Michele Carminati
Orcid: 0000-0001-8284-6074
  According to our database1,
  Michele Carminati
  authored at least 58 papers
  between 2014 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
- 
    on dl.acm.org
On csauthors.net:
Bibliography
  2025
    CoRR, September, 2025
    
  
LeakSealer: A Semisupervised Defense for LLMs Against Prompt Injection and Leakage Attacks.
    
  
    CoRR, August, 2025
    
  
Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation.
    
  
    ACM Trans. Cyber Phys. Syst., July, 2025
    
  
Janus: A Trusted Execution Environment Approach for Attack Detection in Industrial Robot Controllers.
    
  
    IEEE Trans. Emerg. Top. Comput., 2025
    
  
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems.
    
  
    Proc. Priv. Enhancing Technol., 2025
    
  
Evaluating the potential of quantum machine learning in cybersecurity: A case-study on PCA-based intrusion detection systems.
    
  
    Comput. Secur., 2025
    
  
How Stealthy is Stealthy? Studying the Efficacy of Black-Box Adversarial Attacks in the Real World.
    
  
    Proceedings of the ICT Systems Security and Privacy Protection, 2025
    
  
Guessing As A Service: Large Language Models Are Not Yet Ready For Vulnerability Detection.
    
  
    Proceedings of the Joint National Conference on Cybersecurity (ITASEC & SERICS 2025), 2025
    
  
A Deep Learning Approach for False Data Injection Attacks Detection in Smart Water Infrastructure.
    
  
    Proceedings of the Joint National Conference on Cybersecurity (ITASEC & SERICS 2025), 2025
    
  
    Proceedings of the Joint National Conference on Cybersecurity (ITASEC & SERICS 2025), 2025
    
  
    Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2025
    
  
Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning.
    
  
    Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2025
    
  
Linux Hurt Itself in Its Confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation.
    
  
    Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2025
    
  
  2024
    IEEE Trans. Emerg. Top. Comput., 2024
    
  
An Anomaly Detection System Based on Generative Classifiers for Controller Area Network.
    
  
    CoRR, 2024
    
  
A Secure and Trustworthy Network Architecture for Federated Learning Healthcare Applications.
    
  
    CoRR, 2024
    
  
A Secure and Trustworthy Network Architecture for Federated Learning Healthcare Applications.
    
  
    Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024
    
  
Evaluating the Impact of Privacy-Preserving Federated Learning on CAN Intrusion Detection.
    
  
    Proceedings of the 99th IEEE Vehicular Technology Conference, 2024
    
  
    Proceedings of the 21st International Conference on Security and Cryptography, 2024
    
  
You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence.
    
  
    Proceedings of the 27th International Symposium on Research in Attacks, 2024
    
  
Amatriciana: Exploiting Temporal GNNs for Robust and Efficient Money Laundering Detection.
    
  
    Proceedings of the IEEE International Conference on Data Mining, 2024
    
  
A Federated Learning Platform as a Service for Advancing Stroke Management in European Clinical Centers.
    
  
    Proceedings of the IEEE International Conference on E-health Networking, 2024
    
  
    Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
    
  
The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations.
    
  
    Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
    
  
  2023
    ACM Trans. Priv. Secur., November, 2023
    
  
    Comput. Secur., September, 2023
    
  
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN.
    
  
    Comput. Secur., May, 2023
    
  
    Proceedings of the Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track, 2023
    
  
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis.
    
  
    Proceedings of the Advances in Information and Computer Security, 2023
    
  
    Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023
    
  
Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing.
    
  
    Proceedings of the 12th International Conference on Pattern Recognition Applications and Methods, 2023
    
  
    Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023
    
  
    Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
    
  
    Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
    
  
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks.
    
  
    Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
    
  
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors.
    
  
    Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
    
  
  2022
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems.
    
  
    IEEE Trans. Intell. Transp. Syst., 2022
    
  
    Comput. Secur., 2022
    
  
    Comput. Secur., 2022
    
  
    IEEE Access, 2022
    
  
    Proceedings of the Italian Conference on Cybersecurity (ITASEC 2022), 2022
    
  
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks.
    
  
    Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
    
  
  2021
CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network.
    
  
    IEEE Trans. Netw. Serv. Manag., 2021
    
  
  2020
    Proceedings of the 23rd International Symposium on Research in Attacks, 2020
    
  
    Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
    
  
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
    
  
    Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
    
  
  2019
Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems.
    
  
    CoRR, 2019
    
  
    Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019
    
  
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network.
    
  
    Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019
    
  
  2018
    ACM Trans. Priv. Secur., 2018
    
  
    Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
    
  
    Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
    
  
    Proceedings of the 8th Software Security, 2018
    
  
  2017
    Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
    
  
  2015
BankSealer: A decision support system for online banking fraud analysis and investigation.
    
  
    Comput. Secur., 2015
    
  
  2014
    Proceedings of the ICT Systems Security and Privacy Protection, 2014