Mauro Conti
Mauro Conti Position: Visiting Professor School/office: School of Science and TechnologyEmail: bWF1cm8uY29udGk7b3J1LnNl
Phone: No number available
Room: T2243
Research subject
Research environments
Research groups
Publications
Articles in journals |
Conference papers |
Articles in journals
- Nowroozi, E. , Mohammadi, M. , Rahdari, A. , Taheri, R. & Conti, M. (2025). A Random Deep Feature Selection Approach to Mitigate Transferable Adversarial Attacks. IEEE Transactions on Network and Service Management, 22 (6), 5301-5310. [BibTeX]
- Balasubramanian, K. , Baragur, A. G. , Donadel, D. , Sahabandu, D. , Brighente, A. , Ramasubramanian, B. , Conti, M. & Poovendran, R. (2025). CANLP: Intrusion Detection for Controller Area Networks Using Natural Language Processing and Embedded Machine Learning. IEEE Transactions on Dependable and Secure Computing, 22 (6), 7203-7214. [BibTeX]
- Luo, H. , Li, G. , Brighente, A. , Conti, M. , Xing, Y. , Hu, A. & Wang, X. (2025). Channel-Robust RF Fingerprint Identification for Multi-Antenna 5G User Equipments. IEEE Transactions on Information Forensics and Security, 20, 10761-10776. [BibTeX]
- Kumar, G. , Saha, R. , Conti, M. & Kim, T. (2025). DAWS: A Comprehensive Solution Against De-Anonymization Attacks in Blockchains. IEEE Transactions on Network and Service Management, 22 (5), 4747-4761. [BibTeX]
- Venturini, M. , Freda, F. , Miotto, E. , Conti, M. & Giaretta, A. (2025). Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations. IEEE Transactions on Dependable and Secure Computing, 22 (4), 3449-3464. [BibTeX]
- Wang, L. , Zhang, L. , Choo, K. R. , Domingo-Ferrer, J. , Conti, M. & Gao, Y. (2025). Dual-Server Privacy-Preserving Collaborative Deep Learning: A Round-Efficient, Dynamic and Lossless Approach. IEEE Transactions on Dependable and Secure Computing, 22 (6), 7759-7772. [BibTeX]
- Xu, S. , Brighente, A. , Chen, B. , Conti, M. & Peng, S. (2025). Ghost of the Navigator: Spoofing Attack Against Direction-of-Arrival Estimation. IEEE Internet of Things Journal, 12 (23), 49932-49941. [BibTeX]
- Li, M. , Ding, H. , Chen, Y. , Qiao, Y. , Zhang, Z. , Zhu, L. & Conti, M. (2025). Threshold Signatures With Verifiably Timed Combining and Message-Dependent Tracing. IEEE Transactions on Information Forensics and Security, 20, 9477-9491. [BibTeX]
- Li, M. , Chen, Y. , Qiao, Y. , Ye, G. , Zhang, Z. , Zhu, L. & Conti, M. (2025). Trust in a Decentralized World: Data Governance From Faithful, Private, Verifiable, and Traceable Data Feeds. IEEE Transactions on Information Forensics and Security, 20, 10818-10833. [BibTeX]
- Kumar, G. , Saha, R. , Conti, M. & Kim, T. H. (2025). ZAKON: A decentralized framework for digital forensic admissibility and justification. Information Processing & Management, 62 (6). [BibTeX]
- Tavella, F. , Giaretta, A. , Conti, M. & Balasubramaniam, S. (2022). A machine learning-based approach to detect threats in bio-cyber DNA storage systems. Computer Communications, 187, 59-70. [BibTeX]
- Pirayesh, J. , Giaretta, A. , Conti, M. & Keshavarzi, P. (2022). A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Computer Networks, 216. [BibTeX]
- Tavella, F. , Giaretta, A. , Dooley-Cullinane, T. M. , Conti, M. , Coffey, L. & Balasubramaniam, S. (2021). DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks. IEEE Transactions on Emerging Topics in Computing, 9 (3), 1566-1580. [BibTeX]
- Conti, M. , Dragoni, N. & Lesyk, V. (2016). A Survey of Man In The Middle Attacks. IEEE Communications Surveys and Tutorials, 18 (3), 2027-2051. [BibTeX]
- Giaretta, A. , Balasubramaniam, S. & Conti, M. (2016). Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks. IEEE Transactions on Information Forensics and Security, 11 (4), 665-676. [BibTeX]
Conference papers
- Brighente, A. , Cipolletta, L. , Conti, M. & Latini, L. (2025). Are Flow Correlation Attacks Effective on Tor? A Critical Evaluation of State-of-the-Art Proposals. Institute of Electrical and Electronics Engineers Inc.. [BibTeX]
- Devgun, T. , Kumar, G. , Saha, R. , Brighente, A. & Conti, M. (2025). AWOSE: Probabilistic State Model for Consensus Algorithms' Fuzzing Frameworks. In: ASIA CCS '25 Proceedings of the 20th ACM Asia Conference on Computer and Communications Security. Paper presented at 20th Asia Conference on Computer and Communications Security (ASIA CCS '25), Hanoi, Vietnam, August 25-29, 2025. (pp. 955-970). Association for Computing Machinery (ACM). [BibTeX]
- Xu, S. , Wang, S. , Sciancalepore, S. , Brighente, A. & Conti, M. (2025). Confundus: Mitigating Hostile Wireless Source Localization. Institute of Electrical and Electronics Engineers Inc.. [BibTeX]
- Nie, H. , Wang, W. , Xu, P. , Chen, W. , Yang, L. , Conti, M. & Liang, K. (2025). Peekaboo, I See Your Queries: Passive Attacks Against DSSE Via Intermittent Observations. Association for Computing Machinery, Inc. [BibTeX]
- Zhu, Y. , Chen, Z. , Yan, Q. , Wang, S. , Giaretta, A. , Li, E. , Peng, L. , Zhao, C. & et al. (2023). Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. In: Michele Zorzi; Meixia Tao; Walid Saad, ICC 2023 - IEEE International Conference on Communications. Paper presented at IEEE International Conference on Communications (ICC 2023), Rome, Italy, May 28 - June 1, 2023. (pp. 2338-2344). IEEE. [BibTeX]