Pier Paolo Tricomi

Orcid: 0000-0003-1600-835X

According to our database1, Pier Paolo Tricomi authored at least 16 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
"All of Me": Mining Users' Attributes from their Public Spotify Playlists.
CoRR, 2024

2023
Turning captchas against humanity: Captcha-based attacks in online social media.
Online Soc. Networks Media, July, 2023

BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication.
Pervasive Mob. Comput., 2023

You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality.
IEEE Access, 2023

Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms.
Proceedings of the 15th ACM Web Science Conference 2023, 2023

Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023

Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Thermal (and Hybrid Thermal/Audio) Side-Channel Attacks on Keyboard Input.
CoRR, 2022

Captcha Attack: Turning Captchas Against Humanity.
CoRR, 2022

Virtual Influencers in Online Social Media.
IEEE Commun. Mag., 2022

Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2022

2021
Secure Static Content Delivery for CDN Using Blockchain Technology.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

2020
PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition.
Proceedings of the Information Security - 23rd International Conference, 2020

DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon.
Proceedings of the Computer Security - ESORICS 2020, 2020


  Loading...