Search results

  • Conference contribution

    Dynamic Backdoors with Global Average Pooling

    Koffas, S., Picek, S. & Conti, M., 2022, Proceedings of the 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS). Danvers: IEEE, p. 320-323 4 p. 9869920. (Proceeding - IEEE International Conference on Artificial Intelligence Circuits and Systems, AICAS 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    17 Downloads (Pure)
  • Evolutionary algorithms-assisted construction of cryptographic boolean functions

    Carlet, C., Jakobovic, D. & Picek, S., 2021, GECCO 2021 - Proceedings of the 2021 Genetic and Evolutionary Computation Conference. Association for Computing Machinery (ACM), p. 565-573 9 p. (GECCO 2021 - Proceedings of the 2021 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    97 Downloads (Pure)
  • Evolutionary algorithms for the design of orthogonal Latin squares based on cellular automata

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2017, GECCO'17 Proceedings of the Genetic and Evolutionary Computation Conference. New York, NY: Association for Computing Machinery (ACM), p. 306-313 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    18 Citations (Scopus)
  • Evolutionary algorithms for the design of quantum protocols

    Krawec, W., Picek, S. & Jakobovic, D., 2019, Applications of Evolutionary Computation: 22nd International Conference, EvoApplications 2019, Held as Part of EvoStar 2019. Kaufmann, P. & Castillo, P. A. (eds.). Cham: Springer, p. 220-236 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11454 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Evolutionary Computation and Cryptology

    Picek, S., 2017, GECCO 2017 - Proceedings of the Genetic and Evolutionary Computation Conference Companion. New York, NY: Association for Computing Machinery (ACM), p. 1066-1093 28 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Evolutionary computation and machine learning in cryptology

    Picek, S. & Jakobovic, D., 2020, GECCO 2020 Companion : Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion. New York: Association for Computing Machinery (ACM), p. 1147-1173 27 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    145 Downloads (Pure)
  • Evolutionary search of binary orthogonal arrays

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2018, Parallel Problem Solving from Nature – PPSN XV - 15th International Conference, 2018, Proceedings. Auger, A., Fonseca, C. M., Lourenço, N., Machado, P., Paquete, L. & Whitley, D. (eds.). 1 ed. Cham: Springer, p. 121-133 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11101 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    10 Citations (Scopus)
  • Evolving Bent Quaternary Functions

    Picek, S., Knezevic, K., Mariot, L., Jakobovic, D. & Leporati, A., 2018, 2018 IEEE Congress on Evolutionary Computation (CEC): Proceedings. Piscataway, NJ: IEEE, p. 1-8 8 p. 8477677

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Explainability-based Backdoor Attacks against Graph Neural Networks

    Xu, J., Xue, M. & Picek, S., 2021, WiseML 2021 : Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning. New York: Association for Computing Machinery (ACM), p. 31-36 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    18 Citations (Scopus)
    196 Downloads (Pure)
  • Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices

    Mukhtar, N., Batina, L., Picek, S. & Kong, Y., 2022, Topics in Cryptology - CT-RSA 2022 : Cryptographers’ Track at the RSA Conference, 2022, Proceedings. Galbraith, S. D. (ed.). Cham: Springer, p. 297-321 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13161 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    57 Downloads (Pure)
  • Fitness landscape analysis of dimensionally-aware genetic programming featuring feynman equations

    Ðurasević, M., Jakobovic, D., Martins, M. S. R., Picek, S. & Wagner, M., 2020, Parallel Problem Solving from Nature – PPSN XVI. Bäck, T., Preuss, M., Deutz, A., Emmerich, M., Wang, H., Doerr, C. & Trautmann, H. (eds.). Part II ed. Cham: Springer, p. 111-124 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12270 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    32 Downloads (Pure)
  • FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning

    Li, H., Rieger, P., Zeitouni, S., Picek, S. & Sadeghi, A. R., 2023, Proceedings of the 2023 33rd International Conference on Field-Programmable Logic and Applications (FPL). O’Conner, L. (ed.). Piscataway: IEEE, p. 271-276 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Downloads (Pure)
  • Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis

    Kerkhof, M., Wu, L., Perin, G. & Picek, S., 2022, Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Proceedings. Balasch, J. & O’Flynn, C. (eds.). Springer, Vol. 13211. p. 29-48 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13211 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    74 Downloads (Pure)
  • Genetic Algorithm-Based Electromagnetic Fault Injection

    Maldini, A., Samwel, N., Picek, S. & Batina, L., 2018, 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography FDTC : Proceedings. Guerrero, J. E. (ed.). Piscataway, NJ: IEEE, p. 35-42 8 p. 8573932

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    16 Citations (Scopus)
  • Going in Style: Audio Backdoors Through Stylistic Transformations

    Koffas, S., Pajola, L., Picek, S. & Conti, M., 2023, Proceedings of the ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    32 Downloads (Pure)
  • Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand

    Cardaioli, M., Cecconello, S., Conti, M., Milani, S., Picek, S. & Saraci, E., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 1687-1704 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    36 Downloads (Pure)
  • Higher order side-channel attack resilient S-boxes

    Lerman, L., Veshchikov, N., Picek, S. & Markowitch, O., 2018, 2018 ACM International Conference on Computing Frontiers, CF 2018 - Proceedings. Kaeli, D. R. & Pericàs, M. (eds.). New York: Association for Computing Machinery (ACM), p. 336-341 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Hyper-bent Boolean Functions and Evolutionary Algorithms

    Mariot, L., Jakobovic, D., Leporati, A. & Picek, S., 2019, Genetic Programming : 22nd European Conference, EuroGP 2019, Held as Part of EvoStar 2019, Proceedings. Sekanina, L., Hu, T., Richter, H., García-Sánchez, P. & Lourenço, N. (eds.). Cham: Springer, p. 262-277 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11451 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • If You Can't Measure It, You Can't Improve It: Moving Target Defense Metrics

    Picek, S., Hemberg, E. & O'Reilly, U-M., 2017, MTD'17 Proceedings of the 2017 Workshop on Moving Target Defense . New York, NY: Association for Computing Machinery (ACM), p. 115-118 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Improving Side-Channel Analysis Through Semi-Supervised Learning

    Picek, S., Heuser, A., Jovic, A., Knezevic, K. & Richmond, T., 2019, Smart Card Research and Advanced Applications : 17th International Conference, CARDIS 2018, Revised Selected Papers. Bilgin, B. & Fischer, J-B. (eds.). Cham: Springer, Vol. 11389. p. 35-50 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11389).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled Side-Channel Analysis

    Valk, D., Picek, S. & Bhasin, S., 2021, Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, COSADE 2020, Revised Selected Papers. Bertoni, G. M. & Regazzoni, F. (eds.). Springer, Vol. 12244. p. 175-199 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12244 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Label-Only Membership Inference Attack against \\Node-Level Graph Neural Networks

    Conti, M., Li, J., Picek, S. & Xu, J., 2022, AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022. Association for Computing Machinery (ACM), p. 1–12 12 p. (AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    45 Downloads (Pure)
  • Learning From A Big Brother: Mimicking Neural Networks in Profiled Side-channel Analysis

    van der Valk, D., Krcek, M., Picek, S. & Bhasin, S., 2020, 2020 57th ACM/IEEE Design Automation Conference, DAC 2020. Piscataway: IEEE, p. 1-6 6 p. 9218520. (Proceedings - Design Automation Conference; vol. 2020-July).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis

    Perin, G., Buhan, I. & Picek, S., 2021, Constructive Side-Channel Analysis and Secure Design - 12th International Workshop, COSADE 2021, Proceedings. Bhasin, S. & De Santis, F. (eds.). Springer, p. 53-81 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12910 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions

    Li, H., Mentens, N. & Picek, S., 2023, Proceedings of the 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE). Piscataway: IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    30 Downloads (Pure)
  • Modeling Strong Physically Unclonable Functions with Metaheuristics

    Coello, C. C., Krcek, M., Durasevic, M., Mariot, L., Jakobovic, D. & Picek, S., 2023, GECCO 2023 Companion - Proceedings of the 2023 Genetic and Evolutionary Computation Conference Companion. Association for Computing Machinery (ACM), p. 719-722 4 p. (GECCO 2023 Companion - Proceedings of the 2023 Genetic and Evolutionary Computation Conference Companion).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    10 Downloads (Pure)
  • More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks

    Xu, J., Wang, R., Koffas, S., Liang, K. & Picek, S., 2022, Proceedings - 38th Annual Computer Security Applications Conference, ACSAC 2022. Association for Computing Machinery (ACM), p. 684–698 15 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    43 Downloads (Pure)
  • On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers

    Najm, Z., Jap, D., Jungk, B., Picek, S. & Bhasin, S., 2018, 2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). Piscataway, NJ: IEEE, p. 552-555 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • One property to rule them all? On the limits of trade-offs for S-boxes

    Djurasevic, M., Jakobovic, D. & Picek, S., 2020, GECCO 2020 : Proceedings of the 2020 Genetic and Evolutionary Computation Conference. New York: Association for Computing Machinery (ACM), p. 1064-1072 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    50 Downloads (Pure)
  • One trace is all it takes: machine learning-based side-channel attack on EDDSA

    Weissbart, L., Picek, S. & Batina, L., 2019, Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Proceedings. Bhasin, S., Mendelson, A. & Nandi, M. (eds.). Springer, p. 86-105 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11947 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    27 Citations (Scopus)
  • On the design of S-box constructions with genetic programming

    Picek, S. & Jakobovic, D., 2019, GECCO'19 : Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion. López-Ibáñez, M. (ed.). New York: Association for Computing Machinery (ACM), p. 395-396 2 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • On the Evaluation of Deep Learning-Based Side-Channel Analysis

    Wu, L., Perin, G. & Picek, S., 2022, Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Proceedings. Balasch, J. & O’Flynn, C. (eds.). Springer, p. 49-71 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13211 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    74 Downloads (Pure)
  • On the genotype compression and expansion for evolutionary algorithms in the continuous domain

    Planinic, L., Djurasevic, M., Mariot, L., Jakobovic, D., Picek, S. & Coello Coello, C., 2021, GECCO 2021 Companion : Proceedings of the 2021 Genetic and Evolutionary Computation Conference Companion. Chicano, E. & Krawiec, K. (eds.). New York: Association for Computing Machinery (ACM), p. 1208-1216 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • On the Importance of Initial Solutions Selection in Fault Injection

    Krcek, M., Fronte, D. & Picek, S., 2021, 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC): Proceedings. O’Dell, M. (ed.). Piscataway: IEEE, p. 1-12 12 p. 9565588

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    153 Downloads (Pure)
  • On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis

    Perin, G. & Picek, S., 2021, Selected Areas in Cryptography : 27th International Conference, 2020, Revised Selected Papers. Dunkelman, O., Jacobson, Jr., M. J. & O’Flynn, C. (eds.). Cham: Springer, Vol. 12804. p. 615-636 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12804).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • On the Performance of Convolutional Neural Networks for Side-Channel Analysis

    Picek, S., Samiotis, I. P., Kim, J., Heuser, A., Bhasin, S. & Legay, A., 2018, Security, Privacy, and Applied Cryptography Engineering: 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings. Chattopadhyay, A., Rebeiro, C. & Yarom, Y. (eds.). Cham: Springer, p. 157-176 20 p. (Lecture Notes in Computer Science; vol. 11348).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    76 Citations (Scopus)
  • Poster: Recovering the input of neural networks via single shot side-channel attacks

    Batina, L., Bhasin, S., Jap, D. & Picek, S., 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 2657-2659 3 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    16 Citations (Scopus)
  • Poster: Clean-label Backdoor Attack on Graph Neural Networks

    Xu, J. & Picek, S., 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 3491-3493 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    247 Downloads (Pure)
  • Poster: When adversary becomes the guardian - Towards side-channel security with adversarial attacks

    Picek, S., Jap, D. & Bhasin, S., 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 2673-2675 3 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Profiled Side-Channel Analysis in the Efficient Attacker Framework

    Picek, S., Heuser, A., Perin, G. & Guilley, S., 2022, Smart Card Research and Advanced Applications : 20th International Conference, CARDIS 2021, Revised Selected Papers. Grosso, V. & Pöppelmann, T. (eds.). Cham: Springer, Vol. 13173. p. 44-63 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13173 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    28 Downloads (Pure)
  • ReproducedPapers.org: Openly Teaching and Structuring Machine Learning Reproducibility

    Yildiz, B., Hung, H., Krijthe, J. H., Liem, C. C. S., Loog, M., Migut, G., Oliehoek, F. A., Panichella, A., Pawełczak, P., Picek, S., de Weerdt, M. & van Gemert, J., 2021, Reproducible Research in Pattern Recognition - 3rd International Workshop, RRPR 2021, Revised Selected Papers. Kerautret, B., Colom, M., Krähenbühl, A., Lopresti, D., Monasse, P. & Talbot, H. (eds.). Springer, p. 3-11 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12636 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    86 Downloads (Pure)
  • Rethinking the Trigger-injecting Position in Graph Backdoor Attack

    Xu, J., Abad, G. & Picek, S., 2023, Proceedings of the 2023 International Joint Conference on Neural Networks (IJCNN). Piscataway: IEEE, p. 1-8 8 p. (Proceedings of the International Joint Conference on Neural Networks; vol. 2023-June).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    8 Downloads (Pure)
  • The Design of (Almost) Disjunct Matrices by Evolutionary Algorithms

    Knezevic, K., Picek, S., Mariot, L., Jakobovic, D. & Leporati, A., 2018, Theory and Practice of Natural Computing: 7th International Conference, TPNC 2018, Dublin, Ireland, December 12–14, 2018, Proceedings. Fagan, D., Martín-Vide, C., O'Neill, M. & Vega-Rodríguez, M. A. (eds.). Cham: Springer, p. 152-163 12 p. (Lecture Notes in Computer Science ; vol. 11324).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • The More You Know: Improving Laser Fault Injection with Prior Knowledge

    Krcek, M., Ordas, T., Fronte, D. & Picek, S., 2022, Proceedings of the 2022 Workshop on Fault Detection and Tolerance in Cryptography (FDTC). Trinh, L. (ed.). Piscataway: IEEE, p. 18-29 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    15 Downloads (Pure)
  • To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA

    Rezaeezade, A., Perin, G. & Picek, S., 2022, Progress in Cryptology - AFRICACRYPT 2022 - 13th International Conference on Cryptology in Africa, AFRICACRYPT 2022, Proceedings. Batina, L. & Daemen, J. (eds.). Springer, p. 397-421 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13503 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    24 Downloads (Pure)
  • Towards an evolutionary-based approach for natural language processing

    Manzoni, L., Jakobovic, D., Mariot, L., Picek, S. & Castelli, M., 2020, GECCO 2020 : Proceedings of the 2020 Genetic and Evolutionary Computation Conference. New York: Association for Computing Machinery (ACM), p. 985-993 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    49 Downloads (Pure)
  • Trade-Offs for S-boxes: Cryptographic Properties and Side-Channel Resilience

    Carlet, C., Heuser, A. & Picek, S., 2017, Applied Cryptography and Network Security : 15th International Conference, ACNS 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Cham: Springer, p. 393-414 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    16 Citations (Scopus)
  • Tutorials at PPSN 2018

    Lobo Pappa, G., Emmerich, M. T. M., Bazzan, A., Browne, W., Deb, K., Doerr, C., Ðurasević, M., Epitropakis, M. G., Haraldsson, S. O., Picek, S. & More Authors, 2018, Parallel Problem Solving from Nature – PPSN XV - 15th International Conference, 2018, Proceedings. Auger, A., Fonseca, C. M., Lourenço, N., Machado, P., Paquete, L. & Whitley, D. (eds.). 2 ed. Cham: Springer, p. 477-489 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11102).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Watermarking Graph Neural Networks based on Backdoor Attacks

    Xu, J., Koffas, S., Ersoy, O. & Picek, S., 2023, Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023. Institute of Electrical and Electronics Engineers (IEEE), p. 1179-1197 19 p. (Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    7 Downloads (Pure)
  • What Is Your MOVE: Modeling Adversarial Network Environments

    Knezevic, K., Picek, S., Jakobovic, D. & Hernandez-Castro, J., 2020, Applications of Evolutionary Computation : 23rd European Conference, EvoApplications 2020, Held as Part of EvoStar 2020, Proceedings. Castillo, P. A., Jiménez Laredo, J. L. & Fernández de Vega, F. (eds.). Cham: Springer, p. 260-275 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12104 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    83 Downloads (Pure)