Alexandra Dmitrienko
Orcid: 0000-0001-5637-7016Affiliations:
- University of Würzburg, Institute of Computer Science, Germany
According to our database1,
Alexandra Dmitrienko
authored at least 76 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Emerg. Top. Comput., 2024
SPOQchain: Platform for Secure, Scalable, and Privacy-Preserving Supply Chain Tracing and Counterfeit Protection.
CoRR, 2024
Time-Aware Face Anti-Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning.
CoRR, 2024
CoRR, 2024
ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on Transposed Model Training.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations.
ACM Trans. Priv. Secur., 2023
CoRR, 2023
G-Scan: Graph Neural Networks for Line-Level Vulnerability Identification in Smart Contracts.
CoRR, 2023
CoRR, 2023
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive Attackers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Close the Gate: Detecting Backdoored Models in Federated Learning based on Client-Side Deep Layer Output Analysis.
CoRR, 2022
IEEE Access, 2022
An Experience Report on the Suitability of a Distributed Group Encryption Scheme for an IoT Use Case.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022
SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Proceedings of the 5th Conference on Cloud and Internet of Things, 2022
2021
ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning.
CoRR, 2021
Towards a Group Encryption Scheme Benchmark: A View on Centralized Schemes with Focus on IoT.
Proceedings of the ICPE '21: ACM/SPEC International Conference on Performance Engineering, 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the IEEE International Performance, 2021
Proceedings of the IEEE International Performance, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Evaluating the Performance of a State-of-the-Art Group-oriented Encryption Scheme for Dynamic Groups in an IoT Scenario.
Proceedings of the 28th International Symposium on Modeling, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
Hands Off my Database: Ransomware Detection in Databases through Dynamic Analysis of Query Sequences.
CoRR, 2019
DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
SmarTor: Smarter Tor with Smart Contracts: Improving resilience of topology distribution in the Tor network.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proc. Priv. Enhancing Technol., 2017
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
CoRR, 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2015
Proceedings of the Financial Cryptography and Data Security, 2015
2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
2013
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02341-5, 2013
Do I know you? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
IACR Cryptol. ePrint Arch., 2013
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
2011
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the SPSM'11, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
A Security Architecture for Accessing Health Records on Mobile Phones.
Proceedings of the HEALTHINF 2011, 2011
Proceedings of the Biomedical Engineering Systems and Technologies, 2011
2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the Trusted Systems, First International Conference, 2009