default search action
Piotr Syga
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j7]Katarzyna Fojcik, Piotr Syga, Marek Klonowski:
Extremely compact video representation for efficient near-duplicates detection. Pattern Recognit. 158: 111016 (2025) - 2024
- [c22]Nicolas M. Müller, Piotr Kawa, Wei Herng Choong, Edresson Casanova, Eren Gölge, Thorsten Müller, Piotr Syga, Philip Sperl, Konstantin Böttinger:
MLAAD: The Multi-Language Audio Anti-Spoofing Dataset. IJCNN 2024: 1-7 - [c21]Tymoteusz Lindner, Tomasz Hawro, Piotr Syga:
Imperceptible QR Watermarks in High-Resolution Videos. SECRYPT 2024: 310-322 - [i9]Nicolas M. Müller, Piotr Kawa, Wei Herng Choong, Edresson Casanova, Eren Gölge, Thorsten Müller, Piotr Syga, Philip Sperl, Konstantin Böttinger:
MLAAD: The Multi-Language Audio Anti-Spoofing Dataset. CoRR abs/2401.09512 (2024) - 2023
- [c20]Mateusz Gniewkowski, Piotr Syga, Marek Klonowski, Tomasz Walkowiak:
Do Not Trust Me: Explainability Against Text Classification. ECAI 2023: 875-882 - [c19]Dominik Bojko, Marek Klonowski, Mateusz Marciniak, Piotr Syga:
On Size Hiding Protocols in Beeping Model. Euro-Par 2023: 518-532 - [c18]Piotr Kawa, Marcin Plata, Michal Czuba, Piotr Szymanski, Piotr Syga:
Improved DeepFake Detection Using Whisper Features. INTERSPEECH 2023: 4009-4013 - [c17]Piotr Kawa, Marcin Plata, Piotr Syga:
Defense Against Adversarial Attacks on Audio DeepFake Detection. INTERSPEECH 2023: 5276-5280 - [i8]Piotr Kawa, Marcin Plata, Michal Czuba, Piotr Szymanski, Piotr Syga:
Improved DeepFake Detection Using Whisper Features. CoRR abs/2306.01428 (2023) - 2022
- [j6]Przemyslaw Blaskiewicz, Bartosz Drzazga, Lukasz Krzywiecki, Damian Stygar, Piotr Syga:
RFID Batch Authentication - A Usable Scheme Providing Anonymity. IEEE Access 10: 85368-85383 (2022) - [c16]Piotr Kawa, Marcin Plata, Piotr Syga:
Attack Agnostic Dataset: Towards Generalization and Stabilization of Audio DeepFake Detection. INTERSPEECH 2022: 4023-4027 - [c15]Piotr Kawa, Marcin Plata, Piotr Syga:
SpecRNet: Towards Faster and More Accessible Audio DeepFake Detection. TrustCom 2022: 792-799 - [i7]Piotr Kawa, Marcin Plata, Piotr Syga:
Attack Agnostic Dataset: Towards Generalization and Stabilization of Audio DeepFake Detection. CoRR abs/2206.13979 (2022) - [i6]Piotr Kawa, Marcin Plata, Piotr Syga:
SpecRNet: Towards Faster and More Accessible Audio DeepFake Detection. CoRR abs/2210.06105 (2022) - [i5]Piotr Kawa, Marcin Plata, Piotr Syga:
Defense Against Adversarial Attacks on Audio DeepFake Detection. CoRR abs/2212.14597 (2022) - 2021
- [c14]Piotr Kawa, Piotr Syga:
Verify It Yourself: A Note on Activation Functions' Influence on Fast DeepFake Detection. SECRYPT 2021: 779-784 - [p1]Miroslaw Kutylowski, Piotr Syga, Moti Yung:
Emerging Security Challenges for Ubiquitous Devices. Security of Ubiquitous Computing Systems 2021: 3-18 - 2020
- [c13]Przemyslaw Blaskiewicz, Marek Klonowski, Piotr Syga:
Droppix: Towards More Realistic Video Fingerprinting. ICETE (2) 2020: 468-476 - [c12]Marcin Plata, Piotr Syga:
Robust Spatial-spread Deep Neural Image Watermarking. TrustCom 2020: 62-70 - [i4]Marcin Plata, Piotr Syga:
