Picture for Lorenzo Cavallaro

Lorenzo Cavallaro

LAMD: Context-driven Android Malware Detection and Classification with LLMs

Add code
Feb 18, 2025
Viaarxiv icon

Learning Temporal Invariance in Android Malware Detectors

Add code
Feb 07, 2025
Viaarxiv icon

Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems

Add code
Jan 23, 2025
Viaarxiv icon

On the Lack of Robustness of Binary Function Similarity Systems

Add code
Dec 05, 2024
Viaarxiv icon

Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers

Add code
Sep 06, 2024
Figure 1 for Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
Figure 2 for Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
Figure 3 for Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
Figure 4 for Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers
Viaarxiv icon

How to Train your Antivirus: RL-based Hardening through the Problem-Space

Add code
Feb 29, 2024
Viaarxiv icon

Unraveling the Key of Machine Learning Solutions for Android Malware Detection

Add code
Feb 05, 2024
Figure 1 for Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Figure 2 for Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Figure 3 for Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Figure 4 for Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Viaarxiv icon

TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)

Add code
Feb 02, 2024
Viaarxiv icon

Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses

Add code
Dec 20, 2023
Viaarxiv icon

Locate and Verify: A Two-Stream Network for Improved Deepfake Detection

Add code
Sep 20, 2023
Figure 1 for Locate and Verify: A Two-Stream Network for Improved Deepfake Detection
Figure 2 for Locate and Verify: A Two-Stream Network for Improved Deepfake Detection
Figure 3 for Locate and Verify: A Two-Stream Network for Improved Deepfake Detection
Figure 4 for Locate and Verify: A Two-Stream Network for Improved Deepfake Detection
Viaarxiv icon