Search results

  • 2017

    Automatic Feature Construction for Network Intrusion Detection

    Tran, B., Picek, S. & Xue, B., 2017, Simulated Evolution and Learning : 11th International Conference SEAL 2017 Proceedings. Shi, Y., Tan, K. C., Zhang, M., Tang, K., Li, X., Zhang, Q., Tan, Y., Middendorf, M. & Jin, Y. (eds.). Cham: Springer, p. 569-580 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10593 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Evolutionary algorithms for the design of orthogonal Latin squares based on cellular automata

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2017, GECCO'17 Proceedings of the Genetic and Evolutionary Computation Conference. New York, NY: Association for Computing Machinery (ACM), p. 306-313 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    18 Citations (Scopus)
  • Evolutionary Computation and Cryptology

    Picek, S., 2017, GECCO 2017 - Proceedings of the Genetic and Evolutionary Computation Conference Companion. New York, NY: Association for Computing Machinery (ACM), p. 1066-1093 28 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • If You Can't Measure It, You Can't Improve It: Moving Target Defense Metrics

    Picek, S., Hemberg, E. & O'Reilly, U-M., 2017, MTD'17 Proceedings of the 2017 Workshop on Moving Target Defense . New York, NY: Association for Computing Machinery (ACM), p. 115-118 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Trade-Offs for S-boxes: Cryptographic Properties and Side-Channel Resilience

    Carlet, C., Heuser, A. & Picek, S., 2017, Applied Cryptography and Network Security : 15th International Conference, ACNS 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Cham: Springer, p. 393-414 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    16 Citations (Scopus)
  • 2018

    A Search for Differentially-6 Uniform (n, n-2) Functions

    Picek, S., Knezevic, K., Jakobovic, D. & Carlet, C., 2018, 2018 IEEE Congress on Evolutionary Computation (CEC): Proceedings. Piscataway, NJ: IEEE, p. 1-7 7 p. 8477646

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Classification of cancer data: Analyzing gene expression data using a fuzzy decision tree algorithm

    Picek, S., Ludwig, S. A. & Jakobovic, D., 2018, Operations Research Applications in Health Care Management. Kahraman, C. & Ilker Topcu, Y. (eds.). Cham: Springer, p. 327-347 21 p. (International Series in Operations Research and Management Science; vol. 262).

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientific

    44 Citations (Scopus)
  • Evolutionary search of binary orthogonal arrays

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2018, Parallel Problem Solving from Nature – PPSN XV - 15th International Conference, 2018, Proceedings. Auger, A., Fonseca, C. M., Lourenço, N., Machado, P., Paquete, L. & Whitley, D. (eds.). 1 ed. Cham: Springer, p. 121-133 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11101 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    10 Citations (Scopus)
  • Evolving Bent Quaternary Functions

    Picek, S., Knezevic, K., Mariot, L., Jakobovic, D. & Leporati, A., 2018, 2018 IEEE Congress on Evolutionary Computation (CEC): Proceedings. Piscataway, NJ: IEEE, p. 1-8 8 p. 8477677

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Finding short and implementation-friendly addition chains with evolutionary algorithms

    Picek, S., Coello Coello, C. A., Jakobovic, D. & Mentens, N., 2018, In: Journal of Heuristics. 24, 3, p. 457-481 25 p.

    Research output: Contribution to journalArticleScientificpeer-review

    9 Citations (Scopus)
  • Genetic Algorithm-Based Electromagnetic Fault Injection

    Maldini, A., Samwel, N., Picek, S. & Batina, L., 2018, 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography FDTC : Proceedings. Guerrero, J. E. (ed.). Piscataway, NJ: IEEE, p. 35-42 8 p. 8573932

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    16 Citations (Scopus)
  • Higher order side-channel attack resilient S-boxes

    Lerman, L., Veshchikov, N., Picek, S. & Markowitch, O., 2018, 2018 ACM International Conference on Computing Frontiers, CF 2018 - Proceedings. Kaeli, D. R. & Pericàs, M. (eds.). New York: Association for Computing Machinery (ACM), p. 336-341 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules

    Ghoshal, A., Sadhukhan, R., Patranabis, S., Datta, N., Picek, S. & Mukhopadhyay, D., 2018, In: IACR Transactions on Symmetric Cryptology . 2018, 3, p. 311-334 24 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    20 Citations (Scopus)
    115 Downloads (Pure)
  • On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers

    Najm, Z., Jap, D., Jungk, B., Picek, S. & Bhasin, S., 2018, 2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). Piscataway, NJ: IEEE, p. 552-555 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • On the Performance of Convolutional Neural Networks for Side-Channel Analysis

    Picek, S., Samiotis, I. P., Kim, J., Heuser, A., Bhasin, S. & Legay, A., 2018, Security, Privacy, and Applied Cryptography Engineering: 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings. Chattopadhyay, A., Rebeiro, C. & Yarom, Y. (eds.). Cham: Springer, p. 157-176 20 p. (Lecture Notes in Computer Science; vol. 11348).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    76 Citations (Scopus)
  • The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations

    Picek, S., Heuser, A., Jovic, A., Bhasin, S. & Regazzoni, F., 2018, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2019, 1, p. 209-237 29 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    181 Downloads (Pure)
  • The Design of (Almost) Disjunct Matrices by Evolutionary Algorithms

    Knezevic, K., Picek, S., Mariot, L., Jakobovic, D. & Leporati, A., 2018, Theory and Practice of Natural Computing: 7th International Conference, TPNC 2018, Dublin, Ireland, December 12–14, 2018, Proceedings. Fagan, D., Martín-Vide, C., O'Neill, M. & Vega-Rodríguez, M. A. (eds.). Cham: Springer, p. 152-163 12 p. (Lecture Notes in Computer Science ; vol. 11324).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Tutorials at PPSN 2018

    Lobo Pappa, G., Emmerich, M. T. M., Bazzan, A., Browne, W., Deb, K., Doerr, C., Ðurasević, M., Epitropakis, M. G., Haraldsson, S. O., Picek, S. & More Authors, 2018, Parallel Problem Solving from Nature – PPSN XV - 15th International Conference, 2018, Proceedings. Auger, A., Fonseca, C. M., Lourenço, N., Machado, P., Paquete, L. & Whitley, D. (eds.). 2 ed. Cham: Springer, p. 477-489 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11102).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • 2019

    A characterisation of S-box fitness landscapes in cryptography

    Jakobovic, D., Picek, S., Martins, M. S. R. & Wagner, M., 2019, GECCO 2019 - Proceedings of the 2019 Genetic and Evolutionary Computation Conference: Proceedings of the 2019 Genetic and Evolutionary Computation Conference. New York: Association for Computing Machinery (ACM), p. 285-293 9 p. (GECCO 2019 - Proceedings of the 2019 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • A Systematic Evaluation of Profiling Through Focused Feature Selection

    Picek, S., Heuser, A., Jovic, A. & Batina, L., 2019, In: IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 27, 12, p. 2802-2815 14 p., 8836108.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    29 Citations (Scopus)
    158 Downloads (Pure)
  • C3PO: Cipher Construction with Cartesian genetic PrOgramming

    Picek, S., Knezevic, K., Jakobovic, D. & Derek, A., 2019, GECCO'19 : Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion. López-Ibáñez, M. (ed.). New York: Association for Computing Machinery (ACM), p. 1625-1633 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Cellular automata based S-boxes

    Mariot, L., Picek, S., Leporati, A. & Jakobovic, D., 2019, In: Cryptography and Communications. 11, 1, p. 41-62 22 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    45 Citations (Scopus)
    194 Downloads (Pure)
  • Challenges in deep learning-based profiled side-channel analysis

    Picek, S., 1 Jan 2019, Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Proceedings. Bhasin, S., Mendelson, A. & Nandi, M. (eds.). Springer, Vol. 11947. p. 9-12 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11947 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel

    Batina, L., Jap, D., Bhasin, S. & Picek, S., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 515-532 18 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    100 Downloads (Pure)
  • Evolutionary algorithms for the design of quantum protocols

