Dr. Giovanni Apruzzese
Assistant Professor
University
Liechtenstein
Fürst-Franz-Josef-Strasse
9490 Vaduz
Liechtenstein
giovanni.apruzzese@uni.li
Assistant Professor
Data and Application Security
-
Schröer, S., Pajola, L., Castagnaro, A., Apruzesse, G., & Conti, M. (2025). Exploiting AI for Attacks: On the Interplay between Adversarial AI and Offensive AI. IEEE Intelligent Systems.More
-
Yuan, Y., Apruzzese, G., & Conti, M. (2025). Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection. Computers & Security, 148(January).More
-
Rosenzweig, B., Dalla Valle, V., Apruzzese, Giovanni, & Fass, A. (2025). It's Not Easy: Applying Supervised Machine Learning to Detect Malicious Extensions in the Chrome Web Store. ACM Transactions on the Web.More
-
Schröer, S., Seideman, J. D., Shoufu, L., Apruzesse, G., Dietrich, S., & Laskov, P. (2025). Using a Stack to Find an AI Needle: Topic Modeling for Cyber Threat Intelligence. Digital Threats: Research and Practice, 6(4).More
-
Yuan, Y., Apruzzese, G., & Conti, M. (2024). Multi-SpacePhish: Extending the Evasion Space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. Digital Threats: Research and Practice, 5(2).More
-
Apruzzese, G., Laskov, P., Montes de Oca, E., Mallouli, W., Burdalo Rapa, L., Grammatopoulos, A. V., & Di Franco, F. (2023). The Role of Machine Learning in Cybersecurity. ACM Digital Threats: Research and Practice, 4(1).More
-
Apruzzese, G., & Subrahmanian, V. (2023). Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors. IEEE Transactions on Dependable and Secure Computing (TDSC), 20(5).More
-
Schneider, J., & Apruzzese, G. (2023). Dual Adversarial Attacks: Fooling Humans and Classifiers. Journal of Information Security and Applications, 75.More
-
Apruzzese, G., Pajola, L., & Conti, M. (2022). The Cross-Evaluation of Machine Learning-based Network Intrusion Detection Systems. IEEE Transactions on Network and Service Management, 19(4).More
-
Apruzzese, G., Vladimirov, R., Tastemirova, A., & Laskov, P. (2022). Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples. IEEE Transactions on Network and Service Management (TNSM), 19(4).More
-
Apruzzese, G., Andreolini, M., Ferretti, L., Marchetti, M., & Colajanni, M. (2022). Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems. Digital Threats: Research and Practice, 3(3).More
-
Venturi, A., Apruzzese, G., Andreolini, M., Colajanni, M., & Marchetti, M. (2021). DReLAB–Deep REinforcement Learning Adversarial Botnet: A benchmark dataset for adversarial attacks against botnet Intrusion Detection Systems. Data in Brief, 34, 106631.More
-
Apruzzese, G., Andreolini, M., Marchetti, M., Colacino, V. G., & Russo, G. (2020). AppCon: Mitigating Evasion Attacks to ML Cyber Detectors. Symmetry, 12(4), 653.More
-
Apruzzese, G., Andreolini, M., Colajanni, M., & Marchetti, M. (2020). Hardening Random Forest Cyber Detectors Against Adversarial Attacks. IEEE Transactions on Emerging Topics in Computational Intelligence, 4(4), 427-439.More
-
Apruzzese, G., Andreolini, M., Marchetti, M., Venturi, A., & Colajanni, M. (2020). Deep Reinforcement Adversarial Learning against Botnet Evasion Attacks. IEEE Transactions on Network and Service Management, 17(4).More
-
Apruzzese, G., Pierazzi, F., Colajanni, M., & Marchetti, M. (2017). Detection and threat prioritization of pivoting attacks in large networks. IEEE Transactions on Emerging Topics in Computing (IEEE TETC), 8(2), 404-415.More
-
Verkerken, M., D'hooge, L., Volckaert, B., De Turck, F., & Apruzzese, G. (2026). ConCap: Practical Network Traffic Generation for (ML- and) Flow-based Intrusion Detection Systems. Paper presented at the 4th IEEE Conference on Secure and Trustworthy Machine Learning, Technical University of Munich, Germany.More
-
Pajola, L., Caripoti, E., Banzer, S., Pizzi, S., Conti, M., & Apruzzese, G. (2025). E-PhishGEN: Unlocking Novel Research in Phishing Email Detection. Paper presented at the 18 th ACM Workshop on Artificial Intelligence and Security, Taipei, Taiwan.More
-
Weinz, M., Zannone, N., Allodi, L., & Apruzesse, G. (2025). The Impact of Emerging Phishing Threats: Assessing Quishing and LLM-generated Phishing Emails against Organizations. Paper presented at the 20th ACM Asia Conference on Computer and Communications Security.More
-
Pfister, M., Arpuzzese, G., & Pekaric, I. (2025). Department-Specific Security Awareness Campaigns: A Cross-Organizational Study of HR and Accounting. Paper presented at the APWG's 2025 Symposium on Electronic Crime Research (eCrime 2025), San Diego, USA.More
-
Pekaric, I., & Apruzzese, G. (2025). "We provide our resources in a dedicated repository": Surveying the Transparency of HICSS Publications. Paper presented at the 58th Hawaii International Conference on System Sciences.More
-
Schröer, S., Apruzzese, G., Human, S., Laskov, P., Anderson, H., Bernroider, E., Fass, A., Nassi, B., Rimmer, V., Roli, F., Salam, S., Sehn, A., Sunyaev, A., Wadhaw-Brown, T., Wagner, I., & Wang, G. (2025). SoK: On the Offensive Potential of AI. Paper presented at the 3rd IEEE Conference on Secure and Trustworthy Machine Learning, Copenhagen, Denmark.More
-
Rizvani, A., Apruzzese, G., & Laskov, P. (2025). The Ephemeral Threat: Assessing the Security of Algorithmic Trading Systems Powered by Deep Learning. Paper presented at the 15th ACM Conference on Data and Application Security and Privacy, Pittsburgh, USA.More
-
Pajola, L., Schröer, S. L., Tricomi, P. P., Conti, M., & Apruzzese, G. (2025). Elephant in the Room: Dissecting and Reflecting on the Evolution of Online Social Network Research. Paper presented at the Nineteenth International AAAI Conference on Web and Social Media, Copenhagen, Denmark.More
-
Braun, T., Pekaric, I., & Apruzzese, G. (2024). Understanding the Process of Data Labeling in Cybersecurity. Paper presented at the ACM Symposium on Applied Computing (ACM SAC), Avila, Spain.More
-
Koh, F., Grosse, K., & Apruzzese, G. (2024). Voices from the Frontline: Revealing the AI Practitioners' viewpoint on the European AI Act. Paper presented at the Hawaii International Conference on System Sciences (HICSS).More
-
Lange, K., Fontana, F., Rossi, F., Varile, M., & Apruzzese, G. (2024). Machine Learning in Space: Surveying the Robustness of on-board ML models to Radiation. Paper presented at the IEEE Space Computing Conference, Mountain Vies, USA.More
-
Weinz, M., Schröer, S. L., & Apruzzese, G. (2024). "Hey Google, Remind me to be Phished" Exploiting the Notificatons of the Google (AI) Assistant on Android for Social Engineering Attacks. Paper presented at the APWG Symposium on Electronic Crime Research, Boston, USA.More
-
Apruzzese, G., Fass, A., & Pierrazzi, F. (2024). When Adversarial Perturbations meet Concept Drift: An Exploratory Analysis on ML-NIDS. Paper presented at the 2024 Workshop on Artifical Intelligence and Security.More
-
Eisele, L., & Apruzzese, G. (2024). “Hey Players, there is a problem…”: On Attribute Inference Attacks against Videogamers. Paper presented at the IEEE Conference on Games, Milan, Italy.More
-
Hao, Q., Diwan, N., Yuan, Y., Apruzzese, G., Conti, M., & Wang, G. (2024). It Doesn’t Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors. Paper presented at the 33rd USENIX Security Symposium, Philadelphia, USA.More
-
Ziche, C., & Apruzzese, G. (2024). LLM4PM: A Case Study on Using Large Language Models for Process Modeling in Enterprise Organizations. Paper presented at the International Conference on Business Process Management, Krakow, Poland.More
-
Yuan, Y., Hao, Q., Apruzzese, G., Conti, M., & Wang, G. (2024). "Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages. Paper presented at the ACM Web Conference 2024, Singapore.More
-
Eisele, L., & Apruzzese, G. (2024). "Are Crowdsourcing Platforms Reliable for Video Game-related Research?" A Case Study on Amazon Mechanical Turk. Paper presented at the 2014 Annual Symposium on Computer-Human Interaction in Play, Tampere, Finland.More
-
Lee, J., Xin, Z., See, M. N., Sabharwal, K., Apruzzese, G., & Divakaran, D. (2023). Attacking Logo-based Phishing Website Detectors with Adversarial Perturbations. Paper presented at the European Symposium on Research in Computer Security (ESORICS).More
-
Apruzzese, G., Laskov, P., & Schneider, J. (2023). SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection. Paper presented at the IEEE European Symposium on Security and Privacy (IEEE EuroS&P), Delft, Netherlands.More
-
Apruzzese, G., Anderson, H. S., Dambra, S., Freeman, D., Pierazzi, F., & Roundy, K. A. (2023). "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice. Paper presented at the IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), Raleigh, North Carolina, USA.More
-
Tricomi, P. P., Facciolo, L., Apruzzese, G., & Conti, M. (2023). Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2. Paper presented at the ACM Conference on Data and Application Security and Privacy (CODASPY), Charlotte, NC, United States.More
-
Draganovic, A., Dambra, S., Aldana louit, J., Roundy, K., & Apruzzese, G. (2023). "Do Users fall for Real Adversarial Phishing?" Investigating the Human response to Evasive Webpages. Paper presented at the APWG Symposium on Electronic Crime Research (eCrime), Barcelona, Spain.More
-
Schneider, J., & Apruzzese, G. (2022). Concept-based Adversarial Attacks: Tricking Classifiers and Humans alike. Paper presented at the IEEE Symposium on Security and Privacy: Deep Learning and Security Workshop (SP DLS).More
-
Apruzzese, G., Tastemirova, A., & Laskov, P. (2022). SoK: The Impact of Unlabelled Data for Cyberthreat Detection. Paper presented at the IEEE European Symposium on Security and Privacy (EuroSP).More
-
Apruzzese, G., Conti, M., & Yuan, Y. (2022). SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. Paper presented at the Annual Computer Security Applications Conference, Austin, Texas, USA.More
-
Meyer, J., & Apruzzese, G. (2022). Cybersecurity in the Smart Grid: Practitioners' Perspective. Paper presented at the Industrial Control Systems Security Workshop (ICSS).More
-
Husák, M., Apruzzese, G., Yang, S. J., & Werner, G. (2021). Towards an Efficient Detection of Pivoting Activity. Paper presented at the 17th IFIP/IEEE International Symposium on Integrated Network Management - GraSec Workshop, Bordeaux, France.More
-
Corsini, A., Yang, S. J., & Apruzzese, G. (2021). On the Evaluation of Sequential Machine Learning for Network Intrusion Detection. Paper presented at the 16th International Conference on Availability, Reliability and Security, Vienna, Austria.More
-
Apruzzese, G., Colajanni, M., Ferretti, L., & Marchetti, M. (2019). Addressing adversarial attacks against security systems based on machine learning. Paper presented at the 11th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia.More
-
Apruzzese, G., Colajanni, M., & Marchetti, M. (2019). Evaluating the effectiveness of adversarial attacks against botnet detectors. Paper presented at the IEEE 18th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA.More
-
Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., & Marchetti, M. (2018). On the effectiveness of machine and deep learning for cyber security. Paper presented at the 10th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia.More
-
Apruzzese, G., & Colajanni, M. (2018). Evading botnet detectors based on flows and Random Forest with adversarial samples. Paper presented at the 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA.More
-
Pierazzi, F., Apruzzese, G., Colajanni, M., Guido, A., & Marchetti, M. (2017). Scalable architecture for online prioritisation of cyber threats. Paper presented at the 9th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia.More
-
Apruzzese, G., Marchetti, M., Colajanni, M., Gambigliani Zoccoli, G., & Guido, A. (2017). Identifying malicious hosts involved in periodic communications. Paper presented at the IEEE 16th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA.More