252 results on '"Conti, Mauro"'
Search Results
2. "All of Me": Mining Users' Attributes from their Public Spotify Playlists
3. LightKey: Lightweight and Secure Key Agreement Protocol for Effective Communication in Internet of Vehicles
4. A First Look at Shill Looping in NFT Ecosystem
5. Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication
6. Turning Privacy-preserving Mechanisms against Federated Learning
7. HDFL: Private and Robust Federated Learning using Hyperdimensional Computing
8. Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability
9. Beware of Pickpockets: A Practical Attack against Blocking Cards
10. Boosting Big Brother: Attacking Search Engines with Encodings
11. Balancing Privacy and Accuracy in Federated Learning for Speech Emotion Recognition
12. STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports
13. OpenScope-sec: An ADS-B Simulator to Support the Security Research
14. PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems
15. Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training
16. GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks
17. Going in Style: Audio Backdoors Through Stylistic Transformations
18. QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer
19. E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem
20. BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks
21. Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel
22. Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms
23. The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum
24. On the Feasibility of Profiling Electric Vehicles through Charging Data
25. SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning
26. Graph Encryption for Shortest Path Queries with k Unsorted Nodes
27. Label-Only Membership Inference Attack against Node-Level Graph Neural Networks
28. SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles
29. VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks
30. MeLSeC: A Method for Lightweight and Secure Communication in Internet of Vehicles
31. PoSC: Combined Score for Consensus in Intemet-of-Things Applications
32. Sim2Testbed Transfer: NDN Performance Evaluation
33. Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing
34. FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks
35. ICSpot: A High-Interaction Honeypot for Industrial Control Systems
36. PRaNA: PRNU-based Technique to Tell Real and Deepfake Videos Apart
37. Face the Truth: Interpretable Emotion Genuineness Detection
38. Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering
39. Contactless Authentication for Wearable Devices Using RFID
40. The Spread of Propaganda by Coordinated Communities on Social Media
41. Dynamic Backdoors with Global Average Pooling
42. Can You Hear It?
43. Face Recognition Systems: Are you sure they only consider your face?
44. What you see is not what you get
45. Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses
46. Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection
47. AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks
48. EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation
49. Building Embedded Systems Like It’s 1996
50. Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.