Search results

  • Ablation Analysis for Multi-device Deep Learning-based Physical Side-channel Analysis

    Wu, L., Won, Y-S., Jap, D., Perin, G., Bhasin, S. & Picek, S., 2023, (E-pub ahead of print) In: IEEE Transactions on Dependable and Secure Computing. p. 1-12 12 p.

    Research output: Contribution to journalArticleScientificpeer-review

  • A characterisation of S-box fitness landscapes in cryptography

    Jakobovic, D., Picek, S., Martins, M. S. R. & Wagner, M., 2019, GECCO 2019 - Proceedings of the 2019 Genetic and Evolutionary Computation Conference: Proceedings of the 2019 Genetic and Evolutionary Computation Conference. New York: Association for Computing Machinery (ACM), p. 285-293 9 p. (GECCO 2019 - Proceedings of the 2019 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • A fast characterization method for semi-invasive fault injection attacks

    Wu, L., Ribera, G., Beringuier-Boher, N. & Picek, S., 2020, Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings. Jarecki, S. (ed.). SpringerOpen, p. 146-170 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    11 Citations (Scopus)
    198 Downloads (Pure)
  • A Multi-Sensor Information Fusion Method Based on Factor Graph for Integrated Navigation System

    Xu, J., Yang, G., Sun, Y. & Picek, S., 2021, In: IEEE Access. 9, p. 12044-12054 11 p., 9324742.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    16 Citations (Scopus)
    368 Downloads (Pure)
  • An Evolutionary View on Reversible Shift-Invariant Transformations

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2020, Genetic Programming - 23rd European Conference, EuroGP 2020, Held as Part of EvoStar 2020, Proceedings. Hu, T., Lourenço, N., Medvet, E. & Divina, F. (eds.). SpringerOpen, p. 118-134 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12101 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • A scalable SIMD RISC-V based processor with customized vector extensions for CRYSTALS-kyber

    Li, H., Mentens, N. & Picek, S., 2022, Proceedings of the 59th ACM/IEEE Design Automation Conference, DAC 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 733-738 6 p. (Proceedings - Design Automation Conference).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    359 Downloads (Pure)
  • A search for additional structure: The case of cryptographic s-boxes

    Carlet, C., Djurasevic, M., Jakobovic, D. & Picek, S., 2020, Parallel Problem Solving from Nature – PPSN XVI. Bäck, T., Preuss, M., Deutz, A., Emmerich, M., Wang, H., Doerr, C. & Trautmann, H. (eds.). Part II ed. Cham: Springer, p. 343-356 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12270 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    28 Downloads (Pure)
  • A Search for Differentially-6 Uniform (n, n-2) Functions

    Picek, S., Knezevic, K., Jakobovic, D. & Carlet, C., 2018, 2018 IEEE Congress on Evolutionary Computation (CEC): Proceedings. Piscataway, NJ: IEEE, p. 1-7 7 p. 8477646

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • A Systematic Evaluation of Profiling Through Focused Feature Selection

    Picek, S., Heuser, A., Jovic, A. & Batina, L., 2019, In: IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 27, 12, p. 2802-2815 14 p., 8836108.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    29 Citations (Scopus)
    160 Downloads (Pure)
  • A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage

    Arora, V., Buhan, I., Perin, G. & Picek, S., 2022, Smart Card Research and Advanced Applications - 20th International Conference, CARDIS 2021, Revised Selected Papers. Grosso, V. & Pöppelmann, T. (eds.). Springer, Vol. 13173. p. 80-96 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13173 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    25 Downloads (Pure)
  • Automatic Feature Construction for Network Intrusion Detection

    Tran, B., Picek, S. & Xue, B., 2017, Simulated Evolution and Learning : 11th International Conference SEAL 2017 Proceedings. Shi, Y., Tan, K. C., Zhang, M., Tang, K., Li, X., Zhang, Q., Tan, Y., Middendorf, M. & Jin, Y. (eds.). Cham: Springer, p. 569-580 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10593 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Backdoor Pony: Evaluating backdoor attacks and defenses in different domains

