Giulio Lovisotto

Orcid: 0000-0002-0517-4443

According to our database1, Giulio Lovisotto authored at least 19 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
GCNH: A Simple Method For Representation Learning On Heterophilous Graphs.
Proceedings of the International Joint Conference on Neural Networks, 2023

Continuous-Time Temporal Graph Learning on Provenance Graphs.
Proceedings of the IEEE International Conference on Data Mining, 2023

2022
Generating identities with mixture models for speaker anonymization.
Comput. Speech Lang., 2022

2-hop Neighbor Class Similarity (2NCS): A graph structural metric indicative of graph neural network performance.
CoRR, 2022

I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy.
CoRR, 2022

Give Me Your Attention: Dot-Product Attention Considered Harmful for Adversarial Patch Robustness.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Common Evaluation Pitfalls in Touch-Based Authentication Systems.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Widen The Backdoor To Let More Attackers In.
CoRR, 2021

SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations.
Proceedings of the 30th USENIX Security Symposium, 2021

They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020.
CoRR, 2020

Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Seeing Red: PPG Biometrics Using Smartphone Cameras.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2019
Attacking Speaker Recognition Systems with Phoneme Morphing.
Proceedings of the Computer Security - ESORICS 2019, 2019

28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

FADEWICH: Fast Deauthentication Over the Wireless Channel.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2015
Boten ELISA: A novel approach for botnet C&C in Online Social Networks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015


  Loading...