Picture for Yury Belousov

Yury Belousov

Semi-Supervised Fine-Tuning of Vision Foundation Models with Content-Style Decomposition

Add code
Oct 02, 2024
Viaarxiv icon

Evaluation of Security of ML-based Watermarking: Copy and Removal Attacks

Add code
Sep 26, 2024
Viaarxiv icon

TURBO: The Swiss Knife of Auto-Encoders

Add code
Nov 11, 2023
Viaarxiv icon

Stochastic Digital Twin for Copy Detection Patterns

Add code
Sep 28, 2023
Viaarxiv icon

Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns

Add code
Dec 14, 2022
Viaarxiv icon

Solving the Weather4cast Challenge via Visual Transformers for 3D Images

Add code
Dec 05, 2022
Viaarxiv icon

Digital twins of physical printing-imaging channel

Add code
Oct 28, 2022
Viaarxiv icon

Printing variability of copy detection patterns

Add code
Oct 11, 2022
Figure 1 for Printing variability of copy detection patterns
Figure 2 for Printing variability of copy detection patterns
Figure 3 for Printing variability of copy detection patterns
Figure 4 for Printing variability of copy detection patterns
Viaarxiv icon

Anomaly localization for copy detection patterns through print estimations

Add code
Sep 29, 2022
Figure 1 for Anomaly localization for copy detection patterns through print estimations
Figure 2 for Anomaly localization for copy detection patterns through print estimations
Figure 3 for Anomaly localization for copy detection patterns through print estimations
Figure 4 for Anomaly localization for copy detection patterns through print estimations
Viaarxiv icon

Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach

Add code
Jun 25, 2022
Figure 1 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 2 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 3 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 4 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Viaarxiv icon