    Mercier, A., Smolin, N., Sihlovec, O., Koffas, S. & Picek, S., 2023, In: SoftwareX. 22, 8 p., 101387.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    61 Downloads (Pure)
  • Big enough to care not enough to scare! crawling to attack recommender systems

    Aiolli, F., Conti, M., Picek, S. & Polato, M., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer, p. 165-184 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • C3PO: Cipher Construction with Cartesian genetic PrOgramming

    Picek, S., Knezevic, K., Jakobovic, D. & Derek, A., 2019, GECCO'19 : Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion. López-Ibáñez, M. (ed.). New York: Association for Computing Machinery (ACM), p. 1625-1633 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

    Koffas, S., Xu, J., Conti, M. & Picek, S., 2022, WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning. Association for Computing Machinery (ACM), p. 57-62 6 p. (WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    95 Downloads (Pure)
  • Cellular automata based S-boxes

    Mariot, L., Picek, S., Leporati, A. & Jakobovic, D., 2019, In: Cryptography and Communications. 11, 1, p. 41-62 22 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    45 Citations (Scopus)
    197 Downloads (Pure)
  • Challenges in deep learning-based profiled side-channel analysis

    Picek, S., 1 Jan 2019, Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Proceedings. Bhasin, S., Mendelson, A. & Nandi, M. (eds.). Springer, Vol. 11947. p. 9-12 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11947 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Classification of cancer data: Analyzing gene expression data using a fuzzy decision tree algorithm

    Picek, S., Ludwig, S. A. & Jakobovic, D., 2018, Operations Research Applications in Health Care Management. Kahraman, C. & Ilker Topcu, Y. (eds.). Cham: Springer, p. 327-347 21 p. (International Series in Operations Research and Management Science; vol. 262).

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientific

    44 Citations (Scopus)
  • CoInGP: Convolutional inpainting with genetic programming

    Jakobovic, D., Manzoni, L., Mariot, L., Picek, S. & Castelli, M., 2021, GECCO 2021 : Proceedings of the 2021 Genetic and Evolutionary Computation Conference. Chicano, F. & Krawiec, K. (eds.). New York: Association for Computing Machinery (ACM), p. 795-803 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel

    Batina, L., Jap, D., Bhasin, S. & Picek, S., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 515-532 18 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    101 Downloads (Pure)
  • Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds

    Swaminathan, S., Chmielewski, Ł., Perin, G. & Picek, S., 2022, Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings. Zhou, J., Chattopadhyay, S., Adepu, S., Alcaraz, C., Batina, L., Casalicchio, E., Jin, C., Lin, J., Losiouk, E., Majumdar, S., Meng, W., Picek, S., Zhauniarovich, Y., Shao, J., Su, C., Wang, C. & Zonouz, S. (eds.). Cham: Springer, p. 165-182 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13285 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    49 Downloads (Pure)
  • Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher

    Băcuieți, N., Batina, L. & Picek, S., 2022, Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings. Ateniese, G. & Venturi, D. (eds.). Springer, p. 809-829 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13269 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    33 Downloads (Pure)
  • Dynamic Backdoors with Global Average Pooling

    Koffas, S., Picek, S. & Conti, M., 2022, Proceedings of the 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS). Danvers: IEEE, p. 320-323 4 p. 9869920. (Proceeding - IEEE International Conference on Artificial Intelligence Circuits and Systems, AICAS 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    17 Downloads (Pure)
  • Evolutionary algorithms-assisted construction of cryptographic boolean functions

    Carlet, C., Jakobovic, D. & Picek, S., 2021, GECCO 2021 - Proceedings of the 2021 Genetic and Evolutionary Computation Conference. Association for Computing Machinery (ACM), p. 565-573 9 p. (GECCO 2021 - Proceedings of the 2021 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    99 Downloads (Pure)
  • Evolutionary algorithms for designing reversible cellular automata

