Giulio Lovisotto
Giulio Lovisotto
DPhil student, University of Oxford
Email verificata su - Home page
Citata da
Citata da
It's Always April Fools' Day! On the Difficulty of Social Network Misinformation Classification via Propagation Features
M Conti, D Lain, R Lazzeretti, G Lovisotto, W Quattrociocchi
IEEE Workshop on Information Forensics and Security (WIFS), 2017
Biometric backdoors: A poisoning attack against unsupervised template updating
G Lovisotto, S Eberz, I Martinovic
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 184-197, 2020
Mobile Biometrics in Financial Services: A Five Factor Framework
G Lovisotto, R Malik, I Sluganovic, M Roeschlin, P Trueman, I Martinovic
When your fitness tracker betrays you: Quantifying the predictability of biometric features across contexts
S Eberz, G Lovisotto, A Patane, M Kwiatkowska, V Lenders, I Martinovic
2018 IEEE Symposium on Security and Privacy (SP), 889-905, 2018
Seeing red: PPG biometrics using smartphone cameras
G Lovisotto, H Turner, S Eberz, I Martinovic
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
Boten ELISA: A novel approach for botnet C&C in online social networks
A Compagno, M Conti, D Lain, G Lovisotto, LV Mancini
2015 IEEE Conference on Communications and Network Security (CNS), 74-82, 2015
28 blinks later: Tackling practical challenges of eye movement biometrics
S Eberz, G Lovisotto, KB Rasmussen, V Lenders, I Martinovic
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
{SLAP}: Improving Physical Adversarial Examples with {Short-Lived} Adversarial Perturbations
G Lovisotto, H Turner, I Sluganovic, M Strohmeier, I Martinovic
30th USENIX Security Symposium (USENIX Security 21), 1865-1882, 2021
Speaker anonymization with distribution-preserving x-vector generation for the VoicePrivacy Challenge 2020
H Turner, G Lovisotto, I Martinovic
arXiv preprint arXiv:2010.13457, 2020
Attacking Speaker Recognition Systems with Phoneme Morphing
H Turner, G Lovisotto, I Martinovic
European Symposium on Research in Computer Security, 471-492, 2019
Fadewich: fast deauthentication over the wireless channel
M Conti, G Lovisotto, I Martinovic, G Tsudik
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
They See Me Rollin’: Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors
S Köhler, G Lovisotto, S Birnbach, R Baker, I Martinovic
Annual Computer Security Applications Conference, 399-413, 2021
Widen The Backdoor To Let More Attackers In
S Datta, G Lovisotto, I Martinovic, N Shadbolt
arXiv preprint arXiv:2110.04571, 2021
Common evaluation pitfalls in touch-based authentication systems
M Georgiev, S Eberz, H Turner, G Lovisotto, I Martinovic
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
Generating identities with mixture models for speaker anonymization
H Turner, G Lovisotto, I Martinovic
Computer Speech & Language 72, 101318, 2022
I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy
H Turner, G Lovisotto, S Eberz, I Martinovic
arXiv preprint arXiv:2202.06278, 2022
Give Me Your Attention: Dot-Product Attention Considered Harmful for Adversarial Patch Robustness
G Lovisotto, N Finnie, M Munoz, CK Mummadi, JH Metzen
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–17