskiy, Rafal Scherer

    Abstract: This paper describes a method for searching for common sets of descriptors between collections of images. The presented method operates on local interest keypoints, which are generated using the SURF algorithm. The use of a dictionary of descriptors allowed achieving good performance of the content-based image retrieval. The method can be used to initially determine a set of similar pairs of keypo… ▽ More

    Submitted 26 April, 2015; originally announced April 2015.

    Comments: Accepted for the 14th International Conference on Artificial Intelligence and Soft Computing, ICAISC, June 14-18, 2015, Zakopane, Poland, http://www.icaisc.eu/

  46. On Multiple Hypothesis Testing with Rejection Option

    Authors: Naira Grigoryan, Ashot Harutyunyan, Svyatoslav Voloshynovskiy, Oleksiy Koval

    Abstract: We study the problem of multiple hypothesis testing (HT) in view of a rejection option. That model of HT has many different applications. Errors in testing of M hypotheses regarding the source distribution with an option of rejecting all those hypotheses are considered. The source is discrete and arbitrarily varying (AVS). The tradeoffs among error probability exponents/reliabilities associated wi… ▽ More

    Submitted 25 May, 2011; v1 submitted 17 February, 2011; originally announced February 2011.

    Comments: 5 pages, 3 figures, submitted to IEEE Information Theory Workshop 2011