Picture for Giovanni Apruzzese

Giovanni Apruzzese

Machine Learning in Space: Surveying the Robustness of on-board ML models to Radiation

Add code
May 04, 2024
Viaarxiv icon

SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection

Add code
Apr 30, 2023
Viaarxiv icon

"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice

Add code
Dec 29, 2022
Figure 1 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Figure 2 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Figure 3 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Figure 4 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Viaarxiv icon

Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors

Add code
Dec 11, 2022
Viaarxiv icon

SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

Add code
Oct 24, 2022
Viaarxiv icon

Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2

Add code
Oct 17, 2022
Figure 1 for Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2
Figure 2 for Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2
Figure 3 for Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2
Figure 4 for Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2
Viaarxiv icon

Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples

Add code
Jul 04, 2022
Figure 1 for Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
Figure 2 for Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
Figure 3 for Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
Figure 4 for Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
Viaarxiv icon

The Role of Machine Learning in Cybersecurity

Add code
Jun 20, 2022
Figure 1 for The Role of Machine Learning in Cybersecurity
Figure 2 for The Role of Machine Learning in Cybersecurity
Figure 3 for The Role of Machine Learning in Cybersecurity
Figure 4 for The Role of Machine Learning in Cybersecurity
Viaarxiv icon

SoK: The Impact of Unlabelled Data in Cyberthreat Detection

Add code
May 18, 2022
Figure 1 for SoK: The Impact of Unlabelled Data in Cyberthreat Detection
Figure 2 for SoK: The Impact of Unlabelled Data in Cyberthreat Detection
Figure 3 for SoK: The Impact of Unlabelled Data in Cyberthreat Detection
Figure 4 for SoK: The Impact of Unlabelled Data in Cyberthreat Detection
Viaarxiv icon

Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike

Add code
Mar 18, 2022
Figure 1 for Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike
Figure 2 for Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike
Figure 3 for Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike
Viaarxiv icon