Kamil Malinka

Orcid: 0000-0002-9009-2193

According to our database1, Kamil Malinka authored at least 17 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enhancing Security of AI-Based Code Synthesis with GitHub Copilot via Cheap and Efficient Prompt-Engineering.
CoRR, 2024

DAG-Sword: A Simulator of Large-Scale Network Topologies for DAG-Oriented Proof-of-Work Blockchains.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
On the Educational Impact of ChatGPT: Is Artificial Intelligence Ready to Obtain a University Degree?
Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 1, 2023

IoT Gateways Network Communication Analysis.
Proceedings of the International Conference on Information Networking, 2023

Indirect Bluetooth Low Energy Connection Detection.
Proceedings of the International Conference on Information Networking, 2023

Incentive Attacks on DAG-Based Blockchains with Random Transaction Selection.
Proceedings of the IEEE International Conference on Blockchain, 2023

Assessing the Human Ability to Recognize Synthetic Speech in Ordinary Conversation.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2023

Facial Image Reconstruction and its Influence to Face Recognition.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2023

2022
Even if users do not read security directives, their behavior is not so catastrophic.
Commun. ACM, 2022

E-Banking Security Study - 10 Years Later.
IEEE Access, 2022

The dawn of a text-dependent society: deepfakes as a threat to speech verification systems.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

2021
DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy.
CoRR, 2021

2020
ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors.
IEEE Access, 2020

Security and Encryption at Modern Databases.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

2019
Increasing Trust in Tor Node List Using Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

2015
The Challenge of Increasing Safe Response of Antivirus Software Users.
Proceedings of the Mathematical and Engineering Methods in Computer Science, 2015

2011
Evaluation of biometric authentication based on visual evoked potentials.
Proceedings of the International Carnahan Conference on Security Technology, 2011


  Loading...