Filter
Conference contribution

Search results

  • A Blockchain-based Signature Scheme for Dynamic Coalitions

    Sewsingh, R. A., van der Lubbe, J. & de Boer, M. J., 2018, Proceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux. Spreeuwers, L. & Goseling, J. (eds.). IEEE Benelux Section, Werkgemeenschap voor Informatie- en Communicatietheorie, p. 182-190 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • A Blockchain based Witness Model for Trustworthy Cloud Service Level Agreement Enforcement

    Zhou, H., Ouyang, X., Ren, Z., Su, J., de Laat, C. & Zhao, Z., 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. Piscataway, NJ: IEEE , p. 1567-1575 9 p. 8737580

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    66 Citations (Scopus)
  • A Blockchain Consensus Protocol with Horizontal Scalability

    Cong, K., Ren, Z. & Pouwelse, J., 2019, 2018 IFIP Networking Conference (IFIP Networking) and Workshops : Proceedings. Stiller, B. (ed.). Piscataway, NJ, USA: IEEE , p. 424-432 9 p. 8696555

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    10 Citations (Scopus)
  • A characterisation of S-box fitness landscapes in cryptography

    Jakobovic, D., Picek, S., Martins, M. S. R. & Wagner, M., 2019, GECCO 2019 - Proceedings of the 2019 Genetic and Evolutionary Computation Conference: Proceedings of the 2019 Genetic and Evolutionary Computation Conference. New York: Association for Computing Machinery (ACM), p. 285-293 9 p. (GECCO 2019 - Proceedings of the 2019 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • A comparison of weight initializers in deep learning-based side-channel analysis

    Li, H., Krček, M. & Perin, G., 2020, Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S and P, SCI, SecMT, and SiMLA, Proceedings. Zhou, J., Ahmed, C. M., Conti, M., Losiouk, E., Au, M. H., Batina, L., Li, Z., Lin, J., Luo, B., Majumdar, S., Meng, W., Ochoa, M., Picek, S., Portokalidis, G., Wang, C. & Zhang, K. (eds.). Springer, p. 126-143 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12418 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    18 Citations (Scopus)
  • A computational ontology for cyber operations

    Maathuis, C., Pieters, W. & Van Den Berg, J., 2018, Proceedings of the 17th European Conference on Cyber Warfare and Security, ECCWS 2018. Josang, A. (ed.). IARIA / Curran Associates, Vol. 2018-June. p. 278-287 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • A data-driven behavior generation algorithm in car-following scenarios

    Zhang, Y., Lin, Q., Wang, J., Verwer, S. & Dolan, J. M., 2018, Dynamics of Vehicles on Roads and Tracks: Proceedings of the 25th International Symposium on Dynamics of Vehicles on Roads and Tracks (IAVSD 2017) . Spiryagin, M., Gordon, T., Cole, C. & McSweeney, T. (eds.). Leiden: CRC Press, Vol. 1. p. 1-2 2 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • A decentralised energy trading architecture for future smart grid load balancing

    Hijgenaar, S., Erkin, Z., Keviczky, T., Siemons, J., Bisschops, R. & Verbraeck, A., 2017, Proceedings 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm 2017). Piscataway, NJ, USA: IEEE , p. 77-82

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    129 Downloads (Pure)
  • A Decision Tree Induction Algorithm for Efficient Rule Evaluation Using Shannon’s Expansion

    Herrera-Semenets, V., Bustio-Martínez, L., Hernández-León, R. & van den Berg, J., 2023, Advances in Computational Intelligence - 22nd Mexican International Conference on Artificial Intelligence, MICAI 2023, Proceedings: 22nd Mexican International Conference on Artificial Intelligence, MICAI 2023. Calvo, H., Martínez-Villaseñor, L. & Ponce, H. (eds.). Part I ed. Cham: Springer, p. 241-252 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14391 LNAI).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Adversarially Robust Decision Tree Relabeling

    Vos, D. & Verwer, S., 2023, Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2022, Proceedings. Amini, M-R., Canu, S., Fischer, A., Guns, T., Kralj Novak, P. & Tsoumakas, G. (eds.). Springer, p. 203-218 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13715 LNAI).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    16 Downloads (Pure)
  • A fast characterization method for semi-invasive fault injection attacks

    Wu, L., Ribera, G., Beringuier-Boher, N. & Picek, S., 2020, Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings. Jarecki, S. (ed.). SpringerOpen, p. 146-170 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    10 Citations (Scopus)
    189 Downloads (Pure)
  • A Fault-tolerant and Efficient Scheme for Data Aggregation Over Groups in the Smart Grid

