Search results

  • 2022

    Upside Down: Exploring the Ecosystem of Dark Web Data Markets

    Covrig, B., Mikelarena, E. B., Rosca, C., Goanta, C., Spanakis, G. & Zarras, A., 2022, ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Proceedings. Meng, W., Fischer-Hübner, S. & Jensen, C. D. (eds.). Springer, p. 489-506 18 p. (IFIP Advances in Information and Communication Technology; vol. 648 IFIP).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    18 Downloads (Pure)
  • User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack

    Li, M., Zhu, L., Zhang, Z., Lal, C., Conti, M. & Alazab, M., 2022, In: IEEE/ACM Transactions on Networking. 30, 5, p. 2060-2073 14 p., 9740483.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    27 Downloads (Pure)
  • VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents

    Lambregts, S., Chen, H., Ning, J. & Liang, K., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Cham: Springer, p. 653-676 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    23 Downloads (Pure)
  • What Do You See? Transforming Fault Injection Target Characterizations

    Krček, M., 2022, Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Proceedings. Batina, L., Picek, S. & Mondal, M. (eds.). Springer, p. 165-184 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13783 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    18 Downloads (Pure)
  • WordMarkov: A New Password Probability Model of Semantics

    Xie, J., Cheng, H., Zhu, R., Wang, P. & Liang, K., 2022, Proceedings of the ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, p. 3034-3038 5 p. 9746203

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    18 Downloads (Pure)
  • 2021

    A Multi-Sensor Information Fusion Method Based on Factor Graph for Integrated Navigation System

    Xu, J., Yang, G., Sun, Y. & Picek, S., 2021, In: IEEE Access. 9, p. 12044-12054 11 p., 9324742.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    16 Citations (Scopus)
    369 Downloads (Pure)
  • Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain

    Li, M., Zhu, L., Zhang, Z., Lal, C., Conti, M. & Alazab, M., 2021, In: IEEE Transactions on Network and Service Management. 18, 4, p. 4434-4449 16 p., 9490665.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    21 Citations (Scopus)
    330 Downloads (Pure)
  • AS-level BGP community usage classification

    Krenc, T., Beverly, R. & Smaragdakis, G., 2021, IMC 2021 - Proceedings of the 2021 ACM Internet Measurement Conference. Association for Computing Machinery (ACM), p. 577-592 16 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    32 Downloads (Pure)
  • Beyond Labeling: Using Clustering to Build Network Behavioral Profiles of Malware Families

    Nadeem, A., Hammerschmidt, C. A., Hernandez Ganan, C. & Verwer, S. E., 2021, Malware Analysis using Artificial Intelligence and Deep Learning. Shalaginov, A., Stamp, M. & Alazab, M. (eds.). Cham: Springer, p. 381-409 29 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    198 Downloads (Pure)
  • Black-box mixed-variable optimisation using a surrogate model that satisfies integer constraints

    Bliek, L., Guijt, A., Verwer, S. & De Weerdt, M., 2021, GECCO 2021 Companion - Proceedings of the 2021 Genetic and Evolutionary Computation Conference Companion. Association for Computing Machinery (ACM), p. 1851-1859 9 p. (GECCO 2021 Companion - Proceedings of the 2021 Genetic and Evolutionary Computation Conference Companion).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    92 Downloads (Pure)
  • Blockchain-Based Software Architecture Development for Service Requirements With Smart Contracts

    Zhu, Y., Guo, Q., Yin, H., Liang, K. & Yau, S. S., 2021, In: Computer (New York). 54, 12, p. 72-80

    Research output: Contribution to journalArticleScientificpeer-review

  • CoInGP: Convolutional inpainting with genetic programming

    Jakobovic, D., Manzoni, L., Mariot, L., Picek, S. & Castelli, M., 2021, GECCO 2021 : Proceedings of the 2021 Genetic and Evolutionary Computation Conference. Chicano, F. & Krawiec, K. (eds.). New York: Association for Computing Machinery (ACM), p. 795-803 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers

    Vos, J., Erkin, Z. & Dörr, C., 2021, 2021 IEEE International Workshop on Information Forensics and Security, WIFS 2021: Proceedings. IEEE, p. 44-49 6 p. 9648381. (2021 IEEE International Workshop on Information Forensics and Security, WIFS 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    24 Downloads (Pure)
  • Continuous Surrogate-Based Optimization Algorithms Are Well-Suited for Expensive Discrete Problems

