Folgen
Luca Pajola
Luca Pajola
PhD position in Brain, Mind and Computer Science - University Of Padova
Bestätigte E-Mail-Adresse bei studenti.unipd.it - Startseite
Titel
Zitiert von
Zitiert von
Jahr
All You Need is" Love" Evading Hate Speech Detection
T Gröndahl, L Pajola, M Juuti, M Conti, N Asokan
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security …, 2018
3142018
DETONAR: Detection of routing attacks in RPL-based IoT
A Agiollo, M Conti, P Kaliyar, TN Lin, L Pajola
IEEE transactions on network and service management 18 (2), 1178-1190, 2021
942021
The cross-evaluation of machine learning-based network intrusion detection systems
G Apruzzese, L Pajola, M Conti
IEEE Transactions on Network and Service Management 19 (4), 5152-5169, 2022
702022
Sok: Explainable machine learning for computer security applications
A Nadeem, D Vos, C Cao, L Pajola, S Dieck, R Baumgartner, S Verwer
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 221-240, 2023
572023
You can’t hide behind your headset: User profiling in augmented and virtual reality
PP Tricomi, F Nenna, L Pajola, M Conti, L Gamberini
IEEE Access 11, 9859-9875, 2023
482023
Fake News Spreaders Profiling Through Behavioural Analysis.
M Cardaioli, S Cecconello, M Conti, L Pajola, F Turrin
CLEF (working notes), 2020
312020
Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack
L Pajola, M Conti
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 198-211, 2021
302021
Going in style: Audio backdoors through stylistic transformations
S Koffas, L Pajola, S Picek, M Conti
ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023
242023
Threat is in the air: Machine learning for wireless network applications
L Pajola, L Pasa, M Conti
Proceedings of the ACM Workshop on Wireless Security and Machine Learning, 16-21, 2019
152019
Targeted next-generation sequencing identification of mutations in disease resistance gene analogs (RGAs) in wild and cultivated beets
P Stevanato, C Broccanello, L Pajola, F Biscarini, C Richards, L Panella, ...
Genes 8 (10), 264, 2017
122017
Turning captchas against humanity: Captcha-based attacks in online social media
M Conti, L Pajola, PP Tricomi
Online Social Networks and Media 36, 100252, 2023
11*2023
Boosting big brother: Attacking search engines with encodings
N Boucher, L Pajola, I Shumailov, R Anderson, M Conti
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
92023
Your attack is too dumb: Formalizing attacker scenarios for adversarial transferability
M Alecci, M Conti, F Marchiori, L Martinelli, L Pajola
Proceedings of the 26th international symposium on research in attacks …, 2023
62023
Can LLMs Understand Computer Networks? Towards a Virtual System Administrator
D Donadel, F Marchiori, L Pajola, M Conti
arXiv preprint arXiv:2404.12689, 2024
42024
Prana: Prnu-based technique to tell real and deepfake videos apart
I Amerini, M Conti, P Giacomazzi, L Pajola
2022 international joint conference on neural networks (IJCNN), 1-7, 2022
42022
Invisible Threats: Backdoor Attack in OCR Systems
M Conti, N Farronato, S Koffas, L Pajola, S Picek
arXiv preprint arXiv:2310.08259, 2023
32023
A novel review helpfulness measure based on the user-review-item paradigm
L Pajola, D Chen, M Conti, VS Subrahmanian
ACM Transactions on the Web 17 (4), 1-31, 2023
32023
The impact of Covid-19 on online discussions: the case study of the sanctioned suicide forum
E Sartori, L Pajola, G Da San Martino, M Conti
Proceedings of the ACM Web Conference 2023, 4060-4064, 2023
32023
Social honeypot for humans: luring people through self-managed Instagram pages
S Bardi, M Conti, L Pajola, PP Tricomi
International Conference on Applied Cryptography and Network Security, 309-336, 2023
22023
Looking through walls: Inferring scenes from video-surveillance encrypted traffic
D Mari, SG Piazzetta, S Bordin, L Pajola, S Verde, S Milani, M Conti
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
22021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20