Joanna Domanska

Orcid: 0000-0002-1935-8358

According to our database1, Joanna Domanska authored at least 57 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Global Entropy Pooling layer for Convolutional Neural Networks.
Neurocomputing, October, 2023

Software vulnerabilities in TensorFlow-based deep learning applications.
Comput. Secur., 2023

Recycling of generic ImageNet-trained models for smart-city applications.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

Visual examination of relations between known classes for deep neural network classifiers.
Proceedings of the IEEE International Conference on Big Data, 2023

HierAct: a Hierarchical Model for Human Activity Recognition in Game-Like Educational Applications.
Proceedings of the IEEE International Conference on Big Data, 2023

Robust category recognition based on deep templates for educational mobile applications.
Proceedings of the IEEE International Conference on Big Data, 2023

NetSat: Network Saturation Adversarial Attack.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Building a Real-Time Testing Platform for Unmanned Ground Vehicles with UDP Bridge.
Sensors, 2022

Adaptive Hurst-Sensitive Active Queue Management.
Entropy, 2022

NAM: What Does a Neural Network See?
Proceedings of the International Joint Conference on Neural Networks, 2022

SDK4ED: One-click platform for Energy-aware, Maintainable and Dependable Applications.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022

Real-time testing of vision-based systems for AGVs with ArUco markers.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Supervised Learning of Neural Networks for Active Queue Management in the Internet.
Sensors, 2021

LiDAR Point Cloud Generation for SLAM Algorithm Evaluation.
Sensors, 2021

Efficient Feature Selection for Static Analysis Vulnerability Prediction.
Sensors, 2021

Diffusion Model of a Non-Integer Order PIγ Controller with TCP/UDP Streams.
Entropy, 2021

Combined diffusion approximation-simulation model of AQM's transient behavior.
Comput. Commun., 2021

The IoT gateway with active queue management.
Int. J. Appl. Math. Comput. Sci., 2021

2020
Diffusion Approximation Model of TCP NewReno Congestion Control Mechanism.
SN Comput. Sci., 2020

Self-Aware Networks That Optimize Security, QoS, and Energy.
Proc. IEEE, 2020

Long-Range Dependent Traffic Classification with Convolutional Neural Networks Based on Hurst Exponent Analysis.
Entropy, 2020

Optimum Checkpoints for Time and Energy.
Proceedings of the 28th International Symposium on Modeling, 2020

The Random Neural Network as a Bonding Model for Software Vulnerability Prediction.
Proceedings of the Modelling, Analysis, and Simulation of Computer and Telecommunication Systems, 2020

Random Neural Network for Lightweight Attack Detection in the IoT.
Proceedings of the Modelling, Analysis, and Simulation of Computer and Telecommunication Systems, 2020

AQM Mechanism with Neuron Tuning Parameters.
Proceedings of the Intelligent Information and Database Systems - 12th Asian Conference, 2020

2019
A Diffusion Approximation model of Active Queue Management.
CoRR, 2019

Cognitive Routing for Improvement of IoT Security.
Proceedings of the IEEE International Conference on Fog Computing, 2019

Cognitive Packet Networks for the Secure Internet of Things.
Proceedings of the 2019 Global IoT Summit, 2019

AQM Mechanism with the Dropping Packet Function Based on the Answer of Several PI^α Controllers.
Proceedings of the Computer Networks - 26th International Conference, 2019

2018
Security for Internet of Things: The SerIoT Project.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

The Influence of the Traffic Self-similarity on the Choice of the Non-integer Order PI ^\alpha Controller Parameters.
Proceedings of the Computer and Information Sciences - 32nd International Symposium, 2018

European Cybersecurity Research and the SerIoT Project.
Proceedings of the Computer and Information Sciences - 32nd International Symposium, 2018

Research and Innovation Action for the Security of the Internet of Things: The SerIoT Project.
Proceedings of the Security in Computer and Information Sciences, 2018

GPU Accelerated Non-integer Order PI^α D^β P I α D β Controller Used as AQM Mechanism.
Proceedings of the Computer Networks - 25th International Conference, 2018

2017
The AQM Dropping Packet Probability Function Based on Non-integer Order PI^α D^β P I α D β Controller.
Proceedings of the Non-Integer Order Calculus and Its Applications, 2017

Self-similarity Traffic and AQM Mechanism Based on Non-integer Order PI^α D^β Controller.
Proceedings of the Computer Networks - 24th International Conference, 2017

2016
The use of a non-integer order PI controller with an active queue management mechanism.
Int. J. Appl. Math. Comput. Sci., 2016

The Fluid Flow Approximation of the TCP Vegas and Reno Congestion Control Mechanism.
Proceedings of the Computer and Information Sciences - 31st International Symposium, 2016

Delays in IP Routers, a Markov Model.
Proceedings of the Computer and Information Sciences - 31st International Symposium, 2016

The Impact of the Degree of Self-Similarity on the NLREDwM Mechanism with Drop from Front Strategy.
Proceedings of the Computer Networks - 23rd International Conference, 2016

A Study of IP Router Queues with the Use of Markov Models.
Proceedings of the Computer Networks - 23rd International Conference, 2016

2015
Estimating the Intensity of Long-Range Dependence in Real and Synthetic Traffic Traces.
Proceedings of the Computer Networks - 22nd International Conference, 2015

2014
A RED modified weighted moving average for soft real-time application.
Int. J. Appl. Math. Comput. Sci., 2014

A Few Investigations of Long-Range Dependence in Network Traffic.
Proceedings of the Information Sciences and Systems 2014, 2014

JavaScript Frameworks and Ajax Applications.
Proceedings of the Computer Networks - 21st International Conference, 2014

Modeling Packet Traffic with the Use of Superpositions of Two-State MMPPs.
Proceedings of the Computer Networks - 21st International Conference, 2014

2013
Comparison of CHOKe and gCHOKe Active Queues Management Algorithms with the Use of Fluid Flow Approximation.
Proceedings of the Computer Networks, 20th International Conference, 2013

2012
Universal Web Pages Content Parser.
Proceedings of the Computer Networks - 19th International Conference, 2012

Comparison of AQM Control Systems with the Use of Fluid Flow Approximation.
Proceedings of the Computer Networks - 19th International Conference, 2012

2011
Internet Traffic Source Based on Hidden Markov Model.
Proceedings of the Smart Spaces and Next Generation Wired/Wireless Networking, 2011

The Impact of the Modified Weighted Moving Average on the Performance of the RED Mechanism.
Proceedings of the Computer Networks - 18th Conference, 2011

2010
A Contribution to the Fair Scheduling for the TCP and UDP Streams.
Proceedings of the Computer Networks - 17th Conference, 2010

A Choice of Optimal Packet Dropping Function for Active Queue Management.
Proceedings of the Computer Networks - 17th Conference, 2010

2009
Adaptive RED in AQM.
Proceedings of the Computer Networks - 16th Conference, 2009

2008
The Impact of Self-similarity on Traffic Shaping in Wireless LAN.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2008

2007
The Drop-From-Front Strategy in AQM.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007

2005
The Influence of Traffic Self-Similarity on QoS Mechanisms.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005


  Loading...