Evasion attacks against machine learning at test time B Biggio, I Corona, D Maiorca, B Nelson, N Šrndić, P Laskov, G Giacinto, ... Joint European conference on machine learning and knowledge discovery in …, 2013 | 1047 | 2013 |
Detecting malicious flux service networks through passive analysis of recursive DNS traces R Perdisci, I Corona, D Dagon, W Lee 2009 Annual Computer Security Applications Conference, 311-320, 2009 | 237 | 2009 |
Yes, machine learning can be more secure! a case study on android malware detection A Demontis, M Melis, B Biggio, D Maiorca, D Arp, K Rieck, I Corona, ... IEEE Transactions on Dependable and Secure Computing 16 (4), 711-724, 2017 | 203 | 2017 |
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues I Corona, G Giacinto, F Roli Information Sciences 239, 201-225, 2013 | 190 | 2013 |
Stealth attacks: An extended insight into the obfuscation effects on android malware D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto Computers & Security 51, 16-31, 2015 | 154 | 2015 |
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection D Maiorca, I Corona, G Giacinto Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 139 | 2013 |
Early detection of malicious flux networks via large-scale passive DNS traffic analysis R Perdisci, I Corona, G Giacinto IEEE Transactions on Dependable and Secure Computing 9 (5), 714-726, 2012 | 139 | 2012 |
A pattern recognition system for malicious pdf files detection D Maiorca, G Giacinto, I Corona International workshop on machine learning and data mining in pattern …, 2012 | 127 | 2012 |
Poisoning behavioral malware clustering B Biggio, K Rieck, D Ariu, C Wressnegger, I Corona, G Giacinto, F Roli Proceedings of the 2014 workshop on artificial intelligent and security …, 2014 | 117 | 2014 |
Security evaluation of support vector machines in adversarial environments B Biggio, I Corona, B Nelson, BIP Rubinstein, D Maiorca, G Fumera, ... Support Vector Machines Applications, 105-153, 2014 | 110 | 2014 |
Bagging classifiers for fighting poisoning attacks in adversarial classification tasks B Biggio, I Corona, G Fumera, G Giacinto, F Roli International workshop on multiple classifier systems, 350-359, 2011 | 104 | 2011 |
Information fusion for computer security: State of the art and open issues I Corona, G Giacinto, C Mazzariello, F Roli, C Sansone Information Fusion 10 (4), 274-284, 2009 | 87 | 2009 |
Lux0r: Detection of malicious pdf-embedded javascript code through discriminant analysis of api references I Corona, D Maiorca, D Ariu, G Giacinto Proceedings of the 2014 workshop on artificial intelligent and security …, 2014 | 69 | 2014 |
Hmm-web: A framework for the detection of attacks against web applications I Corona, D Ariu, G Giacinto 2009 IEEE International Conference on Communications, 1-6, 2009 | 63 | 2009 |
Deltaphish: Detecting phishing webpages in compromised websites I Corona, B Biggio, M Contini, L Piras, R Corda, M Mereu, G Mureddu, ... European Symposium on Research in Computer Security, 370-388, 2017 | 54 | 2017 |
A structural and content-based approach for a precise and robust detection of malicious PDF files D Maiorca, D Ariu, I Corona, G Giacinto 2015 international conference on information systems security and privacy …, 2015 | 48 | 2015 |
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time B Biggio, I Corona, ZM He, PPK Chan, G Giacinto, DS Yeung, F Roli International Workshop on Multiple Classifier Systems, 168-180, 2015 | 40 | 2015 |
Tight arms race: Overview of current malware threats and trends in their detection L Caviglione, M Choraś, I Corona, A Janicki, W Mazurczyk, M Pawlicki, ... IEEE Access 9, 5371-5396, 2020 | 27 | 2020 |
Yes, Machine Learning Can Be More Secure A Demontis, M Melis, B Biggio, D Maiorca, D Arp, K Rieck, I Corona, ... Machine Learning Can Be More Secure, 711-724, 2018 | 23 | 2018 |
Detection of server-side web attacks I Corona, G Giacinto Proceedings of the First Workshop on Applications of Pattern Analysis, 160-166, 2010 | 23 | 2010 |