Taras Holotyak
Orcid: 0009-0002-2490-0276
According to our database1,
Taras Holotyak
authored at least 65 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
9
4
2
1
3
2
1
1
6
2
3
3
1
2
5
5
3
1
1
7
4
2
2
3
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Forensics Secur., 2024
A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection Patterns.
IEEE Trans. Inf. Forensics Secur., 2024
CoRR, 2024
2023
EURASIP J. Inf. Secur., December, 2023
EURASIP J. Inf. Secur., December, 2023
2022
Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Authentication Of Copy Detection Patterns Under Machine Learning Attacks: A Supervised Approach.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
2021
CoRR, 2021
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021
Machine learning attack on copy detection patterns: are $1\times 1$ patterns cloneable?
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021
2020
Entropy, 2020
Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation.
EURASIP J. Inf. Secur., 2020
Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns.
Proceedings of the Computational Science - ICCS 2020, 2020
Adversarial Detection of Counterfeited Printable Graphical Codes: Towards "Adversarial Games" In Physical World.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
2019
Clustering with Jointly Learned Nonlinear Transforms Over Discriminating Min-Max Similarity/Dissimilarity Assignment.
CoRR, 2019
Robustification of Deep Net Classifiers by Key Based Diversified Aggregation with Pre-Filtering.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
2018
Proceedings of the 26th European Signal Processing Conference, 2018
2017
Sparse ternary codes for similarity search have higher coding gain than dense binary codes.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the 25th European Signal Processing Conference, 2017
2016
Fast content identification in high-dimensional feature spaces using Sparse Ternary Codes.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Proceedings of the Media Watermarking, 2016
Proceedings of the 23rd International Conference on Pattern Recognition, 2016
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016
Physical object authentication: Detection-theoretic comparison of natural and artificial randomness.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
2015
Soft Content Fingerprinting With Bit Polarization Based on Sign-Magnitude Decomposition.
IEEE Trans. Inf. Forensics Secur., 2015
Proceedings of the Media Watermarking, 2015
Privacy preserving multimedia content identification for cloud based bag-of-feature architectures.
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015
Proceedings of the Artificial Intelligence and Soft Computing, 2015
Proceedings of the Artificial Intelligence and Soft Computing, 2015
Proceedings of the 23rd European Signal Processing Conference, 2015
2014
Proceedings of the Media Watermarking, 2014
Proceedings of the Media Watermarking, 2014
Proceedings of the IEEE International Conference on Acoustics, 2014
2013
Proceedings of the IEEE International Conference on Acoustics, 2013
2012
Active content fingerprinting: A marriage of digital watermarking and content fingerprinting.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
2011
Information-Theoretic Multiclass Classification Based on Binary Classifiers - On Coding Matrix Design, Reliability and Maximum Number of Classes.
J. Signal Process. Syst., 2011
Proceedings of the Media Watermarking, 2011
Proceedings of the Media Watermarking, 2011
Proceedings of the Media Watermarking, 2011
Sign-magnitude decomposition of mutual information with polarization effect in digital identification.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011
Proceedings of the IEEE International Conference on Acoustics, 2011
Fast physical object identification based on unclonable features and soft fingerprinting.
Proceedings of the IEEE International Conference on Acoustics, 2011
2010
Privacy amplification of content identification systems based on fingerprint bit reliability.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010
Proceedings of the Media Forensics and Security II, 2010
Proceedings of the 2010 IEEE Information Theory Workshop, 2010
2009
Privacy enhancement of common randomness based authentication: Key rate maximized case.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the 8th workshop on Multimedia & Security, 2006
2005
Stochastic approach to secret message length estimation in ±k embedding steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics.
Proceedings of the Communications and Multimedia Security, 2005
1998
Robust image restoration matched with adaptive aperture formation in radar imaging systems with sparse antenna arrays.
Proceedings of the 9th European Signal Processing Conference, 1998