Dane kontaktowe:
Pokój: 513
Stanowisko:
Adiunkt naukowo-dydaktyczny
Zespoły badawcze:
Nowe systemy głębokiego uczenia i ich zastosowania
Prowadzone zajęcia:
Podstawy sieci komputerowych lab
Programowanie stron internetowych lab
Programowanie stron internetowych wyk
dr inż.
Jakub Nowak
Publikacje (12)
2023 (3)
Korytkowski M., Nowak J., Scherer R., Wei W., Privacy Preserving by Removing Sensitive Data from Documents with Fully Convolutional Networks. (0)
Privacy Preserving by Removing Sensitive Data from Documents with Fully Convolutional Networks
, Privacy Preserving by Removing Sensitive Data from Documents with Fully Convolutional Networks, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 13589 LNAI, 13589 LNAI, 277-285, 2023, Liczba cytowań: 0
Korytkowski M., Nowak J., Scherer R., Zbieg A., Zak B., Relikowska G., Mader P., Employee Turnover Prediction From Email Communication Analysis. (0)
Employee Turnover Prediction From Email Communication Analysis
, Employee Turnover Prediction From Email Communication Analysis, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 13589 LNAI, 13589 LNAI, 252-263, 2023, Liczba cytowań: 0
Korytkowski M., Nowak J., Scherer R., Detecting Sensitive Data with GANs and Fully Convolutional Networks. (0)
Detecting Sensitive Data with GANs and Fully Convolutional Networks
, Detecting Sensitive Data with GANs and Fully Convolutional Networks, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 13995 LNAI, 13995 LNAI, 273-283, 2023, Liczba cytowań: 02020 (4)
Nowak J., Holotyak T., Korytkowski M., Scherer R., Voloshynovskiy S., Fingerprinting of url logs: Continuous user authentication from behavioural patterns. (4)
Fingerprinting of url logs: Continuous user authentication from behavioural patterns
, Fingerprinting of url logs: Continuous user authentication from behavioural patterns, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12140 LNCS, 12140 LNCS, 184-195, 2020, Liczba cytowań: 4
Nowak J., Korytkowski M., Scherer R., Discovering Sequential Patterns by Neural Networks. (2)
Discovering Sequential Patterns by Neural Networks
, Discovering Sequential Patterns by Neural Networks, Proceedings of the International Joint Conference on Neural Networks, 2020, Liczba cytowań: 2
Wei W., Ke Q., Nowak J., Korytkowski M., Scherer R., Wozniak M., Accurate and fast URL phishing detector: A convolutional neural network approach. (141)
Accurate and fast URL phishing detector: A convolutional neural network approach
, Accurate and fast URL phishing detector: A convolutional neural network approach, Computer Networks, 178, 178, 2020, Liczba cytowań: 141
Nowak J., Milkowska K., Scherer M., Talun A., Korytkowski M., Job Offer Analysis Using Convolutional and Recurrent Convolutional Networks. (0)
Job Offer Analysis Using Convolutional and Recurrent Convolutional Networks
, Job Offer Analysis Using Convolutional and Recurrent Convolutional Networks, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12416 LNAI, 12416 LNAI, 380-387, 2020, Liczba cytowań: 02019 (2)
Nowak J., Korytkowski M., Scherer R., Convolutional Recurrent Neural Networks for Computer Network Analysis. (1)
Convolutional Recurrent Neural Networks for Computer Network Analysis
, Convolutional Recurrent Neural Networks for Computer Network Analysis, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11730 LNCS, 11730 LNCS, 747-757, 2019, Liczba cytowań: 1
Korytkowski M., Nowak J., Nowicki R., Milkowska K., Scherer M., Goetzen P., Sequential Data Mining of Network Traffic in URL Logs. (0)
Sequential Data Mining of Network Traffic in URL Logs
, Sequential Data Mining of Network Traffic in URL Logs, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11508 LNAI, 11508 LNAI, 125-130, 2019, Liczba cytowań: 02018 (2)
Nowak J., Korytkowski M., Scherer R., Classification of computer network users with convolutional neural networks. (3)
Classification of computer network users with convolutional neural networks
, Classification of computer network users with convolutional neural networks, Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018, 501-504, 2018, Liczba cytowań: 3
Nowak J., Korytkowski M., Nowicki R., Scherer R., Siwocha A., Random forests for profiling computer network users. (11)
Random forests for profiling computer network users
, Random forests for profiling computer network users, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10842 LNAI, 10842 LNAI, 734-739, 2018, Liczba cytowań: 112017 (1)
Nowak J., Taspinar A., Scherer R., LSTM recurrent neural networks for short text and sentiment classification. (125)