default search action
Mauro Conti
Person information
- affiliation: University of Padua, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j296]Jahez Abraham Johny, K. A. Asmitha, P. Vinod, G. Radhamani, Rafidha Rehiman K. A., Mauro Conti:
Deep learning fusion for effective malware detection: leveraging visual features. Clust. Comput. 28(2): 135 (2025) - [j295]Ying Yuan, Giovanni Apruzzese, Mauro Conti:
Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection. Comput. Secur. 148: 104115 (2025) - [j294]Dincy R. Arikkat, Mert Cihangiroglu, Mauro Conti, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera, P. Vinod:
SeCTIS: A framework to Secure CTI Sharing. Future Gener. Comput. Syst. 164: 107562 (2025) - [j293]K. M. Sameera, Arnaldo Sgueglia, P. Vinod, Rafidha Rehiman K. A., Corrado Aaron Visaggio, Andrea Di Sorbo, Mauro Conti:
SecDefender: Detecting low-quality models in multidomain federated learning systems. Future Gener. Comput. Syst. 164: 107587 (2025) - [j292]K. A. Asmitha, P. Vinod, Rafidha Rehiman K. A., Neeraj Raveendran, Mauro Conti:
Android malware defense through a hybrid multi-modal approach. J. Netw. Comput. Appl. 233: 104035 (2025) - [j291]Florine W. Dekker, Zekeriya Erkin, Mauro Conti:
Topology-Based Reconstruction Prevention for Decentralised Learning. Proc. Priv. Enhancing Technol. 2025(1): 553-566 (2025) - 2024
- [j290]Ankit Gangwal, Aashish Paliwal, Mauro Conti:
De-Authentication Using Ambient Light Sensor. IEEE Access 12: 28225-28234 (2024) - [j289]Amandeep Verma, Rahul Saha, Gulshan Kumar, Mauro Conti, Tai-Hoon Kim:
PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks. IEEE Access 12: 48301-48320 (2024) - [j288]Avantika Gaur, Preeti Mishra, Vinod P., Arjun Singh, Vijay Varadharajan, Uday Kiran Tupakula, Mauro Conti:
vDefender: An explainable and introspection-based approach for identifying emerging malware behaviour at hypervisor-layer in virtualization environment. Comput. Electr. Eng. 120: 109742 (2024) - [j287]Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti, Reji Thomas, Tai-Hoon Kim:
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things. Clust. Comput. 27(3): 2691-2713 (2024) - [j286]Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti:
Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities. Clust. Comput. 27(4): 4823-4839 (2024) - [j285]Arjun Singh, Preeti Mishra, P. Vinod, Avantika Gaur, Mauro Conti:
SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection. Clust. Comput. 27(7): 9757-9782 (2024) - [j284]PLS Jayalaxmi, Manali Chakraborty, Rahul Saha, Gulshan Kumar, Mauro Conti:
MADESANT: malware detection and severity analysis in industrial environments. Clust. Comput. 27(8): 11347-11367 (2024) - [j283]Vaishali A. Shirsath, Madhav Chandane, Chhagan Lal, Mauro Conti:
SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy. Comput. Networks 244: 110327 (2024) - [j282]Mohd Shariq, Mauro Conti, Karan Singh, Chhagan Lal, Ashok Kumar Das, Shehzad Ashraf Chaudhry, Mehedi Masud:
Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing. Comput. Networks 252: 110678 (2024) - [j281]K. M. Sameera, Vinod P., Rafidha Rehiman K. A., Mauro Conti:
LFGurad: A Defense against Label Flipping Attack in Federated Learning for Vehicular Network. Comput. Networks 254: 110768 (2024) - [j280]Vaishali A. Shirsath, Madhav Chandane, Chhagan Lal, Mauro Conti:
SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches. Comput. Commun. 216: 283-294 (2024) - [j279]Amandeep Verma, Rahul Saha, Gulshan Kumar, Mauro Conti:
PETRAK: A solution against DDoS attacks in vehicular networks. Comput. Commun. 221: 142-154 (2024) - [j278]K. M. Sameera, Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Rafidha Rehiman K. A., Vinod P., Mauro Conti:
Privacy-preserving in Blockchain-based Federated Learning systems. Comput. Commun. 222: 38-67 (2024) - [j277]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera, Georgiana Timpau, Mauro Conti:
OSTIS: A novel Organization-Specific Threat Intelligence System. Comput. Secur. 145: 103990 (2024) - [j276]Ying Yuan, Giovanni Apruzzese, Mauro Conti:
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning. DTRAP 5(2): 16:1-16:51 (2024) - [j275]Luca Pajola, Mauro Conti:
Lights Toward Adversarial Machine Learning: The Achilles Heel of Artificial Intelligence. IEEE Intell. Syst. 39(5): 20-24 (2024) - [j274]Andrea Agiollo, Enkeleda Bardhi, Mauro Conti, Nicolò Dal Fabbro, Riccardo Lazzeretti:
Anonymous Federated Learning via Named-Data Networking. Future Gener. Comput. Syst. 152: 288-303 (2024) - [j273]Andrea De Salve, Alessandro Brighente, Mauro Conti:
EDIT: A data inspection tool for smart contracts temporal behavior modeling and prediction. Future Gener. Comput. Syst. 154: 413-425 (2024) - [j272]Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, A. Selcuk Uluagac:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. IEEE Secur. Priv. 22(1): 10-23 (2024) - [j271]Gulshan Kumar, Rahul Saha, Mauro Conti, Tannishtha Devgun, Reji Thomas:
GREPHRO: Nature-inspired optimization duo for Internet-of-Things. Internet Things 25: 101067 (2024) - [j270]Alessandro Brighente, Mauro Conti, Gabriele Di Renzone, Giacomo Peruzzi, Alessandro Pozzebon:
Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective. IEEE Internet Things J. 11(5): 7309-7324 (2024) - [j269]Jin Han, Ran Cao, Alessandro Brighente, Mauro Conti:
Light-YOLOv5: A Lightweight Drone Detector for Resource-Constrained Cameras. IEEE Internet Things J. 11(6): 11046-11057 (2024) - [j268]Khalid Mahmood, Mohammad S. Obaidat, Salman Shamshad, Mohammed J. F. Alenazi, Gulshan Kumar, Mohammad Hossein Anisi, Mauro Conti:
Cost-Effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT). IEEE Internet Things J. 11(13): 23977-23984 (2024) - [j267]Rahul Saha, Gulshan Kumar, Mauro Conti, Tannishtha Devgun, Joel J. P. C. Rodrigues:
AALMOND: Decentralized Adaptive Access Control of Multiparty Data Sharing in Industrial Networks. IEEE Internet Things J. 11(15): 26104-26117 (2024) - [j266]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Rabeeba Abdul Rasheed, Mauro Conti:
XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis. J. Netw. Syst. Manag. 32(4): 88 (2024) - [j265]Ehsan Nowroozi, Yoosef Habibi, Mauro Conti:
SPRITZ-PS: validation of synthetic face images using a large dataset of printed documents. Multim. Tools Appl. 83(26): 67795-67823 (2024) - [j264]Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti:
Is AI a Trick or T(h)reat for Securing Programmable Data Planes? IEEE Netw. 38(6): 146-152 (2024) - [j263]Saverio Cavasin, Daniele Mari, Simone Milani, Mauro Conti:
Fingerprint membership and identity inference against generative adversarial networks. Pattern Recognit. Lett. 185: 184-189 (2024) - [j262]Yassine Mekdad, Ahmet Aris, Abbas Acar, Mauro Conti, Riccardo Lazzeretti, Abdeslam El Fergougui, A. Selcuk Uluagac:
A comprehensive security and performance assessment of UAV authentication schemes. Secur. Priv. 7(1) (2024) - [j261]Alessandro Brighente, Mauro Conti, Denis Donadel, Federico Turrin:
EVScout2.0: Electric Vehicle Profiling through Charging Profile. ACM Trans. Cyber Phys. Syst. 8(2): 11 (2024) - [j260]Rahul Saha, Gulshan Kumar, G. Geetha, Mauro Conti, William J. Buchanan:
Application of Randomness for Security and Privacy in Multi-Party Computation. IEEE Trans. Dependable Secur. Comput. 21(6): 5694-5705 (2024) - [j259]Jin Han, Yun-Feng Ren, Alessandro Brighente, Mauro Conti:
RANGO: A Novel Deep Learning Approach to Detect Drones Disguising from Video Surveillance Systems. ACM Trans. Intell. Syst. Technol. 15(2): 31:1-31:21 (2024) - [j258]Giuseppe Cascavilla, Gemma Catolino, Mauro Conti, Dimos Mellios, Damian A. Tamburri:
