Fabio Pierazzi
Home
People
Service
Teaching
Opportunities
Publications
Posts
Contact
Fabio Pierazzi
Latest
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Position: “Real Attackers Don’t Compute Gradients”: Bridging the Gap Between Adversarial ML Research and Practice
Dos and Don'ts of Machine Learning in Computer Security
Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift
INSOMNIA: Towards Concept-Drift Robustness in Network Intrusion Detection
Investigating Labelless Drift Adaptation for Malware Detection
Universal Adversarial Perturbations for Malware
GLYPH: Efficient ML-based Detection of Heap Spraying Attacks
A Data-Driven Characterization of Modern Android Spyware
DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans
Detection and Threat Prioritization of Pivoting Attacks in Large Networks
Scalable Architecture for Online Prioritisation of Cyber Threats
EC2: Ensemble Clustering and Classification for Predicting Android Malware Families
A Probabilistic Logic of Cyber Deception
Security analytics for prevention and detection of advanced cyberattacks
Analysis of High Volumes of Network Traffic for Advanced Persistent Threat Detection
Countering Advanced Persistent Threats through security intelligence and big data analytics
Exploratory Security Analytics for Anomaly Detection
The Network Perspective of Cloud Security
Scalable Architecture for Multi-User Encrypted SQL Operations on Cloud Database Services
Security and privacy of location-based services for in-vehicle device systems
Efficient detection of unauthorized data modification in cloud databases
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cloud Databases
Security and confidentiality solutions for public cloud database services
Cite
×