Picture for Fabio De Gaspari

Fabio De Gaspari

Have You Poisoned My Data? Defending Neural Networks against Data Poisoning

Add code
Mar 20, 2024
Figure 1 for Have You Poisoned My Data? Defending Neural Networks against Data Poisoning
Figure 2 for Have You Poisoned My Data? Defending Neural Networks against Data Poisoning
Figure 3 for Have You Poisoned My Data? Defending Neural Networks against Data Poisoning
Figure 4 for Have You Poisoned My Data? Defending Neural Networks against Data Poisoning
Viaarxiv icon

Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem

Add code
Mar 06, 2024
Viaarxiv icon

OliVaR: Improving Olive Variety Recognition using Deep Neural Networks

Add code
Mar 01, 2023
Figure 1 for OliVaR: Improving Olive Variety Recognition using Deep Neural Networks
Figure 2 for OliVaR: Improving Olive Variety Recognition using Deep Neural Networks
Figure 3 for OliVaR: Improving Olive Variety Recognition using Deep Neural Networks
Figure 4 for OliVaR: Improving Olive Variety Recognition using Deep Neural Networks
Viaarxiv icon

Minerva: A File-Based Ransomware Detector

Add code
Jan 26, 2023
Viaarxiv icon

MalPhase: Fine-Grained Malware Detection Using Network Flow Data

Add code
Jun 01, 2021
Figure 1 for MalPhase: Fine-Grained Malware Detection Using Network Flow Data
Figure 2 for MalPhase: Fine-Grained Malware Detection Using Network Flow Data
Figure 3 for MalPhase: Fine-Grained Malware Detection Using Network Flow Data
Figure 4 for MalPhase: Fine-Grained Malware Detection Using Network Flow Data
Viaarxiv icon

PassFlow: Guessing Passwords with Generative Flows

Add code
May 13, 2021
Figure 1 for PassFlow: Guessing Passwords with Generative Flows
Figure 2 for PassFlow: Guessing Passwords with Generative Flows
Figure 3 for PassFlow: Guessing Passwords with Generative Flows
Figure 4 for PassFlow: Guessing Passwords with Generative Flows
Viaarxiv icon

Reliable Detection of Compressed and Encrypted Data

Add code
Mar 31, 2021
Figure 1 for Reliable Detection of Compressed and Encrypted Data
Figure 2 for Reliable Detection of Compressed and Encrypted Data
Figure 3 for Reliable Detection of Compressed and Encrypted Data
Figure 4 for Reliable Detection of Compressed and Encrypted Data
Viaarxiv icon

EnCoD: Distinguishing Compressed and Encrypted File Fragments

Add code
Oct 15, 2020
Figure 1 for EnCoD: Distinguishing Compressed and Encrypted File Fragments
Figure 2 for EnCoD: Distinguishing Compressed and Encrypted File Fragments
Figure 3 for EnCoD: Distinguishing Compressed and Encrypted File Fragments
Figure 4 for EnCoD: Distinguishing Compressed and Encrypted File Fragments
Viaarxiv icon

The Naked Sun: Malicious Cooperation Between Benign-Looking Processes

Add code
Nov 06, 2019
Figure 1 for The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
Figure 2 for The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
Figure 3 for The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
Figure 4 for The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
Viaarxiv icon