Author of the publication

Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis).

, , , , and . COSADE, volume 9064 of Lecture Notes in Computer Science, page 20-33. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A multi-steap ahead prediction method based on local dynamic properties., and . ESANN, page 311-316. (2000)A Page-Classification Approach to Web Usage Semantic Analysis., , , and . Engineering Letters, 14 (1): 120-126 (2007)Lazy learning for control design., , and . ESANN, page 73-78. (1998)The local paradigm for modeling and control: from neuro-fuzzy to lazy learning., , and . Fuzzy Sets and Systems, 121 (1): 59-72 (2001)Semi-Supervised Template Attack., , , , , and . IACR Cryptology ePrint Archive, (2012)Streaming active learning strategies for real-life credit card fraud detection: assessment and visualization., , , and . Int. J. Data Sci. Anal., 5 (4): 285-300 (2018)A Time Series Approach for Profiling Attack., , , and . SPACE, volume 8204 of Lecture Notes in Computer Science, page 75-94. Springer, (2013)Enabling Multimedia QoS Control with Black-Box Modelling., and . Soft-Ware, volume 2311 of Lecture Notes in Computer Science, page 46-59. Springer, (2002)Credit card fraud detection and concept-drift adaptation with delayed supervised information., , , , and . IJCNN, page 1-8. IEEE, (2015)Long-term prediction of time series by combining direct and MIMO strategies., , , and . IJCNN, page 3054-3061. IEEE Computer Society, (2009)