Davy Preuveneers

Orcid: 0000-0001-6279-4430

Affiliations:
  • KU Leuven, Belgium


According to our database1, Davy Preuveneers authored at least 151 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications.
Future Internet, March, 2024

A Novel Evaluation Framework for Biometric Security: Assessing Guessing Difficulty as a Metric.
IEEE Trans. Inf. Forensics Secur., 2024

A Self-Sovereign Identity Approach to Decentralized Access Control with Transitive Delegations.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

How to Train your Antivirus: RL-based Hardening through the Problem Space.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

2023
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections.
Comput. Secur., December, 2023

Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses.
CoRR, 2023

On the Brittleness of Robust Features: An Exploratory Analysis of Model Robustness and Illusionary Robust Features.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

On the adversarial robustness of full integer quantized TinyML models at the edge.
Proceedings of the 2nd International Workshop on Middleware for the Edge, 2023

Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up Study.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Effective Machine Learning-based Access Control Administration through Unlearning.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

On the Use of AutoML for Combating Alert Fatigue in Security Operations Centers.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Mitigating undesired interactions between liveness detection components in biometric authentication.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication.
IET Biom., September, 2022

AI for Biometric Authentication Systems.
Security and Artificial Intelligence, 2022

Open-World Network Intrusion Detection.
Security and Artificial Intelligence, 2022

Machine Learning Meets Data Modification - The Potential of Pre-processing for Privacy Enchancement.
Security and Artificial Intelligence, 2022

PIVOT: Private and Effective Contact Tracing.
IEEE Internet Things J., 2022

Adaptive Malware Control: Decision-Based Attacks in the Problem Space of Dynamic Analysis.
Proceedings of the WoRMA@AsiaCCS 2022: Proceedings of the 1st Workshop on Robust Malware Analysis, 2022

OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Captcha me if you can: Imitation Games with Reinforcement Learning.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Applying Machine Learning to use security oracles: a case study in virus and malware detection.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication.
Proceedings of the IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022

Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence.
J. Cybersecur. Priv., February, 2021

On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication.
IEEE Trans. Inf. Forensics Secur., 2021

Towards trustworthy Cyber-physical Production Systems: A dynamic agent accountability approach.
J. Ambient Intell. Smart Environ., 2021

Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom.
Inf. Syst. Frontiers, 2021

AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021

Gait Authentication based on Spiking Neural Networks.
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021

2020
Resource Usage and Performance Trade-offs for Machine Learning Models in Smart Environments.
Sensors, 2020

Distributed Security Framework for Reliable Threat Intelligence Sharing.
Secur. Commun. Networks, 2020

Automated Configuration of NoSQL Performance and Scalability Tactics for Data-Intensive Applications.
Informatics, 2020

Striking the Balance: Effective yet Privacy Friendly Contact Tracing.
IACR Cryptol. ePrint Arch., 2020

A Comprehensive Feature Comparison Study of Open-Source Container Orchestration Frameworks.
CoRR, 2020

A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

A Siamese Adversarial Anonymizer for Data Minimization in Biometric Applications.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
A Systematic Comparison of Age and Gender Prediction on IMU Sensor-Based Gait Traces.
Sensors, 2019

Internet of Things for enabling smart environments: A technology-centric perspective.
J. Ambient Intell. Smart Environ., 2019

Smart Cyber-Physical System applications in production and logistics: special issue editorial.
Int. J. Comput. Integr. Manuf., 2019

Special Issue: Big Data for context-aware applications and intelligent environments.
Future Gener. Comput. Syst., 2019

Detection of algorithmically generated domain names used by botnets: a dual arms race.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Data Privatizer for Biometric Applications and Online Identity Management.
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019

PPG<sup>2</sup>Live: Using dual PPG for active authentication and liveness detection.
Proceedings of the 2019 International Conference on Biometrics, 2019

TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

AutoAttacker: A reinforcement learning approach for black-box adversarial attacks.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge Microservices.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

Edge-Based and Privacy-Preserving Multi-Modal Monitoring of Student Engagement in Online Learning Environments.
Proceedings of the 3rd IEEE International Conference on Edge Computing, 2019

2018
Managing distributed trust relationships for multi-modal authentication.
J. Inf. Secur. Appl., 2018

Policy reconciliation for access control in dynamic cross-enterprise collaborations.
Enterp. Inf. Syst., 2018

K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact).
Dagstuhl Artifacts Ser., 2018

Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities.
CoRR, 2018

Fishy Faces: Crafting Adversarial Images to Poison Face Authentication.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

Automated Website Fingerprinting through Deep Learning.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Robust Digital Twin Compositions for Industry 4.0 Smart Manufacturing Systems.
Proceedings of the 22nd IEEE International Enterprise Distributed Object Computing Workshop, 2018

Gait template protection using HMM-UBM.
Proceedings of the 2018 International Conference of the Biometrics Special Interest Group, 2018

2017
A Survey on Applying Machine Learning Techniques for Behavioral Awareness.
Proceedings of the State of the Art in AI Applied to Ambient Intelligence, 2017

Leveraging Battery Usage from Mobile Devices for Active Authentication.
Mob. Inf. Syst., 2017

QoC<sup>2</sup> Breaker: intelligent software circuit breakers for fault-tolerant distributed context-aware applications.
J. Reliab. Intell. Environ., 2017

The intelligent industry of the future: A survey on emerging trends, research challenges and opportunities in Industry 4.0.
J. Ambient Intell. Smart Environ., 2017

Introduction to the thematic issue on Intelligent systems, applications and environments for the industry of the future.
J. Ambient Intell. Smart Environ., 2017

Trustworthy data-driven networked production for customer-centric plants.
Ind. Manag. Data Syst., 2017

Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows.
Future Internet, 2017

Automated Feature Extraction for Website Fingerprinting through Deep Learning.
CoRR, 2017

Privacy-Preserving Behavioral Authentication on Smartphones.
Proceedings of the First International Workshop on Human-centered Sensing, 2017

Identity management for cyber-physical production workflows and individualized manufacturing in industry 4.0.
Proceedings of the Symposium on Applied Computing, 2017

Enhanced fraud detection as a service supporting merchant-specific runtime customization.
Proceedings of the Symposium on Applied Computing, 2017

A dynamic decision fusion middleware for trustworthy context-aware IoT applications.
Proceedings of the 4th Workshop on Middleware and Applications for the Internet of Things, 2017

Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Quality Parameters as Modeling Language Abstractions for Context-Aware Applications: An AAL Case Study.
Proceedings of the Modeling and Using Context, 2017

2016
Systematic scalability assessment for feature oriented multi-tenant services.
J. Syst. Softw., 2016

Semantic analysis and verification of context-driven adaptive applications in intelligent environments.
J. Reliab. Intell. Environ., 2016

Security and privacy controls for streaming data in extended intelligent environments.
J. Ambient Intell. Smart Environ., 2016

SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments.
J. Ambient Intell. Smart Environ., 2016

A model-driven approach for quality of context in pervasive systems.
Comput. Electr. Eng., 2016

Privacy-enabled remote health monitoring applications for resource constrained wearable devices.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

CEML: Mixing and moving complex event processing and machine learning to the edge of the network for IoT applications.
Proceedings of the 6th International Conference on the Internet of Things, 2016

Data Protection Compliance Regulations and Implications for Smart Factories of the Future.
Proceedings of the 12th International Conference on Intelligent Environments, 2016

Adaptive Dissemination for Mobile Electronic Health Record Applications with Proactive Situational Awareness.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Feature-Based Variability Management for Scalable Enterprise Applications: Experiences with an E-Payment Case.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

MAsCOT: Self-Adaptive Opportunistic Offloading for Cloud-Enabled Smart Mobile Applications with Probabilistic Graphical Models at Runtime.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

2015
SmartAuth: dynamic context fingerprinting for continuous user authentication.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

To cloud or not to cloud: a context-aware deployment perspective of augmented reality mobile applications.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

PRISM: Policy-driven Risk-based Implicit locking for improving the Security of Mobile end-user devices.
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015

Change Impact Analysis for Context-Aware Applications in Intelligent Environments.
Proceedings of the Workshop Proceedings of the 11th International Conference on Intelligent Environments, 2015

SparkXS: Efficient Access Control for Intelligent and Large-Scale Streaming Data Applications.
Proceedings of the 2015 International Conference on Intelligent Environments, 2015

Mobile device fingerprinting considered harmful for risk-based authentication.
Proceedings of the Eighth European Workshop on System Security, 2015

