default search action
Stjepan Picek
Person information
- affiliation: Delft University of Technology, Intelligent Systems, The Netherlands
- affiliation: Radboud University, Digital Security Group, Nijmegen, The Netherlands
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j46]Marko Durasevic, Domagoj Jakobovic, Stjepan Picek, Luca Mariot:
Assessing the Ability of Genetic Programming for Feature Selection in Constructing Dispatching Rules for Unrelated Machine Environments. Algorithms 17(2): 67 (2024) - [j45]Mujtaba Hassan, Arish Sateesan, Jo Vliegen, Stjepan Picek, Nele Mentens:
A Genetic Programming approach for hardware-oriented hash functions for network security applications. Appl. Soft Comput. 165: 112078 (2024) - [j44]Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni:
Tipping the Balance: Imbalanced Classes in Deep-Learning Side-Channel Analysis. IEEE Des. Test 41(2): 32-38 (2024) - [j43]Domagoj Jakobovic, Marko Durasevic, Stjepan Picek, Bruno Gasperov:
ECF: A C++ framework for evolutionary computation. SoftwareX 27: 101640 (2024) - [j42]Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek:
Ablation Analysis for Multi-Device Deep Learning-Based Physical Side-Channel Analysis. IEEE Trans. Dependable Secur. Comput. 21(3): 1331-1341 (2024) - [j41]Lichao Wu, Guilherme Perin, Stjepan Picek:
I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis. IEEE Trans. Emerg. Top. Comput. 12(2): 546-557 (2024) - [j40]Suvadeep Hajra, Manaar Alam, Sayandeep Saha, Stjepan Picek, Debdeep Mukhopadhyay:
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 19: 514-528 (2024) - [c154]Zihao Xu, Yi Liu, Gelei Deng, Yuekang Li, Stjepan Picek:
A Comprehensive Study of Jailbreak Attack versus Defense for Large Language Models. ACL (Findings) 2024: 7432-7449 - [c153]Asmita Adhikary, Abraham Basurto, Lejla Batina, Ileana Buhan, Joan Daemen, Silvia Mella, Nele Mentens, Stjepan Picek, Durga Lakshmi Ramachandran, Abolfazl Sajadi, Todor Stefanov, Dennis Vermoen, Nusa Zidaric:
PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market. ARC 2024: 255-266 - [c152]Ioana Savu, Marina Krcek, Guilherme Perin, Lichao Wu, Stjepan Picek:
The Need for MORE: Unsupervised Side-Channel Analysis with Single Network Training and Multi-output Regression. COSADE 2024: 113-132 - [c151]Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, Christian Rechberger:
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption - Opportunities and Limitations. COSADE 2024: 133-154 - [c150]Omid Bazangani, Parisa Amiri-Eliasi, Stjepan Picek, Lejla Batina:
Can Machine Learn Pipeline Leakage? DATE 2024: 1-6 - [c149]Parisa Amiri-Eliasi, Silvia Mella, Léo Weissbart, Lejla Batina, Stjepan Picek:
Xoodyak Under SCA Siege. DDECS 2024: 61-66 - [c148]Xiaoyun Xu, Oguzhan Ersoy, Behrad Tajalli, Stjepan Picek:
Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks. DSN-W 2024: 66-73 - [c147]Claude Carlet, Marko Durasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Look into the Mirror: Evolving Self-dual Bent Boolean Functions. EuroGP 2024: 161-175 - [c146]Claude Carlet, Marko Durasevic, Bruno Gasperov, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
A New Angle: On Evolving Rotation Symmetric Boolean Functions. EvoApplications@EvoStar 2024: 287-302 - [c145]Claude Carlet, Marko Durasevic, Domagoj Jakobovic, Stjepan Picek:
On the Evolution of Boolean Functions with the Algebraic Normal Form Representation. GECCO Companion 2024: 639-642 - [c144]Mujtaba Hassan, Jo Vliegen, Stjepan Picek, Nele Mentens:
A Systematic Exploration of Evolutionary Computation for the Design of Hardware-oriented Non-cryptographic Hash Functions. GECCO 2024 - [c143]Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta:
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data. NDSS 2024 - [c142]Claude Carlet, Marko Ðurasevic, Domagoj Jakobovic, Stjepan Picek:
Discovering Rotation Symmetric Self-dual Bent Functions with Evolutionary Algorithms. PPSN (4) 2024: 429-445 - [c141]Christina Kreza, Stefanos Koffas, Behrad Tajalli, Mauro Conti, Stjepan Picek:
Backdoors on Manifold Learning. WiseML@WiSec 2024: 1-7 - [c140]Coen Schoof, Stefanos Koffas, Mauro Conti, Stjepan Picek:
Beyond PhantomSponges: Enhancing Sponge Attack on Object Detection Models. WiseML@WiSec 2024: 14-19 - [e10]Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro:
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14459, Springer 2024, ISBN 978-3-031-56231-0 [contents] - [e9]Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro:
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14460, Springer 2024, ISBN 978-3-031-56234-1 [contents] - [i127]Gorka Abad, Stjepan Picek, Aitor Urbieta:
Time-Distributed Backdoor Attacks on Federated Spiking Learning. CoRR abs/2402.02886 (2024) - [i126]Jona te Lintelo, Stefanos Koffas, Stjepan Picek:
The SpongeNet Attack: Sponge Weight Poisoning of Deep Neural Networks. CoRR abs/2402.06357 (2024) - [i125]Claude Carlet, Marko Ðurasevic, Domagoj Jakobovic, Stjepan Picek, Luca Mariot:
A Systematic Evaluation of Evolving Highly Nonlinear Boolean Functions in Odd Sizes. CoRR abs/2402.09937 (2024) - [i124]Zihao Xu, Yi Liu, Gelei Deng, Yuekang Li, Stjepan Picek:
LLM Jailbreak Attack versus Defense Techniques - A Comprehensive Study. CoRR abs/2402.13457 (2024) - [i123]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. CoRR abs/2403.15052 (2024) - [i122]Marco Arazzi, Stefanos Koffas, Antonino Nocera, Stjepan Picek:
Let's Focus: Focused Backdoor Attack against Federated Transfer Learning. CoRR abs/2404.19420 (2024) - [i121]Simen Gaure, Stefanos Koffas, Stjepan Picek, Sondre Rønjom:
L2 · M = C2 Large Language Models as Covert Channels... a Systematic Analysis. CoRR abs/2405.15652 (2024) - [i120]Xiaoyun Xu, Zhuoran Liu, Stefanos Koffas, Shujian Yu, Stjepan Picek:
BAN: Detecting Backdoors Activated by Adversarial Neuron Noise. CoRR abs/2405.19928 (2024) - [i119]Zihao Xu, Yi Liu, Gelei Deng, Kailong Wang, Yuekang Li, Ling Shi, Stjepan Picek:
Continuous Embedding Attacks via Clipped Inputs in Jailbreaking Large Language Models. CoRR abs/2407.13796 (2024) - [i118]Coen Schoof, Stefanos Koffas, Mauro Conti, Stjepan Picek:
EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody. CoRR abs/2408.01178 (2024) - [i117]Sengim Karayalcin, Guilherme Perin, Stjepan Picek:
Diffuse Some Noise: Diffusion Models for Measurement Noise Removal in Side-channel Analysis. IACR Cryptol. ePrint Arch. 2024: 966 (2024) - [i116]David Gérault, Anna Hambitzer, Moritz Huppert, Stjepan Picek:
SoK: 5 Years of Neural Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2024: 1300 (2024) - 2023
- [j39]Karlo Knezevic, Juraj Fulir, Domagoj Jakobovic, Stjepan Picek, Marko Ðurasevic:
NeuroSCA: Evolving Activation Functions for Side-Channel Analysis. IEEE Access 11: 284-299 (2023) - [j38]Luca Mariot, Stjepan Picek, Radinka Yorgova:
On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight. IEEE Access 11: 43511-43519 (2023) - [j37]Guilherme Perin, Lichao Wu, Stjepan Picek:
The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-Based SCA. Algorithms 16(3): 127 (2023) - [j36]Claude Carlet, Stjepan Picek:
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials. Adv. Math. Commun. 17(6): 1507-1525 (2023) - [j35]Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
A survey of metaheuristic algorithms for the design of cryptographic Boolean functions. Cryptogr. Commun. 15(6): 1171-1197 (2023) - [j34]Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina:
SoK: Deep Learning-based Physical Side-channel Analysis. ACM Comput. Surv. 55(11): 227:1-227:35 (2023) - [j33]Maximilien Gadouleau, Luca Mariot, Stjepan Picek:
Bent functions in the partial spread class generated by linear recurring sequences. Des. Codes Cryptogr. 91(1): 63-82 (2023) - [j32]Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek:
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis. J. Cryptogr. Eng. 13(3): 311-324 (2023) - [j31]Arthur Mercier, Nikita Smolin, Oliver Sihlovec, Stefanos Koffas, Stjepan Picek:
Backdoor Pony: Evaluating backdoor attacks and defenses in different domains. SoftwareX 22: 101387 (2023) - [j30]Arthur Beckers, Sylvain Guilley, Philippe Maurine, Colin O'Flynn, Stjepan Picek:
(Adversarial) Electromagnetic Disturbance in the Industry. IEEE Trans. Computers 72(2): 414-422 (2023) - [j29]Lichao Wu, Léo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
Label Correlation in Deep Learning-Based Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 18: 3849-3861 (2023) - [c139]Trevor Yap, Stjepan Picek, Shivam Bhasin:
Beyond the Last Layer: Deep Feature Loss Functions in Side-channel Analysis. ASHES@CCS 2023: 73-82 - [c138]Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek:
Turning Privacy-preserving Mechanisms against Federated Learning. CCS 2023: 1482-1495 - [c137]Xiaoyun Xu, Stjepan Picek:
Poster: Boosting Adversarial Robustness by Adversarial Pre-training. CCS 2023: 3540-3542 - [c136]Jing Xu, Stjepan Picek:
Poster: Multi-target & Multi-trigger Backdoor Attacks on Graph Neural Networks. CCS 2023: 3570-3572 - [c135]Behrad Tajalli, Gorka Abad, Stjepan Picek:
Poster: Backdoor Attack on Extreme Learning Machines. CCS 2023: 3588-3590 - [c134]Huimin Li, Nele Mentens, Stjepan Picek:
Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions. DATE 2023: 1-6 - [c133]Xiaoyun Xu, Guilherme Perin, Stjepan Picek:
IB-RAR: Information Bottleneck as Regularizer for Adversarial Robustness. DSN-W 2023: 129-135 - [c132]Jing Xu, Stefanos Koffas, Oguzhan Ersoy, Stjepan Picek:
Watermarking Graph Neural Networks based on Backdoor Attacks. EuroS&P 2023: 1179-1197 - [c131]Claude Carlet, Luca Mariot, Luca Manzoni, Stjepan Picek:
Evolutionary Strategies for the Design of Binary Linear Codes. EvoCOP 2023: 114-129 - [c130]Marko Durasevic, Domagoj Jakobovic, Luca Mariot, Sihem Mesnager, Stjepan Picek:
On the Evolution of Boomerang Uniformity in Cryptographic S-boxes. EvoApplications@EvoStar 2023: 237-252 - [c129]Mujtaba Hassan, Arish Sateesan, Jo Vliegen, Stjepan Picek, Nele Mentens:
Evolving Non-cryptographic Hash Functions Using Genetic Programming for High-speed Lookups in Network Security Applications. EvoApplications@EvoStar 2023: 302-318 - [c128]Huimin Li, Phillip Rieger, Shaza Zeitouni, Stjepan Picek, Ahmad-Reza Sadeghi:
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning. FPL 2023: 271-276 - [c127]Marko Durasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Digging Deeper: Operator Analysis for Optimizing Nonlinearity of Boolean Functions. GECCO Companion 2023: 199-202 - [c126]Carlos A. Coello Coello, Marko Durasevic, Domagoj Jakobovic, Marina Krcek, Luca Mariot, Stjepan Picek:
Modeling Strong Physically Unclonable Functions with Metaheuristics. GECCO Companion 2023: 719-722 - [c125]Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti:
Going in Style: Audio Backdoors Through Stylistic Transformations. ICASSP 2023: 1-5 - [c124]Jing Xu, Gorka Abad, Stjepan Picek:
Rethinking the Trigger-injecting Position in Graph Backdoor Attack. IJCNN 2023: 1-8 - [c123]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. NDSS 2023 - [c122]Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi:
