Dorjan Hitaj

Orcid: 0000-0001-5686-3831

According to our database1, Dorjan Hitaj authored at least 19 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
OliVaR: Improving olive variety recognition using deep neural networks.
Comput. Electron. Agric., January, 2024

FedComm: Federated Learning as a Medium for Covert Communication.
IEEE Trans. Dependable Secur. Comput., 2024

Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects.
CoRR, 2024

Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem.
CoRR, 2024

Have You Poisoned My Data? Defending Neural Networks Against Data Poisoning.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
DOLOS: A Novel Architecture for Moving Target Defense.
IEEE Trans. Inf. Forensics Secur., 2023

Minerva: A File-Based Ransomware Detector.
CoRR, 2023

2022
Reliable detection of compressed and encrypted data.
Neural Comput. Appl., 2022

Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques.
Neural Comput. Appl., 2022

TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding.
CoRR, 2022

MaleficNet: Hiding Malware into Deep Neural Networks Using Spread-Spectrum Channel Coding.
Proceedings of the Computer Security - ESORICS 2022, 2022

PassFlow: Guessing Passwords with Generative Flows.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks.
IEEE Intell. Syst., 2021

Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training.
CoRR, 2021

2020
EnCoD: Distinguishing Compressed and Encrypted File Fragments.
Proceedings of the Network and System Security - 14th International Conference, 2020

The Naked Sun: Malicious Cooperation Between Benign-Looking Processes.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Evasion Attacks Against Watermarking Techniques found in MLaaS Systems.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

2018
Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques.
CoRR, 2018

2015
Towards Indestructible Molecular Robots.
Proceedings of Student Research Forum Papers and Posters at SOFSEM 2015, 2015


  Loading...