Filter
Conference contribution

Search results

  • 2022

    Deep Dive into the IoT Backend Ecosystem

    Saidi, S. J., Matic, S., Gasser, O., Smaragdakis, G. & Feldmann, A., 2022, Proceedings of the 22nd ACM Internet Measurement Conference. New York, NY, USA: Association for Computing Machinery (ACM), p. 488–503 16 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    49 Downloads (Pure)
  • Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds

    Swaminathan, S., Chmielewski, Ł., Perin, G. & Picek, S., 2022, Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings. Zhou, J., Chattopadhyay, S., Adepu, S., Alcaraz, C., Batina, L., Casalicchio, E., Jin, C., Lin, J., Losiouk, E., Majumdar, S., Meng, W., Picek, S., Zhauniarovich, Y., Shao, J., Su, C., Wang, C. & Zonouz, S. (eds.). Cham: Springer, p. 165-182 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13285 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    39 Downloads (Pure)
  • Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher

    Băcuieți, N., Batina, L. & Picek, S., 2022, Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings. Ateniese, G. & Venturi, D. (eds.). Springer, p. 809-829 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13269 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    28 Downloads (Pure)
  • DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints

    Zhao, Z., Chen, X., Xuan, Y., Dong, Y., Wang, D. & Liang, K., 2022, Proceedings of the 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, p. 15192-15201 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    21 Citations (Scopus)
    26 Downloads (Pure)
  • DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay

    Zheng, Y., Xu, P., Wang, W., Chen, T., Susilo, W., Liang, K. & Jin, H., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 86-104 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13555 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    19 Downloads (Pure)
  • Do Bayesian Variational Autoencoders Know What They Don't Know?

    Glazunov, M. & Zarras, A., 2022, Proceedings of the 38th Conference on Uncertainty in Artificial Intelligence, UAI 2022. Association For Uncertainty in Artificial Intelligence (AUAI), p. 718-727 10 p. (Proceedings of the 38th Conference on Uncertainty in Artificial Intelligence, UAI 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    15 Downloads (Pure)
  • Dynamic Backdoors with Global Average Pooling

    Koffas, S., Picek, S. & Conti, M., 2022, Proceedings of the 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS). Danvers: IEEE, p. 320-323 4 p. 9869920. (Proceeding - IEEE International Conference on Artificial Intelligence Circuits and Systems, AICAS 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    17 Downloads (Pure)
  • Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts

    Vos, J., Vos, D. & Erkin, Z., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 408-423 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    28 Downloads (Pure)
  • Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices

    Mukhtar, N., Batina, L., Picek, S. & Kong, Y., 2022, Topics in Cryptology - CT-RSA 2022 : Cryptographers’ Track at the RSA Conference, 2022, Proceedings. Galbraith, S. D. (ed.). Cham: Springer, p. 297-321 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13161 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    54 Downloads (Pure)
  • Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis

    Kerkhof, M., Wu, L., Perin, G. & Picek, S., 2022, Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Proceedings. Balasch, J. & O’Flynn, C. (eds.). Springer, Vol. 13211. p. 29-48 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13211 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    69 Downloads (Pure)
  • For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection

    Cardaioli, M., Conti, M. & Ravindranath, A., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 595-613 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13556 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    21 Downloads (Pure)
  • Graph Encryption for Shortest Path Queries with k Unsorted Nodes

    Li, M., Gao, J., Zhang, Z., Fu, C., Lal, C. & Conti, M., 2022, Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 89-96 8 p. (Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Downloads (Pure)
  • Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand

    Cardaioli, M., Cecconello, S., Conti, M., Milani, S., Picek, S. & Saraci, E., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 1687-1704 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    35 Downloads (Pure)
  • Label-Only Membership Inference Attack against \\Node-Level Graph Neural Networks

    Conti, M., Li, J., Picek, S. & Xu, J., 2022, AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022. Association for Computing Machinery (ACM), p. 1–12 12 p. (AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    43 Downloads (Pure)
  • Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster

    Cao, C., Blaise, A., Verwer, S. & Rebecchi, F., 2022, Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022. Association for Computing Machinery (ACM), 9 p. 117. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    60 Downloads (Pure)
  • Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption

    Wang, X., Cao, Z., Liu, Z. & Liang, K., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 105-125 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13555 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    15 Downloads (Pure)
  • LogoMotive: Detecting Logos on Websites to Identify Online Scams - A TLD Case Study

    van den Hout, T., Wabeke, T., Moura, G. C. M. & Hesselman, C., 2022, Passive and Active Measurement - 23rd International Conference, PAM 2022, Proceedings. Hohlfeld, O., Moura, G. & Pelsser, C. (eds.). Springer, p. 3-29 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13210 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    11 Downloads (Pure)
  • Measuring Web Cookies in Governmental Websites

    Gotze, M., Matic, S., Iordanou, C., Smaragdakis, G. & Laoutaris, N., 2022, WebSci 2022 - Proceedings of the 14th ACM Web Science Conference. Association for Computing Machinery (ACM), p. 44-54 11 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    71 Downloads (Pure)
  • More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks

    Xu, J., Wang, R., Koffas, S., Liang, K. & Picek, S., 2022, Proceedings - 38th Annual Computer Security Applications Conference, ACSAC 2022. Association for Computing Machinery (ACM), p. 684–698 15 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    40 Downloads (Pure)
  • No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent

    Chen, H., Fu, S. & Liang, K., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Part 1 ed. Cham: Springer, p. 387-407 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    14 Downloads (Pure)
  • Old but Gold: Prospecting TCP to Engineer and Live Monitor DNS Anycast

    Moura, G. C. M., Heidemann, J., Hardaker, W., Charnsethikul, P., Bulten, J., Ceron, J. M. & Hesselman, C., 2022, Passive and Active Measurement - 23rd International Conference, PAM 2022, Proceedings. Hohlfeld, O., Moura, G. & Pelsser, C. (eds.). Springer, p. 264-292 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13210 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    25 Downloads (Pure)
  • On the Effect of Clock Frequency on Voltage and Electromagnetic Fault Injection

    Koffas, S. & Vadnala, P. K., 2022, Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings. Zhou, J., Chattopadhyay, S., Adepu, S., Alcaraz, C., Batina, L., Casalicchio, E., Jin, C., Lin, J., Losiouk, E., Majumdar, S., Meng, W., Picek, S., Zhauniarovich, Y., Shao, J., Su, C., Wang, C. & Zonouz, S. (eds.). Cham: Springer, p. 127-145 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13285 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    8 Downloads (Pure)
  • On the Evaluation of Deep Learning-Based Side-Channel Analysis

    Wu, L., Perin, G. & Picek, S., 2022, Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Proceedings. Balasch, J. & O’Flynn, C. (eds.). Springer, p. 49-71 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13211 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    65 Downloads (Pure)
  • Passtrans: An Improved Password Reuse Model Based on Transformer

    He, X., Cheng, H., Xie, J., Wang, P. & Liang, K., 2022, Proceedings of the ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, p. 3044-3048 5 p. 9746731

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    44 Downloads (Pure)
  • Poster: Clean-label Backdoor Attack on Graph Neural Networks

    Xu, J. & Picek, S., 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 3491-3493 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    238 Downloads (Pure)
  • PRIDE: A Privacy-Preserving Decentralised Key Management System

    Kester, D., Li, T. & Erkin, Z., 2022, Proceedings of the 2022 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    21 Downloads (Pure)
  • Privacy-Friendly De-Authentication with BLUFADE: Blurred Face Detection

    Cardaioli, M., Conti, M., Tricomi, P. P. & Tsudik, G., 2022, 2022 IEEE International Conference on Pervasive Computing and Communications, PerCom 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 197-206 10 p. (2022 IEEE International Conference on Pervasive Computing and Communications, PerCom 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    525 Downloads (Pure)
  • Profiled Side-Channel Analysis in the Efficient Attacker Framework

