What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Stjepan Picek
Google Scholar
64
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Continuous Embedding Attacks via Clipped Inputs in Jailbreaking Large Language Models.
Zihao Xu
Yi Liu
Gelei Deng
Kailong Wang
Yuekang Li
Ling Shi
Stjepan Picek
2025
conf/eurosp
The Image Scaling Attack: Unveiling the Risks in Traffic Sign Classification.
Aliza Reif
Tarek Stolz
Stjepan Picek
Oscar Hernán Ramírez-Agudelo
Michael Karl
2025
conf/esorics
Time-Distributed Backdoor Attacks on Federated Spiking Learning.
Gorka Abad
Stjepan Picek
Aitor Urbieta
2025
conf/esorics
Membership Privacy Evaluation in Deep Spiking Neural Networks.
Jiaxin Li
Gorka Abad
Stjepan Picek
Mauro Conti
2025
conf/uss
Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis.
Azade Rezaeezade
Trevor Yap
Dirmanto Jap
Shivam Bhasin
Stjepan Picek
2025
conf/acns
Jump, It Is Easy: JumpReLU Activation Function in Deep Learning-Based Side-Channel Analysis.
Abraham Basurto-Becerra
Azade Rezaeezade
Stjepan Picek
2025
conf/acns
Can KANs Do It? Toward Interpretable Deep Learning-Based Side-Channel Analysis.
Kota Yoshida
Sengim Karayalcin
Stjepan Picek
2024
journals/cic
Leakage Model-flexible Deep Learning-based Side-channel Analysis.
Lichao Wu
Azade Rezaeezade
Amir Alipour
Guilherme Perin
Stjepan Picek
2024
journals/cic
Plaintext-based Side-channel Collision Attack.
Lichao Wu
Sébastien Tiran
Guilherme Perin
Stjepan Picek
2024
journals/tifs
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis.
Suvadeep Hajra
Manaar Alam
Sayandeep Saha
Stjepan Picek
Debdeep Mukhopadhyay
2024
conf/esorics
Short Paper: Effects of Poisoning Attacks on Causal Deep Reinforcement Learning.
Patrick Lodeweegs
Behrad Tajalli
Stjepan Picek
2024
conf/ndss
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data.
Gorka Abad
Oguzhan Ersoy
Stjepan Picek
Aitor Urbieta
2024
conf/dsn
Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks.
Xiaoyun Xu
Oguzhan Ersoy
Behrad Tajalli
Stjepan Picek
2024
conf/asiacrypt
It's a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-Channel Analysis.
Sengim Karayalcin
Marina Krcek
Lichao Wu
Stjepan Picek
Guilherme Perin
2024
conf/wisec
Beyond PhantomSponges: Enhancing Sponge Attack on Object Detection Models.
Coen Schoof
Stefanos Koffas
Mauro Conti
Stjepan Picek
2024
conf/wisec
Backdoors on Manifold Learning.
Christina Kreza
Stefanos Koffas
Behrad Tajalli
Mauro Conti
Stjepan Picek
2023
journals/tifs
Label Correlation in Deep Learning-Based Side-Channel Analysis.
Lichao Wu
Léo Weissbart
Marina Krcek
Huimin Li
Guilherme Perin
Lejla Batina
Stjepan Picek
2023
conf/ccs
Poster: Backdoor Attack on Extreme Learning Machines.
Behrad Tajalli
Gorka Abad
Stjepan Picek
2023
conf/ccs
Poster: Multi-target & Multi-trigger Backdoor Attacks on Graph Neural Networks.
Jing Xu
Stjepan Picek
2023
conf/ccs
Poster: Boosting Adversarial Robustness by Adversarial Pre-training.
Xiaoyun Xu
Stjepan Picek
2023
conf/ccs
Turning Privacy-preserving Mechanisms against Federated Learning.
Marco Arazzi
Mauro Conti
Antonino Nocera
Stjepan Picek
2023
conf/sp
On Feasibility of Server-side Backdoor Attacks on Split Learning.
Behrad Tajalli
Oguzhan Ersoy
Stjepan Picek
2023
conf/eurosp
Watermarking Graph Neural Networks based on Backdoor Attacks.
Jing Xu
Stefanos Koffas
Oguzhan Ersoy
Stjepan Picek
2023
conf/ndss
DARWIN: Survival of the Fittest Fuzzing Mutators.
Patrick Jauernig
Domagoj Jakobovic
Stjepan Picek
Emmanuel Stapf
Ahmad-Reza Sadeghi
2023
conf/ndss
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
Tianyang Chen
Peng Xu
Stjepan Picek
Bo Luo
Willy Susilo
Hai Jin
Kaitai Liang
2023
conf/dsn
IB-RAR: Information Bottleneck as Regularizer for Adversarial Robustness.