DARWIN: Survival of the Fittest Fuzzing Mutators. NDSS 2023 - [c121]Lichao Wu, Guilherme Perin, Stjepan Picek:
Not so Difficult in the End: Breaking the Lookup Table-Based Affine Masking Scheme. SAC 2023: 82-96 - [c120]Gorka Abad, Servio Paguada, Oguzhan Ersoy, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta:
Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated Learning. SaTML 2023: 377-391 - [c119]Behrad Tajalli, Oguzhan Ersoy, Stjepan Picek:
On Feasibility of Server-side Backdoor Attacks on Split Learning. SP (Workshops) 2023: 84-93 - [e8]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - [i115]Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
A Survey of Metaheuristic Algorithms for the Design of Cryptographic Boolean Functions. CoRR abs/2301.08012 (2023) - [i114]Xiaoyun Xu, Oguzhan Ersoy, Stjepan Picek:
Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks. CoRR abs/2302.00747 (2023) - [i113]Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek:
A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification. CoRR abs/2302.01740 (2023) - [i112]Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Digging Deeper: Operator Analysis for Optimizing Nonlinearity of Boolean Functions. CoRR abs/2302.05890 (2023) - [i111]Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta:
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data. CoRR abs/2302.06279 (2023) - [i110]Behrad Tajalli, Oguzhan Ersoy, Stjepan Picek:
On Feasibility of Server-side Backdoor Attacks on Split Learning. CoRR abs/2302.09578 (2023) - [i109]Xiaoyun Xu, Guilherme Perin, Stjepan Picek:
IB-RAR: Information Bottleneck as Regularizer for Adversarial Robustness. CoRR abs/2302.10896 (2023) - [i108]Jing Xu, Gorka Abad, Stjepan Picek:
Rethinking the Trigger-injecting Position in Graph Backdoor Attack. CoRR abs/2304.02277 (2023) - [i107]Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek:
Turning Privacy-preserving Mechanisms against Federated Learning. CoRR abs/2305.05355 (2023) - [i106]Huimin Li, Phillip Rieger, Shaza Zeitouni, Stjepan Picek, Ahmad-Reza Sadeghi:
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning. CoRR abs/2308.00553 (2023) - [i105]Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu:
BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks. CoRR abs/2308.02465 (2023) - [i104]Mauro Conti, Nicola Farronato, Stefanos Koffas, Luca Pajola, Stjepan Picek:
Invisible Threats: Backdoor Attack in OCR Systems. CoRR abs/2310.08259 (2023) - [i103]Yang Chen, Stjepan Picek, Zhonglin Ye, Zhaoyang Wang, Haixing Zhao:
Momentum Gradient-based Untargeted Attack on Hypergraph Neural Networks. CoRR abs/2310.15656 (2023) - [i102]Bart Pleiter, Behrad Tajalli, Stefanos Koffas, Gorka Abad, Jing Xu, Martha A. Larson, Stjepan Picek:
Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data. CoRR abs/2311.07550 (2023) - [i101]Claude Carlet, Marko Ðurasevic, Bruno Gasperov, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
A New Angle: On Evolving Rotation Symmetric Boolean Functions. CoRR abs/2311.11881 (2023) - [i100]Claude Carlet, Marko Ðurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Look into the Mirror: Evolving Self-Dual Bent Boolean Functions. CoRR abs/2311.11884 (2023) - [i99]Matteo Gioele Collu, Tom Janssen-Groesbeek, Stefanos Koffas, Mauro Conti, Stjepan Picek:
Dr. Jekyll and Mr. Hyde: Two Faces of LLMs. CoRR abs/2312.03853 (2023) - [i98]Xiaoyun Xu, Shujian Yu, Jingzheng Wu, Stjepan Picek:
MIMIR: Masked Image Modeling for Mutual Information-based Adversarial Robustness. CoRR abs/2312.04960 (2023) - [i97]Lichao Wu, Guilherme Perin, Stjepan Picek:
Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plaintext/Ciphertext. IACR Cryptol. ePrint Arch. 2023: 209 (2023) - [i96]Lichao Wu, Guilherme Perin, Stjepan Picek:
Not so Difficult in the End: Breaking the ASCADv2 Dataset. IACR Cryptol. ePrint Arch. 2023: 724 (2023) - [i95]Marina Krcek, Thomas Ordas, Stjepan Picek:
Short paper: Diversity Methods for Laser Fault Injection to Improve Location Coverage. IACR Cryptol. ePrint Arch. 2023: 893 (2023) - [i94]Trevor Yap, Shivam Bhasin, Stjepan Picek:
OccPoIs: Points of Interest based on Neural Network's Key Recovery in Side-Channel Analysis through Occlusion. IACR Cryptol. ePrint Arch. 2023: 1055 (2023) - [i93]Marina Krcek, Lichao Wu, Guilherme Perin, Stjepan Picek:
Shift-invariance Robustness of Convolutional Neural Networks in Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1100 (2023) - [i92]Sengim Karayalcin, Marina Krcek, Lichao Wu, Stjepan Picek, Guilherme Perin:
It's a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1108 (2023) - [i91]Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek:
An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation. IACR Cryptol. ePrint Arch. 2023: 1109 (2023) - [i90]Lichao Wu, Amir Ali-pour, Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1110 (2023) - [i89]Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, Christian Rechberger:
Towards Private Deep Learning-based Side-Channel Analysis using Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 1252 (2023) - [i88]Léo Weissbart, Stjepan Picek:
Lightweight but Not Easy: Side-channel Analysis of the Ascon Authenticated Cipher on a 32-bit Microcontroller. IACR Cryptol. ePrint Arch. 2023: 1598 (2023) - [i87]Praveen Kulkarni, Vincent Verneuil, Stjepan Picek, Lejla Batina:
Order vs. Chaos: A Language Model Approach for Side-channel Attacks. IACR Cryptol. ePrint Arch. 2023: 1615 (2023) - [i86]Ioana Savu, Marina Krcek, Guilherme Perin, Lichao Wu, Stjepan Picek:
The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression. IACR Cryptol. ePrint Arch. 2023: 1681 (2023) - 2022
- [j28]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels. IEEE Des. Test 39(4): 7-14 (2022) - [j27]Fabio Aiolli, Mauro Conti, Stjepan Picek, Mirko Polato:
On the feasibility of crawling-based attacks against recommender systems. J. Comput. Secur. 30(4): 599-621 (2022) - [j26]Yier Jin, Tsung-Yi Ho, Stjepan Picek, Siddharth Garg:
Guest Editorial: Trustworthy AI. ACM J. Emerg. Technol. Comput. Syst. 18(3): 55:1-55:3 (2022) - [j25]Lichao Wu, Guilherme Perin, Stjepan Picek:
The Best of Two Worlds: Deep Learning-assisted Template Attack. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 413-437 (2022) - [j24]Guilherme Perin, Lichao Wu, Stjepan Picek:
Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 828-861 (2022) - [c118]Sudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek:
Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds. ACNS Workshops 2022: 165-182 - [c117]Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher. ACNS 2022: 809-829 - [c116]Jing Xu, Rui Wang, Stefanos Koffas, Kaitai Liang, Stjepan Picek:
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks. ACSAC 2022: 684-698 - [c115]Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA. AFRICACRYPT 2022: 397-421 - [c114]Stefanos Koffas, Stjepan Picek, Mauro Conti:
Dynamic Backdoors with Global Average Pooling. AICAS 2022: 320-323 - [c113]Mauro Conti, Jiaxin Li, Stjepan Picek, Jing Xu:
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks. AISec@CCS 2022: 1-12 - [c112]Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta:
Poster: Backdoor Attacks on Spiking NNs and Neuromorphic Datasets. CCS 2022: 3315-3317 - [c111]Jing Xu, Stjepan Picek:
Poster: Clean-label Backdoor Attack on Graph Neural Networks. CCS 2022: 3491-3493 - [c110]