About
Piotr Syga is currently an assistant professor at the Department of Artificial Intelligence, Wroclaw University of Science and Technology. His research and professional interests include image processing and various aspects of privacy, including preserving privacy and information security in networks of severely constrained devices. In addition to his involvement in academia, he has worked with the banking sector in identity management and with industry in optimization and image processing.
Research Interests
Education
PhD in Computer Science
Institute of Computer Science, Polish Academy of Sciences
MSc in Computer Science
Faculty of Fundamental Problems of Technology, Wrocław University of Science and Technology
Publications
WSSSP-Net: Weakly Supervised Semantic Segmentation Plugin Network for Face Anti-Spoofing
2026 · WACV 2026
As Good as It KAN Get: High-Fidelity Audio Representation
2025 · CIKM 2025
MLAAD: The Multi-Language Audio Anti-Spoofing Dataset
2024 · IJCNN 2024
Improved DeepFake Detection Using Whisper Features
2023 · INTERSPEECH 2023
Defense against Adversarial Attacks on Audio DeepFake Detection
2023 · INTERSPEECH 2023
Attack Agnostic Dataset: Towards Generalization and Stabilization of Audio DeepFake Detection
2022 · *Interspeech 2022 : Human and Humanizing Speech Technology, 18-22 September 2022, Incheon, Korea.*
RFID batch authentication—a usable scheme providing anonymity
2022 · *IEEE Access*
Verify it yourself: a note on activation functions’ influence on fast DeepFake detection
2021 · *Proceedings of the 18th International Conference on Security and Cryptography - SECRYPT*
Robust spatial-spread deep neural image watermarking
2021 · *2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications : 29 December 2020 - 1 January 2021, Guangzhou, China : proceedings*
Emerging security challenges for ubiquitous devices
2021 · *Security of ubiquitous computing systems : selected topics*
Droppix: towards more realistic video fingerprinting
2020 · *ICETE 2020 : Proceedings of the 17th International Joint Conference on e-Business and Telecommunications : July 8-10, 2020, Lieusaint-Paris, France. Vol. 3, SECRYPT*
How to save your face: a facial recognition method robust against image reconstruction
2020 · *2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS).*
How to obfuscate execution of protocols in an ad hoc radio network?
2019 · *Ad Hoc Networks*
Lamina cribrosa depth and shape in glaucoma suspects. Comparison to glaucoma patients and healthy controls
2019 · *Current Eye Research*
A fully automated 3D in-vivo delineation and shape parameterization of the human lamina cribrosa in optical coherence tomography
2019 · *IEEE Transactions on Biomedical Engineering*
On practical privacy-preserving fault-tolerant data aggregation
2019 · *International Journal of Information Security*
User authorization based on hand geometry without special equipment
2018 · *Pattern Recognition*
Some remarks about tracing digital cameras - faster method and usable countermeasure
2017 · *ICETE 2017 : proceedings of the 14th International Joint Conference on e-Business and Telecommunications, Madrid - Spain, July 24-26, 2017. Vol. 4, SECRYPT*
Fully automated detection of lamina cribrosa in optical coherence tomography: framework and illustrative examples
2017 · *2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC) : 11-15 July 2017, Jeju Island, South Korea.*
Enhancing privacy for ad hoc systems with predeployment key distribution
2017 · *Ad Hoc Networks*
Practical privacy preserving size approximation in distributed systems
2016 · *2016 10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP 2016) : Prague, Czech Republic, 20-22, July 2016.*
Practical fault-tolerant data aggregation
2016 · *Applied Cryptography and Network Security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016 : proceedings*
RFID tags batch authentication revisited - communication overhead and server computational complexity limits
2016 · *Information Security Practice and Experience : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016 : proceedings*
Lightweight protocol for trusted spontaneous communication
2015 · *Trusted Systems : 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers*
Blocker-type methods for protecting customers' privacy in RFID systems
2013 · *2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Beijing, China, 10-12 October 2013.*
Chameleon RFID and tracking prevention
2013 · *Radio Frequency Identification System Security : RFIDsec’13 Asia Workshop Proceedings*
Some remarks on keystroke dynamics :global surveillance, retrieving information and simple countermeasures
2012 · *SECRYPT 2012 : proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July 2012.*
Obfuscated counting in single-hop radio network
2012 · *Proceedings of the 2012 IEEE 18th International Conference on Parallel and Distributed Systems, ICPADS 2012 : 17-19 December 2012, Singapore.*
