Search results

  • On the Importance of Initial Solutions Selection in Fault Injection

    Krcek, M., Fronte, D. & Picek, S., 2021, 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC): Proceedings. O’Dell, M. (ed.). Piscataway: IEEE, p. 1-12 12 p. 9565588

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    157 Downloads (Pure)
  • On the Importance of Pooling Layer Tuning for Profiling Side-Channel Analysis

    Wu, L. & Perin, G., 2021, Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, and SiMLA, 2021, Proceedings. Zhou, J., Ahmed, C. M., Batina, L., Chattopadhyay, S., Gadyatskaya, O., Jin, C., Lin, J., Losiouk, E., Luo, B., Majumdar, S., Maniatakos, M., Mashima, D., Meng, W., Picek, S., Shimaoka, M., Su, C. & Wang, C. (eds.). Springer, p. 114-132 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12809 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    71 Downloads (Pure)
  • On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis

    Perin, G. & Picek, S., 2021, Selected Areas in Cryptography : 27th International Conference, 2020, Revised Selected Papers. Dunkelman, O., Jacobson, Jr., M. J. & O’Flynn, C. (eds.). Cham: Springer, Vol. 12804. p. 615-636 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12804).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • On the Performance of Convolutional Neural Networks for Side-Channel Analysis

    Picek, S., Samiotis, I. P., Kim, J., Heuser, A., Bhasin, S. & Legay, A., 2018, Security, Privacy, and Applied Cryptography Engineering: 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings. Chattopadhyay, A., Rebeiro, C. & Yarom, Y. (eds.). Cham: Springer, p. 157-176 20 p. (Lecture Notes in Computer Science; vol. 11348).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    76 Citations (Scopus)
  • On the real-world security of cryptographic primitives: From theory to practice

    Najm, Z., 2023, 381 p.

    Research output: ThesisDissertation (TU Delft)

    Open Access
    File
    143 Downloads (Pure)
  • On the Statistical Detection of Adversarial Instances over Encrypted Data

    Sheikhalishahi, M., Nateghizad, M., Martinelli, F., Erkin, Z. & Loog, M., 2019, Security and Trust Management - 15th International Workshop, STM 2019, Proceedings. Mauw, S. & Conti, M. (eds.). Springer, Vol. 11738. p. 71-88 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11738 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Open-World Network Intrusion Detection

    Rimmer, V., Nadeem, A., Verwer, S., Preuveneers, D. & Joosen, W., 2022, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer, p. 254-283 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13049 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    54 Downloads (Pure)
  • Optimal Decision Tree Policies for Markov Decision Processes

    Vos, D. & Verwer, S., 2023, Proceedings of the 32nd International Joint Conference on Artificial Intelligence, IJCAI 2023. Elkind, E. (ed.). International Joint Conferences on Artificial Intelligence (IJCAI), p. 5457-5465 9 p. (IJCAI International Joint Conference on Artificial Intelligence; vol. 2023-August).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    30 Downloads (Pure)
  • Passtrans: An Improved Password Reuse Model Based on Transformer

    He, X., Cheng, H., Xie, J., Wang, P. & Liang, K., 2022, Proceedings of the ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, p. 3044-3048 5 p. 9746731

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    49 Downloads (Pure)
  • Performance analysis of multilayer perceptron in profiling side-channel analysis

    Weissbart, L., 2020, Applied Cryptography and Network Security Workshops : ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA. Zhou, J., Ahmed, C. M., Conti, M., Losiouk, E., Au, M. H., Batina, L., Li, Z., Lin, J., Luo, B., Majumdar, S., Meng, W., Ochoa, M., Picek, S., Portokalidis, G., Wang, C. & Zhang, K. (eds.). Cham: Springer, p. 198-216 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12418 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Per Priority Data Rate Measurement in Data Plane

    Mostafaei, H. & Smaragdakis, G., 2023, EuroP4 '23: Proceedings of the 6th on European P4 WorkshopD. Gurevich, V. & Signorello, S. (eds.). p. 9-15 7 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    18 Downloads (Pure)
  • Physical Location of Smart Key Activators: A Building Security Penetration Test

    Bullée, J. W., Montoya Morales, L., Junger, M. & Hartel, P., 2018, In: Journal of Corporate Real Estate. 20, 2, p. 138-151 14 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    66 Downloads (Pure)
  • PIVODL: Privacy-Preserving Vertical Federated Learning Over Distributed Labels

    Zhu, H., Wang, R., Jin, Y. & Liang, K., 2023, In: IEEE Transactions on Artificial Intelligence. 4, 5, p. 988-1001 14 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    3 Downloads (Pure)
  • Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel

    Spolaor, R., Liu, H., Turrin, F., Conti, M. & Cheng, X., 2023, Proceedings of the INFOCOM 2023 - IEEE International Conference on Computer Communications. Danvers: IEEE, 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Downloads (Pure)
  • Policy-driven Data Sharing over Attribute-Based Encryption supporting Dual Membership

    Lu, H., Yu, R., Zhu, Y., He, X., Liang, K. & Chu, W. C-C., 2022, In: Journal of Systems and Software. 188, p. 1-14 14 p., 111271.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    12 Downloads (Pure)
  • Popularity-Based Detection of Domain Generation Algorithms

    Abbink, J. & Doerr, C., 2017, ARES 2017: Proceedings of the 12th International Conference on Availability, Reliability and Security. New York, NY: Association for Computing Machinery (ACM), p. 1-8 8 p. 79

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • Poster: Recovering the input of neural networks via single shot side-channel attacks

    Batina, L., Bhasin, S., Jap, D. & Picek, S., 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 2657-2659 3 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    16 Citations (Scopus)
  • Poster: When adversary becomes the guardian - Towards side-channel security with adversarial attacks

    Picek, S., Jap, D. & Bhasin, S., 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 2673-2675 3 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Poster: Clean-label Backdoor Attack on Graph Neural Networks

    Xu, J. & Picek, S., 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 3491-3493 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    257 Downloads (Pure)
  • Post-quantum adaptor signatures and payment channel networks

    Esgin, M. F., Ersoy, O. & Erkin, Z., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings: 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Part II ed. Cham: Springer, p. 378-397 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    12 Citations (Scopus)
    77 Downloads (Pure)
  • Post-quantum WireGuard

    Hulsing, A., Ning, K. C., Schwabe, P., Weber, F. & Zimmermann, P. R., 2021, 2021 IEEE Symposium on Security and Privacy (SP): Proceedings. O'Conner, L. (ed.). Piscataway: IEEE, p. 304-321 18 p. 9519445

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    18 Citations (Scopus)
  • Practical algorithm substitution attack on extractable signatures

    Zhao, Y., Liang, K., Zhao, Y., Yang, B., Ming, Y. & Panaousis, E., 2022, In: Designs, Codes, and Cryptography. 90, 4, p. 921-937 17 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    29 Downloads (Pure)
  • Practical Exchange for Unique Digital Goods

    Ersoy, O., Genç, Z. A., Erkin, Z. & Conti, M., 2021, 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS): Proceedings. O'Conner, L. (ed.). Piscataway: IEEE, p. 49-58 10 p. 9566170

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    28 Downloads (Pure)
  • Practical Multi-Party Private Set Intersection Protocols

    Bay, A., Erkin, Z., Hoepman, J. H., Samardjiska, S. & Vos, J., 2022, In: IEEE Transactions on Information Forensics and Security. 17, p. 1-15 15 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    15 Citations (Scopus)
    178 Downloads (Pure)
  • Practical Threshold Multi-Factor Authentication

    Li, W., Cheng, H., Wang, P. & Liang, K., 2021, In: IEEE Transactions on Information Forensics and Security. 16, p. 3573-3588 16 p., 9432950.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    11 Citations (Scopus)
    144 Downloads (Pure)
  • Practical Verifiable & Privacy-Preserving Double Auctions

    Memar Zahedani, A., Vos, J. & Erkin, Z., 2023, ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings. Association for Computing Machinery (ACM), 9 p. 25. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    20 Downloads (Pure)
  • PREDICT: Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model

    Ugwuoke, C., Erkin, Z., Reinders, M. & Lagendijk, R., 2020, CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. Carminati, B. & Kantarcioglu, M. (eds.). Association for Computing Machinery (ACM), p. 329-340 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    91 Downloads (Pure)
  • Predictive and generative machine learning models for photonic crystals

    Christensen, T., Loh, C., Picek, S., Jakobović, D., Jing, L., Fisher, S., Ceperic, V., Joannopoulos, J. D. & Soljačić, M., 2020, In: Nanophotonics. 9, 13, p. 4183-4192 10 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    62 Citations (Scopus)
    119 Downloads (Pure)
  • Preface

    Batina, L., Picek, S. & Mondal, M., 2022, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 13162 LNCS, p. v

    Research output: Contribution to journalEditorialScientific

  • Preface

    Li, F., Liang, K., Lin, Z. & Katsikas, S. K., 2023, In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. 462 LNICST

    Research output: Contribution to journalEditorialScientificpeer-review

  • Preface Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security

    Chen, L., Li, N., Liang, K. & Schneider, S., 2020, Computer Security – ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II. Cham, Vol. 12309 LNCS. p. v-vi (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

  • Preserving Confidentiality in Data Analytics-as-a-Service

    Tillem, G., 2020, 179 p.

    Research output: ThesisDissertation (TU Delft)

    Open Access
    File
    232 Downloads (Pure)
  • PRIDE: A Privacy-Preserving Decentralised Key Management System

    Kester, D., Li, T. & Erkin, Z., 2022, Proceedings of the 2022 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    21 Downloads (Pure)
  • Privacy concerns and protection measures in online behavioural advertising

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 89-96 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Privacy for 5G-Supported Vehicular Networks

    Li, M., Zhu, L., Zhang, Z., Lal, C., Conti, M. & Martinelli, F., 2021, In: IEEE Open Journal of the Communications Society. 2, p. 1935-1956 22 p., 9511636.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    104 Downloads (Pure)
  • Privacy-Friendly De-Authentication with BLUFADE: Blurred Face Detection

    Cardaioli, M., Conti, M., Tricomi, P. P. & Tsudik, G., 2022, 2022 IEEE International Conference on Pervasive Computing and Communications, PerCom 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 197-206 10 p. (2022 IEEE International Conference on Pervasive Computing and Communications, PerCom 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    528 Downloads (Pure)
  • Privacy-Preserving Alpha Algorithm for Software Analysis

    Tillem, G., Erkin, Z. & Lagendijk, I., 2016, 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux. p. 136-143 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    264 Downloads (Pure)
  • Privacy-Preserving and Security in SDN-based IoT: A Survey

    Ahmadvand, H., Lal, C., Hemmati, H., Sookhak, M. & Conti, M., 2023, In: IEEE Access. 11, p. 44772-44786 15 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    91 Downloads (Pure)
  • Privacy-Preserving Bin-Packing With Differential Privacy

    Li, T., Erkin, Z. & Lagendijk, R. L., 2022, In: IEEE Open Journal of Signal Processing. 3, p. 94-106 13 p., 9721160.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    115 Downloads (Pure)
  • Privacy-Preserving Collection and Retrieval of Medical Wearables Data

    Nateghizad, M., Maulany, C. & Erkin, Z., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 141-148 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    71 Downloads (Pure)
  • Privacy-Preserving Data Aggregation with Probabilistic Range Validation

    Dekker, F. W. & Erkin, Z., 2021, Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Proceedings. Sako, K. & Tippenhauer, N. O. (eds.). 19 ed. Kamakura, Japan: Springer Nature, Vol. 12727. p. 79-98 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12727 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    1100 Downloads (Pure)
  • Privacy-preserving Distributed Access Control for Medical Data

    Maulany, C., Nateghizad, M., Mennink, B. & Erkin, Z., 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Samarati, P. & Obaisat, M. S. (eds.). SciTePress, Vol. 1: SECRYPT. p. 322-331 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Privacy-preserving distributed speech enhancement forwireless sensor networks by processing in the encrypted domain

    Hendriks, R. C., Erkin, Z. & Gerkmann, T., 2013, 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Proceedings. p. 7005-7009 5 p. 6639020. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    14 Citations (Scopus)
  • Privacy-Preserving Equality Test

    Nateghizad, M., Erkin, Z. & Lagendijk, I., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 167-177 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    64 Downloads (Pure)
  • Privacy-preserving multi-party access control

    Sheikhalishahi, M., Tillem, G., Erkin, Z. & Zannone, N., 2019, WPES'19: Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society. New York: Association for Computing Machinery (ACM), p. 1-13 13 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Privacy-safe linkage analysis with homomorphic encryption

    Ugwuoke, C., Erkin, Z. & Lagendijk, R. L., 2017, 25th European Signal Processing Conference, EUSIPCO 2017. Piscataway, NJ: IEEE, p. 961-965 5 p. 8081350

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Privacy Threats and Cryptographic Solutions to Genome Data Processing

    Ugwuoke, C. I., 2021, 195 p.

    Research output: ThesisDissertation (TU Delft)

    Open Access
    File
    91 Downloads (Pure)
  • Private Data Aggregation in Decentralized Networks

    Setia, P. K., Tillem, G. & Erkin, Z., 2019, 2019 7th International Istanbul Smart Grids and Cities Congress and Fair (ICSG). Cetin, A. (ed.). IEEE, p. 76-80 5 p. 8782377

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Proceedings of the 13th International Conference on Grammatical Inference ICGI: JMLR Workshop and Conference Proceedings

    Verwer, S. (ed.), van Zaanen, M. (ed.) & Smetsers, R. (ed.), 2016, JMLR. 169 p. (JMLR: Workshop and Conference Proceedings)

    Research output: Book/ReportBook editingScientificpeer-review

  • Profiled Side-Channel Analysis in the Efficient Attacker Framework

    Picek, S., Heuser, A., Perin, G. & Guilley, S., 2022, Smart Card Research and Advanced Applications : 20th International Conference, CARDIS 2021, Revised Selected Papers. Grosso, V. & Pöppelmann, T. (eds.). Cham: Springer, Vol. 13173. p. 44-63 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13173 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    30 Downloads (Pure)