Alert button
Picture for Tommaso Zoppi

Tommaso Zoppi

Alert button

ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System

Add code
Bookmark button
Alert button
Feb 13, 2024
Tommaso Puccetti, Simone Nardi, Cosimo Cinquilli, Tommaso Zoppi, Andrea Ceccarelli

Viaarxiv icon

Ensembling Uncertainty Measures to Improve Safety of Black-Box Classifiers

Add code
Bookmark button
Alert button
Aug 23, 2023
Tommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli

Viaarxiv icon

On the Efficacy of Metrics to Describe Adversarial Attacks

Add code
Bookmark button
Alert button
Jan 30, 2023
Tommaso Puccetti, Tommaso Zoppi, Andrea Ceccarelli

Figure 1 for On the Efficacy of Metrics to Describe Adversarial Attacks
Figure 2 for On the Efficacy of Metrics to Describe Adversarial Attacks
Figure 3 for On the Efficacy of Metrics to Describe Adversarial Attacks
Figure 4 for On the Efficacy of Metrics to Describe Adversarial Attacks
Viaarxiv icon

Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection

Add code
Bookmark button
Alert button
Feb 28, 2022
Tommaso Zoppi, Andrea Ceccarelli

Figure 1 for Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection
Figure 2 for Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection
Figure 3 for Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection
Figure 4 for Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection
Viaarxiv icon

Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape

Add code
Bookmark button
Alert button
Dec 21, 2020
Tommaso Zoppi, Andrea ceccarelli, Tommaso Capecchi, Andrea Bondavalli

Figure 1 for Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape
Figure 2 for Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape
Figure 3 for Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape
Figure 4 for Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape
Viaarxiv icon