Skip to main content

Showing 1–10 of 10 results for author: Janicki, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.00524  [pdf, other

    cs.CY cs.LG eess.SP

    Real-Time Energy Measurement for Non-Intrusive Well-Being Monitoring of Elderly People -- a Case Study

    Authors: Mateusz Brzozowski, Artur Janicki

    Abstract: This article presents a case study demonstrating a non-intrusive method for the well-being monitoring of elderly people. It is based on our real-time energy measurement system, which uses tiny beacons attached to electricity meters. Four participants aged 67-82 years took part in our study. We observed their electric power consumption for approx. a month, and then we analyzed them, taking into acc… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

    Comments: 6 pages, 4 figures

    ACM Class: J.3; I.5.3

  2. arXiv:2406.18455  [pdf, other

    cs.NI eess.SY

    System for Measurement of Electric Energy Using Beacons with Optical Sensors and LoRaWAN Transmission

    Authors: Łukasz Marcul, Mateusz Brzozowski, Artur Janicki

    Abstract: In this article, we present the results of experiments with finding an efficient radio transmission method for an electric energy measurement system called OneMeter 2.0. This system offers a way of collecting energy usage data from beacons attached to regular, non-smart meters. In our study, we compared several low power wide area network (LPWAN) protocols, out of which we chose the LoRaWAN protoc… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

    Comments: 7 pages, 8 figures

    ACM Class: C.2.5; H.4.m

  3. arXiv:2406.02481  [pdf, other

    cs.CL cs.CR

    Hiding Text in Large Language Models: Introducing Unconditional Token Forcing Confusion

    Authors: Jakub Hoscilowicz, Pawel Popiolek, Jan Rudkowski, Jedrzej Bieniasz, Artur Janicki

    Abstract: With the help of simple fine-tuning, one can artificially embed hidden text into large language models (LLMs). This text is revealed only when triggered by a specific query to the LLM. Two primary applications are LLM fingerprinting and steganography. In the context of LLM fingerprinting, a unique text identifier (fingerprint) is embedded within the model to verify licensing compliance. In the con… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

    Comments: Work in progress. Code is available at https://github.com/j-hoscilowic/zurek-stegano

  4. arXiv:2404.02588  [pdf, ps, other

    cs.CL

    Large Language Models for Expansion of Spoken Language Understanding Systems to New Languages

    Authors: Jakub Hoscilowicz, Pawel Pawlowski, Marcin Skorupa, Marcin Sowański, Artur Janicki

    Abstract: Spoken Language Understanding (SLU) models are a core component of voice assistants (VA), such as Alexa, Bixby, and Google Assistant. In this paper, we introduce a pipeline designed to extend SLU systems to new languages, utilizing Large Language Models (LLMs) that we fine-tune for machine translation of slot-annotated SLU training data. Our approach improved on the MultiATIS++ benchmark, a primar… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

    Comments: Code and info on model checkpoint are available at https://github.com/Samsung/MT-LLM-NLU

  5. arXiv:2403.18680  [pdf, other

    cs.CL cs.LG

    Non-Linear Inference Time Intervention: Improving LLM Truthfulness

    Authors: Jakub Hoscilowicz, Adam Wiacek, Jan Chojnacki, Adam Cieslak, Leszek Michon, Vitalii Urbanevych, Artur Janicki

    Abstract: In this work, we explore LLM's internal representation space to identify attention heads that contain the most truthful and accurate information. We further developed the Inference Time Intervention (ITI) framework, which lets bias LLM without the need for fine-tuning. The improvement manifests in introducing a non-linear multi-token probing and multi-token intervention: Non-Linear ITI (NL-ITI), w… ▽ More

    Submitted 6 June, 2024; v1 submitted 27 March, 2024; originally announced March 2024.

    Comments: Accepted on Interspeech 2024 Conference. Code is available at https://github.com/Samsung/NL-ITI

  6. arXiv:2301.11688  [pdf, other

    cs.CL cs.LG

    Can We Use Probing to Better Understand Fine-tuning and Knowledge Distillation of the BERT NLU?

    Authors: Jakub Hościłowicz, Marcin Sowański, Piotr Czubowski, Artur Janicki

    Abstract: In this article, we use probing to investigate phenomena that occur during fine-tuning and knowledge distillation of a BERT-based natural language understanding (NLU) model. Our ultimate purpose was to use probing to better understand practical production problems and consequently to build better NLU models. We designed experiments to see how fine-tuning changes the linguistic capabilities of BERT… ▽ More

    Submitted 27 January, 2023; originally announced January 2023.

    Comments: Accepted to ICAART 2023 conference

  7. YouSkyde: Information Hiding for Skype Video Traffic

    Authors: Wojciech Mazurczyk, Maciej Karas, Krzysztof Szczypiorski, Artur Janicki

    Abstract: In this paper a new information hiding method for Skype videoconference calls - YouSkyde - is introduced. A Skype traffic analysis revealed that introducing intentional losses into the Skype video traffic stream to provide the means for clandestine communication is the most favourable solution. A YouSkyde proof-of-concept implementation was carried out and its experimental evaluation is presented.… ▽ More

    Submitted 25 August, 2016; originally announced August 2016.

    Comments: 16 pages, 10 figures

    Journal ref: Multimedia Tools and Applications, 2015

  8. arXiv:1508.04978  [pdf

    cs.MM cs.CR

    "The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography

    Authors: Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel

    Abstract: In this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of "the moving observer". We considered three levels of undetectability named: "good", "bad", and "ugly". To illustrate this method we chose Wi-Fi steganography as a solid family of information hiding protocols. We present the state of the art in this area covering well-known hidin… ▽ More

    Submitted 9 September, 2015; v1 submitted 20 August, 2015; originally announced August 2015.

    Comments: 6 pages, 6 figures, to appear in Proc. of: ICNIT 2015 - 6th International Conference on Networking and Information Technology, Tokyo, Japan, November 5-6, 2015

  9. arXiv:1210.5888  [pdf

    cs.CR cs.MM

    Steganalysis of Transcoding Steganography

    Authors: Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: TranSteg (Trancoding Steganography) is a fairly new IP telephony steganographic method that functions by compressing overt (voice) data to make space for the steganogram by means of transcoding. It offers high steganographic bandwidth, retains good voice quality and is generally harder to detect than other existing VoIP steganographic methods. In TranSteg, after the steganogram reaches the receive… ▽ More

    Submitted 22 October, 2012; originally announced October 2012.

    Comments: 13 pages, 7 figures, 2 tables

  10. arXiv:1201.6218  [pdf

    cs.CR cs.MM

    Influence of Speech Codecs Selection on Transcoding Steganography

    Authors: Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: The typical approach to steganography is to compress the covert data in order to limit its size, which is reasonable in the context of a limited steganographic bandwidth. TranSteg (Trancoding Steganography) is a new IP telephony steganographic method that was recently proposed that offers high steganographic bandwidth while retaining good voice quality. In TranSteg, compression of the overt data i… ▽ More

    Submitted 30 January, 2012; originally announced January 2012.

    Comments: 17 pages, 5 figures, 4 tables