Alert button
Picture for Giovanni Apruzzese

Giovanni Apruzzese

Alert button

SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection

Add code
Bookmark button
Alert button
Apr 30, 2023
Giovanni Apruzzese, Pavel Laskov, Johannes Schneider

Figure 1 for SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection
Figure 2 for SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection
Figure 3 for SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection
Figure 4 for SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection
Viaarxiv icon

"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice

Add code
Bookmark button
Alert button
Dec 29, 2022
Giovanni Apruzzese, Hyrum S. Anderson, Savino Dambra, David Freeman, Fabio Pierazzi, Kevin A. Roundy

Figure 1 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Figure 2 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Figure 3 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Figure 4 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Viaarxiv icon

Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors

Add code
Bookmark button
Alert button
Dec 11, 2022
Giovanni Apruzzese, V. S. Subrahmanian

Figure 1 for Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors
Figure 2 for Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors
Figure 3 for Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors
Figure 4 for Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors
Viaarxiv icon

SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

Add code
Bookmark button
Alert button
Oct 24, 2022
Giovanni Apruzzese, Mauro Conti, Ying Yuan

Figure 1 for SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning
Figure 2 for SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning
Figure 3 for SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning
Figure 4 for SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning
Viaarxiv icon

Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2

Add code
Bookmark button
Alert button
Oct 17, 2022
Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti

Figure 1 for Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2
Figure 2 for Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2
Figure 3 for Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2
Figure 4 for Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2
Viaarxiv icon

Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples

Add code
Bookmark button
Alert button
Jul 04, 2022
Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov

Figure 1 for Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
Figure 2 for Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
Figure 3 for Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
Figure 4 for Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
Viaarxiv icon

The Role of Machine Learning in Cybersecurity

Add code
Bookmark button
Alert button
Jun 20, 2022
Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco

Figure 1 for The Role of Machine Learning in Cybersecurity
Figure 2 for The Role of Machine Learning in Cybersecurity
Figure 3 for The Role of Machine Learning in Cybersecurity
Figure 4 for The Role of Machine Learning in Cybersecurity
Viaarxiv icon

SoK: The Impact of Unlabelled Data in Cyberthreat Detection

Add code
Bookmark button
Alert button
May 18, 2022
Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova

Figure 1 for SoK: The Impact of Unlabelled Data in Cyberthreat Detection
Figure 2 for SoK: The Impact of Unlabelled Data in Cyberthreat Detection
Figure 3 for SoK: The Impact of Unlabelled Data in Cyberthreat Detection
Figure 4 for SoK: The Impact of Unlabelled Data in Cyberthreat Detection
Viaarxiv icon

Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike

Add code
Bookmark button
Alert button
Mar 18, 2022
Johannes Schneider, Giovanni Apruzzese

Figure 1 for Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike
Figure 2 for Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike
Figure 3 for Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike
Viaarxiv icon

The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

Add code
Bookmark button
Alert button
Mar 09, 2022
Giovanni Apruzzese, Luca Pajola, Mauro Conti

Figure 1 for The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Figure 2 for The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Figure 3 for The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Figure 4 for The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Viaarxiv icon