Andrea Marcelli

Orcid: 0000-0002-1441-5798

According to our database1, Andrea Marcelli authored at least 16 papers between 2015 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
How Machine Learning Is Solving the Binary Function Similarity Problem.
Proceedings of the 31st USENIX Security Symposium, 2022

2020
The Maximum Common Subgraph Problem: A Parallel and Multi-Engine Approach.
Comput., 2020

2019
Machine Learning and other Computational-Intelligence Techniques for Security Applications.
PhD thesis, 2019

The Maximum Common Subgraph Problem: A Portfolio Approach.
CoRR, 2019

Evolutionary Antivirus Signature Optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

2018
An Unsupervised and Noninvasive Model for Predicting Network Resource Demands.
IEEE Internet Things J., 2018

Countering Android Malware: A Scalable Semi-Supervised Approach for Family-Signature Generation.
IEEE Access, 2018

Defeating hardware Trojan in microprocessor cores through software obfuscation.
Proceedings of the 19th IEEE Latin-American Test Symposium, 2018

On the Mitigation of Hardware Trojan Attacks in Embedded Processors by Exploiting a Hardware-Based Obfuscator.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018

Evaluating surrogate models for multi-objective influence maximization in social networks.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

Improving Multi-objective Evolutionary Influence Maximization in Social Networks.
Proceedings of the Applications of Evolutionary Computation, 2018

2017
HAIT: Heap Analyzer with Input Tracing.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Multi-objective Evolutionary Algorithms for Influence Maximization in Social Networks.
Proceedings of the Applications of Evolutionary Computation - 20th European Conference, 2017

An evolutionary approach to hardware encryption and Trojan-horse mitigation.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017

2016
Challenging Anti-virus Through Evolutionary Malware Obfuscation.
Proceedings of the Applications of Evolutionary Computation - 19th European Conference, 2016

2015
Malware Obfuscation through Evolutionary Packers.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015


  Loading...