Mauro Conti
Mauro Conti Position: Visiting Professor School/office: School of Science and TechnologyEmail: bWF1cm8uY29udGk7b3J1LnNl
Phone: No number available
Room: T2243
Research subject
Research environments
Research groups
Publications
Articles in journals |
Conference papers |
Articles in journals
- Nowroozi, E. , Mohammadi, M. , Rahdari, A. , Taheri, R. & Conti, M. (2025). A Random Deep Feature Selection Approach to Mitigate Transferable Adversarial Attacks. IEEE Transactions on Network and Service Management, 22 (6), 5301-5310. [BibTeX]
- Balasubramanian, K. , Baragur, A. G. , Donadel, D. , Sahabandu, D. , Brighente, A. , Ramasubramanian, B. , Conti, M. & Poovendran, R. (2025). CANLP: Intrusion Detection for Controller Area Networks Using Natural Language Processing and Embedded Machine Learning. IEEE Transactions on Dependable and Secure Computing, 22 (6), 7203-7214. [BibTeX]
- Luo, H. , Li, G. , Brighente, A. , Conti, M. , Xing, Y. , Hu, A. & Wang, X. (2025). Channel-Robust RF Fingerprint Identification for Multi-Antenna 5G User Equipments. IEEE Transactions on Information Forensics and Security, 20, 10761-10776. [BibTeX]
- Kumar, G. , Saha, R. , Conti, M. & Kim, T. (2025). DAWS: A Comprehensive Solution Against De-Anonymization Attacks in Blockchains. IEEE Transactions on Network and Service Management, 22 (5), 4747-4761. [BibTeX]
- Venturini, M. , Freda, F. , Miotto, E. , Conti, M. & Giaretta, A. (2025). Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations. IEEE Transactions on Dependable and Secure Computing, 22 (4), 3449-3464. [BibTeX]
- Wang, L. , Zhang, L. , Choo, K. R. , Domingo-Ferrer, J. , Conti, M. & Gao, Y. (2025). Dual-Server Privacy-Preserving Collaborative Deep Learning: A Round-Efficient, Dynamic and Lossless Approach. IEEE Transactions on Dependable and Secure Computing, 22 (6), 7759-7772. [BibTeX]
- Xu, S. , Brighente, A. , Chen, B. , Conti, M. & Peng, S. (2025). Ghost of the Navigator: Spoofing Attack Against Direction-of-Arrival Estimation. IEEE Internet of Things Journal, 12 (23), 49932-49941. [BibTeX]
- Li, M. , Ding, H. , Chen, Y. , Qiao, Y. , Zhang, Z. , Zhu, L. & Conti, M. (2025). Threshold Signatures With Verifiably Timed Combining and Message-Dependent Tracing. IEEE Transactions on Information Forensics and Security, 20, 9477-9491. [BibTeX]
- Li, M. , Chen, Y. , Qiao, Y. , Ye, G. , Zhang, Z. , Zhu, L. & Conti, M. (2025). Trust in a Decentralized World: Data Governance From Faithful, Private, Verifiable, and Traceable Data Feeds. IEEE Transactions on Information Forensics and Security, 20, 10818-10833. [BibTeX]
- Kumar, G. , Saha, R. , Conti, M. & Kim, T. H. (2025). ZAKON: A decentralized framework for digital forensic admissibility and justification. Information Processing & Management, 62 (6). [BibTeX]
- Tavella, F. , Giaretta, A. , Conti, M. & Balasubramaniam, S. (2022). A machine learning-based approach to detect threats in bio-cyber DNA storage systems. Computer Communications, 187, 59-70. [BibTeX]
- Pirayesh, J. , Giaretta, A. , Conti, M. & Keshavarzi, P. (2022). A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Computer Networks, 216. [BibTeX]
- Tavella, F. , Giaretta, A. , Dooley-Cullinane, T. M. , Conti, M. , Coffey, L. & Balasubramaniam, S. (2021). DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks. IEEE Transactions on Emerging Topics in Computing, 9 (3), 1566-1580. [BibTeX]
- Conti, M. , Dragoni, N. & Lesyk, V. (2016). A Survey of Man In The Middle Attacks. IEEE Communications Surveys and Tutorials, 18 (3), 2027-2051. [BibTeX]
