Stefano Longari
Orcid: 0000-0002-7533-4510
According to our database1,
Stefano Longari
authored at least 25 papers
between 2019 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation.
ACM Trans. Cyber Phys. Syst., July, 2025
Janus: A Trusted Execution Environment Approach for Attack Detection in Industrial Robot Controllers.
IEEE Trans. Emerg. Top. Comput., 2025
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems.
Proc. Priv. Enhancing Technol., 2025
IEEE Access, 2025
Guessing As A Service: Large Language Models Are Not Yet Ready For Vulnerability Detection.
Proceedings of the Joint National Conference on Cybersecurity (ITASEC & SERICS 2025), 2025
Proceedings of the Joint National Conference on Cybersecurity (ITASEC & SERICS 2025), 2025
A Deep Learning Approach for False Data Injection Attacks Detection in Smart Water Infrastructure.
Proceedings of the Joint National Conference on Cybersecurity (ITASEC & SERICS 2025), 2025
Proceedings of the Joint National Conference on Cybersecurity (ITASEC & SERICS 2025), 2025
CANPak: An Intrusion Detection System against Error Frame Attacks for Controller Area Network.
Proceedings of the Joint National Conference on Cybersecurity (ITASEC & SERICS 2025), 2025
Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2025
Linux Hurt Itself in Its Confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2025
2024
IEEE Trans. Emerg. Top. Comput., 2024
An Anomaly Detection System Based on Generative Classifiers for Controller Area Network.
CoRR, 2024
Evaluating the Impact of Privacy-Preserving Federated Learning on CAN Intrusion Detection.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024
BOTQUAS: Blockchain-based Solutions for Trustworthy Data Sharing in Sustainable and Circular Economy.
Proceedings of the 50th Euromicro Conference on Software Engineering and Advanced Applications, 2024
Model Predictive Control with adaptive resilience for Denial-of-Service Attacks mitigation on a Regulated Dam.
Proceedings of the 63rd IEEE Conference on Decision and Control, 2024
2023
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN.
Comput. Secur., May, 2023
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
2022
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2022
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network.
IEEE Trans. Netw. Serv. Manag., 2021
2019
Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019