Projects per year
Fingerprint
Collaborations and top research areas from the last five years
Profiles
Projects
- 1 Active
-
Cybersecurity (TPM)
van Eeten, M. J. G., Hernandez Ganan, C., Gürses, F. S., van Wegberg, R. S., Parkin, S. E., Zhauniarovich, Y., van Engelenburg, S. H., Kadenko, N. I., Labunets, K., Akyazi, U., Bouwman, X. B., Jansen, B. A., Kaur, M., Al Alsadi, A., Lone, Q. B., Turcios Rodriguez, E. R., Vermeer, M., van Harten, V. T. C., Vetrivel, S., Oomens, E. (. C. )., Kustosch, L. F., Bisogni, F., Ciere, M., Fiebig, T., Korczynski, M. T., Moreira Moura, G. C., Noroozian, A., Pieters, W., Tajalizadehkhoob, S., Dacier, B. H. A., San José Sanchez, J., Çetin, F. O. & Zannettou, S.
1/01/10 → …
Project: Research
-
Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU
Yang, Y., Zhang, K., Xu, P., Lu, Z., Wang, W., Wang, W. & Liang, K., 2026, Computer Security - ESORICS 2025 - 30th European Symposium on Research in Computer Security, 2025, Proceedings. Nicomette, V., Benzekri, A., Boulahia-Cuppens, N. & Vaidya, J. (eds.). Cham: Springer, p. 442-462 21 p. (Lecture Notes in Computer Science; vol. 16054 LNCS).Research output: Chapter in Book/Conference proceedings/Edited volume › Conference contribution › Scientific › peer-review
-
Jump, It Is Easy: JumpReLU Activation Function in Deep Learning-Based Side-Channel Analysis
Basurto-Becerra, A., Rezaeezade, A. & Picek, S., 2026, Applied Cryptography and Network Security Workshops - ACNS 2025 Satellite Workshops: AIHWS, AIoTS, QSHC, SCI, PrivCrypt, SPIQE, SiMLA, and CIMSS 2025, Revised Selected Papers. Manulis, M. (ed.). Springer, p. 77-93 17 p. (Lecture Notes in Computer Science; vol. 15653 LNCS).Research output: Chapter in Book/Conference proceedings/Edited volume › Conference contribution › Scientific › peer-review
-
ABSE: Adaptive Baseline Score-Based Election for Leader-Based BFT Systems
Liu, X., Zhang, Z., Li, Z., Yin, H., Li, M., Liu, J., Conti, M. & Zhu, L., 2025, In: IEEE Transactions on Parallel and Distributed Systems. 36, 8, p. 1634-1650 17 p.Research output: Contribution to journal › Article › Scientific › peer-review
Open AccessFile
Datasets
-
Data and code underlying the PhD thesis: Data Privacy in Supply Chains and Machine Learning through Differential Privacy and Cryptography
Li, T. (Creator), TU Delft - 4TU.ResearchData, 22 Jul 2024
DOI: 10.4121/45D2A6E7-D091-4CBA-A07E-E0335CB0F144
Dataset/Software: Dataset
-
Raw data of the EXPensive Optimization benchmark library (EXPObench)
Bliek, L. (Creator), de Weerdt, M. M. (Creator) & Verwer, S. E. (Creator), TU Delft - 4TU.ResearchData, 19 Mar 2021
DOI: 10.4121/14247179
Dataset/Software: Dataset
-
Source code underlying the publication: Topology-Based Reconstruction Prevention for Decentralised Learning
Dekker, F. W. (Creator), Erkin, Z. (Contributor) & Conti, M. (Contributor), TU Delft - 4TU.ResearchData, 18 Dec 2023
DOI: 10.4121/21572601
Dataset/Software: Software
Prizes
-
ACM ASIA Conference on Computer and Communications Security, Best Reviewer Award
Voulimeneas, A. (Recipient), 2023
Prize: Other distinction
-
ACM Conference on Computer and Communications Security, Top Reviewer Award
Voulimeneas, A. (Recipient), 2023
Prize: Other distinction
-
Activities
-
H2020 IRIS Project
K. Liang (Contributor), R.L. Lagendijk (Contributor) & Z. Erkin (Contributor)
2021Activity: Other
-
-
Press/Media
-
Alexios Voulimeneas Wins Prestigious Award for Cybersecurity Research
17/12/25
1 item of Media coverage
Press/Media: Public Engagement
-
Six Veni grants for EEMCS researchers
H.J. Griffioen, J.A. Baaijens, A.L.D. Latour, E. Lorist, F. Mies & J. Sun
16/09/25
2 items of Media coverage
Press/Media: Public Engagement
-
Researchers from TU Delft and Max Planck Institute for Informatics received the Internet Defense Prize and Distinguished Paper Award at USENIX Security 2025
1/09/25
1 item of Media coverage, 1 Media contribution
Press/Media: Public Engagement