Filter
Conference contribution

Search results

  • Conference contribution

    AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation

    Perrina, F., Marchiori, F., Conti, M. & Verde, N. V., 2023, Proceedings of the 2023 IEEE International Conference on Big Data (BigData). IEEE, p. 3053-3062 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • ALISI: A lightweight identification system based on Iroha

    Bernieri, G., Conti, M., Sovilla, M. & Turrin, F., 30 Mar 2020, 35th Annual ACM Symposium on Applied Computing, SAC 2020. Association for Computing Machinery (ACM), p. 271-273 3 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Analyzing Price Deviations in DeFi Oracles

    Gangwal, A., Valluri, R. & Conti, M., 2022, Cryptology and Network Security - 21st International Conference, CANS 2022, Proceedings. Beresford, A. R., Patra, A. & Bellini, E. (eds.). Springer, p. 329-338 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13641 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • A Proactive Cache Privacy Attack on NDN

    Compagno, A., Conti, M., Losiouk, E., Tsudik, G. & Valle, S., Apr 2020, Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence, NOMS 2020. Institute of Electrical and Electronics Engineers (IEEE), 9110318. (Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence, NOMS 2020).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • ASAINT: A spy App identification system based on network traffic

    Conti, M., Rigoni, G. & Toffalini, F., 25 Aug 2020, Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020. Association for Computing Machinery (ACM), (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis

    Barbieri, G., Conti, M., Tippenhauer, N. O. & Turrin, F., 2021, 30th International Conference on Computer Communications and Networks, ICCCN 2021. Institute of Electrical and Electronics Engineers (IEEE), (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2021-July).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • A Statistical Analysis Framework for ICS Process Datasets

    Turrin, F., Erba, A., Tippenhauer, N. O. & Conti, M., 9 Nov 2020, CPSIOTSEC 2020 - Proceedings of the 2020 Joint Workshop on CPS and IoT Security and Privacy. Association for Computing Machinery (ACM), p. 25-30 6 p. (CPSIOTSEC 2020 - Proceedings of the 2020 Joint Workshop on CPS and IoT Security and Privacy).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • A threat model method for ICS malware: The TRISIS case

    Mekdad, Y., Bernieri, G., Conti, M. & Fergougui, A. E., 2021, Proceedings of the 18th ACM International Conference on Computing Frontiers 2021, CF 2021. Association for Computing Machinery (ACM), p. 221-228 8 p. (Proceedings of the 18th ACM International Conference on Computing Frontiers 2021, CF 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    10 Citations (Scopus)
  • Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2

    Tricomi, P. P., Facciolo, L., Apruzzese, G. & Conti, M., 2023, CODASPY 2023 - Proceedings of the 13th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery (ACM), p. 27-38 12 p. (CODASPY 2023 - Proceedings of the 13th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    18 Downloads (Pure)
  • AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks

    Limbasiya, T., Ghosal, A. & Conti, M., 2022, ICDCN 2022 - Proceedings of the 2022 International Conference on Distributed Computing and Networking. Association for Computing Machinery (ACM), p. 208-216 9 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks

    Lotto, A., Singh, V., Ramasubramanian, B., Brighente, A., Conti, M. & Poovendran, R., 2023, WiSec 2023 - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery (ACM), p. 133-144 12 p. (WiSec 2023 - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    15 Downloads (Pure)
  • Big enough to care not enough to scare! crawling to attack recommender systems

    Aiolli, F., Conti, M., Picek, S. & Polato, M., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer, p. 165-184 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

    Koffas, S., Xu, J., Conti, M. & Picek, S., 2022, WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning. Association for Computing Machinery (ACM), p. 57-62 6 p. (WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    93 Downloads (Pure)
  • COIDS: A Clock Offset Based Intrusion Detection System for Controller Area Networks