    Karlsson, R., Bliek, L., Verwer, S. & de Weerdt, M., 2021, Artificial Intelligence and Machine Learning - 32nd Benelux Conference, BNAIC/Benelearn 2020, Revised Selected Papers. Baratchi, M., Cao, L., Kosters, W. A., Lijffijt, J., van Rijn, J. N. & Takes, F. W. (eds.). Springer, p. 48-63 16 p. (Communications in Computer and Information Science; vol. 1398 CCIS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    102 Downloads (Pure)
  • Cyber Security Threats to Bitcoin Exchanges: Adversary Exploitation and Laundering Techniques

    Oosthoek, K. & Doerr, C., 2021, In: IEEE Transactions on Network and Service Management. 18, 2, p. 1616-1628 13 p., 9300238.

    Research output: Contribution to journalArticleScientificpeer-review

    8 Citations (Scopus)
  • Data driven design for online industrial auctions

    Ye, Q. C., Rhuggenaath, J. S., Zhang, Y., Verwer, S. & Hilgeman, M. J., 2021, In: Annals of Mathematics and Artificial Intelligence. 89, 7, p. 675-691 17 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    33 Downloads (Pure)
  • Detecting and categorizing Android malware with graph neural networks

    Xu, P., Eckert, C. & Zarras, A., 2021, Proceedings of the 36th Annual ACM Symposium on Applied Computing, SAC 2021. Association for Computing Machinery (ACM), p. 409-412 4 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    15 Citations (Scopus)
  • Distributed additive encryption and quantization for privacy preserving federated deep learning

    Zhu, H., Wang, R., Jin, Y., Liang, K. & Ning, J., 2021, In: Neurocomputing. 463, p. 309-327 19 p.

    Research output: Contribution to journalArticleScientificpeer-review

    20 Citations (Scopus)
  • Efficient joint random number generation for secure multi-party computation

    Hoogerwerf, E., van Tetering, D., Bay, A. & Erkin, Z., 2021, Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021. di Vimercati, S. D. C. & Samarati, P. (eds.). SciTePress, p. 436-443 8 p. (Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Efficient Training of Robust Decision Trees Against Adversarial Examples

    Vos, D. A. & Verwer, S. E., 2021, BNAIC/BeneLearn 2021: 33rd Benelux Conference on Artificial Intelligence and 30th Belgian-Dutch Conference on Machine Learning. Leiva, E. L. A., Pruski, C., Markovich, R., Najjar, A. & Schommer, C. (eds.). p. 702-703

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    45 Downloads (Pure)
  • Enabling Visual Analytics via Alert-driven Attack Graphs

    Nadeem, A., Verwer, S. E., Moskal, S. & Yang, S. J., 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 2420-2422 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    132 Downloads (Pure)
  • Evolutionary algorithms-assisted construction of cryptographic boolean functions

    Carlet, C., Jakobovic, D. & Picek, S., 2021, GECCO 2021 - Proceedings of the 2021 Genetic and Evolutionary Computation Conference. Association for Computing Machinery (ACM), p. 565-573 9 p. (GECCO 2021 - Proceedings of the 2021 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    100 Downloads (Pure)
  • Evolutionary algorithms for designing reversible cellular automata

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2021, In: GENETIC PROGRAMMING AND EVOLVABLE MACHINES. 22, 4, p. 429-461 33 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    55 Downloads (Pure)
  • Explainability-based Backdoor Attacks against Graph Neural Networks

    Xu, J., Xue, M. & Picek, S., 2021, WiseML 2021 : Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning. New York: Association for Computing Machinery (ACM), p. 31-36 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    18 Citations (Scopus)
    199 Downloads (Pure)
  • Exploring Semi-bent Boolean Functions Arising from Cellular Automata

    Mariot, L., Saletta, M., Leporati, A. & Manzoni, L., 2021, Cellular Automata : 14th International Conference on Cellular Automata for Research and Industry, ACRI 2020, Proceedings. Gwizdałła, T. M., Manzoni, L., Sirakoulis, G. C., Bandini, S. & Podlaski, K. (eds.). Cham: Springer, p. 56-66 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12599 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Falcon: Malware Detection and Categorization with Network Traffic Images

