


Остановите войну!
for scientists:


default search action
Mauro Conti
Person information

- affiliation: University of Padua, Italy
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j222]Pier Paolo Tricomi
, Federica Nenna
, Luca Pajola
, Mauro Conti
, Luciano Gamberi:
You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality. IEEE Access 11: 9859-9875 (2023) - [j221]Hossein Ahmadvand, Chhagan Lal, Hadi Hemmati, Mehdi Sookhak, Mauro Conti:
Privacy-Preserving and Security in SDN-Based IoT: A Survey. IEEE Access 11: 44772-44786 (2023) - [j220]Alireza Dehlaghi-Ghadim, Ali Balador, Mahshid Helali Moghadam, Hans Hansson, Mauro Conti:
ICSSIM - A framework for building industrial control systems security testbeds. Comput. Ind. 148: 103906 (2023) - [j219]Yassine Mekdad
, Ahmet Aris
, Leonardo Babun
, Abdeslam El Fergougui
, Mauro Conti
, Riccardo Lazzeretti
, A. Selcuk Uluagac
:
A survey on security and privacy issues of UAVs. Comput. Networks 224: 109626 (2023) - [j218]Anand Kumar, Karan Singh, Mohd Shariq, Chhagan Lal, Mauro Conti, Ruhul Amin, Shehzad Ashraf Chaudhry:
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems. Comput. Commun. 205: 147-157 (2023) - [j217]Ankur O. Bang
, Udai Pratap Rao
, Pallavi Kaliyar
, Mauro Conti
:
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey. ACM Comput. Surv. 55(2): 44:1-44:36 (2023) - [j216]Reza Mohammadi, Chhagan Lal, Mauro Conti:
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN. Int. J. Inf. Sec. 22(2): 367-379 (2023) - [j215]Mohamad Mansouri, Melek Önen, Wafa Ben Jaballah, Mauro Conti:
SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning. Proc. Priv. Enhancing Technol. 2023(1): 140-157 (2023) - [j214]Meng Li
, Yifei Chen, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
, Donghui Hu
:
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain. IEEE Trans. Dependable Secur. Comput. 20(1): 225-241 (2023) - [j213]Simone Soderi, Riccardo Colelli, Federico Turrin, Federica Pascucci, Mauro Conti:
SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming. IEEE Trans. Dependable Secur. Comput. 20(3): 2274-2288 (2023) - [j212]Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Reji Thomas
, Tannishtha Devgun, Joel J. P. C. Rodrigues
:
Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit. IEEE Trans. Serv. Comput. 16(2): 900-912 (2023) - [j211]Saiqin Xu
, Alessandro Brighente
, Baixiao Chen
, Mauro Conti
, Xiancheng Cheng, Dongchen Zhu:
Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets With Sparse Prior for Line-of-Sight Scenarios. IEEE Trans. Veh. Technol. 72(4): 4683-4696 (2023) - [j210]Meng Li
, Jianbo Gao
, Zijian Zhang
, Liehuang Zhu
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion. IEEE Trans. Veh. Technol. 72(4): 5139-5151 (2023) - [j209]Subir Halder
, Amrita Ghosal
, Mauro Conti
:
Dynamic Super Round-Based Distributed Task Scheduling for UAV Networks. IEEE Trans. Wirel. Commun. 22(2): 1014-1028 (2023) - [j208]Sanaz Soltani
, Mohammad Shojafar
, Alessandro Brighente
, Mauro Conti
, Rahim Tafazolli
:
Poisoning Bearer Context Migration in O-RAN 5G Network. IEEE Wirel. Commun. Lett. 12(3): 401-405 (2023) - [c247]Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti:
Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2. CODASPY 2023: 27-38 - [c246]Pier Paolo Tricomi
, Marco Chilese
, Mauro Conti
, Ahmad-Reza Sadeghi
:
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms. WebSci 2023: 346-356 - [c245]Elisa Sartori
, Luca Pajola
, Giovanni Da San Martino
, Mauro Conti
:
The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum. WWW 2023: 4060-4064 - [i127]Alessandro Brighente, Mauro Conti, Denis Donadel, Radha Poovendran, Federico Turrin, Jianying Zhou:
Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs. CoRR abs/2301.04587 (2023) - [i126]Serena Tardelli, Leonardo Nizzoli, Maurizio Tesconi, Mauro Conti, Preslav Nakov, Giovanni Da San Martino, Stefano Cresci:
Temporal Dynamics of Coordinated Online Behavior: Stability, Archetypes, and Influence. CoRR abs/2301.06774 (2023) - [i125]Pier Paolo Tricomi, Marco Chilese, Mauro Conti, Ahmad-Reza Sadeghi:
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms. CoRR abs/2301.06815 (2023) - [i124]Marco Alecci, Luca Attanasio, Alessandro Brighente, Mauro Conti, Eleonora Losiouk, Hideki Ochiai, Federico Turrin:
Beware of Pickpockets: A Practical Attack against Blocking Cards. CoRR abs/2302.08992 (2023) - [i123]Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde:
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports. CoRR abs/2303.09999 (2023) - [i122]Ehsan Nowroozi, Seyedsadra Seyedshoari, Yassine Mekdad, Erkay Savas, Mauro Conti:
Cryptocurrency wallets: assessment and security. CoRR abs/2303.12940 (2023) - [i121]Marco Venturini, Francesco Freda, Emanuele Miotto, Alberto Giaretta, Mauro Conti:
Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations. CoRR abs/2303.17351 (2023) - [i120]Sara Bardi, Mauro Conti, Luca Pajola, Pier Paolo Tricomi:
Social Honeypot for Humans: Luring People through Self-managed Instagram Pages. CoRR abs/2303.17946 (2023) - [i119]Ehsan Nowroozi, Yoosef Habibi, Mauro Conti:
Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents. CoRR abs/2304.02982 (2023) - [i118]Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross J. Anderson, Mauro Conti:
Boosting Big Brother: Attacking Search Engines with Encodings. CoRR abs/2304.14031 (2023) - [i117]Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek:
Turning Privacy-preserving Mechanisms against Federated Learning. CoRR abs/2305.05355 (2023) - 2022
- [j207]Fran Casino
, Thomas K. Dasaklis, Georgios P. Spathoulas
, Marios Anagnostopoulos
, Amrita Ghosal
, István Böröcz, Agusti Solanas
, Mauro Conti
, Constantinos Patsakis
:
Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews. IEEE Access 10: 25464-25493 (2022) - [j206]PLS Jayalaxmi
, Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tai-Hoon Kim
:
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey. IEEE Access 10: 121173-121192 (2022) - [j205]Reza Mohammadi, Chhagan Lal
, Mauro Conti
, Lokesh Sharma:
Software defined network-based HTTP flooding attack defender. Comput. Electr. Eng. 101: 108019 (2022) - [j204]PLS Jayalaxmi, Gulshan Kumar
, Rahul Saha
, Mauro Conti, Tai-Hoon Kim, Reji Thomas:
DeBot: A deep learning-based model for bot detection in industrial internet-of-things. Comput. Electr. Eng. 102: 108214 (2022) - [j203]Mauro Conti, Jenil Gathani, Pier Paolo Tricomi:
Virtual Influencers in Online Social Media. IEEE Commun. Mag. 60(8): 86-91 (2022) - [j202]Mohamed A. El-Zawawy
, Alessandro Brighente
, Mauro Conti
:
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones. Comput. Networks 206: 108804 (2022) - [j201]Mauro Conti, Eleonora Losiouk
, Radha Poovendran, Riccardo Spolaor:
Side-channel attacks on mobile and IoT devices for Cyber-Physical systems. Comput. Networks 207: 108858 (2022) - [j200]Jamshid Pirayesh, Alberto Giaretta, Mauro Conti
, Parviz Keshavarzi:
A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Comput. Networks 216: 109077 (2022) - [j199]Mohd Shariq, Karan Singh, Chhagan Lal
, Mauro Conti, Tayyab Ali Khan:
ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags. Comput. Networks 217: 109360 (2022) - [j198]Amrita Ghosal
, Subir Halder, Mauro Conti:
Secure over-the-air software update for connected vehicles. Comput. Networks 218: 109394 (2022) - [j197]Federico Tavella
, Alberto Giaretta
, Mauro Conti
, Sasitharan Balasubramaniam
:
A machine learning-based approach to detect threats in bio-cyber DNA storage systems. Comput. Commun. 187: 59-70 (2022) - [j196]Vasilios Koutsokostas, Nikolaos Lykousas
, Theodoros Apostolopoulos, Gabriele Orazi, Amrita Ghosal, Fran Casino, Mauro Conti, Constantinos Patsakis:
