Julien Tane
Email: jta@cs.uni-kassel.de

 

Mehr Informationen:

Current work:
Query Based Multicontext Browsing: Technical Report.

Interesting Quotes:

“Life does not cease to be funny when people die any more than it ceases to be serious when people laugh.” – George Bernard Shaw

— “We act as though comfort and luxury were the chief requirements of life, when all that we need to make us happy is something to be enthusiastic about.” – Einstein

— “Nicht die Dinge beunruhigen den Menschen, sondern die Meinung über die Dinge” – Arthur Schopenhauer

— Le bonheur n’est pas chose aisée: il est tres difficile de le trouver en nous, et impossible de le trouver ailleurs. Chamfort

  • Decentralized Collaborative Flow Monitoring in Distributed SDN Control-Planes (accepted for publication). Hark, Rhaban; Tounsi, Khalil; Rizk, Amr; Steinmetz, Ralf (2019). 1-8.
    URL
  • Exploring the value of machine learning for weighted multi-model combination of an ensemble of global hydrological models. Zaherpour, Jamal; Mount, Nick; Gosling, Simon N.; Dankers, Rutger; Eisner, Stephanie; Gerten, Dieter; Liu, Xingcai; Masaki, Yoshimitsu; Schmied, Hannes Müller; Tang, Qiuhong; Wada, Yoshihide (2019). 114 112 - 128.
    URL
  • YouTube video to Mp3 converter. Trank, Akshay (A. Trank, ed.) (2019).
    URL
  • Expressive Power of Oblivious Consensus Protocols. Blondin, Michael; Esparza, Javier; Jaax, Stefan (2019).
    URL
  • Homogenized halides and alkali cation segregation in alloyed organic-inorganic perovskites. Correa-Baena, Juan-Pablo; Luo, Yanqi; Brenner, Thomas M.; Snaider, Jordan; Sun, Shijing; Li, Xueying; Jensen, Mallory A.; Hartono, Noor Titan Putri; Nienhaus, Lea; Wieghold, Sarah; Poindexter, Jeremy R.; Wang, Shen; Meng, Ying Shirley; Wang, Ti; Lai, Barry; Holt, Martin V.; Cai, Zhonghou; Bawendi, Moungi G.; Huang, Libai; Buonassisi, Tonio; Fenning, David P. (2019). 363(6427) 627--631.
    URL
  • Asynchronous Training of Word Embeddings for Large Text Corpora. Anand, Avishek; Khosla, Megha; Singh, Jaspreet; Zab, Jan-Hendrik; Zhang, Zijian J. S. Culpepper, Moffat, A., Bennett, P. N., Lerman, K. (eds.) (2019). 168-176.
    URL
  • Self-calibrated Surface Acquisition for Integrated Positioning Verification in Medical Applications. Jörissen, S.; Bleier, M.; Nüchter, A. in Electronic Imaging (2019). 353-1--353-8.
    URL
  • Discovering Implicational Knowledge in Wikidata. Hanika, Tom; Marx, Maximilian; Stumme, Gerd (2019).
    URL
  • Multi-model seasonal forecasts for the wind energy sector. Lee, Doo Young; Doblas-Reyes, Francisco J.; Torralba, Verónica; Gonzalez-Reviriego, Nube (2019).
    URL
  • Liquid-Crystalline Small Molecules for Nonfullerene Solar Cells with High Fill Factors and Power Conversion Efficiencies. Li, Huan; Wu, Qiong; Zhou, Ruimin; Shi, Yanan; Yang, Chen; Zhang, Yajie; Zhang, Jianqi; Zou, Wenjun; Deng, Dan; Lu, Kun; Wei, Zhixiang (2018). 9(6) 1803175.
    URL
  • PCA of high dimensional random walks with comparison to neural network training. Antognini, Joseph; Sohl-Dickstein, Jascha (2018). 10328--10337.
    URL
  • Predicting User Knowledge Gain in Informational Search Sessions. Yu, Ran; Gadiraju, Ujwal; Holtz, Peter; Rokicki, Markus; Kemkes, Philipp; Dietze, Stefan K. Collins-Thompson, Mei, Q., Davison, B. D., Liu, Y., Yilmaz, E. (eds.) (2018). 75-84.
    URL
  • The Bayesian New Statistics: Hypothesis testing, estimation, meta-analysis, and power analysis from a Bayesian perspective. Kruschke, John K.; Liddell, Torrin M. (2018). 25(1) 178--206.
    URL