    Halder, S., Conti, M. & Das, S. K., 2020, ACM International Conference Proceeding Series. Association for Computing Machinery (ACM), 3369787. (ACM International Conference Proceeding Series; vol. Part F165625).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    13 Citations (Scopus)
  • Contactless Authentication for Wearable Devices Using RFID

    Bellandi, V., Ceravolo, P., Conti, M. & Ehsanpour, M., 2022, Proceedings - 2022 IEEE International Conference on Digital Health, ICDH 2022. Ahamed, S. I., Ardagna, C. A., Bian, H., Bochicchio, M., Chang, C. K., Chang, R. N., Damiani, E., Liu, L., Pavel, M., Priami, C., Shahriar, H., Ward, R., Xhafa, F., Zhang, J. & Zulkernine, F. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 234-239 6 p. (Proceedings - 2022 IEEE International Conference on Digital Health, ICDH 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Contact Tracing Made Un-relay-able

    Casagrande, M., Conti, M. & Losiouk, E., 2021, CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery (ACM), p. 221-232 12 p. (CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • COTS Drone Detection using Video Streaming Characteristics

    Alsoliman, A., Rigoni, G., Levorato, M., Pinotti, C., Tippenhauer, N. O. & Conti, M., 2021, ICDCN 2021 - Proceedings of the 2021 International Conference on Distributed Computing and Networking. Association for Computing Machinery (ACM), p. 166-175 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • CyberWolf: Assessing vulnerabilities of ICT-intensive financial markets

    Calesso, A., Conti, M. & Grasselli, M., 25 Aug 2020, Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020. Association for Computing Machinery (ACM), (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • De-auth of the blue! transparent de-authentication using bluetooth low energy beacon

    Conti, M., Tricomi, P. P. & Tsudik, G., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer, p. 277-294 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12308 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Detecting Covert Cryptomining using HPC

    Gangwal, A., Piazzetta, S. G., Lain, G. & Conti, M., 2020, Cryptology and Network Security: 19th International Conference, CANS 202, Proceedings. Krenn, S., Shulman, H. & Vaudenay, S. (eds.). Cham: Springer, p. 344–364 21 p. (Part of the Lecture Notes in Computer Science book series (LNCS, volume 12579); vol. 12579).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    13 Citations (Scopus)
  • Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics

    Cardaioli, M., Monaro, M., Sartori, G. & Conti, M., 2020, Advances in Human Factors in Cybersecurity - AHFE 2020 Virtual Conference on Human Factors in Cybersecurity. Corradini, I., Nardelli, E. & Ahram, T. (eds.). Springer, p. 41-48 8 p. (Advances in Intelligent Systems and Computing; vol. 1219 AISC).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Dynamic Backdoors with Global Average Pooling

    Koffas, S., Picek, S. & Conti, M., 2022, Proceedings of the 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS). Danvers: IEEE, p. 320-323 4 p. 9869920. (Proceeding - IEEE International Conference on Artificial Intelligence Circuits and Systems, AICAS 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    16 Downloads (Pure)
  • Eathentication: A Chewing-based Authentication Method

    Carlucci, M., Cecconello, S., Conti, M. & Romare, P., Jun 2020, 2020 IEEE Conference on Communications and Network Security, CNS 2020. Institute of Electrical and Electronics Engineers (IEEE), 9162343. (2020 IEEE Conference on Communications and Network Security, CNS 2020).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem

    Casagrande, M., Cestaro, R., Losiouk, E., Conti, M. & Antonioli, D., 29 May 2023, WiSec 2023 - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery (ACM), p. 85-95 11 p. (WiSec 2023 - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • EVExchange: A Relay Attack on Electric Vehicle Charging System

    Conti, M., Donadel, D., Poovendran, R. & Turrin, F., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 488-508 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Face Recognition Systems: Are you sure they only consider your face?

