


Остановите войну!
for scientists:


default search action
Stjepan Picek
Person information

- affiliation: Delft University of Technology, Intelligent Systems, The Netherlands
- affiliation: Radboud University, Digital Security Group, Nijmegen, The Netherlands
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j38]Karlo Knezevic
, Juraj Fulir, Domagoj Jakobovic
, Stjepan Picek, Marko Ðurasevic
:
NeuroSCA: Evolving Activation Functions for Side-Channel Analysis. IEEE Access 11: 284-299 (2023) - [j37]Luca Mariot
, Stjepan Picek, Radinka Yorgova:
On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight. IEEE Access 11: 43511-43519 (2023) - [j36]Guilherme Perin, Lichao Wu, Stjepan Picek
:
The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-Based SCA. Algorithms 16(3): 127 (2023) - [j35]Claude Carlet, Stjepan Picek:
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials. Adv. Math. Commun. 17(6): 1507-1525 (2023) - [j34]Stjepan Picek
, Guilherme Perin
, Luca Mariot
, Lichao Wu
, Lejla Batina
:
SoK: Deep Learning-based Physical Side-channel Analysis. ACM Comput. Surv. 55(11): 227:1-227:35 (2023) - [j33]Maximilien Gadouleau, Luca Mariot, Stjepan Picek:
Bent functions in the partial spread class generated by linear recurring sequences. Des. Codes Cryptogr. 91(1): 63-82 (2023) - [j32]Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek
:
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis. J. Cryptogr. Eng. 13(3): 311-324 (2023) - [j31]Arthur Mercier, Nikita Smolin, Oliver Sihlovec, Stefanos Koffas
, Stjepan Picek:
Backdoor Pony: Evaluating backdoor attacks and defenses in different domains. SoftwareX 22: 101387 (2023) - [j30]Arthur Beckers
, Sylvain Guilley
, Philippe Maurine
, Colin O'Flynn, Stjepan Picek
:
(Adversarial) Electromagnetic Disturbance in the Industry. IEEE Trans. Computers 72(2): 414-422 (2023) - [j29]Lichao Wu
, Léo Weissbart, Marina Krcek
, Huimin Li, Guilherme Perin, Lejla Batina
, Stjepan Picek
:
Label Correlation in Deep Learning-Based Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 18: 3849-3861 (2023) - [c130]Huimin Li, Nele Mentens, Stjepan Picek:
Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions. DATE 2023: 1-6 - [c129]Xiaoyun Xu, Guilherme Perin, Stjepan Picek:
IB-RAR: Information Bottleneck as Regularizer for Adversarial Robustness. DSN-W 2023: 129-135 - [c128]Jing Xu, Stefanos Koffas, Oguzhan Ersoy, Stjepan Picek:
Watermarking Graph Neural Networks based on Backdoor Attacks. EuroS&P 2023: 1179-1197 - [c127]Claude Carlet, Luca Mariot, Luca Manzoni, Stjepan Picek:
Evolutionary Strategies for the Design of Binary Linear Codes. EvoCOP 2023: 114-129 - [c126]Marko Durasevic, Domagoj Jakobovic, Luca Mariot, Sihem Mesnager, Stjepan Picek:
On the Evolution of Boomerang Uniformity in Cryptographic S-boxes. EvoApplications@EvoStar 2023: 237-252 - [c125]Mujtaba Hassan
, Arish Sateesan
, Jo Vliegen
, Stjepan Picek
, Nele Mentens
:
Evolving Non-cryptographic Hash Functions Using Genetic Programming for High-speed Lookups in Network Security Applications. EvoApplications@EvoStar 2023: 302-318 - [c124]Marko Durasevic
, Domagoj Jakobovic
, Luca Mariot
, Stjepan Picek
:
Digging Deeper: Operator Analysis for Optimizing Nonlinearity of Boolean Functions. GECCO Companion 2023: 199-202 - [c123]Carlos A. Coello Coello
, Marko Durasevic
, Domagoj Jakobovic
, Marina Krcek
, Luca Mariot
, Stjepan Picek
:
Modeling Strong Physically Unclonable Functions with Metaheuristics. GECCO Companion 2023: 719-722 - [c122]Jing Xu, Gorka Abad, Stjepan Picek:
Rethinking the Trigger-injecting Position in Graph Backdoor Attack. IJCNN 2023: 1-8 - [c121]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. NDSS 2023 - [c120]Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi:
DARWIN: Survival of the Fittest Fuzzing Mutators. NDSS 2023 - [c119]Behrad Tajalli, Oguzhan Ersoy, Stjepan Picek:
