Picek, Stjepan
288  Ergebnisse:
Personensuche X
?
1

I Choose You: Automated Hyperparameter Tuning for Deep Lear..:

Wu, Lichao ; Perin, Guilherme ; Picek, Stjepan
IEEE Transactions on Emerging Topics in Computing.  12 (2024)  2 - p. 546-557 , 2024
 
?
2

On the Instability of Softmax Attention-Based Deep Learning..:

Hajra, Suvadeep ; Alam, Manaar ; Saha, Sayandeep..
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 514-528 , 2024
 
?
3

A New Angle: On Evolving Rotation Symmetric Boolean Functio..:

, In: Applications of Evolutionary Computation; Lecture Notes in Computer Science,
Carlet, Claude ; Durasevic, Marko ; Gasperov, Bruno... - p. 287-302 , 2024
 
?
6

Ablation Analysis for Multi-Device Deep Learning-Based Phys..:

Wu, Lichao ; Won, Yoo-Seung ; Jap, Dirmanto...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  3 - p. 1331-1341 , 2024
 
?
8

Beyond PhantomSponges: Enhancing Sponge Attack on Object De..:

, In: Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning,
Schoof, Coen ; Koffas, Stefanos ; Conti, Mauro. - p. 14-19 , 2024
 
?
9

A Systematic Exploration of Evolutionary Computation for th..:

, In: Proceedings of the Genetic and Evolutionary Computation Conference,
Hassan, Mujtaba ; Vliegen, Jo ; Picek, Stjepan. - p. 1255-1263 , 2024
 
?
10

Backdoors on Manifold Learning:

, In: Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning,
 
?
11

Towards Private Deep Learning-Based Side-Channel Analysis U..:

, In: Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science,
Schmid, Fabian ; Mukherjee, Shibam ; Picek, Stjepan... - p. 133-154 , 2024
 
?
12

PROACT - Physical Attack Resistance of Cryptographic Algori..:

, In: Applied Reconfigurable Computing. Architectures, Tools, and Applications; Lecture Notes in Computer Science,
Adhikary, Asmita ; Basurto, Abraham ; Batina, Lejla... - p. 255-266 , 2024
 
?
13

Unveiling the Threat: Investigating Distributed and Central..:

Xu, Jing ; Koffas, Stefanos ; Picek, Stjepan
Digital Threats: Research and Practice.  5 (2024)  2 - p. 1-29 , 2024
 
?
14

Not so Difficult in the End: Breaking the Lookup Table-Base..:

, In: Selected Areas in Cryptography – SAC 2023; Lecture Notes in Computer Science,
 
1-15