Picture for Giulio Pagnotta

Giulio Pagnotta

Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem

Add code
Mar 06, 2024
Viaarxiv icon

OliVaR: Improving Olive Variety Recognition using Deep Neural Networks

Add code
Mar 01, 2023
Figure 1 for OliVaR: Improving Olive Variety Recognition using Deep Neural Networks
Figure 2 for OliVaR: Improving Olive Variety Recognition using Deep Neural Networks
Figure 3 for OliVaR: Improving Olive Variety Recognition using Deep Neural Networks
Figure 4 for OliVaR: Improving Olive Variety Recognition using Deep Neural Networks
Viaarxiv icon

Minerva: A File-Based Ransomware Detector

Add code
Jan 26, 2023
Viaarxiv icon

TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding

Add code
Feb 22, 2022
Figure 1 for TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding
Figure 2 for TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding
Figure 3 for TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding
Figure 4 for TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding
Viaarxiv icon

FedComm: Federated Learning as a Medium for Covert Communication

Add code
Jan 21, 2022
Figure 1 for FedComm: Federated Learning as a Medium for Covert Communication
Figure 2 for FedComm: Federated Learning as a Medium for Covert Communication
Figure 3 for FedComm: Federated Learning as a Medium for Covert Communication
Figure 4 for FedComm: Federated Learning as a Medium for Covert Communication
Viaarxiv icon

PassFlow: Guessing Passwords with Generative Flows

Add code
May 13, 2021
Figure 1 for PassFlow: Guessing Passwords with Generative Flows
Figure 2 for PassFlow: Guessing Passwords with Generative Flows
Figure 3 for PassFlow: Guessing Passwords with Generative Flows
Figure 4 for PassFlow: Guessing Passwords with Generative Flows
Viaarxiv icon

Reliable Detection of Compressed and Encrypted Data

Add code
Mar 31, 2021
Figure 1 for Reliable Detection of Compressed and Encrypted Data
Figure 2 for Reliable Detection of Compressed and Encrypted Data
Figure 3 for Reliable Detection of Compressed and Encrypted Data
Figure 4 for Reliable Detection of Compressed and Encrypted Data
Viaarxiv icon

Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training

Add code
Mar 05, 2021
Figure 1 for Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training
Figure 2 for Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training
Viaarxiv icon

EnCoD: Distinguishing Compressed and Encrypted File Fragments

Add code
Oct 15, 2020
Figure 1 for EnCoD: Distinguishing Compressed and Encrypted File Fragments
Figure 2 for EnCoD: Distinguishing Compressed and Encrypted File Fragments
Figure 3 for EnCoD: Distinguishing Compressed and Encrypted File Fragments
Figure 4 for EnCoD: Distinguishing Compressed and Encrypted File Fragments
Viaarxiv icon

The Naked Sun: Malicious Cooperation Between Benign-Looking Processes

Add code
Nov 06, 2019
Figure 1 for The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
Figure 2 for The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
Figure 3 for The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
Figure 4 for The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
Viaarxiv icon