Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek (2022), Can You Hear It? Backdoor Attacks via Ultrasonic Triggers, In WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning p.57-62, Association for Computing Machinery (ACM).

Norica Băcuieți, Lejla Batina, Stjepan Picek (2022), Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher, Giuseppe Ateniese, Daniele Venturi (Eds.), In Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings p.809-829, Springer Science and Business Media Deutschland GmbH.

Taha Shahroodi, Mahdi Zahedi, Can Firtina, Mohammed Alser, Stephan Wong, Onur Mutlu, Said Hamdioui (2022), Demeter: A Fast and Energy-Efficient Food Profiler Using Hyperdimensional Computing in Memory, In IEEE Access Volume 10 p.82493-82510.

Troya Köylü, Luiza Garaffa, Cezar Reinbrecht, Mahdi Zahedi, Said Hamdioui, Mottaqiallah Taouil (2022), Exploiting PUF Variation to Detect Fault Injection Attacks, Hana Kubatova, Andreas Steininger, Maksim Jenihhin, Tomasz Garbolino, Petr Fiser, Jan Belohoubek, Jaroslav Borecky (Eds.), In Proceedings of the 2022 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS) p.74-79, IEEE .

Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong (2022), Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices, Steven D. Galbraith (Eds.), In Topics in Cryptology - CT-RSA 2022 p.297-321, Springer.

Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek (2022), Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis, Josep Balasch, Colin O’Flynn (Eds.), In Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Proceedings Volume 13211 p.29-48, Springer Science and Business Media Deutschland GmbH.

Guilherme Perin, Lichao Wu, Stjepan Picek (2022), Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-Based Side-Channel Analysis, M. Stamp (Eds.), In Advances in Information Security p.217-241, Springer Nature.

Muhammad Ali Siddiqi, Georg Hahn, Said Hamdioui, Wouter A. Serdijn, Christos Strydis (2022), Improving the Security of the IEEE 802.15.6 Standard for Medical BANs, In IEEE Access Volume 10 p.62953-62975.

Lichao Wu, Guilherme Perin, Stjepan Picek (2022), On the Evaluation of Deep Learning-Based Side-Channel Analysis, Josep Balasch, Colin O’Flynn (Eds.), In Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Proceedings p.49-71, Springer Science and Business Media Deutschland GmbH.

Moritz Fieback, Christopher Münch, Anteneh Gebregiorgis, Guilherme Cardoso Medeiros, Mottaqiallah Taouil, Said Hamdioui, Mehdi Tahoori (2022), PVT Analysis for RRAM and STT-MRAM-based Logic Computation-in-Memory, In Proceedings of the 2022 IEEE European Test Symposium (ETS) p.1-6, IEEE .