Research
Current research areas
- Security of machine learning. Our focus is on assuring confidentiality of sensitive data while performing inference with neural networks. Examples:
- E. Zhang, Z. Á. Mann. Predicting the execution time of secure neural network inference. IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), pp. 481-494, 2024. https://link.springer.com/chapter/10.1007/978-3-031-65175-5_34
- Z. Á. Mann, C. Weinert, D. Chabal, J. W. Bos. Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead. ACM Computing Surveys, 56(5): Article 117, 2023. https://doi.org/10.1145/3628446
- Automated management of IT security risks. We develop methods to automatically assess security risks and mitigation actions. Examples:
- Z. Á. Mann. Urgency in cybersecurity risk management: toward a solid theory. IEEE 37th Computer Security Foundations Symposium (CSF), pp. 651-664, 2024. https://ieeexplore.ieee.org/document/10664345
- S. S. Zmiewski, J. Laufer, Z. Á. Mann. Automatic online quantification and prioritization of data protection risks. 17th International Conference on Availability, Reliability and Security (ARES), Article 7, 2022. https://doi.org/10.1145/3538969.3539005
- Privacy preserving technologies. Our aim is to support the optimal choice and configuration of privacy-preserving technologies during system design and during operations. Examples:
- Z. Á. Mann, J. Petit, S. M. Thornton, M. Buchholz, J. Millar. SPIDER: Interplay Assessment Method for Privacy and Other Values. IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 1-8, 2024. https://ieeexplore.ieee.org/abstract/document/10628815
- D. Ayed, P.-A. Dragan, E. Félix, Z. Á. Mann, E. Salant, R. Seidl, A. Sidiropoulos, S. Taylor, R. Vitorino. Protecting sensitive data in the cloud-to-edge continuum: The FogProtect approach. 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid), pp. 279-288, 2022. https://ieeexplore.ieee.org/abstract/document/9826058
Publications (since December 2024)
- E. Peltonen, S. Bayhan, D. Bermbach, S. Buschjäger, V. Degeler, A. Ding, O. Incel, D. Katare, M. Kjaergaard, S. Leroux, T. Mahmoodi, Z. Á. Mann, et al. Rethinking computing systems in the era of climate crisis: A call for a sustainable computing continuum. IEEE Internet Computing, accepted, 2025
- D. Chabal, T. Muller, E. Zhang, D. Sapra, C. de Laat, Z. Á. Mann. COLIBRI: Optimizing Multi-Party Secure Neural Network Inference Time for Transformers. 40th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), accepted, 2025
- Z. Á. Mann. Time is money: A temporal model of cybersecurity. 40th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), accepted, 2025
- R. van Dijk, J. van de Wetering, R. Argentini, L. Gorka, A. F. van Luenen, S. Minnema, E. Rijgersberg, M. Ugen, Z. Á. Mann, Z. Geradts. PaSSw0rdVib3s!: AI-assisted Password Recognition for Digital Forensic Investigations. Digital Forensics Research Conference Europe (DFRWS EU), accepted, 2025
- K. Batool, S. Anwar, Z. Á. Mann. SecFePAS: Secure Facial-expression-based Pain Assessment with Deep Learning at the Edge. 2024 IEEE/ACM Symposium on Edge Computing (SEC), pp. 417-424, 2024
Up
Jump directly to:
To the beginning of the text (Jump over the navigation) ,
Main navigation ,
Themes navigation ,
Up