Emil C. Lupu
Orcid: 0000-0002-2844-3917Affiliations:
- Imperial College London, UK
According to our database1,
Emil C. Lupu
authored at least 177 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on orcid.org
-
on id.loc.gov
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Hyperparameter Learning Under Data Poisoning: Analysis of the Influence of Regularization via Multiobjective Bilevel Optimization.
IEEE Trans. Neural Networks Learn. Syst., November, 2024
Which Attacks Lead to Hazards? Combining Safety and Security Analysis for Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2024
Nonideality-aware training makes memristive networks more robust to adversarial attacks.
CoRR, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Threat Modelling in Internet of Things (IoT) Environment Using Dynamic Attack Graphs.
CoRR, 2023
2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022
2021
Extracting Randomness from the Trend of IPI for Cryptographic Operations in Implantable Medical Devices.
IEEE Trans. Dependable Secur. Comput., 2021
Regularization Can Help Mitigate Poisoning Attacks... with the Right Hyperparameters.
CoRR, 2021
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021
Shadow-Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing.
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks.
Digit. Investig., 2020
GhostBuster: Looking Into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing.
CoRR, 2020
Regularisation Can Mitigate Poisoning Attacks: A Novel Analysis Based on Multiobjective Bilevel Optimisation.
CoRR, 2020
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning.
Proceedings of the NOMS 2020, 2020
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Inf. Technol. People, 2019
Universal Adversarial Perturbations to Understand Robustness of Texture vs. Shape-biased Training.
CoRR, 2019
CoRR, 2019
An Argumentation-Based Approach to Assist in the Investigation and Attribution of Cyber-Attacks.
CoRR, 2019
Proceedings of the 27th European Symposium on Artificial Neural Networks, 2019
Exploiting Correlations to Detect False Data Injections in Low-Density Wireless Sensor Networks.
Proceedings of the 5th ACM on Cyber-Physical System Security Workshop, 2019
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Determining Resilience Gains From Anomaly Detection for Event Integrity in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2018
CoRR, 2018
Extracting Randomness From The Trend of IPI for Cryptographic Operators in Implantable Medical Devices.
CoRR, 2018
Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection.
CoRR, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Helping Forensic Analysts to Attribute Cyber-Attacks: An Argumentation-Based Reasoner.
Proceedings of the PRIMA 2018: Principles and Practice of Multi-Agent Systems - 21st International Conference, Tokyo, Japan, October 29, 2018
Proceedings of the ECML PKDD 2018 Workshops, 2018
A Logic-Based Reasoner for Discovering Authentication Vulnerabilities Between Interconnected Accounts.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018
Proceedings of the Business Information Systems Workshops, 2018
2017
ACM Trans. Priv. Secur., 2017
Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2017
Unity is strength!: combining attestation and measurements inspection to handle malicious data injections in WSNs.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, 2017
Tracking the bad guys: An efficient forensic methodology to trace multi-step attacks using core attack graphs.
Proceedings of the 13th International Conference on Network and Service Management, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
Proceedings of the 2017 AAAI Fall Symposia, Arlington, Virginia, USA, November 9-11, 2017, 2017
2016
ACM Comput. Surv., 2016
Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection.
CoRR, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
2015
IEEE Trans. Netw. Serv. Manag., 2015
Federating Policy-Driven Autonomous Systems: Interaction Specification and Management Patterns.
J. Netw. Syst. Manag., 2015
ACM Comput. Surv., 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2015
Proceedings of the 7th IEEE/ACM International Workshop on Modeling in Software Engineering, 2015
2014
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014
Proceedings of the 36th International Conference on Software Engineering, 2014
Proceedings of the British Machine Vision Conference, 2014
2012
2011
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011
Proceedings of the Latest Advances in Inductive Logic Programming, 2011
Proceedings of the Inductive Logic Programming - 21st International Conference, 2011
Proceedings of the Technical Communications of the 27th International Conference on Logic Programming, 2011
Proceedings of the 2011 Imperial College Computing Student Workshop, 2011
Proceedings of the 7th International Conference on Network and Service Management, 2011
Proceedings of the Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning, 2011
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011
2010
Mobile PAES: Demonstrating Authority Devolution for Policy Evaluation in Crisis Management Scenarios.
