Name
Affiliation
Papers
DAVY PREUVENEERS
K.U. Leuven, Department of Computer Science, Heverlee, Belgium
117
Collaborators
Citations 
PageRank 
114
705
65.56
Referers 
Referees 
References 
1714
2588
1218
Search Limit
1001000
Title
Citations
PageRank
Year
Towards Trustworthy Cyber-Physical Production Systems: A Dynamic Agent Accountability Approach00.342021
AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication00.342021
On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication00.342021
Cloud And Edge Based Data Analytics For Privacy-Preserving Multi-Modal Engagement Monitoring In The Classroom10.352021
Distributed Security Framework for Reliable Threat Intelligence Sharing00.342020
A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints10.372020
Automated Configuration Of Nosql Performance And Scalability Tactics For Data-Intensive Applications00.342020
A Siamese Adversarial Anonymizer for Data Minimization in Biometric Applications00.342020
Resource Usage and Performance Trade-offs for Machine Learning Models in Smart Environments.00.342020
AutoAttacker: A reinforcement learning approach for black-box adversarial attacks00.342019
Detection of algorithmically generated domain names used by botnets - a dual arms race.30.472019
A Systematic Comparison of Age and Gender Prediction on IMU Sensor-Based Gait Traces.20.502019
PPG<sup>2</sup>Live: Using dual PPG for active authentication and liveness detection00.342019
Smart Cyber-Physical System Applications In Production And Logistics: Special Issue Editorial00.342019
Special Issue: Big Data for context-aware applications and intelligent environments00.342019
Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge Microservices00.342019
TATIS - Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE.00.342019
Internet of Things for enabling smart environments: A technology-centric perspective.70.432019
Edge-Based and Privacy-Preserving Multi-Modal Monitoring of Student Engagement in Online Learning Environments00.342019
Data Privatizer for Biometric Applications and Online Identity Management.00.342019
Robust Digital Twin Compositions for Industry 4.0 Smart Manufacturing Systems00.342018
Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities.00.342018
Policy reconciliation for access control in dynamic cross-enterprise collaborations.10.362018
Fishy Faces: Crafting Adversarial Images to Poison Face Authentication.00.342018
Managing distributed trust relationships for multi-modal authentication.10.352018
Automated Website Fingerprinting through Deep Learning.180.652018
Fishy Faces: Crafting Adversarial Images to Poison Face Authentication.00.342018
K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact).00.342018
Automated Feature Extraction for Website Fingerprinting through Deep Learning.10.352017
Quality Parameters as Modeling Language Abstractions for Context-Aware Applications: An AAL Case Study.00.342017
Identity management for cyber-physical production workflows and individualized manufacturing in industry 4.0.10.362017
Enhanced fraud detection as a service supporting merchant-specific runtime customization.10.352017
Introduction to the thematic issue on Intelligent systems, applications and environments for the industry of the future.00.342017
Trustworthy Data-Driven Networked Production For Customer-Centric Plants10.362017
QoC2 Breaker: intelligent software circuit breakers for fault-tolerant distributed context-aware applications.00.342017
The intelligent industry of the future: A survey on emerging trends, research challenges and opportunities in Industry 4.0.50.432017
Leveraging Battery Usage from Mobile Devices for Active Authentication.60.462017
Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication.50.422016
Systematic scalability assessment for feature oriented multi-tenant services30.372016
Feature-Based Variability Management For Scalable Enterprise Applications: Experiences With An E-Payment Case00.342016
Data Protection Compliance Regulations and Implications for Smart Factories of the Future00.342016
SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments.110.582016
CEML: Mixing and moving complex event processing and machine learning to the edge of the network for IoT applications.10.352016
Security and privacy controls for streaming data in extended intelligent environments.20.362016
Semantic analysis and verification of context-driven adaptive applications in intelligent environments.40.392016
Privacy-enabled remote health monitoring applications for resource constrained wearable devices.20.352016
Adaptive Dissemination For Mobile Electronic Health Record Applications With Proactive Situational Awareness20.372016
SparkXS: Efficient Access Control for Intelligent and Large-Scale Streaming Data Applications20.372015
Mobile device fingerprinting considered harmful for risk-based authentication80.662015
PRISM: Policy-driven Risk-based Implicit locking for improving the Security of Mobile end-user devices.00.342015
  • 1
  • 2