Filter
Conference contribution

Search results

  • 2022

    Anomaly Based Network Intrusion Detection for IoT Attacks using Convolution Neural Network

    Sharma, B., Sharma, L. & Lal, C., 2022, Proceedings of the 2022 IEEE 7th International conference for Convergence in Technology (I2CT). IEEE , p. 1-6 6 p. 9824229

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • A scalable SIMD RISC-V based processor with customized vector extensions for CRYSTALS-kyber

    Li, H., Mentens, N. & Picek, S., 2022, Proceedings of the 59th ACM/IEEE Design Automation Conference, DAC 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 733-738 6 p. (Proceedings - Design Automation Conference).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    29 Downloads (Pure)
  • Assessing e-Government DNS Resilience

    Sommese, R., Jonker, M., van der Ham, J. & Moura, G. C. M., 2022, Proceedings of the 2022 18th International Conference of Network and Service Management: Intelligent Management of Disruptive Network Technologies and Services, CNSM 2022. Charalambides, M., Papadimitriou, P., Cerroni, W., Kanhere, S. & Mamatas, L. (eds.). IEEE , p. 118-126 9 p. (Proceedings of the 2022 18th International Conference of Network and Service Management: Intelligent Management of Disruptive Network Technologies and Services, CNSM 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage

    Arora, V., Buhan, I., Perin, G. & Picek, S., 2022, Smart Card Research and Advanced Applications - 20th International Conference, CARDIS 2021, Revised Selected Papers. Grosso, V. & Pöppelmann, T. (eds.). Springer, Vol. 13173. p. 80-96 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13173 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

    Koffas, S., Xu, J., Conti, M. & Picek, S., 2022, WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning. Association for Computing Machinery (ACM), p. 57-62 6 p. (WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    29 Downloads (Pure)
  • Clustering Payloads: Grouping Randomized Scan Probes Into Campaign Templates

    Ghiette, V. & Dörr, C., 2022, Proceedings of the 2022 IFIP Networking Conference (IFIP Networking). IEEE , p. 1-9 9 p. 9829757. (2022 IFIP Networking Conference, IFIP Networking 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Decentralized Private Freight Declaration & Tracking with Data Validation

    Li, T., Vos, J. & Erkin, Z., 2022, Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops). Danvers: IEEE , p. 267-272 6 p. 9767444

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Downloads (Pure)
  • Deep Dive into the IoT Backend Ecosystem

    Saidi, S. J., Matic, S., Gasser, O., Smaragdakis, G. & Feldmann, A., 2022, Proceedings of the 22nd ACM Internet Measurement Conference. New York, NY, USA: Association for Computing Machinery (ACM), p. 488–503 16 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Downloads (Pure)
  • Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds

    Swaminathan, S., Chmielewski, Ł., Perin, G. & Picek, S., 2022, Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings. Zhou, J., Chattopadhyay, S., Adepu, S., Alcaraz, C., Batina, L., Casalicchio, E., Jin, C., Lin, J., Losiouk, E., Majumdar, S., Meng, W., Picek, S., Zhauniarovich, Y., Shao, J., Su, C., Wang, C. & Zonouz, S. (eds.). Cham: Springer, p. 165-182 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13285 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher

    Băcuieți, N., Batina, L. & Picek, S., 2022, Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings. Ateniese, G. & Venturi, D. (eds.). Springer, p. 809-829 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13269 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints

    Zhao, Z., Chen, X., Xuan, Y., Dong, Y., Wang, D. & Liang, K., 2022, Proceedings of the 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE , p. 15192-15201 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay

    Zheng, Y., Xu, P., Wang, W., Chen, T., Susilo, W., Liang, K. & Jin, H., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 86-104 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13555 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Do Bayesian Variational Autoencoders Know What They Don't Know?

    Glazunov, M. & Zarras, A., 2022, Proceedings of the 38th Conference on Uncertainty in Artificial Intelligence, UAI 2022. Association For Uncertainty in Artificial Intelligence (AUAI), p. 718-727 10 p. (Proceedings of the 38th Conference on Uncertainty in Artificial Intelligence, UAI 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Dynamic Backdoors with Global Average Pooling

    Koffas, S., Picek, S. & Conti, M., 2022, Proceedings of the 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS). Danvers: IEEE , p. 320-323 4 p. 9869920. (Proceeding - IEEE International Conference on Artificial Intelligence Circuits and Systems, AICAS 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts

    Vos, J., Vos, D. & Erkin, Z., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 408-423 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices

    Mukhtar, N., Batina, L., Picek, S. & Kong, Y., 2022, Topics in Cryptology - CT-RSA 2022 : Cryptographers’ Track at the RSA Conference, 2022, Proceedings. Galbraith, S. D. (ed.). Cham: Springer Science+Business Media, p. 297-321 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13161 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    6 Downloads (Pure)
  • Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis

    Kerkhof, M., Wu, L., Perin, G. & Picek, S., 2022, Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Proceedings. Balasch, J. & O’Flynn, C. (eds.). Springer, Vol. 13211. p. 29-48 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13211 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    6 Downloads (Pure)
  • For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection

    Cardaioli, M., Conti, M. & Ravindranath, A., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 595-613 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13556 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand

    Cardaioli, M., Cecconello, S., Conti, M., Milani, S., Picek, S. & Saraci, E., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 1687-1704 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Downloads (Pure)
  • Label-Only Membership Inference Attack against \\Node-Level Graph Neural Networks

    Conti, M., Li, J., Picek, S. & Xu, J., 2022, AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022. Association for Computing Machinery (ACM), p. 1–12 12 p. (AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Downloads (Pure)
  • Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster

    Cao, C., Blaise, A., Verwer, S. & Rebecchi, F., 2022, Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022. Association for Computing Machinery (ACM), 9 p. 117. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    20 Downloads (Pure)
  • Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption

    Wang, X., Cao, Z., Liu, Z. & Liang, K., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 105-125 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13555 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • LogoMotive: Detecting Logos on Websites to Identify Online Scams - A TLD Case Study

    van den Hout, T., Wabeke, T., Moura, G. C. M. & Hesselman, C., 2022, Passive and Active Measurement - 23rd International Conference, PAM 2022, Proceedings. Hohlfeld, O., Moura, G. & Pelsser, C. (eds.). Springer, p. 3-29 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13210 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Measuring Web Cookies in Governmental Websites

    Gotze, M., Matic, S., Iordanou, C., Smaragdakis, G. & Laoutaris, N., 2022, WebSci 2022 - Proceedings of the 14th ACM Web Science Conference. Association for Computing Machinery (ACM), p. 44-54 11 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    16 Downloads (Pure)
  • More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks

    Xu, J., Wang, R., Koffas, S., Liang, K. & Picek, S., 2022, Proceedings - 38th Annual Computer Security Applications Conference, ACSAC 2022. Association for Computing Machinery (ACM), p. 684–698 15 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Downloads (Pure)
  • No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent

    Chen, H., Fu, S. & Liang, K., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Part 1 ed. Cham: Springer, p. 387-407 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Old but Gold: Prospecting TCP to Engineer and Live Monitor DNS Anycast

    Moura, G. C. M., Heidemann, J., Hardaker, W., Charnsethikul, P., Bulten, J., Ceron, J. M. & Hesselman, C., 2022, Passive and Active Measurement - 23rd International Conference, PAM 2022, Proceedings. Hohlfeld, O., Moura, G. & Pelsser, C. (eds.). Springer, p. 264-292 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13210 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • On the Effect of Clock Frequency on Voltage and Electromagnetic Fault Injection

    Koffas, S. & Vadnala, P. K., 2022, Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings. Zhou, J., Chattopadhyay, S., Adepu, S., Alcaraz, C., Batina, L., Casalicchio, E., Jin, C., Lin, J., Losiouk, E., Majumdar, S., Meng, W., Picek, S., Zhauniarovich, Y., Shao, J., Su, C., Wang, C. & Zonouz, S. (eds.). Cham: Springer, p. 127-145 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13285 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • On the Evaluation of Deep Learning-Based Side-Channel Analysis

    Wu, L., Perin, G. & Picek, S., 2022, Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Proceedings. Balasch, J. & O’Flynn, C. (eds.). Springer, p. 49-71 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13211 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    6 Downloads (Pure)
  • Passtrans: An Improved Password Reuse Model Based on Transformer

    He, X., Cheng, H., Xie, J., Wang, P. & Liang, K., 2022, Proceedings of the ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE , p. 3044-3048 5 p. 9746731

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Poster: Clean-label Backdoor Attack on Graph Neural Networks

    Xu, J. & Picek, S., 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 3491-3493 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    24 Downloads (Pure)
  • PRIDE: A Privacy-Preserving Decentralised Key Management System

    Kester, D., Li, T. & Erkin, Z., 2022, Proceedings of the 2022 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE , p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Privacy-Friendly De-Authentication with BLUFADE: Blurred Face Detection

    Cardaioli, M., Conti, M., Tricomi, P. P. & Tsudik, G., 2022, 2022 IEEE International Conference on Pervasive Computing and Communications, PerCom 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 197-206 10 p. (2022 IEEE International Conference on Pervasive Computing and Communications, PerCom 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    512 Downloads (Pure)
  • Profiled Side-Channel Analysis in the Efficient Attacker Framework

    Picek, S., Heuser, A., Perin, G. & Guilley, S., 2022, Smart Card Research and Advanced Applications : 20th International Conference, CARDIS 2021, Revised Selected Papers. Grosso, V. & Pöppelmann, T. (eds.). Cham: Springer Science+Business Media, Vol. 13173. p. 44-63 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13173 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Red Light/Green Light: A Lightweight Algorithm for, Possibly, Fraudulent Online Behavior Change Detection

    Herrera Semenets, V., Hernández-León, R., Bustio-Martínez, L. & van den Berg, J., 2022, Advances in Computational Intelligence 21st Mexican International Conference on Artificial Intelligence, MICAI 2022, Monterrey, Mexico, October 24–29, 2022, Proceedings, Part II. Pichardo Laguna, O., Martínez-Miranda, J. & Martínez Seis, B. (eds.). Springer Science+Business Media, p. 316-327 12 p. (Lecture Notes in Computer Science; no. 13613).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Reinforcement Learning-Based Design of Side-Channel Countermeasures

