Filter
Conference contribution

Search results

  • 2021

    Falcon: Malware Detection and Categorization with Network Traffic Images

    Xu, P., Eckert, C. & Zarras, A., 2021, Artificial Neural Networks and Machine Learning : ICANN 2021 - 30th International Conference on Artificial Neural Networks, Proceedings. Farkaš, I., Masulli, P., Otte, S. & Wermter, S. (eds.). Part 1 ed. Cham: Springer, Vol. 12891. p. 117-128 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12891 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs

    Xu, P., Zhang, Y., Eckert, C. & Zarras, A., 2021, Artificial Neural Networks and Machine Learning – ICANN 2021 : 30th International Conference on Artificial Neural Networks, Proceedings. Farkaš, I., Masulli, P., Otte, S. & Wermter, S. (eds.). Cham: Springer, Vol. 12893. p. 127-138 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12893 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Hip to Be (Latin) Square: Maximal Period Sequences from Orthogonal Cellular Automata

    Mariot, L., 2021, 2021 Ninth International Symposium on Computing and Networking (CANDAR): Proceedings. Bilof, R. (ed.). Piscataway: IEEE, p. 29-37 9 p. 9643876

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic

    Norouzian, M. R., Xu, P., Eckert, C. & Zarras, A., 2021, Information Security - 24th International Conference, ISC 2021, Proceedings. Liu, J. K., Katsikas, S., Meng, W., Susilo, W. & Intan, R. (eds.). Springer, p. 259-278 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13118 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction

    Cheng, H., Li, W., Wang, P. & Liang, K., 2021, ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, p. 2690-2694 5 p. 9414886

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Incrementally updateable honey password vaults

    Cheng, H., Li, W., Wang, P., Chu, C. H. & Liang, K., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 857-874 18 p. (Proceedings of the 30th USENIX Security Symposium).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Inside the Matrix: CTI Frameworks as Partial Abstractions of Complex Threats

    Oosthoek, K. & Doerr, C., 2021, 2021 IEEE International Conference on Big Data (Big Data): Proceedings. Piscataway: IEEE, p. 2136-2143 8 p. 9671425

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    158 Downloads (Pure)
  • Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled Side-Channel Analysis

    Valk, D., Picek, S. & Bhasin, S., 2021, Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, COSADE 2020, Revised Selected Papers. Bertoni, G. M. & Regazzoni, F. (eds.). Springer, Vol. 12244. p. 175-199 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12244 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Large scale outage visibility on the control plane

    Becker, L., Hohlfeld, O. & Smaragdakis, G., 2021, CoNEXT-SW 2021 - Proceedings of the 2021 CoNEXT Student Workshop 2021 - Part of CoNEXT 2021 the 17th International Conference on emerging Networking EXperiments and Technologies. Association for Computing Machinery (ACM), p. 13-14 2 p. (CoNEXT-SW 2021 - Proceedings of the 2021 CoNEXT Student Workshop 2021 - Part of CoNEXT 2021 the 17th International Conference on emerging Networking EXperiments and Technologies).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    30 Downloads (Pure)
  • Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis

    Perin, G., Buhan, I. & Picek, S., 2021, Constructive Side-Channel Analysis and Secure Design - 12th International Workshop, COSADE 2021, Proceedings. Bhasin, S. & De Santis, F. (eds.). Springer, p. 53-81 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12910 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • Multi-party private set intersection protocols for practical applications

    Bay, A., Erkin, Z., Alishahi, M. & Vos, J., 2021, Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021. di Vimercati, S. D. C. & Samarati, P. (eds.). SciTePress, p. 515-522 8 p. (Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    122 Downloads (Pure)
  • No-hop: In-network Distributed Hash Tables

    Hügerich, L., Shukla, A. & Smaragdakis, G., 2021, ANCS 2021 - Proceedings of the 2021 Symposium on Architectures for Networking and Communications Systems. Association for Computing Machinery (ACM), p. 80-87 8 p. (ANCS 2021 - Proceedings of the 2021 Symposium on Architectures for Networking and Communications Systems).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    20 Downloads (Pure)
  • On Reverse Engineering Neural Network Implementation on GPU