    Krawec, W., Picek, S. & Jakobovic, D., 2019, Applications of Evolutionary Computation: 22nd International Conference, EvoApplications 2019, Held as Part of EvoStar 2019. Kaufmann, P. & Castillo, P. A. (eds.). Cham: Springer, p. 220-236 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11454 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Hyper-bent Boolean Functions and Evolutionary Algorithms

    Mariot, L., Jakobovic, D., Leporati, A. & Picek, S., 2019, Genetic Programming : 22nd European Conference, EuroGP 2019, Held as Part of EvoStar 2019, Proceedings. Sekanina, L., Hu, T., Richter, H., García-Sánchez, P. & Lourenço, N. (eds.). Cham: Springer, p. 262-277 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11451 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • Improving Side-Channel Analysis Through Semi-Supervised Learning

    Picek, S., Heuser, A., Jovic, A., Knezevic, K. & Richmond, T., 2019, Smart Card Research and Advanced Applications : 17th International Conference, CARDIS 2018, Revised Selected Papers. Bilgin, B. & Fischer, J-B. (eds.). Cham: Springer, Vol. 11389. p. 35-50 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11389).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis

    Kim, J. H., Picek, S., Heuser, A., Bhasin, S. & Hanjalic, A., 2019, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2019, 3, p. 148-179 32 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    166 Citations (Scopus)
    162 Downloads (Pure)
  • One trace is all it takes: machine learning-based side-channel attack on EDDSA

    Weissbart, L., Picek, S. & Batina, L., 2019, Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Proceedings. Bhasin, S., Mendelson, A. & Nandi, M. (eds.). Springer, p. 86-105 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11947 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    27 Citations (Scopus)
  • On the design of S-box constructions with genetic programming

    Picek, S. & Jakobovic, D., 2019, GECCO'19 : Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion. López-Ibáñez, M. (ed.). New York: Association for Computing Machinery (ACM), p. 395-396 2 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Poster: When adversary becomes the guardian - Towards side-channel security with adversarial attacks

    Picek, S., Jap, D. & Bhasin, S., 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 2673-2675 3 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Poster: Recovering the input of neural networks via single shot side-channel attacks

    Batina, L., Bhasin, S., Jap, D. & Picek, S., 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 2657-2659 3 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    16 Citations (Scopus)
  • 2020

    A fast characterization method for semi-invasive fault injection attacks

    Wu, L., Ribera, G., Beringuier-Boher, N. & Picek, S., 2020, Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings. Jarecki, S. (ed.). SpringerOpen, p. 146-170 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    11 Citations (Scopus)
    195 Downloads (Pure)
  • An Evolutionary View on Reversible Shift-Invariant Transformations

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2020, Genetic Programming - 23rd European Conference, EuroGP 2020, Held as Part of EvoStar 2020, Proceedings. Hu, T., Lourenço, N., Medvet, E. & Divina, F. (eds.). SpringerOpen, p. 118-134 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12101 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • A search for additional structure: The case of cryptographic s-boxes

    Carlet, C., Djurasevic, M., Jakobovic, D. & Picek, S., 2020, Parallel Problem Solving from Nature – PPSN XVI. Bäck, T., Preuss, M., Deutz, A., Emmerich, M., Wang, H., Doerr, C. & Trautmann, H. (eds.). Part II ed. Cham: Springer, p. 343-356 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12270 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    26 Downloads (Pure)
  • Big enough to care not enough to scare! crawling to attack recommender systems

    Aiolli, F., Conti, M., Picek, S. & Polato, M., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer, p. 165-184 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Evolutionary computation and machine learning in cryptology

    Picek, S. & Jakobovic, D., 2020, GECCO 2020 Companion : Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion. New York: Association for Computing Machinery (ACM), p. 1147-1173 27 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    145 Downloads (Pure)
  • Fitness landscape analysis of dimensionally-aware genetic programming featuring feynman equations

