Follow
Davide Maiorca
Davide Maiorca
Assistant Professor of Computer Engineering at University of Cagliari, Italy
Verified email at unica.it
Title
Cited by
Cited by
Year
Evasion attacks against machine learning at test time
B Biggio, I Corona, D Maiorca, B Nelson, N Šrndić, P Laskov, G Giacinto, ...
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2013
16472013
Adversarial malware binaries: Evading deep learning for malware detection in executables
B Kolosnjaji, A Demontis, B Biggio, D Maiorca, G Giacinto, C Eckert, ...
2018 26th European signal processing conference (EUSIPCO), 533-537, 2018
3812018
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
A Demontis, M Melis, B Biggio, D Maiorca, D Arp, K Rieck, I Corona, ...
IEEE Transactions on Dependable and Secure Computing, 2017
3192017
Stealth attacks: An extended insight into the obfuscation effects on android malware
D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto
Computers & Security 51, 16-31, 2015
2102015
A pattern recognition system for malicious pdf files detection
D Maiorca, G Giacinto, I Corona
International workshop on machine learning and data mining in pattern …, 2012
1592012
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection
D Maiorca, I Corona, G Giacinto
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
1562013
R-PackDroid: API package-based characterization and detection of mobile ransomware
D Maiorca, F Mercaldo, G Giacinto, CA Visaggio, F Martinelli
Proceedings of the symposium on applied computing, 1718-1723, 2017
1342017
Security evaluation of support vector machines in adversarial environments
B Biggio, I Corona, B Nelson, BIP Rubinstein, D Maiorca, G Fumera, ...
Support vector machines applications, 105-153, 2014
1262014
On the effectiveness of system API-related information for Android ransomware detection
M Scalas, D Maiorca, F Mercaldo, CA Visaggio, F Martinelli, G Giacinto
Computers & Security 86, 168-182, 2019
962019
Towards adversarial malware detection: Lessons learned from PDF-based attacks
D Maiorca, B Biggio, G Giacinto
ACM Computing Surveys (CSUR) 52 (4), 1-36, 2019
942019
Lux0r: Detection of malicious pdf-embedded javascript code through discriminant analysis of api references
I Corona, D Maiorca, D Ariu, G Giacinto
Proceedings of the 2014 workshop on artificial intelligent and security …, 2014
902014
On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms?
T Hupperich, D Maiorca, M Kührer, T Holz, G Giacinto
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
762015
Explaining black-box android malware detection
M Melis, D Maiorca, B Biggio, G Giacinto, F Roli
2018 26th european signal processing conference (EUSIPCO), 524-528, 2018
722018
A structural and content-based approach for a precise and robust detection of malicious pdf files
D Maiorca, D Ariu, I Corona, G Giacinto
Proceedings of the 1st International Conference on Information Systems …, 2015
662015
Clustering Android Malware Families by Http Traffic
M Aresu, D Ariu, M Ahmadi, D Maiorca, G Giacinto
552015
N., LASKOV, P., GIACINTO, G., AND ROLI, F. Evasion attacks against machine learning at test time
B Biggio, I Corona, D Maiorca, B Nelson, C Š RNDI
ECML PKDD, 387-402, 2013
502013
Digital investigation of pdf files: Unveiling traces of embedded malware
D Maiorca, B Biggio
IEEE Security & Privacy 17 (1), 63-71, 2019
462019
Do gradient-based explanations tell anything about adversarial robustness to android malware?
M Melis, M Scalas, A Demontis, D Maiorca, B Biggio, G Giacinto, F Roli
International journal of machine learning and cybernetics, 1-16, 2022
332022
PowerDrive: accurate de-obfuscation and analysis of PowerShell malware
D Ugarte, D Maiorca, F Cara, G Giacinto
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
332019
Evaluating analysis tools for android apps: Status quo and robustness against obfuscation
J Hoffmann, T Rytilahti, D Maiorca, M Winandy, G Giacinto, T Holz
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
332016
The system can't perform the operation now. Try again later.
Articles 1–20