Browsing by author "Joosen, Wouter"
Now showing items 21-40 of 200
-
A systematic comparison of age and gender prediction on IMU sensor-based gait traces
Van Hamme, Tim; Garofalo, Guiseppe; Argones Rua, Enrique; Preuveneers, Danny; Joosen, Wouter (2019) -
A Systematic Survey of Architectural Approaches and Trade-Offs in Data De-identification
Van Landuyt, Dimitri; Joosen, Wouter (2022) -
A voucher-based security middleware for secure Business Process Outsourcing
Heydari Beni, Emad; Lagaisse, Bert; Zhang, Ren; De Cock, Danny; Beato, Filipe; Joosen, Wouter (2017) -
A workload-driven Document Database Schema Recommender (DBSR)
Reniers, Vincent; Van landuyt, Dimitri; Rafique, Ansar; Joosen, Wouter (2020) -
A YCSB Workload for Benchmarking Hotspot Object Behaviour in NoSQL Databases
Claesen, C; Rafique, A; Van Landuyt, D; Joosen, Wouter (2021-07-14) -
Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows
Preuveneers, Davy; Joosen, Wouter (2017) -
Adaptive and reflective middleware for the cloudification of simulation & optimization workflows
Beni, Emad Heydari; Lagaisse, Bert; Joosen, Wouter (2017) -
Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication
Joos, Sander; Van Hamme, Tim; Preuveneers, Davy; Joosen, Wouter (2022) -
An architectural view for data protection by design
Sion, Laurens; Dewitte, Pierre; Van Landuyt, Dimitri; Wuyts, Kim; Emanuilov, Ivo; Valcke, Peggy; Joosen, Wouter (2019) -
An Audit of Facebook's Political Ad Policy Enforcement
Le Pochat, Victor; Edelson, Laura; Van Goethem, Tom; Joosen, Wouter; Mccoy, Damon; Lauinger, Tobias (2022) -
An Overview of Runtime Data Protection Enforcement Approaches
Sion, Laurens; Van Landuyt, Dimitri; Joosen, Wouter (2021) -
Analysis of architectural variants for auditable blockchain-based private data sharing
Reniers, Vincent; Van Landuyt, Dimitri; Viviani, Paolo; Lagaisse, Bert; Lombardi, Riccardo; Joosen, Wouter (2019) -
Applying Machine Learning to use security oracles: a case study in virus and malware detection
Preuveneers, Davy; Lavens, Emma; Joosen, Wouter (2022) -
Assessing the effectiveness of domain blacklisting against malicious DNS registrations
Vissers, Thomas; Janssen, Peter; Joosen, Wouter; Desmet, Lieven (2019) -
AsTAR: Sustainable battery free energy harvesting for heterogeneous platforms and dynamic environments
Yang, Fan; Samraj, Ashok; Sankar Ramachandran, Gowri; Krishnamachari, Bhaskar; Joosen, Wouter; Huygens, Christophe; Hughes, Danny (2019) -
AsTAR: Sustainable Energy Harvesting for the Internet of Things through Adaptive Task Scheduling
Yang, Fan; Thangarajan, Ashok Samraj; Ramachandran, Gowri Sankar; Joosen, Wouter; Hughes, Danny (2022) -
Authenticated and auditable data sharing via smart contact
Reniers, V.; Gao, Y.; Zhang, R.; Viviano, P.; Madhusudan, A.; Lagaisse, B.; Nikova, S.; Van Landuyt, D.; Lombardi, R.; Preneel, Bart; Joosen, Wouter (2020) -
AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication
Preuveneers, Davy; Joos, Sander; Joosen, Wouter (2021) -
AutoAttacker: A reinforcement learning approach for black-box adversarial attacks
Tsingenopoulos, Illias; Preuveneers, Davy; Joosen, Wouter (2019) -
Automated configuration of NoSQL performance and scalability tactics for data-intensive applications
Preuveneers, Davy; Joosen, Wouter (2020)