publications

Academic publications.

2025

  1. SatML
    SoK: On the offensive potential of AI
    Saskia Laura Schröer, Giovanni Apruzzese, Soheil Human, Pavel Laskov, Hyrum S Anderson, Edward WN Bernroider, and 10 more authors
    In 3rd IEEE Conference on Secure and Trustworthy Machine Learning, 2025

2023

  1. arXiv
    Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses
    Ilias Tsingenopoulos, Vera Rimmer, Davy Preuveneers, Fabio Pierazzi, Lorenzo Cavallaro, and Wouter Joosen
    arXiv preprint arXiv:2312.13435, 2023

2022

  1. PETS
    Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor
    Vera Rimmer, Theodor Schnitzler, Tom Van Goethem, Abel Rodrı́guez Romero, Wouter Joosen, and Katharina Kohls
    Proceedings on Privacy Enhancing Technologies, 2022
  2. WoRMA
    Position Paper: On Advancing Adversarial Malware Generation Using Dynamic Features
    Ali Shafiei, Vera Rimmer, Ilias Tsingenopoulos, Lieven Desmet, and Wouter Joosen
    In Proceedings of the 1st Workshop on Robust Malware Analysis, 2022
  3. Springer
    Open-World Network Intrusion Detection
    Vera Rimmer, Azqa Nadeem, Sicco Verwer, Davy Preuveneers, and Wouter Joosen
    In Security and Artificial Intelligence: A Crossdisciplinary Approach, 2022
  4. Springer
    Intelligent malware defenses
    Azqa Nadeem, Vera Rimmer, Wouter Joosen, and Sicco Verwer
    In Security and Artificial Intelligence: A Crossdisciplinary Approach, 2022

2021

  1. WTMC
    Troubleshooting an intrusion detection dataset: the CICIDS2017 case study
    Gints Engelen, Vera Rimmer, and Wouter Joosen
    In 2021 IEEE Security and Privacy Workshops (SPW), 2021

2018

  1. NDSS
    Automated Website Fingerprinting through Deep Learning
    Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van
Goethem, and Wouter Joosen
    In Proceedings of the 25nd Network and Distributed System
Security Symposium (NDSS 2018), 2018
  2. WOOT
    Fishy faces: Crafting adversarial images to poison face authentication
    In 12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018
  3. App.Sci.
    Chained anomaly detection models for federated learning: An intrusion detection case study
    Davy Preuveneers, Vera Rimmer, Ilias Tsingenopoulos, Jan Spooren, Wouter Joosen, and Elisabeth Ilie-Zudor
    Applied Sciences, 2018

2017

  1. SECURWARE
    Frictionless authentication systems: Emerging trends, research challenges and opportunities
    Davy Preuveneers, Wouter Joosen, Mustafa A Mustafa, Aysajan Abidin, and Enrique Argones Rúa
    In 11th Int. Conf. on Emerging Security Information, Systems and Technologies, SECURWARE, 2017