Follow
Davide Maiorca
Davide Maiorca
Assistant Professor of Computer Engineering at University of Cagliari, Italy
Verified email at unica.it
Title
Cited by
Cited by
Year
Evasion attacks against machine learning at test time
B Biggio, I Corona, D Maiorca, B Nelson, N Šrndić, P Laskov, G Giacinto, ...
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2013
18632013
Adversarial malware binaries: Evading deep learning for malware detection in executables
B Kolosnjaji, A Demontis, B Biggio, D Maiorca, G Giacinto, C Eckert, ...
2018 26th European signal processing conference (EUSIPCO), 533-537, 2018
4532018
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
A Demontis, M Melis, B Biggio, D Maiorca, D Arp, K Rieck, I Corona, ...
IEEE Transactions on Dependable and Secure Computing, 2017
3632017
Stealth attacks: An extended insight into the obfuscation effects on android malware
D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto
Computers & Security 51, 16-31, 2015
2272015
A pattern recognition system for malicious pdf files detection
D Maiorca, G Giacinto, I Corona
International workshop on machine learning and data mining in pattern …, 2012
1642012
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection
D Maiorca, I Corona, G Giacinto
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
1602013
R-PackDroid: API package-based characterization and detection of mobile ransomware
D Maiorca, F Mercaldo, G Giacinto, CA Visaggio, F Martinelli
Proceedings of the symposium on applied computing, 1718-1723, 2017
1452017
Security evaluation of support vector machines in adversarial environments
B Biggio, I Corona, B Nelson, BIP Rubinstein, D Maiorca, G Fumera, ...
Support vector machines applications, 105-153, 2014
1392014
Towards adversarial malware detection: Lessons learned from PDF-based attacks
D Maiorca, B Biggio, G Giacinto
ACM Computing Surveys (CSUR) 52 (4), 1-36, 2019
1142019
On the effectiveness of system API-related information for Android ransomware detection
M Scalas, D Maiorca, F Mercaldo, CA Visaggio, F Martinelli, G Giacinto
Computers & Security 86, 168-182, 2019
1072019
Lux0r: Detection of malicious pdf-embedded javascript code through discriminant analysis of api references
I Corona, D Maiorca, D Ariu, G Giacinto
Proceedings of the 2014 workshop on artificial intelligent and security …, 2014
992014
Explaining black-box android malware detection
M Melis, D Maiorca, B Biggio, G Giacinto, F Roli
2018 26th european signal processing conference (EUSIPCO), 524-528, 2018
782018
On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms?
T Hupperich, D Maiorca, M Kührer, T Holz, G Giacinto
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
782015
A structural and content-based approach for a precise and robust detection of malicious pdf files
D Maiorca, D Ariu, I Corona, G Giacinto
Proceedings of the 1st International Conference on Information Systems …, 2015
732015
Clustering Android Malware Families by Http Traffic
M Aresu, D Ariu, M Ahmadi, D Maiorca, G Giacinto
572015
Digital investigation of pdf files: Unveiling traces of embedded malware
D Maiorca, B Biggio
IEEE Security & Privacy 17 (1), 63-71, 2019
532019
PowerDrive: accurate de-obfuscation and analysis of PowerShell malware
D Ugarte, D Maiorca, F Cara, G Giacinto
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
402019
Do gradient-based explanations tell anything about adversarial robustness to android malware?
M Melis, M Scalas, A Demontis, D Maiorca, B Biggio, G Giacinto, F Roli
International journal of machine learning and cybernetics, 1-16, 2022
372022
Adversarial detection of flash malware: Limitations and open issues
D Maiorca, A Demontis, B Biggio, F Roli, G Giacinto
Computers & Security 96, 101901, 2020
342020
Evaluating analysis tools for android apps: Status quo and robustness against obfuscation
J Hoffmann, T Rytilahti, D Maiorca, M Winandy, G Giacinto, T Holz
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
342016
The system can't perform the operation now. Try again later.
Articles 1–20