Publié le 7 mars 2025
Publications scientifiques
From Models to Network Topologies: A Topology Inference Attack in Decentralized Federated Learning
PDF4.97 MB6 janvier 2025
ColNet: Collaborative Optimization in Decentralized Federated Multi-task Learning Systems
PDF605.63 kB17 janvier 2025
A test environment for evaluating the cybersecurity of building automation
PDF1.04 MB31 janvier 2025
S-VOTE: Similarity-based Voting for Client Selection in Decentralized Federated Learning
PDF418.01 kB31 janvier 2025
DMPA: Model Poisoning Attacks on Decentralized Federated Learning for Model Differences
PDF1.18 MB7 février 2025
Assessing the Sustainability and Trustworthiness of Federated Learning Models
PDF621.99 kB11 février 2025
LeoCommon – A Ground Station Observatory Network for LEO Satellite Research
PDF4.26 MB24 février 2025
GreenDFL: a Framework for Assessing the Sustainability of Decentralized Federated Learning Systems
PDF1.55 MB27 février 2025
Multimodal Deep Learning for Android Malware Classification
PDF2.69 MB28 février 2025
OrbID: Identifying Orbcomm Satellite RF Fingerprints
PDF5.83 MB6 mars 2025
Threats and Opportunities in AI-generated Images for Armed Forces
PDF1.85 MB26 mars 2025
It's a Match - Enhancing the Fit between Users and Phishing Training through Personalisation
PDF2.00 MB25 avril 2025
Stop the Clock - Counteracting Bias Exploited by Attackers through an Interactive Augmented Reality Phishing Training
PDF7.99 MB25 avril 2025
Demo: A Practical Testbed for Decentralized Federated Learning on Physical Edge Devices
PDF554.45 kB12 mai 2025
Towards the ideals of Self-Recovery and Metadata Privacy in Social Vault Recovery
PDF2.92 MB14 mai 2025
Multi-Agent Reinforcement Learning in Cybersecurity: From Fundamentals to Applications
PDF2.85 MB26 mai 2025
Next Steps in Cyber Blue Team Automation - Leveraging the Power of LLMs
PDF838.18 kB27 mai 2025
SATversary: Adversarial Attacks on Satellite Fingerprinting
PDF2.61 MB6 juin 2025
A Manually Annotated Image-Caption Dataset for Detecting Children in the Wild
PDF14.02 MB11 juin 2025
Rethinking Backdoor Unlearning Through Linear Task Decomposition
PDF1.27 MB11 juin 2025
GuardFS: A file system for integrated detection and mitigation of Linux-based ransomware
PDF1.80 MB24 juin 2025
SpaceJam: Protocol-aware Jamming Attacks against Space Communications
PDF2.72 MB30 juin 2025
Universal Spoofing of Real-World Aircraft Multilateration
PDF3.29 MB30 juin 2025
Aircraft Take-off Weight Estimation: The EUROCONTROL PRC 2024Data Challenge
PDF1.55 MB12 juillet 2025
A Crowdsensing Intrusion Detection Dataset For Decentralized Federated Learning Models
PDF435.06 kB17 juillet 2025
Swushroomsia at SemEval-2025 Task 3: Probing LLMs’ Collective Intelligence for Multilingual Hallucination Detection
PDF1.48 MB31 juillet 2025
SoK: Automating Kernel Vulnerability Discovery and Exploit Generation
PDF734.22 kB11 août 2025
Bluetooth Security Testing with BlueToolkit: a Large-Scale Automotive Case Study
PDF1.53 MB11 août 2025
Exploring the Role of Artificial Intelligence in Enhancing Security Operations: A Systematic Review
PDF928.14 kB9 septembre 2025
NEBULA - Decentralized Federated Learning for Heterogeneous Networks
PDF730.08 kB10 septembre 2025
Secure and Scalable Rerouting in LEO SatelliteNetworks
PDF883.96 kB12 septembre 2025
Exploring Data and Parameter Efficient Strategies for Arabic DialectIdentifications
PDF315.56 kB18 septembre 2025
TRIP: Coercion-resistant Registration for E-Voting with Verifiability and Usability in Votegral
PDF1.19 MB12 octobre 2025
TypePilot: Leveraging the Scala Type System for Secure LLM-generated Code
PDF1.64 MB13 octobre 2025
Reassessing the market impact of cyber incidents: A bias-adjusted event study approach
PDF1.19 MB22 octobre 2025
Are the LLMs Capable of Maintaining at Least the Language Genus?
