Giulio Lovisotto
Giulio Lovisotto
Machine Learning Researcher, Huawei
Verified email at - Homepage
Cited by
Cited by
{SLAP}: Improving physical adversarial examples with {Short-Lived} adversarial perturbations
G Lovisotto, H Turner, I Sluganovic, M Strohmeier, I Martinovic
30th USENIX Security Symposium (USENIX Security 21), 1865-1882, 2021
It's Always April Fools' Day! On the Difficulty of Social Network Misinformation Classification via Propagation Features
M Conti, D Lain, R Lazzeretti, G Lovisotto, W Quattrociocchi
IEEE Workshop on Information Forensics and Security (WIFS), 2017
Seeing red: PPG biometrics using smartphone cameras
G Lovisotto, H Turner, S Eberz, I Martinovic
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
Biometric backdoors: A poisoning attack against unsupervised template updating
G Lovisotto, S Eberz, I Martinovic
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 184-197, 2020
Mobile Biometrics in Financial Services: A Five Factor Framework
G Lovisotto, R Malik, I Sluganovic, M Roeschlin, P Trueman, I Martinovic
28 blinks later: Tackling practical challenges of eye movement biometrics
S Eberz, G Lovisotto, KB Rasmussen, V Lenders, I Martinovic
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
When your fitness tracker betrays you: Quantifying the predictability of biometric features across contexts
S Eberz, G Lovisotto, A Patane, M Kwiatkowska, V Lenders, I Martinovic
2018 IEEE Symposium on Security and Privacy (SP), 889-905, 2018
Speaker anonymization with distribution-preserving x-vector generation for the VoicePrivacy Challenge 2020
H Turner, G Lovisotto, I Martinovic
arXiv preprint arXiv:2010.13457, 2020
Boten ELISA: A novel approach for botnet C&C in online social networks
A Compagno, M Conti, D Lain, G Lovisotto, LV Mancini
2015 IEEE Conference on Communications and Network Security (CNS), 74-82, 2015
They see me rollin’: Inherent vulnerability of the rolling shutter in cmos image sensors
S Köhler, G Lovisotto, S Birnbach, R Baker, I Martinovic
Annual Computer Security Applications Conference, 399-413, 2021
Give me your attention: Dot-product attention considered harmful for adversarial patch robustness
G Lovisotto, N Finnie, M Munoz, CK Mummadi, JH Metzen
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
Attacking Speaker Recognition Systems with Phoneme Morphing
H Turner, G Lovisotto, I Martinovic
European Symposium on Research in Computer Security, 471-492, 2019
Fadewich: fast deauthentication over the wireless channel
M Conti, G Lovisotto, I Martinovic, G Tsudik
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
Generating identities with mixture models for speaker anonymization
H Turner, G Lovisotto, I Martinovic
Computer Speech & Language 72, 101318, 2022
Common evaluation pitfalls in touch-based authentication systems
M Georgiev, S Eberz, H Turner, G Lovisotto, I Martinovic
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
2-hop Neighbor Class Similarity (2NCS): A graph structural metric indicative of graph neural network performance
A Cavallo, C Grohnfeldt, M Russo, G Lovisotto, L Vassio
arXiv preprint arXiv:2212.13202, 2022
I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy
H Turner, G Lovisotto, S Eberz, I Martinovic
arXiv preprint arXiv:2202.06278, 2022
Widen the backdoor to let more attackers in
S Datta, G Lovisotto, I Martinovic, N Shadbolt
arXiv preprint arXiv:2110.04571, 2021
FETA: Fair Evaluation of Touch-based Authentication
M Georgiev, S Eberz, H Turner, G Lovisotto, I Martinovic
arXiv preprint arXiv:2201.10606, 2022
Effective Non-Dissipative Propagation for Continuous-Time Dynamic Graphs
A Gravina, G Lovisotto, C Gallicchio, D Bacciu, C Grohnfeldt
Temporal Graph Learning Workshop@ NeurIPS 2023, 2023
The system can't perform the operation now. Try again later.
Articles 1–20