De Carli, Lorenzo
325  results:
Search for persons X
?
 
?
3

Distinguishing AI- and Human-Generated Code: A Case Study:

, In: Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses,
 
?
4

Chiral Brønsted Acid Catalysed Kinetic Resolution of Second..:

Jin, Jianwen ; Carli, Lorenzo ; Zhao, Yichao...
Advanced Synthesis & Catalysis.  365 (2023)  23 - p. 4274-4285 , 2023
 
?
5

(Nothing But) Many Eyes Make All Bugs Shallow:

, In: Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses,
 
?
 
?
7

Breaking Embedded Software Homogeneity with Protocol Mutati..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks,
Ren, Tongwei ; Williams, Ryan ; Ganguly, Sirshendu.. - p. 770-790 , 2023
 
?
 
?
9

Accessibility Evaluation of IoT Android Mobile Companion Ap..:

, In: Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems,
Tazi, Faiza ; Saka, Suleiman ; Opp, Griffin... - p. 1-7 , 2023
 
?
10

What the fork? : finding hidden code clones in npm:

, In: Proceedings of the 44th International Conference on Software Engineering,
 
?
11

Evading behavioral classifiers: a comprehensive analysis on..:

De Gaspari, Fabio ; Hitaj, Dorjan ; Pagnotta, Giulio..
Neural Computing and Applications.  34 (2022)  14 - p. 12077-12096 , 2022
 
?
12

Reliable detection of compressed and encrypted data:

De Gaspari, Fabio ; Hitaj, Dorjan ; Pagnotta, Giulio..
Neural Computing and Applications.  34 (2022)  22 - p. 20379-20393 , 2022
 
?
13

On the Data Privacy, Security, and Risk Postures of IoT Mob..:

, In: Lecture Notes in Computer Science; Data and Applications Security and Privacy XXXVI,
Neupane, Shradha ; Tazi, Faiza ; Paudel, Upakar... - p. 162-182 , 2022
 
?
14

Wolf at the Door : Preventing Install-Time Attacks in np..:

, In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security,
 
?
15

What the Fork? Finding Hidden Code Clones in npm:

, In: 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE),
 
1-15