


Остановите войну!
for scientists:


default search action
Stjepan Picek
Person information

- affiliation: Delft University of Technology, Intelligent Systems, The Netherlands
- affiliation: Radboud University, Digital Security Group, Nijmegen, The Netherlands
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j40]Suvadeep Hajra, Manaar Alam, Sayandeep Saha, Stjepan Picek, Debdeep Mukhopadhyay:
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 19: 514-528 (2024) - 2023
- [j39]Karlo Knezevic
, Juraj Fulir
, Domagoj Jakobovic
, Stjepan Picek, Marko Ðurasevic
:
NeuroSCA: Evolving Activation Functions for Side-Channel Analysis. IEEE Access 11: 284-299 (2023) - [j38]Luca Mariot
, Stjepan Picek, Radinka Yorgova:
On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight. IEEE Access 11: 43511-43519 (2023) - [j37]Guilherme Perin, Lichao Wu, Stjepan Picek
:
The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-Based SCA. Algorithms 16(3): 127 (2023) - [j36]Claude Carlet, Stjepan Picek:
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials. Adv. Math. Commun. 17(6): 1507-1525 (2023) - [j35]Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
A survey of metaheuristic algorithms for the design of cryptographic Boolean functions. Cryptogr. Commun. 15(6): 1171-1197 (2023) - [j34]Stjepan Picek
, Guilherme Perin
, Luca Mariot
, Lichao Wu
, Lejla Batina
:
SoK: Deep Learning-based Physical Side-channel Analysis. ACM Comput. Surv. 55(11): 227:1-227:35 (2023) - [j33]Maximilien Gadouleau, Luca Mariot, Stjepan Picek:
Bent functions in the partial spread class generated by linear recurring sequences. Des. Codes Cryptogr. 91(1): 63-82 (2023) - [j32]Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek
:
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis. J. Cryptogr. Eng. 13(3): 311-324 (2023) - [j31]Arthur Mercier, Nikita Smolin, Oliver Sihlovec, Stefanos Koffas
, Stjepan Picek:
Backdoor Pony: Evaluating backdoor attacks and defenses in different domains. SoftwareX 22: 101387 (2023) - [j30]Arthur Beckers
, Sylvain Guilley
, Philippe Maurine
, Colin O'Flynn, Stjepan Picek
:
(Adversarial) Electromagnetic Disturbance in the Industry. IEEE Trans. Computers 72(2): 414-422 (2023) - [j29]Lichao Wu
, Léo Weissbart, Marina Krcek
, Huimin Li, Guilherme Perin, Lejla Batina
, Stjepan Picek
:
Label Correlation in Deep Learning-Based Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 18: 3849-3861 (2023) - [c137]Trevor Yap, Stjepan Picek, Shivam Bhasin:
Beyond the Last Layer: Deep Feature Loss Functions in Side-channel Analysis. ASHES@CCS 2023: 73-82 - [c136]Marco Arazzi
, Mauro Conti
, Antonino Nocera
, Stjepan Picek
:
Turning Privacy-preserving Mechanisms against Federated Learning. CCS 2023: 1482-1495 - [c135]Xiaoyun Xu
, Stjepan Picek
:
Poster: Boosting Adversarial Robustness by Adversarial Pre-training. CCS 2023: 3540-3542 - [c134]Jing Xu
, Stjepan Picek
:
Poster: Multi-target & Multi-trigger Backdoor Attacks on Graph Neural Networks. CCS 2023: 3570-3572 - [c133]Behrad Tajalli
, Gorka Abad
, Stjepan Picek
:
Poster: Backdoor Attack on Extreme Learning Machines. CCS 2023: 3588-3590 - [c132]Huimin Li, Nele Mentens, Stjepan Picek:
Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions. DATE 2023: 1-6 - [c131]Xiaoyun Xu, Guilherme Perin, Stjepan Picek:
IB-RAR: Information Bottleneck as Regularizer for Adversarial Robustness. DSN-W 2023: 129-135 - [c130]Jing Xu
, Stefanos Koffas, Oguzhan Ersoy, Stjepan Picek:
Watermarking Graph Neural Networks based on Backdoor Attacks. EuroS&P 2023: 1179-1197 - [c129]Claude Carlet, Luca Mariot, Luca Manzoni, Stjepan Picek:
Evolutionary Strategies for the Design of Binary Linear Codes. EvoCOP 2023: 114-129 - [c128]Marko Durasevic, Domagoj Jakobovic, Luca Mariot, Sihem Mesnager, Stjepan Picek:
On the Evolution of Boomerang Uniformity in Cryptographic S-boxes. EvoApplications@EvoStar 2023: 237-252 - [c127]Mujtaba Hassan
