L. Wu (2023), The Circle of DL-SCA: Improving Deep Learning-based Side-channel Analysis, PhD Thesis Delft University of Technology.

Vipul Arora, Ileana Buhan, Guilherme Perin, Stjepan Picek (2022), A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage, Vincent Grosso, Thomas Pöppelmann (Eds.), In Smart Card Research and Advanced Applications - 20th International Conference, CARDIS 2021, Revised Selected Papers Volume 13173 p.80-96, Springer.

Huimin Li, Nele Mentens, Stjepan Picek (2022), A scalable SIMD RISC-V based processor with customized vector extensions for CRYSTALS-kyber, In Proceedings of the 59th ACM/IEEE Design Automation Conference, DAC 2022 p.733-738, Institute of Electrical and Electronics Engineers (IEEE).

A. Nadeem, S.E. Verwer, Stephen Moskal, Shanchieh Jay Yang (2022), Alert-driven Attack Graph Generation using S-PDFA, In IEEE Transactions on Dependable and Secure Computing Volume 19 p.731-746.

Lorena Poenaru-Olaru, Luis Cruz, Arie van Deursen, Jan Rellermeyer (2022), Are Concept Drift Detectors Reliable Alarming Systems?: A Comparative Study, Shusaku Tsumoto, Yukio Ohsawa, Lei Chen, Dirk Van den Poel, Xiaohua Hu, Yoichi Motomura, Takuya Takagi, Lingfei Wu, Ying Xie, Akihiro Abe, Vijay Raghavan (Eds.), In Proceedings of the 2022 IEEE International Conference on Big Data (Big Data) p.3364-3373, IEEE.

Ligia Maria Moreira Zorello, Laurens Bliek, Sebastian Troia, Tias Guns, Sicco Verwer, Guido Maier (2022), Baseband-Function Placement with Multi-Task Traffic Prediction for 5G Radio Access Networks, In IEEE Transactions on Network and Service Management Volume 19 p.5104 - 5119.

Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek (2022), Can You Hear It? Backdoor Attacks via Ultrasonic Triggers, In WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning p.57-62, Association for Computing Machinery (ACM).

Sudharshan Swaminathan, Łukasz Chmielewski, Guilherme Perin, Stjepan Picek (2022), Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds, Jianying Zhou, Sudipta Chattopadhyay, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Yury Zhauniarovich, Jun Shao, Chunhua Su, Cong Wang, Saman Zonouz (Eds.), In Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings p.165-182, Springer.

Stefanos Koffas, Stjepan Picek, Mauro Conti (2022), Dynamic Backdoors with Global Average Pooling, In Proceedings of the 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS) p.320-323, IEEE.

Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong (2022), Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices, Steven D. Galbraith (Eds.), In Topics in Cryptology - CT-RSA 2022 p.297-321, Springer.