


Остановите войну!
for scientists:


default search action
Mauro Conti
Person information

- affiliation: University of Padua, Italy
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j239]Pier Paolo Tricomi
, Federica Nenna
, Luca Pajola
, Mauro Conti
, Luciano Gamberi:
You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality. IEEE Access 11: 9859-9875 (2023) - [j238]Hossein Ahmadvand
, Chhagan Lal
, Hadi Hemmati, Mehdi Sookhak
, Mauro Conti
:
Privacy-Preserving and Security in SDN-Based IoT: A Survey. IEEE Access 11: 44772-44786 (2023) - [j237]Alireza Dehlaghi-Ghadim
, Ali Balador
, Mahshid Helali Moghadam
, Hans Hansson
, Mauro Conti
:
ICSSIM - A framework for building industrial control systems security testbeds. Comput. Ind. 148: 103906 (2023) - [j236]Yassine Mekdad
, Ahmet Aris
, Leonardo Babun
, Abdeslam El Fergougui
, Mauro Conti
, Riccardo Lazzeretti
, A. Selcuk Uluagac
:
A survey on security and privacy issues of UAVs. Comput. Networks 224: 109626 (2023) - [j235]Anand Kumar, Karan Singh, Mohd Shariq, Chhagan Lal, Mauro Conti
, Ruhul Amin, Shehzad Ashraf Chaudhry
:
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems. Comput. Commun. 205: 147-157 (2023) - [j234]Tayyab Ali Khan, Karan Singh, Mohd Shariq, Khaleel Ahmad, K. S. Savita, Ali Ahmadian, Soheil Salahshour, Mauro Conti:
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach. Comput. Commun. 209: 217-229 (2023) - [j233]Gulshan Kumar, Rahul Saha, Mauro Conti
, Tannishtha Devgun, Rekha Goyat, Joel J. P. C. Rodrigues:
COUNT: Blockchain framework for resource accountability in e-healthcare. Comput. Commun. 209: 249-259 (2023) - [j232]PLS Jayalaxmi, Rahul Saha, Gulshan Kumar, Mamoun Alazab, Mauro Conti
, Xiaochun Cheng
:
PIGNUS: A Deep Learning model for IDS in industrial internet-of-things. Comput. Secur. 132: 103315 (2023) - [j231]Ankur O. Bang
, Udai Pratap Rao
, Pallavi Kaliyar
, Mauro Conti
:
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey. ACM Comput. Surv. 55(2): 44:1-44:36 (2023) - [j230]Reza Mohammadi, Chhagan Lal, Mauro Conti
:
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN. Int. J. Inf. Sec. 22(2): 367-379 (2023) - [j229]Zhihao Wang, Ding Ding, Min Ren, Mauro Conti
:
TANGO: A temporal spatial dynamic graph model for event prediction. Neurocomputing 542: 126249 (2023) - [j228]Amina Zahoor, Khalid Mahmood
, Salman Shamshad, Muhammad Asad Saleem, Muhammad Faizan Ayub, Mauro Conti
, Ashok Kumar Das
:
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF. Internet Things 22: 100708 (2023) - [j227]Rekha Goyat
, Gulshan Kumar
, Mauro Conti
, Tannishtha Devgun, Rahul Saha
, Reji Thomas:
BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT. IEEE Internet Things J. 10(18): 16480-16493 (2023) - [j226]Mauro Conti
, Luca Pajola, Pier Paolo Tricomi
:
Turning captchas against humanity: Captcha-based attacks in online social media. Online Soc. Networks Media 36: 100252 (2023) - [j225]Matteo Cardaioli, Mauro Conti
, Gabriele Orazi, Pier Paolo Tricomi
, Gene Tsudik:
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication. Pervasive Mob. Comput. 92: 101801 (2023) - [j224]Mohamad Mansouri, Melek Önen, Wafa Ben Jaballah, Mauro Conti:
SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning. Proc. Priv. Enhancing Technol. 2023(1): 140-157 (2023) - [j223]Anas Alsoliman
, Giulio Rigoni
, Davide Callegaro
, Marco Levorato
, Cristina M. Pinotti
, Mauro Conti
:
Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics. ACM Trans. Cyber Phys. Syst. 7(2): 12:1-12:29 (2023) - [j222]Gabriele Etta
, Matteo Cinelli
, Alessandro Galeazzi
, Carlo Michele Valensise
, Walter Quattrociocchi
, Mauro Conti
:
Comparing the Impact of Social Media Regulations on News Consumption. IEEE Trans. Comput. Soc. Syst. 10(3): 1252-1262 (2023) - [j221]Meng Li
, Yifei Chen
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
, Donghui Hu
:
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain. IEEE Trans. Dependable Secur. Comput. 20(1): 225-241 (2023) - [j220]Simone Soderi
, Riccardo Colelli
, Federico Turrin
, Federica Pascucci
, Mauro Conti
:
SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming. IEEE Trans. Dependable Secur. Comput. 20(3): 2274-2288 (2023) - [j219]Meng Li
, Yifei Chen
, Chhagan Lal
, Mauro Conti
, Fabio Martinelli, Mamoun Alazab
:
Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts. IEEE Trans. Dependable Secur. Comput. 20(4): 2849-2866 (2023) - [j218]Meng Li
, Yifei Chen, Liehaung Zhu
, Zijian Zhang
, Jianbing Ni
, Chhagan Lal
, Mauro Conti
:
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems. IEEE Trans. Dependable Secur. Comput. 20(4): 3002-3018 (2023) - [j217]Alessandro Brighente
, Mauro Conti
, Radha Poovendran, Jianying Zhou:
Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems. IEEE Trans. Ind. Informatics 19(6): 7801 (2023) - [j216]Ehsan Nowroozi
, Abhishek
, Mohammadreza Mohammadi, Mauro Conti
:
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework. IEEE Trans. Netw. Serv. Manag. 20(2): 1332-1344 (2023) - [j215]Mohamed A. El-Zawawy
, Alessandro Brighente
, Mauro Conti
:
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain. IEEE Trans. Netw. Serv. Manag. 20(2): 1775-1789 (2023) - [j214]Ehsan Nowroozi
, Mohammadreza Mohammadi, Erkay Savas, Yassine Mekdad, Mauro Conti
:
Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks. IEEE Trans. Netw. Serv. Manag. 20(2): 2096-2105 (2023) - [j213]Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Reji Thomas
, Tannishtha Devgun, Joel J. P. C. Rodrigues
:
Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit. IEEE Trans. Serv. Comput. 16(2): 900-912 (2023) - [j212]Saiqin Xu
, Alessandro Brighente
, Baixiao Chen
, Mauro Conti
, Xiancheng Cheng, Dongchen Zhu:
Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets With Sparse Prior for Line-of-Sight Scenarios. IEEE Trans. Veh. Technol. 72(4): 4683-4696 (2023) - [j211]Meng Li
, Jianbo Gao
, Zijian Zhang
, Liehuang Zhu
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion. IEEE Trans. Veh. Technol. 72(4): 5139-5151 (2023) - [j210]Subir Halder
, Amrita Ghosal
, Mauro Conti
:
Dynamic Super Round-Based Distributed Task Scheduling for UAV Networks. IEEE Trans. Wirel. Commun. 22(2): 1014-1028 (2023) - [j209]Sanaz Soltani
, Mohammad Shojafar
, Alessandro Brighente
, Mauro Conti
, Rahim Tafazolli
:
Poisoning Bearer Context Migration in O-RAN 5G Network. IEEE Wirel. Commun. Lett. 12(3): 401-405 (2023) - [j208]Saurabh Rana, Dheerendra Mishra, Chhagan Lal, Mauro Conti
:
Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing. Wirel. Pers. Commun. 131(2): 1295-1312 (2023) - [c260]Francesco Marchiori
, Mauro Conti
, Nino Vincenzo Verde
:
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports. ARES 2023: 3:1-3:11 - [c259]Riccardo Cestaro
, Mauro Conti
, Elonora Mancini
, Federico Turrin
:
OpenScope-sec: An ADS-B Simulator to Support the Security Research. ARES 2023: 116:1-116:6 - [c258]Sara Bardi, Mauro Conti, Luca Pajola, Pier Paolo Tricomi:
Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages. ACNS (1) 2023: 309-336 - [c257]Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti
:
Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2. CODASPY 2023: 27-38 - [c256]Ko Zheng Teng
, Trupil Limbasiya
, Federico Turrin
, Yan Lin Aung
, Sudipta Chattopadhyay
, Jianying Zhou
, Mauro Conti
:
PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems. CPSS@AsiaCCS 2023: 3-13 - [c255]Andrea Agiollo, Enkeleda Bardhi, Mauro Conti
, Riccardo Lazzeretti, Eleonora Losiouk, Andrea Omicini:
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks. EuroS&P 2023: 615-630 - [c254]Pier Paolo Tricomi, Sousan Tarahomi, Christian Cattai, Francesco Martini, Mauro Conti:
Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training. ICCCN 2023: 1-10 - [c253]Riccardo Spolaor, Hao Liu, Federico Turrin, Mauro Conti
, Xiuzhen Cheng:
Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel. INFOCOM 2023: 1-10 - [c252]Alessandro Brighente, Mauro Conti, Giacomo Peruzzi, Alessandro Pozzebon:
ADASS: Anti-Drone Audio Surveillance Sentinel via Embedded Machine Learning. SAS 2023: 1-6 - [c251]Giuseppe Cascavilla, Gemma Catolino, Mauro Conti, D. Mellios, Damian A. Tamburri:
When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning. SECRYPT 2023: 324-334 - [c250]Francesco Luigi De Faveri
, Luca Cosuti
, Pier Paolo Tricomi
, Mauro Conti
:
Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections. SocialSec 2023: 38-57 - [c249]Tommaso Bianchi, Surudhi Asokraj, Alessandro Brighente, Mauro Conti, Radha Poovendran:
QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer. VTC2023-Spring 2023: 1-6 - [c248]Pier Paolo Tricomi
, Marco Chilese
, Mauro Conti
, Ahmad-Reza Sadeghi
:
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms. WebSci 2023: 346-356 - [c247]Marco Casagrande
, Riccardo Cestaro
, Eleonora Losiouk
, Mauro Conti
, Daniele Antonioli
:
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem. WISEC 2023: 85-95 - [c246]Alessandro Lotto
, Vaibhav Singh
, Bhaskar Ramasubramanian
, Alessandro Brighente
, Mauro Conti
, Radha Poovendran
:
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks. WISEC 2023: 133-144 - [c245]Elisa Sartori
, Luca Pajola
, Giovanni Da San Martino
, Mauro Conti
:
The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum. WWW 2023: 4060-4064 - [d5]Riccardo Spolaor
, Hao Liu, Federico Turrin
, Mauro Conti
, Xiuzhen Cheng:
Dataset for the paper: Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel. Zenodo, 2023 - [i135]Alessandro Brighente, Mauro Conti, Denis Donadel, Radha Poovendran, Federico Turrin, Jianying Zhou:
Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs. CoRR abs/2301.04587 (2023) - [i134]Serena Tardelli, Leonardo Nizzoli, Maurizio Tesconi, Mauro Conti, Preslav Nakov, Giovanni Da San Martino, Stefano Cresci:
Temporal Dynamics of Coordinated Online Behavior: Stability, Archetypes, and Influence. CoRR abs/2301.06774 (2023) - [i133]Pier Paolo Tricomi, Marco Chilese, Mauro Conti, Ahmad-Reza Sadeghi:
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms. CoRR abs/2301.06815 (2023) - [i132]Marco Alecci, Luca Attanasio, Alessandro Brighente, Mauro Conti, Eleonora Losiouk, Hideki Ochiai, Federico Turrin:
Beware of Pickpockets: A Practical Attack against Blocking Cards. CoRR abs/2302.08992 (2023) - [i131]Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde:
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports. CoRR abs/2303.09999 (2023) - [i130]Ehsan Nowroozi, Seyedsadra Seyedshoari, Yassine Mekdad, Erkay Savas, Mauro Conti:
Cryptocurrency wallets: assessment and security. CoRR abs/2303.12940 (2023) - [i129]Marco Venturini, Francesco Freda, Emanuele Miotto, Alberto Giaretta, Mauro Conti:
Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations. CoRR abs/2303.17351 (2023) - [i128]Sara Bardi, Mauro Conti, Luca Pajola, Pier Paolo Tricomi:
Social Honeypot for Humans: Luring People through Self-managed Instagram Pages. CoRR abs/2303.17946 (2023) - [i127]Ehsan Nowroozi, Yoosef Habibi, Mauro Conti:
Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents. CoRR abs/2304.02982 (2023) - [i126]Nicholas Boucher
, Luca Pajola, Ilia Shumailov, Ross J. Anderson, Mauro Conti:
Boosting Big Brother: Attacking Search Engines with Encodings. CoRR abs/2304.14031 (2023) - [i125]Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek:
Turning Privacy-preserving Mechanisms against Federated Learning. CoRR abs/2305.05355 (2023) - [i124]Emad Efatinasab, Francesco Marchiori, Denis Donadel, Alessandro Brighente, Mauro Conti:
GAN-CAN: A Novel Attack to Behavior-Based Driver Authentication Systems. CoRR abs/2306.05923 (2023) - [i123]Francesco Luigi De Faveri, Luca Cosuti, Pier Paolo Tricomi, Mauro Conti:
Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections. CoRR abs/2306.07183 (2023) - [i122]Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola:
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability. CoRR abs/2306.15363 (2023) - [i121]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado Aaron Visaggio, Mauro Conti:
Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks? CoRR abs/2306.16087 (2023) - [i120]Fatemeh Najafi, Masoud Kaveh, Mohammad Reza Mosavi, Alessandro Brighente, Mauro Conti:
EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks. CoRR abs/2307.09968 (2023) - [i119]Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu:
BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks. CoRR abs/2308.02465 (2023) - [i118]Francesco Marchiori, Mauro Conti:
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication. CoRR abs/2309.03607 (2023) - [i117]Massimiliano Baldo, Tommaso Bianchi, Mauro Conti, Alessio Trevisan, Federico Turrin:
HoneyEVSE: An Honeypot to emulate Electric Vehicle Supply Equipments. CoRR abs/2309.06077 (2023) - [i116]Ankit Gangwal, Aashish Paliwal, Mauro Conti:
De-authentication using Ambient Light Sensor. CoRR abs/2309.12220 (2023) - 2022
- [j207]Fran Casino
, Thomas K. Dasaklis, Georgios P. Spathoulas
, Marios Anagnostopoulos
, Amrita Ghosal
, István Böröcz, Agusti Solanas
, Mauro Conti
, Constantinos Patsakis
:
Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews. IEEE Access 10: 25464-25493 (2022) - [j206]PLS Jayalaxmi
, Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tai-Hoon Kim
:
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey. IEEE Access 10: 121173-121192 (2022) - [j205]Reza Mohammadi, Chhagan Lal
, Mauro Conti
, Lokesh Sharma:
Software defined network-based HTTP flooding attack defender. Comput. Electr. Eng. 101: 108019 (2022) - [j204]PLS Jayalaxmi, Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Tai-Hoon Kim, Reji Thomas:
DeBot: A deep learning-based model for bot detection in industrial internet-of-things. Comput. Electr. Eng. 102: 108214 (2022) - [j203]Mauro Conti
, Jenil Gathani, Pier Paolo Tricomi:
