1. Chameleon: Increasing Label-Only Membership Leakage with Adaptive Poisoning
    Harsh Chaudhari, Giorgio Severi, Alina Oprea, and Jonathan Ullman
    Oct 2023
  2. Privacy Side Channels in Machine Learning Systems
    Edoardo Debenedetti, Giorgio Severi, Nicholas Carlini, Christopher A. Choquette-Choo, Matthew Jagielski, Milad Nasr, Eric Wallace, and Florian Tramèr
    Sep 2023
  3. Ask and You Shall Receive (a Graph Drawing): Testing ChatGPT’s Potential to Apply Graph Layout Algorithms
    Sara Di Bartolomeo, Giorgio Severi, Victor Schetinger, and Cody Dunne
    In EuroVis Conference on Visualization, Sep 2023
  4. Poisoning Network Flow Classifiers
    Giorgio Severi, Simona Boboila, Alina Oprea, John Holodnak, Kendra Kratkiewicz, and Jason Matterer
    In Proceedings of the 39th Annual Computer Security Applications Conference, Dec 2023


  1. System and Method for Heterogeneous Transferred Learning for Enhanced Cybersecurity Threat Detection
    Scott Eric Coull, David Krisiloff, and Giorgio Severi
    Oct 2022
  2. Bad Citrus: Reducing Adversarial Costs with Model Distances
    Giorgio Severi, Will Pearce, and Alina Oprea
    In 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA), Dec 2022
  3. Network-Level Adversaries in Federated Learning
    Giorgio Severi, Matthew Jagielski, Gökberk Yar, Yuxuan Wang, Alina Oprea, and Cristina Nita-Rotaru
    In 2022 IEEE Conference on Communications and Network Security (CNS), Oct 2022


  1. Subpopulation Data Poisoning Attacks
    Matthew Jagielski, Giorgio Severi, Niklas Pousette Harger, and Alina Oprea
    In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Nov 2021
  2. Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers
    Giorgio Severi, Jim Meyer, Scott Coull, and Alina Oprea
    In 30th USENIX Security Symposium (USENIX Security 21), Nov 2021


  1. Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis
    Giorgio Severi, Tim Leek, and Brendan Dolan-Gavitt
    In Detection of Intrusions and Malware, and Vulnerability Assessment, Nov 2018