This page in English

Mauro Conti

Mauro Conti Befattning: Gästprofessor Organisation: Institutionen för naturvetenskap och teknik

E-post: bWF1cm8uY29udGk7b3J1LnNl

Telefon: Telefonnummer saknas

Rum: T2243

Mauro Conti

Publikationer

Artiklar i tidskrifter |  Konferensbidrag | 

Artiklar i tidskrifter

Konferensbidrag

  • Li, M. , Li, Z. , Chen, Y. , Qiao, Y. & Conti, M. (2026). Artemis: Decentralized, Secure, and Efficient Safety Monitoring with Dynamic Trajectories. I: Jinguang Han; Yang Xiang; Guang Cheng; Willy Susilo; Liquan Chen,  Information and Communications Security 27th International Conference, ICICS 2025, Nanjing, China, October 29–31, 2025, Proceedings, Part I. Konferensbidrag vid 27th International Conference on Information and Communications Security-ICICS-Annual (ICICS 2025), Nanjing, China, October 29-31, 2025. (ss. 387-404). Springer. [BibTeX]
  • Marchiori, F. , Alecci, M. , Pajola, L. & Conti, M. (2026). DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?. I: Vincent Nicomette; Abdelmalek Benzekri; Nora Boulahia-Cuppens; Jaideep Vaidya,  Computer Security – ESORICS 2025 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I. Konferensbidrag vid 30th European Symposium on Research in Computer Security (ESORICS 2025), Toulouse, France, September 22-24, 2025. (ss. 228-248). Springer. [BibTeX]
  • Xu, J. , Wang, S. , Loscri, V. , Brighente, A. , Conti, M. & Rouvoy, R. (2026). GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness Through Tailored Conditional GAN Augmentation. I: Vincent Nicomette; Abdelmalek Benzekri; Nora Boulahia-Cuppens; Jaideep Vaidya,  Computer Security – ESORICS 2025 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I. Konferensbidrag vid 30th European Symposium on Research in Computer Security (ESORICS 2025), Toulouse, France, September 22-24, 2025. (ss. 430-449). Springer. [BibTeX]
  • Belousova, A. , Marchior, F. & Conti, M. (2026). Inference Attacks on Encrypted Online Voting via Traffic Analysis. I: Sang Kil Cha; Jeongeun Park,  Information Security 28th International Conference, ISC 2025, Seoul, South Korea, October 20–22, 2025, Proceedings. Konferensbidrag vid 28th International Conference on Information Security (ISC 2025), Sungkyunkwan University (SKKU), South Korea, October 20-22, 2025. (ss. 216-236). Springer. [BibTeX]
  • Marin, E. , Kim, J. , Pavoni, A. , Conti, M. & Di Pietro, R. (2026). The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment. I: Vincent Nicomette; Abdelmalek Benzekri; Nora Boulahia-Cuppens; Jaideep Vaidya,  Computer Security – ESORICS 2025 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III. Konferensbidrag vid 30th European Symposium on Research in Computer Security (ESORICS 2025), Toulouse, France, September 22-24, 2025. (ss. 382-401). Springer. [BibTeX]
  • Brighente, A. , Cipolletta, L. , Conti, M. & Latini, L. (2025). Are Flow Correlation Attacks Effective on Tor? A Critical Evaluation of State-of-the-Art Proposals. I:  2025 IEEE Conference on Communications and Network Security (CNS) Proceedings. Konferensbidrag vid 2025 IEEE Conference on Communications and Network Security (CNS 2025), Avignon, France, September 8-11, 2025. IEEE. [BibTeX]
  • Devgun, T. , Kumar, G. , Saha, R. , Brighente, A. & Conti, M. (2025). AWOSE: Probabilistic State Model for Consensus Algorithms' Fuzzing Frameworks. I:  ASIA CCS '25 Proceedings of the 20th ACM Asia Conference on Computer and Communications Security. Konferensbidrag vid 20th Asia Conference on Computer and Communications Security (ASIA CCS '25), Hanoi, Vietnam, August 25-29, 2025. (ss. 955-970). Association for Computing Machinery (ACM). [BibTeX]
  • Xu, S. , Wang, S. , Sciancalepore, S. , Brighente, A. & Conti, M. (2025). Confundus: Mitigating Hostile Wireless Source Localization. I:  2025 IEEE Conference on Communications and Network Security (CNS) Proceedings. Konferensbidrag vid 2025 IEEE Conference on Communications and Network Security (CNS 2025), Avignon, France, September 8-11, 2025. IEEE. [BibTeX]
  • Caripoti, E. , Pajola, L. , Banzer, S. , Pizzi, S. , Conti, M. & Apruzzese, G. (2025). E-PhishGEN: Unlocking Novel Research in Phishing Email Detection. I:  Proceedings of the 18th ACM Workshop on Artificial Intelligenceand Security (AISec 2025). Konferensbidrag vid 18th Workshop on Artificial Intelligence and Security (AISec '25), Taipei, Taiwan, October 13-17, 2025. (ss. 64-76). Association for Computing Machinery (ACM). [BibTeX]
  • Nie, H. , Wang, W. , Xu, P. , Chen, W. , Yang, L. , Conti, M. & Liang, K. (2025). Peekaboo, I See Your Queries: Passive Attacks Against DSSE Via Intermittent Observations. I:  CCS '25 Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security. Konferensbidrag vid ACM SIGSAC Conference on Computer and Communications Security (CCS '25), Taipei, Taiwan, October 13-17, 2025. (ss. 2429-2443). New York: Association for Computing Machinery, Inc. [BibTeX]
  • Castagnaro, A. , Salviati, U. , Conti, M. , Pajola, L. & Pizzi, S. (2025). The Hidden Threat in Plain Text: Attacking RAG Data Loaders. I:  Proceedings of the 18th ACM Workshop on Artificial Intelligenceand Security (AISec 2025). Konferensbidrag vid 18th Workshop on Artificial Intelligence and Security (AISec '25), Taipei, Taiwan, October 13-17, 2025. (ss. 170-181). New York: Association for Computing Machinery (ACM). [BibTeX]
  • Zhu, Y. , Chen, Z. , Yan, Q. , Wang, S. , Giaretta, A. , Li, E. , Peng, L. , Zhao, C. & et al. (2023). Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. I: Michele Zorzi; Meixia Tao; Walid Saad,  ICC 2023 - IEEE International Conference on Communications. Konferensbidrag vid IEEE International Conference on Communications (ICC 2023), Rome, Italy, May 28 - June 1, 2023. (ss. 2338-2344). IEEE. [BibTeX]