Filter
Conference contribution

Search results

  • 2003

    Modeling memory phenomena for partial discharge processes in insulation cavities

    Cavallini, A., Conti, M., Morshuis, PHF. & Montanari, GC., 2003, 2003 annual report conference on electrical insulation and dielectric phenomena. Agurwal, K. (ed.). Piscataway: IEEE Society, p. 723-727 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    28 Citations (Scopus)
  • 2020

    ALISI: A lightweight identification system based on Iroha

    Bernieri, G., Conti, M., Sovilla, M. & Turrin, F., 30 Mar 2020, 35th Annual ACM Symposium on Applied Computing, SAC 2020. Association for Computing Machinery (ACM), p. 271-273 3 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • A Proactive Cache Privacy Attack on NDN

    Compagno, A., Conti, M., Losiouk, E., Tsudik, G. & Valle, S., Apr 2020, Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence, NOMS 2020. Institute of Electrical and Electronics Engineers (IEEE), 9110318. (Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence, NOMS 2020).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • ASAINT: A spy App identification system based on network traffic

    Conti, M., Rigoni, G. & Toffalini, F., 25 Aug 2020, Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020. Association for Computing Machinery (ACM), (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • A Statistical Analysis Framework for ICS Process Datasets

    Turrin, F., Erba, A., Tippenhauer, N. O. & Conti, M., 9 Nov 2020, CPSIOTSEC 2020 - Proceedings of the 2020 Joint Workshop on CPS and IoT Security and Privacy. Association for Computing Machinery (ACM), p. 25-30 6 p. (CPSIOTSEC 2020 - Proceedings of the 2020 Joint Workshop on CPS and IoT Security and Privacy).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Big enough to care not enough to scare! crawling to attack recommender systems

    Aiolli, F., Conti, M., Picek, S. & Polato, M., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer, p. 165-184 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • COIDS: A Clock Offset Based Intrusion Detection System for Controller Area Networks

    Halder, S., Conti, M. & Das, S. K., 2020, ACM International Conference Proceeding Series. Association for Computing Machinery (ACM), 3369787. (ACM International Conference Proceeding Series; vol. Part F165625).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    13 Citations (Scopus)
  • CyberWolf: Assessing vulnerabilities of ICT-intensive financial markets

    Calesso, A., Conti, M. & Grasselli, M., 25 Aug 2020, Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020. Association for Computing Machinery (ACM), (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • De-auth of the blue! transparent de-authentication using bluetooth low energy beacon

    Conti, M., Tricomi, P. P. & Tsudik, G., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer, p. 277-294 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12308 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Detecting Covert Cryptomining using HPC

    Gangwal, A., Piazzetta, S. G., Lain, G. & Conti, M., 2020, Cryptology and Network Security: 19th International Conference, CANS 202, Proceedings. Krenn, S., Shulman, H. & Vaudenay, S. (eds.). Cham: Springer, p. 344–364 21 p. (Part of the Lecture Notes in Computer Science book series (LNCS, volume 12579); vol. 12579).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    13 Citations (Scopus)
  • Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics

    Cardaioli, M., Monaro, M., Sartori, G. & Conti, M., 2020, Advances in Human Factors in Cybersecurity - AHFE 2020 Virtual Conference on Human Factors in Cybersecurity. Corradini, I., Nardelli, E. & Ahram, T. (eds.). Springer, p. 41-48 8 p. (Advances in Intelligent Systems and Computing; vol. 1219 AISC).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Eathentication: A Chewing-based Authentication Method

    Carlucci, M., Cecconello, S., Conti, M. & Romare, P., Jun 2020, 2020 IEEE Conference on Communications and Network Security, CNS 2020. Institute of Electrical and Electronics Engineers (IEEE), 9162343. (2020 IEEE Conference on Communications and Network Security, CNS 2020).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud

    Chen, Y., Li, M., Zheng, S., Hu, D., Lal, C. & Conti, M., 2020, Information and Communications Security - 22nd International Conference, ICICS 2020, Proceedings. Meng, W., Gollmann, D., Jensen, C. D. & Zhou, J. (eds.). Springer, p. 350-365 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12282 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Peek-a-boo: I see your smart home activities, even encrypted!

