Follow
Giulio Lovisotto
Giulio Lovisotto
Machine Learning Researcher, Huawei
Verified email at huawei.com - Homepage
Title
Cited by
Cited by
Year
{SLAP}: Improving physical adversarial examples with {Short-Lived} adversarial perturbations
G Lovisotto, H Turner, I Sluganovic, M Strohmeier, I Martinovic
30th USENIX Security Symposium (USENIX Security 21), 1865-1882, 2021
722021
Seeing red: PPG biometrics using smartphone cameras
G Lovisotto, H Turner, S Eberz, I Martinovic
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
452020
It's Always April Fools' Day! On the Difficulty of Social Network Misinformation Classification via Propagation Features
M Conti, D Lain, R Lazzeretti, G Lovisotto, W Quattrociocchi
IEEE Workshop on Information Forensics and Security (WIFS), 2017
452017
Biometric backdoors: A poisoning attack against unsupervised template updating
G Lovisotto, S Eberz, I Martinovic
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 184-197, 2020
422020
28 blinks later: Tackling practical challenges of eye movement biometrics
S Eberz, G Lovisotto, KB Rasmussen, V Lenders, I Martinovic
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
342019
When your fitness tracker betrays you: Quantifying the predictability of biometric features across contexts
S Eberz, G Lovisotto, A Patane, M Kwiatkowska, V Lenders, I Martinovic
2018 IEEE Symposium on Security and Privacy (SP), 889-905, 2018
322018
Mobile Biometrics in Financial Services: A Five Factor Framework
G Lovisotto, R Malik, I Sluganovic, M Roeschlin, P Trueman, I Martinovic
32*
Give me your attention: Dot-product attention considered harmful for adversarial patch robustness
G Lovisotto, N Finnie, M Munoz, CK Mummadi, JH Metzen
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
262022
They see me rollin’: Inherent vulnerability of the rolling shutter in cmos image sensors
S Köhler, G Lovisotto, S Birnbach, R Baker, I Martinovic
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
222021
Speaker anonymization with distribution-preserving x-vector generation for the VoicePrivacy challenge 2020
H Turner, G Lovisotto, I Martinovic
arXiv preprint arXiv:2010.13457, 2020
212020
Boten ELISA: A novel approach for botnet C&C in online social networks
A Compagno, M Conti, D Lain, G Lovisotto, LV Mancini
2015 IEEE Conference on Communications and Network Security (CNS), 74-82, 2015
212015
Attacking Speaker Recognition Systems with Phoneme Morphing
H Turner, G Lovisotto, I Martinovic
European Symposium on Research in Computer Security, 471-492, 2019
152019
Fadewich: fast deauthentication over the wireless channel
M Conti, G Lovisotto, I Martinovic, G Tsudik
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
102017
Common evaluation pitfalls in touch-based authentication systems
M Georgiev, S Eberz, H Turner, G Lovisotto, I Martinovic
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
82022
Generating identities with mixture models for speaker anonymization
H Turner, G Lovisotto, I Martinovic
Computer Speech & Language 72, 101318, 2022
82022
2-hop neighbor class similarity (2ncs): A graph structural metric indicative of graph neural network performance
A Cavallo, C Grohnfeldt, M Russo, G Lovisotto, L Vassio
arXiv preprint arXiv:2212.13202, 2022
52022
GCNH: A Simple Method For Representation Learning On Heterophilous Graphs
A Cavallo, C Grohnfeldt, M Russo, G Lovisotto, L Vassio
2023 International Joint Conference on Neural Networks (IJCNN), 1-8, 2023
22023
I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy
H Turner, G Lovisotto, S Eberz, I Martinovic
arXiv preprint arXiv:2202.06278, 2022
22022
Widen the backdoor to let more attackers in
S Datta, G Lovisotto, I Martinovic, N Shadbolt
arXiv preprint arXiv:2110.04571, 2021
22021
FETA: Fair Evaluation of Touch-based Authentication
M Georgiev, S Eberz, H Turner, G Lovisotto, I Martinovic
arXiv preprint arXiv:2201.10606, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20