Picture for Michele Carminati

Michele Carminati

LeakSealer: A Semisupervised Defense for LLMs Against Prompt Injection and Leakage Attacks

Add code
Aug 01, 2025
Viaarxiv icon

Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation

Add code
Jun 12, 2025
Viaarxiv icon

TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems

Add code
Jun 09, 2025
Viaarxiv icon

An Anomaly Detection System Based on Generative Classifiers for Controller Area Network

Add code
Dec 28, 2024
Figure 1 for An Anomaly Detection System Based on Generative Classifiers for Controller Area Network
Figure 2 for An Anomaly Detection System Based on Generative Classifiers for Controller Area Network
Figure 3 for An Anomaly Detection System Based on Generative Classifiers for Controller Area Network
Figure 4 for An Anomaly Detection System Based on Generative Classifiers for Controller Area Network
Viaarxiv icon

A Secure and Trustworthy Network Architecture for Federated Learning Healthcare Applications

Add code
Apr 17, 2024
Figure 1 for A Secure and Trustworthy Network Architecture for Federated Learning Healthcare Applications
Figure 2 for A Secure and Trustworthy Network Architecture for Federated Learning Healthcare Applications
Figure 3 for A Secure and Trustworthy Network Architecture for Federated Learning Healthcare Applications
Figure 4 for A Secure and Trustworthy Network Architecture for Federated Learning Healthcare Applications
Viaarxiv icon

Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems

Add code
Jul 17, 2019
Figure 1 for Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems
Figure 2 for Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems
Figure 3 for Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems
Figure 4 for Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems
Viaarxiv icon