Picture for Stjepan Picek

Stjepan Picek

Emerging Threats and Countermeasures in Neuromorphic Systems: A Survey

Add code
Jan 23, 2026
Viaarxiv icon

SoK: The Last Line of Defense: On Backdoor Defense Evaluation

Add code
Nov 17, 2025
Viaarxiv icon

On Counts and Densities of Homogeneous Bent Functions: An Evolutionary Approach

Add code
Nov 16, 2025
Viaarxiv icon

CatBack: Universal Backdoor Attacks on Tabular Data via Categorical Encoding

Add code
Nov 08, 2025
Viaarxiv icon

NoMod: A Non-modular Attack on Module Learning With Errors

Add code
Oct 02, 2025
Viaarxiv icon

A Systematic Study on the Design of Odd-Sized Highly Nonlinear Boolean Functions via Evolutionary Algorithms

Add code
Apr 24, 2025
Figure 1 for A Systematic Study on the Design of Odd-Sized Highly Nonlinear Boolean Functions via Evolutionary Algorithms
Figure 2 for A Systematic Study on the Design of Odd-Sized Highly Nonlinear Boolean Functions via Evolutionary Algorithms
Figure 3 for A Systematic Study on the Design of Odd-Sized Highly Nonlinear Boolean Functions via Evolutionary Algorithms
Figure 4 for A Systematic Study on the Design of Odd-Sized Highly Nonlinear Boolean Functions via Evolutionary Algorithms
Viaarxiv icon

Degree is Important: On Evolving Homogeneous Boolean Functions

Add code
Jan 30, 2025
Figure 1 for Degree is Important: On Evolving Homogeneous Boolean Functions
Viaarxiv icon

Towards Backdoor Stealthiness in Model Parameter Space

Add code
Jan 10, 2025
Figure 1 for Towards Backdoor Stealthiness in Model Parameter Space
Figure 2 for Towards Backdoor Stealthiness in Model Parameter Space
Figure 3 for Towards Backdoor Stealthiness in Model Parameter Space
Figure 4 for Towards Backdoor Stealthiness in Model Parameter Space
Viaarxiv icon

The More the Merrier: On Evolving Five-valued Spectra Boolean Functions

Add code
Nov 19, 2024
Viaarxiv icon

Flashy Backdoor: Real-world Environment Backdoor Attack on SNNs with DVS Cameras

Add code
Nov 05, 2024
Figure 1 for Flashy Backdoor: Real-world Environment Backdoor Attack on SNNs with DVS Cameras
Figure 2 for Flashy Backdoor: Real-world Environment Backdoor Attack on SNNs with DVS Cameras
Figure 3 for Flashy Backdoor: Real-world Environment Backdoor Attack on SNNs with DVS Cameras
Figure 4 for Flashy Backdoor: Real-world Environment Backdoor Attack on SNNs with DVS Cameras
Viaarxiv icon