Michal Kedziora
Orcid: 0000-0002-7764-1303
According to our database1,
Michal Kedziora
authored at least 29 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Analysis of Network Intrusion Detection and Potential Botnets Identification Using Selected Machine Learning Techniques.
Proceedings of the Advances in Computational Collective Intelligence, 2024
Using Brain-Computer Interface and Artificial Intelligence Algorithms for Language Learning.
Proceedings of the Advances in Computational Collective Intelligence, 2024
Proceedings of the Recent Challenges in Intelligent Information and Database Systems, 2024
2023
Analysis of segregated witness implementation for increasing efficiency and security of the Bitcoin cryptocurrency.
J. Inf. Telecommun., January, 2023
Improvement of the Process of Diagnosing Patient's Condition via Computer Tomography Lung Scans Using Neural Networks.
Proceedings of the Recent Challenges in Intelligent Information and Database Systems, 2023
2022
IEEE Trans. Hum. Mach. Syst., 2022
Guest Editorial Special Issue on Graph-Powered Machine Learning for Internet of Things.
IEEE Internet Things J., 2022
Performance and scalability evaluation of a permissioned Blockchain based on the Hyperledger Fabric, Sawtooth and Iroha.
Comput. Sci. Inf. Syst., 2022
Proceedings of the 14th International Conference on Management of Digital EcoSystems, 2022
Multiplatform Comparative Analysis of Intelligent Robots for Communication Efficiency in Smart Dialogs.
Proceedings of the Advanced Information Networking and Applications, 2022
Using Simplified EEG-Based Brain Computer Interface and Decision Tree Classifier for Emotions Detection.
Proceedings of the Advanced Information Networking and Applications, 2022
Proceedings of the Recent Challenges in Intelligent Information and Database Systems, 2022
Using Brain-Computer Interface (BCI) and Artificial Intelligence for EEG Signal Analysis.
Proceedings of the Recent Challenges in Intelligent Information and Database Systems, 2022
2021
Comput. Informatics, 2021
Adversarial Attacks on Face Detection Algorithms Using Anti-facial Recognition T-Shirts.
Proceedings of the Advances in Computational Collective Intelligence, 2021
Security and Scalability in Private Permissionless Blockchain: Problems and Solutions Leading to Creating Consent-as-a-Service (CaaS) Deployment.
Proceedings of the Advances in Computational Collective Intelligence, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2020
Anti-Cheat Tool for Detecting Unauthorized User Interference in the Unity Engine Using Blockchain.
Data-Centric Business and Applications, 2020
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020
Security of Blockchain Distributed Ledger Consensus Mechanism in Context of the Sybil Attack.
Proceedings of the Trends in Artificial Intelligence Theory and Applications. Artificial Intelligence Practices, 2020
State Management and Software Architecture Approaches in Cross-platform Flutter Applications.
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
2019
Proceedings of the Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology - ISAT 2019, 2019
Correspondent Sensitive Encryption Standard (CSES) Algorithm in Insecure Communication Channel.
Proceedings of the Engineering in Dependability of Computer Systems and Networks, 2019
2017
Proceedings of the Applications and Techniques in Information Security, 2017
2015
Proceedings of the 2nd IEEE International Conference on Cybernetics, 2015
2013
Methods for Detecting and Analyzing Hidden FAT32 Volumes Created with the Use of Cryptographic Tools.
Proceedings of the New Results in Dependability and Computer Systems, 2013
2011
Efficient N-Byte Slack Space Hashing in Retrieving and Identifying Partially Recovered Data.
Proceedings of the ICSOFT 2011, 2011