Filter
Conference contribution

Search results

  • Fingerprinting tooling used for SSH compromisation attempts

    Ghiëtte, V., Griffioen, H. & Doerr, C., 2019, RAID 2019 Proceedings : 22nd International Symposium on Research in Attacks, Intrusions and Defenses. USENIX Association, p. 61-71 11 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    50 Downloads (Pure)
  • Fitness landscape analysis of dimensionally-aware genetic programming featuring feynman equations

    Ðurasević, M., Jakobovic, D., Martins, M. S. R., Picek, S. & Wagner, M., 2020, Parallel Problem Solving from Nature – PPSN XVI. Bäck, T., Preuss, M., Deutz, A., Emmerich, M., Wang, H., Doerr, C. & Trautmann, H. (eds.). Part II ed. Cham: Springer, p. 111-124 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12270 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    31 Downloads (Pure)
  • FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning

    Li, H., Rieger, P., Zeitouni, S., Picek, S. & Sadeghi, A. R., 2023, Proceedings of the 2023 33rd International Conference on Field-Programmable Logic and Applications (FPL). O’Conner, L. (ed.). Piscataway: IEEE, p. 271-276 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • flexfringe: A Passive Automaton Learning Package

    Verwer, S. & Hammerschmidt, C. A., 2017, 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017. O'Conner, L. (ed.). Piscataway: IEEE, p. 638-642 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    22 Citations (Scopus)
  • Flexible State-Merging for learning (P)DFAs in Python

    Hammerschmidt, C., Loos, B., State, R., Engel, T. & Verwer, S., 2016, Proceedings of The 13th International Conference on Grammatical Inference: The JMLR Workshop and Conference, The Sequence PredictIction ChallengE (SPiCe). Verwer, S., van Zaanen, M. & Smetsers, R. (eds.). JMLR, Vol. 57. p. 154-159 6 p. (JMLR: Workshop and Conference Proceedings).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis

    Kerkhof, M., Wu, L., Perin, G. & Picek, S., 2022, Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Proceedings. Balasch, J. & O’Flynn, C. (eds.). Springer, Vol. 13211. p. 29-48 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13211 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    70 Downloads (Pure)
  • For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection

    Cardaioli, M., Conti, M. & Ravindranath, A., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 595-613 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13556 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    21 Downloads (Pure)
  • From Hodl to Heist: Analysis of Cyber Security Threats to Bitcoin Exchanges

    Oosthoek, K. & Doerr, C., 2020, 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, p. 1-9 9 p. 9169412

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    15 Citations (Scopus)
  • Genetic Algorithm-Based Electromagnetic Fault Injection

    Maldini, A., Samwel, N., Picek, S. & Batina, L., 2018, 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography FDTC : Proceedings. Guerrero, J. E. (ed.). Piscataway, NJ: IEEE, p. 35-42 8 p. 8573932

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    16 Citations (Scopus)
  • Get Me Out of This Payment! Bailout: An HTLC Re-routing Protocol

    Ersoy, O., Moreno-Sanchez, P. & Roos, S., 2024, Financial Cryptography and Data Security - 27th International Conference, FC 2023, Revised Selected Papers. Baldimtsi, F. & Cachin, C. (eds.). Springer, p. 92-109 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13951).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks

    Agiollo, A., Bardhi, E., Conti, M., Lazzeretti, R., Losiouk, E. & Omicini, A., 2023, Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023. Institute of Electrical and Electronics Engineers (IEEE), p. 615-630 16 p. (Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    10 Downloads (Pure)
  • Going in Style: Audio Backdoors Through Stylistic Transformations

    Koffas, S., Pajola, L., Picek, S. & Conti, M., 2023, Proceedings of the ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    30 Downloads (Pure)
  • Graph Encryption for Shortest Path Queries with k Unsorted Nodes

    Li, M., Gao, J., Zhang, Z., Fu, C., Lal, C. & Conti, M., 2022, Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 89-96 8 p. (Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Downloads (Pure)
  • Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand

    Cardaioli, M., Cecconello, S., Conti, M., Milani, S., Picek, S. & Saraci, E., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 1687-1704 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    36 Downloads (Pure)
  • HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs

    Xu, P., Zhang, Y., Eckert, C. & Zarras, A., 2021, Artificial Neural Networks and Machine Learning – ICANN 2021 : 30th International Conference on Artificial Neural Networks, Proceedings. Farkaš, I., Masulli, P., Otte, S. & Wermter, S. (eds.). Cham: Springer, Vol. 12893. p. 127-138 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12893 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • HeadPrint: Detecting anomalous communications through header-based application fingerprinting

