LP

Luca Pajola

Authored

20 records found

SoK

Explainable Machine Learning for Computer Security Applications

Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines. We systematize the increasingly growing (but fragmented) microcosm of studies that develop and utilize XAI methods for defensive and offensive cybersecurity tasks. We id ...

You Can't Hide Behind Your Headset

User Profiling in Augmented and Virtual Reality

Augmented and Virtual Reality (AR and VR), collectively known as Extended Reality (XR), are increasingly gaining traction thanks to their technical advancement and the need for remote connections, recently accentuated by the pandemic. Remote surgery, telerobotics, and virtual off ...

PRaNA

PRNU-based Technique to Tell Real and Deepfake Videos Apart

Videos are a powerful source of communication adopted in several contexts and used for both benign and malicious purposes (e.g., education vs. reputation damage). Nowadays, realistic video manipulation strategies like deepfake generators constitute a severe threat to our society ...

PRaNA

PRNU-based Technique to Tell Real and Deepfake Videos Apart

Videos are a powerful source of communication adopted in several contexts and used for both benign and malicious purposes (e.g., education vs. reputation damage). Nowadays, realistic video manipulation strategies like deepfake generators constitute a severe threat to our society ...

PRaNA

PRNU-based Technique to Tell Real and Deepfake Videos Apart

Videos are a powerful source of communication adopted in several contexts and used for both benign and malicious purposes (e.g., education vs. reputation damage). Nowadays, realistic video manipulation strategies like deepfake generators constitute a severe threat to our society ...

The Impact of Covid-19 on Online Discussions

The Case Study of the Sanctioned Suicide Forum

The COVID-19 pandemic has been at the center of the lives of many of us for at least a couple of years, during which periods of isolation and lockdowns were common. How all that affected our mental well-being, especially the ones' who were already in distress? To investigate the ...

The Impact of Covid-19 on Online Discussions

The Case Study of the Sanctioned Suicide Forum

The COVID-19 pandemic has been at the center of the lives of many of us for at least a couple of years, during which periods of isolation and lockdowns were common. How all that affected our mental well-being, especially the ones' who were already in distress? To investigate the ...

The Impact of Covid-19 on Online Discussions

The Case Study of the Sanctioned Suicide Forum

The COVID-19 pandemic has been at the center of the lives of many of us for at least a couple of years, during which periods of isolation and lockdowns were common. How all that affected our mental well-being, especially the ones' who were already in distress? To investigate the ...

The Impact of Covid-19 on Online Discussions

The Case Study of the Sanctioned Suicide Forum

The COVID-19 pandemic has been at the center of the lives of many of us for at least a couple of years, during which periods of isolation and lockdowns were common. How all that affected our mental well-being, especially the ones' who were already in distress? To investigate the ...

Looking through walls

Inferring scenes from video-surveillance encrypted traffic

Nowadays living environments are characterized by networks of interconnected sensing devices that accomplish different tasks, e.g., video surveillance of an environment by a network of CCTV cameras. A malicious user could gather sensitive details on people's activities by eavesdr ...

Looking through walls

Inferring scenes from video-surveillance encrypted traffic

Nowadays living environments are characterized by networks of interconnected sensing devices that accomplish different tasks, e.g., video surveillance of an environment by a network of CCTV cameras. A malicious user could gather sensitive details on people's activities by eavesdr ...

Looking through walls

Inferring scenes from video-surveillance encrypted traffic

Nowadays living environments are characterized by networks of interconnected sensing devices that accomplish different tasks, e.g., video surveillance of an environment by a network of CCTV cameras. A malicious user could gather sensitive details on people's activities by eavesdr ...

Looking through walls

Inferring scenes from video-surveillance encrypted traffic

Nowadays living environments are characterized by networks of interconnected sensing devices that accomplish different tasks, e.g., video surveillance of an environment by a network of CCTV cameras. A malicious user could gather sensitive details on people's activities by eavesdr ...

Looking through walls

Inferring scenes from video-surveillance encrypted traffic

Nowadays living environments are characterized by networks of interconnected sensing devices that accomplish different tasks, e.g., video surveillance of an environment by a network of CCTV cameras. A malicious user could gather sensitive details on people's activities by eavesdr ...

Looking through walls

Inferring scenes from video-surveillance encrypted traffic

Nowadays living environments are characterized by networks of interconnected sensing devices that accomplish different tasks, e.g., video surveillance of an environment by a network of CCTV cameras. A malicious user could gather sensitive details on people's activities by eavesdr ...

Looking through walls

Inferring scenes from video-surveillance encrypted traffic

Nowadays living environments are characterized by networks of interconnected sensing devices that accomplish different tasks, e.g., video surveillance of an environment by a network of CCTV cameras. A malicious user could gather sensitive details on people's activities by eavesdr ...

Turning captchas against humanity

Captcha-based attacks in online social media

Nowadays, people generate and share massive amounts of content on online platforms (e.g., social networks, blogs). In 2021, the 1.9 billion daily active Facebook users posted around 150 thousand photos every minute. Content moderators constantly monitor these online platforms to ...

Turning captchas against humanity

Captcha-based attacks in online social media

Nowadays, people generate and share massive amounts of content on online platforms (e.g., social networks, blogs). In 2021, the 1.9 billion daily active Facebook users posted around 150 thousand photos every minute. Content moderators constantly monitor these online platforms to ...

Turning captchas against humanity

Captcha-based attacks in online social media

Nowadays, people generate and share massive amounts of content on online platforms (e.g., social networks, blogs). In 2021, the 1.9 billion daily active Facebook users posted around 150 thousand photos every minute. Content moderators constantly monitor these online platforms to ...

Going in Style

Audio Backdoors Through Stylistic Transformations

This work explores stylistic triggers for backdoor attacks in the audio domain: dynamic transformations of malicious samples through guitar effects. We first formalize stylistic triggers – currently missing in the literature. Second, we explore how to develop stylistic triggers i ...