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2021, In: GENETIC PROGRAMMING AND EVOLVABLE MACHINES. 22, 4, p. 429-461 33 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    54 Downloads (Pure)
  • Evolutionary algorithms for the design of orthogonal Latin squares based on cellular automata

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2017, GECCO'17 Proceedings of the Genetic and Evolutionary Computation Conference. New York, NY: Association for Computing Machinery (ACM), p. 306-313 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    18 Citations (Scopus)
  • Evolutionary algorithms for the design of quantum protocols

    Krawec, W., Picek, S. & Jakobovic, D., 2019, Applications of Evolutionary Computation: 22nd International Conference, EvoApplications 2019, Held as Part of EvoStar 2019. Kaufmann, P. & Castillo, P. A. (eds.). Cham: Springer, p. 220-236 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11454 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Evolutionary Computation and Cryptology

    Picek, S., 2017, GECCO 2017 - Proceedings of the Genetic and Evolutionary Computation Conference Companion. New York, NY: Association for Computing Machinery (ACM), p. 1066-1093 28 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Evolutionary computation and machine learning in cryptology

    Picek, S. & Jakobovic, D., 2020, GECCO 2020 Companion : Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion. New York: Association for Computing Machinery (ACM), p. 1147-1173 27 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    145 Downloads (Pure)
  • Evolutionary search of binary orthogonal arrays

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2018, Parallel Problem Solving from Nature – PPSN XV - 15th International Conference, 2018, Proceedings. Auger, A., Fonseca, C. M., Lourenço, N., Machado, P., Paquete, L. & Whitley, D. (eds.). 1 ed. Cham: Springer, p. 121-133 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11101 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    10 Citations (Scopus)
  • Evolving Bent Quaternary Functions

    Picek, S., Knezevic, K., Mariot, L., Jakobovic, D. & Leporati, A., 2018, 2018 IEEE Congress on Evolutionary Computation (CEC): Proceedings. Piscataway, NJ: IEEE, p. 1-8 8 p. 8477677

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Explainability-based Backdoor Attacks against Graph Neural Networks

    Xu, J., Xue, M. & Picek, S., 2021, WiseML 2021 : Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning. New York: Association for Computing Machinery (ACM), p. 31-36 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    18 Citations (Scopus)
    198 Downloads (Pure)
  • Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis

    Perin, G., Wu, L. & Picek, S., 2022, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2022, 4, p. 828-861 34 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    17 Citations (Scopus)
    84 Downloads (Pure)
  • Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices

    Mukhtar, N., Batina, L., Picek, S. & Kong, Y., 2022, Topics in Cryptology - CT-RSA 2022 : Cryptographers’ Track at the RSA Conference, 2022, Proceedings. Galbraith, S. D. (ed.). Cham: Springer, p. 297-321 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13161 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    59 Downloads (Pure)
  • Finding short and implementation-friendly addition chains with evolutionary algorithms

    Picek, S., Coello Coello, C. A., Jakobovic, D. & Mentens, N., 2018, In: Journal of Heuristics. 24, 3, p. 457-481 25 p.

    Research output: Contribution to journalArticleScientificpeer-review

    9 Citations (Scopus)
  • Fitness landscape analysis of dimensionally-aware genetic programming featuring feynman equations

    Ðurasević, M., Jakobovic, D., Martins, M. S. R., Picek, S. & Wagner, M., 2020, Parallel Problem Solving from Nature – PPSN XVI. Bäck, T., Preuss, M., Deutz, A., Emmerich, M., Wang, H., Doerr, C. & Trautmann, H. (eds.). Part II ed. Cham: Springer, p. 111-124 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12270 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    32 Downloads (Pure)
  • FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning

    Li, H., Rieger, P., Zeitouni, S., Picek, S. & Sadeghi, A. R., 2023, Proceedings of the 2023 33rd International Conference on Field-Programmable Logic and Applications (FPL). O’Conner, L. (ed.). Piscataway: IEEE, p. 271-276 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Downloads (Pure)
  • Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis

    Kerkhof, M., Wu, L., Perin, G. & Picek, S., 2022, Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Proceedings. Balasch, J. & O’Flynn, C. (eds.). Springer, Vol. 13211. p. 29-48 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13211 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    77 Downloads (Pure)
  • Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-Based Side-Channel Analysis

    Perin, G., Wu, L. & Picek, S., 2022, Advances in Information Security. Stamp, M. (ed.). Springer Nature, p. 217-241 25 p. (Advances in Information Security; vol. 54).

