Follow
Antonio Villani
Antonio Villani
Verified email at mat.uniroma3.it
Title
Cited by
Cited by
Year
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers
G Ateniese, LV Mancini, A Spognardi, A Villani, D Vitali, G Felici
International Journal of Security and Networks 10 (3), 137-150, 2015
6042015
CUDA leaks: a detailed hack for CUDA and a (partial) fix
RD Pietro, F Lombardi, A Villani
ACM Transactions on Embedded Computing Systems (TECS) 15 (1), 1-25, 2016
752016
Obfuscation of sensitive data for incremental release of network flows
D Riboni, A Villani, D Vitali, C Bettini, LV Mancini
IEEE/ACM Transactions on Networking 23 (2), 672-686, 2014
452014
CUDA leaks: Information leakage in GPU architectures
R Di Pietro, F Lombardi, A Villani
arXiv preprint arXiv:1305.7383, 2013
452013
The impact of GPU-assisted malware on memory forensics: A case study
D Balzarotti, R Di Pietro, A Villani
Digital Investigation 14, S16-S24, 2015
252015
No place to hide that bytes won’t reveal: Sniffing location-based encrypted traffic to track a user’s position
G Ateniese, B Hitaj, LV Mancini, NV Verde, A Villani
Network and System Security: 9th International Conference, NSS 2015, New …, 2015
252015
Bypassing censorship: A proven tool against the recent internet censorship in Turkey
A Di Florio, NV Verde, A Villani, D Vitali, LV Mancini
2014 IEEE International Symposium on Software Reliability Engineering …, 2014
222014
DDoS Detection with Information Theory Metrics and Netflows-A Real Case.
D Vitali, A Villani, A Spognardi, R Battistoni, LV Mancini
SECRYPT, 172-181, 2012
122012
Large-scale traffic anomaly detection: Analysis of real netflow datasets
A Spognardi, A Villani, D Vitali, LV Mancini, R Battistoni
E-Business and Telecommunications: International Joint Conference, ICETE …, 2014
112014
Relieve Internet routing security of public key infrastructure
LV Mancini, A Spognardi, C Soriente, A Villani, D Vitali
2012 21st International Conference on Computer Communications and Networks …, 2012
52012
MhRep: Multi-hop replication scheme for data survival in unattended wireless sensor networks
D Vitali, A Spognardi, A Villani, LV Mancini
2011 IEEE 30th Symposium on Reliable Distributed Systems Workshops, 42-51, 2011
52011
Obsidian: a scalable and efficient framework for NetFlow obfuscation
A Villani, D Riboni, D Vitali, C Bettini, LV Mancini
2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2013
42013
Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements
R Di Pietro, LV Mancini, A Villani, D Vitali
2013 International Conference on Risks and Security of Internet and Systems …, 2013
12013
Mapping the File Systems Genome: rationales, technique, results and applications
R Di Pietro, LV Mancini, A Villani, D Vitali
arXiv preprint arXiv:1306.2833, 2013
2013
A simple FORTRAN support for computer-assisted instruction
I Dal Bono, M Diligenti, C Mosca, A Ricci, A Villani
Information Processing Letters 3 (3), 88-90, 1975
1975
A SIMPLE FORTRAN SUPPORT FOR COMPUTER-ASSISTED INSTRUCTION.
B DAL, M DILIGENTI, C MOSCA, A RICCI, A VILLANI
1975
Zero-Knowledge Proofs and Applications
A Villani
FAN: FAst Netflow analyser
A Cosentino, A Spognardi, A Villani, D Vitali, LV Mancini
The system can't perform the operation now. Try again later.
Articles 1–18