Piotr Syga

Orcid: 0000-0002-0266-5802

According to our database1, Piotr Syga authored at least 30 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
MLAAD: The Multi-Language Audio Anti-Spoofing Dataset.
CoRR, 2024

2023
Defense Against Adversarial Attacks on Audio DeepFake Detection.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023

Improved DeepFake Detection Using Whisper Features.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023

On Size Hiding Protocols in Beeping Model.
Proceedings of the Euro-Par 2023: Parallel Processing - 29th International Conference on Parallel and Distributed Computing, Limassol, Cyprus, August 28, 2023

Do Not Trust Me: Explainability Against Text Classification.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

2022
RFID Batch Authentication - A Usable Scheme Providing Anonymity.
IEEE Access, 2022

SpecRNet: Towards Faster and More Accessible Audio DeepFake Detection.
Proceedings of the IEEE International Conference on Trust, 2022

Attack Agnostic Dataset: Towards Generalization and Stabilization of Audio DeepFake Detection.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022

2021
Verify It Yourself: A Note on Activation Functions' Influence on Fast DeepFake Detection.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Emerging Security Challenges for Ubiquitous Devices.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
A Note on Deepfake Detection with Low-Resources.
CoRR, 2020

Robust watermarking with double detector-discriminator approach.
CoRR, 2020

Robust Spatial-spread Deep Neural Image Watermarking.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Droppix: Towards More Realistic Video Fingerprinting.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
A Fully Automated 3D In-Vivo Delineation and Shape Parameterization of the Human Lamina Cribrosa in Optical Coherence Tomography.
IEEE Trans. Biomed. Eng., 2019

On practical privacy-preserving fault-tolerant data aggregation.
Int. J. Inf. Sec., 2019

How to obfuscate execution of protocols in an ad hoc radio network?
Ad Hoc Networks, 2019

How to Save Your Face: a Facial Recognition Method Robust Against Image Reconstruction.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019

2018
User authorization based on hand geometry without special equipment.
Pattern Recognit., 2018

2017
Enhancing privacy for ad hoc systems with predeployment key distribution.
Ad Hoc Networks, 2017

Some Remarks about Tracing Digital Cameras - Faster Method and Usable Countermeasure.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Fully automated detection of lamina cribrosa in optical coherence tomography: Framework and illustrative examples.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

2016
RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits.
Proceedings of the Information Security Practice and Experience, 2016

Practical privacy preserving size approximation in distributed systems.
Proceedings of the 10th International Symposium on Communication Systems, 2016

Practical Fault-Tolerant Data Aggregation.
Proceedings of the Applied Cryptography and Network Security, 2016

2014
Lightweight Protocol for Trusted Spontaneous Communication.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2013
Chameleon RFID and Tracking Prevention.
Proceedings of the Radio Frequency Identification System Security, 2013

Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2012
Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple Countermeasures.
Proceedings of the SECRYPT 2012, 2012

Obfuscated Counting in Single-Hop Radio Network.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012


  Loading...