    Acar, A., Fereidooni, H., Abera, T., Sikder, A. K., Miettinen, M., Aksu, H., Conti, M., Sadeghi, A. R. & Uluagac, S., 8 Jul 2020, WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery (ACM), p. 207-218 12 p. (WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    116 Citations (Scopus)
  • Predicting Twitter Users' Political Orientation: An Application to the Italian Political Scenario

    Cardaioli, M., Kaliyar, P., Capuozzo, P., Conti, M., Sartori, G. & Monaro, M., 2020, Proceedings of the 2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2020. Atzmuller, M., Coscia, M. & Missaoui, R. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 159-165 7 p. 9381470. (Proceedings of the 2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2020).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Proof of Evolution: Leveraging blockchain mining for a cooperative execution of Genetic Algorithms

    Bizzaro, F., Conti, M. & Pini, M. S., Nov 2020, Proceedings - 2020 IEEE International Conference on Blockchain, Blockchain 2020. Institute of Electrical and Electronics Engineers (IEEE), p. 450-455 6 p. 9284765. (Proceedings - 2020 IEEE International Conference on Blockchain, Blockchain 2020).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    12 Citations (Scopus)
  • PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition

    Conti, M. & Tricomi, P. P., 2020, Information Security - 23rd International Conference, ISC 2020, Proceedings. Susilo, W., Deng, R. H., Guo, F., Li, Y. & Intan, R. (eds.). Springer, p. 393-408 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12472 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Reputation-based Trust: A robust mechanism for Dynamic Adaptive Streaming over Named Data Networking

    Kapetanidou, I. A., Hassan, M., Sarros, C. A., Conti, M. & Tsaoussidis, V., 2020, Proceedings - 2020 IEEE 14th International Conference on Big Data Science and Engineering, BigDataSE 2020. Wang, G., Westphall, C. B. & Castiglione, A. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 114-121 8 p. 9343351. (Proceedings - 2020 IEEE 14th International Conference on Big Data Science and Engineering, BigDataSE 2020).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Shefu: Secure hardware-enabled protocol for firmware updates

    Rabbani, M. M., Vligen, J., Conti, M. & Mentens, N., 2020, 2020 IEEE International Symposium on Circuits and Systems, ISCAS 2020 - Proceedings. Institute of Electrical and Electronics Engineers (IEEE), 9180850. (Proceedings - IEEE International Symposium on Circuits and Systems; vol. 2020-October).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Spatial bloom filter in named data networking: A memory efficient solution

    Berto, F., Calderoni, L., Conti, M. & Losiouk, E., 2020, 35th Annual ACM Symposium on Applied Computing, SAC 2020. Association for Computing Machinery (ACM), p. 274-277 4 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • STRIDE: Scalable and Secure Over-The-Air Software Update Scheme for Autonomous Vehicles

    Ghosal, A., Halder, S. & Conti, M., Jun 2020, 2020 IEEE International Conference on Communications, ICC 2020 - Proceedings. Institute of Electrical and Electronics Engineers (IEEE), 9148649. (IEEE International Conference on Communications; vol. 2020-June).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • UAVs Path Deviation Attacks: Survey and Research Challenges

    Sorbelli, F. B., Conti, M., Pinotti, C. M. & Rigoni, G., 2020, 2020 IEEE International Conference on Sensing, Communication and Networking, SECON Workshops 2020. IEEE, 9149780. (Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks workshops; vol. 2020-June).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Your pin sounds good! augmentation of pin guessing strategies via audio leakage

    Cardaioli, M., Conti, M., Balagani, K. & Gasti, P., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer, p. 720-735 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12308 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • 2021

    Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis

    Barbieri, G., Conti, M., Tippenhauer, N. O. & Turrin, F., 2021, 30th International Conference on Computer Communications and Networks, ICCCN 2021. Institute of Electrical and Electronics Engineers (IEEE), (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2021-July).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • A threat model method for ICS malware: The TRISIS case

    Mekdad, Y., Bernieri, G., Conti, M. & Fergougui, A. E., 2021, Proceedings of the 18th ACM International Conference on Computing Frontiers 2021, CF 2021. Association for Computing Machinery (ACM), p. 221-228 8 p. (Proceedings of the 18th ACM International Conference on Computing Frontiers 2021, CF 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    10 Citations (Scopus)
  • Contact Tracing Made Un-relay-able

