Artur Janicki
Artur Janicki
Adresse e-mail validée de tele.pw.edu.pl
Titre
Citée par
Citée par
Année
Re-assessing the threat of replay spoofing attacks against automatic speaker verification
F Alegre, A Janicki, N Evans
2014 International conference of the biometrics special interest group …, 2014
972014
Steganalysis of transcoding steganography
A Janicki, W Mazurczyk, K Szczypiorski
annals of telecommunications-annales des télécommunications 69 (7), 449-460, 2014
432014
An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks
A Janicki, F Alegre, N Evans
Security and Communication Networks 9 (15), 3030-3044, 2016
382016
Spoofing countermeasure based on analysis of linear prediction error
A Janicki
Sixteenth annual conference of the international speech communication …, 2015
372015
" The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography
K Szczypiorski, A Janicki, S Wendzel
arXiv preprint arXiv:1508.04978, 2015
252015
Comparison of speaker dependent and speaker independent emotion recognition
J Rybka, A Janicki
International Journal of Applied Mathematics and Computer Science 23 (4), 2013
242013
Speaker recognition from coded speech using support vector machines
A Janicki, T Staroszczyk
International Conference on Text, Speech and Dialogue, 291-298, 2011
242011
Pitch‐based steganography for Speex voice codec
A Janicki
Security and communication networks 9 (15), 2923-2933, 2016
222016
YouSkyde: information hiding for Skype video traffic
W Mazurczyk, M Karaś, K Szczypiorski, A Janicki
Multimedia Tools and Applications 75 (21), 13521-13540, 2016
172016
Recognition of extraversion level based on handwriting and support vector machines
Z Górska, A Janicki
Perceptual and motor skills 114 (3), 857-869, 2012
162012
Non-linguistic vocalisation recognition based on hybrid GMM-SVM approach.
A Janicki
INTERSPEECH, 153-157, 2013
142013
Influence of speech codecs selection on transcoding steganography
A Janicki, W Mazurczyk, K Szczypiorski
Telecommunication Systems 59 (3), 305-315, 2015
132015
On the impact of non-speech sounds on speaker recognition
A Janicki
International Conference on Text, Speech and Dialogue, 566-572, 2012
102012
Packet Loss Concealment Algorithm for VoIP Transmission in Unreliable Networks.
A Janicki, B Ksiezak
New Trends in Multimedia and Network Information Systems, 23-33, 2008
102008
Tight arms race: overview of current malware threats and trends in their detection
L Caviglione, M Choraś, I Corona, A Janicki, W Mazurczyk, M Pawlicki, ...
IEEE Access, 2020
92020
Automatic speech recognition for Polish in a computer game interface
A Janicki, D Wawer
2011 Federated Conference on Computer Science and Information Systems …, 2011
92011
Novel method of hiding information in IP telephony using pitch approximation
A Janicki
2015 10th International Conference on Availability, Reliability and Security …, 2015
82015
Traffic fingerprinting attacks on internet of things using machine learning
M Skowron, A Janicki, W Mazurczyk
IEEE Access 8, 20386-20400, 2020
72020
Mobile agents for detecting network attacks using timing covert channels
J Bieniasz, M Stępkowska, A Janicki, K Szczypiorski
JUCS-Journal of Universal Computer Science 25, 1109, 2019
62019
Trends in modern information hiding: techniques, applications, and detection
W Mazurczyk, K Szczypiorski, A Janicki, H Tian
Security and Communication Networks 9 (8), 703-704, 2016
62016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20