, Arish Sateesan
, Jo Vliegen
, Stjepan Picek
, Nele Mentens
:
Evolving Non-cryptographic Hash Functions Using Genetic Programming for High-speed Lookups in Network Security Applications. EvoApplications@EvoStar 2023: 302-318 - [c126]Huimin Li, Phillip Rieger, Shaza Zeitouni, Stjepan Picek, Ahmad-Reza Sadeghi:
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning. FPL 2023: 271-276 - [c125]Marko Durasevic
, Domagoj Jakobovic
, Luca Mariot
, Stjepan Picek
:
Digging Deeper: Operator Analysis for Optimizing Nonlinearity of Boolean Functions. GECCO Companion 2023: 199-202 - [c124]Carlos A. Coello Coello
, Marko Durasevic
, Domagoj Jakobovic
, Marina Krcek
, Luca Mariot
, Stjepan Picek
:
Modeling Strong Physically Unclonable Functions with Metaheuristics. GECCO Companion 2023: 719-722 - [c123]Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti
:
Going in Style: Audio Backdoors Through Stylistic Transformations. ICASSP 2023: 1-5 - [c122]Jing Xu
, Gorka Abad, Stjepan Picek:
Rethinking the Trigger-injecting Position in Graph Backdoor Attack. IJCNN 2023: 1-8 - [c121]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. NDSS 2023 - [c120]Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi:
DARWIN: Survival of the Fittest Fuzzing Mutators. NDSS 2023 - [c119]Behrad Tajalli, Oguzhan Ersoy, Stjepan Picek:
On Feasibility of Server-side Backdoor Attacks on Split Learning. SP (Workshops) 2023: 84-93 - [e8]Jianying Zhou
, Lejla Batina
, Zengpeng Li
, Jingqiang Lin
, Eleonora Losiouk
, Suryadipta Majumdar
, Daisuke Mashima
, Weizhi Meng
, Stjepan Picek
, Mohammad Ashiqur Rahman
, Jun Shao, Masaki Shimaoka
, Ezekiel O. Soremekun
, Chunhua Su
, Je Sen Teh
, Aleksei Udovenko
, Cong Wang
, Leo Yu Zhang
, Yury Zhauniarovich
:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - [i113]Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
A Survey of Metaheuristic Algorithms for the Design of Cryptographic Boolean Functions. CoRR abs/2301.08012 (2023) - [i112]Xiaoyun Xu, Oguzhan Ersoy, Stjepan Picek:
Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks. CoRR abs/2302.00747 (2023) - [i111]Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek:
A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification. CoRR abs/2302.01740 (2023) - [i110]Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Digging Deeper: Operator Analysis for Optimizing Nonlinearity of Boolean Functions. CoRR abs/2302.05890 (2023) - [i109]Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta:
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data. CoRR abs/2302.06279 (2023) - [i108]Behrad Tajalli, Oguzhan Ersoy, Stjepan Picek:
On Feasibility of Server-side Backdoor Attacks on Split Learning. CoRR abs/2302.09578 (2023) - [i107]Xiaoyun Xu, Guilherme Perin, Stjepan Picek:
IB-RAR: Information Bottleneck as Regularizer for Adversarial Robustness. CoRR abs/2302.10896 (2023) - [i106]Jing Xu, Gorka Abad, Stjepan Picek:
Rethinking the Trigger-injecting Position in Graph Backdoor Attack. CoRR abs/2304.02277 (2023) - [i105]Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek:
Turning Privacy-preserving Mechanisms against Federated Learning. CoRR abs/2305.05355 (2023) - [i104]Huimin Li, Phillip Rieger, Shaza Zeitouni, Stjepan Picek, Ahmad-Reza Sadeghi:
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning. CoRR abs/2308.00553 (2023) - [i103]Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu:
BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks. CoRR abs/2308.02465 (2023) - [i102]Mauro Conti, Nicola Farronato, Stefanos Koffas, Luca Pajola, Stjepan Picek:
Invisible Threats: Backdoor Attack in OCR Systems. CoRR abs/2310.08259 (2023) - [i101]Yang Chen, Stjepan Picek, Zhonglin Ye, Zhaoyang Wang, Haixing Zhao:
Momentum Gradient-based Untargeted Attack on Hypergraph Neural Networks. CoRR abs/2310.15656 (2023) - [i100]Bart Pleiter, Behrad Tajalli, Stefanos Koffas, Gorka Abad, Jing Xu, Martha Larson, Stjepan Picek:
Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data. CoRR abs/2311.07550 (2023) - [i99]Claude Carlet, Marko Ðurasevic, Bruno Gasperov, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
A New Angle: On Evolving Rotation Symmetric Boolean Functions. CoRR abs/2311.11881 (2023) - [i98]Claude Carlet, Marko Ðurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Look into the Mirror: Evolving Self-Dual Bent Boolean Functions. CoRR abs/2311.11884 (2023) - [i97]Lichao Wu, Guilherme Perin, Stjepan Picek:
Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plaintext/Ciphertext. IACR Cryptol. ePrint Arch. 2023: 209 (2023) - [i96]Lichao Wu, Guilherme Perin, Stjepan Picek:
Not so Difficult in the End: Breaking the ASCADv2 Dataset. IACR Cryptol. ePrint Arch. 2023: 724 (2023) - [i95]Marina Krcek, Thomas Ordas, Stjepan Picek:
Short paper: Diversity Methods for Laser Fault Injection to Improve Location Coverage. IACR Cryptol. ePrint Arch. 2023: 893 (2023) - [i94]Trevor Yap
, Shivam Bhasin, Stjepan Picek:
OccPoIs: Points of Interest based on Neural Network's Key Recovery in Side-Channel Analysis through Occlusion. IACR Cryptol. ePrint Arch. 2023: 1055 (2023) - [i93]Marina Krcek, Lichao Wu, Guilherme Perin, Stjepan Picek:
Shift-invariance Robustness of Convolutional Neural Networks in Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1100 (2023) - [i92]Sengim Karayalcin, Marina Krcek, Lichao Wu, Stjepan Picek, Guilherme Perin:
It's a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1108 (2023) - [i91]Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek:
An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation. IACR Cryptol. ePrint Arch. 2023: 1109 (2023) - [i90]Lichao Wu, Amir Ali-pour, Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1110 (2023) - [i89]Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, Christian Rechberger:
Towards Private Deep Learning-based Side-Channel Analysis using Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 1252 (2023) - [i88]Léo Weissbart, Stjepan Picek:
Lightweight but Not Easy: Side-channel Analysis of the Ascon Authenticated Cipher on a 32-bit Microcontroller. IACR Cryptol. ePrint Arch. 2023: 1598 (2023) - [i87]Praveen Kulkarni, Vincent Verneuil, Stjepan Picek, Lejla Batina:
Order vs. Chaos: A Language Model Approach for Side-channel Attacks. IACR Cryptol. ePrint Arch. 2023: 1615 (2023) - [i86]Ioana Savu, Marina Krcek, Guilherme Perin, Lichao Wu, Stjepan Picek:
The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression. IACR Cryptol. ePrint Arch. 2023: 1681 (2023) - 2022
- [j28]Lejla Batina, Shivam Bhasin
, Dirmanto Jap
, Stjepan Picek
:
SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels. IEEE Des. Test 39(4): 7-14 (2022) - [j27]Fabio Aiolli, Mauro Conti
, Stjepan Picek, Mirko Polato:
On the feasibility of crawling-based attacks against recommender systems. J. Comput. Secur. 30(4): 599-621 (2022) - [j26]Yier Jin, Tsung-Yi Ho
, Stjepan Picek, Siddharth Garg:
Guest Editorial: Trustworthy AI. ACM J. Emerg. Technol. Comput. Syst. 18(3): 55:1-55:3 (2022) - [j25]Lichao Wu, Guilherme Perin, Stjepan Picek:
The Best of Two Worlds: Deep Learning-assisted Template Attack. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 413-437 (2022) - [j24]Guilherme Perin, Lichao Wu, Stjepan Picek:
Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 828-861 (2022) - [c118]Sudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek:
Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds. ACNS Workshops 2022: 165-182 - [c117]Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher. ACNS 2022: 809-829 - [c116]Jing Xu
, Rui Wang
, Stefanos Koffas
, Kaitai Liang
, Stjepan Picek
:
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks. ACSAC 2022: 684-698 - [c115]Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA. AFRICACRYPT 2022: 397-421 - [c114]Stefanos Koffas, Stjepan Picek, Mauro Conti