  • Investigating users' decision-making process while searching online and their shortcuts towards understanding. Tibau, Marcelo; Siqueira, Sean W. M.; Pereira Nunes, Bernardo; Bortoluzzi, Maria; Marenzi, Ivana; Kemkes, Philipp (2018).
    URL
  • Robust Fourier-based Checkerboard Corner Detection for Camera Calibration. Spitschan, Benjamin; Ostermann, Jörn (2018).
    URL
  • Multi-Tenancy-Capable Correlation of Security Events in 5G Networks. Steinke, Michael; Adam, Iris; Hommel, Wolfgang (2018).
    URL
  • Strange Floods: The Upper Tail of Flood Peaks in the United States. Smith, James A.; Cox, Alexander A.; Baeck, Mary Lynn; Yang, Long; Bates, Paul (2018). 54(9) 6510-6542.
    URL
  • Framework for Security Event Management in 5G. Adam, I.; Ping, J. S. Doerr, Fischer, M., Schrittwieser, S., Herrmann, D. (eds.) (2018). 51:1-51:7.
    URL
  • AppSAT: Approximately deobfuscating integrated circuits. Shamsi, Kaveh; Li, Meng; Meade, Travis; Zhao, Zheng; Pan, David Z.; Jin, Yier (2017). 95-100.
    URL
  • Ag conductive bridge RAMs for physical unclonable functions. Cambou, Bertrand; Afghah, Fatemeh; Sonderegger, Derek; Taggart, Jennifer; Barnaby, Hugh J.; Kozicki, Michael N. (2017). 151.
    URL
  • Reviving instruction set randomization. Sinha, Kanad; Kemerlis, Vasileios P.; Sethumadhavan, Simha (2017). 21-28.
    URL
  • Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAs. Koppermann, Philipp; Santis, Fabrizio De; Heyszl, Johann; Sigl, Georg (2017). 35-40.
    URL
  • Abstract: Characterizing EEPROM for usage as a ubiquitous PUF source. Pavlina, Chris; Torrey, Jacob; Temkin, Kyle (2017). 168.
    URL
  • A new maskless debiasing method for lightweight physical unclonable functions. Aysu, Aydin; Wang, Ye; Schaumont, Patrick; Orshansky, Michael (2017). 134-139.
    URL
  • Synthesis of hardware sandboxes for Trojan mitigation in systems on chip. Bobda, Christophe; Whitaker, Taylor J. L.; Kamhoua, Charles A.; Kwiat, Kevin A.; Njilla, Laurent (2017). 172.
    URL
  • On secure implementations of quantum-resistant supersingular isogeny Diffie-Hellman. Koziel, Brian; Azarderakhsh, Reza; Jao, David (2017). 160.
    URL
  • Cache timing attacks on recent microarchitectures. Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar (2017). 155.
    URL
  • Platform agnostic, scalable, and unobtrusive FPGA network processor design of moving target defense over IPv6 (MT6D) over IEEE 802.3 Ethernet. Sagisi, Joseph; Tront, Joseph G.; Marchany, Randy C. (2017). 165.
    URL
  • Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security. Schaller, André; Xiong, Wenjie; Anagnostopoulos, Nikolaos Athanasios; Saleem, Muhammad Umair; Gabmeyer, Sebastian; Katzenbeisser, Stefan; Szefer, Jakub (2017). 1-7.
    URL
  • Threshold voltage defined multi-input complex gates. De, Asmit; Ghosh, Swaroop (2017). 164.
    URL
  • Circuit recognition with deep learning. Dai, Yu-Yun; Brayton, Robert K. (2017). 162.
    URL
  • On designing optimal camouflaged layouts. Broadfoot, Thomas; Sechen, Carl; Rajendran, Jeyavijayan J. V. (2017). 169.
    URL
  • INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless network. Subramani, Kiruba Sankaran; Antonopoulos, Angelos; Abotabl, Ahmed Attia; Nosratinia, Aria; Makris, Yiorgos (2017). 90-94.
    URL
  • Take a moment and have some t: Hypothesis testing on raw PUF data. Immler, Vincent; Hiller, Matthias; Obermaier, Johannes; Sigl, Georg (2017). 128-129.
    URL
  • Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse. Bagadia, Krishna; Chatterjee, Urbi; Roy, Debapriya Basu; Mukhopadhyay, Debdeep; Chakraborty, Rajat Subhra (2017). 167.
    URL
  • Characterising a CPU fault attack model via run-time data analysis. Kelly, Martin S.; Mayes, Keith; Walker, John F. (2017). 79-84.