    Xu, P., Eckert, C. & Zarras, A., 2021, Artificial Neural Networks and Machine Learning : ICANN 2021 - 30th International Conference on Artificial Neural Networks, Proceedings. Farkaš, I., Masulli, P., Otte, S. & Wermter, S. (eds.). Part 1 ed. Cham: Springer, Vol. 12891. p. 117-128 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12891 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs

    Xu, P., Zhang, Y., Eckert, C. & Zarras, A., 2021, Artificial Neural Networks and Machine Learning – ICANN 2021 : 30th International Conference on Artificial Neural Networks, Proceedings. Farkaš, I., Masulli, P., Otte, S. & Wermter, S. (eds.). Cham: Springer, Vol. 12893. p. 127-138 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12893 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Hip to Be (Latin) Square: Maximal Period Sequences from Orthogonal Cellular Automata

    Mariot, L., 2021, 2021 Ninth International Symposium on Computing and Networking (CANDAR): Proceedings. Bilof, R. (ed.). Piscataway: IEEE, p. 29-37 9 p. 9643876

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors

    Chen, E., Zhu, Y., Zhu, G., Liang, K. & Feng, R., 2021, In: Computers and Security. 107, 102318.

    Research output: Contribution to journalArticleScientificpeer-review

    4 Citations (Scopus)
  • Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic

    Norouzian, M. R., Xu, P., Eckert, C. & Zarras, A., 2021, Information Security - 24th International Conference, ISC 2021, Proceedings. Liu, J. K., Katsikas, S., Meng, W., Susilo, W. & Intan, R. (eds.). Springer, p. 259-278 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13118 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction

    Cheng, H., Li, W., Wang, P. & Liang, K., 2021, ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, p. 2690-2694 5 p. 9414886

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Incentives and Cryptographic Protocols for Bitcoin-like Blockchains

    Ersoy, O., 2021, 142 p.

    Research output: ThesisDissertation (TU Delft)

    Open Access
    File
    129 Downloads (Pure)
  • Incrementally updateable honey password vaults

    Cheng, H., Li, W., Wang, P., Chu, C. H. & Liang, K., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 857-874 18 p. (Proceedings of the 30th USENIX Security Symposium).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Inside the Matrix: CTI Frameworks as Partial Abstractions of Complex Threats

    Oosthoek, K. & Doerr, C., 2021, 2021 IEEE International Conference on Big Data (Big Data): Proceedings. Piscataway: IEEE, p. 2136-2143 8 p. 9671425

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    161 Downloads (Pure)
  • Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications

    Kumar, G., Saha, R., Lal, C. & Conti, M., 2021, In: Future Generation Computer Systems. 120, p. 13-25 13 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    35 Citations (Scopus)
    86 Downloads (Pure)
  • Introduction to the special issue on security and privacy for connected cyber-physical systems

    Ambrosin, M., Conti, M., Lazzeretti, R. & Yu, C. M., 2021, In: ACM Transactions on Cyber-Physical Systems. 5, 1, 1.

    Research output: Contribution to journalEditorialScientificpeer-review

  • Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled Side-Channel Analysis

    Valk, D., Picek, S. & Bhasin, S., 2021, Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, COSADE 2020, Revised Selected Papers. Bertoni, G. M. & Regazzoni, F. (eds.). Springer, Vol. 12244. p. 175-199 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12244 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Large scale outage visibility on the control plane

    Becker, L., Hohlfeld, O. & Smaragdakis, G., 2021, CoNEXT-SW 2021 - Proceedings of the 2021 CoNEXT Student Workshop 2021 - Part of CoNEXT 2021 the 17th International Conference on emerging Networking EXperiments and Technologies. Association for Computing Machinery (ACM), p. 13-14 2 p. (CoNEXT-SW 2021 - Proceedings of the 2021 CoNEXT Student Workshop 2021 - Part of CoNEXT 2021 the 17th International Conference on emerging Networking EXperiments and Technologies).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    30 Downloads (Pure)
  • Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis

    Perin, G., Buhan, I. & Picek, S., 2021, Constructive Side-Channel Analysis and Secure Design - 12th International Workshop, COSADE 2021, Proceedings. Bhasin, S. & De Santis, F. (eds.). Springer, p. 53-81 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12910 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • Lightweight Searchable Encryption Protocol for Industrial Internet of Things

    Zhang, K., Long, J., Wang, X., Dai, H. N., Liang, K. & Imran, M., 2021, In: IEEE Transactions on Industrial Informatics. 17, 6, p. 4248-4259 12 p., 9158514.

    Research output: Contribution to journalArticleScientificpeer-review

    44 Citations (Scopus)
  • Multi-party private set intersection protocols for practical applications

    Bay, A., Erkin, Z., Alishahi, M. & Vos, J., 2021, Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021. di Vimercati, S. D. C. & Samarati, P. (eds.). SciTePress, p. 515-522 8 p. (Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    125 Downloads (Pure)
  • No-hop: In-network Distributed Hash Tables

    Hügerich, L., Shukla, A. & Smaragdakis, G., 2021, ANCS 2021 - Proceedings of the 2021 Symposium on Architectures for Networking and Communications Systems. Association for Computing Machinery (ACM), p. 80-87 8 p. (ANCS 2021 - Proceedings of the 2021 Symposium on Architectures for Networking and Communications Systems).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    20 Downloads (Pure)
  • On Reverse Engineering Neural Network Implementation on GPU

    Chmielewski, Ł. & Weissbart, L., 2021, Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, and SiMLA, 2021, Proceedings. Zhou, J., Ahmed, C. M., Batina, L., Chattopadhyay, S., Gadyatskaya, O., Jin, C., Lin, J., Losiouk, E., Luo, B., Majumdar, S., Maniatakos, M., Mashima, D., Meng, W., Picek, S., Shimaoka, M., Su, C. & Wang, C. (eds.). Springer, p. 96-113 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12809 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • On the genotype compression and expansion for evolutionary algorithms in the continuous domain

    Planinic, L., Djurasevic, M., Mariot, L., Jakobovic, D., Picek, S. & Coello Coello, C., 2021, GECCO 2021 Companion : Proceedings of the 2021 Genetic and Evolutionary Computation Conference Companion. Chicano, E. & Krawiec, K. (eds.). New York: Association for Computing Machinery (ACM), p. 1208-1216 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • On the Importance of Initial Solutions Selection in Fault Injection

    Krcek, M., Fronte, D. & Picek, S., 2021, 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC): Proceedings. O’Dell, M. (ed.). Piscataway: IEEE, p. 1-12 12 p. 9565588

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    157 Downloads (Pure)
  • On the Importance of Pooling Layer Tuning for Profiling Side-Channel Analysis

    Wu, L. & Perin, G., 2021, Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, and SiMLA, 2021, Proceedings. Zhou, J., Ahmed, C. M., Batina, L., Chattopadhyay, S., Gadyatskaya, O., Jin, C., Lin, J., Losiouk, E., Luo, B., Majumdar, S., Maniatakos, M., Mashima, D., Meng, W., Picek, S., Shimaoka, M., Su, C. & Wang, C. (eds.). Springer, p. 114-132 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12809 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    71 Downloads (Pure)
  • On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis

    Perin, G. & Picek, S., 2021, Selected Areas in Cryptography : 27th International Conference, 2020, Revised Selected Papers. Dunkelman, O., Jacobson, Jr., M. J. & O’Flynn, C. (eds.). Cham: Springer, Vol. 12804. p. 615-636 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12804).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Post-quantum WireGuard

    Hulsing, A., Ning, K. C., Schwabe, P., Weber, F. & Zimmermann, P. R., 2021, 2021 IEEE Symposium on Security and Privacy (SP): Proceedings. O'Conner, L. (ed.). Piscataway: IEEE, p. 304-321 18 p. 9519445

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    18 Citations (Scopus)
  • Practical Exchange for Unique Digital Goods

    Ersoy, O., Genç, Z. A., Erkin, Z. & Conti, M., 2021, 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS): Proceedings. O'Conner, L. (ed.). Piscataway: IEEE, p. 49-58 10 p. 9566170

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    28 Downloads (Pure)
  • Practical Threshold Multi-Factor Authentication

    Li, W., Cheng, H., Wang, P. & Liang, K., 2021, In: IEEE Transactions on Information Forensics and Security. 16, p. 3573-3588 16 p., 9432950.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    11 Citations (Scopus)
    148 Downloads (Pure)