    Rijsdijk, J., Wu, L. & Perin, G., 2022, Security, Privacy, and Applied Cryptography Engineering : 11th International Conference, SPACE 2021, Proceedings. Batina, L., Picek, S., Picek, S. & Mondal, M. (eds.). 1 ed. Cham: Springer Science+Business Media, p. 168-187 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13162 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Downloads (Pure)
  • Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud

    Li, M., Zhang, M., Gao, J., Lal, C., Conti, M. & Alazab, M., 2022, Information and Communications Security - 24th International Conference, ICICS 2022, Proceedings. Alcaraz, C., Chen, L., Li, S. & Samarati, P. (eds.). Springer, p. 261-280 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13407 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Downloads (Pure)
  • SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

    Apruzzese, G., Conti, M. & Yuan, Y., 2022, Proceedings - 38th Annual Computer Security Applications Conference, ACSAC 2022. Association for Computing Machinery (ACM), p. 171-185 15 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Downloads (Pure)
  • The More You Know: Improving Laser Fault Injection with Prior Knowledge

    Krcek, M., Ordas, T., Fronte, D. & Picek, S., 2022, Proceedings of the 2022 Workshop on Fault Detection and Tolerance in Cryptography (FDTC). Trinh, L. (ed.). Piscataway: IEEE , p. 18-29 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA

    Rezaeezade, A., Perin, G. & Picek, S., 2022, Progress in Cryptology - AFRICACRYPT 2022 - 13th International Conference on Cryptology in Africa, AFRICACRYPT 2022, Proceedings. Batina, L. & Daemen, J. (eds.). Springer, p. 397-421 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13503 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Upside Down: Exploring the Ecosystem of Dark Web Data Markets

    Covrig, B., Mikelarena, E. B., Rosca, C., Goanta, C., Spanakis, G. & Zarras, A., 2022, ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Proceedings. Meng, W., Fischer-Hübner, S. & Jensen, C. D. (eds.). Springer, p. 489-506 18 p. (IFIP Advances in Information and Communication Technology; vol. 648 IFIP).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents

    Lambregts, S., Chen, H., Ning, J. & Liang, K., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Cham: Springer, p. 653-676 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • What Do You See? Transforming Fault Injection Target Characterizations

    Krček, M., 2022, Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Proceedings. Batina, L., Picek, S. & Mondal, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 165-184 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13783 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • WordMarkov: A New Password Probability Model of Semantics

    Xie, J., Cheng, H., Zhu, R., Wang, P. & Liang, K., 2022, Proceedings of the ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE , p. 3034-3038 5 p. 9746203

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • 2021

    AS-level BGP community usage classification

    Krenc, T., Beverly, R. & Smaragdakis, G., 2021, IMC 2021 - Proceedings of the 2021 ACM Internet Measurement Conference. Association for Computing Machinery (ACM), p. 577-592 16 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    13 Downloads (Pure)
  • Black-box mixed-variable optimisation using a surrogate model that satisfies integer constraints

    Bliek, L., Guijt, A., Verwer, S. & De Weerdt, M., 2021, GECCO 2021 Companion - Proceedings of the 2021 Genetic and Evolutionary Computation Conference Companion. Association for Computing Machinery (ACM), p. 1851-1859 9 p. (GECCO 2021 Companion - Proceedings of the 2021 Genetic and Evolutionary Computation Conference Companion).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    37 Downloads (Pure)
  • CoInGP: Convolutional inpainting with genetic programming

    Jakobovic, D., Manzoni, L., Mariot, L., Picek, S. & Castelli, M., 2021, GECCO 2021 : Proceedings of the 2021 Genetic and Evolutionary Computation Conference. Chicano, F. & Krawiec, K. (eds.). New York: Association for Computing Machinery (ACM), p. 795-803 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers

    Vos, J., Erkin, Z. & Dörr, C., 2021, 2021 IEEE International Workshop on Information Forensics and Security, WIFS 2021: Proceedings. IEEE , p. 44-49 6 p. 9648381. (2021 IEEE International Workshop on Information Forensics and Security, WIFS 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Downloads (Pure)
  • Continuous Surrogate-Based Optimization Algorithms Are Well-Suited for Expensive Discrete Problems

    Karlsson, R., Bliek, L., Verwer, S. & de Weerdt, M., 2021, Artificial Intelligence and Machine Learning - 32nd Benelux Conference, BNAIC/Benelearn 2020, Revised Selected Papers. Baratchi, M., Cao, L., Kosters, W. A., Lijffijt, J., van Rijn, J. N. & Takes, F. W. (eds.). Springer Science+Business Media, p. 48-63 16 p. (Communications in Computer and Information Science; vol. 1398 CCIS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    42 Downloads (Pure)
  • Detecting and categorizing Android malware with graph neural networks

    Xu, P., Eckert, C. & Zarras, A., 2021, Proceedings of the 36th Annual ACM Symposium on Applied Computing, SAC 2021. Association for Computing Machinery (ACM), p. 409-412 4 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)