default search action
Farzad Farhadzadeh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Qiqi Hou, Farzad Farhadzadeh, Amir Said, Guillaume Sautière, Hoang Le:
Low-Latency Neural Stereo Streaming. CVPR 2024: 7974-7984 - [i4]Qiqi Hou, Farzad Farhadzadeh, Amir Said, Guillaume Sautière, Hoang Le:
Low-Latency Neural Stereo Streaming. CoRR abs/2403.17879 (2024) - [i3]Farzad Farhadzadeh, Qiqi Hou, Hoang Le, Amir Said, Randall Rauwendaal, Alex Bourd, Fatih Porikli:
Neural Graphics Texture Compression Supporting Random Acces. CoRR abs/2407.00021 (2024) - 2023
- [c22]Amir Said, Hoang Le, Farzad Farhadzadeh:
Bitstream Organization for Parallel Entropy Coding on Neural Network-based Video Codecs. ISM 2023: 1-9 - [i2]Amir Said, Hoang Le, Farzad Farhadzadeh:
Bitstream Organization for Parallel Entropy Coding on Neural Network-based Video Codecs. CoRR abs/2312.00921 (2023)
2010 – 2019
- 2016
- [j3]Farzad Farhadzadeh, Frans M. J. Willems:
Identification Rate, Search and Memory Complexity Tradeoff: Fundamental Limits. IEEE Trans. Inf. Theory 62(11): 6173-6188 (2016) - 2015
- [c21]Farzad Farhadzadeh, Frans M. J. Willems, Sviatoslav Voloshynovskiy:
Information-theoretical limits of active content fingerprinting in content-based identification systems. WIFS 2015: 1-6 - 2014
- [b1]Farzad Farhadzadeh:
Information-theoretic analysis of identification systems in large-scale databases. University of Geneva, Switzerland, 2014 - [j2]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy:
Active Content Fingerpriting. IEEE Trans. Inf. Forensics Secur. 9(6): 905-920 (2014) - [c20]Farzad Farhadzadeh, Ke Sun, Sohrab Fredowsi:
Efficient two stage decoding scheme to achieve content identification capacity. ICASSP 2014: 3814-3818 - [c19]Svyatoslav Voloshynovskiy, Maurits Diephuis, Dimche Kostadinov, Farzad Farhadzadeh, Taras Holotyak:
On accuracy, robustness, and security of bag-of-word search systems. Media Watermarking, Security, and Forensics 2014: 902807 - [i1]Farzad Farhadzadeh, Frans M. J. Willems, Sviatoslav Voloshynovskiy:
Information Theoretical Analysis of Identification based on Active Content Fingerprinting. CoRR abs/1411.4836 (2014) - 2013
- [c18]Fokko Beekhof, Sviatoslav Voloshynovskiy, Maurits Diephuis, Farzad Farhadzadeh:
Physical object authentication with correlated camera noise. BTW Workshops 2013: 65-74 - [c17]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Taras Holotyak, Fokko Beekhof:
Active content fingerprinting: Shrinkage and lattice based modulations. ICASSP 2013: 3073-3077 - [c16]Farzad Farhadzadeh, Frans M. J. Willems, Sviatoslav Voloshynovskiy:
Fundamental limits of identification: Identification rate, search and memory complexity trade-off. ISIT 2013: 1252-1256 - 2012
- [j1]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval:
Performance Analysis of Content-Based Identification Using Constrained List-Based Decoding. IEEE Trans. Inf. Forensics Secur. 7(5): 1652-1667 (2012) - [c15]Fokko Beekhof, Sviatoslav Voloshynovskiy, Farzad Farhadzadeh:
Content authentication and identification under informed attacks. WIFS 2012: 133-138 - [c14]Sviatoslav Voloshynovskiy, Farzad Farhadzadeh, Oleksiy J. Koval, Taras Holotyak:
Active content fingerprinting: A marriage of digital watermarking and content fingerprinting. WIFS 2012: 175-180 - 2011
- [c13]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Farzad Farhadzadeh, Taras Holotyak, Fokko Beekhof:
Information-theoretic analysis of desynchronization invariant object identification. ICASSP 2011: 4168-4171 - [c12]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Taras Holotyak, Fokko Beekhof:
Statistical analysis of digital image fingerprinting based on random projections. ISPA 2011: 200-205 - [c11]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof:
Information-theoretic analysis of content based identification for correlated data. ITW 2011: 205-209 - [c10]Oleksiy J. Koval, Svyatoslav Voloshynovskiy, Farzad Farhadzadeh:
Identification in desynchronization channels. ITW 2011: 297-301 - [c9]Svyatoslav Voloshynovskiy, Taras Holotyak, Oleksiy J. Koval, Fokko Beekhof, Farzad Farhadzadeh:
Sign-magnitude decomposition of mutual information with polarization effect in digital identification. ITW 2011: 385-389 - [c8]Oleksiy J. Koval, Svyatoslav Voloshynovskiy, Farzad Farhadzadeh, Taras Holotyak, Fokko Beekhof:
Geometrically robust perceptual fingerprinting: an asymmetric case. Media Forensics and Security 2011: 78800N - [c7]Sviatoslav Voloshynovskiy, Taras Holotyak, Oleksiy J. Koval, Fokko Beekhof, Farzad Farhadzadeh:
Private content identification based on soft fingerprinting. Media Forensics and Security 2011: 78800M - 2010
- [c6]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval:
Privacy Preserving Identification: Order Statistics List Decoding Perspective. IIH-MSP 2010: 352-355 - [c5]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval:
Performance analysis of identification system based on order statistics list decoder. ISIT 2010: 2652-2656 - [c4]Svyatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof, Farzad Farhadzadeh, Taras Holotyak:
Information-theoretical analysis of private content identification. ITW 2010: 1-5 - [c3]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof, Farzad Farhadzadeh, Taras Holotyak:
Private content identification: Performance-privacy-complexity trade-off. MMSP 2010: 58-63 - [c2]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval:
Content identification based on digital fingerprint: What can be done if ML decoding fails? MMSP 2010: 64-68 - [c1]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Taras Holotyak, Fokko Beekhof, Farzad Farhadzadeh:
Privacy amplification of content identification systems based on fingerprint bit reliability. WIFS 2010: 1-6
Coauthor Index
aka: Svyatoslav Voloshynovskiy
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint