| A deep learning ensemble for network anomaly and cyber-attack detection V Dutta, M Choraś, M Pawlicki, R Kozik Sensors 20 (16), 4583, 2020 | 232 | 2020 |
| Defending network intrusion detection systems against adversarial evasion attacks M Pawlicki, M Choraś, R Kozik Future Generation Computer Systems 110, 148-154, 2020 | 212 | 2020 |
| A scalable distributed machine learning approach for attack detection in edge computing environments R Kozik, M Choraś, M Ficco, F Palmieri Journal of Parallel and Distributed Computing 119, 18-26, 2018 | 189 | 2018 |
| New explainability method for BERT-based model in fake news detection M Szczepański, M Pawlicki, R Kozik, M Choraś Scientific reports 11 (1), 23705, 2021 | 165 | 2021 |
| Contactless palmprint and knuckle biometrics for mobile devices M Choraś, R Kozik Pattern Analysis and Applications 15 (1), 73-85, 2012 | 113 | 2012 |
| Sentiment analysis for fake news detection by means of neural networks S Kula, M Choraś, R Kozik, P Ksieniewicz, M Woźniak International conference on computational science, 653-666, 2020 | 97 | 2020 |
| Machine learning–the results are not the only thing that matters! what about security, explainability and fairness? M Choraś, M Pawlicki, D Puchalski, R Kozik International Conference on Computational Science, 615-628, 2020 | 95 | 2020 |
| A survey on neural networks for (cyber-) security and (cyber-) security of neural networks M Pawlicki, R Kozik, M Choraś Neurocomputing 500, 1075-1087, 2022 | 90 | 2022 |
| Achieving explainability of intrusion detection system by hybrid oracle-explainer approach M Szczepański, M Choraś, M Pawlicki, R Kozik 2020 International Joint Conference on neural networks (IJCNN), 1-8, 2020 | 84 | 2020 |
| Simulation platform for cyber-security and vulnerability analysis of critical infrastructures M Ficco, M Choraś, R Kozik Journal of computational science 22, 179-186, 2017 | 84 | 2017 |
| Application of the bert-based architecture in fake news detection S Kula, M Choraś, R Kozik Computational intelligence in security for information systems conference …, 2019 | 81 | 2019 |
| Machine learning techniques applied to detect cyber attacks on web applications M Choraś, R Kozik Logic Journal of IGPL 23 (1), 45-56, 2015 | 79 | 2015 |
| Measuring and improving agile processes in a small-size software development company M Choraś, T Springer, R Kozik, L Lopez, S Martínez-Fernández, P Ram, ... IEEE access 8, 78452-78466, 2020 | 78 | 2020 |
| A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment R Kozik, M Pawlicki, M Choraś Pattern Analysis and Applications 24 (4), 1441-1449, 2021 | 68 | 2021 |
| Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data. M Komisarek, M Pawlicki, R Kozik, M Choras J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12 (1), 3-19, 2021 | 68 | 2021 |
| Evaluating the necessity of the multiple metrics for assessing explainable AI: A critical examination M Pawlicki, A Pawlicka, F Uccello, S Szelest, S D’Antonio, R Kozik, ... Neurocomputing 602, 128282, 2024 | 63 | 2024 |
| A systematic review of recommender systems and their applications in cybersecurity A Pawlicka, M Pawlicki, R Kozik, RS Choraś Sensors 21 (15), 5248, 2021 | 63 | 2021 |
| The proposition and evaluation of the roedunet-simargl2021 network intrusion detection dataset ME Mihailescu, D Mihai, M Carabas, M Komisarek, M Pawlicki, ... Sensors 21 (13), 4319, 2021 | 59 | 2021 |
| Hybrid model for improving the classification effectiveness of network intrusion detection V Dutta, M Choraś, R Kozik, M Pawlicki Computational Intelligence in Security for Information Systems Conference …, 2019 | 57 | 2019 |
| Cyber threats impacting critical infrastructures M Choraś, R Kozik, A Flizikowski, W Hołubowicz, R Renk Managing the Complexity of Critical Infrastructures 90, 139-161, 2016 | 50 | 2016 |