Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network., , , , , , and . ESORICS Workshops (2), volume 14399 of Lecture Notes in Computer Science, page 198-213. Springer, (2023)Fake News Spreaders Profiling Through Behavioural Analysis., , , , and . CLEF (Working Notes), volume 2696 of CEUR Workshop Proceedings, CEUR-WS.org, (2020)A Novel Review Helpfulness Measure Based on the User-Review-Item Paradigm., , , and . ACM Trans. Web, 17 (4): 27:1-27:31 (November 2023)All You Need is: Evading Hate Speech Detection., , , , and . AISec@CCS, page 2-12. ACM, (2018)SoK: Explainable Machine Learning for Computer Security Applications., , , , , , and . CoRR, (2022)SoK: Explainable Machine Learning for Computer Security Applications., , , , , , and . EuroS&P, page 221-240. IEEE, (2023)PRaNA: PRNU-based Technique to Tell Real and Deepfake Videos Apart., , , and . IJCNN, page 1-7. IEEE, (2022)All You Need is "Love": Evading Hate-speech Detection., , , , and . CoRR, (2018)The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum., , , and . WWW, page 4060-4064. ACM, (2023)Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability., , , , and . RAID, page 315-329. ACM, (2023)