1 code implementation • 29 Feb 2024 • Ilias Tsingenopoulos, Jacopo Cortellazzi, Branislav Bošanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro
It also makes possible to provide theoretical guarantees on the robustness of the model against a particular set of adversarial capabilities.
no code implementations • 20 Dec 2023 • Ilias Tsingenopoulos, Vera Rimmer, Davy Preuveneers, Fabio Pierazzi, Lorenzo Cavallaro, Wouter Joosen
To reliably measure robustness, it is important to evaluate against realistic and worst-case attacks.
2 code implementations • 18 Feb 2021 • Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom Van Goethem
Furthermore, we report on several privacy and security issues inherent to the technical setup of CNAME-based tracking that we detected through a combination of automated and manual analyses.
Cryptography and Security
no code implementations • 7 Feb 2020 • Eddy Truyen, Dimitri Van Landuyt, Davy Preuveneers, Bert Lagaisse, Wouter Joosen
(2) Methods: we present a descriptive feature comparison study of the three most prominent orchestration frameworks: Docker Swarm, Kubernetes, and Mesos, which can be combined with Marathon, Aurora or DC/OS.
Distributed, Parallel, and Cluster Computing
no code implementations • 21 Aug 2017 • Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, Wouter Joosen
In our open world evaluation, the most performant deep learning model is 2% more accurate than the state-of-the-art attack.