


Остановите войну!
for scientists:


default search action
Giovanni Apruzzese
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j6]Giovanni Apruzzese
, Luca Pajola
, Mauro Conti
:
The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems. IEEE Trans. Netw. Serv. Manag. 19(4): 5152-5169 (2022) - [j5]Giovanni Apruzzese
, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov:
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples. IEEE Trans. Netw. Serv. Manag. 19(4): 5312-5332 (2022) - [c11]Giovanni Apruzzese
, Mauro Conti
, Ying Yuan
:
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. ACSAC 2022: 171-185 - [c10]Giovanni Apruzzese
, Pavel Laskov, Aliya Tastemirova:
SoK: The Impact of Unlabelled Data in Cyberthreat Detection. EuroS&P 2022: 20-42 - [c9]Johannes Schneider, Giovanni Apruzzese
:
Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike. SP Workshops 2022: 66-72 - [i13]Giovanni Apruzzese, Luca Pajola, Mauro Conti:
The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems. CoRR abs/2203.04686 (2022) - [i12]Johannes Schneider, Giovanni Apruzzese:
Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike. CoRR abs/2203.10166 (2022) - [i11]Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova:
SoK: The Impact of Unlabelled Data in Cyberthreat Detection. CoRR abs/2205.08944 (2022) - [i10]Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco:
The Role of Machine Learning in Cybersecurity. CoRR abs/2206.09707 (2022) - [i9]Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov:
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples. CoRR abs/2207.01531 (2022) - [i8]Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti:
Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2. CoRR abs/2210.09028 (2022) - [i7]Jacqueline Meyer, Giovanni Apruzzese:
Cybersecurity in the Smart Grid: Practitioners' Perspective. CoRR abs/2210.13119 (2022) - [i6]Giovanni Apruzzese, Mauro Conti, Ying Yuan:
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. CoRR abs/2210.13660 (2022) - [i5]Giovanni Apruzzese, V. S. Subrahmanian:
Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors. CoRR abs/2212.05380 (2022) - [i4]Giovanni Apruzzese, Hyrum S. Anderson, Savino Dambra, David Freeman, Fabio Pierazzi, Kevin A. Roundy:
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice. CoRR abs/2212.14315 (2022) - 2021
- [c8]Andrea Corsini
, Shanchieh Jay Yang, Giovanni Apruzzese
:
On the Evaluation of Sequential Machine Learning for Network Intrusion Detection. ARES 2021: 113:1-113:10 - [c7]Martin Husák, Giovanni Apruzzese, Shanchieh Jay Yang, Gordon Werner:
Towards an Efficient Detection of Pivoting Activity. IM 2021: 980-985 - [i3]Andrea Corsini, Shanchieh Jay Yang, Giovanni Apruzzese:
On the Evaluation of Sequential Machine Learning for Network Intrusion Detection. CoRR abs/2106.07961 (2021) - [i2]Giovanni Apruzzese, Mauro Andreolini, Luca Ferretti, Mirco Marchetti, Michele Colajanni:
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems. CoRR abs/2106.09380 (2021) - 2020
- [j4]Giovanni Apruzzese
, Mauro Andreolini, Mirco Marchetti
, Vincenzo Giuseppe Colacino, Giacomo Russo:
AppCon: Mitigating Evasion Attacks to ML Cyber Detectors. Symmetry 12(4): 653 (2020) - [j3]Giovanni Apruzzese
, Fabio Pierazzi
, Michele Colajanni
, Mirco Marchetti
:
Detection and Threat Prioritization of Pivoting Attacks in Large Networks. IEEE Trans. Emerg. Top. Comput. 8(2): 404-415 (2020) - [j2]Giovanni Apruzzese
, Mauro Andreolini, Michele Colajanni
, Mirco Marchetti
:
Hardening Random Forest Cyber Detectors Against Adversarial Attacks. IEEE Trans. Emerg. Top. Comput. Intell. 4(4): 427-439 (2020) - [j1]Giovanni Apruzzese
, Mauro Andreolini
, Mirco Marchetti
, Andrea Venturi
, Michele Colajanni
:
Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks. IEEE Trans. Netw. Serv. Manag. 17(4): 1975-1987 (2020)
2010 – 2019
- 2019
- [c6]Giovanni Apruzzese, Michele Colajanni
, Luca Ferretti
, Mirco Marchetti
:
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning. CyCon 2019: 1-18 - [c5]Giovanni Apruzzese, Michele Colajanni, Mirco Marchetti:
Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors. NCA 2019: 1-8 - [i1]Giovanni Apruzzese, Mauro Andreolini, Michele Colajanni, Mirco Marchetti:
Hardening Random Forest Cyber Detectors Against Adversarial Attacks. CoRR abs/1912.03790 (2019) - 2018
- [c4]Giovanni Apruzzese
, Michele Colajanni
, Luca Ferretti
, Alessandro Guido, Mirco Marchetti
:
On the effectiveness of machine and deep learning for cyber security. CyCon 2018: 371-390 - [c3]Giovanni Apruzzese
, Michele Colajanni
:
Evading Botnet Detectors Based on Flows and Random Forest with Adversarial Samples. NCA 2018: 1-8 - 2017
- [c2]Fabio Pierazzi
, Giovanni Apruzzese
, Michele Colajanni
, Alessandro Guido, Mirco Marchetti
:
Scalable architecture for online prioritisation of cyber threats. CyCon 2017: 1-18 - [c1]Giovanni Apruzzese
, Mirco Marchetti
, Michele Colajanni, Gabriele Gambigliani Zoccoli, Alessandro Guido:
Identifying malicious hosts involved in periodic communications. NCA 2017: 11-18
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-02-17 23:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint