Davide Maiorca
Davide Maiorca
Assistant Professor of Computer Engineering at University of Cagliari, Italy
Verified email at unica.it
Title
Cited by
Cited by
Year
Evasion attacks against machine learning at test time
B Biggio, I Corona, D Maiorca, B Nelson, N Šrndić, P Laskov, G Giacinto, ...
Joint European conference on machine learning and knowledge discovery in …, 2013
6132013
Yes, machine learning can be more secure! a case study on android malware detection
A Demontis, M Melis, B Biggio, D Maiorca, D Arp, K Rieck, I Corona, ...
IEEE Transactions on Dependable and Secure Computing, 2017
1142017
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
A Demontis, M Melis, B Biggio, D Maiorca, D Arp, K Rieck, I Corona, ...
IEEE Transactions on Dependable and Secure Computing, 2017
1142017
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection
D Maiorca, I Corona, G Giacinto
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
1102013
A pattern recognition system for malicious pdf files detection
D Maiorca, G Giacinto, I Corona
International workshop on machine learning and data mining in pattern …, 2012
1032012
Adversarial malware binaries: Evading deep learning for malware detection in executables
B Kolosnjaji, A Demontis, B Biggio, D Maiorca, G Giacinto, C Eckert, ...
2018 26th European Signal Processing Conference (EUSIPCO), 533-537, 2018
902018
Stealth attacks: An extended insight into the obfuscation effects on android malware
D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto
Computers & Security 51, 16-31, 2015
902015
Security evaluation of support vector machines in adversarial environments
B Biggio, I Corona, B Nelson, BIP Rubinstein, D Maiorca, G Fumera, ...
Support Vector Machines Applications, 105-153, 2014
762014
R-PackDroid: API package-based characterization and detection of mobile ransomware
D Maiorca, F Mercaldo, G Giacinto, CA Visaggio, F Martinelli
Proceedings of the symposium on applied computing, 1718-1723, 2017
522017
Lux0r: Detection of malicious pdf-embedded javascript code through discriminant analysis of api references
I Corona, D Maiorca, D Ariu, G Giacinto
Proceedings of the 2014 workshop on artificial intelligent and security …, 2014
502014
On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms?
T Hupperich, D Maiorca, M Kührer, T Holz, G Giacinto
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
452015
Clustering Android Malware Families by Http Traffic
M Aresu, D Ariu, M Ahmadi, D Maiorca, G Giacinto
332015
A structural and content-based approach for a precise and robust detection of malicious pdf files
D Maiorca, D Ariu, I Corona, G Giacinto
Proceedings of the 1st International Conference on Information Systems …, 2015
302015
Towards adversarial malware detection: lessons learned from pdf-based attacks
D Maiorca, B Biggio, G Giacinto
ACM Computing Surveys (CSUR) 52 (4), 1-36, 2019
192019
Explaining black-box android malware detection
M Melis, D Maiorca, B Biggio, G Giacinto, F Roli
2018 26th European Signal Processing Conference (EUSIPCO), 524-528, 2018
162018
Evaluating analysis tools for android apps: Status quo and robustness against obfuscation
J Hoffmann, T Rytilahti, D Maiorca, M Winandy, G Giacinto, T Holz
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
162016
On the effectiveness of system API-related information for Android ransomware detection
M Scalas, D Maiorca, F Mercaldo, CA Visaggio, F Martinelli, G Giacinto
Computers & Security 86, 168-182, 2019
112019
Adversarial detection of flash malware: Limitations and open issues
D Maiorca, A Demontis, B Biggio, F Roli, G Giacinto
Computers & Security, 101901, 2020
72020
Digital investigation of PDF files: Unveiling traces of embedded malware
D Maiorca, B Biggio
IEEE Security & Privacy 17 (1), 63-71, 2019
72019
Igino Corona, Marco Aresu, Giorgio Giacinto, Stealth attacks
D Maiorca, D Ariu
Computers and Security 51, 16-31, 2015
72015
The system can't perform the operation now. Try again later.
Articles 1–20