PDF19.72 MB24 octobre 2025
DSNS: The Deep Space Network Simulator
PDF4.12 MB29 octobre 2025
Monitoring Transformative Technological Convergence Through LLM-Extracted Semantic Entity Triple Graphs
PDF1.86 MB29 octobre 2025
Understanding Citizen Science: Insights from the 2024/2025 OpenSky Network User Survey
PDF1.60 MB3 novembre 2025
Tokenization and Representation Biases in Multilingual Models on Dialectal NLP Tasks
PDF1.06 MB4 novembre 2025
Low-Resource Languages LLM Disinformation is Within Reach: The Case of Walliserdeutsch
PDF576.24 kB4 novembre 2025
Are cybersecurity firms different Intra-sector and cross-industry comparisons of financial performance
PDF1.19 MB6 novembre 2025
From Model to Breach: Towards Actionable LLM-Generated Vulnerabilities Reporting
PDF748.14 kB6 novembre 2025
Extreme Multi-Label Completion for Semantic Document Tagging with Taxonomy-Aware Parallel Learning
PDF1.21 MB10 novembre 2025
Evaluating Concept Filtering Defenses against Child Sexual Abuse Material Generation by Text-to-Image Models
PDF9.78 MB5 décembre 2025
Practical Challenges in Executing Shor's Algorithm on Existing Quantum Platforms
PDF567.95 kB20 décembre 2025
Sentinel: An aggregation function to secure decentralized federated learning
PDF809.80 kB1 janvier 2024
MTFS: a Moving Target Defense-Enabled File System for Malware Mitigation
PDF260.07 kB1 janvier 2024
X-Attack 2.0: The Risk of Power Wasters and Satisfiability Don’t-Care Hardware Trojans to Shared Cloud FPGAs
PDF1.80 MB22 janvier 2024
A Cost-Efficient RFI Localization Approach to Detect GNSS Jamming and Spoofing
PDF1.18 MB23 janvier 2024
Mitigating communications threats in decentralized federated learning through moving target defense
PDF2.07 MB28 janvier 2024
GuardFS: A file system for integrated detection and mitigation of linux-based ransomware
PDF777.17 kB31 janvier 2024
Robust Federated Learning for execution time-based device model identification under label-flipping attack
PDF1.17 MB1 février 2024
Single-board device individual authentication based on hardware performance and autoencoder transformer models
PDF1.11 MB1 février 2024
Adversarial attacks and defenses on ML-and hardware-based IoT device fingerprinting and identification
PDF1.24 MB1 mars 2024
Federatedtrust: A solution for trustworthy federated learning
PDF1.92 MB1 mars 2024
On the Security of Satellite-Based Air Traffic Control (ADS-C)
PDF12.54 MB1 mars 2024
Trends in Large Language Models: Actors, Applications, and Impact on Cybersecurity
PDF745.92 kB13 mars 2024
Graph Language Model (GLM): A new graph-based approach to detect social instabilities
PDF2.81 MB26 mars 2024
Fedstellar: A Platform for Decentralized Federated Learning
PDF2.48 MB8 avril 2024
LLM-Resilient Bibliometrics: Factual Consistency Through Entity Triplet Extraction
PDF1.00 MB22 avril 2024
Automated Identification of Emerging Technologies: Open Data Approach
PDF710.32 kB23 avril 2024
Neural Exec: Learning (and Learning from) Execution Triggers for Prompt Injection Attacks
PDF2.00 MB2 mai 2024
Reputation System based on Distributed Ledge to Secure Decentralized Federated Learning
PDF948.69 kB1 octobre 2024
Secret Collusion among AI Agents: Multi-Agent Deception via Steganography
PDF1.33 MB8 novembre 2024
Corrections to ‘‘Dynamic Security Analysis onAndroid: A Systematic Literature Review’’
PDF210.10 kB12 novembre 2024
You Know What-Evaluation of a Personalised Phishing Training Based on Users’ Phishing Knowledge and Detection Skills
PDF1.14 MB20 novembre 2024
Let’s Take This Upstairs: Localizing Ground Transmitters With High-Altitude Balloons?
PDF3.17 MB12 mars 2025
Robust federated learning for execution time-based device model identification under label-flipping attack
PDF1.17 MB2 janvier 2023
A methodology to identify identical single-board computers based on hardware behavior fingerprinting
PDF1.39 MB3 janvier 2023
Measuring Security Development in Information Technologies: A Scientometric framework using ARXIV e-Prints
PDF3.79 MB11 janvier 2023
Adaptive uplink data compression in spectrum crowdsensing systems
PDF2.37 MB18 janvier 2023
Analysis of GNSS disruptions in European airspace
PDF1.08 MB26 janvier 2023
Spoofing Earth Observation Satellite Data through Radio Overshadowing
PDF1.89 MB1 février 2023
QPEP in the Real World: A Testbed for Secure Satellite Communication Performance
PDF4.52 MB27 février 2023
Targeted Adversarial Attacks Against Neural Machine Translation
PDF573.11 kB2 mars 2023
Forecasting Labor Needs for Digitalization: A bi-partite graph Machine learning approach
PDF1.11 MB28 mars 2023
Capturing Trends Using OpenAlex and Wikipedia Page Views as Science Indicators The Case of Data Protection and Encryption Technologies
PDF684.32 kB1 avril 2023
Robust and explainable identification of logical fallacies in natural language arguments
PDF885.44 kB22 avril 2023
In Pursuit of Aviation Cybersecurity: Experiences and lessons from a Competitive approach
PDF2.15 MB27 avril 2023
TaxoComplete: Self-Supervised Taxonomy Completion Leveraging Position-Enhanced Semantic Matching
PDF1.04 MB4 mai 2023
Optimizing the Size of Subword Vocabularies in Dialect Classification
PDF362.45 kB5 mai 2023
A Simplified Training Pipeline for Low-Resource and Unsupervised Machine Translation
PDF253.03 kB6 mai 2023
From scattered sources to Comprehensive Technology Landscape: A recommendation-based retrieval approach
PDF1.19 MB11 mai 2023
FirmwareDroid: Towards Automated Static Analysis of Pre-Installed Android Apps
PDF887.68 kB15 mai 2023
Towards Generalizing Machine Learning Models to Detect Command and Control Attack Traffic
PDF14.20 MB2 juin 2023
Modeling 5G Threat Scenarios for Critical Infrastructure Protection
PDF2.01 MB2 juin 2023
Building Collaborative cybersecurity for Critical Infrastructure Protection: Empirical evidence of Collective intelligence information sharing Dynamics on ThreatFox
PDF554.67 kB8 juin 2023
A Relaxed Optimization Approach for Adversarial Attacks Against Neural Machine Translation Models
PDF397.69 kB14 juin 2023
GraphINC: Graph Pattern mining at network speed
PDF1.45 MB20 juin 2023
LLM-Based Entity Extraction is Not for Cybersecurity
PDF1.67 MB26 juin 2023
A Summary of RansomAI: AI-powered Ransomware for Stealthy Encryption
PDF392.73 kB27 juin 2023
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks
PDF3.17 MB28 juin 2023
Byzantine-Resilient Learning Beyond Gradients: Distributing Evolutionary Search
PDF660.82 kB19 juillet 2023
LWHBench: a low-level hardware component benchmark and dataset for single board computers
PDF1.61 MB22 juillet 2023
Evolutionary Algorithms in the Light of SGD: Limit Equivalence, Minima Flatness, and Transfer Learning
PDF723.34 kB24 juillet 2023
FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks
PDF1.79 MB11 août 2023
P3LI5: Practical and confidEntial Lawful Interception on the 5G core
PDF3.63 MB27 août 2023
Contrastive learning with self-reconstruction for channel-resilient modulation classification
PDF642.15 kB29 août 2023
Efficient collective action for tacklingtime-critical cybersecurity threats
PDF2.27 MB12 septembre 2023
Decentralized Federated Learning: fundamentals, state of the art, frameworks, trends, and challenges
PDF2.07 MB13 septembre 2023
Behavioral fingerprinting to detect ransomware in resource-constrained devices
PDF1.03 MB24 septembre 2023
OpenSky Report 2023: Low Altitude Traffic Awareness for Light Aircraft with FLARM
PDF3.65 MB5 octobre 2023
SKYPOS: Real-world evaluation of self-positioning with aircraft signals for IoT devices
PDF3.73 MB9 octobre 2023
Lessons learned in transcribing 5000 h of air traffic control communications for robust automatic speech Understanding
PDF2.37 MB20 octobre 2023
Scaling the Timing-Based detection of anomalies in Real-World aircraft trajectories
PDF1.72 MB24 octobre 2023
Watch This Space Securing Satellite Communication through Resilient Transmitter Fingerprinting
PDF1.79 MB30 novembre 2023
A first look at exploiting the Automatic Dependent Surveillance-Contract Protocol for open aviation research
PDF3.33 MB17 décembre 2023
Federated learning for malware detection in IoT devices
PDF769.96 kB1 février 2022
Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Surveyand Implications in the Heterogeneous Era
PDF2.06 MB1 février 2022
Understanding realistic attacks on airborne collisionavoidance systems
PDF1.44 MB14 février 2022
FPGA-to-CPU Undervolting Attacks
PDF3.81 MB1 mars 2022
ditto: WAN Traffic Obfuscation at Line Rate
PDF7.63 MB24 avril 2022
Block-sparse Adversarial Attack to fool Transformer-based Text Classifiers
PDF479.21 kB11 mai 2022
Early Warning Signals in Open Source Intelligence: Two Use Cases of the 2019 Iraqi and 2020 Indian Farmers' Protests
PDF3.28 MB19 mai 2022
Evolutionary Optimization of Residual Neural Network Architectures for Modulation Classification
PDF677.94 kB1 juin 2022
Security and Privacy Issues of Satellite Communication in the Aviation Domain
PDF1.84 MB1 juin 2022
On the Security of the FLARM Collision Warning System
PDF5.51 MB3 juin 2022
Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection
PDF852.28 kB6 juin 2022
Efficient Collective Action for Tackling Time-Critical Cybersecurity Threats
PDF1.09 MB30 juin 2022
Communicating via Markov Decision Processes
PDF1.72 MB17 juillet 2022
Intelligent and behavioral-based detection of malware in IoT spectrum sensors
PDF1.11 MB29 juillet 2022
Building an Avionics Laboratory for Cybersecurity Testing
PDF25.55 MB8 août 2022
An Experimental Study of GPS Spoofing and Takeover Attacks on UAV
PDF1.72 MB10 août 2022
Aggregate-based Congestion Control for Pulse-Wave DDoS Defense
PDF1.33 MB22 août 2022
Building collaborative cybersecurity for critical infrastructure protection
PDF554.67 kB14 septembre 2022
High Data Throughput Exfiltration throughVideo Cable Emanations
PDF3.27 MB15 septembre 2022
RITUAL: a Platform Quantifying the Trustworthiness of Supervised Machine Learning
PDF228.24 kB1 octobre 2022
Privacy-preserving and Syscall-based Intrusion Detection System for IoT Spectrum Sensors Affected by Data Falsification Attacks
PDF755.24 kB1 octobre 2022
SpecForce: A Framework to Secure IoT SpectrumSensors in the Internet of Battlefield Things
PDF3.64 MB1 octobre 2022
TechRank
PDF2.89 MB14 octobre 2022
Measuring 5G Electric Fields Strength With Software Defined Radios
PDF3.85 MB18 novembre 2022
A Methodology for Evaluating the Robustness of Anomaly Detectors to Adversarial Attacks in Industrial Scenarios
PDF1.24 MB28 novembre 2022
Beyond S-curves: Recurrent Neural Networks for Technology Forecasting
PDF530.03 kB29 novembre 2022
Early Guessing for Dialect Identification
PDF225.53 kB1 décembre 2022
RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT
PDF8.67 MB30 décembre 2022
Cybersecurity Technologies: An Overview of Trends & Activities in Switzerlandand Abroad
PDF9.25 MB28 novembre 2023