publications
Academic publications.
2025
2023
2022
- PETSTrace Oddity: Methodologies for Data-Driven Traffic Analysis on TorProceedings on Privacy Enhancing Technologies, 2022
- WoRMAPosition Paper: On Advancing Adversarial Malware Generation Using Dynamic FeaturesIn Proceedings of the 1st Workshop on Robust Malware Analysis, 2022
- SpringerOpen-World Network Intrusion DetectionIn Security and Artificial Intelligence: A Crossdisciplinary Approach, 2022
- SpringerIntelligent malware defensesIn Security and Artificial Intelligence: A Crossdisciplinary Approach, 2022
2021
- WTMCTroubleshooting an intrusion detection dataset: the CICIDS2017 case studyIn 2021 IEEE Security and Privacy Workshops (SPW), 2021
2018
- NDSSAutomated Website Fingerprinting through Deep LearningIn Proceedings of the 25nd Network and Distributed System Security Symposium (NDSS 2018), 2018
- WOOTFishy faces: Crafting adversarial images to poison face authenticationIn 12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018
- App.Sci.Chained anomaly detection models for federated learning: An intrusion detection case studyApplied Sciences, 2018
2017
- SECURWAREFrictionless authentication systems: Emerging trends, research challenges and opportunitiesIn 11th Int. Conf. on Emerging Security Information, Systems and Technologies, SECURWARE, 2017