default search action
Dorjan Hitaj
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Hristofor Miho, Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi Vincenzo Mancini, Georgios Koubouris, Gianluca Godino, Mehmet Hakan, Concepcion Muñoz Diez:
OliVaR: Improving olive variety recognition using deep neural networks. Comput. Electron. Agric. 216: 108530 (2024) - [j5]Dorjan Hitaj, Giulio Pagnotta, Briland Hitaj, Fernando Pérez-Cruz, Luigi V. Mancini:
FedComm: Federated Learning as a Medium for Covert Communication. IEEE Trans. Dependable Secur. Comput. 21(4): 1695-1707 (2024) - [c7]Fabio De Gaspari, Dorjan Hitaj, Luigi V. Mancini:
Have You Poisoned My Data? Defending Neural Networks Against Data Poisoning. ESORICS (1) 2024: 85-104 - [i15]Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Sediola Ruko, Briland Hitaj, Luigi V. Mancini, Fernando Pérez-Cruz:
Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem. CoRR abs/2403.03593 (2024) - [i14]Fabio De Gaspari, Dorjan Hitaj, Luigi V. Mancini:
Have You Poisoned My Data? Defending Neural Networks against Data Poisoning. CoRR abs/2403.13523 (2024) - [i13]Sabrine Ennaji, Fabio De Gaspari, Dorjan Hitaj, Alicia K/Bidi, Luigi V. Mancini:
Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects. CoRR abs/2409.18736 (2024) - 2023
- [j4]Giulio Pagnotta, Fabio De Gaspari, Dorjan Hitaj, Mauro Andreolini, Michele Colajanni, Luigi V. Mancini:
DOLOS: A Novel Architecture for Moving Target Defense. IEEE Trans. Inf. Forensics Secur. 18: 5890-5905 (2023) - [i12]Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Lorenzo De Carli, Luigi V. Mancini:
Minerva: A File-Based Ransomware Detector. CoRR abs/2301.11050 (2023) - [i11]Giulio Pagnotta, Fabio De Gaspari, Dorjan Hitaj, Mauro Andreolini, Michele Colajanni, Luigi V. Mancini:
DOLOS: A Novel Architecture for Moving Target Defense. CoRR abs/2303.00387 (2023) - [i10]Hristofor Miho, Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini, Georgios Koubouris, Gianluca Godino, Mehmet Hakan, Concepcion Muñoz Diez:
OliVaR: Improving Olive Variety Recognition using Deep Neural Networks. CoRR abs/2303.00431 (2023) - 2022
- [j3]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques. Neural Comput. Appl. 34(14): 12077-12096 (2022) - [j2]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
Reliable detection of compressed and encrypted data. Neural Comput. Appl. 34(22): 20379-20393 (2022) - [c6]Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini:
PassFlow: Guessing Passwords with Generative Flows. DSN 2022: 251-262 - [c5]Dorjan Hitaj, Giulio Pagnotta, Briland Hitaj, Luigi V. Mancini, Fernando Pérez-Cruz:
MaleficNet: Hiding Malware into Deep Neural Networks Using Spread-Spectrum Channel Coding. ESORICS (3) 2022: 425-444 - [i9]Dorjan Hitaj, Giulio Pagnotta, Briland Hitaj, Fernando Pérez-Cruz, Luigi V. Mancini:
FedComm: Federated Learning as a Medium for Covert Communication. CoRR abs/2201.08786 (2022) - [i8]Giulio Pagnotta, Dorjan Hitaj, Briland Hitaj, Fernando Pérez-Cruz, Luigi V. Mancini:
TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding. CoRR abs/2202.06091 (2022) - 2021
- [j1]Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini:
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks. IEEE Intell. Syst. 36(5): 104-112 (2021) - [i7]Dorjan Hitaj, Giulio Pagnotta, Iacopo Masi, Luigi V. Mancini:
Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training. CoRR abs/2103.01914 (2021) - [i6]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
Reliable Detection of Compressed and Encrypted Data. CoRR abs/2103.17059 (2021) - [i5]Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini:
PassFlow: Guessing Passwords with Generative Flows. CoRR abs/2105.06165 (2021) - 2020
- [c4]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes. ACNS (2) 2020: 254-274 - [c3]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
EnCoD: Distinguishing Compressed and Encrypted File Fragments. NSS 2020: 42-62 - [i4]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
EnCoD: Distinguishing Compressed and Encrypted File Fragments. CoRR abs/2010.07754 (2020) - [i3]Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini:
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks. CoRR abs/2010.16204 (2020)
2010 – 2019
- 2019
- [c2]Dorjan Hitaj, Briland Hitaj, Luigi V. Mancini:
Evasion Attacks Against Watermarking Techniques found in MLaaS Systems. SDS 2019: 55-63 - [i2]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes. CoRR abs/1911.02423 (2019) - 2018
- [i1]Dorjan Hitaj, Luigi V. Mancini:
Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques. CoRR abs/1809.00615 (2018) - 2015
- [c1]Ilir Çapuni, Anisa Halimi, Dorjan Hitaj:
Towards Indestructible Molecular Robots. SOFSEM (Student Research Forum Papers / Posters) 2015: 112-119
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint