You are here

Publications

Found 36 results
Sort by: Author [ Title (Asc)] Type Year
Filters: Author is Bontempi, Gianluca  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Lerman L, Bontempi G, Markowitch O. The bias-variance decomposition in profiled attacks. Journal of Cryptographic Engineering [Internet]. 2015:1-13.
M
Lerman L, Medeiros SF, Bontempi G, Markowitch O. A Machine Learning Approach Against a Masked AES. In: Francillon A, Rohatgi P Smart Card Research and Advanced Applications. Vol. 8419. Smart Card Research and Advanced Applications. ; 2014. p. 61–75.
Lerman L, Bontempi G, Markowitch O. A machine learning approach against a masked AES. Journal of Cryptographic Engineering. 2014:1-17.
Lerman L, Medeiros SF, Bontempi G, Markowitch O. A Machine Learning Approach Against a Masked AES. In: Francillon A, Rohatgi P Smart Card Research and Advanced Applications. Smart Card Research and Advanced Applications. ; p. 61-75.
Lerman L, Medeiros SF, Bontempi G, Markowitch O. A Machine Learning Approach Against a Masked AES. In: Francillon A, Rohatgi P CARDIS 2013. CARDIS 2013. ; 2013. p. 62–77.
Lerman L, Bontempi G, Markowitch O. A machine learning approach against a masked AES - Reaching the limit of side-channel attacks with a learning model. J. Cryptographic Engineering [Internet]. 2015:123–139.
Bonnechere B, Wermenbol V, Dan B, Salvia P, Borgne Y-AL, Bontempi G, Vansummeren S, Sholukha V, Moiseev F, Jansen B, et al. Management and interpretation of medical data related to cerebral pasly: the ICT4 Rehab project. European journal of paediatric neurology. 2013:32.
Reggiani C, Borgne Y-AL, Dal Pozzolo A, Olsen C, Bontempi G. Minimum Redundancy Maximum Relevance: MapReduce implementation using Apache Hadoop.
Bontempi G. A Monte Carlo strategy for structured multiple-step-ahead time series prediction.
De Jay N, Papillon-Cavanagh S, Olsen C, Bontempi G, Haibe-Kains B. mRMRe: an R package for parallelized mRMR ensemble feature selection.
N
Lopes M, Bontempi G. On the Null Distribution of the Precision and Recall Curve. In: Machine Learning and Knowledge Discovery in Databases. Vol. 8725. Machine Learning and Knowledge Discovery in Databases. ; 2014. p. 322-337.
P
Lerman L, Bontempi G, Markowitch O. Power analysis attack: an approach based on machine learning. International Journal of Applied Cryptography. 2014:97-115.

Pages

Theme by Danetsoft and Danang Probo Sayekti inspired by Maksimer