    Picek, S., Heuser, A., Perin, G. & Guilley, S., 2022, Smart Card Research and Advanced Applications : 20th International Conference, CARDIS 2021, Revised Selected Papers. Grosso, V. & Pöppelmann, T. (eds.). Cham: Springer, Vol. 13173. p. 44-63 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13173 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    23 Downloads (Pure)
  • Red Light/Green Light: A Lightweight Algorithm for, Possibly, Fraudulent Online Behavior Change Detection

    Herrera Semenets, V., Hernández-León, R., Bustio-Martínez, L. & van den Berg, J., 2022, Advances in Computational Intelligence 21st Mexican International Conference on Artificial Intelligence, MICAI 2022, Monterrey, Mexico, October 24–29, 2022, Proceedings, Part II. Pichardo Laguna, O., Martínez-Miranda, J. & Martínez Seis, B. (eds.). Springer, p. 316-327 12 p. (Lecture Notes in Computer Science; no. 13613).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    16 Downloads (Pure)
  • Reinforcement Learning-Based Design of Side-Channel Countermeasures

    Rijsdijk, J., Wu, L. & Perin, G., 2022, Security, Privacy, and Applied Cryptography Engineering : 11th International Conference, SPACE 2021, Proceedings. Batina, L., Picek, S., Picek, S. & Mondal, M. (eds.). 1 ed. Cham: Springer, p. 168-187 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13162 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    39 Downloads (Pure)
  • Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud

    Li, M., Zhang, M., Gao, J., Lal, C., Conti, M. & Alazab, M., 2022, Information and Communications Security - 24th International Conference, ICICS 2022, Proceedings. Alcaraz, C., Chen, L., Li, S. & Samarati, P. (eds.). Springer, p. 261-280 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13407 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    68 Downloads (Pure)
  • SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

    Apruzzese, G., Conti, M. & Yuan, Y., 2022, Proceedings - 38th Annual Computer Security Applications Conference, ACSAC 2022. Association for Computing Machinery (ACM), p. 171-185 15 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    79 Downloads (Pure)
  • The More You Know: Improving Laser Fault Injection with Prior Knowledge

    Krcek, M., Ordas, T., Fronte, D. & Picek, S., 2022, Proceedings of the 2022 Workshop on Fault Detection and Tolerance in Cryptography (FDTC). Trinh, L. (ed.). Piscataway: IEEE, p. 18-29 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    13 Downloads (Pure)
  • To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA

    Rezaeezade, A., Perin, G. & Picek, S., 2022, Progress in Cryptology - AFRICACRYPT 2022 - 13th International Conference on Cryptology in Africa, AFRICACRYPT 2022, Proceedings. Batina, L. & Daemen, J. (eds.). Springer, p. 397-421 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13503 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    21 Downloads (Pure)
  • Upside Down: Exploring the Ecosystem of Dark Web Data Markets

    Covrig, B., Mikelarena, E. B., Rosca, C., Goanta, C., Spanakis, G. & Zarras, A., 2022, ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Proceedings. Meng, W., Fischer-Hübner, S. & Jensen, C. D. (eds.). Springer, p. 489-506 18 p. (IFIP Advances in Information and Communication Technology; vol. 648 IFIP).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    18 Downloads (Pure)
  • VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents

    Lambregts, S., Chen, H., Ning, J. & Liang, K., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Cham: Springer, p. 653-676 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    13 Downloads (Pure)
  • What Do You See? Transforming Fault Injection Target Characterizations

    Krček, M., 2022, Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Proceedings. Batina, L., Picek, S. & Mondal, M. (eds.). Springer, p. 165-184 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13783 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    17 Downloads (Pure)
  • WordMarkov: A New Password Probability Model of Semantics

    Xie, J., Cheng, H., Zhu, R., Wang, P. & Liang, K., 2022, Proceedings of the ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, p. 3034-3038 5 p. 9746203

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    15 Downloads (Pure)
  • 2021

    AS-level BGP community usage classification

    Krenc, T., Beverly, R. & Smaragdakis, G., 2021, IMC 2021 - Proceedings of the 2021 ACM Internet Measurement Conference. Association for Computing Machinery (ACM), p. 577-592 16 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    32 Downloads (Pure)
  • Black-box mixed-variable optimisation using a surrogate model that satisfies integer constraints

