Perin, Guilherme
207  Ergebnisse:
Personensuche X
?
1

Ablation Analysis for Multi-Device Deep Learning-Based Phys..:

Wu, Lichao ; Won, Yoo-Seung ; Jap, Dirmanto...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  3 - p. 1331-1341 , 2024
 
?
2

The Need for MORE: Unsupervised Side-Channel Analysis with ..:

, In: Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science,
Savu, Ioana ; Krček, Marina ; Perin, Guilherme.. - p. 113-132 , 2024
 
?
3

Not so Difficult in the End: Breaking the Lookup Table-Base..:

, In: Selected Areas in Cryptography – SAC 2023; Lecture Notes in Computer Science,
 
?
4

One for All, All for Ascon: Ensemble-Based Deep Learning Si..:

, In: Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops,
 
?
5

I Choose You: Automated Hyperparameter Tuning for Deep Lear..:

Wu, Lichao ; Perin, Guilherme ; Picek, Stjepan
IEEE Transactions on Emerging Topics in Computing.  12 (2024)  2 - p. 546-557 , 2024
 
?
7

Label Correlation in Deep Learning-Based Side-Channel Analy..:

Wu, Lichao ; Weissbart, Léo ; Krček, Marina...
IEEE Transactions on Information Forensics and Security.  18 (2023)  - p. 3849-3861 , 2023
 
?
8

No (good) loss no gain: systematic evaluation of loss funct..:

Kerkhof, Maikel ; Wu, Lichao ; Perin, Guilherme.
Journal of Cryptographic Engineering.  13 (2023)  3 - p. 311-324 , 2023
 
?
9

IB-RAR: Information Bottleneck as Regularizer for Adversari..:

, In: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W),
Xu, Xiaoyun ; Perin, Guilherme ; Picek, Stjepan - p. 129-135 , 2023
 
?
13

Gambling for Success: The Lottery Ticket Hypothesis in Deep..:

, In: Advances in Information Security; Artificial Intelligence for Cybersecurity,
Perin, Guilherme ; Wu, Lichao ; Picek, Stjepan - p. 217-241 , 2022
 
?
14

A Tale of Two Boards: On the Influence of Microarchitecture..:

, In: Smart Card Research and Advanced Applications; Lecture Notes in Computer Science,
 
?
15

Profiled Side-Channel Analysis in the Efficient Attacker Fr..:

, In: Smart Card Research and Advanced Applications; Lecture Notes in Computer Science,
 
1-15