Mauro Conti
Mauro Conti Befattning: Gästprofessor Organisation: Institutionen för naturvetenskap och teknikE-post: bWF1cm8uY29udGk7b3J1LnNl
Telefon: Telefonnummer saknas
Rum: T2243
Forskargrupper
Publikationer
Artiklar i tidskrifter |
Konferensbidrag |
Artiklar i tidskrifter
- Nowroozi, E. , Mohammadi, M. , Rahdari, A. , Taheri, R. & Conti, M. (2025). A Random Deep Feature Selection Approach to Mitigate Transferable Adversarial Attacks. IEEE Transactions on Network and Service Management, 22 (6), 5301-5310. [BibTeX]
- Balasubramanian, K. , Baragur, A. G. , Donadel, D. , Sahabandu, D. , Brighente, A. , Ramasubramanian, B. , Conti, M. & Poovendran, R. (2025). CANLP: Intrusion Detection for Controller Area Networks Using Natural Language Processing and Embedded Machine Learning. IEEE Transactions on Dependable and Secure Computing, 22 (6), 7203-7214. [BibTeX]
- Luo, H. , Li, G. , Brighente, A. , Conti, M. , Xing, Y. , Hu, A. & Wang, X. (2025). Channel-Robust RF Fingerprint Identification for Multi-Antenna 5G User Equipments. IEEE Transactions on Information Forensics and Security, 20, 10761-10776. [BibTeX]
- Kumar, G. , Saha, R. , Conti, M. & Kim, T. (2025). DAWS: A Comprehensive Solution Against De-Anonymization Attacks in Blockchains. IEEE Transactions on Network and Service Management, 22 (5), 4747-4761. [BibTeX]
- Venturini, M. , Freda, F. , Miotto, E. , Conti, M. & Giaretta, A. (2025). Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations. IEEE Transactions on Dependable and Secure Computing, 22 (4), 3449-3464. [BibTeX]
- Wang, L. , Zhang, L. , Choo, K. R. , Domingo-Ferrer, J. , Conti, M. & Gao, Y. (2025). Dual-Server Privacy-Preserving Collaborative Deep Learning: A Round-Efficient, Dynamic and Lossless Approach. IEEE Transactions on Dependable and Secure Computing, 22 (6), 7759-7772. [BibTeX]
- Xu, S. , Brighente, A. , Chen, B. , Conti, M. & Peng, S. (2025). Ghost of the Navigator: Spoofing Attack Against Direction-of-Arrival Estimation. IEEE Internet of Things Journal, 12 (23), 49932-49941. [BibTeX]
- Li, M. , Ding, H. , Chen, Y. , Qiao, Y. , Zhang, Z. , Zhu, L. & Conti, M. (2025). Threshold Signatures With Verifiably Timed Combining and Message-Dependent Tracing. IEEE Transactions on Information Forensics and Security, 20, 9477-9491. [BibTeX]
- Li, M. , Chen, Y. , Qiao, Y. , Ye, G. , Zhang, Z. , Zhu, L. & Conti, M. (2025). Trust in a Decentralized World: Data Governance From Faithful, Private, Verifiable, and Traceable Data Feeds. IEEE Transactions on Information Forensics and Security, 20, 10818-10833. [BibTeX]
- Kumar, G. , Saha, R. , Conti, M. & Kim, T. H. (2025). ZAKON: A decentralized framework for digital forensic admissibility and justification. Information Processing & Management, 62 (6). [BibTeX]
- Tavella, F. , Giaretta, A. , Conti, M. & Balasubramaniam, S. (2022). A machine learning-based approach to detect threats in bio-cyber DNA storage systems. Computer Communications, 187, 59-70. [BibTeX]
- Pirayesh, J. , Giaretta, A. , Conti, M. & Keshavarzi, P. (2022). A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Computer Networks, 216. [BibTeX]
- Tavella, F. , Giaretta, A. , Dooley-Cullinane, T. M. , Conti, M. , Coffey, L. & Balasubramaniam, S. (2021). DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks. IEEE Transactions on Emerging Topics in Computing, 9 (3), 1566-1580. [BibTeX]
- Conti, M. , Dragoni, N. & Lesyk, V. (2016). A Survey of Man In The Middle Attacks. IEEE Communications Surveys and Tutorials, 18 (3), 2027-2051. [BibTeX]
- Giaretta, A. , Balasubramaniam, S. & Conti, M. (2016). Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks. IEEE Transactions on Information Forensics and Security, 11 (4), 665-676. [BibTeX]
Konferensbidrag
- Brighente, A. , Cipolletta, L. , Conti, M. & Latini, L. (2025). Are Flow Correlation Attacks Effective on Tor? A Critical Evaluation of State-of-the-Art Proposals. I: 2025 IEEE Conference on Communications and Network Security (CNS) Proceedings. Konferensbidrag vid 2025 IEEE Conference on Communications and Network Security (CNS 2025), Avignon, France, September 8-11, 2025. IEEE. [BibTeX]
- Devgun, T. , Kumar, G. , Saha, R. , Brighente, A. & Conti, M. (2025). AWOSE: Probabilistic State Model for Consensus Algorithms' Fuzzing Frameworks. I: ASIA CCS '25 Proceedings of the 20th ACM Asia Conference on Computer and Communications Security. Konferensbidrag vid 20th Asia Conference on Computer and Communications Security (ASIA CCS '25), Hanoi, Vietnam, August 25-29, 2025. (ss. 955-970). Association for Computing Machinery (ACM). [BibTeX]
- Xu, S. , Wang, S. , Sciancalepore, S. , Brighente, A. & Conti, M. (2025). Confundus: Mitigating Hostile Wireless Source Localization. I: 2025 IEEE Conference on Communications and Network Security (CNS) Proceedings. Konferensbidrag vid 2025 IEEE Conference on Communications and Network Security (CNS 2025), Avignon, France, September 8-11, 2025. IEEE. [BibTeX]
- Nie, H. , Wang, W. , Xu, P. , Chen, W. , Yang, L. , Conti, M. & Liang, K. (2025). Peekaboo, I See Your Queries: Passive Attacks Against DSSE Via Intermittent Observations. I: CCS '25 Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security. Konferensbidrag vid ACM SIGSAC Conference on Computer and Communications Security (CCS '25), Taipei, Taiwan, October 13-17, 2025. (ss. 2429-2443). New York: Association for Computing Machinery, Inc. [BibTeX]
- Zhu, Y. , Chen, Z. , Yan, Q. , Wang, S. , Giaretta, A. , Li, E. , Peng, L. , Zhao, C. & et al. (2023). Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. I: Michele Zorzi; Meixia Tao; Walid Saad, ICC 2023 - IEEE International Conference on Communications. Konferensbidrag vid IEEE International Conference on Communications (ICC 2023), Rome, Italy, May 28 - June 1, 2023. (ss. 2338-2344). IEEE. [BibTeX]