Seguir
Fabio Pierazzi
Fabio Pierazzi
Associate Professor at University College London
Dirección de correo verificada de ucl.ac.uk - Página principal
Título
Citado por
Citado por
Año
TESSERACT: Eliminating experimental bias in malware classification across space and time
F Pendlebury, F Pierazzi, R Jordaney, J Kinder, L Cavallaro
28th USENIX security symposium (USENIX Security 19), 729-746, 2019
4542019
Dos and don’ts of machine learning in computer security
D Arp, E Quiring, F Pendlebury, A Warnecke, F Pierazzi, C Wressnegger, ...
31st USENIX Security Symposium (USENIX Security 22), USENIX Association …, 2022
4092022
Intriguing properties of adversarial ml attacks in the problem space
F Pierazzi, F Pendlebury, J Cortellazzi, L Cavallaro
2020 IEEE symposium on security and privacy (SP), 1332-1349, 2020
3272020
Analysis of high volumes of network traffic for advanced persistent threat detection
M Marchetti, F Pierazzi, M Colajanni, A Guido
Computer Networks 109, 127-141, 2016
2122016
Ec2: Ensemble clustering and classification for predicting android malware families
T Chakraborty, F Pierazzi, VS Subrahmanian
IEEE Transactions on Dependable and Secure Computing 17 (2), 262-277, 2017
1482017
Insomnia: Towards concept-drift robustness in network intrusion detection
G Andresini, F Pendlebury, F Pierazzi, C Loglisci, A Appice, L Cavallaro
Proceedings of the 14th ACM workshop on artificial intelligence and security …, 2021
1042021
“Real Attackers Don't Compute Gradients”: Bridging the Gap between Adversarial ML Research and Practice
G Apruzzese, HS Anderson, S Dambra, D Freeman, F Pierazzi, K Roundy
2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), 339-364, 2023
952023
Transcending Transcend: Revisiting malware classification in the presence of concept drift
F Barbero, F Pendlebury, F Pierazzi, L Cavallaro
2022 IEEE Symposium on Security and Privacy (S&P), 805-823, 2022
88*2022
A probabilistic logic of cyber deception
S Jajodia, N Park, F Pierazzi, A Pugliese, E Serra, GI Simari, ...
IEEE Transactions on Information Forensics and Security 12 (11), 2532-2544, 2017
682017
Countering Advanced Persistent Threats through security intelligence and big data analytics
M Marchetti, F Pierazzi, A Guido, M Colajanni
2016 8th International Conference on Cyber Conflict (CyCon), 243-261, 2016
602016
Detection and threat prioritization of pivoting attacks in large networks
G Apruzzese, F Pierazzi, M Colajanni, M Marchetti
IEEE transactions on emerging topics in computing 8 (2), 404-415, 2017
492017
A data-driven characterization of modern Android spyware
F Pierazzi, G Mezzour, Q Han, M Colajanni, VS Subrahmanian
ACM Transactions on Management Information Systems (TMIS) 11 (1), 1-38, 2020
442020
Scalable architecture for multi-user encrypted SQL operations on cloud database services
L Ferretti, F Pierazzi, M Colajanni, M Marchetti
IEEE Transactions on Cloud computing 2 (4), 448-458, 2014
352014
Jigsaw puzzle: Selective backdoor attack to subvert malware classifiers
L Yang, Z Chen, J Cortellazzi, F Pendlebury, K Tu, F Pierazzi, L Cavallaro, ...
IEEE Symposium on Security & Privacy (S&P), 2023
322023
Performance and cost evaluation of an adaptive encryption architecture for cloud databases
L Ferretti, F Pierazzi, M Colajanni, M Marchetti
IEEE transactions on cloud computing 2 (2), 143-155, 2014
312014
Investigating labelless drift adaptation for malware detection
Z Kan, F Pendlebury, F Pierazzi, L Cavallaro
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021
282021
Exploratory security analytics for anomaly detection
F Pierazzi, S Casolari, M Colajanni, M Marchetti
computers & security 56, 28-49, 2016
282016
Security and confidentiality solutions for public cloud database services
L Ferretti, F Pierazzi, M Colajanni, M Marchetti
The Seventh International Conference on Emerging Security Information …, 2013
272013
Scalable architecture for online prioritisation of cyber threats
F Pierazzi, G Apruzzese, M Colajanni, A Guido, M Marchetti
2017 9th International Conference on Cyber Conflict (CyCon), 1-18, 2017
262017
Realizable universal adversarial perturbations for malware
R Labaca-Castro, L Muñoz-González, F Pendlebury, GD Rodosek, ...
arXiv preprint arXiv:2102.06747, 2021
25*2021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20