Elisa Bertino
Purdue University
H-index: 111
North America-United States
Top articles of Elisa Bertino
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation | Computers & Security | Sonam Bhardwaj Adrian Shuai Li Mayank Dave Elisa Bertino | 2024/2/19 |
Fight Malware Like Malware: A New Defense Method Against Crypto Ransomware | IEEE Transactions on Dependable and Secure Computing | Alian Yu Jian Kang Joshua Morris Elisa Bertino Dan Lin | 2024/2/9 |
Trustguard: Gnn-based robust and explainable trust evaluation with dynamicity support | IEEE Transactions on Dependable and Secure Computing | Jie Wang Zheng Yan Jiahe Lan Elisa Bertino Witold Pedrycz | 2024/1/12 |
FBSDetector: Fake Base Station and Multi Step Attack Detection in Cellular Networks using Machine Learning | arXiv preprint arXiv:2401.04958 | Kazi Samin Mubasshir Imtiaz Karim Elisa Bertino | 2024/1/10 |
Transfer Learning for Security: Challenges and Future Directions | arXiv preprint arXiv:2403.00935 | Adrian Shuai Li Arun Iyengar Ashish Kundu Elisa Bertino | 2024/3/1 |
Distributed cooperative coevolution of data publishing privacy and transparency | ACM Transactions on Knowledge Discovery from Data | Yong-Feng Ge Elisa Bertino Hua Wang Jinli Cao Yanchun Zhang | 2023 |
Ariotedef: Adversarially robust iot early defense system based on self-evolution against multi-step attacks | ACM Transactions on Internet of Things | Mengdie Huang Hyunwoo Lee Ashish Kundu Xiaofeng Chen Anand Mudgerikar | 2024 |
Artificial Intelligence Ethics Education in Cybersecurity: Challenges and Opportunities: a focus group report | Diane Jackson Sorin Adam Matei Elisa Bertino | 2023/11/2 | |
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge | arXiv preprint arXiv:2312.09665 | Jiahe Lan Jie Wang Baochen Yan Zheng Yan Elisa Bertino | 2023/12/15 |
Challenges in the Use of ML for Security | Elisa Bertino Sonam Bhardwaj Fabrizio Cicala Sishuai Gong Imtiaz Karim | 2023/4/9 | |
Attack Management | Elisa Bertino Sonam Bhardwaj Fabrizio Cicala Sishuai Gong Imtiaz Karim | 2023/4/9 | |
BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations | Imtiaz Karim Abdullah Al Ishtiaq Syed Rafiul Hussain Elisa Bertino | 2023/5/21 | |
Security with Privacy | Granular, Fuzzy, and Soft Computing | Elisa Bertino | 2023 |
Evolutionary dynamic database partitioning optimization for privacy and utility | IEEE Transactions on Dependable and Secure Computing | Yong-Feng Ge Hua Wang Elisa Bertino Zhi-Hui Zhan Jinli Cao | 2023/8/7 |
A Pro-Active Defense Framework for IoT Systems | Elisa Bertino Hyunwoo Lee Mengdie Huang Charalampos Katsis Zilin Shen | 2023/11/1 | |
Machine Learning Techniques for Cybersecurity | Elisa Bertino Sonam Bhardwaj Fabrizio Cicala Sishuai Gong Imtiaz Karim | 2023/4/8 | |
Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode | arXiv preprint arXiv:2312.07877 | Zilin Shen Imtiaz Karim Elisa Bertino | 2023/12/13 |
Hardware Security Analysis | Elisa Bertino Sonam Bhardwaj Fabrizio Cicala Sishuai Gong Imtiaz Karim | 2023/4/9 | |
Guest Editorial Special Issue on Intrusion Detection for the Internet of Things | IEEE Internet of Things Journal | Antonino Rullo Elisa Bertino Kui Ren | 2023/5/5 |
Medusa Attack: Exploring Security Hazards of {In-App}{QR} Code Scanning | Xing Han Yuheng Zhang Xue Zhang Zeyuan Chen Mingzhe Wang | 2023 |