On Feasibility of Server-side Backdoor Attacks on Split Learning. SP (Workshops) 2023: 84-93 - [i105]Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
A Survey of Metaheuristic Algorithms for the Design of Cryptographic Boolean Functions. CoRR abs/2301.08012 (2023) - [i104]Xiaoyun Xu, Oguzhan Ersoy, Stjepan Picek:
Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks. CoRR abs/2302.00747 (2023) - [i103]Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek:
A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification. CoRR abs/2302.01740 (2023) - [i102]Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Digging Deeper: Operator Analysis for Optimizing Nonlinearity of Boolean Functions. CoRR abs/2302.05890 (2023) - [i101]Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta:
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data. CoRR abs/2302.06279 (2023) - [i100]Behrad Tajalli, Oguzhan Ersoy, Stjepan Picek:
On Feasibility of Server-side Backdoor Attacks on Split Learning. CoRR abs/2302.09578 (2023) - [i99]Xiaoyun Xu, Guilherme Perin, Stjepan Picek:
IB-RAR: Information Bottleneck as Regularizer for Adversarial Robustness. CoRR abs/2302.10896 (2023) - [i98]Jing Xu, Gorka Abad, Stjepan Picek:
Rethinking the Trigger-injecting Position in Graph Backdoor Attack. CoRR abs/2304.02277 (2023) - [i97]Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek:
Turning Privacy-preserving Mechanisms against Federated Learning. CoRR abs/2305.05355 (2023) - [i96]Huimin Li, Phillip Rieger, Shaza Zeitouni, Stjepan Picek, Ahmad-Reza Sadeghi:
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning. CoRR abs/2308.00553 (2023) - [i95]Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu:
BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks. CoRR abs/2308.02465 (2023) - [i94]Lichao Wu, Guilherme Perin, Stjepan Picek:
Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plaintext/Ciphertext. IACR Cryptol. ePrint Arch. 2023: 209 (2023) - [i93]Lichao Wu, Guilherme Perin, Stjepan Picek:
Not so Difficult in the End: Breaking the ASCADv2 Dataset. IACR Cryptol. ePrint Arch. 2023: 724 (2023) - [i92]Marina Krcek, Thomas Ordas, Stjepan Picek:
Short paper: Diversity Methods for Laser Fault Injection to Improve Location Coverage. IACR Cryptol. ePrint Arch. 2023: 893 (2023) - [i91]Trevor Yap, Shivam Bhasin, Stjepan Picek:
OccPoIs: Points of Interest based on Neural Network's Key Recovery in Side-Channel Analysis through Occlusion. IACR Cryptol. ePrint Arch. 2023: 1055 (2023) - [i90]Marina Krcek, Lichao Wu, Guilherme Perin, Stjepan Picek:
Shift-invariance Robustness of Convolutional Neural Networks in Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1100 (2023) - [i89]Sengim Karayalcin, Marina Krcek, Lichao Wu, Stjepan Picek, Guilherme Perin:
It's a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1108 (2023) - [i88]Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek:
An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation. IACR Cryptol. ePrint Arch. 2023: 1109 (2023) - [i87]Lichao Wu, Amir Ali-pour, Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1110 (2023) - [i86]Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, Christian Rechberger:
Towards Private Deep Learning-based Side-Channel Analysis using Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 1252 (2023) - 2022
- [j28]Lejla Batina, Shivam Bhasin
, Dirmanto Jap
, Stjepan Picek
:
SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels. IEEE Des. Test 39(4): 7-14 (2022) - [j27]Fabio Aiolli, Mauro Conti
, Stjepan Picek, Mirko Polato:
On the feasibility of crawling-based attacks against recommender systems. J. Comput. Secur. 30(4): 599-621 (2022) - [j26]Yier Jin, Tsung-Yi Ho
, Stjepan Picek, Siddharth Garg:
Guest Editorial: Trustworthy AI. ACM J. Emerg. Technol. Comput. Syst. 18(3): 55:1-55:3 (2022) - [j25]Lichao Wu, Guilherme Perin, Stjepan Picek:
