Остановите войну!
for scientists:
default search action
Stjepan Picek
- > Home > Persons > Stjepan Picek
Publications
- 2024
- [j41]Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni:
Tipping the Balance: Imbalanced Classes in Deep-Learning Side-Channel Analysis. IEEE Des. Test 41(2): 32-38 (2024) - [e10]Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro:
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14459, Springer 2024, ISBN 978-3-031-56231-0 [contents] - [e9]Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro:
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14460, Springer 2024, ISBN 978-3-031-56234-1 [contents] - 2023
- [c138]Trevor Yap, Stjepan Picek, Shivam Bhasin:
Beyond the Last Layer: Deep Feature Loss Functions in Side-channel Analysis. ASHES@CCS 2023: 73-82 - [i94]Trevor Yap, Shivam Bhasin, Stjepan Picek:
OccPoIs: Points of Interest based on Neural Network's Key Recovery in Side-Channel Analysis through Occlusion. IACR Cryptol. ePrint Arch. 2023: 1055 (2023) - 2022
- [j28]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels. IEEE Des. Test 39(4): 7-14 (2022) - 2021
- [i50]Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek:
Explain Some Noise: Ablation Analysis for Deep Learning-based Physical Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 717 (2021) - 2020
- [c88]Daan van der Valk, Stjepan Picek, Shivam Bhasin:
Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled Side-Channel Analysis. COSADE 2020: 175-199 - [c86]Daan van der Valk, Marina Krcek, Stjepan Picek, Shivam Bhasin:
Learning From A Big Brother - Mimicking Neural Networks in Profiled Side-channel Analysis. DAC 2020: 1-6 - [c79]Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa:
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. NDSS 2020 - 2019
- [j10]Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni:
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1): 209-237 (2019) - [j9]Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic:
Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3): 148-179 (2019) - [c75]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks. CCS 2019: 2657-2659 - [c74]Stjepan Picek, Dirmanto Jap, Shivam Bhasin:
Poster: When Adversary Becomes the Guardian - Towards Side-channel Security With Adversarial Attacks. CCS 2019: 2673-2675 - [c66]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. USENIX Security Symposium 2019: 515-532 - [i21]Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa:
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. IACR Cryptol. ePrint Arch. 2019: 661 (2019) - [i17]Daan van der Valk, Stjepan Picek, Shivam Bhasin:
Kilroy was here: The First Step Towards Explainability of Neural Networks in Profiled Side-channel Analysis. IACR Cryptol. ePrint Arch. 2019: 1477 (2019) - 2018
- [c65]Zakaria Najm, Dirmanto Jap, Bernhard Jungk, Stjepan Picek, Shivam Bhasin:
On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers. APCCAS 2018: 552-555 - [c57]Stjepan Picek, Ioannis Petros Samiotis, Jaehun Kim, Annelie Heuser, Shivam Bhasin, Axel Legay:
On the Performance of Convolutional Neural Networks for Side-Channel Analysis. SPACE 2018: 157-176 - [i15]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. CoRR abs/1810.09076 (2018) - [i14]Stjepan Picek, Ioannis Petros Samiotis, Annelie Heuser, Jaehun Kim, Shivam Bhasin, Axel Legay:
On the Performance of Deep Learning for Side-channel Analysis. IACR Cryptol. ePrint Arch. 2018: 4 (2018) - [i12]Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni:
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations. IACR Cryptol. ePrint Arch. 2018: 476 (2018) - [i11]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. IACR Cryptol. ePrint Arch. 2018: 477 (2018) - [i9]Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic:
Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis. IACR Cryptol. ePrint Arch. 2018: 1023 (2018) - 2015
- [c22]Ricardo Chaves, Giorgio Di Natale, Lejla Batina, Shivam Bhasin, Baris Ege, Apostolos P. Fournaris, Nele Mentens, Stjepan Picek, Francesco Regazzoni, Vladimir Rozic, Nicolas Sklavos, Bohan Yang:
Challenges in designing trustworthy cryptographic co-processors. ISCAS 2015: 2009-2012
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-16 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint