Mauro Conti

Mauro Conti

Wallenberg Guest Professor

AASS Research Center
School of Science and Technology
Örebro University
70182 Örebro, Sweden
Room: No Room Available
Phone: No Phone Number Available
Email: No Email Address Available

Google Scholar

Publications

[1] M. Li, Z. Li, Y. Chen, Y. Qiao and M. Conti. Artemis : Decentralized, Secure, and Efficient Safety Monitoring with Dynamic Trajectories. In Information and Communications Security : 27th International Conference, ICICS 2025, Nanjing, China, October 29–31, 2025, Proceedings, Part I, 16217(16217):387-404, 2026BibTeX | DiVA ]
[2] F. Marchiori, M. Alecci, L. Pajola and M. Conti. DUMB and DUMBer : Is Adversarial Training Worth It in the Real World?. In Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I, 16053(16053):228-248, 2026BibTeX | DiVA ]
[3] J. Xu, S. Wang, V. Loscri, A. Brighente, M. Conti and R. Rouvoy. GANSec : Enhancing Supervised Wireless Anomaly Detection Robustness Through Tailored Conditional GAN Augmentation. In Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I, 16053(16053):430-449, 2026BibTeX | DiVA ]
[4] A. Belousova, F. Marchior and M. Conti. Inference Attacks on Encrypted Online Voting via Traffic Analysis. In Information Security : 28th International Conference, ISC 2025, Seoul, South Korea, October 20–22, 2025, Proceedings, 16186(16186):216-236, 2026BibTeX | DiVA ]
[5] Q. Wang, D. Hu, M. Li, Y. Qiao, G. Yang and M. Conti. Secure Multi-Character Searchable Encryption Supporting Rich Search Functionalities. IEEE Transactions on Knowledge and Data Engineering, 38(3):1958-1972, 2026BibTeX | DiVA ]
[6] E. Marin, J. Kim, A. Pavoni, M. Conti and R. Di Pietro. The Hidden Dangers of Public Serverless Repositories : An Empirical Security Assessment. In Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III, 16055(16055):382-401, 2026BibTeX | DiVA ]
[7] E. Nowroozi, M. Mohammadi, A. Rahdari, R. Taheri and M. Conti. A Random Deep Feature Selection Approach to Mitigate Transferable Adversarial Attacks. IEEE Transactions on Network and Service Management, 22(6):5301-5310, 2025BibTeX | DiVA ]
[8] A. Brighente, L. Cipolletta, M. Conti and L. Latini. Are Flow Correlation Attacks Effective on Tor? A Critical Evaluation of State-of-the-Art Proposals. In 2025 IEEE Conference on Communications and Network Security (CNS) : Proceedings 2025BibTeX | DiVA ]
[9] T. Devgun, G. Kumar, R. Saha, A. Brighente and M. Conti. AWOSE : Probabilistic State Model for Consensus Algorithms' Fuzzing Frameworks. In ASIA CCS '25 : Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, pages 955-970, 2025BibTeX | DiVA ]
[10] K. Balasubramanian, A. G. Baragur, D. Donadel, D. Sahabandu, A. Brighente, B. Ramasubramanian, M. Conti and R. Poovendran. CANLP : Intrusion Detection for Controller Area Networks Using Natural Language Processing and Embedded Machine Learning. IEEE Transactions on Dependable and Secure Computing, 22(6):7203-7214, 2025BibTeX | DiVA ]
[11] S. Wang, A. Brighente, V. Loscri, J. Zhang and M. Conti. Capodoglio : Tackling Multi-Armed Bandit Jamming Attacks. In 2025 IEEE 24th International Conference on Trust,Security and Privacy in Computing and Communications. TrustCom 2025 : Proceedings, pages 2803-2810, 2025BibTeX | DiVA ]
[12] H. Luo, G. Li, A. Brighente, M. Conti, Y. Xing, A. Hu and X. Wang. Channel-Robust RF Fingerprint Identification for Multi-Antenna 5G User Equipments. IEEE Transactions on Information Forensics and Security, 20:10761-10776, 2025BibTeX | DiVA ]
[13] S. Xu, S. Wang, S. Sciancalepore, A. Brighente and M. Conti. Confundus : Mitigating Hostile Wireless Source Localization. In 2025 IEEE Conference on Communications and Network Security (CNS) : Proceedings 2025BibTeX | DiVA ]
[14] G. Kumar, R. Saha, M. Conti and T. H. Kim. DAWS : A Comprehensive Solution Against De-Anonymization Attacks in Blockchains. IEEE Transactions on Network and Service Management, 22(5):4747-4761, 2025BibTeX | DiVA ]
[15] M. Venturini, F. Freda, E. Miotto, M. Conti and A. Giaretta. Differential Area Analysis for Ransomware : Attacks, Countermeasures, and Limitations. IEEE Transactions on Dependable and Secure Computing, 22(4):3449-3464, 2025BibTeX | DiVA ]
[16] L. Wang, L. Zhang, K. K. R. Choo, J. Domingo-Ferrer, M. Conti and Y. Gao. Dual-Server Privacy-Preserving Collaborative Deep Learning : A Round-Efficient, Dynamic and Lossless Approach. IEEE Transactions on Dependable and Secure Computing, 22(6):7759-7772, 2025BibTeX | DiVA ]
[17] E. Caripoti, L. Pajola, S. Banzer, S. Pizzi, M. Conti and G. Apruzzese. E-PhishGEN : Unlocking Novel Research in Phishing Email Detection. In Proceedings of the 18th ACM Workshop on Artificial Intelligenceand Security (AISec 2025), pages 64-76, 2025BibTeX | DiVA ]
[18] S. Xu, A. Brighente, B. Chen, M. Conti and S. Peng. Ghost of the Navigator : Spoofing Attack Against Direction-of-Arrival Estimation. IEEE Internet of Things Journal, 12(23):49932-49941, 2025BibTeX | DiVA ]
[19] H. Nie, W. Wang, P. Xu, W. Chen, L. Yang, M. Conti and K. Liang. Peekaboo, I See Your Queries : Passive Attacks Against DSSE Via Intermittent Observations. In CCS '25 : Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, pages 2429-2443, 2025BibTeX | DiVA ]
[20] A. Castagnaro, U. Salviati, M. Conti, L. Pajola and S. Pizzi. The Hidden Threat in Plain Text : Attacking RAG Data Loaders. In Proceedings of the 18th ACM Workshop on Artificial Intelligenceand Security (AISec 2025), pages 170-181, 2025BibTeX | DiVA ]
[21] M. Li, H. Ding, Y. Chen, Y. Qiao, Z. Zhang, L. Zhu and M. Conti. Threshold Signatures With Verifiably Timed Combining and Message-Dependent Tracing. IEEE Transactions on Information Forensics and Security, 20:9477-9491, 2025BibTeX | DiVA ]
[22] M. Li, Y. Chen, Y. Qiao, G. Ye, Z. Zhang, L. Zhu and M. Conti. Trust in a Decentralized World : Data Governance From Faithful, Private, Verifiable, and Traceable Data Feeds. IEEE Transactions on Information Forensics and Security, 20:10818-10833, 2025BibTeX | DiVA ]
[23] G. Kumar, R. Saha, M. Conti and T. H. Kim. ZAKON : A decentralized framework for digital forensic admissibility and justification. Information Processing & Management, 62(6), 2025BibTeX | DiVA ]
[24] Y. Zhu, Z. Chen, Q. Yan, S. Wang, A. Giaretta, E. Li, L. Peng, C. Zhao and M. Conti. Devils in the Clouds : An Evolutionary Study of Telnet Bot Loaders. In ICC 2023 - IEEE International Conference on Communications, pages 2338-2344, 2023BibTeX | DiVA ]
[25] F. Tavella, A. Giaretta, M. Conti and S. Balasubramaniam. A machine learning-based approach to detect threats in bio-cyber DNA storage systems. Computer Communications, 187:59-70, 2022BibTeX | DiVA ]
[26] J. Pirayesh, A. Giaretta, M. Conti and P. Keshavarzi. A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Computer Networks, 216, 2022BibTeX | DiVA ]
[27] F. Tavella, A. Giaretta, T. M. Dooley-Cullinane, M. Conti, L. Coffey and S. Balasubramaniam. DNA Molecular Storage System : Transferring Digitally Encoded Information through Bacterial Nanonetworks. IEEE Transactions on Emerging Topics in Computing, 9(3):1566-1580, 2021BibTeX | DiVA ]
[28] M. Conti, N. Dragoni and V. Lesyk. A Survey of Man In The Middle Attacks. IEEE Communications Surveys and Tutorials, 18(3):2027-2051, 2016BibTeX | DiVA ]
[29] A. Giaretta, S. Balasubramaniam and M. Conti. Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks. IEEE Transactions on Information Forensics and Security, 11(4):665-676, 2016BibTeX | DiVA ]