Giovanni Apruzzese
Orcid: 0000-0002-6890-9611Affiliations:
- University of Liechtenstein, Liechtenstein Business School
According to our database1,
Giovanni Apruzzese
authored at least 38 papers
between 2017 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection.
Comput. Secur., 2025
2024
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning.
DTRAP, 2024
Machine Learning in Space: Surveying the Robustness of on-board ML models to Radiation.
CoRR, 2024
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages.
Proceedings of the ACM on Web Conference 2024, 2024
It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Voices from the Frontline: Revealing the AI Practitioners' viewpoint on the European AI Act.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
"Hey Players, there is a problem...": On Attribute Inference Attacks against Videogamers.
Proceedings of the IEEE Conference on Games, 2024
"Are Crowdsourcing Platforms Reliable for Video Game-related Research?" A Case Study on Amazon Mechanical Turk.
Proceedings of the Companion Proceedings of the 2024 Annual Symposium on Computer-Human Interaction in Play, 2024
LLM4PM: A Case Study on Using Large Language Models for Process Modeling in Enterprise Organizations.
Proceedings of the Business Process Management: Blockchain, Robotic Process Automation, Central and Eastern European, Educators and Industry Forum, 2024
When Adversarial Perturbations meet Concept Drift: An Exploratory Analysis on ML-NIDS.
Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 2024
2023
J. Inf. Secur. Appl., June, 2023
IEEE Trans. Dependable Secur. Comput., 2023
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice.
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
"Do Users Fall for Real Adversarial Phishing?" Investigating the Human Response to Evasive Webpages.
Proceedings of the APWG Symposium on Electronic Crime Research, 2023
Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
2022
IEEE Trans. Netw. Serv. Manag., December, 2022
IEEE Trans. Netw. Serv. Manag., December, 2022
DTRAP, 2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
IEEE Trans. Netw. Serv. Manag., 2020
IEEE Trans. Emerg. Top. Comput. Intell., 2020
IEEE Trans. Emerg. Top. Comput., 2020
2019
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019
Proceedings of the 11th International Conference on Cyber Conflict, 2019
2018
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018
Proceedings of the 10th International Conference on Cyber Conflict, 2018
2017
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017
Proceedings of the 9th International Conference on Cyber Conflict, 2017