TESSERACT: Eliminating experimental bias in malware classification across space and time F Pendlebury, F Pierazzi, R Jordaney, J Kinder, L Cavallaro 28th USENIX security symposium (USENIX Security 19), 729-746, 2019 | 427 | 2019 |
Dos and don’ts of machine learning in computer security D Arp, E Quiring, F Pendlebury, A Warnecke, F Pierazzi, C Wressnegger, ... 31st USENIX Security Symposium (USENIX Security 22), USENIX Association …, 2022 | 371 | 2022 |
Intriguing properties of adversarial ml attacks in the problem space F Pierazzi, F Pendlebury, J Cortellazzi, L Cavallaro 2020 IEEE symposium on security and privacy (SP), 1332-1349, 2020 | 311 | 2020 |
Analysis of high volumes of network traffic for advanced persistent threat detection M Marchetti, F Pierazzi, M Colajanni, A Guido Computer Networks 109, 127-141, 2016 | 210 | 2016 |
Ec2: Ensemble clustering and classification for predicting android malware families T Chakraborty, F Pierazzi, VS Subrahmanian IEEE Transactions on Dependable and Secure Computing 17 (2), 262-277, 2017 | 144 | 2017 |
Insomnia: Towards concept-drift robustness in network intrusion detection G Andresini, F Pendlebury, F Pierazzi, C Loglisci, A Appice, L Cavallaro Proceedings of the 14th ACM workshop on artificial intelligence and security …, 2021 | 94 | 2021 |
“Real Attackers Don't Compute Gradients”: Bridging the Gap between Adversarial ML Research and Practice G Apruzzese, HS Anderson, S Dambra, D Freeman, F Pierazzi, K Roundy 2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), 339-364, 2023 | 81 | 2023 |
Transcending Transcend: Revisiting malware classification in the presence of concept drift F Barbero, F Pendlebury, F Pierazzi, L Cavallaro 2022 IEEE Symposium on Security and Privacy (S&P), 805-823, 2022 | 79* | 2022 |
A probabilistic logic of cyber deception S Jajodia, N Park, F Pierazzi, A Pugliese, E Serra, GI Simari, ... IEEE Transactions on Information Forensics and Security 12 (11), 2532-2544, 2017 | 67 | 2017 |
Countering Advanced Persistent Threats through security intelligence and big data analytics M Marchetti, F Pierazzi, A Guido, M Colajanni 2016 8th International Conference on Cyber Conflict (CyCon), 243-261, 2016 | 60 | 2016 |
Detection and threat prioritization of pivoting attacks in large networks G Apruzzese, F Pierazzi, M Colajanni, M Marchetti IEEE transactions on emerging topics in computing 8 (2), 404-415, 2017 | 47 | 2017 |
A data-driven characterization of modern Android spyware F Pierazzi, G Mezzour, Q Han, M Colajanni, VS Subrahmanian ACM Transactions on Management Information Systems (TMIS) 11 (1), 1-38, 2020 | 38 | 2020 |
Scalable architecture for multi-user encrypted SQL operations on cloud database services L Ferretti, F Pierazzi, M Colajanni, M Marchetti IEEE Transactions on Cloud computing 2 (4), 448-458, 2014 | 35 | 2014 |
Exploratory security analytics for anomaly detection F Pierazzi, S Casolari, M Colajanni, M Marchetti computers & security 56, 28-49, 2016 | 28 | 2016 |
Performance and cost evaluation of an adaptive encryption architecture for cloud databases L Ferretti, F Pierazzi, M Colajanni, M Marchetti IEEE transactions on cloud computing 2 (2), 143-155, 2014 | 28 | 2014 |
Jigsaw puzzle: Selective backdoor attack to subvert malware classifiers L Yang, Z Chen, J Cortellazzi, F Pendlebury, K Tu, F Pierazzi, L Cavallaro, ... IEEE Symposium on Security & Privacy (S&P), 2023 | 27 | 2023 |
Security and confidentiality solutions for public cloud database services L Ferretti, F Pierazzi, M Colajanni, M Marchetti The Seventh International Conference on Emerging Security Information …, 2013 | 27 | 2013 |
Scalable architecture for online prioritisation of cyber threats F Pierazzi, G Apruzzese, M Colajanni, A Guido, M Marchetti 2017 9th International Conference on Cyber Conflict (CyCon), 1-18, 2017 | 26 | 2017 |
Investigating labelless drift adaptation for malware detection Z Kan, F Pendlebury, F Pierazzi, L Cavallaro Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021 | 25 | 2021 |
Realizable universal adversarial perturbations for malware R Labaca-Castro, L Muñoz-González, F Pendlebury, GD Rodosek, ... arXiv preprint arXiv:2102.06747, 2021 | 24* | 2021 |