CONTI, MAURO

CONTI, MAURO  

Dipartimento di Matematica "Tullio Levi-Civita" - DM  

Mostra records
Risultati 1 - 20 di 592 (tempo di esecuzione: 0.041 secondi).
Titolo Data di pubblicazione Autori Rivista Serie Titolo libro
A Random Deep Feature Selection Approach to Mitigate Transferable Adversarial Attacks 2025 Conti, Mauro + IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT - -
Android malware defense through a hybrid multi-modal approach 2025 Conti M. + JOURNAL OF NETWORK AND COMPUTER APPLICATIONS - -
BDMFA: Forensic-enabling attestation technique for Internet of Medical Things 2025 Conti M. + INTERNET OF THINGS - -
Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection 2025 Yuan Y.Conti M. + COMPUTERS & SECURITY - -
CovertPower: A Covert Channel on Android Devices Through USB Power Line 2025 Conti, Mauro + IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING - -
DAWS: A Comprehensive Solution Against De-anonymization Attacks in Blockchains 2025 Saha, RahulConti, Mauro + IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT - -
Deep learning fusion for effective malware detection: leveraging visual features 2025 Conti M. + CLUSTER COMPUTING - -
Exploring the Landscape of Programming Language Identification With Machine Learning Approaches 2025 Saha R.Brighente A.Conti M. + IEEE ACCESS - -
Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities 2025 Simeone PizziSamuele DoriaMauro ContiEleonora Losiouk + - - Proceedings of the 22nd International Conference, DIMVA 2025
Real or virtual: a video conferencing background manipulation-detection system 2025 Nowroozi, EhsanConti, MauroMilani, Simone + MULTIMEDIA TOOLS AND APPLICATIONS - -
Real or virtual: a video conferencing background manipulation-detection system 2025 Nowroozi, EhsanConti, MauroMilani, Simone + MULTIMEDIA TOOLS AND APPLICATIONS - -
TAURITE: Stackelberg Equilibrium in Blockchained Energynet Through Electric Vehicles 2025 Saha R.Conti M. + IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS - -
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages 2024 Yuan, YingConti, Mauro + - - WWW '24: Proceedings of the ACM on Web Conference 2024
A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols 2024 Lotto, AlessandroMarchiori, FrancescoBrighente, AlessandroConti, Mauro IEEE COMMUNICATIONS SURVEYS AND TUTORIALS - -
AALMOND: Decentralized Adaptive Access Control of Multi-Party Data Sharing in Industrial Networks 2024 Saha, RahulKumar, GulshanConti, Mauro + IEEE INTERNET OF THINGS JOURNAL - -
Acoustic Side-Channel Attacks on a Computer Mouse 2024 Mauro ContiGabriele Orazi + - - Lecture Notes in Computer Science ((LNCS,volume 14828))
Anonymous Federated Learning via Named-Data Networking 2024 Conti M. + FUTURE GENERATION COMPUTER SYSTEMS - -
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices 2024 Lazzeretti, RiccardoConti, Mauro + IEEE SECURITY & PRIVACY - -
Backdoors on Manifold Learning 2024 Conti, Mauro + - - Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning (WiseML '24)
Beyond PhantomSponges: Enhancing Sponge Attack on Object Detection Models 2024 Conti, Mauro + - - Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning (WiseML '24)