Robust Spatial-spread Deep Neural Image Watermarking. CoRR abs/2005.11735 (2020) - [i3]Marcin Plata, Piotr Syga:
Robust watermarking with double detector-discriminator approach. CoRR abs/2006.03921 (2020) - [i2]Piotr Kawa, Piotr Syga:
A Note on Deepfake Detection with Low-Resources. CoRR abs/2006.05183 (2020)
2010 – 2019
- 2019
- [j5]Marcin Kardas, Marek Klonowski, Piotr Syga:
How to obfuscate execution of protocols in an ad hoc radio network? Ad Hoc Networks 84: 90-106 (2019) - [j4]Krzysztof Grining, Marek Klonowski, Piotr Syga:
On practical privacy-preserving fault-tolerant data aggregation. Int. J. Inf. Sec. 18(3): 285-304 (2019) - [j3]Piotr Syga, Cezary Sieluzycki, Patrycja Krzyzanowska-Berkowska, D. Robert Iskander:
A Fully Automated 3D In-Vivo Delineation and Shape Parameterization of the Human Lamina Cribrosa in Optical Coherence Tomography. IEEE Trans. Biomed. Eng. 66(5): 1422-1428 (2019) - [c11]Marcin Plata, Piotr Syga, Marek Klonowski:
How to Save Your Face: a Facial Recognition Method Robust Against Image Reconstruction. BTAS 2019: 1-10 - 2018
- [j2]Marek Klonowski, Marcin Plata, Piotr Syga:
User authorization based on hand geometry without special equipment. Pattern Recognit. 73: 189-201 (2018) - 2017
- [j1]Marek Klonowski, Piotr Syga:
Enhancing privacy for ad hoc systems with predeployment key distribution. Ad Hoc Networks 59: 35-47 (2017) - [c10]Piotr Syga, Cezary Sieluzycki, Patrycja Krzyzanowska-Berkowska, D. Robert Iskander:
Fully automated detection of lamina cribrosa in optical coherence tomography: Framework and illustrative examples. EMBC 2017: 608-611 - [c9]Jaroslaw Bernacki, Marek Klonowski, Piotr Syga:
Some Remarks about Tracing Digital Cameras - Faster Method and Usable Countermeasure. SECRYPT 2017: 343-350 - 2016
- [c8]Krzysztof Grining, Marek Klonowski, Piotr Syga:
Practical Fault-Tolerant Data Aggregation. ACNS 2016: 386-404 - [c7]Marek Klonowski, Piotr Syga:
Practical privacy preserving size approximation in distributed systems. CSNDSP 2016: 1-6 - [c6]Przemyslaw Blaskiewicz, Lukasz Krzywiecki, Piotr Syga:
RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits. ISPEC 2016: 209-223 - [i1]Krzysztof Grining, Marek Klonowski, Piotr Syga:
Practical Fault-Tolerant Data Aggregation. CoRR abs/1602.04138 (2016) - 2014
- [c5]Przemyslaw Blaskiewicz, Marek Klonowski, Miroslaw Kutylowski, Piotr Syga:
Lightweight Protocol for Trusted Spontaneous Communication. INTRUST 2014: 228-242 - 2013
- [c4]Przemyslaw Blaskiewicz, Marek Klonowski, Krzysztof Majcher, Piotr Syga:
Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems. CyberC 2013: 89-96 - [c3]Marek Klonowski, Miroslaw Kutylowski, Piotr Syga:
Chameleon RFID and Tracking Prevention. RFIDSec Asia 2013: 17-29 - 2012
- [c2]Marcin Kardas, Marek Klonowski, Piotr Syga, Szymon Wilczek:
Obfuscated Counting in Single-Hop Radio Network. ICPADS 2012: 692-693 - [c1]Marek Klonowski, Piotr Syga, Wojciech Wodo:
Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple Countermeasures. SECRYPT 2012: 296-301
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint