default search action
Artur Janicki
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Mikolaj Pudo, Mateusz Wosik, Artur Janicki:
Improved Small-Footprint ASR-Based Solution for Open Vocabulary Keyword Spotting. IEEE Access 12: 91289-91299 (2024) - [c28]Pawel Gryka, Kacper T. Gradon, Marek Kozlowski, Milosz Kutyla, Artur Janicki:
Detection of AI-Generated Emails - A Case Study. ARES 2024: 141:1-141:8 - [c27]Mikolaj Plachta, Artur Janicki:
Comparison of computational complexity of neural network models for detection of steganographic algorithms. ICSCA 2024: 7-11 - [i10]Jakub Hoscilowicz, Adam Wiacek, Jan Chojnacki, Adam Cieslak, Leszek Michon, Vitalii Urbanevych, Artur Janicki:
NL-ITI: Optimizing Probing and Intervention for Improvement of ITI Method. CoRR abs/2403.18680 (2024) - [i9]Jakub Hoscilowicz, Pawel Pawlowski, Marcin Skorupa, Marcin Sowanski, Artur Janicki:
Large Language Models for Expansion of Spoken Language Understanding Systems to New Languages. CoRR abs/2404.02588 (2024) - [i8]Jakub Hoscilowicz, Pawel Popiolek, Jan Rudkowski, Jedrzej Bieniasz, Artur Janicki:
Hiding Text in Large Language Models: Introducing Unconditional Token Forcing Confusion. CoRR abs/2406.02481 (2024) - [i7]Lukasz Marcul, Mateusz Brzozowski, Artur Janicki:
System for Measurement of Electric Energy Using Beacons with Optical Sensors and LoRaWAN Transmission. CoRR abs/2406.18455 (2024) - [i6]Mateusz Brzozowski, Artur Janicki:
Real-Time Energy Measurement for Non-Intrusive Well-Being Monitoring of Elderly People - a Case Study. CoRR abs/2407.00524 (2024) - 2023
- [c26]Mikolaj Pudo, Mateusz Wosik, Artur Janicki:
Open Vocabulary Keyword Spotting with Small-Footprint ASR-based Architecture and Language Models. FedCSIS 2023: 657-666 - [c25]Marcin Sowanski, Artur Janicki:
Optimizing Machine Translation for Virtual Assistants: Multi-Variant Generation with VerbNet and Conditional Beam Search. FedCSIS 2023: 1149-1154 - [c24]Jakub Hoscilowicz, Marcin Sowanski, Piotr Czubowski, Artur Janicki:
Can We Use Probing to Better Understand Fine-Tuning and Knowledge Distillation of the BERT NLU? ICAART (3) 2023: 625-632 - [c23]Marek Kozlowski, Karolina Gabor-Siatkowska, Izabela Stefaniak, Marcin Sowanski, Artur Janicki:
Enhanced Emotion and Sentiment Recognition for Empathetic Dialogue System Using Big Data and Deep Learning Methods. ICCS (1) 2023: 465-480 - [c22]Mikolaj Pudo, Mateusz Wosik, Adam Cieslak, Justyna Krzywdziak, Bozena Lukasiak, Artur Janicki:
MOCKS 1.0: Multilingual Open Custom Keyword Spotting Testset. INTERSPEECH 2023: 4054-4058 - [c21]Karolina Gabor-Siatkowska, Marcin Sowanski, Mikolaj Pudo, Rafal Rzatkiewicz, Izabela Stefaniak, Marek Kozlowski, Artur Janicki:
Therapeutic Spoken Dialogue System in Clinical Settings: Initial Experiments. IWSSIP 2023: 1-5 - [c20]Marcin Sowanski, Artur Janicki:
Slot Lost in Translation? Not Anymore: A Machine Translation Model for Virtual Assistants with Type-Independent Slot Transfer. IWSSIP 2023: 1-5 - [i5]Jakub Hoscilowicz, Marcin Sowanski, Piotr Czubowski, Artur Janicki:
Can We Use Probing to Better Understand Fine-tuning and Knowledge Distillation of the BERT NLU? CoRR abs/2301.11688 (2023) - 2022
- [c19]Pawel Szumelda, Natan Orzechowski, Mariusz Rawski, Artur Janicki:
VHS-22 - A Very Heterogeneous Set of Network Traffic Data for Threat Detection. EICC 2022: 72-78 - [c18]Mikolaj Pudo, Natalia Szczepanek, Bozena Lukasiak, Artur Janicki:
Semi-Supervised Learning with Limited Data for Automatic Speech Recognition. RTSI 2022: 136-141 - [c17]Pawel Pardela, Anna Fajfer, Mateusz Góra, Artur Janicki:
Federated Learning in Heterogeneous Data Settings for Virtual Assistants - A Case Study. TSD 2022: 451-463 - 2021
- [j16]Luca Caviglione, Michal Choras, Igino Corona, Artur Janicki, Wojciech Mazurczyk, Marek Pawlicki, Katarzyna Wasielewska:
Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection. IEEE Access 9: 5371-5396 (2021) - [c16]Tomasz Koziak, Katarzyna Wasielewska, Artur Janicki:
How to Make an Intrusion Detection SystemAware of Steganographic Transmission. EICC 2021: 77-82 - 2020
- [j15]Monika Skowron, Artur Janicki, Wojciech Mazurczyk:
Traffic Fingerprinting Attacks on Internet of Things Using Machine Learning. IEEE Access 8: 20386-20400 (2020) - [c15]Mikolaj Pudo, Adrian Wisniewski, Artur Janicki:
Improved weighted loss function for training end-of-speech detection models. MoMM 2020: 25-29 - [c14]Marcin Sowanski, Artur Janicki:
Leyzer: A Dataset for Multilingual Virtual Assistants. TDS 2020: 477-486 - [c13]Adrian Radej, Artur Janicki:
Modification of Pitch Parameters in Speech Coding for Information Hiding. TDS 2020: 513-523
2010 – 2019
- 2019
- [j14]Artur Janicki, Wojciech Mazurczyk, Xiangyang Luo, Dengpan Ye:
Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes. J. Univers. Comput. Sci. 25(9): 1039-1042 (2019) - [j13]Jedrzej Bieniasz, Monika Stepkowska, Artur Janicki, Krzysztof Szczypiorski:
Mobile Agents for Detecting Network Attacks Using Timing Covert Channels. J. Univers. Comput. Sci. 25(9): 1109-1130 (2019) - 2017
- [j12]Artur Janicki:
Increasing anti-spoofing protection in speaker verification using linear prediction. Multim. Tools Appl. 76(6): 9017-9032 (2017) - [c12]Michal Lenarczyk, Artur Janicki:
Voice conversion with pitch alteration using phase vocoder. SPA 2017: 73-77 - [c11]Kamil Sorokosz, Izabela Stefaniak, Artur Janicki:
Synthetic Speech in Therapy of Auditory Hallucinations. TSD 2017: 83-91 - 2016
- [j11]Wojciech Mazurczyk, Maciej Karas, Krzysztof Szczypiorski, Artur Janicki:
YouSkyde: information hiding for Skype video traffic. Multim. Tools Appl. 75(21): 13521-13540 (2016) - [j10]Wojciech Mazurczyk, Krzysztof Szczypiorski, Artur Janicki, Hui Tian:
Trends in modern information hiding: techniques, applications, and detection. Secur. Commun. Networks 9(8): 703-704 (2016) - [j9]Artur Janicki:
Pitch-based steganography for Speex voice codec. Secur. Commun. Networks 9(15): 2923-2933 (2016) - [j8]Artur Janicki, Federico Alegre, Nicholas W. D. Evans:
An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks. Secur. Commun. Networks 9(15): 3030-3044 (2016) - [i4]Wojciech Mazurczyk, Maciej Karas, Krzysztof Szczypiorski, Artur Janicki:
YouSkyde: Information Hiding for Skype Video Traffic. CoRR abs/1608.07337 (2016) - 2015
- [j7]Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel:
"The Good, The Bad and The Ugly": Evaluation of Wi-Fi Steganography. J. Commun. 10(10): 747-752 (2015) - [j6]Artur Janicki, Krzysztof Szczypiorski:
Why Do Older Adults Prefer Some Radio Stations? Helping to Increase Speech Understanding. J. Commun. 10(11): 926-931 (2015) - [j5]Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
On the undetectability of transcoding steganography. Secur. Commun. Networks 8(18): 3804-3814 (2015) - [j4]Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Influence of speech codecs selection on transcoding steganography. Telecommun. Syst. 59(3): 305-315 (2015) - [c10]Artur Janicki:
Novel Method of Hiding Information in IP Telephony Using Pitch Approximation. ARES 2015: 429-435 - [c9]Artur Janicki:
Spoofing countermeasure based on analysis of linear prediction error. INTERSPEECH 2015: 2077-2081 - [i3]Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel:
"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography. CoRR abs/1508.04978 (2015) - 2014
- [j3]Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Steganalysis of transcoding steganography. Ann. des Télécommunications 69(7-8): 449-460 (2014) - [c8]Federico Alegre, Artur Janicki, Nicholas W. D. Evans:
Re-assessing the threat of replay spoofing attacks against automatic speaker verification. BIOSIG 2014: 157-168 - 2013
- [j2]Jan Rybka, Artur Janicki:
Comparison of speaker dependent and speaker independent emotion recognition. Int. J. Appl. Math. Comput. Sci. 23(4): 797-808 (2013) - [j1]Artur Janicki, Dariusz Wawer:
Voice-Driven Computer Game in Noisy Environments. Int. J. Comput. Sci. Appl. 10(1): 31-45 (2013) - [c7]Artur Janicki:
Non-linguistic vocalisation recognition based on hybrid GMM-SVM approach. INTERSPEECH 2013: 153-157 - 2012
- [c6]Artur Janicki:
SVM-based speaker verification for coded and uncoded speech. EUSIPCO 2012: 26-30 - [c5]Artur Janicki:
On the Impact of Non-speech Sounds on Speaker Recognition. TSD 2012: 566-572 - [i2]Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Influence of Speech Codecs Selection on Transcoding Steganography. CoRR abs/1201.6218 (2012) - [i1]Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Steganalysis of Transcoding Steganography. CoRR abs/1210.5888 (2012) - 2011
- [c4]Artur Janicki, Dariusz Wawer:
Automatic Speech Recognition for Polish in a Computer Game Interface. FedCSIS 2011: 711-716 - [c3]Artur Janicki, Tomasz Staroszczyk:
Speaker Recognition from Coded Speech Using Support Vector Machines. TSD 2011: 291-298
2000 – 2009
- 2008
- [p1]Artur Janicki, Bartlomiej Ksiezak:
Packet Loss Concealment Algorithm for VoIP Transmission in Unreliable Networks. New Trends in Multimedia and Network Information Systems 2008: 23-33 - 2005
- [c2]Artur Janicki, Piotr Herman:
Reconstruction of Polish diacritics in a text-to-speech system. INTERSPEECH 2005: 1489-1492 - 2000
- [c1]Artur Janicki:
Automatic construction of acoustic inventory for the concatenative speech synthesis for polish. INTERSPEECH 2000: 713-716
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint