Stjepan Picek
Orcid: 0000-0001-7509-4337Affiliations:
- Delft University of Technology, Intelligent Systems, The Netherlands
- Radboud University, Digital Security Group, Nijmegen, The Netherlands
According to our database1,
Stjepan Picek
authored at least 271 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
2024
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis.
IEEE Trans. Inf. Forensics Secur., 2024
I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis.
IEEE Trans. Emerg. Top. Comput., 2024
Ablation Analysis for Multi-Device Deep Learning-Based Physical Side-Channel Analysis.
IEEE Trans. Dependable Secur. Comput., 2024
IACR Cryptol. ePrint Arch., 2024
Diffuse Some Noise: Diffusion Models for Measurement Noise Removal in Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2024
Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks.
DTRAP, 2024
IEEE Des. Test, 2024
Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers.
CoRR, 2024
Continuous Embedding Attacks via Clipped Inputs in Jailbreaking Large Language Models.
CoRR, 2024
L<sup>2</sup> · M = C<sup>2</sup> Large Language Models as Covert Channels... a Systematic Analysis.
CoRR, 2024
CoRR, 2024
IACR Commun. Cryptol., 2024
A Genetic Programming approach for hardware-oriented hash functions for network security applications.
Appl. Soft Comput., 2024
Assessing the Ability of Genetic Programming for Feature Selection in Constructing Dispatching Rules for Unrelated Machine Environments.
Algorithms, 2024
Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning, 2024
Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning, 2024
Discovering Rotation Symmetric Self-dual Bent Functions with Evolutionary Algorithms.
Proceedings of the Parallel Problem Solving from Nature - PPSN XVIII, 2024
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
A Systematic Exploration of Evolutionary Computation for the Design of Hardware-oriented Non-cryptographic Hash Functions.
Proceedings of the Genetic and Evolutionary Computation Conference, 2024
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2024
Proceedings of the Applications of Evolutionary Computation - 27th European Conference, 2024
Proceedings of the Genetic Programming - 27th European Conference, 2024
Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 27th International Symposium on Design & Diagnostics of Electronic Circuits & Systems, 2024
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption - Opportunities and Limitations.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2024
PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market.
Proceedings of the Applied Reconfigurable Computing. Architectures, Tools, and Applications, 2024
Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 2024
Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 2024
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
A survey of metaheuristic algorithms for the design of cryptographic Boolean functions.
Cryptogr. Commun., December, 2023
ACM Comput. Surv., November, 2023
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis.
J. Cryptogr. Eng., September, 2023
SoftwareX, May, 2023
Algorithms, March, 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Computers, 2023
OccPoIs: Points of Interest based on Neural Network's Key Recovery in Side-Channel Analysis through Occlusion.
IACR Cryptol. ePrint Arch., 2023
An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plaintext/Ciphertext.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Lightweight but Not Easy: Side-channel Analysis of the Ascon Authenticated Cipher on a 32-bit Microcontroller.
IACR Cryptol. ePrint Arch., 2023
Towards Private Deep Learning-based Side-Channel Analysis using Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023
The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Shift-invariance Robustness of Convolutional Neural Networks in Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2023
Short paper: Diversity Methods for Laser Fault Injection to Improve Location Coverage.
IACR Cryptol. ePrint Arch., 2023
It's a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2023
Des. Codes Cryptogr., 2023
CoRR, 2023
Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data.
CoRR, 2023
BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks.
CoRR, 2023
CoRR, 2023
Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks.
CoRR, 2023
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials.
Adv. Math. Commun., 2023
IEEE Access, 2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the Companion Proceedings of the Conference on Genetic and Evolutionary Computation, 2023
Proceedings of the Companion Proceedings of the Conference on Genetic and Evolutionary Computation, 2023
Proceedings of the 33rd International Conference on Field-Programmable Logic and Applications, 2023
Evolving Non-cryptographic Hash Functions Using Genetic Programming for High-speed Lookups in Network Security Applications.
Proceedings of the Applications of Evolutionary Computation - 26th European Conference, 2023
Proceedings of the Applications of Evolutionary Computation - 26th European Conference, 2023
Proceedings of the Evolutionary Computation in Combinatorial Optimization, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, 2023
2022
Intelligent Security: Is "AI for Cybersecurity" a Blessing or a Curse (Dagstuhl Seminar 22412).
Dagstuhl Reports, October, 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
J. Comput. Secur., 2022
AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
I Know What Your Layers Did: Layer-wise Explainability of Deep Learning Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2022
Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Resolving the Doubts: On the Construction and Use of ResNets for Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels.
IEEE Des. Test, 2022
On the Vulnerability of Data Points under Multiple Membership Inference Attacks and Target Models.
CoRR, 2022
BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering.
CoRR, 2022
CoRR, 2022
Proceedings of the WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9, 2022
Proceedings of the Applications of Evolutionary Computation - 25th European Conference, 2022
Proceedings of the IEEE Congress on Evolutionary Computation, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 4th IEEE International Conference on Artificial Intelligence Circuits and Systems, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Explain Some Noise: Ablation Analysis for Deep Learning-based Physical Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices.
IACR Cryptol. ePrint Arch., 2021
A Scalable SIMD RISC-V based Processor with Customized Vector Extensions for CRYSTALS-Kyber.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Genet. Program. Evolvable Mach., 2021
Appl. Soft Comput., 2021
A Multi-Sensor Information Fusion Method Based on Factor Graph for Integrated Navigation System.
IEEE Access, 2021
Proceedings of the WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021
ReproducedPapers.org: Openly Teaching and Structuring Machine Learning Reproducibility.
Proceedings of the Reproducible Research in Pattern Recognition, 2021
On the genotype compression and expansion for evolutionary algorithms in the continuous domain.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021
Proceedings of the 18th Workshop on Fault Detection and Tolerance in Cryptography, 2021
Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2021
Proceedings of the Smart Card Research and Advanced Applications, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
J. Hardw. Syst. Secur., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis.
IACR Cryptol. ePrint Arch., 2020
The Fifth International Students' Olympiad in cryptography - NSUCRYPTO: Problems and their solutions.
Cryptologia, 2020
On the feasibility of using evolvable hardware for hardware Trojan detection and prevention.
Appl. Soft Comput., 2020
Fitness Landscape Analysis of Dimensionally-Aware Genetic Programming Featuring Feynman Equations.
Proceedings of the Parallel Problem Solving from Nature - PPSN XVI, 2020
Proceedings of the Parallel Problem Solving from Nature - PPSN XVI, 2020
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020
Proceedings of the Applications of Evolutionary Computation - 23rd European Conference, 2020
Proceedings of the Genetic Programming - 23rd European Conference, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Learning From A Big Brother - Mimicking Neural Networks in Profiled Side-channel Analysis.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
2019
IEEE Trans. Very Large Scale Integr. Syst., 2019
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Kilroy was here: The First Step Towards Explainability of Neural Networks in Profiled Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2019
Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO).
Cryptologia, 2019
CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019
Proceedings of the Genetic and Evolutionary Computation Conference, 2019
Proceedings of the Applications of Evolutionary Computation, 2019
Proceedings of the Genetic Programming - 22nd European Conference, 2019
Poster: When Adversary Becomes the Guardian - Towards Side-channel Security With Adversarial Attacks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IACR Trans. Symmetric Cryptol., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information.
IACR Cryptol. ePrint Arch., 2018
Finding short and implementation-friendly addition chains with evolutionary algorithms.
J. Heuristics, 2018
Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO.