- Giaretta, A. , Balasubramaniam, S. & Conti, M. (2016). Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks. IEEE Transactions on Information Forensics and Security, 11 (4), 665-676. [BibTeX]
Conference papers
- Marchiori, F. , Alecci, M. , Pajola, L. & Conti, M. (2026). DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?. In: Vincent Nicomette; Abdelmalek Benzekri; Nora Boulahia-Cuppens; Jaideep Vaidya, Computer Security – ESORICS 2025 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I. Paper presented at 30th European Symposium on Research in Computer Security (ESORICS 2025), Toulouse, France, September 22-24, 2025. (pp. 228-248). Springer. [BibTeX]
- Xu, J. , Wang, S. , Loscri, V. , Brighente, A. , Conti, M. & Rouvoy, R. (2026). GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness Through Tailored Conditional GAN Augmentation. In: Vincent Nicomette; Abdelmalek Benzekri; Nora Boulahia-Cuppens; Jaideep Vaidya, Computer Security – ESORICS 2025 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I. Paper presented at 30th European Symposium on Research in Computer Security (ESORICS 2025), Toulouse, France, September 22-24, 2025. (pp. 430-449). Springer. [BibTeX]
- Marin, E. , Kim, J. , Pavoni, A. , Conti, M. & Di Pietro, R. (2026). The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment. In: Vincent Nicomette; Abdelmalek Benzekri; Nora Boulahia-Cuppens; Jaideep Vaidya, Computer Security – ESORICS 2025 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III. Paper presented at 30th European Symposium on Research in Computer Security (ESORICS 2025), Toulouse, France, September 22-24, 2025. (pp. 382-401). Springer. [BibTeX]
- Brighente, A. , Cipolletta, L. , Conti, M. & Latini, L. (2025). Are Flow Correlation Attacks Effective on Tor? A Critical Evaluation of State-of-the-Art Proposals. In: 2025 IEEE Conference on Communications and Network Security (CNS) Proceedings. Paper presented at 2025 IEEE Conference on Communications and Network Security (CNS 2025), Avignon, France, September 8-11, 2025. IEEE. [BibTeX]
- Devgun, T. , Kumar, G. , Saha, R. , Brighente, A. & Conti, M. (2025). AWOSE: Probabilistic State Model for Consensus Algorithms' Fuzzing Frameworks. In: ASIA CCS '25 Proceedings of the 20th ACM Asia Conference on Computer and Communications Security. Paper presented at 20th Asia Conference on Computer and Communications Security (ASIA CCS '25), Hanoi, Vietnam, August 25-29, 2025. (pp. 955-970). Association for Computing Machinery (ACM). [BibTeX]
- Xu, S. , Wang, S. , Sciancalepore, S. , Brighente, A. & Conti, M. (2025). Confundus: Mitigating Hostile Wireless Source Localization. In: 2025 IEEE Conference on Communications and Network Security (CNS) Proceedings. Paper presented at 2025 IEEE Conference on Communications and Network Security (CNS 2025), Avignon, France, September 8-11, 2025. IEEE. [BibTeX]
- Nie, H. , Wang, W. , Xu, P. , Chen, W. , Yang, L. , Conti, M. & Liang, K. (2025). Peekaboo, I See Your Queries: Passive Attacks Against DSSE Via Intermittent Observations. In: CCS '25 Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security. Paper presented at ACM SIGSAC Conference on Computer and Communications Security (CCS '25), Taipei, Taiwan, October 13-17, 2025. (pp. 2429-2443). New York: Association for Computing Machinery, Inc. [BibTeX]
- Zhu, Y. , Chen, Z. , Yan, Q. , Wang, S. , Giaretta, A. , Li, E. , Peng, L. , Zhao, C. & et al. (2023). Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. In: Michele Zorzi; Meixia Tao; Walid Saad, ICC 2023 - IEEE International Conference on Communications. Paper presented at IEEE International Conference on Communications (ICC 2023), Rome, Italy, May 28 - June 1, 2023. (pp. 2338-2344). IEEE. [BibTeX]