Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Lorenzo DeCarli, and Luigi V. Mancini. Minerva: A File-Based Ransomware Detector, In The 20th ACM ASIA Conference on Computer and Communications Security. [Acceptance rate 18%][PDF]
Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Sediola Ruko, Briland Hitaj, Luigi V. Mancini and Fernando Perez-Cruz. Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem IEEE Transactions on Dependable and Secure Computing (IEEE-TDSC). [corresponding author][PDF]
Sabrine Ennaji, Fabio De Gaspari, Dorjan Hitaj, Alicia Kbidi and Luigi V. Mancini. Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects IEEE Access [PDF],
William Corrias, Fabio De Gaspari, Dorjan Hitaj, and Luigi V. Mancini. MAYA: Addressing Inconsistencies in Generative Password Guessing through a Unified Benchmark, 47th IEEE Symposium on Security and Privacy [To appear May 2026]. [PDF]
Giulio Pagnotta, Dorjan Hitaj, Briland Hitaj, Fernando Perez-Cruz, and Luigi V. Mancini. TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread Spectrum Channel Coding. In The 40th Annual Computer Security Applications Conference (ACSAC) [PDF] [Acceptance rate 21.8%][corresponding author]
Fabio De Gaspari, Dorjan Hitaj, Luigi V. Mancini. Have You Poisoned My Data? Defending Neural Networks against Data Poisoning In The 29th European Symposium on Research in Computer Security (ESORICS). [PDF]
Hristofor Miho, Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi Vincenzo Mancini, Georgios Koubouris, Gianluca Godino, Mehmet Hakan, Concepción Muñoz Diez. OliVaR: Improving olive variety recognition using deep neural networks. In Computers and Electronics in Agriculture [corresponding author][PDF].
Dorjan Hitaj, Giulio Pagnotta, Briland Hitaj, Fernando Perez-Cruz, and Luigi V. Mancini. FedComm: Federated Learning as a Medium for Stealthy Communication IEEE Transactions on Dependable and Secure Computing (IEEE-TDSC). [PDF] [corresponding author]
Giulio Pagnotta, Fabio De Gaspari, Dorjan Hitaj, Mauro Andreolini, Michele Colajanni and Luigi V. Mancini. DOLOS: A Novel Architecture for Moving Target Defense IEEE Transactions on Information Forensics and Security (IEEE-TIFS). [PDF]
Dorjan Hitaj, Giulio Pagnotta, Briland Hitaj, Luigi V. Mancini and Fernando Perez-Cruz. MaleficNet: Hiding Malware into Deep Neural Networks using Spread-Spectrum Channel Coding The 27th European Symposium on Research in Computer Security (ESORICS) [PDF] [Acceptance rate 18.5%] [corresponding author].
Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, and Luigi V. Mancini. PassFlow: Guessing Passwords with Generative Flows The 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). [PDF]
Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo DeCarli, and Luigi V. Mancini. Evading Behavioral Classifiers: A Comprehensive Analysis on Evading Ransomware Detection Techniques In Neural Computing and Applications (NCAA). [PDF]
Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo DeCarli, and Luigi V. Mancini. Reliable Detection of Compressed and Encrypted Data In Neural Computing and Applications (NCAA). [PDF] [corresponding author]
Dorjan Hitaj, Giulio Pagnotta, Iacopo Masi. Evaluating the robustness of geometry-aware instance-reweighted adversarial training. Technical report [PDF]
Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo DeCarli, and Luigi V. Mancini. EnCoD: Distinguishing Compressed and Encrypted File Fragments. 14th International Conference on Network and System Security (NSS), [PDF] [corresponding author]
Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo DeCarli, and Luigi V. Mancini. The Naked Sun: Malicious Cooperation Between Benign-Looking Processes. In the 18th International Conference on Applied Cryptography and Network Security (ACNS). [PDF]
Dorjan Hitaj, Briland Hitaj, Luigi V. Mancini and Sushil Jajodia. Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks. IEEE Intelligent Systems. [PDF] [corresponding author]
Dorjan Hitaj, Briland Hitaj, Luigi V. Mancini. Evasion Attacks Against Watermarking Techniques Found in MLaaS Systems. In the 6th IEEE International Conference on Software Defined Systems (IEEE-SDS). [PDF] [corresponding author]
Ilir Capuni, Anisa Halimi, and Dorjan Hitaj. Towards Indestructible Molecular Robots. In the International Conference on Current Trends in Theory and Practice of Computer Science. [PDF]