Lorenzo Cavallaro
King's College
H-index: 34
North America-United States
Top articles of Lorenzo Cavallaro
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets | Jason Gray Daniele Sgandurra Lorenzo Cavallaro Jorge Blasco | 2024 | |
How to Train your Antivirus: RL-based Hardening through the Problem-Space | arXiv preprint arXiv:2402.19027 | Jacopo Cortellazzi Ilias Tsingenopoulos Branislav Bošanský Simone Aonzo Davy Preuveneers | 2024/2/29 |
Unraveling the Key of Machine Learning Solutions for Android Malware Detection | arXiv preprint arXiv:2402.02953 | Jiahao Liu Jun Zeng Fabio Pierazzi Lorenzo Cavallaro Zhenkai Liang | 2024/2/5 |
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version) | arXiv preprint arXiv:2402.01359 | Zeliang Kan Shae McFadden Daniel Arp Feargus Pendlebury Roberto Jordaney | 2024/2/2 |
Security and Privacy of AI Knowledge Guide Issue 1.0. 0 | Lorenzo Cavallaro Emiliano De Cristofaro | 2023 | |
Do you still need a manual smart contract audit? | arXiv preprint arXiv:2306.12338 | Isaac David Liyi Zhou Kaihua Qin Dawn Song Lorenzo Cavallaro | 2023/6/21 |
Locate and verify: A two-stream network for improved deepfake detection | Chao Shuai Jieming Zhong Shuang Wu Feng Lin Zhibo Wang | 2023/10/26 | |
Privacy and security | ACM SIGCAS Computers and Society | Carl S Guynes Grichard G Vedder Michael T Vanecek | 1996/3/1 |
ROPfuscator: Robust Obfuscation with ROP | Giulio De Pasquale Fukutomo Nakanishi Daniele Ferla Lorenzo Cavallaro | 2023/5/25 | |
DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues | Kun Pan Yifang Yin Yao Wei Feng Lin Zhongjie Ba | 2023/10/26 | |
Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses | arXiv preprint arXiv:2312.13435 | Ilias Tsingenopoulos Vera Rimmer Davy Preuveneers Fabio Pierazzi Lorenzo Cavallaro | 2023/12/20 |
Is it overkill? analyzing feature-space concept drift in malware detectors | Zhi Chen Zhenning Zhang Zeliang Kan Limin Yang Jacopo Cortellazzi | 2023/5/25 | |
Exploiting Code Symmetries for Learning Program Semantics | Kexin Pei Weichen Li Qirui Jin Shuyang Liu Scott Geng | 2023/10/13 | |
Drift Forensics of Malware Classifiers | Theo Chow Zeliang Kan Lorenz Linhardt Lorenzo Cavallaro Daniel Arp | 2023/11/30 | |
Jigsaw puzzle: Selective backdoor attack to subvert malware classifiers | Limin Yang Zhi Chen Jacopo Cortellazzi Feargus Pendlebury Kevin Tu | 2023/5/21 | |
Lessons Learned on Machine Learning for Computer Security | IEEE Security & Privacy | Daniel Arp Erwin Quiring Feargus Pendlebury Alexander Warnecke Fabio Pierazzi | 2023/9/6 |
Poster: RPAL-Recovering Malware Classifiers from Data Poisoning using Active Learning | Shae McFadden Zeliang Kan Lorenzo Cavallaro Fabio Pierazzi | 2023/11/15 | |
Are machine learning models for malware detection ready for prime time? | IEEE Security & Privacy | Lorenzo Cavallaro Johannes Kinder Feargus Pendlebury Fabio Pierazzi | 2023/4/14 |
Symmetry-Preserving Program Representations for Learning Code Semantics | arXiv preprint arXiv:2308.03312 | Kexin Pei Weichen Li Qirui Jin Shuyang Liu Scott Geng | 2023/8/7 |
Cross-Modal and Multi-Attribute Face Recognition: A Benchmark | Feng Lin Kaiqiang Fu Hao Luo Ziyue Zhan Zhibo Wang | 2023/10/26 |