Few Images, Many Insights: Illicit Content Detection Using a Limited Number of Images. ACM Trans. Intell. Syst. Technol. 15(6): 130:1-130:26 (2024) - [j257]Mohamed A. El-Zawawy, Chhagan Lal, Mauro Conti:
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 25(2): 2017-2033 (2024) - [j256]Yanan Zhao, Haiyang Yu, Yuhao Liang, Mauro Conti, Wael Bazzi, Yilong Ren:
A Sanitizable Access Control With Policy-Protection for Vehicular Social Networks. IEEE Trans. Intell. Transp. Syst. 25(3): 2956-2965 (2024) - [j255]Yanan Zhao, Haiyang Yu, Yuhao Liang, Alessandro Brighente, Mauro Conti, Jianfei Sun, Yilong Ren:
Secure Source Identification Scheme for Revocable Instruction Sharing in Vehicle Platoon. IEEE Trans. Intell. Transp. Syst. 25(5): 3671-3684 (2024) - [j254]Meng Li, Yanzhe Shen, Guixin Ye, Jialing He, Xin Zheng, Zijian Zhang, Liehuang Zhu, Mauro Conti:
Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics. IEEE Trans. Knowl. Data Eng. 36(5): 1874-1888 (2024) - [j253]Meng Li, Mingwei Zhang, Liehuang Zhu, Zijian Zhang, Mauro Conti, Mamoun Alazab:
Decentralized and Privacy-Preserving Smart Parking With Secure Repetition and Full Verifiability. IEEE Trans. Mob. Comput. 23(12): 11635-11654 (2024) - [j252]Simone Soderi, Alessandro Brighente, Saiqin Xu, Mauro Conti:
Multi-RIS Aided VLC Physical Layer Security for 6G Wireless Networks. IEEE Trans. Mob. Comput. 23(12): 15182-15195 (2024) - [j251]Himani Sikarwar, Harsha Vasudev, Debasis Das, Mauro Conti, Koustav Kumar Mondal:
SECURE: Secure and Efficient Protocol Using Randomness and Edge-Computing for Drone-Assisted Internet of Vehicles. IEEE Trans. Netw. Serv. Manag. 21(6): 6974-6988 (2024) - [j250]Amit Kumar Singh, Deepa Kundur, Mauro Conti:
Introduction to the Special Issue on Integrity of Multimedia and Multimodal Data in Internet of Things. ACM Trans. Multim. Comput. Commun. Appl. 20(6): 151:1-151:4 (2024) - [j249]Ehsan Nowroozi, Mohammadreza Mohammadi, Pargol Golmohammadi, Yassine Mekdad, Mauro Conti, A. Selcuk Uluagac:
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization. IEEE Trans. Serv. Comput. 17(1): 18-29 (2024) - [j248]Meng Li, Jianbo Gao, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti:
Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud. IEEE Trans. Serv. Comput. 17(3): 1239-1251 (2024) - [j247]Miao He, Jianbing Ni, Meng Li, Alessandro Brighente, Mauro Conti:
Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach. IEEE Trans. Wirel. Commun. 23(1): 276-289 (2024) - [j246]Amandeep Verma, Rahul Saha, Gulshan Kumar, Mauro Conti, Joel J. P. C. Rodrigues:
VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments. Veh. Commun. 48: 100787 (2024) - [j245]Saiqin Xu, Alessandro Brighente, Mauro Conti, Baixiao Chen, Shuo Wang:
Evaporative Angle: A Generative Approach to Mitigate Jamming Attacks in DOA Estimation. IEEE Wirel. Commun. Lett. 13(10): 2922-2926 (2024) - [c312]Matteo Brosolo, Vinod Puthuvath, Asmitha KA, Rafidha Rehiman K. A., Mauro Conti:
SoK: Visualization-based Malware Detection Techniques. ARES 2024: 45:1-45:13 - [c311]Meng Li, Hanni Ding, Qing Wang, Zijian Zhang, Mauro Conti:
Threshold Signatures with Private Accountability via Secretly Designated Witnesses. ACISP (1) 2024: 389-407 - [c310]Alessandro Brighente, Mauro Conti, Sitora Salaeva, Federico Turrin:
One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection. ACNS Workshops (2) 2024: 55-74 - [c309]Edoardo Liberati, Alessandro Visintin, Riccardo Lazzeretti, Mauro Conti, A. Selcuk Uluagac:
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices. ACNS (1) 2024: 183-210 - [c308]Coen Schoof, Stefanos Koffas, Mauro Conti, Stjepan Picek:
EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody. AISec@CCS 2024: 137-148 - [c307]Alberto Castagnaro, Mauro Conti, Luca Pajola:
Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models. AISec@CCS 2024: 184-195 - [c306]Mauro Conti, Marin Duroyon, Gabriele Orazi, Gene Tsudik:
Acoustic Side-Channel Attacks on a Computer Mouse. DIMVA 2024: 44-63 - [c305]Emad Efatinasab, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, Mauro Conti:
FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. DIMVA 2024: 503-524 - [c304]Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti:
GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction. ESORICS (1) 2024: 374-393 - [c303]Mirco Beltrame, Mauro Conti, Pierpaolo Guglielmin, Francesco Marchiori, Gabriele Orazi:
RedactBuster: Entity Type Recognition from Redacted Documents. ESORICS (2) 2024: 451-470 - [c302]Alessandro Brighente, Mauro Conti, Denis Donadel, Federico Turrin:
Hyperloop: A Cybersecurity Perspective. EuroS&P Workshops 2024: 352-360 - [c301]Francesco Marchiori, Alessandro Brighente, Mauro Conti:
Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers? EuroS&P Workshops 2024: 367-372 - [c300]Filippo Giambartolomei, Marc Barcelo, Alessandro Brighente, Aitor Urbieta, Mauro Conti:
Penetration Testing of 5G Core Network Web Technologies. ICC 2024: 702-707 - [c299]Meng Li, Jianbo Gao, Zijian Zhang, Mauro Conti, Mamoun Alazab:
Secure, Available, Verifiable, and Efficient Range Query Processing on Outsourced Datasets. ICC 2024: 1376-1381 - [c298]Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. ICC 2024: 1939-1944 - [c297]Alessandro Brighente, Saiqin Xu, Simone Soderi, Mauro Conti:
Physical Layer Authentication for Distributed RIS (DRIS) Enabled VLC Systems. ICC 2024: 3340-3345 - [c296]Harsha Vasudev, Mohd Shariq, Sanjeev Kumar Dwivedi, Mauro Conti:
LightKey: Lightweight and Secure Key Agreement Protocol for Effective Communication in Internet of Vehicles. ICDCN 2024: 209-216 - [c295]Mauro Conti:
Covert & Side Stories: Threats Evolution in Traditional and Modern Technologies. ICISSP 2024: 7 - [c294]Pier Paolo Tricomi, Saurabh Kumar, Mauro Conti, V. S. Subrahmanian:
Climbing the Influence Tiers on TikTok: A Multimodal Study. ICWSM 2024: 1503-1516 - [c293]Felix Klement, Alessandro Brighente, Michele Polese, Mauro Conti, Stefan Katzenbeisser:
Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments. NetSoft 2024: 185-189 - [c292]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera, Mauro Conti:
Relation Extraction Techniques in Cyber Threat Intelligence. NLDB (1) 2024: 348-363 - [c291]Kavya Balasubramanian, Adithya Gowda Baragur, Denis Donadel, Dinuka Sahabandu, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, Radha Poovendran:
CANLP: NLP-Based Intrusion Detection System for CAN. SAC 2024: 212-214 - [c290]Jelle Vos, Mauro Conti, Zekeriya Erkin:
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model. SP 2024: 465-483 - [c289]K. M. Sameera, M. Abhinav, P. P. Amal, T. Babu Abhiram, Raj K. Abishek, Tomichen Amal, P. Anaina, P. Vinod, Rafidha Rehiman K. A., Mauro Conti:
DLShield: A Defense Approach Against Dirty Label Attacks in Heterogeneous Federated Learning. SPACE 2024: 129-148 - [c288]Qingying Hao, Nirav Diwan, Ying Yuan, Giovanni Apruzzese, Mauro Conti, Gang Wang:
It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors. USENIX Security Symposium 2024 - [c287]Marco Palazzo, Florine W. Dekker, Alessandro Brighente, Mauro Conti, Zekeriya Erkin:
Privacy-Preserving Data Aggregation with Public Verifiability Against Internal Adversaries. USENIX Security Symposium 2024 - [c286]Jelle Vos, Mauro Conti, Zekeriya Erkin:
Oraqle: A Depth-Aware Secure Computation Compiler. WAHC@CCS 2024: 43-50 - [c285]Daniele Mari, Saverio Cavasin, Simone Milani, Mauro Conti:
Effectiveness of learning-based image codecs on fingerprint storage. WIFS 2024: 1-6 - [c284]Giacomo Quadrio, Roberto Pompa, Enrico Bassetti, Ciro D'Elia, Gianluca Scacco, Mauro Conti:
"They Will Adapt": Improving Anomaly Detection on IoT Networks Through Continuous Learning. WiMob 2024: 1-6 - [c283]Giulio Rigoni, Nicola Scremin, Mauro Conti:
Towards a Self-Rescuing System for UAVs Under GNSS Attack. WiMob 2024: 339-346 - [c282]Christina Kreza, Stefanos Koffas, Behrad Tajalli, Mauro Conti, Stjepan Picek:
Backdoors on Manifold Learning. WiseML@WiSec 2024: 1-7 - [c281]Francesco Marchiori, Mauro Conti:
CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems. WiseML@WiSec 2024: 8-13 - [c280]Coen Schoof, Stefanos Koffas, Mauro Conti, Stjepan Picek:
Beyond PhantomSponges: Enhancing Sponge Attack on Object Detection Models. WiseML@WiSec 2024: 14-19 - [c279]Tommaso Bianchi, Alessandro Brighente, Mauro Conti:
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles. WISEC 2024: 174-184 - [c278]Pier Paolo Tricomi, Luca Pajola, Luca Pasa, Mauro Conti:
"All of Me": Mining Users' Attributes from their Public Spotify Playlists. WWW (Companion Volume) 2024: 963-966 - [c277]Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang:
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages. WWW 2024: 1712-1723 - [e17]Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14344, Springer 2024, ISBN 978-3-031-50593-5 [contents] - [e16]Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14345, Springer 2024, ISBN 978-3-031-51475-3 [contents] - [e15]Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14346, Springer 2024, ISBN 978-3-031-51478-4 [contents] - [e14]Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14347, Springer 2024, ISBN 978-3-031-51481-4 [contents] - [e13]Eleonora Losiouk, Alessandro Brighente, Mauro Conti, Yousra Aafer, Yanick Fratantonio:
The 27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024, Padua, Italy, 30 September 2024- 2 October 2024. ACM 2024, ISBN 979-8-4007-0959-3 [contents] - [i179]K. M. Sameera, Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Rafidha Rehiman K. A., Vinod P, Mauro Conti:
Privacy-Preserving in Blockchain-based Federated Learning Systems. CoRR abs/2401.03552 (2024) - [i178]Alessandro Lotto, Francesco Marchiori, Alessandro Brighente, Mauro Conti:
A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols. CoRR abs/2401.10736 (2024) - [i177]Pier Paolo Tricomi, Luca Pajola, Luca Pasa, Mauro Conti:
"All of Me": Mining Users' Attributes from their Public Spotify Playlists. CoRR abs/2401.14296 (2024) - [i176]Carlo Mazzocca, Abbas Acar, A. Selcuk Uluagac, Rebecca Montanari, Paolo Bellavista, Mauro Conti:
A Survey on Decentralized Identifiers and Verifiable Credentials. CoRR abs/2402.02455 (2024) - [i175]Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, A. Selcuk Uluagac:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. CoRR abs/2402.03114 (2024) - [i174]Filippo Giambartolomei, Marc Barceló Lladó, Alessandro Brighente, Aitor Urbieta, Mauro Conti:
Penetration Testing of 5G Core Network Web Technologies. CoRR abs/2403.01871 (2024) - [i173]Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti:
Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks. CoRR abs/2403.02983 (2024) - [i172]Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. CoRR abs/2403.03858 (2024) - [i171]Emad Efatinasab, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, Mauro Conti:
FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. CoRR abs/2403.17494 (2024) - [i170]Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang:
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages. CoRR abs/2404.02832 (2024) - [i169]Francesco Marchiori, Mauro Conti:
CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems. CoRR abs/2404.04648 (2024) - [i168]Denis Donadel, Francesco Marchiori, Luca Pajola, Mauro Conti:
Can LLMs Understand Computer Networks? Towards a Virtual System Administrator. CoRR abs/2404.12689 (2024) - [i167]Mirco Beltrame, Mauro Conti, Pierpaolo Guglielmin, Francesco Marchiori, Gabriele Orazi:
RedactBuster: Entity Type Recognition from Redacted Documents. CoRR abs/2404.12991 (2024) - [i166]Alberto Castagnaro, Mauro Conti, Luca Pajola:
Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models. CoRR abs/2404.14138 (2024) - [i165]