Luca Pajola

Orcid: 0000-0002-6749-6608

According to our database1, Luca Pajola authored at least 25 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Lights Toward Adversarial Machine Learning: The Achilles Heel of Artificial Intelligence.
IEEE Intell. Syst., 2024

Can LLMs Understand Computer Networks? Towards a Virtual System Administrator.
CoRR, 2024

"All of Me": Mining Users' Attributes from their Public Spotify Playlists.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models.
Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 2024

2023
A Novel Review Helpfulness Measure Based on the User-Review-Item Paradigm.
ACM Trans. Web, November, 2023

Turning captchas against humanity: Captcha-based attacks in online social media.
Online Soc. Networks Media, July, 2023

Invisible Threats: Backdoor Attack in OCR Systems.
CoRR, 2023

You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality.
IEEE Access, 2023

The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum.
Proceedings of the ACM Web Conference 2023, 2023

Boosting Big Brother: Attacking Search Engines with Encodings.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Going in Style: Audio Backdoors Through Stylistic Transformations.
Proceedings of the IEEE International Conference on Acoustics, 2023

SoK: Explainable Machine Learning for Computer Security Applications.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Netw. Serv. Manag., December, 2022

Captcha Attack: Turning Captchas Against Humanity.
CoRR, 2022

PRaNA: PRNU-based Technique to Tell Real and Deepfake Videos Apart.
Proceedings of the International Joint Conference on Neural Networks, 2022

2021
DETONAR: Detection of Routing Attacks in RPL-Based IoT.
IEEE Trans. Netw. Serv. Manag., 2021

Looking Through Walls: Inferring Scenes from Video-Surveillance Encrypted Traffic.
Proceedings of the IEEE International Conference on Acoustics, 2021

Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Fake News Spreaders Profiling Through Behavioural Analysis.
Proceedings of the Working Notes of CLEF 2020, 2020

2019
Threat is in the Air: Machine Learning for Wireless Network Applications.
Proceedings of the ACM Workshop on Wireless Security and Machine Learning, 2019

2018
All You Need is "Love": Evading Hate-speech Detection.
CoRR, 2018

All You Need is: Evading Hate Speech Detection.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018


  Loading...