Follow
Stefanos Koffas
Stefanos Koffas
Verified email at tudelft.nl
Title
Cited by
Cited by
Year
Can you hear it? backdoor attacks via ultrasonic triggers
S Koffas, J Xu, M Conti, S Picek
Proceedings of the 2022 ACM Workshop on Wireless Security and Machine …, 2022
692022
Watermarking Graph Neural Networks based on Backdoor Attacks
J Xu, S Koffas, O Ersoy, S Picek
arXiv preprint arXiv:2110.11024, 2021
352021
More is better (mostly): On the backdoor attacks in federated graph neural networks
J Xu, R Wang, S Koffas, K Liang, S Picek
arXiv preprint arXiv:2202.03195, 2022
252022
Going in style: Audio backdoors through stylistic transformations
S Koffas, L Pajola, S Picek, M Conti
ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023
242023
Towards stealthy backdoor attacks against speech recognition via elements of sound
H Cai, P Zhang, H Dong, Y Xiao, S Koffas, Y Li
IEEE Transactions on Information Forensics and Security (TIFS), 2024
152024
Dynamic Backdoors with Global Average Pooling
S Koffas, S Picek, M Conti
2022 IEEE 4th International Conference on Artificial Intelligence Circuits …, 2022
82022
SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification
G Abad, J Xu, S Koffas, B Tajalli, S Picek, M Conti
arXiv preprint arXiv:2302.01740, 2023
72023
On the effect of clock frequency on voltage and electromagnetic fault injection
S Koffas, PK Vadnala
International Conference on Applied Cryptography and Network Security, 127-145, 2022
62022
BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks
M Arazzi, M Conti, S Koffas, M Krcek, A Nocera, S Picek, J Xu
arXiv preprint arXiv:2308.02465, 2023
42023
Backdoor Pony: Evaluating backdoor attacks and defenses in different domains
A Mercier, N Smolin, O Sihlovec, S Koffas, S Picek
SoftwareX 22, 101387, 2023
32023
Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks
J Xu, S Koffas, S Picek
Digital Threats: Research and Practice 5 (2), 1-29, 2024
22024
Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data
B Pleiter, B Tajalli, S Koffas, G Abad, J Xu, M Larson, S Picek
arXiv preprint arXiv:2311.07550, 2023
22023
Invisible Threats: Backdoor Attack in OCR Systems
M Conti, N Farronato, S Koffas, L Pajola, S Picek
arXiv preprint arXiv:2310.08259, 2023
22023
The SpongeNet Attack: Sponge Weight Poisoning of Deep Neural Networks
J Lintelo, S Koffas, S Picek
arXiv preprint arXiv:2402.06357, 2024
12024
Dr. Jekyll and Mr. Hyde: Two Faces of LLMs
M Gioele Collu, T Janssen-Groesbeek, S Koffas, M Conti, S Picek
arXiv e-prints, arXiv: 2312.03853, 2023
1*2023
A Systematic Evaluation of Backdoor Attacks in Various Domains
S Koffas, B Tajalli, J Xu, M Conti, S Picek
Embedded Machine Learning for Cyber-Physical, IoT, and Edge Computing: Use …, 2023
12023
Backdoor Attacks against Transformer-based Neural Networks for Tabular Data
B Pleiter, B Tajalli, S Koffas, G Abad, J Xu, M Larson, S Picek
MS thesis, Dept. Computing Science, Radboud Univ., Nijmegen, The Netherlands, 2023
12023
ELMs Under Siege: A Study on Backdoor Attacks on Extreme Learning Machines
B Tajalli, S Koffas, G Abad, S Picek
Proceedings of the 2024 Workshop on Artificial Intelligence and Security …, 2024
2024
EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody
C Schoof, S Koffas, M Conti, S Picek
Proceedings of the 2024 Workshop on Artificial Intelligence and Security …, 2024
2024
Backdoors on Manifold Learning
C Kreza, S Koffas, B Tajalli, M Conti, S Picek
Proceedings of the 2024 ACM Workshop on Wireless Security and Machine …, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20