Xiaoyun Xu
Guilherme Perin
Stjepan Picek
2023
conf/sacrypt
Not so Difficult in the End: Breaking the Lookup Table-Based Affine Masking Scheme.
Lichao Wu
Guilherme Perin
Stjepan Picek
2022
journals/tches
The Best of Two Worlds: Deep Learning-assisted Template Attack.
Lichao Wu
Guilherme Perin
Stjepan Picek
2022
journals/tches
Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis.
Guilherme Perin
Lichao Wu
Stjepan Picek
2022
conf/ccs
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks.
Mauro Conti
Jiaxin Li
Stjepan Picek
Jing Xu
2022
conf/ccs
Poster: Backdoor Attacks on Spiking NNs and Neuromorphic Datasets.
Gorka Abad
Oguzhan Ersoy
Stjepan Picek
Víctor Julio Ramírez-Durán
Aitor Urbieta
2022
conf/ccs
Poster: Clean-label Backdoor Attack on Graph Neural Networks.
Jing Xu
Stjepan Picek
2022
conf/uss
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand.
Matteo Cardaioli
Stefano Cecconello
Mauro Conti
Simone Milani
Stjepan Picek
Eugen Saraci
2022
conf/acns
Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds.
Sudharshan Swaminathan
Lukasz Chmielewski
Guilherme Perin
Stjepan Picek
2022
conf/acns
Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher.
Nicoleta-Norica Bacuieti
Lejla Batina
Stjepan Picek
2022
conf/ctrsa
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices.
Naila Mukhtar
Lejla Batina
Stjepan Picek
Yinan Kong
2022
conf/fdtc
The More You Know: Improving Laser Fault Injection with Prior Knowledge.
Marina Krcek
Thomas Ordas
Daniele Fronte
Stjepan Picek
2022
conf/acsac
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks.
Jing Xu
Rui Wang
Stefanos Koffas
Kaitai Liang
Stjepan Picek
2022
conf/africacrypt
To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA.
Azade Rezaeezade
Guilherme Perin
Stjepan Picek
2022
conf/wisec
Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers.
Stefanos Koffas
Jing Xu
Mauro Conti
Stjepan Picek
2021
journals/tches
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis.
Jorai Rijsdijk
Lichao Wu
Guilherme Perin
Stjepan Picek
2021
journals/tches
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning.
Guilherme Perin
Lukasz Chmielewski
Lejla Batina
Stjepan Picek
2021
conf/fdtc
On the Importance of Initial Solutions Selection in Fault Injection.
Marina Krcek
Daniele Fronte
Stjepan Picek
2021
conf/wisec
Explainability-based Backdoor Attacks Against Graph Neural Networks.
Jing Xu
Minhui (Jason) Xue
Stjepan Picek
2020
journals/tches
Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders.
Lichao Wu
Stjepan Picek
2020
journals/tches
Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis.
Guilherme Perin
Lukasz Chmielewski
Stjepan Picek
2020
conf/esorics
Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems.
Fabio Aiolli
Mauro Conti
Stjepan Picek
Mirko Polato
2020
conf/ndss
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis.
Shivam Bhasin
Anupam Chattopadhyay
Annelie Heuser
Dirmanto Jap
Stjepan Picek
Ritu Ranjan Shrivastwa
2020
conf/ctrsa
A Fast Characterization Method for Semi-invasive Fault Injection Attacks.
Lichao Wu
Gerard Ribera
Noemie Beringuier-Boher
Stjepan Picek
2020
conf/sacrypt
On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis.
Guilherme Perin
Stjepan Picek
2019
journals/tches
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations.
Stjepan Picek
Annelie Heuser
Alan Jovic
Shivam Bhasin
Francesco Regazzoni
2019
journals/tches
Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis.
Jaehun Kim
Stjepan Picek
Annelie Heuser
Shivam Bhasin
Alan Hanjalic
2019
conf/ccs
Poster: When Adversary Becomes the Guardian - Towards Side-channel Security With Adversarial Attacks.
Stjepan Picek
Dirmanto Jap
Shivam Bhasin
2019
conf/ccs
Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks.
Lejla Batina
Shivam Bhasin
Dirmanto Jap
Stjepan Picek
2019
conf/uss
CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel.
Lejla Batina
Shivam Bhasin
Dirmanto Jap
Stjepan Picek
2018
journals/tosc
Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules.
Ashrujit Ghoshal
Rajat Sadhukhan
Sikhar Patranabis
Nilanjan Datta
Stjepan Picek
Debdeep Mukhopadhyay
2018
conf/fdtc
Genetic Algorithm-Based Electromagnetic Fault Injection.
Antun Maldini
Niels Samwel
Stjepan Picek
Lejla Batina
2017
conf/ccs
If You Can't Measure It, You Can't Improve It: Moving Target Defense Metrics.
Stjepan Picek
Erik Hemberg
Una-May O'Reilly
2017
conf/acns
Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience.
Claude Carlet
Annelie Heuser
Stjepan Picek
2017
conf/africacrypt
Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks.
Stjepan Picek
Annelie Heuser
Alan Jovic
Axel Legay
2016
conf/wisa
Applications of Soft Computing in Cryptology.
Stjepan Picek
2016
conf/africacrypt
Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware.
Stjepan Picek
Dominik Sisejkovic
Domagoj Jakobovic
Lejla Batina
Bohan Yang
Danilo Sijacic
Nele Mentens
2016
conf/sacrypt
On the Construction of Hardware-Friendly 4\times 4 and 5\times 5 S-Boxes.
Stjepan Picek
Bohan Yang
Vladimir Rozic
Nele Mentens
2014
conf/host
Optimality and beyond: The case of 4×4 S-boxes.
Stjepan Picek
Baris Ege
Kostas Papagiannopoulos
Lejla Batina
Domagoj Jakobovic
Coauthors
Abraham Basurto-Becerra
(1)
Ahmad-Reza Sadeghi
(1)
Aitor Urbieta
(3)
Alan Hanjalic
(1)
Alan Jovic
(2)
Aliza Reif
(1)
Amir Alipour
(1)
Annelie Heuser
(5)
Antonino Nocera
(1)
Antun Maldini
(1)
Anupam Chattopadhyay
(1)
Ashrujit Ghoshal
(1)
Axel Legay
(1)
Azade Rezaeezade
(4)
Baris Ege
(1)
Behrad Tajalli
(5)
Bo Luo
(1)
Bohan Yang
(2)
Christina Kreza
(1)
Claude Carlet
(1)
Coen Schoof
(1)
Daniele Fronte
(2)
Danilo Sijacic
(1)
Debdeep Mukhopadhyay
(2)
Dirmanto Jap
(5)
Domagoj Jakobovic
(3)
Dominik Sisejkovic
(1)
Emmanuel Stapf
(1)
Erik Hemberg
(1)
Eugen Saraci
(1)
Fabio Aiolli
(1)
Francesco Regazzoni
(1)
Gelei Deng
(1)
Gerard Ribera
(1)
Gorka Abad
(5)
Guilherme Perin
(14)
Hai Jin
(1)
Huimin Li
(1)
Jaehun Kim
(1)
Jiaxin Li
(2)
Jing Xu
(7)
Jorai Rijsdijk
(1)
Kailong Wang
(1)
Kaitai Liang
(2)
Kostas Papagiannopoulos
(1)
Kota Yoshida
(1)
Lejla Batina
(9)
Léo Weissbart
(1)
Lichao Wu
(10)
Ling Shi
(1)
Lukasz Chmielewski
(3)
Manaar Alam
(1)
Marco Arazzi
(1)
Marina Krcek
(4)
Matteo Cardaioli
(1)
Mauro Conti
(8)
Michael Karl
(1)
Minhui (Jason) Xue
(1)
Mirko Polato
(1)
Naila Mukhtar
(1)
Nele Mentens
(2)
Nicoleta-Norica Bacuieti
(1)
Niels Samwel
(1)
Nilanjan Datta
(1)
Noemie Beringuier-Boher
(1)
Oguzhan Ersoy
(5)
Oscar Hernán Ramírez-Agudelo
(1)
Patrick Jauernig
(1)
Patrick Lodeweegs
(1)
Peng Xu
(1)
Rajat Sadhukhan
(1)
Ritu Ranjan Shrivastwa
(1)
Rui Wang
(1)
Sayandeep Saha
(1)
Sébastien Tiran
(1)
Sengim Karayalcin
(2)
Shivam Bhasin
(7)
Sikhar Patranabis
(1)
Simone Milani
(1)
Stefano Cecconello
(1)
Stefanos Koffas
(5)
Stjepan Picek
(64)
Sudharshan Swaminathan
(1)
Suvadeep Hajra
(1)
Tarek Stolz
(1)
Thomas Ordas
(1)
Tianyang Chen
(1)
Trevor Yap
(1)
Una-May O'Reilly
(1)
Víctor Julio Ramírez-Durán
(1)
Vladimir Rozic
(1)
Willy Susilo
(1)
Xiaoyun Xu
(3)
Yi Liu
(1)
Yinan Kong
(1)
Yuekang Li
(1)
Zihao Xu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to