Giovanni Apruzzese

Orcid: 0000-0002-6890-9611

According to our database1, Giovanni Apruzzese authored at least 29 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Voices from the Frontline: Revealing the AI Practitioners' viewpoint on the European AI Act.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Dual adversarial attacks: Fooling humans and classifiers.
J. Inf. Secur. Appl., June, 2023

Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors.
IEEE Trans. Dependable Secur. Comput., 2023

Understanding the Process of Data Labeling in Cybersecurity.
CoRR, 2023

SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations.
Proceedings of the Computer Security - ESORICS 2023, 2023

"Do Users Fall for Real Adversarial Phishing?" Investigating the Human Response to Evasive Webpages.
Proceedings of the APWG Symposium on Electronic Crime Research, 2023

Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples.
IEEE Trans. Netw. Serv. Manag., December, 2022

The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Netw. Serv. Manag., December, 2022

"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice.
CoRR, 2022

Cybersecurity in the Smart Grid: Practitioners' Perspective.
CoRR, 2022

The Role of Machine Learning in Cybersecurity.
CoRR, 2022

Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike.
Proceedings of the 43rd IEEE Security and Privacy, 2022

SoK: The Impact of Unlabelled Data in Cyberthreat Detection.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems.
CoRR, 2021

Towards an Efficient Detection of Pivoting Activity.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

On the Evaluation of Sequential Machine Learning for Network Intrusion Detection.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks.
IEEE Trans. Netw. Serv. Manag., 2020

Hardening Random Forest Cyber Detectors Against Adversarial Attacks.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

Detection and Threat Prioritization of Pivoting Attacks in Large Networks.
IEEE Trans. Emerg. Top. Comput., 2020

AppCon: Mitigating Evasion Attacks to ML Cyber Detectors.
Symmetry, 2020

2019
Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Addressing Adversarial Attacks Against Security Systems Based on Machine Learning.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

2018
Evading Botnet Detectors Based on Flows and Random Forest with Adversarial Samples.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

On the effectiveness of machine and deep learning for cyber security.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

2017
Identifying malicious hosts involved in periodic communications.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Scalable architecture for online prioritisation of cyber threats.
Proceedings of the 9th International Conference on Cyber Conflict, 2017


  Loading...