Oleksii Smirnov

Orcid: 0000-0001-9543-874X

According to our database1, Oleksii Smirnov authored at least 29 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Intellectual Classification method of Gymnastic Elements Based on Combinations of Descriptive and Generative Approache.
Proceedings of the 8th International Conference on Computational Linguistics and Intelligent Systems. Volume I: Machine Learning Workshop, 2024

2023
Evaluating Hashing Algorithms in the Age of ASIC Resistance.
Proceedings of the 3rd International Workshop on Information Technologies: Theoretical and Applied Problems 2023, 2023

Achieving Enhanced Security in Biometric Authentication: A Rigorous Analysis of Code-Based Fuzzy Extractor.
Proceedings of the Selected Papers of the X International Scientific Conference "Information Technology and Implementation" (IT&I-2023). Conference Proceedings, Kyiv, Ukraine, November 20, 2023

Trade-offs in Post-Quantum Cryptography: A Comparative Assessment of BIKE, HQC, and Classic McEliece.
Proceedings of the Workshop on Classic, 2023

2022
Method for Determining Treated Metal Surface Quality Using Computer Vision Technology.
Sensors, 2022

Modeling strategies for information influence dissemination in social networks.
J. Ambient Intell. Humaniz. Comput., 2022

Creating Neural Network and Single Solution Human-Based Metaheuristic Methods of Solving the Traveling Salesman Problem.
Proceedings of the Modern Machine Learning Technologies and Data Science Workshop MoMLeT&DS 2022, 2022

Optimal Structure Construction of Private 5G Network for the Needs of Enterprises.
Proceedings of the Information Technology for Education, Science, and Technics, 2022

Simulation of the cloud IoT-based monitoring system for critical infrastructures.
Proceedings of the 2nd International Conference on Conflict Management in Global Information Networks (CMiGIN 2022), 2022

2021
Full Non-Binary Constant-Weight Codes.
SN Comput. Sci., 2021

Hiding Messages in Audio Files Using Direct Spread Spectrum.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Method Detection Audit Data Anomalies on Basis Restricted Cauchy Machine.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Neural network modeling method of transformations data of audit production with returnable waste.
Proceedings of the 2nd International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2021) co-located with XXI International Conference on Information Technologies in Education and Management (ITEM 2021), 2021

2020
Adaptive Pseudo-Random Sequence Generation for Spread Spectrum Image Steganography.
Proceedings of the 11th IEEE International Conference on Dependable Systems, 2020

Testing of Code-Based Pseudorandom Number Generators for Post-Quantum Application.
Proceedings of the 11th IEEE International Conference on Dependable Systems, 2020

New Approach to the Implementation of Post-Quantum Digital Signature Scheme.
Proceedings of the 11th IEEE International Conference on Dependable Systems, 2020

Model of Informational Support for Social Network Administrators' Content Creation.
Proceedings of the 2nd International Workshop on Control, 2020

Method of Fractal Traffic Generation by a Model of Generator on the Graph.
Proceedings of the 2nd International Workshop on Control, 2020

Managing multifractal properties of the binary sequence generated with the Markov chains.
Proceedings of The Third International Workshop on Computer Modeling and Intelligent Systems (CMIS-2020), 2020

2019
Information Hiding Using 3D-Printing Technology.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Side Channel Attack on a Quantum Random Number Generator.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Code-Based Schemes for Post-Quantum Digital Signatures.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Abstract Model of Eavesdropper and Overview on Attacks in Quantum Cryptography Systems.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

New Technique for Data Hiding in Cover Images Using Adaptively Generated Pseudorandom Sequences.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Pseudorandom Sequences for Spread Spectrum Image Steganography.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Discrete Signals with Special Correlation Properties.
Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), 2019

Soft Decoding Based on Ordered Subsets of Verification Equations of Turbo-Productive Codes.
Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), 2019

Method of Choosing Objects for Informational Influence in Social Networks during Information Campaign Based on the Analytic Hierarchy Process.
Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN 2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Methods of nulling numbers in the system of residual classes.
Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN 2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019


  Loading...