2014
Learning distributed deployment and configuration trade-offs for context-aware applications in Intelligent Environments.
J. Ambient Intell. Smart Environ., 2014

Analyzing the efficiency of context-based grouping on collaboration in VANETs with large-scale simulation.
J. Ambient Intell. Humaniz. Comput., 2014

Scalar: A Distributed Scalability Analysis Framework.
Proceedings of the Quantitative Evaluation of Systems - 11th International Conference, 2014

Federated Privileged Identity Management for Break-the-Glass: A Case Study with OpenAM.
Proceedings of the 2nd European Workshop on Practical Aspects of Health Informatics, 2014

Design for Failure: Intelligent Systems Learning from Their Mistakes.
Proceedings of the Workshop Proceedings of the 10th International Conference on Intelligent Environments, Shanghai, China, June 30, 2014

SAMURAI: A Streaming Multi-tenant Context-Management Architecture for Intelligent and Scalable Internet of Things Applications.
Proceedings of the 2014 International Conference on Intelligent Environments, Shanghai, China, June 30, 2014

Scalability Analysis of the OpenAM Access Control System with the Universal Scalability Law.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

Scalar: Systematic Scalability Analysis with the Universal Scalability Law.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

Enabling Self-learning in Dynamic and Open IoT Environments.
Proceedings of the 5th International Conference on Ambient Systems, 2014

A Quality-aware Federated Framework for Smart Mobile Applications in the Cloud.
Proceedings of the 5th International Conference on Ambient Systems, 2014

Event Quality Awareness for Contextualized Decision Support in e-Health Applications.
Proceedings of the Context in Computing, 2014

A Bayesian Framework for Life-Long Learning in Context-Aware Mobile Applications.
Proceedings of the Context in Computing, 2014

2013
Introduction to the thematic issue.
J. Ambient Intell. Smart Environ., 2013

A Loosely Coupled and Distributed Bayesian Framework for Multi-context Recognition in Dynamic Ubiquitous Environments.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Types in Their Prime: Sub-typing of Data in Resource Constrained Environments.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

Walking in the Clouds: Deployment and Performance Trade-Offs of Smart Mobile Applications for Intelligent Environments.
Proceedings of the 9th International Conference on Intelligent Environments, 2013

Efficient Synchronization for Stencil Computations Using Dynamic Task Graphs.
Proceedings of the International Conference on Computational Science, 2013

Learning Deployment Trade-offs for Self-Optimization of Internet of Things Applications.
Proceedings of the 10th International Conference on Autonomic Computing, 2013

The Future of Mobile E-health Application Development: Exploring HTML5 for Context-aware Diabetes Monitoring.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013

A Modular and Distributed Bayesian Framework for Activity Recognition in Dynamic Smart Environments.
Proceedings of the Ambient Intelligence - 4th International Joint Conference, 2013

2012
Towards energy-aware semantic publish/subscribe for wireless embedded systems.
EAI Endorsed Trans. Ubiquitous Environ., 2012

A reconfigurable component model with semantic type system for dynamic WSN applications.
J. Internet Serv. Appl., 2012

Introduction to the thematic issue.
J. Ambient Intell. Smart Environ., 2012

A survey of software engineering best practices for the development of smart applications in Ambient Intelligence.
J. Ambient Intell. Smart Environ., 2012

Memory and communication driven spatio-temporal scheduling on MPSoCs.
Proceedings of the 25th Symposium on Integrated Circuits and Systems Design, 2012

Consistency in Context-Aware Behavior: a Model Checking Approach.
Proceedings of the Workshop Proceedings of the 8th International Conference on Intelligent Environments, 2012

Intelligent Widgets for Intuitive Interaction and Coordination in Smart Home Environments.
Proceedings of the 2012 Eighth International Conference on Intelligent Environments, 2012

Complex Event Processing for Situational Awareness.
Proceedings of the 12th International Conference on Innovative Internet Community Systems (I<sup>2</sup>CS 2012), 2012

Behavior Modeling and Recognition Methods to Facilitate Transitions between Application-Specific Personalized Assistance Systems.
Proceedings of the Ambient Intelligence - Third International Joint Conference, 2012

2011
Teamwork on the Road: Efficient Collaboration in VANETs with Context-based Grouping.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

