Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers G Ateniese, LV Mancini, A Spognardi, A Villani, D Vitali, G Felici International Journal of Security and Networks 10 (3), 137-150, 2015 | 604 | 2015 |
CUDA leaks: a detailed hack for CUDA and a (partial) fix RD Pietro, F Lombardi, A Villani ACM Transactions on Embedded Computing Systems (TECS) 15 (1), 1-25, 2016 | 75 | 2016 |
Obfuscation of sensitive data for incremental release of network flows D Riboni, A Villani, D Vitali, C Bettini, LV Mancini IEEE/ACM Transactions on Networking 23 (2), 672-686, 2014 | 45 | 2014 |
CUDA leaks: Information leakage in GPU architectures R Di Pietro, F Lombardi, A Villani arXiv preprint arXiv:1305.7383, 2013 | 45 | 2013 |
The impact of GPU-assisted malware on memory forensics: A case study D Balzarotti, R Di Pietro, A Villani Digital Investigation 14, S16-S24, 2015 | 25 | 2015 |
No place to hide that bytes won’t reveal: Sniffing location-based encrypted traffic to track a user’s position G Ateniese, B Hitaj, LV Mancini, NV Verde, A Villani Network and System Security: 9th International Conference, NSS 2015, New …, 2015 | 25 | 2015 |
Bypassing censorship: A proven tool against the recent internet censorship in Turkey A Di Florio, NV Verde, A Villani, D Vitali, LV Mancini 2014 IEEE International Symposium on Software Reliability Engineering …, 2014 | 22 | 2014 |
DDoS Detection with Information Theory Metrics and Netflows-A Real Case. D Vitali, A Villani, A Spognardi, R Battistoni, LV Mancini SECRYPT, 172-181, 2012 | 12 | 2012 |
Large-scale traffic anomaly detection: Analysis of real netflow datasets A Spognardi, A Villani, D Vitali, LV Mancini, R Battistoni E-Business and Telecommunications: International Joint Conference, ICETE …, 2014 | 11 | 2014 |
Relieve Internet routing security of public key infrastructure LV Mancini, A Spognardi, C Soriente, A Villani, D Vitali 2012 21st International Conference on Computer Communications and Networks …, 2012 | 5 | 2012 |
MhRep: Multi-hop replication scheme for data survival in unattended wireless sensor networks D Vitali, A Spognardi, A Villani, LV Mancini 2011 IEEE 30th Symposium on Reliable Distributed Systems Workshops, 42-51, 2011 | 5 | 2011 |
Obsidian: a scalable and efficient framework for NetFlow obfuscation A Villani, D Riboni, D Vitali, C Bettini, LV Mancini 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2013 | 4 | 2013 |
Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements R Di Pietro, LV Mancini, A Villani, D Vitali 2013 International Conference on Risks and Security of Internet and Systems …, 2013 | 1 | 2013 |
Mapping the File Systems Genome: rationales, technique, results and applications R Di Pietro, LV Mancini, A Villani, D Vitali arXiv preprint arXiv:1306.2833, 2013 | | 2013 |
A simple FORTRAN support for computer-assisted instruction I Dal Bono, M Diligenti, C Mosca, A Ricci, A Villani Information Processing Letters 3 (3), 88-90, 1975 | | 1975 |
A SIMPLE FORTRAN SUPPORT FOR COMPUTER-ASSISTED INSTRUCTION. B DAL, M DILIGENTI, C MOSCA, A RICCI, A VILLANI | | 1975 |
Zero-Knowledge Proofs and Applications A Villani | | |
FAN: FAst Netflow analyser A Cosentino, A Spognardi, A Villani, D Vitali, LV Mancini | | |