    Chmielewski, Ł. & Weissbart, L., 2021, Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, and SiMLA, 2021, Proceedings. Zhou, J., Ahmed, C. M., Batina, L., Chattopadhyay, S., Gadyatskaya, O., Jin, C., Lin, J., Losiouk, E., Luo, B., Majumdar, S., Maniatakos, M., Mashima, D., Meng, W., Picek, S., Shimaoka, M., Su, C. & Wang, C. (eds.). Springer, p. 96-113 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12809 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • On the genotype compression and expansion for evolutionary algorithms in the continuous domain

    Planinic, L., Djurasevic, M., Mariot, L., Jakobovic, D., Picek, S. & Coello Coello, C., 2021, GECCO 2021 Companion : Proceedings of the 2021 Genetic and Evolutionary Computation Conference Companion. Chicano, E. & Krawiec, K. (eds.). New York: Association for Computing Machinery (ACM), p. 1208-1216 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • On the Importance of Initial Solutions Selection in Fault Injection

    Krcek, M., Fronte, D. & Picek, S., 2021, 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC): Proceedings. O’Dell, M. (ed.). Piscataway: IEEE, p. 1-12 12 p. 9565588

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    155 Downloads (Pure)
  • On the Importance of Pooling Layer Tuning for Profiling Side-Channel Analysis

    Wu, L. & Perin, G., 2021, Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, and SiMLA, 2021, Proceedings. Zhou, J., Ahmed, C. M., Batina, L., Chattopadhyay, S., Gadyatskaya, O., Jin, C., Lin, J., Losiouk, E., Luo, B., Majumdar, S., Maniatakos, M., Mashima, D., Meng, W., Picek, S., Shimaoka, M., Su, C. & Wang, C. (eds.). Springer, p. 114-132 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12809 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    71 Downloads (Pure)
  • On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis

    Perin, G. & Picek, S., 2021, Selected Areas in Cryptography : 27th International Conference, 2020, Revised Selected Papers. Dunkelman, O., Jacobson, Jr., M. J. & O’Flynn, C. (eds.). Cham: Springer, Vol. 12804. p. 615-636 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12804).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Post-quantum WireGuard

    Hulsing, A., Ning, K. C., Schwabe, P., Weber, F. & Zimmermann, P. R., 2021, 2021 IEEE Symposium on Security and Privacy (SP): Proceedings. O'Conner, L. (ed.). Piscataway: IEEE, p. 304-321 18 p. 9519445

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    18 Citations (Scopus)
  • Practical Exchange for Unique Digital Goods

    Ersoy, O., Genç, Z. A., Erkin, Z. & Conti, M., 2021, 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS): Proceedings. O'Conner, L. (ed.). Piscataway: IEEE, p. 49-58 10 p. 9566170

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    26 Downloads (Pure)
  • Privacy-Preserving Data Aggregation with Probabilistic Range Validation

    Dekker, F. W. & Erkin, Z., 2021, Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Proceedings. Sako, K. & Tippenhauer, N. O. (eds.). 19 ed. Kamakura, Japan: Springer Nature, Vol. 12727. p. 79-98 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12727 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    1088 Downloads (Pure)
  • ReproducedPapers.org: Openly Teaching and Structuring Machine Learning Reproducibility

    Yildiz, B., Hung, H., Krijthe, J. H., Liem, C. C. S., Loog, M., Migut, G., Oliehoek, F. A., Panichella, A., Pawełczak, P., Picek, S., de Weerdt, M. & van Gemert, J., 2021, Reproducible Research in Pattern Recognition - 3rd International Workshop, RRPR 2021, Revised Selected Papers. Kerautret, B., Colom, M., Krähenbühl, A., Lopresti, D., Monasse, P. & Talbot, H. (eds.). Springer, p. 3-11 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12636 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    86 Downloads (Pure)
  • SAGE: Intrusion Alert-driven Attack Graph Extractor