:
Dynamic Backdoors with Global Average Pooling. AICAS 2022: 320-323 - [c113]Mauro Conti
, Jiaxin Li, Stjepan Picek, Jing Xu
:
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks. AISec@CCS 2022: 1-12 - [c112]Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta:
Poster: Backdoor Attacks on Spiking NNs and Neuromorphic Datasets. CCS 2022: 3315-3317 - [c111]Jing Xu
, Stjepan Picek:
Poster: Clean-label Backdoor Attack on Graph Neural Networks. CCS 2022: 3491-3493 - [c110]Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Marko Djurasevic, Alberto Leporati:
Evolutionary Construction of Perfectly Balanced Boolean Functions. CEC 2022: 1-8 - [c109]Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek:
Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis. COSADE 2022: 29-48 - [c108]Lichao Wu, Guilherme Perin, Stjepan Picek:
On the Evaluation of Deep Learning-Based Side-Channel Analysis. COSADE 2022: 49-71 - [c107]Naila Mukhtar
, Lejla Batina, Stjepan Picek
, Yinan Kong:
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices. CT-RSA 2022: 297-321 - [c106]Huimin Li, Nele Mentens
, Stjepan Picek:
A scalable SIMD RISC-V based processor with customized vector extensions for CRYSTALS-kyber. DAC 2022: 733-738 - [c105]Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Marko Djurasevic, Alberto Leporati:
On the Difficulty of Evolving Permutation Codes. EvoApplications 2022: 141-156 - [c104]Marina Krcek, Thomas Ordas, Daniele Fronte, Stjepan Picek:
The More You Know: Improving Laser Fault Injection with Prior Knowledge. FDTC 2022: 18-29 - [c103]Claude Carlet, Domagoj Jakobovic, Stjepan Picek:
On generalizing the power function exponent constructions with genetic programming. GECCO Companion 2022: 691-694 - [c102]Claude Carlet, Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Evolving constructions for balanced, highly nonlinear boolean functions. GECCO 2022: 1147-1155 - [c101]Stjepan Picek, Domagoj Jakobovic:
Evolutionary computation and machine learning in security. GECCO Companion 2022: 1572-1601 - [c100]Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci:
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand. USENIX Security Symposium 2022: 1687-1704 - [c99]Stefanos Koffas, Jing Xu
, Mauro Conti
, Stjepan Picek:
Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers. WiseML@WiSec 2022: 57-62 - [e7]Jianying Zhou
, Sridhar Adepu
, Cristina Alcaraz
, Lejla Batina
, Emiliano Casalicchio
, Sudipta Chattopadhyay
, Chenglu Jin
, Jingqiang Lin
, Eleonora Losiouk
, Suryadipta Majumdar
, Weizhi Meng
, Stjepan Picek
, Jun Shao, Chunhua Su
, Cong Wang
, Yury Zhauniarovich
, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [e6]Lejla Batina
, Stjepan Picek
, Mainack Mondal
:
Security, Privacy, and Applied Cryptography Engineering - 11th International Conference, SPACE 2021, Kolkata, India, December 10-13, 2021, Proceedings. Lecture Notes in Computer Science 13162, Springer 2022, ISBN 978-3-030-95084-2 [contents] - [e5]Lejla Batina
, Stjepan Picek
, Mainack Mondal
:
Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings. Lecture Notes in Computer Science 13783, Springer 2022, ISBN 978-3-031-22828-5 [contents] - [e4]Lejla Batina
, Thomas Bäck
, Ileana Buhan, Stjepan Picek
:
Security and Artificial Intelligence - A Crossdisciplinary Approach. Lecture Notes in Computer Science 13049, Springer 2022, ISBN 978-3-030-98794-7 [contents] - [i85]Jing Xu, Rui Wang, Kaitai Liang, Stjepan Picek:
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks. CoRR abs/2202.03195 (2022) - [i84]Carlos A. Coello Coello, Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Modeling Strong Physically Unclonable Functions with Metaheuristics. CoRR abs/2202.08079 (2022) - [i83]Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Marko Djurasevic, Alberto Leporati:
Evolutionary Construction of Perfectly Balanced Boolean Functions. CoRR abs/2202.08221 (2022) - [i82]Claude Carlet, Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Evolving Constructions for Balanced, Highly Nonlinear Boolean Functions. CoRR abs/2202.08743 (2022) - [i81]Stefanos Koffas, Stjepan Picek, Mauro Conti:
Dynamic Backdoors with Global Average Pooling. CoRR abs/2203.02079 (2022) - [i80]Gorka Abad, Servio Paguada, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta:
Client-Wise Targeted Backdoor in Federated Learning. CoRR abs/2203.08689 (2022) - [i79]Mauro Conti, Jiaxin Li, Stjepan Picek, Jing Xu:
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks. CoRR abs/2207.13766 (2022) - [i78]Rui Wang, Xingkai Wang, Huanhuan Chen, Stjepan Picek, Zhen Liu, Kaitai Liang:
BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering. CoRR abs/2208.10161 (2022) - [i77]Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi:
DARWIN: Survival of the Fittest Fuzzing Mutators. CoRR abs/2210.11783 (2022) - [i76]Mauro Conti, Jiaxin Li, Stjepan Picek:
On the Vulnerability of Data Points under Multiple Membership Inference Attacks and Target Models. CoRR abs/2210.16258 (2022) - [i75]Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti:
Going In Style: Audio Backdoors Through Stylistic Transformations. CoRR abs/2211.03117 (2022) - [i74]Claude Carlet, Luca Mariot, Luca Manzoni, Stjepan Picek:
Evolutionary Strategies for the Design of Binary Linear Codes. CoRR abs/2211.11551 (2022) - [i73]Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Sihem Mesnager, Stjepan Picek:
On the Evolution of Boomerang Uniformity in Cryptographic S-boxes. CoRR abs/2212.04789 (2022) - [i72]Nele Mentens, Stjepan Picek, Ahmad-Reza Sadeghi:
Intelligent Security: Is "AI for Cybersecurity" a Blessing or a Curse (Dagstuhl Seminar 22412). Dagstuhl Reports 12(10): 106-128 (2022) - [i71]Marina Krcek, Thomas Ordas, Daniele Fronte, Stjepan Picek:
The More You Know: Improving Laser Fault Injection with Prior Knowledge. IACR Cryptol. ePrint Arch. 2022: 306 (2022) - [i70]Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA. IACR Cryptol. ePrint Arch. 2022: 340 (2022) - [i69]Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher. IACR Cryptol. ePrint Arch. 2022: 341 (2022) - [i68]Huimin Li, Nele Mentens, Stjepan Picek:
Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions. IACR Cryptol. ePrint Arch. 2022: 868 (2022) - [i67]Sengim Karayalcin, Stjepan Picek:
Resolving the Doubts: On the Construction and Use of ResNets for Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 963 (2022) - [i66]Guilherme Perin, Lichao Wu, Stjepan Picek:
I Know What Your Layers Did: Layer-wise Explainability of Deep Learning Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1087 (2022) - [i65]Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1507 (2022) - 2021
- [j23]Jing Xu
, Gongliu Yang
, Yiding Sun
, Stjepan Picek:
A Multi-Sensor Information Fusion Method Based on Factor Graph for Integrated Navigation System. IEEE Access 9: 12044-12054 (2021) - [j22]Domagoj Jakobovic, Stjepan Picek, Marcella S. R. Martins
, Markus Wagner
:
Toward more efficient heuristic construction of Boolean functions. Appl. Soft Comput. 107: 107327 (2021) - [j21]Luca Mariot
, Stjepan Picek, Domagoj Jakobovic, Alberto Leporati:
Evolutionary algorithms for designing reversible cellular automata. Genet. Program. Evolvable Mach. 22(4): 429-461 (2021) - [j20]Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 343-372 (2021) - [j19]Jorai Rijsdijk
, Lichao Wu, Guilherme Perin, Stjepan Picek:
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 677-707 (2021) - [c98]Stjepan Picek, Annelie Heuser, Guilherme Perin, Sylvain Guilley:
Profiled Side-Channel Analysis in the Efficient Attacker Framework. CARDIS 2021: 44-63 - [c97]Vipul Arora, Ileana Buhan, Guilherme Perin, Stjepan Picek:
A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage. CARDIS 2021: 80-96