Alert button
Picture for Giulio Pagnotta

Giulio Pagnotta

Alert button

Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem

Add code
Bookmark button
Alert button
Mar 06, 2024
Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Sediola Ruko, Briland Hitaj, Luigi V. Mancini, Fernando Perez-Cruz

Figure 1 for Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem
Figure 2 for Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem
Figure 3 for Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem
Figure 4 for Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem
Viaarxiv icon

OliVaR: Improving Olive Variety Recognition using Deep Neural Networks

Add code
Bookmark button
Alert button
Mar 01, 2023
Hristofor Miho, Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini, Georgios Koubouris, Gianluca Godino, Mehmet Hakan, Concepcion Muñoz Diez

Figure 1 for OliVaR: Improving Olive Variety Recognition using Deep Neural Networks
Figure 2 for OliVaR: Improving Olive Variety Recognition using Deep Neural Networks
Figure 3 for OliVaR: Improving Olive Variety Recognition using Deep Neural Networks
Figure 4 for OliVaR: Improving Olive Variety Recognition using Deep Neural Networks
Viaarxiv icon

Minerva: A File-Based Ransomware Detector

Add code
Bookmark button
Alert button
Jan 26, 2023
Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Lorenzo De Carli, Luigi V. Mancini

Figure 1 for Minerva: A File-Based Ransomware Detector
Figure 2 for Minerva: A File-Based Ransomware Detector
Figure 3 for Minerva: A File-Based Ransomware Detector
Figure 4 for Minerva: A File-Based Ransomware Detector
Viaarxiv icon

TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding

Add code
Bookmark button
Alert button
Feb 22, 2022
Giulio Pagnotta, Dorjan Hitaj, Briland Hitaj, Fernando Perez-Cruz, Luigi V. Mancini

Figure 1 for TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding
Figure 2 for TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding
Figure 3 for TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding
Figure 4 for TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding
Viaarxiv icon

FedComm: Federated Learning as a Medium for Covert Communication

Add code
Bookmark button
Alert button
Jan 21, 2022
Dorjan Hitaj, Giulio Pagnotta, Briland Hitaj, Fernando Perez-Cruz, Luigi V. Mancini

Figure 1 for FedComm: Federated Learning as a Medium for Covert Communication
Figure 2 for FedComm: Federated Learning as a Medium for Covert Communication
Figure 3 for FedComm: Federated Learning as a Medium for Covert Communication
Figure 4 for FedComm: Federated Learning as a Medium for Covert Communication
Viaarxiv icon

PassFlow: Guessing Passwords with Generative Flows

Add code
Bookmark button
Alert button
May 13, 2021
Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini

Figure 1 for PassFlow: Guessing Passwords with Generative Flows
Figure 2 for PassFlow: Guessing Passwords with Generative Flows
Figure 3 for PassFlow: Guessing Passwords with Generative Flows
Figure 4 for PassFlow: Guessing Passwords with Generative Flows
Viaarxiv icon

Reliable Detection of Compressed and Encrypted Data

Add code
Bookmark button
Alert button
Mar 31, 2021
Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini

Figure 1 for Reliable Detection of Compressed and Encrypted Data
Figure 2 for Reliable Detection of Compressed and Encrypted Data
Figure 3 for Reliable Detection of Compressed and Encrypted Data
Figure 4 for Reliable Detection of Compressed and Encrypted Data
Viaarxiv icon

Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training

Add code
Bookmark button
Alert button
Mar 05, 2021
Dorjan Hitaj, Giulio Pagnotta, Iacopo Masi, Luigi V. Mancini

Figure 1 for Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training
Figure 2 for Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training
Viaarxiv icon