Artur Janicki
Artur Janicki
Adresse e-mail validée de
Citée par
Citée par
Re-assessing the threat of replay spoofing attacks against automatic speaker verification
F Alegre, A Janicki, N Evans
2014 International conference of the biometrics special interest group …, 2014
Steganalysis of transcoding steganography
A Janicki, W Mazurczyk, K Szczypiorski
annals of telecommunications-annales des télécommunications 69 (7), 449-460, 2014
An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks
A Janicki, F Alegre, N Evans
Security and Communication Networks 9 (15), 3030-3044, 2016
Spoofing countermeasure based on analysis of linear prediction error
A Janicki
Sixteenth annual conference of the international speech communication …, 2015
" The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography
K Szczypiorski, A Janicki, S Wendzel
arXiv preprint arXiv:1508.04978, 2015
Comparison of speaker dependent and speaker independent emotion recognition
J Rybka, A Janicki
International Journal of Applied Mathematics and Computer Science 23 (4), 2013
Speaker recognition from coded speech using support vector machines
A Janicki, T Staroszczyk
International Conference on Text, Speech and Dialogue, 291-298, 2011
Pitch‐based steganography for Speex voice codec
A Janicki
Security and communication networks 9 (15), 2923-2933, 2016
YouSkyde: information hiding for Skype video traffic
W Mazurczyk, M Karaś, K Szczypiorski, A Janicki
Multimedia Tools and Applications 75 (21), 13521-13540, 2016
Recognition of extraversion level based on handwriting and support vector machines
Z Górska, A Janicki
Perceptual and motor skills 114 (3), 857-869, 2012
Non-linguistic vocalisation recognition based on hybrid GMM-SVM approach.
A Janicki
INTERSPEECH, 153-157, 2013
Influence of speech codecs selection on transcoding steganography
A Janicki, W Mazurczyk, K Szczypiorski
Telecommunication Systems 59 (3), 305-315, 2015
On the impact of non-speech sounds on speaker recognition
A Janicki
International Conference on Text, Speech and Dialogue, 566-572, 2012
Packet Loss Concealment Algorithm for VoIP Transmission in Unreliable Networks.
A Janicki, B Ksiezak
New Trends in Multimedia and Network Information Systems, 23-33, 2008
Tight arms race: overview of current malware threats and trends in their detection
L Caviglione, M Choraś, I Corona, A Janicki, W Mazurczyk, M Pawlicki, ...
IEEE Access, 2020
Automatic speech recognition for Polish in a computer game interface
A Janicki, D Wawer
2011 Federated Conference on Computer Science and Information Systems …, 2011
Novel method of hiding information in IP telephony using pitch approximation
A Janicki
2015 10th International Conference on Availability, Reliability and Security …, 2015
Traffic fingerprinting attacks on internet of things using machine learning
M Skowron, A Janicki, W Mazurczyk
IEEE Access 8, 20386-20400, 2020
Mobile agents for detecting network attacks using timing covert channels
J Bieniasz, M Stępkowska, A Janicki, K Szczypiorski
JUCS-Journal of Universal Computer Science 25, 1109, 2019
Trends in modern information hiding: techniques, applications, and detection
W Mazurczyk, K Szczypiorski, A Janicki, H Tian
Security and Communication Networks 9 (8), 703-704, 2016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20