    URL
  • Malicious CAN-message attack against advanced driving assistant system. Shiozaki, Mitsuru; Kubota, Takaya; Nakano, Masashi; Nakazawa, Yuuki; Fujino, Takeshi (2017). 158.
    URL
  • Detection of counterfeit ICs using public identification sequences. Samarin, Peter; Lemke-Rust, Kerstin (2017). 163.
    URL
  • TTLock: Tenacious and traceless logic locking. Yasin, Muhammad; Mazumdar, Bodhisatwa; Rajendran, Jeyavijayan J. V.; Sinanoglu, Ozgur (2017). 166.
    URL
  • LWE-based lossless computational fuzzy extractor for the Internet of Things. Huth, Christopher; Becker, Daniela; Guajardo, Jorge; Duplys, Paul; Güneysu, Tim (2017). 154.
    URL
  • Stateless leakage resiliency from NLFSRs. Taha, Mostafa M. I.; Reyhani-Masoleh, Arash; Schaumont, Patrick (2017). 56-61.
    URL
  • Exploring timing side-channel attacks on path-ORAMs. Bao, Chongxi; Srivastava, Ankur (2017). 68-73.
    URL
  • Using computational game theory to guide verification and security in hardware designs. Smith, Andrew M.; Mayo, Jackson R.; Kammler, Vivian; Armstrong, Robert C.; Vorobeychik, Yevgeniy (2017). 110-115.
    URL
  • A stochastic all-digital weak physically unclonable function for analog/mixed-signal applications. Bryant, Troy; Chowdhury, Sreeja; Forte, Domenic; Tehranipoor, Mark; Maghari, Nima (2017). 140-145.
    URL
  • Analyzing security vulnerabilities of three-dimensional integrated circuits. Dofe, Jaya; Yu, Qiaoyan (2017). 156.
    URL
  • New clone-detection approach for RFID-based supply chains. Maleki, Hoda; Rahaeimehr, Reza; Jin, Chenglu; van Dijk, Marten (2017). 122-127.
    URL
  • Improving FPGA based SHA-3 structures. Sundal, Magnus; Chaves, Ricardo (2017). 159.
    URL
  • Hermes: Secure heterogeneous multicore architecture design. Kinsy, Michel A.; Khadka, Shreeya; Isakov, Mihailo; Farrukh, Anam (2017). 14-20.
    URL
  • Øzone: Efficient execution with zero timing leakage for modern microarchitectures. Aweke, Zelalem Birhanu; Austin, Todd M. (2017). 153.
    URL
  • Physical unclonable functions and dynamic partial reconfiguration for security in resource-constrained embedded systems. Pocklassery, Goutham; Kajuruli, Venkata K.; Plusquellic, James F.; Saqib, Fareena (2017). 116-121.
    URL
  • High efficiency power side-channel attack immunity using noise injection in attenuated signature domain. Das, Debayan; Maity, Shovan; Nasir, Saad Bin; Ghosh, Santosh; Raychowdhury, Arijit; Sen, Shreyas (2017). 62-67.
    URL
  • Efficient configurations for block ciphers with unified ENC/DEC paths. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco (2017). 41-46.
    URL
  • Creating security primitive by nanoscale manipulation of carbon nanotubes. Hu, Zhaoying; Han, Shu-Jen (2017). 29-34.
    URL
  • A novel physiological features-assisted architecture for rapidly distinguishing health problems from hardware Trojan attacks and errors in medical devices. Wehbe, Taimour; Mooney, Vincent John; Javaid, Abdul Qadir; Inan, Omer T. (2017). 106-109.
    URL
  • Connecting the dots: Privacy leakage via write-access patterns to the main memory. John, Tara Merin; Haider, Syed Kamran; Omar, Hamza; van Dijk, Marten (2017). 170.
    URL
  • Breaking active-set backward-edge CFI. Theodorides, Michael; Wagner, David A. (2017). 85-89.
    URL
  • Correlation power analysis attack against STT-MRAM based cyptosystems. Chakraborty, Abhishek; Mondal, Ankit; Srivastava, Ankur (2017). 171.
    URL
  • Towards a memristive hardware secure hash function (MemHash). Azriel, Leonid; Kvatinsky, Shahar (2017). 51-55.
    URL
