All You Need is" Love" Evading Hate Speech Detection T Gröndahl, L Pajola, M Juuti, M Conti, N Asokan Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security …, 2018 | 314 | 2018 |
DETONAR: Detection of routing attacks in RPL-based IoT A Agiollo, M Conti, P Kaliyar, TN Lin, L Pajola IEEE transactions on network and service management 18 (2), 1178-1190, 2021 | 94 | 2021 |
The cross-evaluation of machine learning-based network intrusion detection systems G Apruzzese, L Pajola, M Conti IEEE Transactions on Network and Service Management 19 (4), 5152-5169, 2022 | 70 | 2022 |
Sok: Explainable machine learning for computer security applications A Nadeem, D Vos, C Cao, L Pajola, S Dieck, R Baumgartner, S Verwer 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 221-240, 2023 | 57 | 2023 |
You can’t hide behind your headset: User profiling in augmented and virtual reality PP Tricomi, F Nenna, L Pajola, M Conti, L Gamberini IEEE Access 11, 9859-9875, 2023 | 48 | 2023 |
Fake News Spreaders Profiling Through Behavioural Analysis. M Cardaioli, S Cecconello, M Conti, L Pajola, F Turrin CLEF (working notes), 2020 | 31 | 2020 |
Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack L Pajola, M Conti 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 198-211, 2021 | 30 | 2021 |
Going in style: Audio backdoors through stylistic transformations S Koffas, L Pajola, S Picek, M Conti ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023 | 24 | 2023 |
Threat is in the air: Machine learning for wireless network applications L Pajola, L Pasa, M Conti Proceedings of the ACM Workshop on Wireless Security and Machine Learning, 16-21, 2019 | 15 | 2019 |
Targeted next-generation sequencing identification of mutations in disease resistance gene analogs (RGAs) in wild and cultivated beets P Stevanato, C Broccanello, L Pajola, F Biscarini, C Richards, L Panella, ... Genes 8 (10), 264, 2017 | 12 | 2017 |
Turning captchas against humanity: Captcha-based attacks in online social media M Conti, L Pajola, PP Tricomi Online Social Networks and Media 36, 100252, 2023 | 11* | 2023 |
Boosting big brother: Attacking search engines with encodings N Boucher, L Pajola, I Shumailov, R Anderson, M Conti Proceedings of the 26th International Symposium on Research in Attacks …, 2023 | 9 | 2023 |
Your attack is too dumb: Formalizing attacker scenarios for adversarial transferability M Alecci, M Conti, F Marchiori, L Martinelli, L Pajola Proceedings of the 26th international symposium on research in attacks …, 2023 | 6 | 2023 |
Can LLMs Understand Computer Networks? Towards a Virtual System Administrator D Donadel, F Marchiori, L Pajola, M Conti arXiv preprint arXiv:2404.12689, 2024 | 4 | 2024 |
Prana: Prnu-based technique to tell real and deepfake videos apart I Amerini, M Conti, P Giacomazzi, L Pajola 2022 international joint conference on neural networks (IJCNN), 1-7, 2022 | 4 | 2022 |
Invisible Threats: Backdoor Attack in OCR Systems M Conti, N Farronato, S Koffas, L Pajola, S Picek arXiv preprint arXiv:2310.08259, 2023 | 3 | 2023 |
A novel review helpfulness measure based on the user-review-item paradigm L Pajola, D Chen, M Conti, VS Subrahmanian ACM Transactions on the Web 17 (4), 1-31, 2023 | 3 | 2023 |
The impact of Covid-19 on online discussions: the case study of the sanctioned suicide forum E Sartori, L Pajola, G Da San Martino, M Conti Proceedings of the ACM Web Conference 2023, 4060-4064, 2023 | 3 | 2023 |
Social honeypot for humans: luring people through self-managed Instagram pages S Bardi, M Conti, L Pajola, PP Tricomi International Conference on Applied Cryptography and Network Security, 309-336, 2023 | 2 | 2023 |
Looking through walls: Inferring scenes from video-surveillance encrypted traffic D Mari, SG Piazzetta, S Bordin, L Pajola, S Verde, S Milani, M Conti ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021 | 2 | 2021 |