


default search action
Mauro Conti
Person information
- affiliation: University of Padua, Italy
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
[j332]Amandeep Verma, Rahul Saha
, Gulshan Kumar
, Alessandro Brighente
, Mauro Conti
, Tai-Hoon Kim
:
Exploring the Landscape of Programming Language Identification With Machine Learning Approaches. IEEE Access 13: 23556-23579 (2025)
[j331]Jahez Abraham Johny
, K. A. Asmitha, P. Vinod, G. Radhamani, Rafidha Rehiman K. A., Mauro Conti
:
Deep learning fusion for effective malware detection: leveraging visual features. Clust. Comput. 28(2): 135 (2025)
[j330]Rahul Saha, Gulshan Kumar, Mauro Conti, Tai-Hoon Kim, In Seop Na, Vaibhav Markandey:
PURKAA: privacy ensured game-based task of floading for mobile blockchains. Clust. Comput. 28(13): 842 (2025)
[j329]Ying Yuan
, Giovanni Apruzzese
, Mauro Conti
:
Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection. Comput. Secur. 148: 104115 (2025)
[j328]Alessandro Lotto
, Francesco Marchiori
, Alessandro Brighente
, Mauro Conti
:
A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols. IEEE Commun. Surv. Tutorials 27(4): 2470-2504 (2025)
[j327]Milad Taleby Ahvanooey
, Wojciech Mazurczyk, Jun Zhao
, Luca Caviglione
, Kim-Kwang Raymond Choo
, Max Kilger, Mauro Conti
, Rafael Misoczki:
Future of cyberspace: A critical review of standard security protocols in the post-quantum era. Comput. Sci. Rev. 57: 100738 (2025)
[j326]Marco Arazzi
, Dincy R. Arikkat
, Serena Nicolazzo
, Antonino Nocera
, Rafidha Rehiman K. A.
, Vinod P.
, Mauro Conti
:
NLP-based techniques for Cyber Threat Intelligence. Comput. Sci. Rev. 58: 100765 (2025)
[j325]Dincy R. Arikkat
, Mert Cihangiroglu
, Mauro Conti
, Rafidha Rehiman K. A.
, Serena Nicolazzo
, Antonino Nocera
, P. Vinod:
SeCTIS: A framework to Secure CTI Sharing. Future Gener. Comput. Syst. 164: 107562 (2025)
[j324]K. M. Sameera, Arnaldo Sgueglia
, P. Vinod
, Rafidha Rehiman K. A.
, Corrado Aaron Visaggio
, Andrea Di Sorbo
, Mauro Conti:
SecDefender: Detecting low-quality models in multidomain federated learning systems. Future Gener. Comput. Syst. 164: 107587 (2025)
[j323]Mohamed A. El-Zawawy
, Harsha Vasudev, Mauro Conti
:
BDMFA: Forensic-enabling attestation technique for Internet of Medical Things. Internet Things 29: 101464 (2025)
[j322]Emad Efatinasab
, Alessandro Brighente
, Denis Donadel
, Mauro Conti
, Mirco Rampazzo
:
Towards robust stability prediction in smart grids: GAN-based approach under data constraints and adversarial challenges. Internet Things 33: 101662 (2025)
[j321]Saiqin Xu
, Alessandro Brighente
, Baixiao Chen
, Mauro Conti
, Shuai Peng
:
Ghost of the Navigator: Spoofing Attack Against Direction-of-Arrival Estimation. IEEE Internet Things J. 12(23): 49932-49941 (2025)
[j320]Gulshan Kumar, Rahul Saha
, Mauro Conti
, Tai-Hoon Kim:
ZAKON: A decentralized framework for digital forensic admissibility and justification. Inf. Process. Manag. 62(6): 104226 (2025)
[j319]Jiaxin Li
, Marco Arazzi
, Antonino Nocera
, Mauro Conti
:
Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning. J. Inf. Secur. Appl. 90: 104034 (2025)
[j318]Matteo Brosolo
, Vinod P., Mauro Conti
:
Through the static: Demystifying malware visualization via explainability. J. Inf. Secur. Appl. 91: 104063 (2025)
[j317]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Serena Nicolazzo
, Marco Arazzi
, Antonino Nocera
, Mauro Conti
:
DroidTTP: Mapping android applications with TTP for Cyber Threat Intelligence. J. Inf. Secur. Appl. 93: 104162 (2025)
[j316]K. M. Sameera
, Vinod P.
, Anderson Rocha
, Rafidha Rehiman K. A., Mauro Conti:
WeiDetect: Weibull distribution-based defense against poisoning attacks in federated learning for network intrusion detection systems. J. Inf. Secur. Appl. 95: 104275 (2025)
[j315]K. A. Asmitha, P. Vinod, Rafidha Rehiman K. A.
, Neeraj Raveendran, Mauro Conti
:
Android malware defense through a hybrid multi-modal approach. J. Netw. Comput. Appl. 233: 104035 (2025)
[j314]Ehsan Nowroozi
, Yassine Mekdad, Mauro Conti
, Simone Milani, A. Selcuk Uluagac:
Real or virtual: a video conferencing background manipulation-detection system. Multim. Tools Appl. 84(24): 28157-28189 (2025)
[j313]Florine W. Dekker
, Zekeriya Erkin
, Mauro Conti
:
Topology-Based Reconstruction Prevention for Decentralised Learning. Proc. Priv. Enhancing Technol. 2025(1): 553-566 (2025)
[j312]Surudhi Asokraj
, Tommaso Bianchi
, Alessandro Brighente
, Mauro Conti
, Radha Poovendran
:
Identity-Based Authentication for On-Demand Charging of Electric Vehicles. IEEE Trans. Dependable Secur. Comput. 22(3): 2492-2504 (2025)
[j311]Meng Li
, Yifei Chen
, Jianbo Gao
, Jingyu Wu, Zijian Zhang
, Jialing He
, Liehuang Zhu
, Mauro Conti
, Xiaodong Lin
:
Accurate, Secure, and Efficient Semi-Constrained Navigation Over Encrypted City Maps. IEEE Trans. Dependable Secur. Comput. 22(3): 2642-2658 (2025)
[j310]Yizhong Liu
, Peiyuan Li, Dongyu Li
, Chengqi Wu, Nan Jiang, Qianhong Wu
, Ankit Gangwal
, Prayag Tiwari
, Mauro Conti
:
SharHSC: A Sharding-Based Hybrid State Channel to Realize Blockchain Scalability and Security. IEEE Trans. Dependable Secur. Comput. 22(3): 2705-2722 (2025)
[j309]Marco Venturini, Francesco Freda, Emanuele Miotto
, Mauro Conti
, Alberto Giaretta
:
Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations. IEEE Trans. Dependable Secur. Comput. 22(4): 3449-3464 (2025)
[j308]Mauro Conti
, Jiaxin Li
, Stjepan Picek
:
On the Vulnerability of Data Points Under Multiple Membership Inference Attacks and Target Models. IEEE Trans. Dependable Secur. Comput. 22(4): 4022-4039 (2025)
[j307]Riccardo Spolaor
, Yi Xu
, Veelasha Moonsamy
, Mauro Conti
, Xiuzhen Cheng
:
CovertPower: A Covert Channel on Android Devices Through USB Power Line. IEEE Trans. Dependable Secur. Comput. 22(5): 4911-4926 (2025)
[j306]Kavya Balasubramanian, Adithya Gowda Baragur
, Denis Donadel, Dinuka Sahabandu, Alessandro Brighente
, Bhaskar Ramasubramanian, Mauro Conti
, Radha Poovendran
:
CANLP: Intrusion Detection for Controller Area Networks Using Natural Language Processing and Embedded Machine Learning. IEEE Trans. Dependable Secur. Comput. 22(6): 7203-7214 (2025)
[j305]Lulu Wang
, Lei Zhang, Kim-Kwang Raymond Choo
, Josep Domingo-Ferrer
, Mauro Conti
, Yuanyuan Gao:
Dual-Server Privacy-Preserving Collaborative Deep Learning: A Round-Efficient, Dynamic and Lossless Approach. IEEE Trans. Dependable Secur. Comput. 22(6): 7759-7772 (2025)
[j304]Meng Li
, Hanni Ding, Yifei Chen
, Yan Qiao
, Zijian Zhang
, Liehuang Zhu
, Mauro Conti:
Threshold Signatures With Verifiably Timed Combining and Message-Dependent Tracing. IEEE Trans. Inf. Forensics Secur. 20: 9477-9491 (2025)
[j303]Hongyi Luo
, Guyue Li
, Alessandro Brighente
, Mauro Conti
, Yuexiu Xing
, Aiqun Hu
, Xianbin Wang
:
Channel-Robust RF Fingerprint Identification for Multi-Antenna 5G User Equipments. IEEE Trans. Inf. Forensics Secur. 20: 10761-10776 (2025)
[j302]Meng Li
, Yifei Chen
, Yan Qiao
, Guixin Ye
, Zijian Zhang
, Liehuang Zhu
, Mauro Conti
:
Trust in a Decentralized World: Data Governance From Faithful, Private, Verifiable, and Traceable Data Feeds. IEEE Trans. Inf. Forensics Secur. 20: 10818-10833 (2025)
[j301]Tannishtha Devgun
, Rahul Saha
, Gulshan Kumar
, Mauro Conti
:
PIN: Application-Level Consensus for Blockchain-Based Artificial Intelligence Frameworks. ACM Trans. Intell. Syst. Technol. 16(3): 63:1-63:25 (2025)
[j300]Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Joel J. P. C. Rodrigues
:
TAURITE: Stackelberg Equilibrium in Blockchained Energynet Through Electric Vehicles. IEEE Trans. Intell. Transp. Syst. 26(3): 4122-4139 (2025)
[j299]Shahrzad Sedaghat, Mauro Conti
:
CFEA-IoV: An SDN-Enabled IoV Architecture for Time-Critical Accident Notification in Automated Vehicles. IEEE Trans. Intell. Veh. 10(2): 752-761 (2025)
[j298]Fatemeh Najafi
, Masoud Kaveh
, Mohammad Reza Mosavi
, Alessandro Brighente
, Mauro Conti
:
EPUF: An Entropy-Derived Latency-Based DRAM Physical Unclonable Function for Lightweight Authentication in Internet of Things. IEEE Trans. Mob. Comput. 24(3): 2422-2436 (2025)
[j297]Ehsan Nowroozi
, Imran Haider, Rahim Taheri
, Mauro Conti
:
Federated Learning Under Attack: Exposing Vulnerabilities Through Data Poisoning Attacks in Computer Networks. IEEE Trans. Netw. Serv. Manag. 22(1): 822-831 (2025)
[j296]Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Tai-Hoon Kim
:
DAWS: A Comprehensive Solution Against De-Anonymization Attacks in Blockchains. IEEE Trans. Netw. Serv. Manag. 22(5): 4747-4761 (2025)
[j295]Xuyang Liu
, Zijian Zhang
, Zhen Li, Hao Yin
, Meng Li
, Jiamou Liu
, Mauro Conti
, Liehuang Zhu
:
ABSE: Adaptive Baseline Score-Based Election for Leader-Based BFT Systems. IEEE Trans. Parallel Distributed Syst. 36(7): 1634-1650 (2025)
[j294]Lulu Wang
, Mirko Polato
, Alessandro Brighente
, Mauro Conti
, Lei Zhang
, Lin Xu
:
PriVeriFL: Privacy-Preserving and Aggregation-Verifiable Federated Learning. IEEE Trans. Serv. Comput. 18(2): 998-1011 (2025)
[j293]Gulshan Kumar
, Rahul Saha
, Mauro Conti
, William J. Buchanan
:
LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts. IEEE Trans. Serv. Comput. 18(3): 1529-1542 (2025)
[j292]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Corrado Aaron Visaggio, Andrea Di Sorbo, Mauro Conti:
Discerning reliable cyber threat indicators for timely Cyber Threat Intelligence. J. Comput. Virol. Hacking Tech. 21(1): 25 (2025)
[c355]Francesco Marchiori
, Denis Donadel
, Alessandro Brighente
, Mauro Conti
:
Profiling Electric Vehicles via Early Charging Voltage Patterns. ARES (Workshops 1) 2025: 5-22
[c354]Jiali Xu, Aya Moheddine, Valeria Loscrì, Alessandro Brighente, Mauro Conti:
SHIELD: Scalable and Holistic Evaluation Framework for ML-Based 5G Jamming Detection. ARES (1) 2025: 235-256
[c353]Francesco Marchiori
, Mauro Conti
:
Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles. ARES (1) 2025: 322-333
[c352]Enrico Bassetti
, Edoardo Di Paolo
, Francesco Drago, Mauro Conti
, Angelo Spognardi
:
Opening Pandora's Packet: Expose IPv6 Implementations Vulnerabilities Using Differential Fuzzing. ACNS (1) 2025: 401-423
[c351]Denis Donadel
, Kavya Balasubramanian
, Alessandro Brighente
, Bhaskar Ramasubramanian, Mauro Conti
, Radha Poovendran
:
CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations. ACNS (2) 2025: 429-458
[c350]Giacomo Benedetti
, Serena Cofano
, Alessandro Brighente
, Mauro Conti
:
The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach. ACNS (2) 2025: 487-509
[c349]Tannishtha Devgun
, Gulshan Kumar
, Rahul Saha
, Alessandro Brighente
, Mauro Conti
:
AWOSE: Probabilistic State Model for Consensus Algorithms' Fuzzing Frameworks. AsiaCCS 2025: 955-970
[c348]Hao Nie
, Wei Wang
, Peng Xu
, Wei Chen, Laurence T. Yang
, Mauro Conti
, Kaitai Liang
:
Peekaboo, I See Your Queries: Passive Attacks Against DSSE Via Intermittent Observations. CCS 2025: 2429-2443
[c347]Alessandro Brighente, Leonardo Cipolletta, Mauro Conti, Ludovico Latini:
Are Flow Correlation Attacks Effective on Tor? A Critical Evaluation of State-of-the-Art Proposals. CNS 2025: 1-9
[c346]Saiqin Xu, Shuo Wang, Savio Sciancalepore
, Alessandro Brighente, Mauro Conti:
Confundus: Mitigating Hostile Wireless Source Localization. CNS 2025: 1-10
[c345]Roberto Rossini, Simeone Pizzi, Samuele Doria, Mauro Conti, Eleonora Losiouk:
Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities. DIMVA (2) 2025: 167-172
[c344]Francesco Marchiori, Mauro Conti
:
ATTAQ: Adversarial Robustness of Quantum Machine Learning. DSN-W 2025: 200-207
[c343]Francesco Marchiori, Mauro Conti
:
Leaving No Blind Spots: Toward Automotive Cybersecurity. DSN-S 2025: 230-232
[c342]Ankit Gangwal, Mauro Conti, Tommaso Pauselli:
KeTS: Kernel-Based Trust Segmentation Against Model Poisoning Attacks. ESORICS (1) 2025: 126-146
[c341]Jiaxin Li, Gorka Abad, Stjepan Picek, Mauro Conti:
Membership Privacy Evaluation in Deep Spiking Neural Networks. ESORICS (1) 2025: 207-227
[c340]Francesco Marchiori
, Marco Alecci
, Luca Pajola
, Mauro Conti
:
DUMB and DUMBer: Is Adversarial Training Worth It in the Real World? ESORICS (1) 2025: 228-248
[c339]Eduard Marin, Jinwoo Kim, Alessio Pavoni, Mauro Conti, Roberto Di Pietro:
The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment. ESORICS (3) 2025: 382-401
[c338]Jiali Xu, Shuo Wang, Valeria Loscrì, Alessandro Brighente, Mauro Conti, Romain Rouvoy:
GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness Through Tailored Conditional GAN Augmentation. ESORICS (1) 2025: 430-449
[c337]Tommaso Bianchi, Alessandro Brighente, Mauro Conti
, Andrea Valori:
Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data. EuroS&P 2025: 113-132
[c336]Alessandro Brighente, Elisa Burato, Mauro Conti:
Are You Sure That is Secure? Assessing Organizations Security Readiness Via a Devsecops Maturity Model. EuroS&P (Workshops) 2025: 538-545
[c335]Felix Klement, Alessandro Brighente, Anup Kiran Bhattacharjee
, Stefano Cecconello
, Fernando Kuipers, Georgios Smaragdakis
, Mauro Conti, Stefan Katzenbeisser:
Endless Subscriptions: Open RAN is Open to RIC E2 Subscription Denial of Service Attacks. EuroS&P 2025: 755-770
[c334]Enkeleda Bardhi, Chenxing Ji, Ali Imran, Muhammad Shahbaz, Riccardo Lazzeretti, Mauro Conti, Fernando Kuipers:
O'MINE: A Novel Collaborative DDoS Detection Mechanism for Programmable Data-Planes. EuroS&P 2025: 771-788
[c333]Meng Li, Zhuangwei Li, Yifei Chen, Yan Qiao, Mauro Conti:
Artemis: Decentralized, Secure, and Efficient Safety Monitoring with Dynamic Trajectories. ICICS (1) 2025: 387-404
[c332]Luca Pajola, Saskia Laura Schröer, Pier Paolo Tricomi, Mauro Conti, Giovanni Apruzzese:
Elephant in the Room: Dissecting and Reflecting on the Evolution of Online Social Network Research. ICWSM 2025: 1436-1452
[c331]Anastasiia Belousova
, Francesco Marchiori
, Mauro Conti
:
Inference Attacks on Encrypted Online Voting via Traffic Analysis. ISC 2025: 216-236
[c330]Derin Cayir, Reham Mohamed Aburas, Riccardo Lazzeretti, Marco Angelini, Abbas Acar, Mauro Conti, Z. Berkay Celik, A. Selcuk Uluagac:
Speak Up, I'm Listening: Extracting Speech from Zero-Permission VR Sensors. NDSS 2025
[c329]Yizhong Liu, Andi Liu, Yuan Lu, Zhuocheng Pan, Yinuo Li, Jianwei Liu, Song Bian, Mauro Conti:
Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead. NDSS 2025
[c328]Martina Soleti
, Ankit Gangwal
, Mauro Conti
:
Attacking Anonymity Set in Tornado Cash via Wallet Fingerprints. SAC 2025: 376-385
[c327]Marco Simoni
, Andrea Saracino
, Vinod P
, Mauro Conti
:
MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation. SAC 2025: 1213-1222
[c326]Alessandro Brighente
, Mauro Conti
, Savio Sciancalepore
, Harshul Vaishnav
:
Strangers Sets: Preserving Drones' Location Privacy while Avoiding Violations of Critical Infrastructures. SAC 2025: 1560-1569
[c325]Menno Bezema
, Alessandro Brighente
, Mauro Conti
, Luca Cosuti
:
BISCUID: On the Feasibility of Identifying Scouting Drones Based on their Flying Behavior. SAC 2025: 1580-1589
[c324]Belkacem Imine, Rahul Saha, Mauro Conti:
MICODE: A Minimal Code Design for Secret Sharing Scheme. SECRYPT 2025: 381-391
[c323]Jelle Vos, Mauro Conti, Zekeriya Erkin:
Efficient Batchable Secure Outsourced Computation: Depth-Aware Arithmetization of Common Primitives for BFV & BGV. USENIX Security Symposium 2025: 8385-8402
[c322]Tommaso Bianchi, Alessandro Brighente, Mauro Conti, Edoardo Pavan:
SoK: Stealing Cars Since Remote Keyless Entry Introduction and How to Defend From It. VehicleSec 2025: 161-178
[c321]Alessandro Corsi, Savas Gür, Alessandro Brighente, Mauro Conti:
Evaluation of Post-Quantum Key Encapsulation Methods in 5G Core Network. WCNC 2025: 1-6
[c320]Cinthya Celina Tamayo Gonzalez, Simone Soderi, Julian Todt
, Thorsten Strufe, Mauro Conti:
Inferring Personal Attributes with a Mmwave Radar. WCNC 2025: 1-6
[c319]Harsha Vasudev, Alessandro Brighente, Mauro Conti:
$L^{2}S^{2}C^{2}$: Lattice-based Lightweight Scheme for Secure Communication in Controller Area Networks. WCNC 2025: 1-6
[c318]Mehrdad Hajizadeh, Pegah Golchin, Ehsan Nowroozi, Maria Rigaki, Veronica Valeros, Sebastián García, Mauro Conti, Thomas Bauschert:
DeepRed: A Deep Learning-Powered Command and Control Framework for Multi-Stage Red Teaming Against ML-based Network Intrusion Detection Systems. WOOT 2025: 103-127
[d7]Mauro Conti
, Zekeriya Erkin
, Jelle Vos
:
Code accompanying the paper titled "Efficient Batchable Secure Outsourced Computation: Depth-Aware Arithmetization of Common Primitives for BFV & BGV". Zenodo, 2025
[d6]Mehrdad Hajizadeh
, Pegah Golchin
, Ehsan Nowroozi
, Maria Rigaki
, Veronica Valeros
, Sebastián García
, Mauro Conti
, Thomas Bauschert:
TUC-RedTeam30: A Dataset for Evaluating ML-Based Network Intrusion Detection Systems. Zenodo, 2025
[i208]Ankit Gangwal, Mauro Conti, Tommaso Pauselli:
KeTS: Kernel-based Trust Segmentation against Model Poisoning Attacks. CoRR abs/2501.06729 (2025)
[i207]Emad Efatinasab, Alessandro Brighente, Denis Donadel, Mauro Conti, Mirco Rampazzo:
Towards Robust Stability Prediction in Smart Grids: GAN-based Approach under Data Constraints and Adversarial Challenges. CoRR abs/2501.16490 (2025)
[i206]Riccardo Petrucci, Luca Pajola, Francesco Marchiori, Luca Pasa, Mauro Conti:
Moshi Moshi? A Model Selection Hijacking Adversarial Attack. CoRR abs/2502.14586 (2025)
[i205]Matteo Brosolo, Vinod Puthuvath, Mauro Conti:
The Road Less Traveled: Investigating Robustness and Explainability in CNN Malware Detection. CoRR abs/2503.01391 (2025)
[i204]Matteo Brosolo, Vinod Puthuvath, Mauro Conti:
Through the Static: Demystifying Malware Visualization via Explainability. CoRR abs/2503.02441 (2025)
[i203]Francesco Marchiori, Mauro Conti:
Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles. CoRR abs/2503.08956 (2025)
[i202]Dincy R. Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti:
DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence. CoRR abs/2503.15866 (2025)
[i201]Saverio Cavasin, Pietro Biasetton, Mattia Tamiazzo, Mauro Conti, Simone Milani:
TeLL Me what you cant see. CoRR abs/2503.19478 (2025)
[i200]K. M. Sameera, P. Vinod, Anderson Rocha, Rafidha Rehiman K. A., Mauro Conti:
WeiDetect: Weibull Distribution-Based Defense against Poisoning Attacks in Federated Learning for Network Intrusion Detection Systems. CoRR abs/2504.04367 (2025)
[i199]Florine W. Dekker
, Zekeriya Erkin
, Mauro Conti
:
Optimal Graph Stretching for Distributed Averaging. CoRR abs/2504.10289 (2025)
[i198]Francesco Marchiori, Denis Donadel, Mauro Conti:
Can LLMs Classify CVEs? Investigating LLMs Capabilities in Computing CVSS Vectors. CoRR abs/2504.10713 (2025)
[i197]Mauro Conti, Francesco Marchiori, Sebastiano Matarazzo, Marco Rubin:
PQ-CAN: A Framework for Simulating Post-Quantum Cryptography in Embedded Systems. CoRR abs/2504.10730 (2025)
[i196]Tommaso Bianchi, Alessandro Brighente, Mauro Conti, Edoardo Pavan:
SoK: Stealing Cars Since Remote Keyless Entry Introduction and How to Defend From It. CoRR abs/2505.02713 (2025)
[i195]Mauro Conti, Marin Duroyon, Gabriele Orazi, Gene Tsudik:
Acoustic Side-Channel Attacks on a Computer Mouse. CoRR abs/2505.02725 (2025)
[i194]Denis Donadel, Kavya Balasubramanian, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, Radha Poovendran:
CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations. CoRR abs/2505.09384 (2025)
[i193]Denis Donadel, Gabriele Crestanello, Giulio Morandini, Daniele Antonioli, Mauro Conti, Massimo Merro:
SimProcess: High Fidelity Simulation of Noisy ICS Physical Processes. CoRR abs/2505.22638 (2025)
[i192]Francesco Marchiori, Denis Donadel, Alessandro Brighente, Mauro Conti:
Profiling Electric Vehicles via Early Charging Voltage Patterns. CoRR abs/2506.07714 (2025)
[i191]Saskia Laura Schröer, Luca Pajola, Alberto Castagnaro, Giovanni Apruzzese, Mauro Conti:
Exploiting AI for Attacks: On the Interplay between Adversarial AI and Offensive AI. CoRR abs/2506.12519 (2025)
[i190]Francesco Marchiori, Marco Alecci, Luca Pajola, Mauro Conti:
DUMB and DUMBer: Is Adversarial Training Worth It in the Real World? CoRR abs/2506.18516 (2025)
[i189]Alberto Castagnaro, Umberto Salviati, Mauro Conti, Luca Pajola, Simeone Pizzi:
The Hidden Threat in Plain Text: Attacking RAG Data Loaders. CoRR abs/2507.05093 (2025)
[i188]Matteo Gioele Collu, Umberto Salviati, Roberto Confalonieri, Mauro Conti, Giovanni Apruzzese:
Publish to Perish: Prompt Injection Attacks on LLM-Assisted Peer Review. CoRR abs/2508.20863 (2025)
[i187]Luca Pajola, Eugenio Caripoti, Stefan Banzer, Simeone Pizzi, Mauro Conti, Giovanni Apruzzese:
E-PhishGen: Unlocking Novel Research in Phishing Email Detection. CoRR abs/2509.01791 (2025)
[i186]Hao Nie, Wei Wang, Peng Xu, Wei Chen, Laurence T. Yang, Mauro Conti, Kaitai Liang:
Peekaboo, I See Your Queries: Passive Attacks Against DSSE Via Intermittent Observations. CoRR abs/2509.03806 (2025)
[i185]Anqi Chen, Riccardo Preatoni, Alessandro Brighente, Mauro Conti, Cristina Nita-Rotaru:
Cross-Service Token: Finding Attacks in 5G Core Networks. CoRR abs/2509.08992 (2025)
[i184]Anastasiia Belousova, Francesco Marchiori, Mauro Conti:
Inference Attacks on Encrypted Online Voting via Traffic Analysis. CoRR abs/2509.15694 (2025)
[i183]Francesco Marchiori, Rohan Sinha, Christopher Agia, Alexander Robey, George J. Pappas, Mauro Conti, Marco Pavone:
Preventing Robotic Jailbreaking via Multimodal Domain Adaptation. CoRR abs/2509.23281 (2025)
[i182]Nicolas Fracaro, Stefano Cecconello, Mauro Conti, Niccolò Di Marco, Alessandro Galeazzi:
Disc-Cover Complexity Trends in Music Illustrations from Sinatra to Swift. CoRR abs/2510.00990 (2025)
[i181]Eduard Marin, Jinwoo Kim, Alessio Pavoni, Mauro Conti, Roberto Di Pietro:
The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment. CoRR abs/2510.17311 (2025)
[i180]Gulshan Kumar, Rahul Saha, Mauro Conti, William J. Buchanan:
LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts. IACR Cryptol. ePrint Arch. 2025: 752 (2025)- 2024
[j291]Ankit Gangwal
, Aashish Paliwal
, Mauro Conti
:
De-Authentication Using Ambient Light Sensor. IEEE Access 12: 28225-28234 (2024)
[j290]Amandeep Verma, Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tai-Hoon Kim
:
PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks. IEEE Access 12: 48301-48320 (2024)
[j289]Avantika Gaur, Preeti Mishra
, Vinod P., Arjun Singh, Vijay Varadharajan, Uday Kiran Tupakula, Mauro Conti:
vDefender: An explainable and introspection-based approach for identifying emerging malware behaviour at hypervisor-layer in virtualization environment. Comput. Electr. Eng. 120: 109742 (2024)
[j288]Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti
, Reji Thomas
, Tai-Hoon Kim:
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things. Clust. Comput. 27(3): 2691-2713 (2024)
[j287]Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti
:
Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities. Clust. Comput. 27(4): 4823-4839 (2024)
[j286]Arjun Singh, Preeti Mishra
, P. Vinod, Avantika Gaur, Mauro Conti
:
SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection. Clust. Comput. 27(7): 9757-9782 (2024)
[j285]PLS Jayalaxmi, Manali Chakraborty, Rahul Saha, Gulshan Kumar, Mauro Conti
:
MADESANT: malware detection and severity analysis in industrial environments. Clust. Comput. 27(8): 11347-11367 (2024)
[j284]Vaishali A. Shirsath
, Madhav Chandane, Chhagan Lal, Mauro Conti
:
SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy. Comput. Networks 244: 110327 (2024)
[j283]Mohd Shariq, Mauro Conti
, Karan Singh, Chhagan Lal
, Ashok Kumar Das, Shehzad Ashraf Chaudhry, Mehedi Masud:
Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing. Comput. Networks 252: 110678 (2024)
[j282]K. M. Sameera
, Vinod P., Rafidha Rehiman K. A.
, Mauro Conti
:
LFGurad: A Defense against Label Flipping Attack in Federated Learning for Vehicular Network. Comput. Networks 254: 110768 (2024)
[j281]Vaishali A. Shirsath
, Madhav Chandane, Chhagan Lal, Mauro Conti
:
SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches. Comput. Commun. 216: 283-294 (2024)
[j280]Amandeep Verma
, Rahul Saha
, Gulshan Kumar, Mauro Conti
:
PETRAK: A solution against DDoS attacks in vehicular networks. Comput. Commun. 221: 142-154 (2024)
[j279]K. M. Sameera, Serena Nicolazzo
, Marco Arazzi, Antonino Nocera
, Rafidha Rehiman K. A., Vinod P., Mauro Conti
:
Privacy-preserving in Blockchain-based Federated Learning systems. Comput. Commun. 222: 38-67 (2024)
[j278]Mohd Shariq
, Mauro Conti, Karan Singh, Sanjeev Kumar Dwivedi
, Mohammad Abdussami
, Ruhul Amin
, Mehedi Masud:
Design of Provably Secure and Lightweight Authentication Protocol for Unmanned Aerial Vehicle systems. Comput. Commun. 228: 107971 (2024)
[j277]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A.
, Serena Nicolazzo
, Antonino Nocera
, Georgiana Timpau, Mauro Conti
:
OSTIS: A novel Organization-Specific Threat Intelligence System. Comput. Secur. 145: 103990 (2024)
[j276]Ying Yuan
, Giovanni Apruzzese
, Mauro Conti
:
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning. DTRAP 5(2): 16:1-16:51 (2024)
[j275]Luca Pajola
, Mauro Conti
:
Lights Toward Adversarial Machine Learning: The Achilles Heel of Artificial Intelligence. IEEE Intell. Syst. 39(5): 20-24 (2024)
[j274]Andrea Agiollo, Enkeleda Bardhi
, Mauro Conti
, Nicolò Dal Fabbro
, Riccardo Lazzeretti:
Anonymous Federated Learning via Named-Data Networking. Future Gener. Comput. Syst. 152: 288-303 (2024)
[j273]Andrea De Salve
, Alessandro Brighente
, Mauro Conti
:
EDIT: A data inspection tool for smart contracts temporal behavior modeling and prediction. Future Gener. Comput. Syst. 154: 413-425 (2024)
[j272]Derin Cayir
, Abbas Acar
, Riccardo Lazzeretti
, Marco Angelini
, Mauro Conti
, A. Selcuk Uluagac
:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. IEEE Secur. Priv. 22(1): 10-23 (2024)
[j271]Gulshan Kumar
, Rahul Saha, Mauro Conti
, Tannishtha Devgun, Reji Thomas
:
GREPHRO: Nature-inspired optimization duo for Internet-of-Things. Internet Things 25: 101067 (2024)
[j270]Alessandro Brighente
, Mauro Conti
, Gabriele Di Renzone
, Giacomo Peruzzi
, Alessandro Pozzebon
:
Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective. IEEE Internet Things J. 11(5): 7309-7324 (2024)
[j269]Jin Han
, Ran Cao
, Alessandro Brighente
, Mauro Conti
:
Light-YOLOv5: A Lightweight Drone Detector for Resource-Constrained Cameras. IEEE Internet Things J. 11(6): 11046-11057 (2024)
[j268]Khalid Mahmood
, Mohammad S. Obaidat
, Salman Shamshad
, Mohammed J. F. Alenazi
, Gulshan Kumar
, Mohammad Hossein Anisi
, Mauro Conti
:
Cost-Effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT). IEEE Internet Things J. 11(13): 23977-23984 (2024)
[j267]Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tannishtha Devgun, Joel J. P. C. Rodrigues
:
AALMOND: Decentralized Adaptive Access Control of Multiparty Data Sharing in Industrial Networks. IEEE Internet Things J. 11(15): 26104-26117 (2024)
[j266]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Rabeeba Abdul Rasheed, Mauro Conti
:
XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis. J. Netw. Syst. Manag. 32(4): 88 (2024)
[j265]Ehsan Nowroozi
, Yoosef Habibi
, Mauro Conti
:
SPRITZ-PS: validation of synthetic face images using a large dataset of printed documents. Multim. Tools Appl. 83(26): 67795-67823 (2024)
[j264]Enkeleda Bardhi
, Mauro Conti
, Riccardo Lazzeretti
:
Is AI a Trick or T(h)reat for Securing Programmable Data Planes? IEEE Netw. 38(6): 146-152 (2024)
[j263]Saverio Cavasin, Daniele Mari, Simone Milani, Mauro Conti
:
Fingerprint membership and identity inference against generative adversarial networks. Pattern Recognit. Lett. 185: 184-189 (2024)
[j262]Yassine Mekdad
, Ahmet Aris, Abbas Acar
, Mauro Conti
, Riccardo Lazzeretti, Abdeslam El Fergougui, A. Selcuk Uluagac:
A comprehensive security and performance assessment of UAV authentication schemes. Secur. Priv. 7(1) (2024)
[j261]Alessandro Brighente
, Mauro Conti
, Denis Donadel
, Federico Turrin
:
EVScout2.0: Electric Vehicle Profiling through Charging Profile. ACM Trans. Cyber Phys. Syst. 8(2): 11 (2024)
[j260]Rahul Saha
, Gulshan Kumar
, G. Geetha
, Mauro Conti
, William J. Buchanan
:
Application of Randomness for Security and Privacy in Multi-Party Computation. IEEE Trans. Dependable Secur. Comput. 21(6): 5694-5705 (2024)
[j259]Jin Han
, Yun-Feng Ren
, Alessandro Brighente
, Mauro Conti
:
RANGO: A Novel Deep Learning Approach to Detect Drones Disguising from Video Surveillance Systems. ACM Trans. Intell. Syst. Technol. 15(2): 31:1-31:21 (2024)
[j258]Giuseppe Cascavilla
, Gemma Catolino
, Mauro Conti
, Dimos Mellios
, Damian A. Tamburri
:
Few Images, Many Insights: Illicit Content Detection Using a Limited Number of Images. ACM Trans. Intell. Syst. Technol. 15(6): 130:1-130:26 (2024)
[j257]Mohamed A. El-Zawawy
, Chhagan Lal
, Mauro Conti
:
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 25(2): 2017-2033 (2024)
[j256]Yanan Zhao
, Haiyang Yu
, Yuhao Liang, Mauro Conti
, Wael Bazzi
, Yilong Ren
:
A Sanitizable Access Control With Policy-Protection for Vehicular Social Networks. IEEE Trans. Intell. Transp. Syst. 25(3): 2956-2965 (2024)
[j255]Yanan Zhao
, Haiyang Yu
, Yuhao Liang, Alessandro Brighente
, Mauro Conti
, Jianfei Sun
, Yilong Ren
:
Secure Source Identification Scheme for Revocable Instruction Sharing in Vehicle Platoon. IEEE Trans. Intell. Transp. Syst. 25(5): 3671-3684 (2024)
[j254]Meng Li
, Yanzhe Shen
, Guixin Ye
, Jialing He
, Xin Zheng
, Zijian Zhang
, Liehuang Zhu
, Mauro Conti
:
Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics. IEEE Trans. Knowl. Data Eng. 36(5): 1874-1888 (2024)
[j253]Meng Li
, Mingwei Zhang
, Liehuang Zhu
, Zijian Zhang
, Mauro Conti
, Mamoun Alazab
:
Decentralized and Privacy-Preserving Smart Parking With Secure Repetition and Full Verifiability. IEEE Trans. Mob. Comput. 23(12): 11635-11654 (2024)
[j252]Simone Soderi
, Alessandro Brighente
, Saiqin Xu
, Mauro Conti
:
Multi-RIS Aided VLC Physical Layer Security for 6G Wireless Networks. IEEE Trans. Mob. Comput. 23(12): 15182-15195 (2024)
[j251]Himani Sikarwar
, Harsha Vasudev
, Debasis Das
, Mauro Conti
, Koustav Kumar Mondal
:
SECURE: Secure and Efficient Protocol Using Randomness and Edge-Computing for Drone-Assisted Internet of Vehicles. IEEE Trans. Netw. Serv. Manag. 21(6): 6974-6988 (2024)
[j250]Amit Kumar Singh
, Deepa Kundur
, Mauro Conti
:
Introduction to the Special Issue on Integrity of Multimedia and Multimodal Data in Internet of Things. ACM Trans. Multim. Comput. Commun. Appl. 20(6): 151:1-151:4 (2024)
[j249]Ehsan Nowroozi
, Mohammadreza Mohammadi
, Pargol Golmohammadi, Yassine Mekdad
, Mauro Conti
, A. Selcuk Uluagac
:
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization. IEEE Trans. Serv. Comput. 17(1): 18-29 (2024)
[j248]Meng Li
, Jianbo Gao
, Liehuang Zhu
, Zijian Zhang
, Chhagan Lal
, Mauro Conti
:
Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud. IEEE Trans. Serv. Comput. 17(3): 1239-1251 (2024)
[j247]Miao He
, Jianbing Ni
, Meng Li
, Alessandro Brighente
, Mauro Conti
:
Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach. IEEE Trans. Wirel. Commun. 23(1): 276-289 (2024)
[j246]Amandeep Verma, Rahul Saha
, Gulshan Kumar, Mauro Conti
, Joel J. P. C. Rodrigues:
VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments. Veh. Commun. 48: 100787 (2024)
[j245]Saiqin Xu
, Alessandro Brighente
, Mauro Conti
, Baixiao Chen
, Shuo Wang
:
Evaporative Angle: A Generative Approach to Mitigate Jamming Attacks in DOA Estimation. IEEE Wirel. Commun. Lett. 13(10): 2922-2926 (2024)
[c317]Matteo Brosolo
, Vinod Puthuvath
, Asmitha KA
, Rafidha Rehiman K. A.
, Mauro Conti
:
SoK: Visualization-based Malware Detection Techniques. ARES 2024: 45:1-45:13
[c316]Meng Li, Hanni Ding, Qing Wang, Zijian Zhang, Mauro Conti
:
Threshold Signatures with Private Accountability via Secretly Designated Witnesses. ACISP (1) 2024: 389-407
[c315]Alessandro Brighente
, Mauro Conti
, Sitora Salaeva
, Federico Turrin
:
One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection. ACNS Workshops (2) 2024: 55-74
[c314]Edoardo Liberati
, Alessandro Visintin
, Riccardo Lazzeretti
, Mauro Conti
, A. Selcuk Uluagac
:
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices. ACNS (1) 2024: 183-210
[c313]Coen Schoof
, Stefanos Koffas
, Mauro Conti
, Stjepan Picek
:
EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody. AISec@CCS 2024: 137-148
[c312]Alberto Castagnaro
, Mauro Conti
, Luca Pajola
:
Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models. AISec@CCS 2024: 184-195
[c311]Sonia Laudanna
, Matteo Cardaioli, Andrea Di Sorbo
, Corrado Aaron Visaggio
, Mauro Conti
:
Exploring Writing Style Consistency to Timely Identify Heterogeneous Social Bots. ASONAM (Workshops) 2024: 301-312
[c310]Archana Chhabra, Rahul Saha, Mauro Conti
:
PITCOR: Privacy-assured Time-controlled Revocation in Blockchain Transactions. BCCA 2024: 141-148
[c309]Tannishtha Devgun, Gulshan Kumar, Mauro Conti:
FASALKA: Offloaded Privacy Classification for Blockchain Smart Contracts. BCCA 2024: 204-210
[c308]Mauro Conti
, Marin Duroyon, Gabriele Orazi, Gene Tsudik:
Acoustic Side-Channel Attacks on a Computer Mouse. DIMVA 2024: 44-63
[c307]Emad Efatinasab
, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, Mauro Conti
:
FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. DIMVA 2024: 503-524
[c306]Emad Efatinasab
, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti
:
GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction. ESORICS (1) 2024: 374-393
[c305]Mirco Beltrame, Mauro Conti
, Pierpaolo Guglielmin, Francesco Marchiori, Gabriele Orazi:
RedactBuster: Entity Type Recognition from Redacted Documents. ESORICS (2) 2024: 451-470
[c304]Alessandro Brighente, Mauro Conti
, Denis Donadel, Federico Turrin:
Hyperloop: A Cybersecurity Perspective. EuroS&P Workshops 2024: 352-360
[c303]Francesco Marchiori, Alessandro Brighente, Mauro Conti
:
Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers? EuroS&P Workshops 2024: 367-372
[c302]Filippo Giambartolomei, Marc Barcelo, Alessandro Brighente, Aitor Urbieta, Mauro Conti:
Penetration Testing of 5G Core Network Web Technologies. ICC 2024: 702-707
[c301]Meng Li, Jianbo Gao, Zijian Zhang, Mauro Conti
, Mamoun Alazab:
Secure, Available, Verifiable, and Efficient Range Query Processing on Outsourced Datasets. ICC 2024: 1376-1381
[c300]Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui
, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. ICC 2024: 1939-1944
[c299]Alessandro Brighente, Saiqin Xu, Simone Soderi, Mauro Conti:
Physical Layer Authentication for Distributed RIS (DRIS) Enabled VLC Systems. ICC 2024: 3340-3345
[c298]Harsha Vasudev
, Mohd Shariq
, Sanjeev Kumar Dwivedi
, Mauro Conti
:
LightKey: Lightweight and Secure Key Agreement Protocol for Effective Communication in Internet of Vehicles. ICDCN 2024: 209-216
[c297]Mauro Conti:
Covert & Side Stories: Threats Evolution in Traditional and Modern Technologies. ICISSP 2024: 7
[c296]Pier Paolo Tricomi, Saurabh Kumar
, Mauro Conti, V. S. Subrahmanian:
Climbing the Influence Tiers on TikTok: A Multimodal Study. ICWSM 2024: 1503-1516
[c295]Felix Klement
, Alessandro Brighente, Michele Polese, Mauro Conti
, Stefan Katzenbeisser:
Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments. NetSoft 2024: 185-189
[c294]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera
, Mauro Conti:
Relation Extraction Techniques in Cyber Threat Intelligence. NLDB (1) 2024: 348-363
[c293]Attila Mester
, Zalán Bodó
, P. Vinod
, Mauro Conti
:
Towards a Malware Family Classification Model Using Static Call Graph Instruction Visualization. NSS 2024: 167-186
[c292]Kavya Balasubramanian
, Adithya Gowda Baragur
, Denis Donadel
, Dinuka Sahabandu
, Alessandro Brighente
, Bhaskar Ramasubramanian
, Mauro Conti
, Radha Poovendran
:
CANLP: NLP-Based Intrusion Detection System for CAN. SAC 2024: 212-214
[c291]Jelle Vos, Mauro Conti
, Zekeriya Erkin
:
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model. SP 2024: 465-483
[c290]K. M. Sameera, M. Abhinav, P. P. Amal
, T. Babu Abhiram, Raj K. Abishek
, Tomichen Amal, P. Anaina, P. Vinod
, Rafidha Rehiman K. A.
, Mauro Conti
:
DLShield: A Defense Approach Against Dirty Label Attacks in Heterogeneous Federated Learning. SPACE 2024: 129-148
[c289]Qingying Hao, Nirav Diwan, Ying Yuan, Giovanni Apruzzese, Mauro Conti, Gang Wang:
It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors. USENIX Security Symposium 2024
[c288]Marco Palazzo, Florine W. Dekker
, Alessandro Brighente, Mauro Conti, Zekeriya Erkin:
Privacy-Preserving Data Aggregation with Public Verifiability Against Internal Adversaries. USENIX Security Symposium 2024
[c287]Jelle Vos
, Mauro Conti
, Zekeriya Erkin
:
Oraqle: A Depth-Aware Secure Computation Compiler. WAHC@CCS 2024: 43-50
[c286]Daniele Mari, Saverio Cavasin, Simone Milani, Mauro Conti
:
Effectiveness of learning-based image codecs on fingerprint storage. WIFS 2024: 1-6
[c285]Giacomo Quadrio, Roberto Pompa, Enrico Bassetti, Ciro D'Elia, Gianluca Scacco, Mauro Conti:
"They Will Adapt": Improving Anomaly Detection on IoT Networks Through Continuous Learning. WiMob 2024: 1-6
[c284]Giulio Rigoni
, Nicola Scremin, Mauro Conti:
Towards a Self-Rescuing System for UAVs Under GNSS Attack. WiMob 2024: 339-346
[c283]Christina Kreza
, Stefanos Koffas
, Behrad Tajalli
, Mauro Conti
, Stjepan Picek
:
Backdoors on Manifold Learning. WiseML@WiSec 2024: 1-7
[c282]Francesco Marchiori
, Mauro Conti
:
CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems. WiseML@WiSec 2024: 8-13
[c281]Coen Schoof
, Stefanos Koffas
, Mauro Conti
, Stjepan Picek
:
Beyond PhantomSponges: Enhancing Sponge Attack on Object Detection Models. WiseML@WiSec 2024: 14-19
[c280]Tommaso Bianchi
, Alessandro Brighente
, Mauro Conti
:
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles. WISEC 2024: 174-184
[c279]Pier Paolo Tricomi, Luca Pajola, Luca Pasa, Mauro Conti:
"All of Me": Mining Users' Attributes from their Public Spotify Playlists. WWW (Companion Volume) 2024: 963-966
[c278]Ying Yuan
, Qingying Hao
, Giovanni Apruzzese
, Mauro Conti
, Gang Wang
:
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages. WWW 2024: 1712-1723
[e17]Gene Tsudik, Mauro Conti
, Kaitai Liang
, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14344, Springer 2024, ISBN 978-3-031-50593-5 [contents]
[e16]Gene Tsudik, Mauro Conti
, Kaitai Liang
, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14345, Springer 2024, ISBN 978-3-031-51475-3 [contents]
[e15]Gene Tsudik, Mauro Conti
, Kaitai Liang
, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14346, Springer 2024, ISBN 978-3-031-51478-4 [contents]
[e14]Gene Tsudik, Mauro Conti
, Kaitai Liang
, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14347, Springer 2024, ISBN 978-3-031-51481-4 [contents]
[e13]Eleonora Losiouk, Alessandro Brighente, Mauro Conti, Yousra Aafer, Yanick Fratantonio:
The 27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024, Padua, Italy, 30 September 2024- 2 October 2024. ACM 2024, ISBN 979-8-4007-0959-3 [contents]
[i179]K. M. Sameera, Serena Nicolazzo, Marco Arazzi, Antonino Nocera
, Rafidha Rehiman K. A., Vinod P, Mauro Conti:
Privacy-Preserving in Blockchain-based Federated Learning Systems. CoRR abs/2401.03552 (2024)
[i178]Alessandro Lotto, Francesco Marchiori, Alessandro Brighente, Mauro Conti:
A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols. CoRR abs/2401.10736 (2024)
[i177]Pier Paolo Tricomi, Luca Pajola, Luca Pasa, Mauro Conti:
"All of Me": Mining Users' Attributes from their Public Spotify Playlists. CoRR abs/2401.14296 (2024)
[i176]Carlo Mazzocca, Abbas Acar, A. Selcuk Uluagac, Rebecca Montanari, Paolo Bellavista, Mauro Conti:
A Survey on Decentralized Identifiers and Verifiable Credentials. CoRR abs/2402.02455 (2024)
[i175]Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, A. Selcuk Uluagac:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. CoRR abs/2402.03114 (2024)
[i174]Filippo Giambartolomei, Marc Barceló Lladó, Alessandro Brighente, Aitor Urbieta, Mauro Conti:
Penetration Testing of 5G Core Network Web Technologies. CoRR abs/2403.01871 (2024)
[i173]Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti:
Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks. CoRR abs/2403.02983 (2024)
[i172]Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. CoRR abs/2403.03858 (2024)
[i171]Emad Efatinasab, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, Mauro Conti:
FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. CoRR abs/2403.17494 (2024)
[i170]Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang:
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages. CoRR abs/2404.02832 (2024)
[i169]Francesco Marchiori, Mauro Conti:
CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems. CoRR abs/2404.04648 (2024)
[i168]Denis Donadel, Francesco Marchiori, Luca Pajola, Mauro Conti:
Can LLMs Understand Computer Networks? Towards a Virtual System Administrator. CoRR abs/2404.12689 (2024)
[i167]Mirco Beltrame, Mauro Conti, Pierpaolo Guglielmin, Francesco Marchiori, Gabriele Orazi:
RedactBuster: Entity Type Recognition from Redacted Documents. CoRR abs/2404.12991 (2024)
[i166]Alberto Castagnaro, Mauro Conti, Luca Pajola:
Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models. CoRR abs/2404.14138 (2024)
[i165]Felix Klement, Alessandro Brighente, Michele Polese, Mauro Conti, Stefan Katzenbeisser:
Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments. CoRR abs/2405.01888 (2024)
[i164]Francesco Marchiori, Alessandro Brighente, Mauro Conti:
Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers? CoRR abs/2405.08466 (2024)
[i163]Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti:
GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction. CoRR abs/2405.12076 (2024)
[i162]Jahez Abraham Johny, Vinod P., K. A. Asmitha, Radhamani G, Rafidha Rehiman K. A., Mauro Conti:
Deep Learning Fusion For Effective Malware Detection: Leveraging Visual Features. CoRR abs/2405.14311 (2024)
[i161]Dincy R. Arikkat, Mert Cihangiroglu, Mauro Conti, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera
, Vinod P:
SeCTIS: A Framework to Secure CTI Sharing. CoRR abs/2406.14102 (2024)
[i160]Saverio Cavasin, Daniele Mari, Simone Milani, Mauro Conti:
Fingerprint Membership and Identity Inference Against Generative Adversarial Networks. CoRR abs/2406.15253 (2024)
[i159]Tommaso Bianchi
, Alessandro Brighente, Mauro Conti, Andrea Valori:
Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data. CoRR abs/2407.00585 (2024)
[i158]Alessandro Brighente, Mauro Conti, Matthijs Schotsman, Savio Sciancalepore:
Obfuscated Location Disclosure for Remote ID Enabled Drones. CoRR abs/2407.14256 (2024)
[i157]Marco Simoni, Andrea Saracino, Vinod P., Mauro Conti:
MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation. CoRR abs/2407.15748 (2024)
[i156]Coen Schoof, Stefanos Koffas, Mauro Conti, Stjepan Picek:
EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody. CoRR abs/2408.01178 (2024)
[i155]Giacomo Benedetti
, Serena Cofano, Alessandro Brighente, Mauro Conti:
The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach. CoRR abs/2409.06390 (2024)
[i154]Daniele Mari, Saverio Cavasin, Simone Milani, Mauro Conti:
Effectiveness of learning-based image codecs on fingerprint storage. CoRR abs/2409.18730 (2024)
[i153]Jiaxin Li, Gorka Abad, Stjepan Picek, Mauro Conti:
Membership Privacy Evaluation in Deep Spiking Neural Networks. CoRR abs/2409.19413 (2024)
[i152]Jiaxin Li, Marco Arazzi, Antonino Nocera
, Mauro Conti:
Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning. CoRR abs/2409.19417 (2024)
[i151]Giulio Rigoni, Nicola Scremin, Mauro Conti:
Towards a Self-rescuing System for UAVs Under GNSS Attack. CoRR abs/2410.02442 (2024)
[i150]Mauro Conti, Emiliano De Cristofaro, Alessandro Galeazzi, Pujan Paudel, Gianluca Stringhini:
Revealing The Secret Power: How Algorithms Can Influence Content Visibility on Social Media. CoRR abs/2410.17390 (2024)
[i149]Dincy R. Arikkat, Abhinav M., Navya Binu, Parvathi M., Navya Biju, K. S. Arunima, Vinod P., Rafidha Rehiman K. A., Mauro Conti:
IntellBot: Retrieval Augmented LLM Chatbot for Cyber Threat Knowledge Delivery. CoRR abs/2411.05442 (2024)
[i148]Luca Pajola, Saskia Laura Schröer, Pier Paolo Tricomi, Mauro Conti, Giovanni Apruzzese:
Elephant in the Room: Dissecting and Reflecting on the Evolution of Online Social Network Research. CoRR abs/2411.13681 (2024)
[i147]Alessandro Lotto, Alessandro Brighente, Mauro Conti:
Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check. CoRR abs/2411.14394 (2024)
[i146]Marco Casagrande, Riccardo Cestaro, Eleonora Losiouk, Mauro Conti, Daniele Antonioli:
E-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Battery-powered Embedded Systems. CoRR abs/2411.17184 (2024)
[i145]Jelle Vos, Mauro Conti, Zekeriya Erkin:
Depth-Aware Arithmetization of Common Primitives in Prime Fields. IACR Cryptol. ePrint Arch. 2024: 1200 (2024)
[i144]Jelle Vos, Mauro Conti, Zekeriya Erkin:
Oraqle: A Depth-Aware Secure Computation Compiler. IACR Cryptol. ePrint Arch. 2024: 1409 (2024)- 2023
[j244]Pier Paolo Tricomi
, Federica Nenna
, Luca Pajola
, Mauro Conti
, Luciano Gamberini:
You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality. IEEE Access 11: 9859-9875 (2023)
[j243]Hossein Ahmadvand
, Chhagan Lal
, Hadi Hemmati, Mehdi Sookhak
, Mauro Conti
:
Privacy-Preserving and Security in SDN-Based IoT: A Survey. IEEE Access 11: 44772-44786 (2023)
[j242]Alireza Dehlaghi-Ghadim
, Ali Balador
, Mahshid Helali Moghadam
, Hans Hansson
, Mauro Conti
:
ICSSIM - A framework for building industrial control systems security testbeds. Comput. Ind. 148: 103906 (2023)
[j241]Yassine Mekdad
, Ahmet Aris
, Leonardo Babun
, Abdeslam El Fergougui
, Mauro Conti
, Riccardo Lazzeretti
, A. Selcuk Uluagac
:
A survey on security and privacy issues of UAVs. Comput. Networks 224: 109626 (2023)
[j240]Anand Kumar, Karan Singh, Mohd Shariq
, Chhagan Lal, Mauro Conti
, Ruhul Amin
, Shehzad Ashraf Chaudhry
:
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems. Comput. Commun. 205: 147-157 (2023)
[j239]Tayyab Ali Khan, Karan Singh, Mohd Shariq
, Khaleel Ahmad, K. S. Savita, Ali Ahmadian
, Soheil Salahshour, Mauro Conti
:
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach. Comput. Commun. 209: 217-229 (2023)
[j238]Gulshan Kumar
, Rahul Saha, Mauro Conti
, Tannishtha Devgun, Rekha Goyat, Joel J. P. C. Rodrigues
:
COUNT: Blockchain framework for resource accountability in e-healthcare. Comput. Commun. 209: 249-259 (2023)
[j237]Mohamed A. El-Zawawy
, Pallavi Kaliyar, Mauro Conti
, Sokratis K. Katsikas
:
Honey-list based authentication protocol for industrial IoT swarms. Comput. Commun. 211: 239-253 (2023)
[j236]PLS Jayalaxmi, Rahul Saha, Gulshan Kumar, Mamoun Alazab, Mauro Conti
, Xiaochun Cheng
:
PIGNUS: A Deep Learning model for IDS in industrial internet-of-things. Comput. Secur. 132: 103315 (2023)
[j235]Enkeleda Bardhi
, Mauro Conti
, Riccardo Lazzeretti
, Eleonora Losiouk
:
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 25(4): 2427-2455 (2023)
[j234]Ankur O. Bang
, Udai Pratap Rao
, Pallavi Kaliyar
, Mauro Conti
:
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey. ACM Comput. Surv. 55(2): 44:1-44:36 (2023)
[j233]Yazeed Alrowaili
, Neetesh Saxena
, Anurag Srivastava, Mauro Conti
, Pete Burnap:
A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification. IET Cyper-Phys. Syst.: Theory & Appl. 8(3): 160-185 (2023)
[j232]Reza Mohammadi, Chhagan Lal, Mauro Conti
:
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN. Int. J. Inf. Sec. 22(2): 367-379 (2023)
[j231]Zhihao Wang, Ding Ding, Min Ren, Mauro Conti
:
TANGO: A temporal spatial dynamic graph model for event prediction. Neurocomputing 542: 126249 (2023)
[j230]Amina Zahoor, Khalid Mahmood
, Salman Shamshad, Muhammad Asad Saleem
, Muhammad Faizan Ayub, Mauro Conti
, Ashok Kumar Das
:
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF. Internet Things 22: 100708 (2023)
[j229]Rekha Goyat
, Gulshan Kumar
, Mauro Conti
, Tannishtha Devgun, Rahul Saha
, Reji Thomas
:
BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT. IEEE Internet Things J. 10(18): 16480-16493 (2023)
[j228]Jennifer Bellizzi
, Eleonora Losiouk
, Mauro Conti
, Christian Colombo
, Mark Vella
:
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics. J. Cybersecur. Priv. 3(3): 364-395 (2023)
[j227]Mauro Conti
, Luca Pajola, Pier Paolo Tricomi
:
Turning captchas against humanity: Captcha-based attacks in online social media. Online Soc. Networks Media 36: 100252 (2023)
[j226]Matteo Cardaioli, Mauro Conti
, Gabriele Orazi
, Pier Paolo Tricomi
, Gene Tsudik:
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication. Pervasive Mob. Comput. 92: 101801 (2023)
[j225]Mohamad Mansouri, Melek Önen, Wafa Ben Jaballah, Mauro Conti
:
SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning. Proc. Priv. Enhancing Technol. 2023(1): 140-157 (2023)
[j224]Anas Alsoliman
, Giulio Rigoni
, Davide Callegaro
, Marco Levorato
, Cristina M. Pinotti
, Mauro Conti
:
Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics. ACM Trans. Cyber Phys. Syst. 7(2): 12:1-12:29 (2023)
[j223]Gabriele Etta
, Matteo Cinelli
, Alessandro Galeazzi
, Carlo Michele Valensise
, Walter Quattrociocchi
, Mauro Conti
:
Comparing the Impact of Social Media Regulations on News Consumption. IEEE Trans. Comput. Soc. Syst. 10(3): 1252-1262 (2023)
[j222]Meng Li
, Yifei Chen
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
, Donghui Hu
:
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain. IEEE Trans. Dependable Secur. Comput. 20(1): 225-241 (2023)
[j221]Simone Soderi
, Riccardo Colelli
, Federico Turrin
, Federica Pascucci
, Mauro Conti
:
SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming. IEEE Trans. Dependable Secur. Comput. 20(3): 2274-2288 (2023)