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents. Comput. Secur. 114: 102582 (2022) - [j195]Mauro Conti, Shubham Khandhar, Vinod P.:
A few-shot malware classification approach for unknown family recognition using malware feature visualization. Comput. Secur. 122: 102887 (2022) - [j194]Ankur O. Bang
, Udai Pratap Rao
, Andrea Visconti, Alessandro Brighente, Mauro Conti:
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions. Comput. Secur. 123: 102914 (2022) - [j193]Mohamed A. El-Zawawy
, Parvez Faruki, Mauro Conti:
Formal model for inter-component communication and its security in android. Computing 104(8): 1839-1865 (2022) - [j192]Alakesh Kalita
, Alessandro Brighente
, Manas Khatua
, Mauro Conti
:
Effect of DIS Attack on 6TiSCH Network Formation. IEEE Commun. Lett. 26(5): 1190-1193 (2022) - [j191]Milad Taleby Ahvanooey
, Mark Xuefang Zhu
, Qianmu Li
, Wojciech Mazurczyk
, Kim-Kwang Raymond Choo
, Brij Bhooshan Gupta, Mauro Conti
:
Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey. IEEE Internet Things J. 9(10): 7639-7663 (2022) - [j190]Rekha Goyat
, Gulshan Kumar
, Mamoun Alazab
, Mauro Conti
, Mritunjay Kumar Rai
, Reji Thomas
, Rahul Saha
, Tai-Hoon Kim
:
Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things. IEEE Internet Things J. 9(16): 14203-14215 (2022) - [j189]Mauro Conti, P. Vinod, Alessio Vitella
:
Obfuscation detection in Android applications using deep learning. J. Inf. Secur. Appl. 70: 103311 (2022) - [j188]Milad Taleby Ahvanooey
, Mark Xuefang Zhu, Wojciech Mazurczyk, Qianmu Li, Max Kilger, Kim-Kwang Raymond Choo, Mauro Conti
:
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks. J. Inf. Secur. Appl. 71: 103368 (2022) - [j187]Milad Taleby Ahvanooey
, Mark Xuefang Zhu
, Wojciech Mazurczyk
, Kim-Kwang Raymond Choo
, Mauro Conti
, Jing Zhang
:
Misinformation Detection on Social Media: Challenges and the Road Ahead. IT Prof. 24(1): 34-40 (2022) - [j186]Fabio Aiolli, Mauro Conti, Stjepan Picek, Mirko Polato:
On the feasibility of crawling-based attacks against recommender systems. J. Comput. Secur. 30(4): 599-621 (2022) - [j185]Mauro Conti, Gulshan Kumar
, Pranav Nerurkar, Rahul Saha
, Luigi Vigneri
:
A survey on security challenges and solutions in the IOTA. J. Netw. Comput. Appl. 203: 103383 (2022) - [j184]Ashish Kumar, Rahul Saha
, Mauro Conti, Gulshan Kumar
, William J. Buchanan, Tai-Hoon Kim:
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. J. Netw. Comput. Appl. 204: 103414 (2022) - [j183]Arshdeep Singh, Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Mamoun Alazab, Reji Thomas
:
A survey and taxonomy of consensus protocols for blockchains. J. Syst. Archit. 127: 102503 (2022) - [j182]Subir Halder
, Mauro Conti
:
CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem. IEEE Trans. Cloud Comput. 10(4): 2437-2450 (2022) - [j181]Marco Casagrande, Eleonora Losiouk, Mauro Conti, Mathias Payer, Daniele Antonioli:
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 330-366 (2022) - [j180]Marco Casagrande, Eleonora Losiouk, Mauro Conti, Mathias Payer, Daniele Antonioli:
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 490-526 (2022) - [j179]Meng Li
, Yifei Chen
, Shuli Zheng, Donghui Hu
, Chhagan Lal
, Mauro Conti
:
Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks. IEEE Trans. Dependable Secur. Comput. 19(2): 1133-1148 (2022) - [j178]Xuhang Ying
, Giuseppe Bernieri, Mauro Conti
, Linda Bushnell
, Radha Poovendran
:
Covert Channel-Based Transmitter Authentication in Controller Area Networks. IEEE Trans. Dependable Secur. Comput. 19(4): 2665-2679 (2022) - [j177]Meng Li
, Yifei Chen
, Neeraj Kumar
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks. IEEE Trans. Green Commun. Netw. 6(3): 1267-1275 (2022) - [j176]Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tannishtha Devgun, Tai-Hoon Kim
, Mamoun Alazab
, Reji Thomas
:
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 18(5): 3452-3461 (2022) - [j175]Ehsan Nowroozi
