Circular Image

R.L. Lagendijk

38 records found

Experience Sampling Method (ESM) has emerged as a technique for capturing real-time mental health data in natural environments, offering advantages over traditional retrospective assessments by reducing recall bias and providing contextual understanding of emotional patterns. Des ...

Gaining and Visualizing Mental Health Insights from Self-Report Data

Presentation of Insights from ESM Data into Client Conditions for Practitioners

ESM is an important step towards improving mental health care and its efficiency. Most research in this field has focused on the client as its end user. However, mental health practitioners can also use the data gathered using ESM to gain insights into their clients. To discover ...
Understanding mental resilience-how individuals recover from stressors-is a critical focus area for mental health practitioners. To support this, the Experience Sampling Method (ESM) can be utilized, which offers rich, real-time data for tracking emotional dynamics. However, visu ...

Visualizing Self-Report Data for Clinical Insight

Practitioner Perspectives on ESM Feedback for Assessing Therapy Effectiveness

Background: The Experience Sampling Method (ESM) enables the collection of momentary self-reports on thoughts, emotions, and behaviour in daily life. However, there is limited practical guidance on how to visualize this data to support practitioners.
Objective:
The Experience Sampling Method (ESM) is increasingly recognized for its ability to capture fine-grained, real-time insights into individuals’ emotional and behavioral states in their everyday environments. While the utility of ESM in clinical contexts has been well-documented, it ...
Smoking cessation remains a persistent public health challenge, with digital interventions increasingly adopted to support behavior change. This study explores how smokers plan and engage with preparatory activities suggested by conversational agents in online cessation programs. ...

Interaction with Artificial Social Agents

A thematic analysis of people’s experiences

The use of Artificial Social Agents (ASAs) is rapidly expanding across society. As these agents become more integrated into our interactions, understanding the user experience of them becomes increasingly necessary to ensure their design aligns with user needs, promotes trust, an ...
Digital smoking cessation tools increasingly use chatbots to recommend preparatory activities intended to support behavior change. However, little is known about how users actually experience these activities and whether large language models (LLMs) can support the qualitative an ...
Smoking cessation interventions sometimes involve the use of both technology and human support to increase effectiveness. Nevertheless, little is known about user preferences for allocating human support and whether large language models (LLMs) can support qualitative analysis to ...
Side-channel attacks (SCA) play a crucial role in assessing the security of the implementation of cryp- tographic algorithms. Still, traditional profiled attacks require a nearly identical reference device to the target, limiting their practicality. This thesis focuses on non-pro ...

Hardware-based implementations in Side-Channel Analysis

A comparison study of DL SCA attacks against HW and SW AES and a novel methodology

Side-Channel Attacks (SCA) attempt to recover the secret cryptographic key from an electronic device by exploiting the unintended physical leakages of said device. With the devices that are being attacked becoming more sophisticated, so is SCA. In the past few years, the focus of ...
Some of the most prominent types of attacks against modern cryptographic implementations are side-channel attacks. These attacks leverage some unintended, often physical, leakage of the implementation to retrieve secret information. In recent times, a large part of the focus of s ...
Side-channel attacks (SCA) can obtain secret information related to the private key used during encryption executed on some device by exploiting leakage in power traces produced by the device. In recent years, researchers found that a neural network (NN) can be employed to execut ...

Side-channel Attacks on Inner Rounds of AES and PRESENT

A deeper look into the inner rounds of SPN based block ciphers and how this vision can help us attack the intermediate bytes using Deep Learning

Side-channel attacks (SCA) focus on vulnerabilities caused by insecure implementations and exploit them to deduce useful information about the data being processed or the data itself through leakages obtained from the device. There have been many studies exploiting these side-cha ...
Clinical decision support systems is a collection name for a lot of Artificial Intelligence systems used in healthcare. These systems are designed to help health workers make decisions faster and make the healthcare environment as a whole more efficient. Decisions made by these s ...
Companies have been looking for automation in their hiring practices and Artificial Intelligence offers a solution. A popular opinion on the topic is that AI-enabled hiring will enhance talent acquisition overall, eliminating bias and bettering results. However, deployed AI hirin ...
Artificial Intelligence (AI) is widely used in hiring practices to identify the most suitable candidate for a vacancy. This is due to the promise of higher overall efficiency and lower costs. However, these AI-powered tools may create an inaccurate conception of the applicant's s ...
Machine learning algorithms were used in in the past decade to assist humans with recruitment and grades assessments in the academic field. For the most part, the algorithms either exacerbated existing biases or output unfair results. This could often be traced back to an ill-imp ...

Covert DNS Storage Channel Detection

Uncovering surreptitious data exchange using the phonebook of the internet

The cyber arms race has red and blue teams continuously at their toes to keep ahead. Increasingly capable cyber actors breach secure networks at a worrying scale. While network monitoring and analysis should identify blatant data exfiltration attempts, covert channels bypass thes ...

Adversarial Examples as a defense against Side-Channel Attacks

A novel approach for countermeasure design

Over the last decades, side-channel attacks (SCAs) have been proven as a substantial weakness of cryptographic devices, while the recent growth of deep learning (DL) dramatically improved the performance of SCA. More and more researches present ways to build lightweight deep neur ...