    Knirsch, F., Engel, D. & Erkin, Z., 2018, 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017. Piscataway, NJ: IEEE , Vol. 2018-January. p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation

    Perrina, F., Marchiori, F., Conti, M. & Verde, N. V., 2023, Proceedings of the 2023 IEEE International Conference on Big Data (BigData). IEEE , p. 3053-3062 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • AHEad: Privacy-preserving Online Behavioural Advertising using Homomorphic Encryption

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2018, 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017. Piscataway, NJ: IEEE , p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • An Efficient Privacy-preserving Recommender System for e-Healthcare systems

    Verhaert, D., Nateghizad, M. & Erkin, Z., 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Samarati, P. & Obaisat, M. S. (eds.). SciTePress, Vol. 1: SECRYPT. p. 188-199 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • An Evolutionary View on Reversible Shift-Invariant Transformations

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2020, Genetic Programming - 23rd European Conference, EuroGP 2020, Held as Part of EvoStar 2020, Proceedings. Hu, T., Lourenço, N., Medvet, E. & Divina, F. (eds.). SpringerOpen, p. 118-134 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12101 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum

    Esgin, M. F., Ersoy, O., Kuchta, V., Loss, J., Sakzad, A., Steinfeld, R., Yang, X. & Zhao, R. K., 2023, ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 623-637 15 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Downloads (Pure)
  • An Experience Report on Applying Passive Learning in a Large-Scale Payment Company

    Wieman, R., Finavaro Aniche, M., Lobbezoo, W., Verwer, S. & van Deursen, A., 2017, Proceedings - 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017. Los Alamitos, CA: IEEE , p. 564-573 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    270 Downloads (Pure)
  • Anomaly-Based DNN Model for Intrusion Detection in IoT and Model Explanation: Explainable Artificial Intelligence

    Sharma, B., Sharma, L. & Lal, C., 2023, Proceedings of 2nd International Conference on Computational Electronics for Wireless Communications - ICCWC 2022. Rawat, S., Kumar, S., Kumar, P. & Anguera, J. (eds.). Singapore: Springer, p. 315-324 10 p. (Lecture Notes in Networks and Systems; vol. 554).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    25 Downloads (Pure)
  • Anomaly Based Network Intrusion Detection for IoT Attacks using Convolution Neural Network

    Sharma, B., Sharma, L. & Lal, C., 2022, Proceedings of the 2022 IEEE 7th International conference for Convergence in Technology (I2CT). IEEE , p. 1-6 6 p. 9824229

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    4 Downloads (Pure)
  • A novel approach for data packing: Using trapdoor knapsack

    Nateghizad, M., Erkin, Z. & Lagendijk, R. L., 2019, 2018 IEEE International Workshop on Information Forensics and Security (WIFS). Kumar, A., Yuen, P. C. & Huang, J. (eds.). Piscataway: IEEE , p. 1-6 6 p. 8630769

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Applying Bayesian game theory to analyse cyber risks of bank transaction systems

    Van Der Veeken, P., Van Schooten, S., Shinde, R., Dunnewind, M. & Van Den Berg, J., 2017, Proceedings of International Conference on Computing, Analytics and Security Trends, CAST 2016. IEEE , p. 84-89 6 p. 7914945

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • A Privacy-Preserving GWAS Computation with Homomorphic Encryption

    Ugwuoke, C., Erkin, Z. & Lagendijk, I., 2016, 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux. p. 166-173 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    98 Downloads (Pure)
  • A scalable SIMD RISC-V based processor with customized vector extensions for CRYSTALS-kyber

    Li, H., Mentens, N. & Picek, S., 2022, Proceedings of the 59th ACM/IEEE Design Automation Conference, DAC 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 733-738 6 p. (Proceedings - Design Automation Conference).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    326 Downloads (Pure)
  • A search for additional structure: The case of cryptographic s-boxes

    Carlet, C., Djurasevic, M., Jakobovic, D. & Picek, S., 2020, Parallel Problem Solving from Nature – PPSN XVI. Bäck, T., Preuss, M., Deutz, A., Emmerich, M., Wang, H., Doerr, C. & Trautmann, H. (eds.). Part II ed. Cham: Springer, p. 343-356 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12270 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    21 Downloads (Pure)
  • A Search for Differentially-6 Uniform (n, n-2) Functions

    Picek, S., Knezevic, K., Jakobovic, D. & Carlet, C., 2018, 2018 IEEE Congress on Evolutionary Computation (CEC): Proceedings. Piscataway, NJ: IEEE , p. 1-7 7 p. 8477646

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller

    Uetake, Y., Yoshimoto, K., Kodera, Y., Weissbart, L., Kusaka, T. & Nogami, Y., 2019, Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019. Institute of Electrical and Electronics Engineers (IEEE), p. 225-231 7 p. 8958444

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • AS-level BGP community usage classification

    Krenc, T., Beverly, R. & Smaragdakis, G., 2021, IMC 2021 - Proceedings of the 2021 ACM Internet Measurement Conference. Association for Computing Machinery (ACM), p. 577-592 16 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    30 Downloads (Pure)
  • A Social Cyber Contract Theory Model for Understanding National Cyber Strategies

    Bierens, R., Klievink, B. & van den Berg, J., 2017, Proceedings of International Conference on Electronic Government 2017. Springer, p. 166-176 (Lecture Notes in Computer Science; vol. 10428).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    245 Downloads (Pure)
  • Assessing e-Government DNS Resilience

    Sommese, R., Jonker, M., van der Ham, J. & Moura, G. C. M., 2022, Proceedings of the 2022 18th International Conference of Network and Service Management: Intelligent Management of Disruptive Network Technologies and Services, CNSM 2022. Charalambides, M., Papadimitriou, P., Cerroni, W., Kanhere, S. & Mamatas, L. (eds.). IEEE , p. 118-126 9 p. (Proceedings of the 2022 18th International Conference of Network and Service Management: Intelligent Management of Disruptive Network Technologies and Services, CNSM 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    12 Downloads (Pure)
  • A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage

    Arora, V., Buhan, I., Perin, G. & Picek, S., 2022, Smart Card Research and Advanced Applications - 20th International Conference, CARDIS 2021, Revised Selected Papers. Grosso, V. & Pöppelmann, T. (eds.). Springer, Vol. 13173. p. 80-96 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13173 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    20 Downloads (Pure)
  • Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2

    Tricomi, P. P., Facciolo, L., Apruzzese, G. & Conti, M., 2023, CODASPY 2023 - Proceedings of the 13th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery (ACM), p. 27-38 12 p. (CODASPY 2023 - Proceedings of the 13th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Downloads (Pure)
  • Automatic Feature Construction for Network Intrusion Detection

    Tran, B., Picek, S. & Xue, B., 2017, Simulated Evolution and Learning : 11th International Conference SEAL 2017 Proceedings. Shi, Y., Tan, K. C., Zhang, M., Tang, K., Li, X., Zhang, Q., Tan, Y., Middendorf, M. & Jin, Y. (eds.). Cham: Springer, p. 569-580 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10593 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Auto Semi-supervised Outlier Detection for Malicious Authentication Events

    Kaiafas, G., Hammerschmidt, C., Lagraa, S. & State, R., 2020, Machine Learning and Knowledge Discovery in Databases - International Workshops of ECML PKDD 2019, Proceedings. Cellier, P. & Driessens, K. (eds.). Part II ed. Cham: Springer, p. 176-190 15 p. (Communications in Computer and Information Science; vol. 1168 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • BAdASS: Preserving privacy in behavioural advertising with applied secret sharing

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2018, Provable Security: 12th International Conference, ProvSec 2018 - Proceedings. Baek, J., Susilo, W. & Kim, J. (eds.). Cham: Springer, p. 397-405 9 p. (Lecture Notes in Computer Science; vol. 11192).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks

    Lotto, A., Singh, V., Ramasubramanian, B., Brighente, A., Conti, M. & Poovendran, R., 2023, WiSec 2023 - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery (ACM), p. 133-144 12 p. (WiSec 2023 - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Downloads (Pure)
  • Behavioral Clustering of Non-Stationary IP Flow Record Data

    Hammerschmidt, C., Marchal, S., State, R. & Verwer, S., Nov 2016, 12th International Conference on Network and Service Management CNSM 2016. Piscataway, NJ: IEEE , p. 253-257 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    10 Citations (Scopus)
  • Big enough to care not enough to scare! crawling to attack recommender systems

    Aiolli, F., Conti, M., Picek, S. & Polato, M., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer, p. 165-184 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Black-box mixed-variable optimisation using a surrogate model that satisfies integer constraints