    Darbha, P. S., Conti, M., Losiouk, E. & Maiti, R. R., 2022, Proceedings - 43rd IEEE Symposium on Security and Privacy Workshops, SPW 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 258-264 7 p. (Proceedings - 43rd IEEE Symposium on Security and Privacy Workshops, SPW 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Face the Truth: Interpretable Emotion Genuineness Detection

    Cardaioli, M., Miolla, A., Conti, M., Sartori, G., Monaro, M., Scarpazza, C. & Navarin, N., 2022, 2022 International Joint Conference on Neural Networks, IJCNN 2022 - Proceedings. Institute of Electrical and Electronics Engineers (IEEE), (Proceedings of the International Joint Conference on Neural Networks; vol. 2022-July).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • FADIA: Fairness-driven collaborative remote attestation

    Mansouri, M., Jaballah, W. B., Önen, M., Rabbani, M. M. & Conti, M., 2021, WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery (ACM), p. 60-71 12 p. 3468284. (WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Fall of giants: How popular text-based MLaaS fall against a simple evasion attack

    Pajola, L. & Conti, M., 2021, Proceedings - 2021 IEEE European Symposium on Security and Privacy, Euro S and P 2021. Institute of Electrical and Electronics Engineers (IEEE), p. 198-211 14 p. (Proceedings - 2021 IEEE European Symposium on Security and Privacy, Euro S and P 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms

    Tricomi, P. P., Chilese, M., Conti, M. & Sadeghi, A. R., 30 Apr 2023, WebSci 2023 - Proceedings of the 15th ACM Web Science Conference. Association for Computing Machinery (ACM), p. 346-356 11 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    2 Citations (Scopus)
  • FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks

    Bout, E., Brighente, A., Conti, M. & Loscri, V., 2022, Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022. Association for Computing Machinery (ACM), 21. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection

    Cardaioli, M., Conti, M. & Ravindranath, A., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 595-613 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13556 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    20 Downloads (Pure)
  • GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks

    Agiollo, A., Bardhi, E., Conti, M., Lazzeretti, R., Losiouk, E. & Omicini, A., 2023, Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023. Institute of Electrical and Electronics Engineers (IEEE), p. 615-630 16 p. (Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    7 Downloads (Pure)
  • Going in Style: Audio Backdoors Through Stylistic Transformations

    Koffas, S., Pajola, L., Picek, S. & Conti, M., 2023, Proceedings of the ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    30 Downloads (Pure)
  • Graph Encryption for Shortest Path Queries with k Unsorted Nodes

    Li, M., Gao, J., Zhang, Z., Fu, C., Lal, C. & Conti, M., 2022, Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 89-96 8 p. (Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Downloads (Pure)
  • Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand

    Cardaioli, M., Cecconello, S., Conti, M., Milani, S., Picek, S. & Saraci, E., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 1687-1704 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    34 Downloads (Pure)
  • Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing

    Brighente, A., Conti, M. & Sciancalepore, S., 2022, Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022. Association for Computing Machinery (ACM), 134. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • HolA: Holistic and Autonomous Attestation for IoT Networks

    Visintin, A., Toffalini, F., Losiouk, E., Conti, M. & Zhou, J., 2022, Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings. Zhou, J., Chattopadhyay, S., Adepu, S., Alcaraz, C., Batina, L., Casalicchio, E., Jin, C., Lin, J., Losiouk, E., Majumdar, S., Meng, W., Picek, S., Zhauniarovich, Y., Shao, J., Su, C., Wang, C. & Zonouz, S. (eds.). Springer, p. 277-296 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13285 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • ICN PATTA: ICN privacy attack through traffic analysis

    Bardhi, E., Conti, M., Lazzeretti, R. & Losiouk, E., 2021, Proceedings of the IEEE 46th Conference on Local Computer Networks, LCN 2021. Khoukhi, L., Oteafy, S. & Bulut, E. (eds.). IEEE, p. 443-446 4 p. (Proceedings - Conference on Local Computer Networks, LCN; vol. 2021-October).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • ICSpot: A High-Interaction Honeypot for Industrial Control Systems

    Conti, M., Trolese, F. & Turrin, F., 2022, 2022 International Symposium on Networks, Computers and Communications, ISNCC 2022. Institute of Electrical and Electronics Engineers (IEEE), (2022 International Symposium on Networks, Computers and Communications, ISNCC 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Improving password guessing via representation learning

    Pasquini, D., Gangwal, A., Ateniese, G., Bernaschi, M. & Conti, M., 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Institute of Electrical and Electronics Engineers (IEEE), p. 1382-1399 18 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2021-May).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    25 Citations (Scopus)
  • It's a Matter of Style: Detecting Social Bots through Writing Style Consistency

    Cardaioli, M., Conti, M., Sorbo, A. D., Fabrizio, E., Laudanna, S. & Visaggio, C. A., 2021, 30th International Conference on Computer Communications and Networks, ICCCN 2021. Institute of Electrical and Electronics Engineers (IEEE), (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2021-July).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Knocking on Tangle's Doors: Security Analysis of IOTA Ports

    Brighente, A., Conti, M., Kumar, G., Ghanbari, R. & Saha, R., 2021, Proceedings - 2021 IEEE International Conference on Blockchain, Blockchain 2021. Xiang, Y., Wang, Z., Wang, H. & Niemi, V. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 433-439 7 p. (Proceedings - 2021 IEEE International Conference on Blockchain, Blockchain 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Label-Only Membership Inference Attack against \\Node-Level Graph Neural Networks

    Conti, M., Li, J., Picek, S. & Xu, J., 2022, AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022. Association for Computing Machinery (ACM), p. 1–12 12 p. (AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    43 Downloads (Pure)
  • Malingering Scraper: A Novel Framework to Reconstruct Honest Profiles from Malingerer Psychopathological Tests

    Cardaioli, M., Cecconello, S., Monaro, M., Sartori, G., Conti, M. & Orrù, G., 2021, Neural Information Processing - 28th International Conference, ICONIP 2021, Proceedings. Mantoro, T., Lee, M., Ayu, M. A., Wong, K. W. & Hidayanto, A. N. (eds.). Springer, p. 433-440 8 p. (Communications in Computer and Information Science; vol. 1517 CCIS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • MeLSeC: A Method for Lightweight and Secure Communication in Internet of Vehicles

    Brighente, A., Conti, M. & Vasudev, H., 2022, Proceedings of the 2022 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2022. Fortino, G., Gravina, R., Guerrieri, A. & Savaglio, C. (eds.). Institute of Electrical and Electronics Engineers (IEEE), 8 p. (Proceedings of the 2022 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • MiniV2G: An Electric Vehicle Charging Emulator

    Attanasio, L., Conti, M., Donadel, D. & Turrin, F., 2021, CPSS 2021 - Proceedings of the 7th ACM Cyber-Physical System Security Workshop. Association for Computing Machinery (ACM), p. 65-73 9 p. (CPSS 2021 - Proceedings of the 7th ACM Cyber-Physical System Security Workshop).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Modeling memory phenomena for partial discharge processes in insulation cavities

    Cavallini, A., Conti, M., Morshuis, PHF. & Montanari, GC., 2003, 2003 annual report conference on electrical insulation and dielectric phenomena. Agurwal, K. (ed.). Piscataway: IEEE Society, p. 723-727 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    28 Citations (Scopus)
  • One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud

    Chen, Y., Li, M., Zheng, S., Hu, D., Lal, C. & Conti, M., 2020, Information and Communications Security - 22nd International Conference, ICICS 2020, Proceedings. Meng, W., Gollmann, D., Jensen, C. D. & Zhou, J. (eds.). Springer, p. 350-365 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12282 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • OpenScope-sec: An ADS-B Simulator to Support the Security Research

    Cestaro, R., Conti, M., Mancini, E. & Turrin, F., 29 Aug 2023, ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings. Association for Computing Machinery (ACM), 116

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review