Evasion attacks against machine learning at test time B Biggio, I Corona, D Maiorca, B Nelson, N Šrndić, P Laskov, G Giacinto, ... Joint European conference on machine learning and knowledge discovery in …, 2013 | 1043 | 2013 |
Adversarial malware binaries: Evading deep learning for malware detection in executables B Kolosnjaji, A Demontis, B Biggio, D Maiorca, G Giacinto, C Eckert, ... 2018 26th European signal processing conference (EUSIPCO), 533-537, 2018 | 221 | 2018 |
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection A Demontis, M Melis, B Biggio, D Maiorca, D Arp, K Rieck, I Corona, ... IEEE Transactions on Dependable and Secure Computing, 2017 | 203 | 2017 |
Stealth attacks: An extended insight into the obfuscation effects on android malware D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto Computers & Security 51, 16-31, 2015 | 152 | 2015 |
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection D Maiorca, I Corona, G Giacinto Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 138 | 2013 |
A pattern recognition system for malicious pdf files detection D Maiorca, G Giacinto, I Corona International workshop on machine learning and data mining in pattern …, 2012 | 127 | 2012 |
Security evaluation of support vector machines in adversarial environments B Biggio, I Corona, B Nelson, BIP Rubinstein, D Maiorca, G Fumera, ... Support Vector Machines Applications, 105-153, 2014 | 109 | 2014 |
R-PackDroid: API package-based characterization and detection of mobile ransomware D Maiorca, F Mercaldo, G Giacinto, CA Visaggio, F Martinelli Proceedings of the symposium on applied computing, 1718-1723, 2017 | 98 | 2017 |
Lux0r: Detection of malicious pdf-embedded javascript code through discriminant analysis of api references I Corona, D Maiorca, D Ariu, G Giacinto Proceedings of the 2014 workshop on artificial intelligent and security …, 2014 | 68 | 2014 |
On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms? T Hupperich, D Maiorca, M Kührer, T Holz, G Giacinto Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 63 | 2015 |
On the effectiveness of system API-related information for Android ransomware detection M Scalas, D Maiorca, F Mercaldo, CA Visaggio, F Martinelli, G Giacinto Computers & Security 86, 168-182, 2019 | 54 | 2019 |
Towards adversarial malware detection: Lessons learned from PDF-based attacks D Maiorca, B Biggio, G Giacinto ACM Computing Surveys (CSUR) 52 (4), 1-36, 2019 | 50 | 2019 |
Clustering Android Malware Families by Http Traffic M Aresu, D Ariu, M Ahmadi, D Maiorca, G Giacinto | 48 | 2015 |
A structural and content-based approach for a precise and robust detection of malicious pdf files D Maiorca, D Ariu, I Corona, G Giacinto Proceedings of the 1st International Conference on Information Systems …, 2015 | 47 | 2015 |
Explaining black-box android malware detection M Melis, D Maiorca, B Biggio, G Giacinto, F Roli 2018 26th european signal processing conference (EUSIPCO), 524-528, 2018 | 35 | 2018 |
Digital investigation of pdf files: Unveiling traces of embedded malware D Maiorca, B Biggio IEEE Security & Privacy 17 (1), 63-71, 2019 | 25 | 2019 |
Evaluating analysis tools for android apps: Status quo and robustness against obfuscation J Hoffmann, T Rytilahti, D Maiorca, M Winandy, G Giacinto, T Holz Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016 | 25 | 2016 |
Yes A Demontis, M Melis, B Biggio, D Maiorca, D Arp, K Rieck, I Corona, ... Machine Learning Can Be More Secure, 711-724, 2018 | 23 | 2018 |
Adversarial detection of flash malware: Limitations and open issues D Maiorca, A Demontis, B Biggio, F Roli, G Giacinto Computers & Security 96, 101901, 2020 | 20 | 2020 |
PowerDrive: Accurate de-obfuscation and analysis of powershell malware D Ugarte, D Maiorca, F Cara, G Giacinto International Conference on Detection of Intrusions and Malware, and …, 2019 | 13 | 2019 |