CONTI, MAURO
CONTI, MAURO
Dipartimento di Matematica "Tullio Levi-Civita" - DM
A Random Deep Feature Selection Approach to Mitigate Transferable Adversarial Attacks
2025 Nowroozi, Ehsan; Mohammadi, Mohammadreza; Rahdari, Ahmad; Taheri, Rahim; Conti, Mauro
Android malware defense through a hybrid multi-modal approach
2025 Asmitha, K. A.; Vinod, P.; Rafidha, R. R.; Raveendran, N.; Conti, M.
BDMFA: Forensic-enabling attestation technique for Internet of Medical Things
2025 El-Zawawy, M. A.; Vasudev, H.; Conti, M.
Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection
2025 Yuan, Y.; Apruzzese, G.; Conti, M.
CovertPower: A Covert Channel on Android Devices Through USB Power Line
2025 Spolaor, Riccardo; Xu, Yi; Moonsamy, Veelasha; Conti, Mauro; Cheng, Xiuzhen
DAWS: A Comprehensive Solution Against De-anonymization Attacks in Blockchains
2025 Kumar, Gulshan; Saha, Rahul; Conti, Mauro; Kim, Tai-hoon
Deep learning fusion for effective malware detection: leveraging visual features
2025 Johny, J. A.; Asmitha, K. A.; Vinod, P.; Radhamani, G.; Rehiman, K. A. R.; Conti, M.
Exploring the Landscape of Programming Language Identification With Machine Learning Approaches
2025 Verma, A.; Saha, R.; Kumar, G.; Brighente, A.; Conti, M.; Kim, T. H.
Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities
2025 Rossini, Roberto; Pizzi, Simeone; Doria, Samuele; Conti, Mauro; Losiouk, Eleonora
Real or virtual: a video conferencing background manipulation-detection system
2025 Nowroozi, Ehsan; Mekdad, Yassine; Conti, Mauro; Milani, Simone; Uluagac, Selcuk
Real or virtual: a video conferencing background manipulation-detection system
2025 Nowroozi, Ehsan; Mekdad, Yassine; Conti, Mauro; Milani, Simone; Uluagac, Selcuk
TAURITE: Stackelberg Equilibrium in Blockchained Energynet Through Electric Vehicles
2025 Kumar, G.; Saha, R.; Conti, M.; Rodrigues, J. J. P. C.
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages
2024 Yuan, Ying; Hao, Qingying; Apruzzese, Giovanni; Conti, Mauro; Wang, Gang
A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols
2024 Lotto, Alessandro; Marchiori, Francesco; Brighente, Alessandro; Conti, Mauro
AALMOND: Decentralized Adaptive Access Control of Multi-Party Data Sharing in Industrial Networks
2024 Saha, Rahul; Kumar, Gulshan; Conti, Mauro; Devgun, Tannishtha; Rodrigues, Joel J. P C.
Acoustic Side-Channel Attacks on a Computer Mouse
2024 Conti, Mauro; Duroyon, Marin; Orazi, Gabriele; Tsudik, Gene
Anonymous Federated Learning via Named-Data Networking
2024 Agiollo, A.; Bardhi, E.; Conti, M.; Dal Fabbro, N.; Lazzeretti, R.
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices
2024 Cayir, Derin; Acar, Abbas; Lazzeretti, Riccardo; Angelini, Marco; Conti, Mauro; Uluagac, Selcuk
Backdoors on Manifold Learning
2024 Kreza, Christina; Koffas, Stefanos; Tajalli, Behrad; Conti, Mauro; Picek, Stjepan
Beyond PhantomSponges: Enhancing Sponge Attack on Object Detection Models
2024 Schoof, Coen; Koffas, Stefanos; Conti, Mauro; Picek, Stjepan