The Best of Two Worlds: Deep Learning-assisted Template Attack. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 413-437 (2022) - [j24]Guilherme Perin, Lichao Wu, Stjepan Picek:
Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 828-861 (2022) - [c118]Sudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek:
Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds. ACNS Workshops 2022: 165-182 - [c117]Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher. ACNS 2022: 809-829 - [c116]Jing Xu
, Rui Wang
, Stefanos Koffas
, Kaitai Liang
, Stjepan Picek
:
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks. ACSAC 2022: 684-698 - [c115]Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA. AFRICACRYPT 2022: 397-421 - [c114]Stefanos Koffas, Stjepan Picek, Mauro Conti
:
Dynamic Backdoors with Global Average Pooling. AICAS 2022: 320-323 - [c113]Mauro Conti
, Jiaxin Li, Stjepan Picek, Jing Xu
:
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks. AISec@CCS 2022: 1-12 - [c112]Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta:
Poster: Backdoor Attacks on Spiking NNs and Neuromorphic Datasets. CCS 2022: 3315-3317 - [c111]Jing Xu
, Stjepan Picek:
Poster: Clean-label Backdoor Attack on Graph Neural Networks. CCS 2022: 3491-3493 - [c110]Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Marko Djurasevic, Alberto Leporati:
Evolutionary Construction of Perfectly Balanced Boolean Functions. CEC 2022: 1-8 - [c109]Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek:
Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis. COSADE 2022: 29-48 - [c108]Lichao Wu, Guilherme Perin, Stjepan Picek:
On the Evaluation of Deep Learning-Based Side-Channel Analysis. COSADE 2022: 49-71 - [c107]Naila Mukhtar
, Lejla Batina, Stjepan Picek
, Yinan Kong:
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices. CT-RSA 2022: 297-321 - [c106]Huimin Li, Nele Mentens, Stjepan Picek:
A scalable SIMD RISC-V based processor with customized vector extensions for CRYSTALS-kyber. DAC 2022: 733-738 - [c105]Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Marko Djurasevic, Alberto Leporati:
On the Difficulty of Evolving Permutation Codes. EvoApplications 2022: 141-156 - [c104]Marina Krcek, Thomas Ordas, Daniele Fronte, Stjepan Picek:
The More You Know: Improving Laser Fault Injection with Prior Knowledge. FDTC 2022: 18-29 - [c103]Claude Carlet, Domagoj Jakobovic, Stjepan Picek:
On generalizing the power function exponent constructions with genetic programming. GECCO Companion 2022: 691-694 - [c102]Claude Carlet, Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Evolving constructions for balanced, highly nonlinear boolean functions. GECCO 2022: 1147-1155 - [c101]Stjepan Picek, Domagoj Jakobovic:
Evolutionary computation and machine learning in security. GECCO Companion 2022: 1572-1601 - [c100]Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci:
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand. USENIX Security Symposium 2022: 1687-1704 - [c99]Stefanos Koffas, Jing Xu
, Mauro Conti
, Stjepan Picek:
Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers. WiseML@WiSec 2022: 57-62 - [e7]Jianying Zhou
, Sridhar Adepu
, Cristina Alcaraz
, Lejla Batina
, Emiliano Casalicchio
, Sudipta Chattopadhyay
, Chenglu Jin
, Jingqiang Lin
, Eleonora Losiouk
, Suryadipta Majumdar
, Weizhi Meng
, Stjepan Picek
, Jun Shao, Chunhua Su
, Cong Wang
, Yury Zhauniarovich
, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [e6]Lejla Batina
, Stjepan Picek
, Mainack Mondal
:
Security, Privacy, and Applied Cryptography Engineering - 11th International Conference, SPACE 2021, Kolkata, India, December 10-13, 2021, Proceedings. Lecture Notes in Computer Science 13162, Springer 2022, ISBN 978-3-030-95084-2 [contents] - [e5]Lejla Batina
, Stjepan Picek
, Mainack Mondal
:
Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings. Lecture Notes in Computer Science 13783, Springer 2022, ISBN 978-3-031-22828-5 [contents] - [e4]Lejla Batina
, Thomas Bäck
, Ileana Buhan, Stjepan Picek
:
Security and Artificial Intelligence - A Crossdisciplinary Approach. Lecture Notes in Computer Science 13049, Springer 2022, ISBN 978-3-030-98794-7 [contents] - [i85]Jing Xu, Rui Wang, Kaitai Liang, Stjepan Picek:
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks. CoRR abs/2202.03195 (2022) - [i84]Carlos A. Coello Coello, Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Modeling Strong Physically Unclonable Functions with Metaheuristics. CoRR abs/2202.08079 (2022) - [i83]Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Marko Djurasevic, Alberto Leporati:
Evolutionary Construction of Perfectly Balanced Boolean Functions. CoRR abs/2202.08221 (2022) - [i82]Claude Carlet, Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Evolving Constructions for Balanced, Highly Nonlinear Boolean Functions. CoRR abs/2202.08743 (2022) - [i81]Stefanos Koffas, Stjepan Picek, Mauro Conti:
Dynamic Backdoors with Global Average Pooling. CoRR abs/2203.02079 (2022) - [i80]Gorka Abad, Servio Paguada, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta:
Client-Wise Targeted Backdoor in Federated Learning. CoRR abs/2203.08689 (2022) - [i79]Mauro Conti, Jiaxin Li, Stjepan Picek, Jing Xu:
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks. CoRR abs/2207.13766 (2022) - [i78]Rui Wang, Xingkai Wang, Huanhuan Chen, Stjepan Picek, Zhen Liu, Kaitai Liang:
BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering. CoRR abs/2208.10161 (2022) - [i77]Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi:
DARWIN: Survival of the Fittest Fuzzing Mutators. CoRR abs/2210.11783 (2022) - [i76]Mauro Conti, Jiaxin Li, Stjepan Picek:
On the Vulnerability of Data Points under Multiple Membership Inference Attacks and Target Models. CoRR abs/2210.16258 (2022) - [i75]Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti:
Going In Style: Audio Backdoors Through Stylistic Transformations. CoRR abs/2211.03117 (2022) - [i74]Claude Carlet, Luca Mariot, Luca Manzoni, Stjepan Picek:
Evolutionary Strategies for the Design of Binary Linear Codes. CoRR abs/2211.11551 (2022) - [i73]Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Sihem Mesnager, Stjepan Picek:
On the Evolution of Boomerang Uniformity in Cryptographic S-boxes. CoRR abs/2212.04789 (2022) - [i72]Nele Mentens, Stjepan Picek, Ahmad-Reza Sadeghi:
Intelligent Security: Is "AI for Cybersecurity" a Blessing or a Curse (Dagstuhl Seminar 22412). Dagstuhl Reports 12(10): 106-128 (2022) - [i71]Marina Krcek, Thomas Ordas, Daniele Fronte, Stjepan Picek:
The More You Know: Improving Laser Fault Injection with Prior Knowledge. IACR Cryptol. ePrint Arch. 2022: 306 (2022) - [i70]Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA. IACR Cryptol. ePrint Arch. 2022: 340 (2022) - [i69]Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher. IACR Cryptol. ePrint Arch. 2022: 341 (2022) - [i68]Huimin Li, Nele Mentens, Stjepan Picek:
Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions. IACR Cryptol. ePrint Arch. 2022: 868 (2022) - [i67]Sengim Karayalcin, Stjepan Picek:
Resolving the Doubts: On the Construction and Use of ResNets for Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 963 (2022) - [i66]Guilherme Perin, Lichao Wu, Stjepan Picek:
I Know What Your Layers Did: Layer-wise Explainability of Deep Learning Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1087 (2022) - [i65]Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1507 (2022) - 2021
- [j23]Jing Xu
, Gongliu Yang
, Yiding Sun
, Stjepan Picek:
A Multi-Sensor Information Fusion Method Based on Factor Graph for Integrated Navigation System. IEEE Access 9: 12044-12054 (2021) - [j22]Domagoj Jakobovic, Stjepan Picek, Marcella S. R. Martins
