Get our free extension to see links to code for papers anywhere online!

Chrome logo Add to Chrome

Firefox logo Add to Firefox

Picture for Mauro Conti

Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

Jul 30, 2021
Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek

  Access Paper or Ask Questions

Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System

Jun 29, 2021
Mauro Conti, Simone Milani, Ehsan Nowroozi, Gabriele Orazi

* 6 pages 

  Access Paper or Ask Questions

Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack

Apr 13, 2021
Luca Pajola, Mauro Conti

* Accepted to appear in the Proceedings of the 2021 IEEE European Symposium on Security and Privacy (EUROS&P) 

  Access Paper or Ask Questions

A Machine Learning-based Approach to Detect Threats in Bio-Cyber DNA Storage Systems

Sep 28, 2020
Federico Tavella, Alberto Giaretta, Mauro Conti, Sasitharan Balasubramaniam

* 12 pages, 21 figures 

  Access Paper or Ask Questions

Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features

Aug 13, 2019
Rahim Taheri, Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Mauro Conti

* 18 pages, 8 figures, 8 tables, FGCS Elsevier journal 

  Access Paper or Ask Questions

On Defending Against Label Flipping Attacks on Malware Detection Systems

Aug 13, 2019
Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti

* 19 pages, 6 figures, 2 tables, NCAA Springer Journal 

  Access Paper or Ask Questions

Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach

Apr 20, 2019
Rahim Taheri, Reza Javidan, Mohammad Shojafar, Vinod P, Mauro Conti

* 20 pages, 6 figures, 5 tables 

  Access Paper or Ask Questions

All You Need is "Love": Evading Hate-speech Detection

Nov 05, 2018
Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan

* 11 pages, Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security (AISec) 2018 

  Access Paper or Ask Questions

FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware

Sep 17, 2018
Deepa K, Radhamani G, Vinod P, Mohammad Shojafar, Neeraj Kumar, Mauro Conti

* 26 pages, 6 figures, 9 tables, Journal Submission 

  Access Paper or Ask Questions