[j220]Meng Li
, Yifei Chen
, Chhagan Lal
, Mauro Conti
, Fabio Martinelli, Mamoun Alazab
:
Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts. IEEE Trans. Dependable Secur. Comput. 20(4): 2849-2866 (2023)
[j219]Meng Li
, Yifei Chen, Liehuang Zhu
, Zijian Zhang
, Jianbing Ni
, Chhagan Lal
, Mauro Conti
:
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems. IEEE Trans. Dependable Secur. Comput. 20(4): 3002-3018 (2023)
[j218]Alessandro Brighente
, Mauro Conti
, Radha Poovendran
, Jianying Zhou:
Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems. IEEE Trans. Ind. Informatics 19(6): 7801 (2023)
[j217]Ehsan Nowroozi
, Abhishek
, Mohammadreza Mohammadi
, Mauro Conti
:
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework. IEEE Trans. Netw. Serv. Manag. 20(2): 1332-1344 (2023)
[j216]Mohamed A. El-Zawawy
, Alessandro Brighente
, Mauro Conti
:
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain. IEEE Trans. Netw. Serv. Manag. 20(2): 1775-1789 (2023)
[j215]Ehsan Nowroozi
, Mohammadreza Mohammadi
, Erkay Savas, Yassine Mekdad
, Mauro Conti
:
Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks. IEEE Trans. Netw. Serv. Manag. 20(2): 2096-2105 (2023)
[j214]Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Reji Thomas
, Tannishtha Devgun, Joel J. P. C. Rodrigues
:
Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit. IEEE Trans. Serv. Comput. 16(2): 900-912 (2023)
[j213]Saiqin Xu
, Alessandro Brighente
, Baixiao Chen
, Mauro Conti
, Xiancheng Cheng, Dongchen Zhu:
Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets With Sparse Prior for Line-of-Sight Scenarios. IEEE Trans. Veh. Technol. 72(4): 4683-4696 (2023)
[j212]Meng Li
, Jianbo Gao
, Zijian Zhang
, Liehuang Zhu
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion. IEEE Trans. Veh. Technol. 72(4): 5139-5151 (2023)
[j211]Subir Halder
, Amrita Ghosal
, Mauro Conti
:
Dynamic Super Round-Based Distributed Task Scheduling for UAV Networks. IEEE Trans. Wirel. Commun. 22(2): 1014-1028 (2023)
[j210]Luca Pajola
, Dongkai Chen
, Mauro Conti
, V. S. Subrahmanian
:
A Novel Review Helpfulness Measure Based on the User-Review-Item Paradigm. ACM Trans. Web 17(4): 27:1-27:31 (2023)
[j209]Sanaz Soltani
, Mohammad Shojafar
, Alessandro Brighente
, Mauro Conti
, Rahim Tafazolli
:
Poisoning Bearer Context Migration in O-RAN 5G Network. IEEE Wirel. Commun. Lett. 12(3): 401-405 (2023)
[j208]Saurabh Rana
, Dheerendra Mishra
, Chhagan Lal, Mauro Conti
:
Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing. Wirel. Pers. Commun. 131(2): 1295-1312 (2023)
[c277]Francesco Marchiori
, Mauro Conti
, Nino Vincenzo Verde
:
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports. ARES 2023: 3:1-3:11
[c276]Riccardo Cestaro
, Mauro Conti
, Elonora Mancini
, Federico Turrin
:
OpenScope-sec: An ADS-B Simulator to Support the Security Research. ARES 2023: 116:1-116:6
[c275]Sara Bardi, Mauro Conti
, Luca Pajola, Pier Paolo Tricomi:
Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages. ACNS (1) 2023: 309-336
[c274]Federico Carboni
, Mauro Conti
, Denis Donadel
, Mariano Sciacco
:
If You're Scanning This, It's Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps. ACNS Workshops 2023: 553-570
[c273]Filippo Perrina, Francesco Marchiori
, Mauro Conti
, Nino Vincenzo Verde:
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation. IEEE Big Data 2023: 3053-3062
[c272]Francesco Marchiori
, Mauro Conti
:
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication. CCS 2023: 105-119
[c271]Marco Arazzi
, Mauro Conti
, Antonino Nocera
, Stjepan Picek
:
Turning Privacy-preserving Mechanisms against Federated Learning. CCS 2023: 1482-1495
[c270]Pier Paolo Tricomi
, Lisa Facciolo, Giovanni Apruzzese
, Mauro Conti
:
Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2. CODASPY 2023: 27-38
[c269]Ko Zheng Teng
, Trupil Limbasiya
, Federico Turrin
, Yan Lin Aung
, Sudipta Chattopadhyay
, Jianying Zhou
, Mauro Conti
:
PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems. CPSS@AsiaCCS 2023: 3-13
[c268]Massimiliano Baldo
, Tommaso Bianchi
, Mauro Conti
, Alessio Trevisan, Federico Turrin
:
HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments. ESORICS Workshops (1) 2023: 145-159
[c267]Victoria Bull, Niclas Finne, Andrea Agiollo, Pallavi Kaliyar, Luca Pajola, Thiemo Voigt, Mauro Conti
:
DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network. ESORICS Workshops (2) 2023: 198-213
[c266]Andrea Agiollo, Enkeleda Bardhi
, Mauro Conti
, Riccardo Lazzeretti, Eleonora Losiouk
, Andrea Omicini:
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks. EuroS&P 2023: 615-630
[c265]Samaneh Mohammadi, Mohammadreza Mohammadi
, Sima Sinaei, Ali Balador, Ehsan Nowroozi, Francesco Flammini, Mauro Conti
:
Balancing Privacy and Accuracy in Federated Learning for Speech Emotion Recognition. FedCSIS 2023: 191-199
[c264]Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti
:
Going in Style: Audio Backdoors Through Stylistic Transformations. ICASSP 2023: 1-5
[c263]Yuhui Zhu
, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta
, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti
:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. ICC 2023: 2338-2344
[c262]Emilie Bout, Valentin Bout, Alessandro Brighente, Mauro Conti
, Valeria Loscrì:
Evaluation of Channel Hopping Strategies Against Smart Jamming Attacks. ICC 2023: 5210-5215
[c261]Pier Paolo Tricomi, Sousan Tarahomi, Christian Cattai, Francesco Martini, Mauro Conti
:
Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training. ICCCN 2023: 1-10
[c260]Riccardo Spolaor, Hao Liu, Federico Turrin, Mauro Conti
, Xiuzhen Cheng:
Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel. INFOCOM 2023: 1-10
[c259]Marco Alecci
, Luca Attanasio
, Alessandro Brighente
, Mauro Conti
, Eleonora Losiouk
, Hideki Ochiai
, Federico Turrin
:
Beware of Pickpockets: A Practical Attack against Blocking Cards. RAID 2023: 195-206
[c258]Marco Alecci
, Mauro Conti
, Francesco Marchiori
, Luca Martinelli
, Luca Pajola
:
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability. RAID 2023: 315-329
[c257]Nicholas Boucher
, Luca Pajola
, Ilia Shumailov
, Ross J. Anderson
, Mauro Conti
:
Boosting Big Brother: Attacking Search Engines with Encodings. RAID 2023: 700-713
[c256]Alessandro Brighente, Mauro Conti
, Giacomo Peruzzi
, Alessandro Pozzebon
:
ADASS: Anti-Drone Audio Surveillance Sentinel via Embedded Machine Learning. SAS 2023: 1-6
[c255]Giuseppe Cascavilla
, Gemma Catolino, Mauro Conti
, Dimos Mellios, Damian A. Tamburri:
When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning. SECRYPT 2023: 324-334
[c254]Francesco Luigi De Faveri
, Luca Cosuti
, Pier Paolo Tricomi
, Mauro Conti
:
Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections. SocialSec 2023: 38-57
[c253]Harsh Kasyap, Somanath Tripathy, Mauro Conti
:
HDFL: Private and Robust Federated Learning using Hyperdimensional Computing. TrustCom 2023: 214-221
[c252]Ankit Gangwal, Aakash Jain, Mauro Conti
:
On the Feasibility of Profiling Electric Vehicles through Charging Data. VehicleSec 2023
[c251]Tommaso Bianchi
, Surudhi Asokraj, Alessandro Brighente, Mauro Conti
, Radha Poovendran
:
QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer. VTC2023-Spring 2023: 1-6
[c250]Pier Paolo Tricomi
, Marco Chilese
, Mauro Conti
, Ahmad-Reza Sadeghi
:
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms. WebSci 2023: 346-356
[c249]Ankit Gangwal, Apoorva Thirupathi, Alessandro Brighente, Mauro Conti
:
A First Look at Shill Looping in NFT Ecosystem. WIFS 2023: 1-6
[c248]Alessandro Visintin, Mauro Conti
:
Leveraging Social Networks for Mergers and Acquisitions Forecasting. WISE 2023: 144-159
[c247]Marco Casagrande
, Riccardo Cestaro
, Eleonora Losiouk
, Mauro Conti
, Daniele Antonioli
:
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem. WISEC 2023: 85-95
[c246]Alessandro Lotto
, Vaibhav Singh
, Bhaskar Ramasubramanian
, Alessandro Brighente
, Mauro Conti
, Radha Poovendran
:
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks. WISEC 2023: 133-144
[c245]Elisa Sartori
, Luca Pajola
, Giovanni Da San Martino
, Mauro Conti
:
The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum. WWW 2023: 4060-4064
[d5]Riccardo Spolaor
, Hao Liu, Federico Turrin
, Mauro Conti
, Xiuzhen Cheng:
Dataset for the paper: Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel. Zenodo, 2023
[i143]Alessandro Brighente, Mauro Conti, Denis Donadel
, Radha Poovendran
, Federico Turrin, Jianying Zhou:
Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs. CoRR abs/2301.04587 (2023)
[i142]Serena Tardelli, Leonardo Nizzoli, Maurizio Tesconi, Mauro Conti, Preslav Nakov, Giovanni Da San Martino, Stefano Cresci:
Temporal Dynamics of Coordinated Online Behavior: Stability, Archetypes, and Influence. CoRR abs/2301.06774 (2023)
[i141]Pier Paolo Tricomi, Marco Chilese, Mauro Conti, Ahmad-Reza Sadeghi:
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms. CoRR abs/2301.06815 (2023)
[i140]Marco Alecci, Luca Attanasio, Alessandro Brighente, Mauro Conti, Eleonora Losiouk, Hideki Ochiai, Federico Turrin:
Beware of Pickpockets: A Practical Attack against Blocking Cards. CoRR abs/2302.08992 (2023)
[i139]Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde:
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports. CoRR abs/2303.09999 (2023)
[i138]Ehsan Nowroozi, Seyedsadra Seyedshoari, Yassine Mekdad, Erkay Savas, Mauro Conti:
Cryptocurrency wallets: assessment and security. CoRR abs/2303.12940 (2023)
[i137]Marco Venturini, Francesco Freda, Emanuele Miotto, Alberto Giaretta
, Mauro Conti:
Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations. CoRR abs/2303.17351 (2023)
[i136]Sara Bardi, Mauro Conti, Luca Pajola, Pier Paolo Tricomi:
Social Honeypot for Humans: Luring People through Self-managed Instagram Pages. CoRR abs/2303.17946 (2023)
[i135]Ehsan Nowroozi, Yoosef Habibi, Mauro Conti:
Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents. CoRR abs/2304.02982 (2023)
[i134]Nicholas Boucher
, Luca Pajola, Ilia Shumailov, Ross J. Anderson, Mauro Conti:
Boosting Big Brother: Attacking Search Engines with Encodings. CoRR abs/2304.14031 (2023)
[i133]Marco Arazzi, Mauro Conti, Antonino Nocera
, Stjepan Picek:
Turning Privacy-preserving Mechanisms against Federated Learning. CoRR abs/2305.05355 (2023)
[i132]Emad Efatinasab
, Francesco Marchiori, Denis Donadel, Alessandro Brighente, Mauro Conti:
GAN-CAN: A Novel Attack to Behavior-Based Driver Authentication Systems. CoRR abs/2306.05923 (2023)
[i131]Francesco Luigi De Faveri, Luca Cosuti, Pier Paolo Tricomi, Mauro Conti:
Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections. CoRR abs/2306.07183 (2023)
[i130]Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola:
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability. CoRR abs/2306.15363 (2023)
[i129]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado Aaron Visaggio, Mauro Conti:
Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks? CoRR abs/2306.16087 (2023)
[i128]Fatemeh Najafi, Masoud Kaveh, Mohammad Reza Mosavi, Alessandro Brighente, Mauro Conti:
EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks. CoRR abs/2307.09968 (2023)
[i127]Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera
, Stjepan Picek, Jing Xu:
BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks. CoRR abs/2308.02465 (2023)
[i126]Francesco Marchiori, Mauro Conti:
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication. CoRR abs/2309.03607 (2023)
[i125]Massimiliano Baldo, Tommaso Bianchi
, Mauro Conti, Alessio Trevisan, Federico Turrin:
HoneyEVSE: An Honeypot to emulate Electric Vehicle Supply Equipments. CoRR abs/2309.06077 (2023)
[i124]Ankit Gangwal, Aashish Paliwal, Mauro Conti:
De-authentication using Ambient Light Sensor. CoRR abs/2309.12220 (2023)
[i123]Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde:
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation. CoRR abs/2310.02655 (2023)
[i122]Mauro Conti, Nicola Farronato, Stefanos Koffas, Luca Pajola, Stjepan Picek:
Invisible Threats: Backdoor Attack in OCR Systems. CoRR abs/2310.08259 (2023)
[i121]Marco Arazzi, Dincy R. Arikkat, Serena Nicolazzo, Antonino Nocera
, Rafidha Rehiman K. A., P. Vinod, Mauro Conti:
NLP-Based Techniques for Cyber Threat Intelligence. CoRR abs/2311.08807 (2023)
[i120]Giuseppe Cascavilla, Gemma Catolino, Mauro Conti, Dimos Mellios, Damian A. Tamburri:
When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning. CoRR abs/2311.17026 (2023)
[i119]Matteo Gioele Collu, Tom Janssen-Groesbeek, Stefanos Koffas, Mauro Conti, Stjepan Picek:
Dr. Jekyll and Mr. Hyde: Two Faces of LLMs. CoRR abs/2312.03853 (2023)
[i118]Florine W. Dekker
, Zekeriya Erkin, Mauro Conti:
Topology-Based Reconstruction Prevention for Decentralised Learning. CoRR abs/2312.05248 (2023)
[i117]Tommaso Bianchi
, Alessandro Brighente, Mauro Conti:
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles. CoRR abs/2312.12879 (2023)
[i116]Jelle Vos, Mauro Conti, Zekeriya Erkin:
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model. IACR Cryptol. ePrint Arch. 2023: 1777 (2023)- 2022
[j207]Fran Casino
, Thomas K. Dasaklis, Georgios P. Spathoulas
, Marios Anagnostopoulos
, Amrita Ghosal
, István Böröcz, Agusti Solanas
, Mauro Conti
, Constantinos Patsakis
:
Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews. IEEE Access 10: 25464-25493 (2022)
[j206]PLS Jayalaxmi
, Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tai-Hoon Kim
:
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey. IEEE Access 10: 121173-121192 (2022)
[j205]Reza Mohammadi, Chhagan Lal
, Mauro Conti
, Lokesh Sharma:
Software defined network-based HTTP flooding attack defender. Comput. Electr. Eng. 101: 108019 (2022)
[j204]PLS Jayalaxmi, Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Tai-Hoon Kim, Reji Thomas
:
DeBot: A deep learning-based model for bot detection in industrial internet-of-things. Comput. Electr. Eng. 102: 108214 (2022)
[j203]Mauro Conti
, Jenil Gathani, Pier Paolo Tricomi:
Virtual Influencers in Online Social Media. IEEE Commun. Mag. 60(8): 86-91 (2022)
[j202]Mohamed A. El-Zawawy
, Alessandro Brighente
, Mauro Conti
:
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones. Comput. Networks 206: 108804 (2022)
[j201]Mauro Conti
, Eleonora Losiouk
, Radha Poovendran
, Riccardo Spolaor:
Side-channel attacks on mobile and IoT devices for Cyber-Physical systems. Comput. Networks 207: 108858 (2022)
[j200]Jamshid Pirayesh, Alberto Giaretta
, Mauro Conti
, Parviz Keshavarzi:
A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Comput. Networks 216: 109077 (2022)
[j199]Mohd Shariq
, Karan Singh, Chhagan Lal
, Mauro Conti
, Tayyab Ali Khan:
ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags. Comput. Networks 217: 109360 (2022)
[j198]Amrita Ghosal
, Subir Halder, Mauro Conti
:
Secure over-the-air software update for connected vehicles. Comput. Networks 218: 109394 (2022)
[j197]Federico Tavella
, Alberto Giaretta
, Mauro Conti
, Sasitharan Balasubramaniam
:
A machine learning-based approach to detect threats in bio-cyber DNA storage systems. Comput. Commun. 187: 59-70 (2022)
[j196]Vasilios Koutsokostas, Nikolaos Lykousas
, Theodoros Apostolopoulos, Gabriele Orazi
, Amrita Ghosal, Fran Casino, Mauro Conti
, Constantinos Patsakis:
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents. Comput. Secur. 114: 102582 (2022)
[j195]Mauro Conti
, Shubham Khandhar, Vinod P.:
A few-shot malware classification approach for unknown family recognition using malware feature visualization. Comput. Secur. 122: 102887 (2022)
[j194]Ankur O. Bang
, Udai Pratap Rao
, Andrea Visconti, Alessandro Brighente, Mauro Conti
:
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions. Comput. Secur. 123: 102914 (2022)
[j193]Mohamed A. El-Zawawy
, Parvez Faruki, Mauro Conti
:
Formal model for inter-component communication and its security in android. Computing 104(8): 1839-1865 (2022)
[j192]Alakesh Kalita
, Alessandro Brighente
, Manas Khatua
, Mauro Conti
:
Effect of DIS Attack on 6TiSCH Network Formation. IEEE Commun. Lett. 26(5): 1190-1193 (2022)
[j191]Milad Taleby Ahvanooey
, Mark Xuefang Zhu
, Qianmu Li
, Wojciech Mazurczyk
, Kim-Kwang Raymond Choo
, Brij Bhooshan Gupta
, Mauro Conti
:
Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey. IEEE Internet Things J. 9(10): 7639-7663 (2022)
[j190]Rekha Goyat
, Gulshan Kumar
, Mamoun Alazab
, Mauro Conti
, Mritunjay Kumar Rai
, Reji Thomas
, Rahul Saha
, Tai-Hoon Kim
:
Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things. IEEE Internet Things J. 9(16): 14203-14215 (2022)
[j189]Mauro Conti
, P. Vinod, Alessio Vitella
:
Obfuscation detection in Android applications using deep learning. J. Inf. Secur. Appl. 70: 103311 (2022)
[j188]Milad Taleby Ahvanooey
, Mark Xuefang Zhu, Wojciech Mazurczyk, Qianmu Li, Max Kilger, Kim-Kwang Raymond Choo, Mauro Conti
:
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks. J. Inf. Secur. Appl. 71: 103368 (2022)
[j187]Milad Taleby Ahvanooey
, Mark Xuefang Zhu
, Wojciech Mazurczyk
, Kim-Kwang Raymond Choo
, Mauro Conti
, Jing Zhang
:
Misinformation Detection on Social Media: Challenges and the Road Ahead. IT Prof. 24(1): 34-40 (2022)
[j186]Fabio Aiolli, Mauro Conti
, Stjepan Picek, Mirko Polato:
On the feasibility of crawling-based attacks against recommender systems. J. Comput. Secur. 30(4): 599-621 (2022)
[j185]Mauro Conti
, Gulshan Kumar
, Pranav Nerurkar, Rahul Saha
, Luigi Vigneri
:
A survey on security challenges and solutions in the IOTA. J. Netw. Comput. Appl. 203: 103383 (2022)
[j184]Ashish Kumar, Rahul Saha
, Mauro Conti
, Gulshan Kumar
, William J. Buchanan, Tai-Hoon Kim:
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. J. Netw. Comput. Appl. 204: 103414 (2022)
[j183]Arshdeep Singh, Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Mamoun Alazab, Reji Thomas
:
A survey and taxonomy of consensus protocols for blockchains. J. Syst. Archit. 127: 102503 (2022)
[j182]Subir Halder
, Mauro Conti
:
CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem. IEEE Trans. Cloud Comput. 10(4): 2437-2450 (2022)
[j181]Marco Casagrande
, Eleonora Losiouk
, Mauro Conti
, Mathias Payer, Daniele Antonioli:
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 330-366 (2022)
[j180]Meng Li
, Yifei Chen
, Shuli Zheng, Donghui Hu
, Chhagan Lal
, Mauro Conti
:
Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks. IEEE Trans. Dependable Secur. Comput. 19(2): 1133-1148 (2022)
[j179]Xuhang Ying
, Giuseppe Bernieri, Mauro Conti
, Linda Bushnell
, Radha Poovendran
:
Covert Channel-Based Transmitter Authentication in Controller Area Networks. IEEE Trans. Dependable Secur. Comput. 19(4): 2665-2679 (2022)
[j178]Meng Li
, Yifei Chen
, Neeraj Kumar
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks. IEEE Trans. Green Commun. Netw. 6(3): 1267-1275 (2022)
[j177]Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tannishtha Devgun, Tai-Hoon Kim
, Mamoun Alazab
, Reji Thomas
:
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 18(5): 3452-3461 (2022)
[j176]Ehsan Nowroozi
, Yassine Mekdad
, Mohammad Hajian Berenjestanaki
, Mauro Conti
, Abdeslam El Fergougui
:
Demystifying the Transferability of Adversarial Attacks in Computer Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 3387-3400 (2022)
[j175]Giovanni Apruzzese
, Luca Pajola
, Mauro Conti
:
The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems. IEEE Trans. Netw. Serv. Manag. 19(4): 5152-5169 (2022)
[j174]Meng Li
, Liehuang Zhu
, Zijian Zhang
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack. IEEE/ACM Trans. Netw. 30(5): 2060-2073 (2022)
[j173]Ding Ding
, Kyuho Jeong, Shuning Xing
, Mauro Conti
, Renato Figueiredo
, Fangai Liu
:
SEnD: A Social Network Friendship Enhanced Decentralized System to Circumvent Censorships. IEEE Trans. Serv. Comput. 15(1): 346-360 (2022)
[c244]Emilie Bout, Alessandro Brighente, Mauro Conti
, Valeria Loscrì:
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks. ARES 2022: 21:1-21:10
[c243]Enkeleda Bardhi
, Mauro Conti
, Riccardo Lazzeretti, Eleonora Losiouk
, Ahmed Taffal:
Sim2Testbed Transfer: NDN Performance Evaluation. ARES 2022: 63:1-63:9
[c242]Alessandro Brighente, Mauro Conti
, Savio Sciancalepore
:
Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing. ARES 2022: 134:1-134:11
[c241]Alessandro Visintin, Flavio Toffalini, Eleonora Losiouk
, Mauro Conti
, Jianying Zhou:
HolA: Holistic and Autonomous Attestation for IoT Networks. ACNS Workshops 2022: 277-296
[c240]Giovanni Apruzzese
, Mauro Conti
, Ying Yuan
:
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. ACSAC 2022: 171-185
[c239]Stefanos Koffas, Stjepan Picek, Mauro Conti
:
Dynamic Backdoors with Global Average Pooling. AICAS 2022: 320-323
[c238]Arshdeep Singh, Rahul Saha
, Mauro Conti
, Gulshan Kumar:
PoSC: Combined Score for Consensus in Intemet-of-Things Applications. BCCA 2022: 173-180
[c237]Ankit Gangwal
, Rahul Valluri, Mauro Conti
:
Analyzing Price Deviations in DeFi Oracles. CANS 2022: 329-338
[c236]Mauro Conti
, Jiaxin Li, Stjepan Picek, Jing Xu
:
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks. AISec@CCS 2022: 1-12
[c235]Alessandro Brighente, Mauro Conti
, Harsha Vasudev
:
MeLSeC: A Method for Lightweight and Secure Communication in Internet of Vehicles. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-8
[c234]Adriaan de Vos
, Alessandro Brighente
, Mauro Conti
:
Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 67-80
[c233]Mauro Conti
, Denis Donadel
, Radha Poovendran
, Federico Turrin
:
EVExchange: A Relay Attack on Electric Vehicle Charging System. ESORICS (1) 2022: 488-508
[c232]Matteo Cardaioli, Mauro Conti
, Arpita Ravindranath:
For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection. ESORICS (3) 2022: 595-613
[c231]Kiran S. Balagani, Matteo Cardaioli, Stefano Cecconello
, Mauro Conti
, Gene Tsudik:
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads. ESORICS (1) 2022: 633-652
[c230]Trupil Limbasiya, Amrita Ghosal, Mauro Conti
:
AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks. ICDCN 2022: 208-216
[c229]Valerio Bellandi
, Paolo Ceravolo, Mauro Conti
, Maryam Ehsanpour:
Contactless Authentication for Wearable Devices Using RFID. ICDH 2022: 234-239
[c228]Meng Li, Mingwei Zhang, Jianbo Gao, Chhagan Lal, Mauro Conti
, Mamoun Alazab:
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud. ICICS 2022: 261-280
[c227]Irene Amerini, Mauro Conti
, Pietro Giacomazzi, Luca Pajola
:
PRaNA: PRNU-based Technique to Tell Real and Deepfake Videos Apart. IJCNN 2022: 1-7
[c226]Matteo Cardaioli, Alessio Miolla, Mauro Conti
, Giuseppe Sartori, Merylin Monaro, Cristina Scarpazza
, Nicolò Navarin
:
Face the Truth: Interpretable Emotion Genuineness Detection. IJCNN 2022: 1-8
[c225]Mauro Conti
, Francesco Trolese, Federico Turrin
:
ICSpot: A High-Interaction Honeypot for Industrial Control Systems. ISNCC 2022: 1-4
[c224]Alessandro Brighente, Mauro Conti
, Gulshan Kumar, Reza Ghanbari, Rahul Saha
:
Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering. M&N 2022: 1-6
[c223]Jinwoo Kim, Eduard Marin, Mauro Conti, Seungwon Shin:
EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation. NDSS 2022
[c222]Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis, Jun Xu:
Building Embedded Systems Like It's 1996. NDSS 2022
[c221]Matteo Cardaioli, Mauro Conti
, Pier Paolo Tricomi, Gene Tsudik:
Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection. PerCom 2022: 197-206
[c220]Alessandro Brighente, Martina Camaioni, Mauro Conti
, Emilio Olivastri
:
Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses. PerCom Workshops 2022: 279-284
[c219]Mauro Conti
, Eleonora Losiouk
, Alessandro Visintin:
What you see is not what you get: a man-in-the-middle attack applied to video channels. SAC 2022: 1723-1726
[c218]Simone Soderi
, Alessandro Brighente, Federico Turrin, Mauro Conti
:
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks. SECON 2022: 370-378
[c217]Alessandro Brighente, Mauro Conti, Harsha Vasudev:
SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles. SoftCOM 2022: 1-6
[c216]Pavan Srihari Darbha, Mauro Conti
, Eleonora Losiouk
, Rajib Ranjan Maiti:
Face Recognition Systems: Are you sure they only consider your face? SP (Workshops) 2022: 258-264
[c215]Meng Li, Jianbo Gao, Zijian Zhang, Chaoping Fu, Chhagan Lal, Mauro Conti
:
Graph Encryption for Shortest Path Queries with k Unsorted Nodes. TrustCom 2022: 89-96
[c214]Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci:
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand. USENIX Security Symposium 2022: 1687-1704
[c213]Kristina Hristakieva, Stefano Cresci, Giovanni Da San Martino, Mauro Conti
, Preslav Nakov:
The Spread of Propaganda by Coordinated Communities on Social Media. WebSci 2022: 191-201
[c212]Stefanos Koffas, Jing Xu
, Mauro Conti
, Stjepan Picek:
Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers. WiseML@WiSec 2022: 57-62
[e12]Weizhi Meng
, Mauro Conti
:
Cyberspace Safety and Security - 13th International Symposium, CSS 2021, Virtual Event, November 9-11, 2021, Proceedings. Lecture Notes in Computer Science 13172, Springer 2022, ISBN 978-3-030-94028-7 [contents]
[d4]Ehsan Nowroozi
, Abhishek, Mohammadreza Mohammadi
, Mauro Conti
:
Pristine and Malicious URLs. IEEE DataPort, 2022
[d3]Ehsan Nowroozi
, Mohammadreza Mohammadi, Mauro Conti
, Pargol Golmohammadi, Yassine Mekdad
, Arif Selcuk Uluagac
:
Defeating Adversarial Attacks Againt Adversarial attacks in Network Security. Zenodo, 2022
[d2]Ehsan Nowroozi
, Seyedsadra Seyedshoari, Mauro Conti
:
SPRITZ-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents. IEEE DataPort, 2022
[i115]Mauro Conti, Luca Pajola, Pier Paolo Tricomi:
Captcha Attack: Turning Captchas Against Humanity. CoRR abs/2201.04014 (2022)
[i114]Ehsan Nowroozi, Mauro Conti, Yassine Mekdad:
Detecting High-Quality GAN-Generated Face Images using Neural Networks. CoRR abs/2203.01716 (2022)
[i113]Stefanos Koffas, Stjepan Picek, Mauro Conti:
Dynamic Backdoors with Global Average Pooling. CoRR abs/2203.02079 (2022)
[i112]Giovanni Apruzzese, Luca Pajola, Mauro Conti:
The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems. CoRR abs/2203.04686 (2022)
[i111]Mauro Conti, Denis Donadel
, Radha Poovendran
, Federico Turrin:
EVExchange: A Relay Attack on Electric Vehicle Charging System. CoRR abs/2203.05266 (2022)
[i110]Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis
, Jun Xu:
Building Embedded Systems Like It's 1996. CoRR abs/2203.06834 (2022)
[i109]Alessandro Brighente, Mauro Conti, Sathish A. P. Kumar:
Extorsionware: Exploiting Smart Contract Vulnerabilities for Fun and Profit. CoRR abs/2203.09843 (2022)
[i108]Ehsan Nowroozi, Yassine Mekdad, Mauro Conti, Simone Milani, A. Selcuk Uluagac, Berrin Yanikoglu:
Real or Virtual: A Video Conferencing Background Manipulation-Detection System. CoRR abs/2204.11853 (2022)
[i107]Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti:
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework. CoRR abs/2204.13172 (2022)
[i106]Alessandro Brighente, Mauro Conti, Hanan Idriss, Stefano Tomasin:
Unmanned Aerial Vehicles Meet Reflective Intelligent Surfaces to Improve Coverage and Secrecy. CoRR abs/2205.02506 (2022)
[i105]Emilie Bout, Alessandro Brighente, Mauro Conti, Valeria Loscrì:
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks. CoRR abs/2205.03915 (2022)
[i104]Simone Soderi
, Alessandro Brighente, Federico Turrin, Mauro Conti:
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks. CoRR abs/2205.09026 (2022)
[i103]Tommaso Bianchi
, Surudhi Asokraj, Alessandro Brighente, Mauro Conti, Radha Poovendran
:
Vulnerability Analysis and Performance Enhancement of Authentication Protocol in Dynamic Wireless Power Transfer Systems. CoRR abs/2205.10292 (2022)
[i102]Alessandro Brighente, Mauro Conti, Savio Sciancalepore
:
Hide and Seek - Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles. CoRR abs/2205.13808 (2022)
[i101]Pier Paolo Tricomi, Sousan Tarahomi, Christian Cattai, Francesco Martini, Mauro Conti:
Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training. CoRR abs/2206.12904 (2022)
[i100]Mauro Conti, Jiaxin Li, Stjepan Picek, Jing Xu:
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks. CoRR abs/2207.13766 (2022)
[i99]Surudhi Asokraj, Tommaso Bianchi
, Alessandro Brighente, Mauro Conti, Radha Poovendran
:
Identity-Based Authentication for On-Demand Charging of Electric Vehicles. CoRR abs/2208.02857 (2022)
[i98]Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk:
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey. CoRR abs/2209.02835 (2022)
[i97]Alessandro Brighente, Mauro Conti, Denis Donadel
, Federico Turrin:
Hyperloop: A Cybersecurity Perspective. CoRR abs/2209.03095 (2022)
[i96]Ehsan Nowroozi, Mohammadreza Mohammadi, Pargol Golmohammadi, Yassine Mekdad, Mauro Conti, A. Selcuk Uluagac:
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization. CoRR abs/2209.04930 (2022)
[i95]Pier Paolo Tricomi, Federica Nenna, Luca Pajola, Mauro Conti, Luciano Gamberini:
You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality. CoRR abs/2209.10849 (2022)
[i94]Ehsan Nowroozi, Mohammadreza Mohammadi, Erkay Savas, Mauro Conti, Yassine Mekdad:
SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks. CoRR abs/2209.12195 (2022)
[i93]Ankit Gangwal, Aakash Jain, Mauro Conti:
On the Feasibility of Profiling Electric Vehicles through Charging Data. CoRR abs/2210.05433 (2022)
[i92]Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti:
Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2. CoRR abs/2210.09028 (2022)
[i91]Alireza Dehlaghi-Ghadim, Ali Balador, Hans Hansson, Mauro Conti:
ICSSIM-A Framework for Building Industrial Control Systems Security Simulation Testbeds. CoRR abs/2210.13325 (2022)
[i90]Giovanni Apruzzese
, Mauro Conti, Ying Yuan:
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. CoRR abs/2210.13660 (2022)
[i89]Mauro Conti, Jiaxin Li, Stjepan Picek:
On the Vulnerability of Data Points under Multiple Membership Inference Attacks and Target Models. CoRR abs/2210.16258 (2022)
[i88]Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti:
Going In Style: Audio Backdoors Through Stylistic Transformations. CoRR abs/2211.03117 (2022)
[i87]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta
, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. CoRR abs/2211.14790 (2022)
[i86]Jelle Vos, Mauro Conti, Zekeriya Erkin:
Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs. IACR Cryptol. ePrint Arch. 2022: 721 (2022)- 2021
[j172]S. Sullivan, Alessandro Brighente
, Sathish A. P. Kumar
, Mauro Conti
:
5G Security Challenges and Solutions: A Review by OSI Layers. IEEE Access 9: 116294-116314 (2021)
[j171]Amrita Ghosal, Sang Uk Sagong, Subir Halder, Kalana Sahabandu, Mauro Conti
, Radha Poovendran
, Linda Bushnell
:
Truck platoon security: State-of-the-art and road ahead. Comput. Networks 185: 107658 (2021)
[j170]Koosha Mohammad Hossein
, Mohammad Esmaeil Esmaeili, Tooska Dargahi
, Ahmad Khonsari, Mauro Conti
:
BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications. Comput. Commun. 180: 31-47 (2021)
[j169]Mohamed A. El-Zawawy
, Eleonora Losiouk
, Mauro Conti
:
Vulnerabilities in Android webview objects: Still not the end! Comput. Secur. 109: 102395 (2021)
[j168]Mauro Conti
, Denis Donadel
, Federico Turrin
:
A Survey on Industrial Control System Testbeds and Datasets for Security Research. IEEE Commun. Surv. Tutorials 23(4): 2248-2294 (2021)
[j167]Zahra Pooranian
, Mauro Conti
, Hamed Haddadi, Rahim Tafazolli
:
Online Advertising Security: Issues, Taxonomy, and Future Directions. IEEE Commun. Surv. Tutorials 23(4): 2494-2524 (2021)
[j166]Aanshi Bhardwaj
, Veenu Mangat
, Renu Vig, Subir Halder, Mauro Conti
:
Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions. Comput. Sci. Rev. 39: 100332 (2021)
[j165]Claudio A. Ardagna
, Mauro Conti
, Ernesto Damiani
, Chia-Mu Yu:
Editorial: Special issue on trusted Cloud-Edges computations. Future Gener. Comput. Syst. 114: 661-664 (2021)
[j164]Meng Li
, Chhagan Lal, Mauro Conti
, Donghui Hu:
LEChain: A blockchain-based lawful evidence management scheme for digital forensics. Future Gener. Comput. Syst. 115: 406-420 (2021)
[j163]Gulshan Kumar, Rahul Saha
, Chhagan Lal, Mauro Conti
:
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications. Future Gener. Comput. Syst. 120: 13-25 (2021)
[j162]Mohamed A. El-Zawawy
, Eleonora Losiouk
, Mauro Conti
:
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps. Int. J. Inf. Sec. 20(1): 39-58 (2021)
[j161]Abdelmadjid Benarfa
, Muhammad Hassan
, Eleonora Losiouk
, Alberto Compagno, Mohamed Bachir Yagoubi, Mauro Conti
:
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN. Int. J. Inf. Sec. 20(3): 269-285 (2021)
[j160]Neda Maleki
, Amir Masoud Rahmani, Mauro Conti
:
SPO: A Secure and Performance-aware Optimization for MapReduce Scheduling. J. Netw. Comput. Appl. 176: 102944 (2021)
[j159]Meng Li
, Liehuang Zhu
, Zijian Zhang
, Chhagan Lal, Mauro Conti
, Fabio Martinelli:
Privacy for 5G-Supported Vehicular Networks. IEEE Open J. Commun. Soc. 2: 1935-1956 (2021)
[j158]Subir Halder
, Mauro Conti
, Sajal K. Das:
A holistic approach to power efficiency in a clock offset based Intrusion Detection Systems for Controller Area Networks. Pervasive Mob. Comput. 73: 101385 (2021)
[j157]Moreno Ambrosin, Mauro Conti
, Riccardo Lazzeretti, Chia-Mu Yu:
Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems. ACM Trans. Cyber Phys. Syst. 5(1): 1:1-1:2 (2021)
[j156]Yuan-Gen Wang
, Guopu Zhu
, Jin Li
, Mauro Conti
, Jiwu Huang
:
Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole. IEEE Trans. Circuits Syst. Video Technol. 31(1): 76-87 (2021)
[j155]Reza Mohammadi
, Amin Nazari
, Mohammad Nassiri, Mauro Conti
:
An SDN-based framework for QoS routing in internet of underwater things. Telecommun. Syst. 78(2): 253-266 (2021)
[j154]Federico Tavella
, Alberto Giaretta
, Triona Marie Dooley-Cullinane
, Mauro Conti
, Lee Coffey
, Sasitharan Balasubramaniam
:
DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks. IEEE Trans. Emerg. Top. Comput. 9(3): 1566-1580 (2021)
[j153]Nagarathna Ravi
, S. Mercy Shalinie
, Chhagan Lal
, Mauro Conti
:
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller. IEEE Trans. Netw. Serv. Manag. 18(1): 745-759 (2021)
[j152]Andrea Agiollo
, Mauro Conti
, Pallavi Kaliyar
, Tsung-Nan Lin
, Luca Pajola
:
DETONAR: Detection of Routing Attacks in RPL-Based IoT. IEEE Trans. Netw. Serv. Manag. 18(2): 1178-1190 (2021)
[j151]Meng Li
, Liehuang Zhu
, Zijian Zhang
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain. IEEE Trans. Netw. Serv. Manag. 18(4): 4434-4449 (2021)
[j150]Habib Mostafaei
, Mohammad Shojafar
, Mauro Conti
:
TEL: Low-Latency Failover Traffic Engineering in Data Plane. IEEE Trans. Netw. Serv. Manag. 18(4): 4697-4710 (2021)
[j149]Giuseppe Bianchi
, Mauro Conti
, Tooska Dargahi
, Ali Dehghantanha
:
Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence. IEEE Trans. Sustain. Comput. 6(2): 182-183 (2021)
[c211]Flavio Toffalini, Mariano Graziano, Mauro Conti
, Jianying Zhou:
SnakeGX: A Sneaky Attack Against SGX Enclaves. ACNS (1) 2021: 333-362
[c210]Antonio Ruggia, Eleonora Losiouk
, Luca Verderame, Mauro Conti
, Alessio Merlo:
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization. ACSAC 2021: 970-981
[c209]Rahul Saha
, Gulshan Kumar, Alessandro Brighente, Mauro Conti
:
Towards An Enhanced Reputation System for IOTA's Coordicide. BCCA 2021: 26-33
[c208]Alessandro Brighente, Mauro Conti
, Gulshan Kumar, Reza Ghanbari, Rahul Saha
:
Knocking on Tangle's Doors: Security Analysis of IOTA Ports. Blockchain 2021: 433-439
[c207]Yassine Mekdad
, Giuseppe Bernieri, Mauro Conti
, Abdeslam El Fergougui
:
A threat model method for ICS malware: the TRISIS case. CF 2021: 221-228
[c206]Marco Casagrande
, Mauro Conti
, Eleonora Losiouk
:
Contact Tracing Made Un-relay-able. CODASPY 2021: 221-232
[c205]Luca Attanasio, Mauro Conti
, Denis Donadel
, Federico Turrin
:
MiniV2G: An Electric Vehicle Charging Emulator. CPSS@AsiaCCS 2021: 65-73
[c204]Oguzhan Ersoy, Ziya Alper Genç, Zekeriya Erkin
, Mauro Conti
:
Practical Exchange for Unique Digital Goods. DAPPS 2021: 49-58
[c203]Mauro Conti
, P. Vinod, Pier Paolo Tricomi:
Secure Static Content Delivery for CDN Using Blockchain Technology. DPM/CBT@ESORICS 2021: 301-309
[c202]Yassine Mekdad
, Giuseppe Bernieri, Mauro Conti
, Abdeslam El Fergougui
:
The Rise of ICS Malware: A Comparative Analysis. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 496-511
[c201]Alessandro Brighente, Mauro Conti
, Izza Sadaf:
Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand. ESORICS (1) 2021: 651-667
[c200]Luca Pajola
, Mauro Conti
:
Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack. EuroS&P 2021: 198-211
[c199]Daniele Mari
, Samuele Giuliano Piazzetta, Sara Bordin, Luca Pajola
, Sebastiano Verde
, Simone Milani, Mauro Conti
:
Looking Through Walls: Inferring Scenes from Video-Surveillance Encrypted Traffic. ICASSP 2021: 2595-2599
[c198]Giovanni Barbieri, Mauro Conti
, Nils Ole Tippenhauer, Federico Turrin
:
Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis. ICCCN 2021: 1-9
[c197]Matteo Cardaioli, Mauro Conti
, Andrea Di Sorbo
, Enrico Fabrizio, Sonia Laudanna
, Corrado Aaron Visaggio:
It's a Matter of Style: Detecting Social Bots through Writing Style Consistency. ICCCN 2021: 1-9
[c196]Anas Alsoliman, Giulio Rigoni
, Marco Levorato, Cristina M. Pinotti
, Nils Ole Tippenhauer
, Mauro Conti
:
COTS Drone Detection using Video Streaming Characteristics. ICDCN 2021: 166-175
[c195]Matteo Cardaioli, Stefano Cecconello
, Merylin Monaro, Giuseppe Sartori, Mauro Conti
, Graziella Orrù
:
Malingering Scraper: A Novel Framework to Reconstruct Honest Profiles from Malingerer Psychopathological Tests. ICONIP (6) 2021: 433-440
[c194]Enkeleda Bardhi
, Mauro Conti
, Riccardo Lazzeretti, Eleonora Losiouk
:
ICN PATTA: ICN Privacy Attack Through Traffic Analysis. LCN 2021: 443-446
[c193]Dario Pasquini, Ankit Gangwal
, Giuseppe Ateniese
, Massimo Bernaschi, Mauro Conti
:
Improving Password Guessing via Representation Learning. SP 2021: 1382-1399
[c192]Yifei Chen
, Meng Li, Shuli Zheng, Chhagan Lal, Mauro Conti
:
Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services. STM 2021: 43-61
[c191]Mohamad Mansouri, Wafa Ben Jaballah, Melek Önen, Md Masoom Rabbani
, Mauro Conti
:
FADIA: fairness-driven collaborative remote attestation. WISEC 2021: 60-71
[e11]Mauro Conti
, Marc Stevens
, Stephan Krenn
:
Cryptology and Network Security - 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings. Lecture Notes in Computer Science 13099, Springer 2021, ISBN 978-3-030-92547-5 [contents]
[e10]Jiannong Cao, Man Ho Au, Mauro Conti, Nils Ole Tippenhauer, Alessandro Brighente:
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, CPSS@AsiaCCS 2021, Virtual Event / Hong Kong, 7 June 2021. ACM 2021, ISBN 978-1-4503-8402-5 [contents]
[d1]Ehsan Nowroozi
, Mauro Conti
, Simone Milani
, Yassine Mekdad
, Gabriele Orazi:
Dataset for Real and Virtual Backgrounds of Video Calls. Zenodo, 2021
[i85]Luca Attanasio, Mauro Conti, Denis Donadel, Federico Turrin:
MiniV2G: An Electric Vehicle Charging Emulator. CoRR abs/2101.11720 (2021)
[i84]Mauro Conti, Denis Donadel
, Federico Turrin:
A Survey on Industrial Control System Testbeds and Datasets for Security Research. CoRR abs/2102.05631 (2021)
[i83]Francesco Betti Sorbelli, Mauro Conti, Cristina M. Pinotti, Giulio Rigoni:
UAVs Path Deviation Attacks: Survey and Research Challenges. CoRR abs/2102.06638 (2021)
[i82]Luca Pajola, Mauro Conti:
Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack. CoRR abs/2104.05996 (2021)
[i81]Gabriele Etta, Matteo Cinelli, Alessandro Galeazzi, Carlo Michele Valensise, Mauro Conti, Walter Quattrociocchi:
News consumption and social media regulations policy. CoRR abs/2106.03924 (2021)
[i80]Mauro Conti, Simone Milani, Ehsan Nowroozi, Gabriele Orazi:
Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System. CoRR abs/2106.15130 (2021)
[i79]Alessandro Brighente, Mauro Conti, Denis Donadel
, Federico Turrin:
EVScout2.0: Electric Vehicle Profiling Through Charging Profile. CoRR abs/2106.16016 (2021)
[i78]Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek:
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers. CoRR abs/2107.14569 (2021)
[i77]Fran Casino, Tom K. Dasaklis, Georgios P. Spathoulas, Marios Anagnostopoulos, Amrita Ghosal, István Böröcz, Agusti Solanas, Mauro Conti, Constantinos Patsakis:
A cross-domain qualitative meta-analysis of digital forensics: Research trends, challenges, and emerging topics. CoRR abs/2108.04634 (2021)
[i76]Kristina Hristakieva, Stefano Cresci, Giovanni Da San Martino, Mauro Conti, Preslav Nakov:
The Spread of Propaganda by Coordinated Communities on Social Media. CoRR abs/2109.13046 (2021)
[i75]Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
A Survey on Security and Privacy Issues of UAVs. CoRR abs/2109.14442 (2021)
[i74]Ehsan Nowroozi, Mauro Conti, Yassine Mekdad, Mohammad Hajian Berenjestanaki, Abdeslam El Fergougui:
