Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns., , , , and . ICCS (4), volume 12140 of Lecture Notes in Computer Science, page 184-195. Springer, (2020)A survey of automatic speech recognition deep models performance for Polish medical terms., , , , , , , and . SPA, page 19-24. IEEE, (2023)Detecting Sensitive Data with GANs and Fully Convolutional Networks., , and . ACIIDS (1), volume 13995 of Lecture Notes in Computer Science, page 273-283. Springer, (2023)The Good, the Bad, and the Commons: A Critical Review of Popular Discourse on Piracy and Power During Anti-ACTA Protests.. J. Comput. Mediat. Commun., 21 (2): 177-194 (2016)Multi-task hypernetworks., , , , , and . CoRR, (2019)Convolutional Recurrent Neural Networks for Computer Network Analysis., , and . ICANN (4), volume 11730 of Lecture Notes in Computer Science, page 747-757. Springer, (2019)Towards End-to-End Chase in Urban Autonomous Driving Using Reinforcement Learning., , , and . IntelliSys (3), volume 544 of Lecture Notes in Networks and Systems, page 408-426. Springer, (2022)Accurate and fast URL phishing detector: A convolutional neural network approach., , , , , and . Comput. Networks, (2020)Coupled Multi-Robot Systems Under Linear Temporal Logic and Signal Temporal Logic Tasks., , , , , and . IEEE Trans. Control. Syst. Technol., 29 (2): 858-865 (2021)Classification of Computer Network Users with Convolutional Neural Networks., , and . FedCSIS, volume 15 of Annals of Computer Science and Information Systems, page 501-504. (2018)