Follow
Stjepan Picek
Stjepan Picek
Associate professor, Radboud University, The Netherlands
Verified email at computer.org
Title
Cited by
Cited by
Year
{CSI}{NN}: Reverse engineering of neural network architectures through electromagnetic side channel
L Batina, S Bhasin, D Jap, S Picek
28th USENIX Security Symposium (USENIX Security 19), 515-532, 2019
333*2019
Make some noise: Unleashing the power of convolutional neural networks for profiled side-channel analysis
JH Kim, S Picek, A Heuser, S Bhasin, A Hanjalic
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (3 …, 2019
2852019
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations
S Picek, A Heuser, A Jovic, S Bhasin, F Regazzoni
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (1 …, 2018
2792018
On the performance of convolutional neural networks for side-channel analysis
S Picek, IP Samiotis, J Kim, A Heuser, S Bhasin, A Legay
Security, Privacy, and Applied Cryptography Engineering: 8th International …, 2018
1372018
Side-channel analysis and machine learning: A practical perspective
S Picek, A Heuser, A Jovic, SA Ludwig, S Guilley, D Jakobovic, ...
2017 International Joint Conference on Neural Networks (IJCNN), 4095-4102, 2017
1312017
Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis
J Rijsdijk, L Wu, G Perin, S Picek
IACR Transactions on Cryptographic Hardware and Embedded Systems 2021 (3 …, 2021
1302021
SoK: Deep Learning-based Physical Side-channel Analysis
S Picek, G Perin, L Mariot, L Wu, L Batina
ACM Computing Surveys 55 (11), 1-35, 2023
1042023
I choose you: Automated hyperparameter tuning for deep learning-based side-channel analysis
L Wu, G Perin, S Picek
IEEE Transactions on Emerging Topics in Computing, 2022
1022022
Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis
G Perin, Ł Chmielewski, S Picek
IACR Transactions on Cryptographic Hardware and Embedded Systems, 337-364, 2020
972020
Predictive and generative machine learning models for photonic crystals
T Christensen, C Loh, S Picek, D Jakobović, L Jing, S Fisher, V Ceperic, ...
Nanophotonics 9 (13), 4183-4192, 2020
922020
Remove some noise: On pre-processing of side-channel measurements with autoencoders
L Wu, S Picek
IACR Transactions on Cryptographic Hardware and Embedded Systems, 389-415, 2020
912020
Cellular automata based S-boxes
L Mariot, S Picek, A Leporati, D Jakobovic
Cryptography and Communications 11 (1), 41-62, 2019
792019
Mind the portability: A warriors guide through realistic profiled side-channel analysis
S Bhasin, A Chattopadhyay, A Heuser, D Jap, S Picek, R Ranjan
NDSS 2020-Network and Distributed System Security Symposium, 1-14, 2020
782020
Template attack versus Bayes classifier
S Picek, A Heuser, S Guilley
Journal of Cryptographic Engineering 7 (4), 343-351, 2017
772017
Cryptographic Boolean functions: One output, many design criteria
S Picek, D Jakobovic, JF Miller, L Batina, M Cupic
Applied Soft Computing 40, 635-653, 2016
772016
A new cost function for evolution of s-boxes
S Picek, M Cupic, L Rotim
Evolutionary computation 24 (4), 695-718, 2016
762016
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes
S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic
International Conference on Cryptology in India, 374-390, 2014
752014
S-box, SET, match: a toolbox for S-box analysis
S Picek, L Batina, D Jakobović, B Ege, M Golub
Information Security Theory and Practice. Securing the Internet of Things …, 2014
682014
Glitch it if you can: parameter search strategies for successful fault injection
RB Carpi, S Picek, L Batina, F Menarini, D Jakobovic, M Golub
Smart Card Research and Advanced Applications: 12th International Conference …, 2014
662014
Can you hear it? backdoor attacks via ultrasonic triggers
S Koffas, J Xu, M Conti, S Picek
Proceedings of the 2022 ACM workshop on wireless security and machine …, 2022
652022
The system can't perform the operation now. Try again later.
Articles 1–20