    Bliek, L., Guijt, A., Verwer, S. & De Weerdt, M., 2021, GECCO 2021 Companion - Proceedings of the 2021 Genetic and Evolutionary Computation Conference Companion. Association for Computing Machinery (ACM), p. 1851-1859 9 p. (GECCO 2021 Companion - Proceedings of the 2021 Genetic and Evolutionary Computation Conference Companion).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    85 Downloads (Pure)
  • CoInGP: Convolutional inpainting with genetic programming

    Jakobovic, D., Manzoni, L., Mariot, L., Picek, S. & Castelli, M., 2021, GECCO 2021 : Proceedings of the 2021 Genetic and Evolutionary Computation Conference. Chicano, F. & Krawiec, K. (eds.). New York: Association for Computing Machinery (ACM), p. 795-803 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers

    Vos, J., Erkin, Z. & Dörr, C., 2021, 2021 IEEE International Workshop on Information Forensics and Security, WIFS 2021: Proceedings. IEEE, p. 44-49 6 p. 9648381. (2021 IEEE International Workshop on Information Forensics and Security, WIFS 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    22 Downloads (Pure)
  • Continuous Surrogate-Based Optimization Algorithms Are Well-Suited for Expensive Discrete Problems

    Karlsson, R., Bliek, L., Verwer, S. & de Weerdt, M., 2021, Artificial Intelligence and Machine Learning - 32nd Benelux Conference, BNAIC/Benelearn 2020, Revised Selected Papers. Baratchi, M., Cao, L., Kosters, W. A., Lijffijt, J., van Rijn, J. N. & Takes, F. W. (eds.). Springer, p. 48-63 16 p. (Communications in Computer and Information Science; vol. 1398 CCIS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    93 Downloads (Pure)
  • Detecting and categorizing Android malware with graph neural networks

    Xu, P., Eckert, C. & Zarras, A., 2021, Proceedings of the 36th Annual ACM Symposium on Applied Computing, SAC 2021. Association for Computing Machinery (ACM), p. 409-412 4 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    15 Citations (Scopus)
  • Efficient joint random number generation for secure multi-party computation

    Hoogerwerf, E., van Tetering, D., Bay, A. & Erkin, Z., 2021, Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021. di Vimercati, S. D. C. & Samarati, P. (eds.). SciTePress, p. 436-443 8 p. (Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Efficient Training of Robust Decision Trees Against Adversarial Examples

    Vos, D. A. & Verwer, S. E., 2021, BNAIC/BeneLearn 2021: 33rd Benelux Conference on Artificial Intelligence and 30th Belgian-Dutch Conference on Machine Learning. Leiva, E. L. A., Pruski, C., Markovich, R., Najjar, A. & Schommer, C. (eds.). p. 702-703

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    44 Downloads (Pure)
  • Enabling Visual Analytics via Alert-driven Attack Graphs

    Nadeem, A., Verwer, S. E., Moskal, S. & Yang, S. J., 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 2420-2422 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    129 Downloads (Pure)
  • Evolutionary algorithms-assisted construction of cryptographic boolean functions

    Carlet, C., Jakobovic, D. & Picek, S., 2021, GECCO 2021 - Proceedings of the 2021 Genetic and Evolutionary Computation Conference. Association for Computing Machinery (ACM), p. 565-573 9 p. (GECCO 2021 - Proceedings of the 2021 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    95 Downloads (Pure)
  • Explainability-based Backdoor Attacks against Graph Neural Networks

    Xu, J., Xue, M. & Picek, S., 2021, WiseML 2021 : Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning. New York: Association for Computing Machinery (ACM), p. 31-36 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    18 Citations (Scopus)
    191 Downloads (Pure)
  • Exploring Semi-bent Boolean Functions Arising from Cellular Automata

    Mariot, L., Saletta, M., Leporati, A. & Manzoni, L., 2021, Cellular Automata : 14th International Conference on Cellular Automata for Research and Industry, ACRI 2020, Proceedings. Gwizdałła, T. M., Manzoni, L., Sirakoulis, G. C., Bandini, S. & Podlaski, K. (eds.). Cham: Springer, p. 56-66 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12599 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)