Alert button
Picture for Lorenzo Cavallaro

Lorenzo Cavallaro

Alert button

How to Train your Antivirus: RL-based Hardening through the Problem-Space

Add code
Bookmark button
Alert button
Feb 29, 2024
Jacopo Cortellazzi, Ilias Tsingenopoulos, Branislav Bošanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro

Viaarxiv icon

Unraveling the Key of Machine Learning Solutions for Android Malware Detection

Add code
Bookmark button
Alert button
Feb 05, 2024
Jiahao Liu, Jun Zeng, Fabio Pierazzi, Lorenzo Cavallaro, Zhenkai Liang

Viaarxiv icon

TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)

Add code
Bookmark button
Alert button
Feb 02, 2024
Zeliang Kan, Shae McFadden, Daniel Arp, Feargus Pendlebury, Roberto Jordaney, Johannes Kinder, Fabio Pierazzi, Lorenzo Cavallaro

Viaarxiv icon

Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses

Add code
Bookmark button
Alert button
Dec 20, 2023
Ilias Tsingenopoulos, Vera Rimmer, Davy Preuveneers, Fabio Pierazzi, Lorenzo Cavallaro, Wouter Joosen

Viaarxiv icon

Locate and Verify: A Two-Stream Network for Improved Deepfake Detection

Add code
Bookmark button
Alert button
Sep 20, 2023
Chao Shuai, Jieming Zhong, Shuang Wu, Feng Lin, Zhibo Wang, Zhongjie Ba, Zhenguang Liu, Lorenzo Cavallaro, Kui Ren

Figure 1 for Locate and Verify: A Two-Stream Network for Improved Deepfake Detection
Figure 2 for Locate and Verify: A Two-Stream Network for Improved Deepfake Detection
Figure 3 for Locate and Verify: A Two-Stream Network for Improved Deepfake Detection
Figure 4 for Locate and Verify: A Two-Stream Network for Improved Deepfake Detection
Viaarxiv icon

DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues

Add code
Bookmark button
Alert button
Sep 18, 2023
Kun Pan, Yin Yifang, Yao Wei, Feng Lin, Zhongjie Ba, Zhenguang Liu, ZhiBo Wang, Lorenzo Cavallaro, Kui Ren

Figure 1 for DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues
Figure 2 for DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues
Figure 3 for DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues
Figure 4 for DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues
Viaarxiv icon

Symmetry-Preserving Program Representations for Learning Code Semantics

Add code
Bookmark button
Alert button
Aug 07, 2023
Kexin Pei, Weichen Li, Qirui Jin, Shuyang Liu, Scott Geng, Lorenzo Cavallaro, Junfeng Yang, Suman Jana

Figure 1 for Symmetry-Preserving Program Representations for Learning Code Semantics
Figure 2 for Symmetry-Preserving Program Representations for Learning Code Semantics
Figure 3 for Symmetry-Preserving Program Representations for Learning Code Semantics
Figure 4 for Symmetry-Preserving Program Representations for Learning Code Semantics
Viaarxiv icon

Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers

Add code
Bookmark button
Alert button
Feb 11, 2022
Limin Yang, Zhi Chen, Jacopo Cortellazzi, Feargus Pendlebury, Kevin Tu, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang

Figure 1 for Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Figure 2 for Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Figure 3 for Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Figure 4 for Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Viaarxiv icon

Universal Adversarial Perturbations for Malware

Add code
Bookmark button
Alert button
Feb 12, 2021
Raphael Labaca-Castro, Luis Muñoz-González, Feargus Pendlebury, Gabi Dreo Rodosek, Fabio Pierazzi, Lorenzo Cavallaro

Figure 1 for Universal Adversarial Perturbations for Malware
Figure 2 for Universal Adversarial Perturbations for Malware
Figure 3 for Universal Adversarial Perturbations for Malware
Figure 4 for Universal Adversarial Perturbations for Malware
Viaarxiv icon

Dos and Don'ts of Machine Learning in Computer Security

Add code
Bookmark button
Alert button
Oct 19, 2020
Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck

Figure 1 for Dos and Don'ts of Machine Learning in Computer Security
Figure 2 for Dos and Don'ts of Machine Learning in Computer Security
Figure 3 for Dos and Don'ts of Machine Learning in Computer Security
Figure 4 for Dos and Don'ts of Machine Learning in Computer Security
Viaarxiv icon