    Bortolameotti, R., Van Ede, T., Continella, A., Hupperich, T., Everts, M. H., Rafati, R., Jonker, W., Hartel, P. & Peter, A., 2020, SAC 2020: Proceedings of the 35th Annual ACM Symposium on Applied Computing. Association for Computing Machinery (ACM), p. 1696-1705 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    51 Downloads (Pure)
  • Higher order side-channel attack resilient S-boxes

    Lerman, L., Veshchikov, N., Picek, S. & Markowitch, O., 2018, 2018 ACM International Conference on Computing Frontiers, CF 2018 - Proceedings. Kaeli, D. R. & Pericàs, M. (eds.). New York: Association for Computing Machinery (ACM), p. 336-341 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Hip to Be (Latin) Square: Maximal Period Sequences from Orthogonal Cellular Automata

    Mariot, L., 2021, 2021 Ninth International Symposium on Computing and Networking (CANDAR): Proceedings. Bilof, R. (ed.). Piscataway: IEEE, p. 29-37 9 p. 9643876

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • How Effective is Anti-Phishing Training for Children?

    Lastdrager, E., Carvajal Gallardo, I., Hartel, P. & Junger, M., 2017, Proceedings of the thirteenth Symposium on Usable Privacy and Security, SOUPS 2017. Berkely, CA: USENIX Association, p. 229-239 11 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    75 Downloads (Pure)
  • How Media Reports Trigger Copycats: An Analysis of the Brewing of the Largest Packet Storm to Date

    Ghiette, V. & Doerr, C., 2018, WTMC'18 : Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity. New York, NY: Association for Computing Machinery (ACM), p. 8-13 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • How to Operate a Meta-Telescope in your Spare Time

    Wagner, D., Ranadive, S. A., Griffioen, H., Kallitsis, M., Dainotti, A., Smaragdakis, G. & Feldmann, A., 2023, Proceedings of the 2023 ACM on Internet Measurement Conference. p. 328-343 16 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    144 Downloads (Pure)
  • How to profit from payments channels

    Ersoy, O., Roos, S. & Erkin, Z., 2020, Proceedings of the 24th Financial Cryptography and Data Security, Kota Kinabalu, Sabah, Malaysia. Bonneau, J. & Heninger, N. (eds.). Cham: Springer, Vol. 12059. p. 284-303 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12059 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    File
    15 Citations (Scopus)
    135 Downloads (Pure)
  • Hybrid connection and host clustering for community detection in spatial-temporal network data

    Roeling, M. P., Nadeem, A. & Verwer, S. E., 2020, ECML PKDD 2020 Workshops - Workshops of the European Conference on Machine Learning and Knowledge Discovery in Databases ECML PKDD 2020: SoGood 2020, PDFL 2020, MLCS 2020, NFMCP 2020, DINA 2020, EDML 2020, XKDD 2020 and INRA 2020, Proceedings. Koprinska, I., Appice, A., Antonie, L., Guidotti, R., Ribeiro, R. P., Gama, J., Krishnamurthy, Y., Malerba, D., Ceci, M., Masciari, E., Christen, P., Schubert, E., Monreale, M., Rinzivillo, S., Lommatzsch, A., Kamp, M., Loglisci, C., Zimmermann, A., Özgöbek, Ö., Gavaldà, R., Adilova, L., Ferreira, P. M., Medeiros, I., Manco, G., Ras, Z. W., Ntoutsi, E., Zimek, A., Biecek, P., Kille, B. & Gulla, J. A. (eds.). Vol. 1323. p. 178-204 27 p. (Communications in Computer and Information Science; vol. 1323).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    118 Downloads (Pure)
  • Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic

    Norouzian, M. R., Xu, P., Eckert, C. & Zarras, A., 2021, Information Security - 24th International Conference, ISC 2021, Proceedings. Liu, J. K., Katsikas, S., Meng, W., Susilo, W. & Intan, R. (eds.). Springer, p. 259-278 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13118 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Hyper-bent Boolean Functions and Evolutionary Algorithms

    Mariot, L., Jakobovic, D., Leporati, A. & Picek, S., 2019, Genetic Programming : 22nd European Conference, EuroGP 2019, Held as Part of EvoStar 2019, Proceedings. Sekanina, L., Hu, T., Richter, H., García-Sánchez, P. & Lourenço, N. (eds.). Cham: Springer, p. 262-277 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11451 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • ID-Based Self-encryption via Hyperledger Fabric Based Smart Contract

