Francesco Marchiori

Orcid: 0000-0001-5282-0965

According to our database1, Francesco Marchiori authored at least 21 papers between 2023 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Preventing Robotic Jailbreaking via Multimodal Domain Adaptation.
CoRR, September, 2025

Inference Attacks on Encrypted Online Voting via Traffic Analysis.
CoRR, September, 2025

A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols.
IEEE Commun. Surv. Tutorials, August, 2025

PQ-CAN: A Framework for Simulating Post-Quantum Cryptography in Embedded Systems.
CoRR, April, 2025

Can LLMs Classify CVEs? Investigating LLMs Capabilities in Computing CVSS Vectors.
CoRR, April, 2025

Moshi Moshi? A Model Selection Hijacking Adversarial Attack.
CoRR, February, 2025

DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?
Proceedings of the Computer Security - ESORICS 2025, 2025

ATTAQ: Adversarial Robustness of Quantum Machine Learning.
Proceedings of the 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2025

Leaving No Blind Spots: Toward Automotive Cybersecurity.
Proceedings of the 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2025

Profiling Electric Vehicles via Early Charging Voltage Patterns.
Proceedings of the Availability, Reliability and Security, 2025

Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles.
Proceedings of the Availability, Reliability and Security - 20th International Conference, 2025

2024
Can LLMs Understand Computer Networks? Towards a Virtual System Administrator.
CoRR, 2024

CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems.
Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning, 2024

Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers?
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

RedactBuster: Entity Type Recognition from Redacted Documents.
Proceedings of the Computer Security - ESORICS 2024, 2024

FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024

2023
GAN-CAN: A Novel Attack to Behavior-Based Driver Authentication Systems.
CoRR, 2023

Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation.
Proceedings of the IEEE International Conference on Big Data, 2023

STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023


  Loading...