Davy Preuveneers
Katholieke Universiteit Leuven
H-index: 31
Europe-Belgium
Top articles of Davy Preuveneers
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
How to Train your Antivirus: RL-based Hardening through the Problem-Space | arXiv preprint arXiv:2402.19027 | Jacopo Cortellazzi Ilias Tsingenopoulos Branislav Bošanský Simone Aonzo Davy Preuveneers | 2024/2/29 |
An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications | Future Internet | Davy Preuveneers Wouter Joosen | 2024/2/22 |
Business model development concept for SMEs in the era of twin transition | Procedia Computer Science | Viola Gallina Arko Steinwender Elisabeth Zudor Davy Preuveneers Sebastian Schlund | 2024/1/1 |
On the Brittleness of Robust Features: An Exploratory Analysis of Model Robustness and Illusionary Robust Features | Alireza Aghabagherloo Rafa Gálvez Davy Preuveneers Bart Preneel | 2023/5/25 | |
Mitigating undesired interactions between liveness detection components in biometric authentication | Emma Lavens Davy Preuveneers Wouter Joosen | 2023/8/29 | |
Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses | arXiv preprint arXiv:2312.13435 | Ilias Tsingenopoulos Vera Rimmer Davy Preuveneers Fabio Pierazzi Lorenzo Cavallaro | 2023/12/20 |
AutoFL: Towards AutoML in a Federated Learning Context | Applied Sciences | Davy Preuveneers | 2023/7/9 |
On the adversarial robustness of full integer quantized TinyML models at the edge | Davy Preuveneers Willem Verheyen Sander Joos Wouter Joosen | 2023/12/11 | |
Effective Machine Learning-based Access Control Administration through Unlearning | Javier Martínez Llamas Davy Preuveneers Wouter Joosen | 2023/7/3 | |
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections | Computers & Security | Davy Preuveneers Wouter Joosen | 2023/12/1 |
Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors | Tim Van Hamme Giuseppe Garofalo Davy Preuveneers Wouter Joosen | 2023/7/3 | |
On the Use of AutoML for Combating Alert Fatigue in Security Operations Centers | Davy Preuveneers Javier Martínez Llamas Irfan Bulut Enrique Argones Rúa Pieter Verfaillie | 2023/9/25 | |
Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems | Willem Verheyen Tim Van Hamme Sander Joos Davy Preuveneers Wouter Joosen | 2023/8/29 | |
Revisiting OAuth 2.0 compliance: a two-year follow-up study | Pieter Philippaerts Davy Preuveneers Wouter Joosen | 2023/7/3 | |
Open-world network intrusion detection | Vera Rimmer Azqa Nadeem Sicco Verwer Davy Preuveneers Wouter Joosen | 2022/4/8 | |
Captcha me if you can: Imitation Games with Reinforcement Learning | Ilias Tsingenopoulos Davy Preuveneers Lieven Desmet Wouter Joosen | 2022/6/6 | |
Applied Deep Learning in Security and Privacy | Vera Rimmer Wouter Joosen Davy Preuveneers | 2022/12/15 | |
Adaptive malware control: Decision-based attacks in the problem space of dynamic analysis | Ilias Tsingenopoulos Ali Mohammad Shafiei Lieven Desmet Davy Preuveneers Wouter Joosen | 2022/5/30 | |
OAuch: Exploring security compliance in the OAuth 2.0 ecosystem | Pieter Philippaerts Davy Preuveneers Wouter Joosen | 2022/10/26 | |
Adversarial robustness is not enough: Practical limitations for securing facial authentication | Sander Joos Tim Van Hamme Davy Preuveneers Wouter Joosen | 2022/4/18 |