Publié le 7 mars 2025
Publications scientifiques
Sentinel: An aggregation function to secure decentralized federated learning
PDF809.80 kB1 janvier 2024
MTFS: a Moving Target Defense-Enabled File System for Malware Mitigation
PDF260.07 kB1 janvier 2024
X-Attack 2.0: The Risk of Power Wasters and Satisfiability Don’t-Care Hardware Trojans to Shared Cloud FPGAs
PDF1.80 MB22 janvier 2024
A Cost-Efficient RFI Localization Approach to Detect GNSS Jamming and Spoofing
PDF1.18 MB23 janvier 2024
Mitigating communications threats in decentralized federated learning through moving target defense
PDF2.07 MB28 janvier 2024
GuardFS: A file system for integrated detection and mitigation of linux-based ransomware
PDF777.17 kB31 janvier 2024
Robust Federated Learning for execution time-based device model identification under label-flipping attack
PDF1.17 MB1 février 2024
Single-board device individual authentication based on hardware performance and autoencoder transformer models
PDF1.11 MB1 février 2024
Adversarial attacks and defenses on ML-and hardware-based IoT device fingerprinting and identification
PDF1.24 MB1 mars 2024
Federatedtrust: A solution for trustworthy federated learning
PDF1.92 MB1 mars 2024
On the Security of Satellite-Based Air Traffic Control (ADS-C)
PDF12.54 MB1 mars 2024
Trends in Large Language Models: Actors, Applications, and Impact on Cybersecurity
PDF745.92 kB13 mars 2024
Graph Language Model (GLM): A new graph-based approach to detect social instabilities
PDF2.81 MB26 mars 2024
Fedstellar: A Platform for Decentralized Federated Learning
PDF2.48 MB8 avril 2024
The dilemma of neuroprotection trials in times of successful endovascular recanalization
PDF2.92 MB9 avril 2024
LLM-Resilient Bibliometrics: Factual Consistency Through Entity Triplet Extraction
PDF1.00 MB22 avril 2024
Automated Identification of Emerging Technologies: Open Data Approach
PDF710.32 kB23 avril 2024
Neural Exec: Learning (and Learning from) Execution Triggers for Prompt Injection Attacks
PDF2.00 MB2 mai 2024
Reputation System based on Distributed Ledge to Secure Decentralized Federated Learning
PDF948.69 kB1 octobre 2024
Secret Collusion among AI Agents: Multi-Agent Deception via Steganography
PDF1.33 MB8 novembre 2024
Corrections to ‘‘Dynamic Security Analysis onAndroid: A Systematic Literature Review’’
PDF210.10 kB12 novembre 2024
You Know What-Evaluation of a Personalised Phishing Training Based on Users’ Phishing Knowledge and Detection Skills
PDF1.14 MB20 novembre 2024
Let’s Take This Upstairs: Localizing Ground Transmitters With High-Altitude Balloons?
PDF3.17 MB12 mars 2025
Robust federated learning for execution time-based device model identification under label-flipping attack
PDF1.17 MB2 janvier 2023
A methodology to identify identical single-board computers based on hardware behavior fingerprinting
PDF1.39 MB3 janvier 2023
Measuring Security Development in Information Technologies: A Scientometric framework using ARXIV e-Prints
PDF3.79 MB11 janvier 2023
Adaptive uplink data compression in spectrum crowdsensing systems
PDF2.37 MB18 janvier 2023
Analysis of GNSS disruptions in European airspace
PDF1.08 MB26 janvier 2023
Spoofing Earth Observation Satellite Data through Radio Overshadowing
PDF1.89 MB1 février 2023
QPEP in the Real World: A Testbed for Secure Satellite Communication Performance
PDF4.52 MB27 février 2023
Targeted Adversarial Attacks Against Neural Machine Translation
PDF573.11 kB2 mars 2023
Forecasting Labor Needs for Digitalization: A bi-partite graph Machine learning approach
PDF1.11 MB28 mars 2023
Capturing Trends Using OpenAlex and Wikipedia Page Views as Science Indicators The Case of Data Protection and Encryption Technologies
PDF684.32 kB1 avril 2023
Robust and explainable identification of logical fallacies in natural language arguments
PDF885.44 kB22 avril 2023
In Pursuit of Aviation Cybersecurity: Experiences and lessons from a Competitive approach
PDF2.15 MB27 avril 2023
TaxoComplete: Self-Supervised Taxonomy Completion Leveraging Position-Enhanced Semantic Matching
PDF1.04 MB4 mai 2023
Optimizing the Size of Subword Vocabularies in Dialect Classification
PDF362.45 kB5 mai 2023
A Simplified Training Pipeline for Low-Resource and Unsupervised Machine Translation
PDF253.03 kB6 mai 2023
From scattered sources to Comprehensive Technology Landscape: A recommendation-based retrieval approach
PDF1.19 MB11 mai 2023
FirmwareDroid: Towards Automated Static Analysis of Pre-Installed Android Apps
PDF887.68 kB15 mai 2023
Towards Generalizing Machine Learning Models to Detect Command and Control Attack Traffic
PDF14.20 MB2 juin 2023
Modeling 5G Threat Scenarios for Critical Infrastructure Protection
PDF2.01 MB2 juin 2023
Building Collaborative cybersecurity for Critical Infrastructure Protection: Empirical evidence of Collective intelligence information sharing Dynamics on ThreatFox
PDF554.67 kB8 juin 2023
A Relaxed Optimization Approach for Adversarial Attacks Against Neural Machine Translation Models
PDF397.69 kB14 juin 2023
GraphINC: Graph Pattern mining at network speed
PDF1.45 MB20 juin 2023
LLM-Based Entity Extraction is Not for Cybersecurity
PDF1.67 MB26 juin 2023
A Summary of RansomAI: AI-powered Ransomware for Stealthy Encryption
PDF392.73 kB27 juin 2023
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks
PDF3.17 MB28 juin 2023
Byzantine-Resilient Learning Beyond Gradients: Distributing Evolutionary Search
PDF660.82 kB19 juillet 2023
LWHBench: a low-level hardware component benchmark and dataset for single board computers
PDF1.61 MB22 juillet 2023
Evolutionary Algorithms in the Light of SGD: Limit Equivalence, Minima Flatness, and Transfer Learning
PDF723.34 kB24 juillet 2023
FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks
PDF1.79 MB11 août 2023
P3LI5: Practical and confidEntial Lawful Interception on the 5G core
PDF3.63 MB27 août 2023
Contrastive learning with self-reconstruction for channel-resilient modulation classification
PDF642.15 kB29 août 2023
Efficient collective action for tacklingtime-critical cybersecurity threats
PDF2.27 MB12 septembre 2023
Decentralized Federated Learning: fundamentals, state of the art, frameworks, trends, and challenges
PDF2.07 MB13 septembre 2023
Behavioral fingerprinting to detect ransomware in resource-constrained devices
PDF1.03 MB24 septembre 2023
OpenSky Report 2023: Low Altitude Traffic Awareness for Light Aircraft with FLARM
PDF3.65 MB5 octobre 2023
SKYPOS: Real-world evaluation of self-positioning with aircraft signals for IoT devices
PDF3.73 MB9 octobre 2023
Lessons learned in transcribing 5000 h of air traffic control communications for robust automatic speech Understanding
PDF2.37 MB20 octobre 2023
Scaling the Timing-Based detection of anomalies in Real-World aircraft trajectories
PDF1.72 MB24 octobre 2023
Watch This Space Securing Satellite Communication through Resilient Transmitter Fingerprinting
PDF1.79 MB30 novembre 2023
A first look at exploiting the Automatic Dependent Surveillance-Contract Protocol for open aviation research
PDF3.33 MB17 décembre 2023
Federated learning for malware detection in IoT devices
PDF769.96 kB1 février 2022
Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Surveyand Implications in the Heterogeneous Era
PDF2.06 MB1 février 2022
Understanding realistic attacks on airborne collisionavoidance systems
PDF1.44 MB14 février 2022
FPGA-to-CPU Undervolting Attacks
PDF3.81 MB1 mars 2022
ditto: WAN Traffic Obfuscation at Line Rate
PDF7.63 MB24 avril 2022
Block-sparse Adversarial Attack to fool Transformer-based Text Classifiers
PDF479.21 kB11 mai 2022
Early Warning Signals in Open Source Intelligence: Two Use Cases of the 2019 Iraqi and 2020 Indian Farmers' Protests
PDF3.28 MB19 mai 2022
Evolutionary Optimization of Residual Neural Network Architectures for Modulation Classification
PDF677.94 kB1 juin 2022
Security and Privacy Issues of Satellite Communication in the Aviation Domain
PDF1.84 MB1 juin 2022
On the Security of the FLARM Collision Warning System
PDF5.51 MB3 juin 2022
Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection
PDF852.28 kB6 juin 2022
Efficient Collective Action for Tackling Time-Critical Cybersecurity Threats
PDF1.09 MB30 juin 2022
Communicating via Markov Decision Processes
PDF1.72 MB17 juillet 2022
Intelligent and behavioral-based detection of malware in IoT spectrum sensors
PDF1.11 MB29 juillet 2022
Building an Avionics Laboratory for Cybersecurity Testing
PDF25.55 MB8 août 2022
An Experimental Study of GPS Spoofing and Takeover Attacks on UAV
PDF1.72 MB10 août 2022
Aggregate-based Congestion Control for Pulse-Wave DDoS Defense
PDF1.33 MB22 août 2022
Building collaborative cybersecurity for critical infrastructure protection
PDF554.67 kB14 septembre 2022
High Data Throughput Exfiltration throughVideo Cable Emanations
PDF3.27 MB15 septembre 2022
RITUAL: a Platform Quantifying the Trustworthiness of Supervised Machine Learning
PDF228.24 kB1 octobre 2022
Privacy-preserving and Syscall-based Intrusion Detection System for IoT Spectrum Sensors Affected by Data Falsification Attacks
PDF755.24 kB1 octobre 2022
SpecForce: A Framework to Secure IoT SpectrumSensors in the Internet of Battlefield Things
PDF3.64 MB1 octobre 2022
TechRank
PDF2.89 MB14 octobre 2022
Measuring 5G Electric Fields Strength With Software Defined Radios
PDF3.85 MB18 novembre 2022
A Methodology for Evaluating the Robustness of Anomaly Detectors to Adversarial Attacks in Industrial Scenarios
PDF1.24 MB28 novembre 2022
Beyond S-curves: Recurrent Neural Networks for Technology Forecasting
PDF530.03 kB29 novembre 2022
Early Guessing for Dialect Identification
PDF225.53 kB1 décembre 2022
RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT
PDF8.67 MB30 décembre 2022
Cybersecurity Technologies: An Overview of Trends & Activities in Switzerlandand Abroad
PDF9.25 MB28 novembre 2023