Artur Janicki

Orcid: 0000-0002-9937-4402

According to our database1, Artur Janicki authored at least 54 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ClickAgent: Enhancing UI Location Capabilities of Autonomous Agents.
CoRR, 2024

Real-Time Energy Measurement for Non-Intrusive Well-Being Monitoring of Elderly People - a Case Study.
CoRR, 2024

System for Measurement of Electric Energy Using Beacons with Optical Sensors and LoRaWAN Transmission.
CoRR, 2024

Hiding Text in Large Language Models: Introducing Unconditional Token Forcing Confusion.
CoRR, 2024

Large Language Models for Expansion of Spoken Language Understanding Systems to New Languages.
CoRR, 2024

NL-ITI: Optimizing Probing and Intervention for Improvement of ITI Method.
CoRR, 2024

Improved Small-Footprint ASR-Based Solution for Open Vocabulary Keyword Spotting.
IEEE Access, 2024

Comparison of computational complexity of neural network models for detection of steganographic algorithms.
Proceedings of the 13th International Conference on Software and Computer Applications, 2024

Unconditional Token Forcing: Extracting Text Hidden Within LLM.
Proceedings of the 19th Conference on Computer Science and Intelligence Systems, 2024

Impact of Spelling and Editing Correctness on Detection of LLM-Generated Emails.
Proceedings of the 19th Conference on Computer Science and Intelligence Systems, 2024

Detection of AI-Generated Emails - A Case Study.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Slot Lost in Translation? Not Anymore: A Machine Translation Model for Virtual Assistants with Type-Independent Slot Transfer.
Proceedings of the 30th International Conference on Systems, Signals and Image Processing, 2023

Therapeutic Spoken Dialogue System in Clinical Settings: Initial Experiments.
Proceedings of the 30th International Conference on Systems, Signals and Image Processing, 2023

MOCKS 1.0: Multilingual Open Custom Keyword Spotting Testset.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023

Enhanced Emotion and Sentiment Recognition for Empathetic Dialogue System Using Big Data and Deep Learning Methods.
Proceedings of the Computational Science - ICCS 2023, 2023

Can We Use Probing to Better Understand Fine-Tuning and Knowledge Distillation of the BERT NLU?
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Optimizing Machine Translation for Virtual Assistants: Multi-Variant Generation with VerbNet and Conditional Beam Search.
Proceedings of the 18th Conference on Computer Science and Intelligence Systems, 2023

Open Vocabulary Keyword Spotting with Small-Footprint ASR-based Architecture and Language Models.
Proceedings of the 18th Conference on Computer Science and Intelligence Systems, 2023

2022
Federated Learning in Heterogeneous Data Settings for Virtual Assistants - A Case Study.
Proceedings of the Text, Speech, and Dialogue - 25th International Conference, 2022

Semi-Supervised Learning with Limited Data for Automatic Speech Recognition.
Proceedings of the 7th IEEE Forum on Research and Technologies for Society and Industry Innovation, 2022

VHS-22 - A Very Heterogeneous Set of Network Traffic Data for Threat Detection.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

2021
Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection.
IEEE Access, 2021

How to Make an Intrusion Detection SystemAware of Steganographic Transmission.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021

2020
Traffic Fingerprinting Attacks on Internet of Things Using Machine Learning.
IEEE Access, 2020

Leyzer: A Dataset for Multilingual Virtual Assistants.
Proceedings of the Text, Speech, and Dialogue, 2020

Modification of Pitch Parameters in Speech Coding for Information Hiding.
Proceedings of the Text, Speech, and Dialogue, 2020

Improved weighted loss function for training end-of-speech detection models.
Proceedings of the MoMM '20: The 18th International Conference on Advances in Mobile Computing and Multimedia, Chiang Mai, Thailand, November 30, 2020

2019
Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes.
J. Univers. Comput. Sci., 2019

Mobile Agents for Detecting Network Attacks Using Timing Covert Channels.
J. Univers. Comput. Sci., 2019

2017
Increasing anti-spoofing protection in speaker verification using linear prediction.
Multim. Tools Appl., 2017

Synthetic Speech in Therapy of Auditory Hallucinations.
Proceedings of the Text, Speech, and Dialogue - 20th International Conference, 2017

Voice conversion with pitch alteration using phase vocoder.
Proceedings of the Signal Processing: Algorithms, 2017

2016
Trends in modern information hiding: techniques, applications, and detection.
Secur. Commun. Networks, 2016

An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks.
Secur. Commun. Networks, 2016

Pitch-based steganography for Speex voice codec.
Secur. Commun. Networks, 2016

YouSkyde: information hiding for Skype video traffic.
Multim. Tools Appl., 2016

2015
Influence of speech codecs selection on transcoding steganography.
Telecommun. Syst., 2015

On the undetectability of transcoding steganography.
Secur. Commun. Networks, 2015

"The Good, The Bad and The Ugly": Evaluation of Wi-Fi Steganography.
J. Commun., 2015

Why Do Older Adults Prefer Some Radio Stations? Helping to Increase Speech Understanding.
J. Commun., 2015

Spoofing countermeasure based on analysis of linear prediction error.
Proceedings of the 16th Annual Conference of the International Speech Communication Association, 2015

Novel Method of Hiding Information in IP Telephony Using Pitch Approximation.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Steganalysis of transcoding steganography.
Ann. des Télécommunications, 2014

Re-assessing the threat of replay spoofing attacks against automatic speaker verification.
Proceedings of the BIOSIG 2014, 2014

2013
Voice-Driven Computer Game in Noisy Environments.
Int. J. Comput. Sci. Appl., 2013

Comparison of speaker dependent and speaker independent emotion recognition.
Int. J. Appl. Math. Comput. Sci., 2013

Non-linguistic vocalisation recognition based on hybrid GMM-SVM approach.
Proceedings of the 14th Annual Conference of the International Speech Communication Association, 2013

2012
On the Impact of Non-speech Sounds on Speaker Recognition.
Proceedings of the Text, Speech and Dialogue - 15th International Conference, 2012

SVM-based speaker verification for coded and uncoded speech.
Proceedings of the 20th European Signal Processing Conference, 2012

2011
Speaker Recognition from Coded Speech Using Support Vector Machines.
Proceedings of the Text, Speech and Dialogue - 14th International Conference, 2011

Automatic Speech Recognition for Polish in a Computer Game Interface.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2011

2008
Packet Loss Concealment Algorithm for VoIP Transmission in Unreliable Networks.
Proceedings of the New Trends in Multimedia and Network Information Systems, 2008

2005
Reconstruction of Polish diacritics in a text-to-speech system.
Proceedings of the 9th European Conference on Speech Communication and Technology, 2005

2000
Automatic construction of acoustic inventory for the concatenative speech synthesis for polish.
Proceedings of the Sixth International Conference on Spoken Language Processing, 2000


  Loading...