Follow
Igino Corona
Igino Corona
Computer Security Researcher & Co-founder, Pluribus One
Verified email at pluribus-one.it - Homepage
Title
Cited by
Cited by
Year
Evasion attacks against machine learning at test time
B Biggio, I Corona, D Maiorca, B Nelson, N Šrndić, P Laskov, G Giacinto, ...
Machine Learning and Knowledge Discovery in Databases: European Conference†…, 2013
14992013
Yes, Machine Learning Can Be More Secure
A Demontis, M Melis, B Biggio, D Maiorca, D Arp, K Rieck, I Corona, ...
Machine Learning Can Be More Secure, 711-724, 2018
305*2018
Detecting malicious flux service networks through passive analysis of recursive DNS traces
R Perdisci, I Corona, D Dagon, W Lee
2009 Annual Computer Security Applications Conference, 311-320, 2009
2462009
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
I Corona, G Giacinto, F Roli
Information Sciences 239, 201-225, 2013
2422013
Stealth attacks: An extended insight into the obfuscation effects on android malware
D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto
Computers & Security 51, 16-31, 2015
2012015
Poisoning behavioral malware clustering
B Biggio, K Rieck, D Ariu, C Wressnegger, I Corona, G Giacinto, F Roli
Proceedings of the 2014 workshop on artificial intelligent and security†…, 2014
1582014
A pattern recognition system for malicious pdf files detection
D Maiorca, G Giacinto, I Corona
International workshop on machine learning and data mining in pattern†…, 2012
1522012
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection
D Maiorca, I Corona, G Giacinto
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and†…, 2013
1502013
Early detection of malicious flux networks via large-scale passive DNS traffic analysis
R Perdisci, I Corona, G Giacinto
IEEE Transactions on Dependable and Secure Computing 9 (5), 714-726, 2012
1462012
Bagging classifiers for fighting poisoning attacks in adversarial classification tasks
B Biggio, I Corona, G Fumera, G Giacinto, F Roli
Multiple Classifier Systems: 10th International Workshop, MCS 2011, Naples†…, 2011
1392011
Security evaluation of support vector machines in adversarial environments
B Biggio, I Corona, B Nelson, BIP Rubinstein, D Maiorca, G Fumera, ...
Support Vector Machines Applications, 105-153, 2014
1232014
Information fusion for computer security: State of the art and open issues
I Corona, G Giacinto, C Mazzariello, F Roli, C Sansone
Information Fusion 10 (4), 274-284, 2009
902009
Lux0r: Detection of malicious pdf-embedded javascript code through discriminant analysis of api references
I Corona, D Maiorca, D Ariu, G Giacinto
Proceedings of the 2014 workshop on artificial intelligent and security†…, 2014
822014
Deltaphish: Detecting phishing webpages in compromised websites
I Corona, B Biggio, M Contini, L Piras, R Corda, M Mereu, G Mureddu, ...
Computer Security–ESORICS 2017: 22nd European Symposium on Research in†…, 2017
802017
Hmm-web: A framework for the detection of attacks against web applications
I Corona, D Ariu, G Giacinto
2009 IEEE International Conference on Communications, 1-6, 2009
672009
Tight arms race: Overview of current malware threats and trends in their detection
L Caviglione, M Choraś, I Corona, A Janicki, W Mazurczyk, M Pawlicki, ...
IEEE Access 9, 5371-5396, 2020
652020
A structural and content-based approach for a precise and robust detection of malicious PDF files
D Maiorca, D Ariu, I Corona, G Giacinto
2015 international conference on information systems security and privacy†…, 2015
582015
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time
B Biggio, I Corona, ZM He, PPK Chan, G Giacinto, DS Yeung, F Roli
Multiple Classifier Systems: 12th International Workshop, MCS 2015, GŁnzburg†…, 2015
542015
Detection of server-side web attacks
I Corona, G Giacinto
Proceedings of the First Workshop on Applications of Pattern Analysis, 160-166, 2010
262010
Intrusion detection in computer systems using multiple classifier systems
I Corona, G Giacinto, F Roli
Supervised and Unsupervised Ensemble Methods and their Applications, 91-113, 2008
202008
The system can't perform the operation now. Try again later.
Articles 1–20