Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
Slika profila

Stjepan Picek

33341

Stjepan

Picek

dr. sc.

nije evidentirano
Naziv Akcije
Picek, Stjepan; Batina, Lejla Cybersecurity and Artificial Intelligence: A Perfect Couple? // Data Cybersecurity & Privacy, 2024 (2024), 15; 16-21
Picek, Stjepan ; Heuser, Annelie ; Jović, Alan ; Bhasin, Shivam ; Regazzoni, Francesco Tipping the Balance: Imbalanced Classes in Deep Learning Side-channel Analysis // IEEE Design & Test, 41 (2024), 2; 32-38. doi: 10.1109/MDAT.2023.3288808
Knežević, Karlo Machine learning and evolutionary computation in design and analysis of symmetric key cryptographic algorithms / Jakobović, Domagoj ; Picek, Stjepan (mentor); Zagreb, Fakultet elektrotehnike i računarstva, . 2023
Jauernig, Patrick; Jakobovic, Domagoj; Picek, Stjepan; Stapf, Emmanuel; Sadeghi, Ahmad-Reza DARWIN: Survival of the Fittest Fuzzing Mutators // 30th Annual Network and Distributed System Security Symposium. Reston: The Internet Society, 2023. str. 1-17 doi: https://dx.doi.org/10.14722/ndss.2023.23159
Xu, Jing; Koffas, Stefanos; Ersoy, Oguzhan; Picek, Stjepan Watermarking Graph Neural Networks based on Backdoor Attacks // 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P). New York: IEEE, 2023. str. 1179-1197 doi: 10.1109/EuroSP57164.2023.00072
Chen, Tianyang; Xu, Peng; Picek, Stjepan; Luo, Bo; Susilo, Willy; Jin, Hai; Liang, Kaitai The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption // 30th Annual Network and Distributed System Security Symposium. Reston: The Internet Society, 2023. str. 1-18 doi: https://doi.org/10.14722/ndss.2023.24725
Tajalli, Behrad; Abad, Gorka; Picek, Stjepan Poster: Backdoor Attack on Extreme Learning Machines // CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery, 2023. str. 3588-3590 doi: https://doi.org/10.1145/3576915.3624369
Xu, Jing; Picek, Stjepan Poster: Multi-target & Multi-trigger Backdoor Attacks on Graph Neural Networks // CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery, 2023. str. 3570-3572 doi: https://doi.org/10.1145/3576915.3624387
Coello Coello, Carlos A.; Durasevic, Marko; Jakobovic, Domagoj; Krcek, Marina; Mariot, Luca; Picek, Stjepan Modeling Strong Physically Unclonable Functions with Metaheuristics // Companion Proceedings of the Conference on Genetic and Evolutionary Computation, GECCO 2023. New York: ACM, 2023. str. 719-722 doi: https://doi.org/10.1145/3583133.3590699
Durasevic, Marko; Jakobovic, Domagoj; Mariot, Luca; Picek, Stjepan Digging Deeper: Operator Analysis for Optimizing Nonlinearity of Boolean Functions // Companion Proceedings of the Conference on Genetic and Evolutionary Computation, GECCO 2023. New York: ACM, 2023. str. 199-202 doi: https://doi.org/10.1145/3583133.3590679
nije evidentirano
nije evidentirano