Mike Borowczak

Orcid: 0000-0001-9409-8245

According to our database1, Mike Borowczak authored at least 34 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants.
Cryptogr., September, 2024

SAGA: Synthesis Augmentation with Genetic Algorithms for In-Memory Sequence Optimization.
Proceedings of the 67th IEEE International Midwest Symposium on Circuits and Systems, 2024

2023
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis.
J. Cybersecur. Priv., November, 2023

Power-Based Side-Channel Attacks on Program Control Flow with Machine Learning Models.
J. Cybersecur. Priv., July, 2023

2022
Learning Privacy-Preserving Graph Convolutional Network with Partially Observed Sensitive Attributes.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

TP-NET: Training Privacy-Preserving Deep Neural Networks under Side-Channel Power Attacks.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2022

Transition Recovery Attack on Embedded State Machines Using Power Analysis.
Proceedings of the IEEE 40th International Conference on Computer Design, 2022

S*FSMs for Reduced Information Leakage: Power Side Channel Protection Through Secure Encoding.
Behavioral Synthesis for Hardware Security, 2022

2021
A Blockchain-based Carbon Credit Ecosystem.
CoRR, 2021

Stealing Machine Learning Parameters via Side Channel Power Attacks.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2021

Side-channel Leakage Assessment Metrics: A Case Study of GIFT Block Ciphers.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2021

Jangseung: A Guardian for Machine Learning Algorithms to Protect Against Poisoning Attacks.
Proceedings of the IEEE International Smart Cities Conference, 2021

Privacy-Preserving Fair Machine Learning Without Collecting Sensitive Demographic Data.
Proceedings of the International Joint Conference on Neural Networks, 2021

Comparing Ransomware using TLSH and @DisCo Analysis Frameworks.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Secure and Resilient Swarms: Autonomous Decentralized Lightweight UAVs to the Rescue.
IEEE Consumer Electron. Mag., 2020

Defensive Strategies for Autonomous Decentralized Lightweight Swarms.
Proceedings of the 10th IEEE International Conference on Consumer Electronics, 2020

Detecting DDoS Attacks Near The Edge with Router Canaries.
Proceedings of the 10th IEEE International Conference on Consumer Electronics, 2020

2019
Mitigating information leakage during critical communication using S*FSM.
IET Comput. Digit. Tech., 2019

A State Machine Encoding Methodology Against Power Analysis Attacks.
J. Electron. Test., 2019

Dynamic Anonymized Evaluation for Behavioral Continuous Authentication.
CoRR, 2019

A State Encoding Methodology for Side-Channel Security vs. Power Trade-off Exploration.
Proceedings of the 32nd International Conference on VLSI Design and 18th International Conference on Embedded Systems, 2019

Adversarial Impacts on Autonomous Decentralized Lightweight Swarms.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019

One-Class Classification to Continuously Authenticate Users Based on Keystroke Timing Dynamics.
Proceedings of the 18th IEEE International Conference On Machine Learning And Applications, 2019

2018
Designing for Security Within and Between IoT Devices.
Proceedings of the 2018 IEEE Computer Society Annual Symposium on VLSI, 2018

EVO-SCHIRP: Evolved Secure Swarm Communications.
Proceedings of the IEEE International Smart Cities Conference, 2018

Blockchain-Based Election Infrastructures.
Proceedings of the IEEE International Smart Cities Conference, 2018

Secure and Decentralized Swarm Behavior with Autonomous Agents for Smart Cities.
Proceedings of the IEEE International Smart Cities Conference, 2018

S-CHIRP: Secure communication for heterogeneous IoTs with round-robin protection.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Portable tor router: Easily enabling web privacy for consumers.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

2017
Assessing Retail Employee Risk Through Unsupervised Learning Techniques.
CoRR, 2017

2014
Enabling Side Channel Secure FSMs in the Presence of Low Power Requirements.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014

2013
Secure controllers: Requirements of S*FSM.
Proceedings of the IEEE 56th International Midwest Symposium on Circuits and Systems, 2013

2012
SDMLp: On the use of complementary Pass transistor Logic for design of DPA resistant circuits.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

2008
The Use of Device Simulation in Development of USB Storage Devices.
Proceedings of the Proceedings 41st Annual Simulation Symposium (ANSS-41 2008), 2008


  Loading...