    Nadeem, A., Verwer, S. E. & Yang, S. J., 2021, 18th IEEE Symposium on Visualization for Cyber Security. IEEE, p. 36-41 6 p. 9629418

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    10 Downloads (Pure)
  • Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks

    Griffioen, H., Oosthoek, K., van der Knaap, P. & Doerr, C., 2021, CCS 2021 : Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 940-954 15 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    10 Citations (Scopus)
    120 Downloads (Pure)
  • Seven years in the life of Hypergiants' off-nets

    Gigis, P., Calder, M., Manassakis, L., Nomikos, G., Kotronis, V., Dimitropoulos, X., Katz-Bassett, E. & Smaragdakis, G., 2021, SIGCOMM 2021 : Proceedings of the ACM SIGCOMM 2021 Conference. New York: Association for Computing Machinery (ACM), p. 516-533 18 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    19 Citations (Scopus)
    126 Downloads (Pure)
  • Third time's not a charm: Exploiting SNMPv3 for router fingerprinting

    Albakour, T., Gasser, O., Beverly, R. & Smaragdakis, G., 2021, IMC 2021 - Proceedings of the 2021 ACM Internet Measurement Conference. Association for Computing Machinery (ACM), p. 150-164 15 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    96 Downloads (Pure)
  • Tip the Balance: Improving Exploration of Balanced Crossover Operators by Adaptive Bias

    Manzoni, L., Mariot, L. & Tuba, E., 2021, 2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW): Proceedings. Bilof, R. (ed.). Piscataway: IEEE, p. 234-240 7 p. 9644116

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Towards a traffic map of the Internet Connecting the dots between popular services and users: Connecting the dots between popular services and users

    Koch, T., Jiang, W., Luo, T., Gigis, P., Zhang, Y., Vermeulen, K., Aben, E., Calder, M., Katz-Bassett, E., Manassakis, L., Smaragdakis, G. & Vallina-Rodriguez, N., 2021, HotNets 2021 - Proceedings of the 20th ACM Workshop on Hot Topics in Networks. Association for Computing Machinery (ACM), p. 23-30 8 p. (HotNets 2021 - Proceedings of the 20th ACM Workshop on Hot Topics in Networks).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    296 Downloads (Pure)
  • United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale

    Wagner, D., Kopp, D., Wichtlhuber, M., DIetzel, C., Hohlfeld, O., Smaragdakis, G. & Feldmann, A., 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 970-987 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    59 Downloads (Pure)
  • Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services

    Chen, Y., Li, M., Zheng, S., Lal, C. & Conti, M., 2021, Security and Trust Management - 17th International Workshop, STM 2021, Proceedings. Roman, R. & Zhou, J. (eds.). 17 ed. Darmstadt, Germany: Springer, Vol. 13075. p. 43-61 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13075 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    17 Downloads (Pure)
  • Your Smart Contracts Are Not Secure: Investigating Arbitrageurs and Oracle Manipulators in Ethereum

    Tjiam, K., Wang, R., Chen, H. & Liang, K., 2021, CYSARM 2021 - Proceedings of the 3rd Workshop on Cyber-Security Arms Race, co-located with CCS 2021. Association for Computing Machinery (ACM), p. 25-35 11 p. (CYSARM 2021 - Proceedings of the 3rd Workshop on Cyber-Security Arms Race, co-located with CCS 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    581 Downloads (Pure)
  • 2020

    A comparison of weight initializers in deep learning-based side-channel analysis

    Li, H., Krček, M. & Perin, G., 2020, Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S and P, SCI, SecMT, and SiMLA, Proceedings. Zhou, J., Ahmed, C. M., Conti, M., Losiouk, E., Au, M. H., Batina, L., Li, Z., Lin, J., Luo, B., Majumdar, S., Meng, W., Ochoa, M., Picek, S., Portokalidis, G., Wang, C. & Zhang, K. (eds.). Springer, p. 126-143 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12418 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    20 Citations (Scopus)
  • A fast characterization method for semi-invasive fault injection attacks

