Luca Demetrio
Luca Demetrio
Assistant Professor at Universitą degli Studi di Genova
Verified email at - Homepage
Cited by
Cited by
Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries
L Demetrio, B Biggio, G Lagorio, F Roli, A Armando
Proceedings of the Third Italian Conference on Cyber Security 2315, 2019
Functionality-preserving Black-box Optimization of Adversarial Windows Malware
L Demetrio, B Biggio, G Lagorio, F Roli, A Armando
IEEE Transactions on Information Forensics and Security, 2020
Adversarial EXEmples: a survey and experimental evaluation of practical attacks on machine learning for windows malware detection
L Demetrio, SE Coull, B Biggio, G Lagorio, A Armando, F Roli
ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-31, 2021
ImageNet-Patch: A dataset for benchmarking machine learning robustness against adversarial patches
M Pintor, D Angioni, A Sotgiu, L Demetrio, A Demontis, B Biggio, F Roli
Pattern Recognition 134, 109064, 2023
Indicators of attack failure: Debugging and improving optimization of adversarial examples
M Pintor, L Demetrio, A Sotgiu, A Demontis, N Carlini, B Biggio, F Roli
arXiv preprint arXiv:2106.09947, 2021
WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning
L Demetrio, A Valenza, G Costa, G Lagorio
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1745–1752, 2020
Secml-malware: Pentesting Windows Malware Classifiers with Adversarial EXEmples in Python
L Demetrio, B Biggio
arXiv preprint arXiv:2104.12848, 2021
Towards learning trustworthily, automatically, and with guarantees on graphs: An overview
L Oneto, N Navarin, B Biggio, F Errica, A Micheli, F Scarselli, M Bianchini, ...
Neurocomputing 493, 217-243, 2022
Phantom sponges: Exploiting non-maximum suppression to attack deep object detectors
A Shapira, A Zolfi, L Demetrio, B Biggio, A Shabtai
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer …, 2023
secml: Secure and Explainable Machine Learning in Python
M Pintor, L Demetrio, A Sotgiu, M Melis, A Demontis, B Biggio
SoftwareX 18, 2022
ZenHackAdemy: Ethical Hacking@ DIBRIS.
L Demetrio, G Lagorio, M Ribaudo, E Russo, A Valenza
CSEDU (1), 405-413, 2019
Practical evaluation of poisoning attacks on online anomaly detectors in industrial control systems
M Kravchik, L Demetrio, B Biggio, A Shabtai
Computers & Security 122, 102901, 2022
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware
L Demetrio, B Biggio, F Roli
IEEE Security & Privacy, 2022
WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs
A Valenza, L Demetrio, G Costa, G Lagorio
SoftwareX 11, 100367, 2020
Explaining vulnerabilities of deep learning to adversarial malware binaries. arXiv 2019
L Demetrio, B Biggio, G Lagorio, F Roli, A Armando
arXiv preprint arXiv:1901.03583, 0
Explaining machine learning DGA detectors from DNS traffic data
G Piras, M Pintor, L Demetrio, B Biggio
Nebula: Self-Attention for Dynamic Malware Analysis
D Trizna, L Demetrio, B Biggio, F Roli
IEEE Transactions on Information Forensics and Security, 2024
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors
B Montaruli, L Demetrio, M Pintor, L Compagna, D Balzarotti, B Biggio
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security …, 2023
A survey on reinforcement learning security with application to autonomous driving
A Demontis, M Pintor, L Demetrio, K Grosse, HY Lin, C Fang, B Biggio, ...
arXiv preprint arXiv:2212.06123, 2022
Slope: A First-order Approach for Measuring Gradient Obfuscation.
M Pintor, L Demetrio, G Manca, B Biggio, F Roli
ESANN, 2021
The system can't perform the operation now. Try again later.
Articles 1–20