Virtual Influencers in Online Social Media. IEEE Commun. Mag. 60(8): 86-91 (2022) - [j202]Mohamed A. El-Zawawy
, Alessandro Brighente
, Mauro Conti
:
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones. Comput. Networks 206: 108804 (2022) - [j201]Mauro Conti
, Eleonora Losiouk
, Radha Poovendran, Riccardo Spolaor:
Side-channel attacks on mobile and IoT devices for Cyber-Physical systems. Comput. Networks 207: 108858 (2022) - [j200]Jamshid Pirayesh, Alberto Giaretta, Mauro Conti
, Parviz Keshavarzi:
A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Comput. Networks 216: 109077 (2022) - [j199]Mohd Shariq, Karan Singh, Chhagan Lal
, Mauro Conti
, Tayyab Ali Khan:
ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags. Comput. Networks 217: 109360 (2022) - [j198]Amrita Ghosal
, Subir Halder, Mauro Conti
:
Secure over-the-air software update for connected vehicles. Comput. Networks 218: 109394 (2022) - [j197]Federico Tavella
, Alberto Giaretta
, Mauro Conti
, Sasitharan Balasubramaniam
:
A machine learning-based approach to detect threats in bio-cyber DNA storage systems. Comput. Commun. 187: 59-70 (2022) - [j196]Vasilios Koutsokostas, Nikolaos Lykousas
, Theodoros Apostolopoulos, Gabriele Orazi, Amrita Ghosal, Fran Casino, Mauro Conti
, Constantinos Patsakis:
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents. Comput. Secur. 114: 102582 (2022) - [j195]Mauro Conti
, Shubham Khandhar, Vinod P.:
A few-shot malware classification approach for unknown family recognition using malware feature visualization. Comput. Secur. 122: 102887 (2022) - [j194]Ankur O. Bang
, Udai Pratap Rao
, Andrea Visconti, Alessandro Brighente, Mauro Conti:
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions. Comput. Secur. 123: 102914 (2022) - [j193]Mohamed A. El-Zawawy
, Parvez Faruki, Mauro Conti
:
Formal model for inter-component communication and its security in android. Computing 104(8): 1839-1865 (2022) - [j192]Alakesh Kalita
, Alessandro Brighente
, Manas Khatua
, Mauro Conti
:
Effect of DIS Attack on 6TiSCH Network Formation. IEEE Commun. Lett. 26(5): 1190-1193 (2022) - [j191]Milad Taleby Ahvanooey
, Mark Xuefang Zhu
, Qianmu Li
, Wojciech Mazurczyk
, Kim-Kwang Raymond Choo
, Brij Bhooshan Gupta
, Mauro Conti
:
Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey. IEEE Internet Things J. 9(10): 7639-7663 (2022) - [j190]Rekha Goyat
, Gulshan Kumar
, Mamoun Alazab
, Mauro Conti
, Mritunjay Kumar Rai
, Reji Thomas
, Rahul Saha
, Tai-Hoon Kim
:
Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things. IEEE Internet Things J. 9(16): 14203-14215 (2022) - [j189]Mauro Conti
, P. Vinod, Alessio Vitella
:
Obfuscation detection in Android applications using deep learning. J. Inf. Secur. Appl. 70: 103311 (2022) - [j188]Milad Taleby Ahvanooey
, Mark Xuefang Zhu, Wojciech Mazurczyk, Qianmu Li, Max Kilger, Kim-Kwang Raymond Choo, Mauro Conti
:
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks. J. Inf. Secur. Appl. 71: 103368 (2022) - [j187]Milad Taleby Ahvanooey
, Mark Xuefang Zhu
, Wojciech Mazurczyk
, Kim-Kwang Raymond Choo
, Mauro Conti
, Jing Zhang
:
Misinformation Detection on Social Media: Challenges and the Road Ahead. IT Prof. 24(1): 34-40 (2022) - [j186]Fabio Aiolli, Mauro Conti
, Stjepan Picek, Mirko Polato:
On the feasibility of crawling-based attacks against recommender systems. J. Comput. Secur. 30(4): 599-621 (2022) - [j185]Mauro Conti, Gulshan Kumar
, Pranav Nerurkar, Rahul Saha
, Luigi Vigneri
:
A survey on security challenges and solutions in the IOTA. J. Netw. Comput. Appl. 203: 103383 (2022) - [j184]Ashish Kumar, Rahul Saha
, Mauro Conti, Gulshan Kumar
, William J. Buchanan, Tai-Hoon Kim:
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. J. Netw. Comput. Appl. 204: 103414 (2022) - [j183]Arshdeep Singh, Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Mamoun Alazab, Reji Thomas
:
A survey and taxonomy of consensus protocols for blockchains. J. Syst. Archit. 127: 102503 (2022) - [j182]Subir Halder
, Mauro Conti
:
CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem. IEEE Trans. Cloud Comput. 10(4): 2437-2450 (2022) - [j181]Marco Casagrande, Eleonora Losiouk, Mauro Conti
, Mathias Payer, Daniele Antonioli:
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 330-366 (2022) - [j180]Marco Casagrande, Eleonora Losiouk, Mauro Conti, Mathias Payer, Daniele Antonioli:
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 490-526 (2022) - [j179]Meng Li
, Yifei Chen
, Shuli Zheng, Donghui Hu
, Chhagan Lal
, Mauro Conti
:
Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks. IEEE Trans. Dependable Secur. Comput. 19(2): 1133-1148 (2022) - [j178]Xuhang Ying
, Giuseppe Bernieri, Mauro Conti
, Linda Bushnell
, Radha Poovendran
:
Covert Channel-Based Transmitter Authentication in Controller Area Networks. IEEE Trans. Dependable Secur. Comput. 19(4): 2665-2679 (2022) - [j177]Meng Li
, Yifei Chen
, Neeraj Kumar
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks. IEEE Trans. Green Commun. Netw. 6(3): 1267-1275 (2022) - [j176]Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tannishtha Devgun, Tai-Hoon Kim
, Mamoun Alazab
, Reji Thomas
:
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 18(5): 3452-3461 (2022) - [j175]Ehsan Nowroozi
, Yassine Mekdad
, Mohammad Hajian Berenjestanaki, Mauro Conti
, Abdeslam El Fergougui:
Demystifying the Transferability of Adversarial Attacks in Computer Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 3387-3400 (2022) - [j174]Giovanni Apruzzese
, Luca Pajola
, Mauro Conti
:
The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems. IEEE Trans. Netw. Serv. Manag. 19(4): 5152-5169 (2022) - [j173]Meng Li
, Liehuang Zhu
, Zijian Zhang
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack. IEEE/ACM Trans. Netw. 30(5): 2060-2073 (2022) - [j172]Ding Ding
, Kyuho Jeong, Shuning Xing
, Mauro Conti
, Renato Figueiredo
, Fangai Liu
:
SEnD: A Social Network Friendship Enhanced Decentralized System to Circumvent Censorships. IEEE Trans. Serv. Comput. 15(1): 346-360 (2022) - [c244]Emilie Bout, Alessandro Brighente, Mauro Conti
, Valeria Loscrì:
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks. ARES 2022: 21:1-21:10 - [c243]Enkeleda Bardhi
, Mauro Conti
, Riccardo Lazzeretti, Eleonora Losiouk, Ahmed Taffal:
Sim2Testbed Transfer: NDN Performance Evaluation. ARES 2022: 63:1-63:9 - [c242]Alessandro Brighente, Mauro Conti
, Savio Sciancalepore:
Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing. ARES 2022: 134:1-134:11 - [c241]Alessandro Visintin, Flavio Toffalini, Eleonora Losiouk, Mauro Conti
, Jianying Zhou:
HolA: Holistic and Autonomous Attestation for IoT Networks. ACNS Workshops 2022: 277-296 - [c240]Giovanni Apruzzese
, Mauro Conti
, Ying Yuan
:
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. ACSAC 2022: 171-185 - [c239]Stefanos Koffas, Stjepan Picek, Mauro Conti
:
Dynamic Backdoors with Global Average Pooling. AICAS 2022: 320-323 - [c238]Arshdeep Singh, Rahul Saha
,