, Yassine Mekdad
, Mohammad Hajian Berenjestanaki, Mauro Conti
, Abdeslam El Fergougui:
Demystifying the Transferability of Adversarial Attacks in Computer Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 3387-3400 (2022) - [j174]Giovanni Apruzzese
, Luca Pajola
, Mauro Conti
:
The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems. IEEE Trans. Netw. Serv. Manag. 19(4): 5152-5169 (2022) - [j173]Meng Li
, Liehuang Zhu
, Zijian Zhang
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack. IEEE/ACM Trans. Netw. 30(5): 2060-2073 (2022) - [j172]Ding Ding
, Kyuho Jeong, Shuning Xing
, Mauro Conti
, Renato Figueiredo
, Fangai Liu
:
SEnD: A Social Network Friendship Enhanced Decentralized System to Circumvent Censorships. IEEE Trans. Serv. Comput. 15(1): 346-360 (2022) - [c244]Emilie Bout, Alessandro Brighente, Mauro Conti, Valeria Loscrì:
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks. ARES 2022: 21:1-21:10 - [c243]Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Ahmed Taffal:
Sim2Testbed Transfer: NDN Performance Evaluation. ARES 2022: 63:1-63:9 - [c242]Alessandro Brighente, Mauro Conti, Savio Sciancalepore:
Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing. ARES 2022: 134:1-134:11 - [c241]Alessandro Visintin, Flavio Toffalini, Eleonora Losiouk, Mauro Conti, Jianying Zhou:
HolA: Holistic and Autonomous Attestation for IoT Networks. ACNS Workshops 2022: 277-296 - [c240]Giovanni Apruzzese
, Mauro Conti
, Ying Yuan
:
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. ACSAC 2022: 171-185 - [c239]Stefanos Koffas, Stjepan Picek, Mauro Conti:
Dynamic Backdoors with Global Average Pooling. AICAS 2022: 320-323 - [c238]Arshdeep Singh, Rahul Saha
, Mauro Conti, Gulshan Kumar:
PoSC: Combined Score for Consensus in Intemet-of-Things Applications. BCCA 2022: 173-180 - [c237]Ankit Gangwal
, Rahul Valluri, Mauro Conti
:
Analyzing Price Deviations in DeFi Oracles. CANS 2022: 329-338 - [c236]Mauro Conti, Jiaxin Li, Stjepan Picek, Jing Xu
:
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks. AISec@CCS 2022: 1-12 - [c235]Alessandro Brighente, Mauro Conti, Harsha Vasudev:
MeLSeC: A Method for Lightweight and Secure Communication in Internet of Vehicles. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-8 - [c234]Adriaan de Vos
, Alessandro Brighente
, Mauro Conti
:
Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 67-80 - [c233]Mauro Conti
, Denis Donadel
, Radha Poovendran
, Federico Turrin
:
EVExchange: A Relay Attack on Electric Vehicle Charging System. ESORICS (1) 2022: 488-508 - [c232]Matteo Cardaioli, Mauro Conti, Arpita Ravindranath:
For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection. ESORICS (3) 2022: 595-613 - [c231]Kiran S. Balagani, Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Gene Tsudik:
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads. ESORICS (1) 2022: 633-652 - [c230]Trupil Limbasiya, Amrita Ghosal, Mauro Conti:
AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks. ICDCN 2022: 208-216 - [c229]Valerio Bellandi, Paolo Ceravolo, Mauro Conti, Maryam Ehsanpour:
Contactless Authentication for Wearable Devices Using RFID. ICDH 2022: 234-239 - [c228]Meng Li, Mingwei Zhang, Jianbo Gao, Chhagan Lal, Mauro Conti, Mamoun Alazab:
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud. ICICS 2022: 261-280 - [c227]Irene Amerini, Mauro Conti, Pietro Giacomazzi, Luca Pajola
:
PRaNA: PRNU-based Technique to Tell Real and Deepfake Videos Apart. IJCNN 2022: 1-7 - [c226]Matteo Cardaioli, Alessio Miolla, Mauro Conti, Giuseppe Sartori, Merylin Monaro, Cristina Scarpazza
, Nicolò Navarin
:
Face the Truth: Interpretable Emotion Genuineness Detection. IJCNN 2022: 1-8 - [c225]Mauro Conti, Francesco Trolese, Federico Turrin
:
ICSpot: A High-Interaction Honeypot for Industrial Control Systems. ISNCC 2022: 1-4 - [c224]Alessandro Brighente, Mauro Conti, Gulshan Kumar, Reza Ghanbari, Rahul Saha