CoRR, 2018
Proceedings of the Theory and Practice of Natural Computing - 7th International Conference, 2018
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2018
Proceedings of the Parallel Problem Solving from Nature - PPSN XV, 2018
Proceedings of the Parallel Problem Solving from Nature - PPSN XV, 2018
Proceedings of the 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2018
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018
Proceedings of the Smart Card Research and Advanced Applications, 2018
Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Immunological algorithms paradigm for construction of Boolean functions with good cryptographic properties.
Eng. Appl. Artif. Intell., 2017
Proceedings of the Simulated Evolution and Learning - 11th International Conference, 2017
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
Proceedings of the Genetic Programming Theory and Practice XV, 2017
Proceedings of the Genetic and Evolutionary Computation Conference, 2017
Proceedings of the Genetic and Evolutionary Computation Conference, 2017
Proceedings of the Genetic and Evolutionary Computation Conference, 2017
Evolutionary algorithms for the design of orthogonal latin squares based on cellular automata.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017
Proceedings of the Genetic and Evolutionary Computation Conference, 2017
Proceedings of the Genetic and Evolutionary Computation Conference, 2017
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017
Proceedings of the Computing Frontiers Conference, 2017
Proceedings of the 2017 IEEE Congress on Evolutionary Computation, 2017
Proceedings of the 2017 Workshop on Moving Target Defense, 2017
Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2017, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Evol. Comput., 2016
Appl. Soft Comput., 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Arithmetic of Finite Fields - 6th International Workshop, 2016
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
Proceedings of the Parallel Problem Solving from Nature - PPSN XIV, 2016
Proceedings of the Parallel Problem Solving from Nature - PPSN XIV, 2016
Proceedings of the 2016 on Genetic and Evolutionary Computation Conference, Denver, CO, USA, July 20, 2016
Proceedings of the Evolutionary Computation in Combinatorial Optimization, 2016
Maximal nonlinearity in balanced boolean functions with even number of inputs, revisited.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016
Proceedings of the Smart Card Research and Advanced Applications, 2016
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016
2015
Applications of Evolutionary Computation to Cryptology ; Primjene evolucijskog računarstva u kriptologiji.
PhD thesis, 2015
Evolutionary Approach for Finding Correlation Immune Boolean Functions of Order t with Minimal Hamming Weight.
Proceedings of the Theory and Practice of Natural Computing, 2015
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
Proceedings of the 38th International Convention on Information and Communication Technology, 2015
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015
Proceedings of the Genetic and Evolutionary Computation Conference, 2015
Cartesian Genetic Programming Approach for Generating Substitution Boxes of Different Sizes.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015
Proceedings of the Genetic and Evolutionary Computation Conference, 2015
Analyzing gene expression data: Fuzzy decision tree algorithm applied to the classification of cancer data.
Proceedings of the 2015 IEEE International Conference on Fuzzy Systems, 2015
Proceedings of the Genetic Programming - 18th European Conference, 2015
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015
2014
S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
Combining Evolutionary Computation and Algebraic Constructions to Find Cryptography-Relevant Boolean Functions.
Proceedings of the Parallel Problem Solving from Nature - PPSN XIII, 2014
Proceedings of the Parallel Problem Solving from Nature - PPSN XIII, 2014
Proceedings of the 37th International Convention on Information and Communication Technology, 2014
Proceedings of the 37th International Convention on Information and Communication Technology, 2014
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014
On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box.
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014
Proceedings of the Genetic and Evolutionary Computation Conference, 2014
2013
Proceedings of the Genetic and Evolutionary Computation Conference, 2013
Proceedings of the IEEE Congress on Evolutionary Computation, 2013
Proceedings of the Smart Card Research and Advanced Applications, 2013
2012
Proceedings of the 2012 Proceedings of the 35th International Convention, 2012
Proceedings of the IEEE Congress on Evolutionary Computation, 2012
2011
Evaluation of Crossover Operator Performance in Genetic Algorithms with Binary Representation.
Proceedings of the Bio-Inspired Computing and Applications, 2011