Kamil Malinka

Orcid: 0000-0002-9009-2193

According to our database1, Kamil Malinka authored at least 25 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Comprehensive multiparametric analysis of human deepfake speech recognition.
EURASIP J. Image Video Process., December, 2024

Diffuse or Confuse: A Diffusion Deepfake Speech Dataset.
CoRR, 2024

Enhancing Security of AI-Based Code Synthesis with GitHub Copilot via Cheap and Efficient Prompt-Engineering.
CoRR, 2024

The legal aspects of cybersecurity vulnerability disclosure: To the NIS 2 and beyond.
Comput. Law Secur. Rev., 2024

Security Implications of Deepfakes in Face Authentication.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

Deepfake Speech Detection: A Spectrogram Analysis.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report.
Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 1, 2024

DAG-Sword: A Simulator of Large-Scale Network Topologies for DAG-Oriented Proof-of-Work Blockchains.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Resilience of Voice Assistants to Synthetic Speech.
Proceedings of the Computer Security - ESORICS 2024, 2024

Beyond the Bugs: Enhancing Bug Bounty Programs through Academic Partnerships.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
On the Educational Impact of ChatGPT: Is Artificial Intelligence Ready to Obtain a University Degree?
Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 1, 2023

IoT Gateways Network Communication Analysis.
Proceedings of the International Conference on Information Networking, 2023

Indirect Bluetooth Low Energy Connection Detection.
Proceedings of the International Conference on Information Networking, 2023

Incentive Attacks on DAG-Based Blockchains with Random Transaction Selection.
Proceedings of the IEEE International Conference on Blockchain, 2023

Assessing the Human Ability to Recognize Synthetic Speech in Ordinary Conversation.
Proceedings of the 22nd International Conference of the Biometrics Special Interest Group, 2023

Facial Image Reconstruction and its Influence to Face Recognition.
Proceedings of the 22nd International Conference of the Biometrics Special Interest Group, 2023

2022
Even if users do not read security directives, their behavior is not so catastrophic.
Commun. ACM, 2022

E-Banking Security Study - 10 Years Later.
IEEE Access, 2022

The dawn of a text-dependent society: deepfakes as a threat to speech verification systems.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

2021
DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy.
CoRR, 2021

2020
ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors.
IEEE Access, 2020

Security and Encryption at Modern Databases.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

2019
Increasing Trust in Tor Node List Using Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

2015
The Challenge of Increasing Safe Response of Antivirus Software Users.
Proceedings of the Mathematical and Engineering Methods in Computer Science, 2015

2011
Evaluation of biometric authentication based on visual evoked potentials.
Proceedings of the International Carnahan Conference on Security Technology, 2011


  Loading...