    Wu, L., Ribera, G., Beringuier-Boher, N. & Picek, S., 2020, Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings. Jarecki, S. (ed.). SpringerOpen, p. 146-170 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    11 Citations (Scopus)
    198 Downloads (Pure)
  • An Evolutionary View on Reversible Shift-Invariant Transformations

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2020, Genetic Programming - 23rd European Conference, EuroGP 2020, Held as Part of EvoStar 2020, Proceedings. Hu, T., Lourenço, N., Medvet, E. & Divina, F. (eds.). SpringerOpen, p. 118-134 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12101 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • A search for additional structure: The case of cryptographic s-boxes

    Carlet, C., Djurasevic, M., Jakobovic, D. & Picek, S., 2020, Parallel Problem Solving from Nature – PPSN XVI. Bäck, T., Preuss, M., Deutz, A., Emmerich, M., Wang, H., Doerr, C. & Trautmann, H. (eds.). Part II ed. Cham: Springer, p. 343-356 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12270 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    28 Downloads (Pure)
  • Auto Semi-supervised Outlier Detection for Malicious Authentication Events

    Kaiafas, G., Hammerschmidt, C., Lagraa, S. & State, R., 2020, Machine Learning and Knowledge Discovery in Databases - International Workshops of ECML PKDD 2019, Proceedings. Cellier, P. & Driessens, K. (eds.). Part II ed. Cham: Springer, p. 176-190 15 p. (Communications in Computer and Information Science; vol. 1168 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Big enough to care not enough to scare! crawling to attack recommender systems

    Aiolli, F., Conti, M., Picek, S. & Polato, M., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer, p. 165-184 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Counterfighting Counterfeit: Detecting and Taking down Fraudulent Webshops at a ccTLD

    Wabeke, T., Moura, G. C. M., Franken, N. & Hesselman, C., 2020, Passive and Active Measurement : 21st International Conference, PAM 2020, Proceedings. Sperotto, A., Dainotti, A. & Stiller, B. (eds.). SpringerOpen, Vol. 12048. p. 158-174 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12048 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Discovering Collaboration: Unveiling Slow, Distributed Scanners based on Common Header Field Patterns

    Griffioen, H. & Doerr, C., 2020, NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium: Proceedings. IEEE, p. 1-9 9 p. 9110444

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    14 Citations (Scopus)
  • dnstracker: Measuring Centralization of DNS Infrastructure in the Wild

    Zembruzki, L., Jacobs, A. S., Landtreter, G. S., Granville, L. Z. & Moura, G. C. M., 2020, Advanced Information Networking and Applications : Proceedings of the 34th International Conference on Advanced Information Networking and Applications, AINA 2020. Barolli, L., Amato, F., Moscato, F., Enokido, T. & Takizawa, M. (eds.). Cham: Springer, p. 871-882 12 p. (Advances in Intelligent Systems and Computing; vol. 1151 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Evolutionary computation and machine learning in cryptology

    Picek, S. & Jakobovic, D., 2020, GECCO 2020 Companion : Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion. New York: Association for Computing Machinery (ACM), p. 1147-1173 27 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    145 Downloads (Pure)
  • Fitness landscape analysis of dimensionally-aware genetic programming featuring feynman equations

    Ðurasević, M., Jakobovic, D., Martins, M. S. R., Picek, S. & Wagner, M., 2020, Parallel Problem Solving from Nature – PPSN XVI. Bäck, T., Preuss, M., Deutz, A., Emmerich, M., Wang, H., Doerr, C. & Trautmann, H. (eds.). Part II ed. Cham: Springer, p. 111-124 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12270 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    32 Downloads (Pure)
  • From Hodl to Heist: Analysis of Cyber Security Threats to Bitcoin Exchanges

    Oosthoek, K. & Doerr, C., 2020, 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, p. 1-9 9 p. 9169412

