LP
Luca Pajola
Authored
20 records found
SoK
Explainable Machine Learning for Computer Security Applications
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines. We systematize the increasingly growing (but fragmented) microcosm of studies that develop and utilize XAI methods for defensive and offensive cybersecurity tasks. We id
...
You Can't Hide Behind Your Headset
User Profiling in Augmented and Virtual Reality
Augmented and Virtual Reality (AR and VR), collectively known as Extended Reality (XR), are increasingly gaining traction thanks to their technical advancement and the need for remote connections, recently accentuated by the pandemic. Remote surgery, telerobotics, and virtual off
...
PRaNA
PRNU-based Technique to Tell Real and Deepfake Videos Apart
Videos are a powerful source of communication adopted in several contexts and used for both benign and malicious purposes (e.g., education vs. reputation damage). Nowadays, realistic video manipulation strategies like deepfake generators constitute a severe threat to our society
...
PRaNA
PRNU-based Technique to Tell Real and Deepfake Videos Apart
Videos are a powerful source of communication adopted in several contexts and used for both benign and malicious purposes (e.g., education vs. reputation damage). Nowadays, realistic video manipulation strategies like deepfake generators constitute a severe threat to our society
...
PRaNA
PRNU-based Technique to Tell Real and Deepfake Videos Apart
Videos are a powerful source of communication adopted in several contexts and used for both benign and malicious purposes (e.g., education vs. reputation damage). Nowadays, realistic video manipulation strategies like deepfake generators constitute a severe threat to our society
...
The Impact of Covid-19 on Online Discussions
The Case Study of the Sanctioned Suicide Forum
The COVID-19 pandemic has been at the center of the lives of many of us for at least a couple of years, during which periods of isolation and lockdowns were common. How all that affected our mental well-being, especially the ones' who were already in distress? To investigate the
...
The Impact of Covid-19 on Online Discussions
The Case Study of the Sanctioned Suicide Forum
The COVID-19 pandemic has been at the center of the lives of many of us for at least a couple of years, during which periods of isolation and lockdowns were common. How all that affected our mental well-being, especially the ones' who were already in distress? To investigate the
...
The Impact of Covid-19 on Online Discussions
The Case Study of the Sanctioned Suicide Forum
The COVID-19 pandemic has been at the center of the lives of many of us for at least a couple of years, during which periods of isolation and lockdowns were common. How all that affected our mental well-being, especially the ones' who were already in distress? To investigate the
...
The Impact of Covid-19 on Online Discussions
The Case Study of the Sanctioned Suicide Forum
The COVID-19 pandemic has been at the center of the lives of many of us for at least a couple of years, during which periods of isolation and lockdowns were common. How all that affected our mental well-being, especially the ones' who were already in distress? To investigate the
...
Looking through walls
Inferring scenes from video-surveillance encrypted traffic
Nowadays living environments are characterized by networks of interconnected sensing devices that accomplish different tasks, e.g., video surveillance of an environment by a network of CCTV cameras. A malicious user could gather sensitive details on people's activities by eavesdr
...
Looking through walls
Inferring scenes from video-surveillance encrypted traffic
Nowadays living environments are characterized by networks of interconnected sensing devices that accomplish different tasks, e.g., video surveillance of an environment by a network of CCTV cameras. A malicious user could gather sensitive details on people's activities by eavesdr
...
Looking through walls
Inferring scenes from video-surveillance encrypted traffic
Nowadays living environments are characterized by networks of interconnected sensing devices that accomplish different tasks, e.g., video surveillance of an environment by a network of CCTV cameras. A malicious user could gather sensitive details on people's activities by eavesdr
...
Looking through walls
Inferring scenes from video-surveillance encrypted traffic
Nowadays living environments are characterized by networks of interconnected sensing devices that accomplish different tasks, e.g., video surveillance of an environment by a network of CCTV cameras. A malicious user could gather sensitive details on people's activities by eavesdr
...
Looking through walls
Inferring scenes from video-surveillance encrypted traffic
Nowadays living environments are characterized by networks of interconnected sensing devices that accomplish different tasks, e.g., video surveillance of an environment by a network of CCTV cameras. A malicious user could gather sensitive details on people's activities by eavesdr
...
Looking through walls
Inferring scenes from video-surveillance encrypted traffic
Nowadays living environments are characterized by networks of interconnected sensing devices that accomplish different tasks, e.g., video surveillance of an environment by a network of CCTV cameras. A malicious user could gather sensitive details on people's activities by eavesdr
...
Looking through walls
Inferring scenes from video-surveillance encrypted traffic
Nowadays living environments are characterized by networks of interconnected sensing devices that accomplish different tasks, e.g., video surveillance of an environment by a network of CCTV cameras. A malicious user could gather sensitive details on people's activities by eavesdr
...
Turning captchas against humanity
Captcha-based attacks in online social media
Nowadays, people generate and share massive amounts of content on online platforms (e.g., social networks, blogs). In 2021, the 1.9 billion daily active Facebook users posted around 150 thousand photos every minute. Content moderators constantly monitor these online platforms to
...
Turning captchas against humanity
Captcha-based attacks in online social media
Nowadays, people generate and share massive amounts of content on online platforms (e.g., social networks, blogs). In 2021, the 1.9 billion daily active Facebook users posted around 150 thousand photos every minute. Content moderators constantly monitor these online platforms to
...
Turning captchas against humanity
Captcha-based attacks in online social media
Nowadays, people generate and share massive amounts of content on online platforms (e.g., social networks, blogs). In 2021, the 1.9 billion daily active Facebook users posted around 150 thousand photos every minute. Content moderators constantly monitor these online platforms to
...
Going in Style
Audio Backdoors Through Stylistic Transformations
This work explores stylistic triggers for backdoor attacks in the audio domain: dynamic transformations of malicious samples through guitar effects. We first formalize stylistic triggers – currently missing in the literature. Second, we explore how to develop stylistic triggers i
...