    Casagrande, M., Conti, M. & Losiouk, E., 2021, CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery (ACM), p. 221-232 12 p. (CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • COTS Drone Detection using Video Streaming Characteristics

    Alsoliman, A., Rigoni, G., Levorato, M., Pinotti, C., Tippenhauer, N. O. & Conti, M., 2021, ICDCN 2021 - Proceedings of the 2021 International Conference on Distributed Computing and Networking. Association for Computing Machinery (ACM), p. 166-175 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • FADIA: Fairness-driven collaborative remote attestation

    Mansouri, M., Jaballah, W. B., Önen, M., Rabbani, M. M. & Conti, M., 2021, WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery (ACM), p. 60-71 12 p. 3468284. (WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Fall of giants: How popular text-based MLaaS fall against a simple evasion attack

    Pajola, L. & Conti, M., 2021, Proceedings - 2021 IEEE European Symposium on Security and Privacy, Euro S and P 2021. Institute of Electrical and Electronics Engineers (IEEE), p. 198-211 14 p. (Proceedings - 2021 IEEE European Symposium on Security and Privacy, Euro S and P 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • ICN PATTA: ICN privacy attack through traffic analysis

    Bardhi, E., Conti, M., Lazzeretti, R. & Losiouk, E., 2021, Proceedings of the IEEE 46th Conference on Local Computer Networks, LCN 2021. Khoukhi, L., Oteafy, S. & Bulut, E. (eds.). IEEE, p. 443-446 4 p. (Proceedings - Conference on Local Computer Networks, LCN; vol. 2021-October).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Improving password guessing via representation learning

    Pasquini, D., Gangwal, A., Ateniese, G., Bernaschi, M. & Conti, M., 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Institute of Electrical and Electronics Engineers (IEEE), p. 1382-1399 18 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2021-May).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    25 Citations (Scopus)
  • It's a Matter of Style: Detecting Social Bots through Writing Style Consistency

    Cardaioli, M., Conti, M., Sorbo, A. D., Fabrizio, E., Laudanna, S. & Visaggio, C. A., 2021, 30th International Conference on Computer Communications and Networks, ICCCN 2021. Institute of Electrical and Electronics Engineers (IEEE), (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2021-July).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Knocking on Tangle's Doors: Security Analysis of IOTA Ports

    Brighente, A., Conti, M., Kumar, G., Ghanbari, R. & Saha, R., 2021, Proceedings - 2021 IEEE International Conference on Blockchain, Blockchain 2021. Xiang, Y., Wang, Z., Wang, H. & Niemi, V. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 433-439 7 p. (Proceedings - 2021 IEEE International Conference on Blockchain, Blockchain 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Malingering Scraper: A Novel Framework to Reconstruct Honest Profiles from Malingerer Psychopathological Tests

    Cardaioli, M., Cecconello, S., Monaro, M., Sartori, G., Conti, M. & Orrù, G., 2021, Neural Information Processing - 28th International Conference, ICONIP 2021, Proceedings. Mantoro, T., Lee, M., Ayu, M. A., Wong, K. W. & Hidayanto, A. N. (eds.). Springer, p. 433-440 8 p. (Communications in Computer and Information Science; vol. 1517 CCIS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • MiniV2G: An Electric Vehicle Charging Emulator

    Attanasio, L., Conti, M., Donadel, D. & Turrin, F., 2021, CPSS 2021 - Proceedings of the 7th ACM Cyber-Physical System Security Workshop. Association for Computing Machinery (ACM), p. 65-73 9 p. (CPSS 2021 - Proceedings of the 7th ACM Cyber-Physical System Security Workshop).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Practical Exchange for Unique Digital Goods

    Ersoy, O., Genç, Z. A., Erkin, Z. & Conti, M., 2021, 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS): Proceedings. O'Conner, L. (ed.). Piscataway: IEEE, p. 49-58 10 p. 9566170

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    24 Downloads (Pure)
  • Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization

    Ruggia, A., Losiouk, E., Verderame, L., Conti, M. & Merlo, A., 2021, Proceedings - 37th Annual Computer Security Applications Conference, ACSAC 2021. Association for Computing Machinery (ACM), p. 970-981 12 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • SnakeGX: A Sneaky Attack Against SGX Enclaves

    Toffalini, F., Graziano, M., Conti, M. & Zhou, J., 2021, Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Proceedings. Sako, K. & Tippenhauer, N. O. (eds.). Springer, p. 333-362 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12726 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand

    Brighente, A., Conti, M. & Sadaf, I., 2021, Computer Security – ESORICS 2021 - 26th European Symposium on Research in Computer Security, Proceedings. Bertino, E., Shulman, H. & Waidner, M. (eds.). Springer, p. 651-667 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12972 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Towards An Enhanced Reputation System for IOTA's Coordicide

    Saha, R., Kumar, G., Brighente, A. & Conti, M., 2021, 2021 3rd International Conference on Blockchain Computing and Applications, BCCA 2021. Alsmirat, M., Aloqaily, M., Jararweh, Y., Ozkasap, O. & Gurcan, O. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 26-33 8 p. (2021 3rd International Conference on Blockchain Computing and Applications, BCCA 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services

    Chen, Y., Li, M., Zheng, S., Lal, C. & Conti, M., 2021, Security and Trust Management - 17th International Workshop, STM 2021, Proceedings. Roman, R. & Zhou, J. (eds.). 17 ed. Darmstadt, Germany: Springer, Vol. 13075. p. 43-61 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13075 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    17 Downloads (Pure)
  • 2022

    Analyzing Price Deviations in DeFi Oracles

    Gangwal, A., Valluri, R. & Conti, M., 2022, Cryptology and Network Security - 21st International Conference, CANS 2022, Proceedings. Beresford, A. R., Patra, A. & Bellini, E. (eds.). Springer, p. 329-338 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13641 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks

    Limbasiya, T., Ghosal, A. & Conti, M., 2022, ICDCN 2022 - Proceedings of the 2022 International Conference on Distributed Computing and Networking. Association for Computing Machinery (ACM), p. 208-216 9 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

    Koffas, S., Xu, J., Conti, M. & Picek, S., 2022, WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning. Association for Computing Machinery (ACM), p. 57-62 6 p. (WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    93 Downloads (Pure)
  • Contactless Authentication for Wearable Devices Using RFID

    Bellandi, V., Ceravolo, P., Conti, M. & Ehsanpour, M., 2022, Proceedings - 2022 IEEE International Conference on Digital Health, ICDH 2022. Ahamed, S. I., Ardagna, C. A., Bian, H., Bochicchio, M., Chang, C. K., Chang, R. N., Damiani, E., Liu, L., Pavel, M., Priami, C., Shahriar, H., Ward, R., Xhafa, F., Zhang, J. & Zulkernine, F. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 234-239 6 p. (Proceedings - 2022 IEEE International Conference on Digital Health, ICDH 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Dynamic Backdoors with Global Average Pooling

    Koffas, S., Picek, S. & Conti, M., 2022, Proceedings of the 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS). Danvers: IEEE, p. 320-323 4 p. 9869920. (Proceeding - IEEE International Conference on Artificial Intelligence Circuits and Systems, AICAS 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    16 Downloads (Pure)
  • EVExchange: A Relay Attack on Electric Vehicle Charging System

    Conti, M., Donadel, D., Poovendran, R. & Turrin, F., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 488-508 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Face Recognition Systems: Are you sure they only consider your face?

    Darbha, P. S., Conti, M., Losiouk, E. & Maiti, R. R., 2022, Proceedings - 43rd IEEE Symposium on Security and Privacy Workshops, SPW 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 258-264 7 p. (Proceedings - 43rd IEEE Symposium on Security and Privacy Workshops, SPW 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Face the Truth: Interpretable Emotion Genuineness Detection

    Cardaioli, M., Miolla, A., Conti, M., Sartori, G., Monaro, M., Scarpazza, C. & Navarin, N., 2022, 2022 International Joint Conference on Neural Networks, IJCNN 2022 - Proceedings. Institute of Electrical and Electronics Engineers (IEEE), (Proceedings of the International Joint Conference on Neural Networks; vol. 2022-July).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks

    Bout, E., Brighente, A., Conti, M. & Loscri, V., 2022, Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022. Association for Computing Machinery (ACM), 21. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)