  • Photonic side channel attacks against RSA. Carmon, Elad; Seifert, Jean-Pierre; Wool, Avishai (2017). 74-78.
    URL
  • Clustering with t-SNE, provably. Linderman, George C.; Steinerberger, Stefan (2017).
    URL
  • Challenging on-chip SRAM security with boot-state statistics. McMahan, Joseph; Cui, Weilong; Xia, Liang; Heckey, Jeff; Chong, Frederic T.; Sherwood, Timothy (2017). 101-105.
    URL
  • Cobwebs from the Past and Present: Extracting Large Social Networks using Internet Archive Data. Shaltev, Miroslav; Zab, Jan-Hendrik; Kemkes, Philipp; Siersdorfer, Stefan; Zerr, Sergej (2017). abs/1701.03277
    URL
  • Memory-constrained implementation of lattice-based encryption scheme on standard Java Card. Yuan, Ye; Fukushima, Kazuhide; Kiyomoto, Shinsaku; Takagi, Tsuyoshi (2017). 47-50.
    URL
  • A novel offset method for improving bitstring quality of a Hardware-Embedded delay PUF. Che, Wenjie; Plusquellic, Jim; Saqib, Fareena (2017). 157.
    URL
  • Improving reliability of weak PUFs via circuit techniques to enhance mismatch. Patil, Vinay C.; Vijayakumar, Arunkumar; Holcomb, Daniel E.; Kundu, Sandip (2017). 146-150.
    URL
  • Parameter biasing obfuscation for analog IP protection. Rao, Vaibhav Venugopal; Savidis, Ioannis (2017). 161.
    URL
  • When good protections go bad: Exploiting anti-DoS measures to accelerate rowhammer attacks. Aga, Misiker Tadesse; Aweke, Zelalem Birhanu; Austin, Todd M. (2017). 8-13.
    URL
  • Fabrication security and trust of domain-specific ASIC processors. Vai, Michael; Gettings, Karen; Lyszczarz, Theodore (2017). 152.
    URL
  • Experimental evaluation of two software countermeasures against fault attacks. Moro, Nicolas; Heydemann, Karine; Dehbaoui, Amine; Robisson, Bruno; Encrenaz, Emmanuelle (2014). 112-117.
    URL
  • Composite PUF: A new design paradigm for Physically Unclonable Functions on FPGA. Sahoo, Durga Prasad; Saha, Sayandeep; Mukhopadhyay, Debdeep; Chakraborty, Rajat Subhra; Kapoor, Hitesh (2014). 50-55.
    URL
  • Security of SoC firmware load protocols. Krstic, Sava; Yang, Jin; Palmer, David W.; Osborne, Randy B.; Talmor, Eran (2014). 70-75.
    URL
  • Side-channel leakage on silicon substrate of CMOS cryptographic chip. Fujimoto, Daisuke; Tanaka, Daichi; Miura, Noriyuki; Nagata, Makoto; ichi Hayashi, Yu; Homma, Naofumi; Bhasin, Shivam; Danger, Jean-Luc (2014). 32-37.
    URL
  • Situative Gestaltung des IT-Produktmanagements: eine empirische Untersuchung. Technical Report (PhD dissertation), Peine, Katharina PhD thesis, Universität Stuttgart. (2014).
    URL
  • A Chaotic Ring oscillator based Random Number Generator. Dhanuskodi, Siva Nishok; Vijayakumar, Arunkumar; Kundu, Sandip (2014). 160-165.
    URL
  • Building trusted ICs using split fabrication. Vaidyanathan, Kaushik; Das, Bishnu P.; Sumbul, H. Ekin; Liu, Renzhi; Pileggi, Larry T. (2014). 1-6.
    URL
  • On design of a highly secure PUF based on non-linear current mirrors. Kumar, Raghavan; Burleson, Wayne (2014). 38-43.
    URL
  • A look into SIMON from a side-channel perspective. Bhasin, Shivam; Graba, Tarik; Danger, Jean-Luc; Najm, Zakaria (2014). 56-59.
    URL
  • Verification of untrusted chips using trusted layout and emission measurements. Stellari, Franco; Song, Peilin; Weger, Alan J.; Culp, Jim; Herbert, A.; Pfeiffer, Dirk (2014). 19-24.
    URL
  • A noise bifurcation architecture for linear additive physical functions. Yu, Meng-Day (Mandel); M'Raïhi, David; Verbauwhede, Ingrid; Devadas, Srinivas (2014). 124-129.
    URL
  • Countering the effects of silicon aging on SRAM PUFs. Maes, Roel; van der Leest, Vincent (2014). 148-153.
    URL
  • Increasing the efficiency of laser fault injections using fast gate level reverse engineering. Courbon, Franck; Loubet-Moundi, Philippe; Fournier, Jacques J. A.; Tria, Assia (2014). 60-63.
    URL
  • Power supply glitch attacks: Design and evaluation of detection circuits. Gomina, Kamil; Rigaud, Jean-Baptiste; Gendrier, Philippe; Candelier, Philippe; Tria, Assia (2014). 136-141.
    URL
  • Towards the identification of types of software product managers: tasks and situational factors. Peine, K.; Helferich, A.; Schockert, S. (2013).
    URL
  • An analysis of tag-recommender evaluation procedures. Doerfel, Stephan; Jäschke, Robert Q. Yang, King, I., Li, Q., Pu, P., Karypis, G. (eds.) (2013). 343-346.
    URL
  • Role of the Bering Strait on the hysteresis of the ocean conveyor belt circulation and glacial climate stability. Hu, Aixue; Meehl, Gerald A; Han, Weiqing; Timmermann, Axel; Otto-Bliesner, Bette; Liu, Zhengyu; Washington, Warren M; Large, William; Abe-Ouchi, Ayako; Kimoto, Masahide; Lambeck, Kurt; Wu, Bingyi (2012). 109 6417-6422.
    URL
  • Nachhaltige Anwendungssysteme dank IT-Produktmanagement. Peine, Katharina; Helferich, Andreas; Schockert, Sixten in LNI, H. Brandt-Pook, Fleer, A., Spitta, T., Wattenberg, M. (eds.) (2012). (Vol. 209) 36-49.
    URL
  • Cheating to achieve Formal Concept Analysis over a Large Formal Context. Codocedo, Víctor; Taramasco, Carla; Astudillo, Hernán in CEUR Workshop Proceedings, A. Napoli, Vychodil, V. (eds.) (2011). (Vol. 959) 349-362.
    URL
  • Analysis of Large Data Sets using Formal Concept Lattices. Andrews, Simon; Orphanides, Constantinos in CEUR Workshop Proceedings, M. Kryszkiewicz, Obiedkov, S. A. (eds.) (2010). (Vol. 672) 104-115.
    URL
  • Concept lattice reduction using fuzzy K-Means clustering. Aswanikumar, Ch.; Srinivas, S. (2010). 37(3) 2696-2704.
    URL
  • Key Predistribution Based Broadcast Authentication Scheme for Wireless Sensor Networks. Liu, Yongsheng; Li, Jie (2009).
    URL
  • Rydberg energies using excited state density functional theory. Cheng, Chiao-Lun; Wu, Qin; Van Voorhis, Troy (2008). 129(12) 124112.
    URL
  • Random Survival Forests. Ishwaran, Hamat; Kogalur, Udaya B.; Blackstone, Eugene H.; Lauer, Michael S. (2008).
    URL
  • Self-consistent field calculations of excited states using the maximum overlap method (MOM). Gilbert, Andrew TB; Besley, Nicholas A; Gill, Peter MW (2008). 112(50) 13164--13171.
    URL
  • Even Small Birds are Unique: Population Protocols with Identifiers. Guerraoui, Rachid; Ruppert, Eric (2007).
    URL
  • Trapping of excitons at chemical defects in polyethylene. Ceresoli, Davide; Tosatti, Erio; Scandolo, Sandro; Santoro, G; Serra, S (2004). 121(13) 6478--6484.
    URL
  • Structural Relaxations in Electronically Excited Poly(para-phenylene). Artacho, Emilio; Rohlfing, M; Côté, M; Haynes, PD; Needs, RJ; Molteni, C (2004). 93(11) 116401.
    URL
  • Arbeitsmarktgesteuerte Zuwanderung: Szenarien der Zuwanderung sowie rechtliche und institutionelle Aspekte ihrer Steuerung Heilemann, Ullrich; Loeffelholz, Hans Dietrich von; Sieveking, Klaus in Schriftenreihe des Rheinisch-Westfälischen Instituts für Wirtschaftsforschung, Teil N.F., H. 68 (2003). Duncker & Humblot, DE-836.
    URL
  • Efficient Data Mining Based on Formal Concept Analysis. Stumme, Gerd in LNCS (2002). (Vol. 2453) 534-546.
    URL
  • Localized excitons and breaking of chemical bonds at III-V (110) surfaces. Pankratov, Oleg; Scheffler, Matthias (1995). 75(4) 701.
    URL
  • Network structure and minimum degree. Seidman, Stephen B. (1983). 5(3) 269-287.
    URL