    Ðurasević, M., Jakobovic, D., Martins, M. S. R., Picek, S. & Wagner, M., 2020, Parallel Problem Solving from Nature – PPSN XVI. Bäck, T., Preuss, M., Deutz, A., Emmerich, M., Wang, H., Doerr, C. & Trautmann, H. (eds.). Part II ed. Cham: Springer, p. 111-124 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12270 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    31 Downloads (Pure)
  • Keep it Unsupervised: Horizontal Attacks Meet Deep Learning

    Perin, G., Chmielewski, Ł., Batina, L. & Picek, S., 2020, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2021, 1, p. 343-372 30 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    21 Citations (Scopus)
    106 Downloads (Pure)
  • Learning From A Big Brother: Mimicking Neural Networks in Profiled Side-channel Analysis

    van der Valk, D., Krcek, M., Picek, S. & Bhasin, S., 2020, 2020 57th ACM/IEEE Design Automation Conference, DAC 2020. Piscataway: IEEE, p. 1-6 6 p. 9218520. (Proceedings - Design Automation Conference; vol. 2020-July).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Lightweight Ciphers and their Side-channel Resilience

    Heuser, A., Picek, S., Guilley, S. & Mentens, N., 1 Oct 2020, In: IEEE Transactions on Computers. 69, 10, p. 1434-1448 15 p., 8053814.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    16 Citations (Scopus)
    277 Downloads (Pure)
  • One property to rule them all? On the limits of trade-offs for S-boxes

    Djurasevic, M., Jakobovic, D. & Picek, S., 2020, GECCO 2020 : Proceedings of the 2020 Genetic and Evolutionary Computation Conference. New York: Association for Computing Machinery (ACM), p. 1064-1072 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    48 Downloads (Pure)
  • On the feasibility of using evolvable hardware for hardware Trojan detection and prevention

    Labafniya, M., Picek, S., Etemadi Borujeni, S. & Mentens, N., 1 Jun 2020, In: Applied Soft Computing Journal. 91, 11 p., 106247.

    Research output: Contribution to journalArticleScientificpeer-review

    9 Citations (Scopus)
  • Predictive and generative machine learning models for photonic crystals

    Christensen, T., Loh, C., Picek, S., Jakobović, D., Jing, L., Fisher, S., Ceperic, V., Joannopoulos, J. D. & Soljačić, M., 2020, In: Nanophotonics. 9, 13, p. 4183-4192 10 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    62 Citations (Scopus)
    115 Downloads (Pure)
  • Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders

    Wu, L. & Picek, S., 2020, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2020, 4, p. 389-415 27 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    225 Downloads (Pure)
  • Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis

    Perin, G., Chmielewski, Ł. & Picek, S., 2020, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2020, 4, p. 337-364 28 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    40 Downloads (Pure)
  • Systematic Side-Channel Analysis of Curve25519 with Machine Learning

    Weissbart, L., Chmielewski, Ł., Picek, S. & Batina, L., 2020, In: Journal of Hardware and Systems Security. 4, p. 314–328 15 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    154 Downloads (Pure)
  • Towards an evolutionary-based approach for natural language processing

    Manzoni, L., Jakobovic, D., Mariot, L., Picek, S. & Castelli, M., 2020, GECCO 2020 : Proceedings of the 2020 Genetic and Evolutionary Computation Conference. New York: Association for Computing Machinery (ACM), p. 985-993 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    49 Downloads (Pure)
  • What Is Your MOVE: Modeling Adversarial Network Environments

    Knezevic, K., Picek, S., Jakobovic, D. & Hernandez-Castro, J., 2020, Applications of Evolutionary Computation : 23rd European Conference, EvoApplications 2020, Held as Part of EvoStar 2020, Proceedings. Castillo, P. A., Jiménez Laredo, J. L. & Fernández de Vega, F. (eds.). Cham: Springer, p. 260-275 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12104 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    82 Downloads (Pure)
  • 2021

    A Multi-Sensor Information Fusion Method Based on Factor Graph for Integrated Navigation System

    Xu, J., Yang, G., Sun, Y. & Picek, S., 2021, In: IEEE Access. 9, p. 12044-12054 11 p., 9324742.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    16 Citations (Scopus)
    357 Downloads (Pure)