Evasion attacks against machine learning at test time B Biggio, I Corona, D Maiorca, B Nelson, N Šrndić, P Laskov, G Giacinto, ... Joint European conference on machine learning and knowledge discovery in …, 2013 | 695 | 2013 |
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection A Demontis, M Melis, B Biggio, D Maiorca, D Arp, K Rieck, I Corona, ... IEEE Transactions on Dependable and Secure Computing, 2017 | 129 | 2017 |
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection D Maiorca, I Corona, G Giacinto Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 120 | 2013 |
Adversarial malware binaries: Evading deep learning for malware detection in executables B Kolosnjaji, A Demontis, B Biggio, D Maiorca, G Giacinto, C Eckert, ... 2018 26th European signal processing conference (EUSIPCO), 533-537, 2018 | 115 | 2018 |
A pattern recognition system for malicious pdf files detection D Maiorca, G Giacinto, I Corona International workshop on machine learning and data mining in pattern …, 2012 | 109 | 2012 |
Stealth attacks: An extended insight into the obfuscation effects on android malware D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto Computers & Security 51, 16-31, 2015 | 99 | 2015 |
Security evaluation of support vector machines in adversarial environments B Biggio, I Corona, B Nelson, BIP Rubinstein, D Maiorca, G Fumera, ... Support Vector Machines Applications, 105-153, 2014 | 84 | 2014 |
Lux0r: Detection of malicious pdf-embedded javascript code through discriminant analysis of api references I Corona, D Maiorca, D Ariu, G Giacinto Proceedings of the 2014 workshop on artificial intelligent and security …, 2014 | 60 | 2014 |
R-PackDroid: API package-based characterization and detection of mobile ransomware D Maiorca, F Mercaldo, G Giacinto, CA Visaggio, F Martinelli Proceedings of the symposium on applied computing, 1718-1723, 2017 | 58 | 2017 |
On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms? T Hupperich, D Maiorca, M Kührer, T Holz, G Giacinto Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 48 | 2015 |
Clustering Android Malware Families by Http Traffic M Aresu, D Ariu, M Ahmadi, D Maiorca, G Giacinto | 37 | 2015 |
A structural and content-based approach for a precise and robust detection of malicious pdf files D Maiorca, D Ariu, I Corona, G Giacinto Proceedings of the 1st International Conference on Information Systems …, 2015 | 35 | 2015 |
Towards adversarial malware detection: Lessons learned from PDF-based attacks D Maiorca, B Biggio, G Giacinto ACM Computing Surveys (CSUR) 52 (4), 1-36, 2019 | 22 | 2019 |
Explaining black-box android malware detection M Melis, D Maiorca, B Biggio, G Giacinto, F Roli 2018 26th European Signal Processing Conference (EUSIPCO), 524-528, 2018 | 22 | 2018 |
On the effectiveness of system API-related information for Android ransomware detection M Scalas, D Maiorca, F Mercaldo, CA Visaggio, F Martinelli, G Giacinto Computers & Security 86, 168-182, 2019 | 17 | 2019 |
Evaluating analysis tools for android apps: Status quo and robustness against obfuscation J Hoffmann, T Rytilahti, D Maiorca, M Winandy, G Giacinto, T Holz Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016 | 17 | 2016 |
Digital investigation of PDF files: Unveiling traces of embedded malware D Maiorca, B Biggio IEEE Security & Privacy 17 (1), 63-71, 2019 | 9 | 2019 |
Adversarial detection of flash malware: Limitations and open issues D Maiorca, A Demontis, B Biggio, F Roli, G Giacinto Computers & Security 96, 101901, 2020 | 8 | 2020 |
Detection of malicious scripting code through discriminant and adversary-aware API analysis D Maiorca, P Russu, I Corona, B Biggio, G Giacinto 1st Italian Conference on Cybersecurity, ITASEC 2017 1816, 96-105, 2017 | 6 | 2017 |
An evasion resilient approach to the detection of malicious PDF files D Maiorca, D Ariu, I Corona, G Giacinto International Conference on Information Systems Security and Privacy, 68-85, 2015 | 6 | 2015 |