Application of XGBoost algorithm in fingerprinting localisation task M Luckner, B Topolski, M Mazurek IFIP International Conference on Computer Information Systems and Industrial …, 2017 | 71 | 2017 |
Stable web spam detection using features based on lexical items M Luckner, M Gad, P Sobkowiak Computers & Security 46, 79-93, 2014 | 41 | 2014 |
Android malware concept drift using system calls: detection, characterization and challenges A Guerra-Manzanares, M Luckner, H Bahsi Expert Systems with Applications 206, 117200, 2022 | 22 | 2022 |
Modified random forest algorithm for wi–fi indoor localization system R Górak, M Luckner International Conference on Computational Collective Intelligence, 147-157, 2016 | 21 | 2016 |
Concept drift and cross-device behavior: Challenges and implications for effective android malware detection A Guerra-Manzanares, M Luckner, H Bahsi Computers & Security 120, 102757, 2022 | 20 | 2022 |
Classification with rejection based on various SVM techniques W Homenda, M Luckner, W Pedrycz 2014 International joint conference on neural networks (IJCNN), 3480-3487, 2014 | 20 | 2014 |
IoT architecture for urban data-centric services and applications M Luckner, M Grzenda, R Kunicki, J Legierski ACM Transactions on Internet Technology (TOIT) 20 (3), 1-30, 2020 | 19 | 2020 |
Indoor localisation based on GSM signals: Multistorey building study R Górak, M Luckner, M Okulewicz, J Porter-Sobieraj, P Wawrzyniak Mobile Information Systems 2016 (1), 2719576, 2016 | 19 | 2016 |
Automatic knowledge acquisition: recognizing music notation with methods of centroids and classifications trees W Homzndn The 2006 IEEE International Joint Conference on Neural Network Proceedings …, 2006 | 17 | 2006 |
Low–cost computer vision based automatic scoring of shooting targets J Rudzinski, M Luckner Knowledge Engineering, Machine Learning and Lattice Computing with …, 2013 | 15 | 2013 |
Leveraging the first line of defense: A study on the evolution and usage of android security permissions for enhanced android malware detection A Guerra-Manzanares, H Bahsi, M Luckner Journal of Computer Virology and Hacking Techniques 19 (1), 65-96, 2023 | 12 | 2023 |
Automatic recognition of music notation using neural networks W Homenda, M Luckner Proc. of the International Conference On Artificial Intelligence and Systems, 2004 | 12 | 2004 |
Malfunction immune Wi–Fi localisation method R Górak, M Luckner Computational Collective Intelligence: 7th International Conference, ICCCI …, 2015 | 11 | 2015 |
Automatic identification of selected symbols of music notation M Luckner Faculty of Mathematics and Information Science, Warsaw University of …, 2003 | 10 | 2003 |
Automatic detection of missing access points in indoor positioning system R Górak, M Luckner Sensors 18 (11), 3595, 2018 | 8 | 2018 |
3D model reconstruction and evaluation using a collection of points extracted from the series of photographs K Rzążewska, M Luckner 2014 Federated Conference on Computer Science and Information Systems, 669-677, 2014 | 8 | 2014 |
Classification with rejection: concepts and formal evaluations W Homenda, M Luckner, W Pedrycz | 7 | 2013 |
Comparison of hierarchical svm structures in letters recognition task M Luckner Computational Intelligence: Methods and Applications, 291-302, 2008 | 7 | 2008 |
Conversion of decision tree into deterministic finite automaton for high accuracy online syn flood detection M Luckner 2015 IEEE Symposium Series on Computational Intelligence, 75-82, 2015 | 6 | 2015 |
On the testing of network cyber threat detection methods on spam example R Filasiak, M Grzenda, M Luckner, P Zawistowski annals of telecommunications-annales des télécommunications 69, 363-377, 2014 | 6 | 2014 |