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientific

    Open Access
    File
    2 Citations (Scopus)
    24 Downloads (Pure)
  • Genetic Algorithm-Based Electromagnetic Fault Injection

    Maldini, A., Samwel, N., Picek, S. & Batina, L., 2018, 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography FDTC : Proceedings. Guerrero, J. E. (ed.). Piscataway, NJ: IEEE, p. 35-42 8 p. 8573932

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    16 Citations (Scopus)
  • Going in Style: Audio Backdoors Through Stylistic Transformations

    Koffas, S., Pajola, L., Picek, S. & Conti, M., 2023, Proceedings of the ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    33 Downloads (Pure)
  • Guest Editorial: Trustworthy AI

    Jin, Y., Ho, T. Y., Picek, S. & Garg, S., 2022, In: ACM Journal on Emerging Technologies in Computing Systems. 18, 3, 3 p., 55.

    Research output: Contribution to journalEditorialScientificpeer-review

    Open Access
    File
    14 Downloads (Pure)
  • Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand

    Cardaioli, M., Cecconello, S., Conti, M., Milani, S., Picek, S. & Saraci, E., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 1687-1704 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    37 Downloads (Pure)
  • Higher order side-channel attack resilient S-boxes

    Lerman, L., Veshchikov, N., Picek, S. & Markowitch, O., 2018, 2018 ACM International Conference on Computing Frontiers, CF 2018 - Proceedings. Kaeli, D. R. & Pericàs, M. (eds.). New York: Association for Computing Machinery (ACM), p. 336-341 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Hyper-bent Boolean Functions and Evolutionary Algorithms

    Mariot, L., Jakobovic, D., Leporati, A. & Picek, S., 2019, Genetic Programming : 22nd European Conference, EuroGP 2019, Held as Part of EvoStar 2019, Proceedings. Sekanina, L., Hu, T., Richter, H., García-Sánchez, P. & Lourenço, N. (eds.). Cham: Springer, p. 262-277 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11451 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis

    Wu, L., Perin, G. & Picek, S., 2022, (E-pub ahead of print) In: IEEE Transactions on Emerging Topics in Computing. p. 1-12 12 p.

    Research output: Contribution to journalArticleScientificpeer-review

  • If You Can't Measure It, You Can't Improve It: Moving Target Defense Metrics

    Picek, S., Hemberg, E. & O'Reilly, U-M., 2017, MTD'17 Proceedings of the 2017 Workshop on Moving Target Defense . New York, NY: Association for Computing Machinery (ACM), p. 115-118 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Improving Side-Channel Analysis Through Semi-Supervised Learning

    Picek, S., Heuser, A., Jovic, A., Knezevic, K. & Richmond, T., 2019, Smart Card Research and Advanced Applications : 17th International Conference, CARDIS 2018, Revised Selected Papers. Bilgin, B. & Fischer, J-B. (eds.). Cham: Springer, Vol. 11389. p. 35-50 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11389).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Keep it Unsupervised: Horizontal Attacks Meet Deep Learning

    Perin, G., Chmielewski, Ł., Batina, L. & Picek, S., 2020, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2021, 1, p. 343-372 30 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    21 Citations (Scopus)
    107 Downloads (Pure)
  • Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled Side-Channel Analysis

    Valk, D., Picek, S. & Bhasin, S., 2021, Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, COSADE 2020, Revised Selected Papers. Bertoni, G. M. & Regazzoni, F. (eds.). Springer, Vol. 12244. p. 175-199 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12244 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)