    Bliek, L., Guijt, A., Verwer, S. & De Weerdt, M., 2021, GECCO 2021 Companion - Proceedings of the 2021 Genetic and Evolutionary Computation Conference Companion. Association for Computing Machinery (ACM), p. 1851-1859 9 p. (GECCO 2021 Companion - Proceedings of the 2021 Genetic and Evolutionary Computation Conference Companion).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    75 Downloads (Pure)
  • C3PO: Cipher Construction with Cartesian genetic PrOgramming

    Picek, S., Knezevic, K., Jakobovic, D. & Derek, A., 2019, GECCO'19 : Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion. López-Ibáñez, M. (ed.). New York: Association for Computing Machinery (ACM), p. 1625-1633 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

    Koffas, S., Xu, J., Conti, M. & Picek, S., 2022, WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning. Association for Computing Machinery (ACM), p. 57-62 6 p. (WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    88 Downloads (Pure)
  • Car-following Behavior Model Learning Using Timed Automata

    Zhang, Y., Lin, Q., Wang, J. & Verwer, S., Jul 2017, IFAC-PapersOnLine. Dochain, D., Henrion, D. & Peaucelle, D. (eds.). Elsevier, p. 2353-2358 6 p. (IFAC-PapersOnLine; vol. 50, no. 1).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    10 Citations (Scopus)
    55 Downloads (Pure)
  • Challenges in deep learning-based profiled side-channel analysis

    Picek, S., 1 Jan 2019, Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Proceedings. Bhasin, S., Mendelson, A. & Nandi, M. (eds.). Springer, Vol. 11947. p. 9-12 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11947 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Clustering Payloads: Grouping Randomized Scan Probes Into Campaign Templates

    Ghiette, V. & Dörr, C., 2022, Proceedings of the 2022 IFIP Networking Conference (IFIP Networking). IEEE , p. 1-9 9 p. 9829757. (2022 IFIP Networking Conference, IFIP Networking 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    16 Downloads (Pure)
  • CoInGP: Convolutional inpainting with genetic programming

    Jakobovic, D., Manzoni, L., Mariot, L., Picek, S. & Castelli, M., 2021, GECCO 2021 : Proceedings of the 2021 Genetic and Evolutionary Computation Conference. Chicano, F. & Krawiec, K. (eds.). New York: Association for Computing Machinery (ACM), p. 795-803 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Combining ID’s, Attributes, and Policies in Hyperledger Fabric

    Gordijn, D., Kromes, R., Giannetsos, T. & Liang, K., 2023, Blockchain Technology and Emerging Technologies - 2nd EAI International Conference, BlockTEA 2022, Proceedings. Meng, W. & Li, W. (eds.). Springer, p. 32-48 17 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 498 LNICST).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    20 Downloads (Pure)
  • Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers

    Vos, J., Erkin, Z. & Dörr, C., 2021, 2021 IEEE International Workshop on Information Forensics and Security, WIFS 2021: Proceedings. IEEE , p. 44-49 6 p. 9648381. (2021 IEEE International Workshop on Information Forensics and Security, WIFS 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    19 Downloads (Pure)
  • Continuous Surrogate-Based Optimization Algorithms Are Well-Suited for Expensive Discrete Problems

    Karlsson, R., Bliek, L., Verwer, S. & de Weerdt, M., 2021, Artificial Intelligence and Machine Learning - 32nd Benelux Conference, BNAIC/Benelearn 2020, Revised Selected Papers. Baratchi, M., Cao, L., Kosters, W. A., Lijffijt, J., van Rijn, J. N. & Takes, F. W. (eds.). Springer, p. 48-63 16 p. (Communications in Computer and Information Science; vol. 1398 CCIS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    89 Downloads (Pure)
  • Counterfighting Counterfeit: Detecting and Taking down Fraudulent Webshops at a ccTLD

    Wabeke, T., Moura, G. C. M., Franken, N. & Hesselman, C., 2020, Passive and Active Measurement : 21st International Conference, PAM 2020, Proceedings. Sperotto, A., Dainotti, A. & Stiller, B. (eds.). SpringerOpen, Vol. 12048. p. 158-174 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12048 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Crack me if you can: Hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: A Survey

    Khairallah, M., Najm, Z., Chattopadhyay, A. & Peyrin, T., 2018, Proceedings - 2018 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation, SAMOS 2018. Mudge, T. & Pnevmatikatos, D. N. (eds.). Association for Computing Machinery (ACM), p. 167-172 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)