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    15 Citations (Scopus)
  • HeadPrint: Detecting anomalous communications through header-based application fingerprinting

    Bortolameotti, R., Van Ede, T., Continella, A., Hupperich, T., Everts, M. H., Rafati, R., Jonker, W., Hartel, P. & Peter, A., 2020, SAC 2020: Proceedings of the 35th Annual ACM Symposium on Applied Computing. Association for Computing Machinery (ACM), p. 1696-1705 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    53 Downloads (Pure)
  • How to profit from payments channels

    Ersoy, O., Roos, S. & Erkin, Z., 2020, Proceedings of the 24th Financial Cryptography and Data Security, Kota Kinabalu, Sabah, Malaysia. Bonneau, J. & Heninger, N. (eds.). Cham: Springer, Vol. 12059. p. 284-303 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12059 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    File
    15 Citations (Scopus)
    136 Downloads (Pure)
  • Hybrid connection and host clustering for community detection in spatial-temporal network data

    Roeling, M. P., Nadeem, A. & Verwer, S. E., 2020, ECML PKDD 2020 Workshops - Workshops of the European Conference on Machine Learning and Knowledge Discovery in Databases ECML PKDD 2020: SoGood 2020, PDFL 2020, MLCS 2020, NFMCP 2020, DINA 2020, EDML 2020, XKDD 2020 and INRA 2020, Proceedings. Koprinska, I., Appice, A., Antonie, L., Guidotti, R., Ribeiro, R. P., Gama, J., Krishnamurthy, Y., Malerba, D., Ceci, M., Masciari, E., Christen, P., Schubert, E., Monreale, M., Rinzivillo, S., Lommatzsch, A., Kamp, M., Loglisci, C., Zimmermann, A., Özgöbek, Ö., Gavaldà, R., Adilova, L., Ferreira, P. M., Medeiros, I., Manco, G., Ras, Z. W., Ntoutsi, E., Zimek, A., Biecek, P., Kille, B. & Gulla, J. A. (eds.). Vol. 1323. p. 178-204 27 p. (Communications in Computer and Information Science; vol. 1323).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    121 Downloads (Pure)
  • Latin Hypercubes and Cellular Automata

    Gadouleau, M. & Mariot, L., 2020, Cellular Automata and Discrete Complex Systems : 26th IFIP WG 1.5 International Workshop, AUTOMATA 2020, Proceedings. Zenil, H. (ed.). Cham: Springer, p. 139-151 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12286 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Learning From A Big Brother: Mimicking Neural Networks in Profiled Side-channel Analysis

    van der Valk, D., Krcek, M., Picek, S. & Bhasin, S., 2020, 2020 57th ACM/IEEE Design Automation Conference, DAC 2020. Piscataway: IEEE, p. 1-6 6 p. 9218520. (Proceedings - Design Automation Conference; vol. 2020-July).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Mutation testing of smart contracts at scale

    Hartel, P. & Schumi, R., 2020, Tests and Proofs - 14th International Conference, TAP 2020, held as part of STAF 2020, Proceedings. Ahrendt, W. & Wehrheim, H. (eds.). SpringerOpen, p. 23-42 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12165 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    11 Citations (Scopus)
  • One property to rule them all? On the limits of trade-offs for S-boxes

    Djurasevic, M., Jakobovic, D. & Picek, S., 2020, GECCO 2020 : Proceedings of the 2020 Genetic and Evolutionary Computation Conference. New York: Association for Computing Machinery (ACM), p. 1064-1072 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    50 Downloads (Pure)
  • Performance analysis of multilayer perceptron in profiling side-channel analysis

    Weissbart, L., 2020, Applied Cryptography and Network Security Workshops : ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA. Zhou, J., Ahmed, C. M., Conti, M., Losiouk, E., Au, M. H., Batina, L., Li, Z., Lin, J., Luo, B., Majumdar, S., Meng, W., Ochoa, M., Picek, S., Portokalidis, G., Wang, C. & Zhang, K. (eds.). Cham: Springer, p. 198-216 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12418 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)