Jedrzej Bieniasz

Orcid: 0000-0002-4033-4684

According to our database1, Jedrzej Bieniasz authored at least 12 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Hiding Text in Large Language Models: Introducing Unconditional Token Forcing Confusion.
CoRR, 2024

Unconditional Token Forcing: Extracting Text Hidden Within LLM.
Proceedings of the 19th Conference on Computer Science and Intelligence Systems, 2024

2022
StegFog: Distributed Steganography Applied to Cyber Resiliency in Multi Node Environments.
IEEE Access, 2022

5G-Enabled Defence-in-Depth for Multi-domain Operations.
Proceedings of the IEEE Military Communications Conference, 2022

2019
Mobile Agents for Detecting Network Attacks Using Timing Covert Channels.
J. Univers. Comput. Sci., 2019

Methods for Information Hiding in Open Social Networks.
J. Univers. Comput. Sci., 2019

Yet Another Network Steganography Technique Basedon TCP Retransmissions.
Proceedings of the 5th International Conference on Frontiers of Signal Processing, 2019

2018
Towards Empowering Cyber Attack Resiliency Using Steganography.
Proceedings of the 4th International Conference on Frontiers of Signal Processing, 2018

Application of Perfectly Undetectable Network Steganography Method for Malware Hidden Communication.
Proceedings of the 4th International Conference on Frontiers of Signal Processing, 2018

2017
SocialStegDisc: Application of steganography in social networks to create a file system.
Proceedings of the 3rd International Conference on Frontiers of Signal Processing, 2017

2016
Towards model-based anomaly detection in network communication protocols.
Proceedings of the 2nd International Conference on Frontiers of Signal Processing, 2016

2015
Hardware Implementation of Rainbow Tables Generation for Hash Function Cryptanalysis.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 36th International Conference on Information Systems Architecture and Technology - ISAT 2015, 2015


  Loading...