Segui
Davide Maiorca
Davide Maiorca
Assistant Professor of Computer Engineering at University of Cagliari, Italy
Email verificata su unica.it
Titolo
Citata da
Citata da
Anno
Evasion attacks against machine learning at test time
B Biggio, I Corona, D Maiorca, B Nelson, N Šrndić, P Laskov, G Giacinto, ...
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2013
18052013
Adversarial malware binaries: Evading deep learning for malware detection in executables
B Kolosnjaji, A Demontis, B Biggio, D Maiorca, G Giacinto, C Eckert, ...
2018 26th European signal processing conference (EUSIPCO), 533-537, 2018
4332018
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
A Demontis, M Melis, B Biggio, D Maiorca, D Arp, K Rieck, I Corona, ...
IEEE Transactions on Dependable and Secure Computing, 2017
3562017
Stealth attacks: An extended insight into the obfuscation effects on android malware
D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto
Computers & Security 51, 16-31, 2015
2232015
A pattern recognition system for malicious pdf files detection
D Maiorca, G Giacinto, I Corona
International workshop on machine learning and data mining in pattern …, 2012
1602012
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection
D Maiorca, I Corona, G Giacinto
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
1592013
R-PackDroid: API package-based characterization and detection of mobile ransomware
D Maiorca, F Mercaldo, G Giacinto, CA Visaggio, F Martinelli
Proceedings of the symposium on applied computing, 1718-1723, 2017
1432017
Security evaluation of support vector machines in adversarial environments
B Biggio, I Corona, B Nelson, BIP Rubinstein, D Maiorca, G Fumera, ...
Support vector machines applications, 105-153, 2014
1322014
Towards adversarial malware detection: Lessons learned from PDF-based attacks
D Maiorca, B Biggio, G Giacinto
ACM Computing Surveys (CSUR) 52 (4), 1-36, 2019
1092019
On the effectiveness of system API-related information for Android ransomware detection
M Scalas, D Maiorca, F Mercaldo, CA Visaggio, F Martinelli, G Giacinto
Computers & Security 86, 168-182, 2019
1052019
Lux0r: Detection of malicious pdf-embedded javascript code through discriminant analysis of api references
I Corona, D Maiorca, D Ariu, G Giacinto
Proceedings of the 2014 workshop on artificial intelligent and security …, 2014
982014
On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms?
T Hupperich, D Maiorca, M Kührer, T Holz, G Giacinto
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
782015
Explaining black-box android malware detection
M Melis, D Maiorca, B Biggio, G Giacinto, F Roli
2018 26th european signal processing conference (EUSIPCO), 524-528, 2018
772018
A structural and content-based approach for a precise and robust detection of malicious pdf files
D Maiorca, D Ariu, I Corona, G Giacinto
Proceedings of the 1st International Conference on Information Systems …, 2015
722015
Clustering Android Malware Families by Http Traffic
M Aresu, D Ariu, M Ahmadi, D Maiorca, G Giacinto
572015
Digital investigation of pdf files: Unveiling traces of embedded malware
D Maiorca, B Biggio
IEEE Security & Privacy 17 (1), 63-71, 2019
522019
PowerDrive: accurate de-obfuscation and analysis of PowerShell malware
D Ugarte, D Maiorca, F Cara, G Giacinto
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
382019
Do gradient-based explanations tell anything about adversarial robustness to android malware?
M Melis, M Scalas, A Demontis, D Maiorca, B Biggio, G Giacinto, F Roli
International journal of machine learning and cybernetics, 1-16, 2022
352022
Adversarial detection of flash malware: Limitations and open issues
D Maiorca, A Demontis, B Biggio, F Roli, G Giacinto
Computers & Security 96, 101901, 2020
342020
Evaluating analysis tools for android apps: Status quo and robustness against obfuscation
J Hoffmann, T Rytilahti, D Maiorca, M Winandy, G Giacinto, T Holz
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
332016
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20