Demystifying the Transferability of Adversarial Attacks in Computer Networks. CoRR abs/2110.04488 (2021)
[i73]Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci:
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand. CoRR abs/2110.08113 (2021)- 2020
[j148]Jyoti Gajrani
, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Akka Zemmari, Mohamed Mosbah
, Mauro Conti
:
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements. Adv. Comput. 119: 73-120 (2020)
[j147]Mauro Conti
, Pallavi Kaliyar, Md Masoom Rabbani
, Silvio Ranise:
Attestation-enabled secure and scalable routing protocol for IoT networks. Ad Hoc Networks 98 (2020)
[j146]Rahim Taheri
, Reza Javidan, Mohammad Shojafar
, P. Vinod, Mauro Conti
:
Can machine learning model with static features be fooled: an adversarial machine learning approach. Clust. Comput. 23(4): 3233-3253 (2020)
[j145]Amrita Ghosal, Mauro Conti
:
Security issues and challenges in V2X: A Survey. Comput. Networks 169: 107093 (2020)
[j144]Wafa Ben Jaballah, Mauro Conti
, Chhagan Lal:
Security and design requirements for software-defined VANETs. Comput. Networks 169: 107099 (2020)
[j143]Muhammad Hassan
, Mauro Conti
, Chhagan Lal
:
NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN. Comput. Networks 174: 107222 (2020)
[j142]Subir Halder, Amrita Ghosal, Mauro Conti
:
Secure over-the-air software updates in connected vehicles: A survey. Comput. Networks 178: 107343 (2020)
[j141]Giuseppe Bernieri, Stefano Cecconello
, Mauro Conti
, Gianluca Lain:
TAMBUS: A novel authentication method through covert channels for securing industrial networks. Comput. Networks 183: 107583 (2020)
[j140]Jay Dave, Parvez Faruki, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mauro Conti
:
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage. Comput. Commun. 154: 148-159 (2020)
[j139]Mohammad Hadi Alaeiyan
, Saeed Parsa
, Vinod P, Mauro Conti
:
Detection of algorithmically-generated domains: An adversarial machine learning approach. Comput. Commun. 160: 661-673 (2020)
[j138]Mauro Conti
, Chhagan Lal
:
Context-based Co-presence detection techniques: A survey. Comput. Secur. 88 (2020)
[j137]Pallavi Kaliyar
, Wafa Ben Jaballah, Mauro Conti
, Chhagan Lal
:
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks. Comput. Secur. 94: 101849 (2020)
[j136]Mauro Conti
, Ankit Gangwal
, Muhammad Hassan
, Chhagan Lal
, Eleonora Losiouk
:
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions. IEEE Commun. Surv. Tutorials 22(3): 2104-2129 (2020)
[j135]Moreno Ambrosin, Mauro Conti
, Riccardo Lazzeretti
, Md Masoom Rabbani
, Silvio Ranise
:
Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges. IEEE Commun. Surv. Tutorials 22(4): 2447-2461 (2020)
[j134]Bharat Manral
, Gaurav Somani
, Kim-Kwang Raymond Choo
, Mauro Conti
, Manoj Singh Gaur
:
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions. ACM Comput. Surv. 52(6): 124:1-124:38 (2020)
[j133]Rahim Taheri
, Meysam Ghahramani
, Reza Javidan, Mohammad Shojafar
, Zahra Pooranian
, Mauro Conti
:
Similarity-based Android malware detection using Hamming distance of static binary features. Future Gener. Comput. Syst. 105: 230-247 (2020)
[j132]Claudio Agostino Ardagna, Mauro Conti
, Chia-Mu Yu:
Special issue on Trusted Cloud-Edges Computations. Future Gener. Comput. Syst. 112: 1180-1183 (2020)
[j131]Neda Maleki
, Hamid Reza Faragardi, Amir Masoud Rahmani, Mauro Conti
, Jay F. Lofstead
:
TMaR: a two-stage MapReduce scheduler for heterogeneous environments. Hum. centric Comput. Inf. Sci. 10: 42 (2020)
[j130]Stefano Calzavara
, Mauro Conti
, Riccardo Focardi
, Alvise Rabitti, Gabriele Tolomei
:
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery. IEEE Secur. Priv. 18(3): 8-16 (2020)
[j129]Shanshan Wang, Zhenxiang Chen, Qiben Yan
, Ke Ji, Lizhi Peng, Bo Yang, Mauro Conti
:
Deep and broad URL feature mining for android malware detection. Inf. Sci. 513: 600-613 (2020)
[j128]Mauro Conti
, Pallavi Kaliyar, Chhagan Lal:
A robust multicast communication protocol for Low power and Lossy networks. J. Netw. Comput. Appl. 164: 102675 (2020)
[j127]Rahim Taheri
, Reza Javidan, Mohammad Shojafar
, Zahra Pooranian
, Ali Miri, Mauro Conti
:
On defending against label flipping attacks on malware detection systems. Neural Comput. Appl. 32(18): 14781-14800 (2020)
[j126]Minho Jo, Kai Hu, Richard Yu, Li Sun
, Mauro Conti
, Qinghe Du:
Private Blockchain in Industrial IoT. IEEE Netw. 34(5): 76-77 (2020)
[j125]Chia-Mu Yu
, Sarada Prasad Gochhayat
, Mauro Conti
, Chun-Shien Lu
:
Privacy Aware Data Deduplication for Side Channel in Cloud Storage. IEEE Trans. Cloud Comput. 8(2): 597-609 (2020)
[j124]Mohammad Hadi Alaeiyan
, Ali Dehghantanha, Tooska Dargahi
, Mauro Conti
, Saeed Parsa
:
A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks. ACM Trans. Cyber Phys. Syst. 4(3): 31:1-31:22 (2020)
[j123]Mauro Conti
, Fabio De Gaspari
, Luigi V. Mancini
:
A Novel Stealthy Attack to Gather SDN Configuration-Information. IEEE Trans. Emerg. Top. Comput. 8(2): 328-340 (2020)
[j122]Neetesh Saxena
, Mauro Conti
, Kim-Kwang Raymond Choo
, Narendra S. Chaudhari:
BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices. IEEE Trans. Inf. Forensics Secur. 15: 1470-1485 (2020)
[j121]Ankit Gangwal
, Mauro Conti
:
Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel. IEEE Trans. Inf. Forensics Secur. 15: 1630-1639 (2020)
[j120]Anshul Arora
, Sateesh Kumar Peddoju
, Mauro Conti
:
PermPair: Android Malware Detection Using Permission Pairs. IEEE Trans. Inf. Forensics Secur. 15: 1968-1982 (2020)
[j119]Edlira Dushku
, Md Masoom Rabbani
, Mauro Conti
, Luigi V. Mancini
, Silvio Ranise
:
SARA: Secure Asynchronous Remote Attestation for IoT Systems. IEEE Trans. Inf. Forensics Secur. 15: 3123-3136 (2020)
[j118]Meng Li
, Donghui Hu
, Chhagan Lal
, Mauro Conti
, Zijian Zhang
:
Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things. IEEE Trans. Ind. Informatics 16(10): 6564-6574 (2020)
[j117]Agostino Sturaro, Simone Silvestri
, Mauro Conti
, Sajal K. Das
:
A Realistic Model for Failure Propagation in Interdependent Cyber-Physical Systems. IEEE Trans. Netw. Sci. Eng. 7(2): 817-831 (2020)
[j116]Santhanakrishnan Anand
, Ding Ding, Paolo Gasti
, Mike O'Neal, Mauro Conti
, Kiran S. Balagani
:
DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures. IEEE Trans. Netw. Serv. Manag. 17(1): 201-212 (2020)
[j115]Neminath Hubballi
, Mayank Swarnkar
, Mauro Conti
:
BitProb: Probabilistic Bit Signatures for Accurate Application Identification. IEEE Trans. Netw. Serv. Manag. 17(3): 1730-1741 (2020)
[j114]Anshu S. Anand, Mauro Conti
, Pallavi Kaliyar, Chhagan Lal
:
TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks. Wirel. Networks 26(4): 2449-2463 (2020)
[c190]Mauro Conti
, Giulio Rigoni
, Flavio Toffalini:
ASAINT: a spy App identification system based on network traffic. ARES 2020: 51:1-51:8
[c189]Andrea Calesso, Mauro Conti
, Martino Grasselli:
CyberWolf: assessing vulnerabilities of ICT-intensive financial markets. ARES 2020: 86:1-86:7
[c188]Matteo Cardaioli, Merylin Monaro, Giuseppe Sartori, Mauro Conti
:
Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics. AHFE (19) 2020: 41-48
[c187]Matteo Cardaioli, Pallavi Kaliyar, Pasquale Capuozzo, Mauro Conti
, Giuseppe Sartori, Merylin Monaro:
Predicting Twitter Users' Political Orientation: An Application to the Italian Political Scenario. ASONAM 2020: 159-165
[c186]Ioanna Angeliki Kapetanidou
, Muhammad Hassan
, Christos-Alexandros Sarros
, Mauro Conti
, Vassilis Tsaoussidis
:
Reputation-based Trust: A robust mechanism for Dynamic Adaptive Streaming over Named Data Networking. BigDataSE 2020: 114-121
[c185]Francesco Bizzaro, Mauro Conti
, Maria Silvia Pini:
Proof of Evolution: leveraging blockchain mining for a cooperative execution of Genetic Algorithms. Blockchain 2020: 450-455
[c184]Ankit Gangwal
, Samuele Giuliano Piazzetta, Gianluca Lain, Mauro Conti
:
Detecting Covert Cryptomining Using HPC. CANS 2020: 344-364
[c183]Federico Turrin
, Alessandro Erba
, Nils Ole Tippenhauer
, Mauro Conti
:
A Statistical Analysis Framework for ICS Process Datasets. CPSIOTSEC@CCS 2020: 25-30
[c182]Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Luca Pajola, Federico Turrin:
Fake News Spreaders Profiling Through Behavioural Analysis. CLEF (Working Notes) 2020
[c181]Mattia Carlucci, Stefano Cecconello
, Mauro Conti
, Piero Romare
:
Eathentication: A Chewing-based Authentication Method. CNS 2020: 1-9
[c180]Fabio Aiolli, Mauro Conti
, Stjepan Picek, Mirko Polato:
Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems. ESORICS (2) 2020: 165-184
[c179]Mauro Conti
, Pier Paolo Tricomi, Gene Tsudik:
DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon. ESORICS (1) 2020: 277-294
[c178]Matteo Cardaioli, Mauro Conti
, Kiran S. Balagani, Paolo Gasti:
Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage. ESORICS (1) 2020: 720-735
[c177]Amrita Ghosal, Subir Halder, Mauro Conti
:
STRIDE: Scalable and Secure Over-The-Air Software Update Scheme for Autonomous Vehicles. ICC 2020: 1-6
[c176]Subir Halder, Mauro Conti
, Sajal K. Das:
COIDS: A Clock Offset Based Intrusion Detection System for Controller Area Networks. ICDCN 2020: 22:1-22:10
[c175]Yifei Chen
, Meng Li, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti
:
One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud. ICICS 2020: 350-365
[c174]Md Masoom Rabbani, Jo Vliegen, Mauro Conti, Nele Mentens
:
SHeFU: Secure Hardware-Enabled Protocol for Firmware Updates. ISCAS 2020: 1-5
[c173]Mauro Conti
, Pier Paolo Tricomi
:
PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition. ISC 2020: 393-408
[c172]Alberto Compagno, Mauro Conti
, Eleonora Losiouk
, Gene Tsudik, Sebastiano Valle:
A Proactive Cache Privacy Attack on NDN. NOMS 2020: 1-7
[c171]Giuseppe Bernieri, Mauro Conti
, Matteo Sovilla, Federico Turrin
:
ALISI: a lightweight identification system based on Iroha. SAC 2020: 271-273
[c170]Filippo Berto
, Luca Calderoni
, Mauro Conti
, Eleonora Losiouk
:
Spatial bloom filter in named data networking: a memory efficient solution. SAC 2020: 274-277
[c169]Francesco Betti Sorbelli
, Mauro Conti
, Cristina M. Pinotti
, Giulio Rigoni
:
UAVs Path Deviation Attacks: Survey and Research Challenges. SECON Workshops 2020: 1-6
[c168]Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen
, Hidayet Aksu, Mauro Conti
, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-boo: i see your smart home activities, even encrypted! WISEC 2020: 207-218
[e9]Mauro Conti
, Jianying Zhou, Emiliano Casalicchio
, Angelo Spognardi
:
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12146, Springer 2020, ISBN 978-3-030-57807-7 [contents]
[e8]Mauro Conti
, Jianying Zhou, Emiliano Casalicchio
, Angelo Spognardi
:
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12147, Springer 2020, ISBN 978-3-030-57877-0 [contents]
[e7]Jianying Zhou
, Mauro Conti
, Chuadhry Mujeeb Ahmed
, Man Ho Au
, Lejla Batina
, Zhou Li
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Weizhi Meng
, Martín Ochoa
, Stjepan Picek
, Georgios Portokalidis
, Cong Wang
, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents]
[i72]Zahra Pooranian, Mauro Conti, Hamed Hadaddi:
Online Advertising Security: Issues, Taxonomy, and Future Directions. CoRR abs/2006.03986 (2020)
[i71]Giovanni Barbieri, Mauro Conti, Nils Ole Tippenhauer, Federico Turrin:
Sorry, Shodan is not Enough! Assessing ICS Security via IXP Network Traffic Analysis. CoRR abs/2007.01114 (2020)
[i70]Federico Tavella, Alberto Giaretta, Mauro Conti, Sasitharan Balasubramaniam:
A Machine Learning-based Approach to Detect Threats in Bio-Cyber DNA Storage Systems. CoRR abs/2009.13380 (2020)
[i69]Habib Mostafaei, Mohammad Shojafar, Mauro Conti:
TEL: Low-Latency Failover Traffic Engineering in Data Plane. CoRR abs/2009.13640 (2020)
[i68]Marco Alecci, Riccardo Cestaro, Mauro Conti, Ketan Kanishka, Eleonora Losiouk:
Mascara: A Novel Attack Leveraging Android Virtualization. CoRR abs/2010.10639 (2020)
[i67]Marco Casagrande, Mauro Conti, Eleonora Losiouk:
Contact Tracing Made Un-relay-able. CoRR abs/2010.12641 (2020)
2010 – 2019
- 2019
[j113]Armir Bujari
, Mauro Conti
, Carla De Francesco
, Claudio E. Palazzi
:
Fast multi-hop broadcast of alert messages in VANETs: An analytical model. Ad Hoc Networks 82: 126-133 (2019)
[j112]Balu Deokate, Chhagan Lal
, Denis Trcek, Mauro Conti
:
Mobility-aware cross-layer routing for peer-to-peer networks. Comput. Electr. Eng. 73: 209-226 (2019)
[j111]Subir Halder
, Amrita Ghosal
, Mauro Conti
:
Efficient physical intrusion detection in Internet of Things: A Node deployment approach. Comput. Networks 154: 28-46 (2019)
[j110]Mohammad Mahdi Tajiki
, Mohammad Shojafar
, Behzad Akbari, Stefano Salsano, Mauro Conti
, Mukesh Singhal:
Joint failure recovery, fault prevention, and energy-efficient resource management for real-time SFC in fog-supported SDN. Comput. Networks 162 (2019)
[j109]Mauro Conti
, Muhammad Hassan
, Chhagan Lal:
BlockAuth: BlockChain based distributed producer authentication in ICN. Comput. Networks 164 (2019)
[j108]Mohammad Hadi Alaeiyan
, Saeed Parsa
, Mauro Conti
:
Analysis and classification of context-based malware behavior. Comput. Commun. 136: 76-90 (2019)
[j107]Vanga Odelu
, Sourav Saha
, Rajendra Prasath
, Lakshminarayana Sadineni
, Mauro Conti
, Minho Jo
:
Efficient privacy preserving device authentication in WBANs for industrial e-health applications. Comput. Secur. 83: 300-312 (2019)
[j106]Amrita Ghosal
, Mauro Conti
:
Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey. IEEE Commun. Surv. Tutorials 21(3): 2831-2848 (2019)
[j105]


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID