CONTI, MAURO

CONTI, MAURO  

Dipartimento di Matematica "Tullio Levi-Civita" - DM  

Mostra records
Risultati 1 - 20 di 611 (tempo di esecuzione: 0.047 secondi).
Titolo Data di pubblicazione Autori Rivista Serie Titolo libro
A Practical Solution to Systematically Monitor Inconsistencies in SBOM-based Vulnerability Scanners 2026 Martin RossoMuhammad Asad Jahangir JaffarAlessandro BrighenteMauro Conti - - SAC '26: Proceedings of the 41st ACM/SIGAPP Symposium on Applied Computing
Disc-Cover Complexity Trends in Music Illustrations from Sinatra to Swift 2026 Stefano CecconelloMauro ContiAlessandro Galeazzi + - - SAC '26: Proceedings of the 41th ACM/SIGAPP Symposium on Applied Computing
Revealing The Secret Power: How Algorithms Can Influence Content Visibility on Twitter/X 2026 Alessandro GaleazziMauro Conti + - - Proceedings of the Network and Distributed System Security (NDSS) Symposium 2026
Terapia ormonale fai-da-te su Reddit: opportunità e rischi. 2026 Marina BonatoSaverio CavasinMauro ContiAlberto ScalaAndrea GarollaMarina Miscioscia. + - - Società Italiana Genere Identità Salute (SIGIS)
A Random Deep Feature Selection Approach to Mitigate Transferable Adversarial Attacks 2025 Conti, Mauro + IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT - -
Android malware defense through a hybrid multi-modal approach 2025 Conti M. + JOURNAL OF NETWORK AND COMPUTER APPLICATIONS - -
Are Flow Correlation Attacks Effective on Tor? A Critical Evaluation of State-of-the-Art Proposals 2025 Brighente A.Conti M. + - - 2025 IEEE Conference on Communications and Network Security (CNS)
ATTAQ: Adversarial Robustness of Quantum Machine Learning 2025 Marchiori, FrancescoConti, Mauro - - 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)
BDMFA: Forensic-enabling attestation technique for Internet of Medical Things 2025 Conti M. + INTERNET OF THINGS - -
Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection 2025 Yuan Y.Conti M. + COMPUTERS & SECURITY - -
Confundus: Mitigating Hostile Wireless Source Localization 2025 Wang, ShuoBrighente, AlessandroConti, Mauro + - - 2025 IEEE Conference on Communications and Network Security, CNS 2025
Connecting SBOM and CVE: an Insightful Study of Software Vulnerabilities 2025 Saha R.Conti M. + - - Proceedings - International Conference on Machine Learning and Cybernetics (ICMLC)
CovertPower: A Covert Channel on Android Devices Through USB Power Line 2025 Conti, Mauro + IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING - -
DAWS: A Comprehensive Solution Against De-anonymization Attacks in Blockchains 2025 Saha, RahulConti, Mauro + IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT - -
Deep learning fusion for effective malware detection: leveraging visual features 2025 Conti M. + CLUSTER COMPUTING - -
Do-It-Yourself Hormone Therapy for gender affirmation on Reddit: NLP-based analysis of healthcare opportunities and threats. 2025 Marina BonatoSaverio CavasinMauro ContiAlberto ScalaAndrea GarollaMarina Miscioscia + - - CIRSDe – Centro Interdisciplinare di Ricerche e Studi delle Donne e di Genere.
Exploring the Landscape of Programming Language Identification With Machine Learning Approaches 2025 Saha R.Brighente A.Conti M. + IEEE ACCESS - -
GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness Through Tailored Conditional GAN Augmentation 2025 Wang, ShuoBrighente, AlessandroConti, Mauro + - LECTURE NOTES IN COMPUTER SCIENCE Lecture Notes in Computer Science
Identity-Based Authentication for On-Demand Charging of Electric Vehicles 2025 Bianchi, TommasoBrighente, AlessandroConti, Mauro + IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING - -
Inference Attacks on Encrypted Online Voting via Traffic Analysis 2025 Marchiori, FrancescoConti, Mauro + - LECTURE NOTES IN COMPUTER SCIENCE Information Security