:
Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering. M&N 2022: 1-6 - [c223]Jinwoo Kim, Eduard Marin, Mauro Conti, Seungwon Shin:
EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation. NDSS 2022 - [c222]Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis, Jun Xu:
Building Embedded Systems Like It's 1996. NDSS 2022 - [c221]Matteo Cardaioli, Mauro Conti, Pier Paolo Tricomi, Gene Tsudik:
Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection. PerCom 2022: 197-206 - [c220]Alessandro Brighente, Martina Camaioni, Mauro Conti, Emilio Olivastri
:
Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses. PerCom Workshops 2022: 279-284 - [c219]Mauro Conti, Eleonora Losiouk, Alessandro Visintin:
What you see is not what you get: a man-in-the-middle attack applied to video channels. SAC 2022: 1723-1726 - [c218]Simone Soderi
, Alessandro Brighente, Federico Turrin, Mauro Conti:
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks. SECON 2022: 370-378 - [c217]Alessandro Brighente, Mauro Conti, Harsha Vasudev:
SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles. SoftCOM 2022: 1-6 - [c216]Pavan Srihari Darbha, Mauro Conti, Eleonora Losiouk
, Rajib Ranjan Maiti:
Face Recognition Systems: Are you sure they only consider your face? SP Workshops 2022: 258-264 - [c215]Meng Li, Jianbo Gao, Zijian Zhang, Chaoping Fu, Chhagan Lal, Mauro Conti:
Graph Encryption for Shortest Path Queries with k Unsorted Nodes. TrustCom 2022: 89-96 - [c214]Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci:
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand. USENIX Security Symposium 2022: 1687-1704 - [c213]Kristina Hristakieva, Stefano Cresci, Giovanni Da San Martino, Mauro Conti, Preslav Nakov:
The Spread of Propaganda by Coordinated Communities on Social Media. WebSci 2022: 191-201 - [c212]Stefanos Koffas, Jing Xu
, Mauro Conti, Stjepan Picek:
Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers. WiseML@WiSec 2022: 57-62 - [e12]Weizhi Meng
, Mauro Conti
:
Cyberspace Safety and Security - 13th International Symposium, CSS 2021, Virtual Event, November 9-11, 2021, Proceedings. Lecture Notes in Computer Science 13172, Springer 2022, ISBN 978-3-030-94028-7 [contents] - [d5]Ehsan Nowroozi
, Abhishek, Mohammadreza Mohammadi
, Mauro Conti
:
Pristine and Malicious URLs. IEEE DataPort, 2022 - [d4]Ehsan Nowroozi
, Mohammadreza Mohammadi, Mauro Conti
, Pargol Golmohammadi, Yassine Mekdad
, Arif Selcuk Uluagac
:
Defeating Adversarial Attacks Againt Adversarial attacks in Network Security. Zenodo, 2022 - [d3]Ehsan Nowroozi
, Seyedsadra Seyedshoari, Mauro Conti
:
SPRITZ-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents. IEEE DataPort, 2022 - [d2]Riccardo Spolaor
, Hao Liu, Federico Turrin
, Mauro Conti
, Xiuzhen Cheng:
Dataset for the paper: Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel. Zenodo, 2022 - [i116]Mauro Conti, Luca Pajola, Pier Paolo Tricomi:
Captcha Attack: Turning Captchas Against Humanity. CoRR abs/2201.04014 (2022) - [i115]Ehsan Nowroozi, Mauro Conti, Yassine Mekdad:
Detecting High-Quality GAN-Generated Face Images using Neural Networks. CoRR abs/2203.01716 (2022) - [i114]Stefanos Koffas, Stjepan Picek, Mauro Conti:
Dynamic Backdoors with Global Average Pooling. CoRR abs/2203.02079 (2022) - [i113]Giovanni Apruzzese, Luca Pajola, Mauro Conti:
The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems. CoRR abs/2203.04686 (2022) - [i112]Mauro Conti, Denis Donadel, Radha Poovendran, Federico Turrin:
EVExchange: A Relay Attack on Electric Vehicle Charging System. CoRR abs/2203.05266 (2022) - [i111]Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis, Jun Xu:
Building Embedded Systems Like It's 1996. CoRR abs/2203.06834 (2022) - [i110]Alessandro Brighente, Mauro Conti, Sathish A. P. Kumar:
Extorsionware: Exploiting Smart Contract Vulnerabilities for Fun and Profit. CoRR abs/2203.09843 (2022) - [i109]