, Markus Wagner
:
Toward more efficient heuristic construction of Boolean functions. Appl. Soft Comput. 107: 107327 (2021) - [j21]Luca Mariot
, Stjepan Picek, Domagoj Jakobovic, Alberto Leporati:
Evolutionary algorithms for designing reversible cellular automata. Genet. Program. Evolvable Mach. 22(4): 429-461 (2021) - [j20]Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 343-372 (2021) - [j19]Jorai Rijsdijk
, Lichao Wu, Guilherme Perin, Stjepan Picek:
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 677-707 (2021) - [c98]Stjepan Picek, Annelie Heuser, Guilherme Perin, Sylvain Guilley:
Profiled Side-Channel Analysis in the Efficient Attacker Framework. CARDIS 2021: 44-63 - [c97]Vipul Arora, Ileana Buhan, Guilherme Perin, Stjepan Picek:
A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage. CARDIS 2021: 80-96 - [c96]Guilherme Perin, Ileana Buhan, Stjepan Picek:
Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis. COSADE 2021: 53-81 - [c95]Marina Krcek, Daniele Fronte, Stjepan Picek:
On the Importance of Initial Solutions Selection in Fault Injection. FDTC 2021: 1-12 - [c94]Claude Carlet, Domagoj Jakobovic, Stjepan Picek:
Evolutionary algorithms-assisted construction of cryptographic boolean functions. GECCO 2021: 565-573 - [c93]Domagoj Jakobovic, Luca Manzoni, Luca Mariot, Stjepan Picek, Mauro Castelli
:
CoInGP: convolutional inpainting with genetic programming. GECCO 2021: 795-803 - [c92]Stjepan Picek, Domagoj Jakobovic:
Evolutionary computation and machine learning in cryptology. GECCO Companion 2021: 1089-1118 - [c91]Lucija Planinic, Marko Djurasevic, Luca Mariot, Domagoj Jakobovic, Stjepan Picek, Carlos A. Coello Coello:
On the genotype compression and expansion for evolutionary algorithms in the continuous domain. GECCO Companion 2021: 1208-1216 - [c90]Burak Yildiz
, Hayley Hung, Jesse H. Krijthe
, Cynthia C. S. Liem
, Marco Loog
, Gosia Migut, Frans A. Oliehoek
, Annibale Panichella
, Przemyslaw Pawelczak
, Stjepan Picek
, Mathijs de Weerdt
, Jan van Gemert
:
ReproducedPapers.org: Openly Teaching and Structuring Machine Learning Reproducibility. RRPR 2021: 3-11 - [c89]Jing Xu
, Minhui Xue, Stjepan Picek:
Explainability-based Backdoor Attacks Against Graph Neural Networks. WiseML@WiSec 2021: 31-36 - [p1]Lejla Batina, Milena Djukanovic, Annelie Heuser, Stjepan Picek:
It Started with Templates: The Future of Profiling in Side-Channel Analysis. Security of Ubiquitous Computing Systems 2021: 133-145 - [e3]Jianying Zhou
, Chuadhry Mujeeb Ahmed
, Lejla Batina
, Sudipta Chattopadhyay
, Olga Gadyatskaya
, Chenglu Jin
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Mihalis Maniatakos
, Daisuke Mashima
, Weizhi Meng
, Stjepan Picek
, Masaki Shimaoka
, Chunhua Su
, Cong Wang
:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [i64]Jing Xu, Minhui Xue, Stjepan Picek:
Explainability-based Backdoor Attacks Against Graph Neural Networks. CoRR abs/2104.03674 (2021) - [i63]Lucija Planinic, Marko Djurasevic, Luca Mariot, Domagoj Jakobovic, Stjepan Picek, Carlos A. Coello Coello:
On the Genotype Compression and Expansion for Evolutionary Algorithms in the Continuous Domain. CoRR abs/2105.11502 (2021) - [i62]Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Alberto Leporati:
Evolutionary Algorithms for Designing Reversible Cellular Automata. CoRR abs/2105.12039 (2021) - [i61]Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek:
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers. CoRR abs/2107.14569 (2021) - [i60]Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci:
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand. CoRR abs/2110.08113 (2021) - [i59]Jing Xu, Stjepan Picek:
Watermarking Graph Neural Networks based on Backdoor Attacks. CoRR abs/2110.11024 (2021)