    Grishkov, I., Kromes, R., Giannetsos, T. & Liang, K., 2023, Blockchain Technology and Emerging Technologies - 2nd EAI International Conference, BlockTEA 2022, Proceedings. Meng, W. & Li, W. (eds.). Springer, p. 3-18 16 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 498 LNICST).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    12 Downloads (Pure)
  • If You Can't Measure It, You Can't Improve It: Moving Target Defense Metrics

    Picek, S., Hemberg, E. & O'Reilly, U-M., 2017, MTD'17 Proceedings of the 2017 Workshop on Moving Target Defense . New York, NY: Association for Computing Machinery (ACM), p. 115-118 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Illuminating Router Vendor Diversity Within Providers and Along Network Paths

    Albakour, T., Gasser, O., Beverly, R. & Smaragdakis, G., 2023, Proceedings of the 2023 ACM on Internet Measurement Conference. p. 89-103 15 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    17 Downloads (Pure)
  • Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction

    Cheng, H., Li, W., Wang, P. & Liang, K., 2021, ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, p. 2690-2694 5 p. 9414886

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Improved Wordpcfg for Passwords with Maximum Probability Segmentation

    Li, W., Yang, J., Cheng, H., Wang, P. & Liang, K., 2023, Proceedings of the ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    20 Downloads (Pure)
  • Improving Side-Channel Analysis Through Semi-Supervised Learning

    Picek, S., Heuser, A., Jovic, A., Knezevic, K. & Richmond, T., 2019, Smart Card Research and Advanced Applications : 17th International Conference, CARDIS 2018, Revised Selected Papers. Bilgin, B. & Fischer, J-B. (eds.). Cham: Springer, Vol. 11389. p. 35-50 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11389).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Improving the Resiliency of Decentralized Crowdsourced Blockchain Oracles

    Blanco, A. F., Shi, Z., Roy, D. & Zhao, Z., 2023, Computational Science – ICCS 2023 - 23rd International Conference, Proceedings. Mikyška, J., de Mulatier, C., Krzhizhanovskaya, V. V., Sloot, P. M. A., Paszynski, M. & Dongarra, J. J. (eds.). Springer, p. 3-17 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14073 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    12 Downloads (Pure)
  • Inadvertently making cyber criminals rich: A comprehensive study of cryptojacking campaigns at internet scale

    Bijmans, H. L. J., Booij, T. M. & Doerr, C., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1627-1644 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    37 Citations (Scopus)
    314 Downloads (Pure)
  • Incrementally updateable honey password vaults

    Cheng, H., Li, W., Wang, P., Chu, C. H. & Liang, K., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 857-874 18 p. (Proceedings of the 30th USENIX Security Symposium).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Inside the Matrix: CTI Frameworks as Partial Abstractions of Complex Threats

    Oosthoek, K. & Doerr, C., 2021, 2021 IEEE International Conference on Big Data (Big Data): Proceedings. Piscataway: IEEE, p. 2136-2143 8 p. 9671425

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    150 Downloads (Pure)
  • Intercept and Inject: DNS Response Manipulation in the Wild

    Nosyk, Y., Lone, Q., Zhauniarovich, Y., Gañán, C. H., Aben, E., Moura, G. C. M., Tajalizadehkhoob, S., Duda, A. & Korczyński, M., 2023, Passive and Active Measurement - 24th International Conference, PAM 2023, Proceedings. Brunstrom, A., Flores, M. & Fiore, M. (eds.). Springer, p. 461-478 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13882 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    602 Downloads (Pure)
  • Just the tip of the iceberg: Internet-scale exploitation of routers for cryptojacking

    Bijmans, H. L. J., Booij, T. M. & Doerr, C., 2019, CCS'19 Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 449-464 16 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    24 Citations (Scopus)
  • Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled Side-Channel Analysis

    Valk, D., Picek, S. & Bhasin, S., 2021, Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, COSADE 2020, Revised Selected Papers. Bertoni, G. M. & Regazzoni, F. (eds.). Springer, Vol. 12244. p. 175-199 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12244 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Label-Only Membership Inference Attack against \\Node-Level Graph Neural Networks

    Conti, M., Li, J., Picek, S. & Xu, J., 2022, AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022. Association for Computing Machinery (ACM), p. 1–12 12 p. (AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    44 Downloads (Pure)
  • Large scale outage visibility on the control plane

    Becker, L., Hohlfeld, O. & Smaragdakis, G., 2021, CoNEXT-SW 2021 - Proceedings of the 2021 CoNEXT Student Workshop 2021 - Part of CoNEXT 2021 the 17th International Conference on emerging Networking EXperiments and Technologies. Association for Computing Machinery (ACM), p. 13-14 2 p. (CoNEXT-SW 2021 - Proceedings of the 2021 CoNEXT Student Workshop 2021 - Part of CoNEXT 2021 the 17th International Conference on emerging Networking EXperiments and Technologies).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    29 Downloads (Pure)
  • Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems

    Luchs, M. & Doerr, C., 2017, Detection of Intrusions and Malware, and Vulnerability Assessment DIMVA 2017: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Polychronakis, M. & Meier, M. (eds.). Cham: Springer, p. 141-160 20 p. (Lecture Notes in Computer Science; vol. 10327).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Latin Hypercubes and Cellular Automata

    Gadouleau, M. & Mariot, L., 2020, Cellular Automata and Discrete Complex Systems : 26th IFIP WG 1.5 International Workshop, AUTOMATA 2020, Proceedings. Zenil, H. (ed.). Cham: Springer, p. 139-151 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12286 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Learning Algorithms for Digital Reconstruction of Van Gogh’s Drawings

    Zeng, Y., Tang, J., van der Lubbe, J. & Loog, M., 2016, EuroMed 2016 - 6th International Conference - Proceedings: Digital Heritage - Progress in Cultural Heritage: Documentation, Preservation, and Protection. Ioannides, M., Vink, E., Moropoulou, A., Hagedorn-Saupe, M., Fresa, A., Liestøl, G., Rajcic, V. & Grussenmeyer, P. (eds.). Cham: Springer, Vol. 1. p. 322-333 12 p. (Lecture Notes in Computer Science; vol. 10058).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Learning behavioral fingerprints from Netflows using Timed Automata

    Pellegrino, N., Lin, Q., Hammerschmidt, C. & Verwer, S., 24 Jul 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Chemouil, P., Monteiro, E., Charalambides, M., Madeira, E., Simoes, P., Secci, S., Gaspary, L. P. & dos Santos, C. R. P. (eds.). IEEE, p. 308-316 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Learning Complex Uncertain States Changes via Asymmetric Hidden Markov Models: An Industrial Case

    Bueno, M. L. P., Hommersom, A., Lucas, P. J. F., Verwer, S. & Linard, A., 2016, Proceedings of the Eighth International Conference on Probabilistic Graphical Models : The JMLR Workshop and Conference PGM 2016. Antonucci, A., Corani, G. & de Campos, C. P. (eds.). JMLR, Vol. 52. p. 50-61 12 p. (JMLR: Workshop and Conference Proceedings).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Learning Decision Trees with Flexible Constraints and Objectives Using Integer Optimization

    Verwer, S. & Zhang, Y., 2017, Integration of AI and OR Techniques in Constraint Programming: CPAIOR 2017. Salvagnin, D. & Lombardi, M. (eds.). Cham: Springer, p. 94-103 10 p. (Lecture Notes in Computer Science; vol. 10335).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    39 Citations (Scopus)
    364 Downloads (Pure)
  • Learning Deterministic Finite Automata from Innite Alphabets

    Pellegrino, N., Hammerschmidt, C., Verwer, S. & Lin, Q., 2016, Proceedings of The 13th International Conference on Grammatical Inference: The JMLR Workshop and Conference, The Sequence PredictIction ChallengE (SPiCe). Verwer, S., van Zaanen, M. & Smetsers, R. (eds.). JMLR, Vol. 57. p. 69-72 5 p. (JMLR: Workshop and Conference Proceedings).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Learning From A Big Brother: Mimicking Neural Networks in Profiled Side-channel Analysis

    van der Valk, D., Krcek, M., Picek, S. & Bhasin, S., 2020, 2020 57th ACM/IEEE Design Automation Conference, DAC 2020. Piscataway: IEEE, p. 1-6 6 p. 9218520. (Proceedings - Design Automation Conference; vol. 2020-July).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Learning fuzzy decision trees using integer programming

    Rhuggenaath, J. S., Zhang, Y., Akcay, A., Kaymak, U. & Verwer, S., 1 Feb 2018, 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). Piscataway: IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Learning optimal classification trees using a binary linear program formulation

    Verwer, S. & Zhang, Y., 2019, Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence . Palo ALto: Association for the Advancement of Artificial Intelligence (AAAI), Vol. 33. p. 1625-1632 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    21 Downloads (Pure)