Evaluation framework for adaptive context-aware routing in large scale mobile peer-to-peer systems.
Peer-to-Peer Netw. Appl., 2011

Formal modelling, knowledge representation and reasoning for design and development of user-centric pervasive software: a meta-review.
Int. J. Metadata Semant. Ontologies, 2011

When efficiency matters: Towards quality of context-aware peers for adaptive communication in VANETs.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2011

SAMOSA: Scratchpad aware mapping of streaming applications.
Proceedings of the 2011 International Symposium on System on Chip, 2011

A DSL for Context Quality Modeling in Context-Aware Applications.
Proceedings of the Ambient Intelligence - Software and Applications, 2011

A Notion of Event Quality for Contextualized Planning and Decision Support Systems.
Proceedings of the Modeling and Using Context, 2011

2010
Context-driven migration and diffusion of pervasive services on the OSGi framework.
Int. J. Auton. Adapt. Commun. Syst., 2010

Where people and cars meet: social interactions to improve information sharing in large scale vehicular networks.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Context-aware optimized information dissemination in large scale vehicular networks.
Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, 2010

μC-SemPS: Energy-Efficient Semantic Publish/Subscribe for Battery-Powered Systems.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

Optimizing information dissemination in large scale mobile peer-to-peer networks using context-based grouping.
Proceedings of the 13th International IEEE Conference on Intelligent Transportation Systems, 2010

A User-Oriented and Context-Aware Service Orchestration Framework for Dynamic Home Automation Systems.
Proceedings of the Ambient Intelligence and Future Trends, 2010

An Intelligent Domotics System to Automate User Actions.
Proceedings of the Ambient Intelligence and Future Trends, 2010

Geo-Social Interaction: Context-Aware Help in Large Scale Public Spaces.
Proceedings of the Ambient Intelligence, 2010

2009
Modeling Human Actors in an Intelligent Automated Warehouse.
Proceedings of the Digital Human Modeling, 2009

Context-Aware Adaptation in an Ecology of Applications.
Proceedings of the Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability, 2009

2008
EASY: Efficient semAntic Service discoverY in pervasive computing environments with QoS and context support.
J. Syst. Softw., 2008

Encoding Semantic Awareness in Resource-Constrained Devices.
IEEE Intell. Syst., 2008

Pervasive Services on the Move: Smart Service Diffusion on the OSGi Framework.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Adaptive context mediation in dynamic and large scale vehicular networks using relevance backpropagation.
Proceedings of the 5th International Conference on Mobile Technology, 2008

Architectural styles for opportunistic mobile communication: requirements and design patterns.
Proceedings of the 5th International Conference on Mobile Technology, 2008

Mobile phones assisting with health self-care: a diabetes case study.
Proceedings of the 10th Conference on Human-Computer Interaction with Mobile Devices and Services, 2008

2007
Towards context-aware and resource-driven self-adaptation for mobile handheld applications.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Architectural Backpropagation Support for Managing Ambiguous Context in Smart Environments.
Proceedings of the Universal Access in Human-Computer Interaction. Ambient Interaction, 2007

Comparative Evaluation of Converged Service-Oriented Architectures.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
.NET Remoting and Web Services: A Lightweight Bridge between the .NET By.
J. Object Technol., 2006

Multi-dimensional Dependency and Conflict Resolution for Self-adaptable Context-aware Systems.
Proceedings of the 2006 International Conference on Autonomic and Autonomous Systems (ICAS 2006), 2006

Quality Extensions and Uncertainty Handling for Context Ontologies.
Proceedings of the 2nd International Workshop on Contexts and Ontologies: Theory, 2006

2005
Semantic and Syntactic modeling of component-based services for context-aware pervasive systems using OWL-S.
Proceedings of the First International Workshop on Managing Context Information in Mobile and Pervasive Environments May 9, 2005

Adaptive Context Management Using a Component-Based Approach.
Proceedings of the Distributed Applications and Interoperable Systems, 2005

2004
Suitability of Existing Service Discovery Protocols for Mobile Users in an Ambient Intelligence Environment.
Proceedings of the International Conference on Wireless Networks, 2004

Towards an Extensible Context Ontology for Ambient Intelligence.
Proceedings of the Ambient Intelligence: Second European Symposium, 2004


  Loading...