Evasion attacks against machine learning at test time B Biggio, I Corona, D Maiorca, B Nelson, N Šrndić, P Laskov, G Giacinto, ... Machine Learning and Knowledge Discovery in Databases: European Conference …, 2013 | 1866 | 2013 |
Adversarial malware binaries: Evading deep learning for malware detection in executables B Kolosnjaji, A Demontis, B Biggio, D Maiorca, G Giacinto, C Eckert, ... 2018 26th European signal processing conference (EUSIPCO), 533-537, 2018 | 453 | 2018 |
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection A Demontis, M Melis, B Biggio, D Maiorca, D Arp, K Rieck, I Corona, ... IEEE Transactions on Dependable and Secure Computing, 2017 | 363 | 2017 |
Stealth attacks: An extended insight into the obfuscation effects on android malware D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto Computers & Security 51, 16-31, 2015 | 227 | 2015 |
A pattern recognition system for malicious pdf files detection D Maiorca, G Giacinto, I Corona International workshop on machine learning and data mining in pattern …, 2012 | 164 | 2012 |
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection D Maiorca, I Corona, G Giacinto Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 160 | 2013 |
R-PackDroid: API package-based characterization and detection of mobile ransomware D Maiorca, F Mercaldo, G Giacinto, CA Visaggio, F Martinelli Proceedings of the symposium on applied computing, 1718-1723, 2017 | 145 | 2017 |
Security evaluation of support vector machines in adversarial environments B Biggio, I Corona, B Nelson, BIP Rubinstein, D Maiorca, G Fumera, ... Support vector machines applications, 105-153, 2014 | 140 | 2014 |
Towards adversarial malware detection: Lessons learned from PDF-based attacks D Maiorca, B Biggio, G Giacinto ACM Computing Surveys (CSUR) 52 (4), 1-36, 2019 | 114 | 2019 |
On the effectiveness of system API-related information for Android ransomware detection M Scalas, D Maiorca, F Mercaldo, CA Visaggio, F Martinelli, G Giacinto Computers & Security 86, 168-182, 2019 | 107 | 2019 |
Lux0r: Detection of malicious pdf-embedded javascript code through discriminant analysis of api references I Corona, D Maiorca, D Ariu, G Giacinto Proceedings of the 2014 workshop on artificial intelligent and security …, 2014 | 99 | 2014 |
Explaining black-box android malware detection M Melis, D Maiorca, B Biggio, G Giacinto, F Roli 2018 26th european signal processing conference (EUSIPCO), 524-528, 2018 | 78 | 2018 |
On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms? T Hupperich, D Maiorca, M Kührer, T Holz, G Giacinto Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 78 | 2015 |
A structural and content-based approach for a precise and robust detection of malicious pdf files D Maiorca, D Ariu, I Corona, G Giacinto Proceedings of the 1st International Conference on Information Systems …, 2015 | 73 | 2015 |
Clustering Android Malware Families by Http Traffic M Aresu, D Ariu, M Ahmadi, D Maiorca, G Giacinto | 57 | 2015 |
Digital investigation of pdf files: Unveiling traces of embedded malware D Maiorca, B Biggio IEEE Security & Privacy 17 (1), 63-71, 2019 | 53 | 2019 |
PowerDrive: accurate de-obfuscation and analysis of PowerShell malware D Ugarte, D Maiorca, F Cara, G Giacinto Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019 | 40 | 2019 |
Do gradient-based explanations tell anything about adversarial robustness to android malware? M Melis, M Scalas, A Demontis, D Maiorca, B Biggio, G Giacinto, F Roli International journal of machine learning and cybernetics, 1-16, 2022 | 37 | 2022 |
Adversarial detection of flash malware: Limitations and open issues D Maiorca, A Demontis, B Biggio, F Roli, G Giacinto Computers & Security 96, 101901, 2020 | 34 | 2020 |
Evaluating analysis tools for android apps: Status quo and robustness against obfuscation J Hoffmann, T Rytilahti, D Maiorca, M Winandy, G Giacinto, T Holz Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016 | 34 | 2016 |