Proceedings of the POLICY 2010, 2010
Proceedings of the POLICY 2010, 2010
Proceedings of the Technical Communications of the 26th International Conference on Logic Programming, 2010
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the Declarative Agent Languages and Technologies VIII, 2010
Proceedings of the 6th International Conference on Network and Service Management, 2010
An opportunistic authority evaluation scheme for data security in crisis management scenarios.
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the Business Process Management Workshops, 2010
2009
IEEE Trans. Netw. Serv. Manag., 2009
IEEE Trans. Netw. Serv. Manag., 2009
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009
Proceedings of the POLICY 2009, 2009
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Proceedings of the Mobile Wireless Middleware, 2009
Proceedings of the Integrated Network Management, 2009
Proceedings of the Artificial Intelligence Applications and Innovations III, 2009
Proceedings of the Architecting Dependable Systems VII, 2009
Proceedings of the Fifth International Conference on Autonomic and Autonomous Systems, 2009
Proceedings of the Data and Applications Security XXIII, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009
2008
IEEE Trans. Very Large Scale Integr. Syst., 2008
Concurr. Comput. Pract. Exp., 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Proceedings of the 6th International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC 2008), 2008
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the Resilient Networks and Services, 2008
2007
Proceedings of the First International Conference on Self-Adaptive and Self-Organizing Systems, 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007
Proceedings of the Self-Organizing Systems, Second International Workshop, 2007
Proceedings of the 4th International Workshop on Wearable and Implantable Body Sensor Networks, 2007
Proceedings of the Inter-Domain Management, 2007
Proceedings of the Inter-Domain Management, 2007
Proceedings of the Inter-Domain Management, 2007
2006
IEEE Trans. Netw. Serv. Manag., 2006
Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Proceedings of the 26th International Conference on Distributed Computing Systems Workshops (ICDCS 2006 Workshops), 2006
Proceedings of the Large Scale Management of Distributed Systems, 2006
2005
Aspects of Trusted and Secure Business-Oriented VO Management in Service Oriented Architectures.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology Workshops (CEC 2005 Workshops), 2005
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005
Proceedings of the Computer Network Security, 2005
Proceedings of the Integrated Network Management, 2005
Proceedings of the Collaborative Networks and Their Breeding Environments, 2005
A Combined Hardware-Software Architecture for Network Flow.
Proceedings of The 2005 International Conference on Engineering of Reconfigurable Systems and Algorithms, 2005
Self-Managed Cells and their Federation.
Proceedings of the Advanced Information Systems Engineering, 17th International Conference, 2005
2004
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
PONDER policy implementation and validation in a CIM and differentiated services framework.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
J. Netw. Syst. Manag., 2003
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003
Proceedings of the IEEE 14th International Symposium on Personal, 2003
Proceedings of the Field Programmable Logic and Application, 13th International Conference, 2003
Proceedings of the 11th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2003), 2003
2002
Proceedings of the 2002 Workshop on Principles of Mobile Computing, 2002
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
Proceedings of the Management Solutions for the New Communications World, 2002
Proceedings of the 2002 IEEE International Conference on Field-Programmable Technology, 2002
Workflow-Based Composition of Web-Services: A Business Model or a Programming Paradigm?
Proceedings of the 6th International Enterprise Distributed Object Computing Conference (EDOC 2002), 2002
2001
Proceedings of the Policies for Distributed Systems and Networks, 2001
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001
Proceedings of the Agent-Oriented Software Engineering II, Second International Workshop, 2001
2000
Proceedings of the 4th International Enterprise Distributed Object Computing Conference (EDOC 2000), 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
IEEE Trans. Software Eng., 1999
Proceedings of the Ninth International Workshop on Research Issues on Data Engineering: Information Technology for Virtual Enterprises, 1999
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999
Proceedings of the Active Networks, First International Working Conference, 1999
Can Corba save a fringe language from becoming obsolete?
Proceedings of the Distributed Applications and Interoperable Systems II, Second IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems, June 28, 1999
1998
1997
J. Netw. Syst. Manag., 1997
Proceedings of the Second Workshop on Role-Based Access Control, 1997
Conflict Analysis for Management Policies.
Proceedings of the Integrated Network Management V, 1997
Proceedings of the 1st International Enterprise Distributed Object Computing Conference (EDOC '97), 1997
1996
Proceedings of the 5th Workshop on Enabling Technologies, 1996
1995
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995