Alert button
Picture for Luca Pajola

Luca Pajola

Alert button

Can LLMs Understand Computer Networks? Towards a Virtual System Administrator

Add code
Bookmark button
Alert button
Apr 19, 2024
Denis Donadel, Francesco Marchiori, Luca Pajola, Mauro Conti

Viaarxiv icon

"All of Me": Mining Users' Attributes from their Public Spotify Playlists

Add code
Bookmark button
Alert button
Jan 25, 2024
Pier Paolo Tricomi, Luca Pajola, Luca Pasa, Mauro Conti

Viaarxiv icon

Invisible Threats: Backdoor Attack in OCR Systems

Add code
Bookmark button
Alert button
Oct 12, 2023
Mauro Conti, Nicola Farronato, Stefanos Koffas, Luca Pajola, Stjepan Picek

Figure 1 for Invisible Threats: Backdoor Attack in OCR Systems
Figure 2 for Invisible Threats: Backdoor Attack in OCR Systems
Figure 3 for Invisible Threats: Backdoor Attack in OCR Systems
Figure 4 for Invisible Threats: Backdoor Attack in OCR Systems
Viaarxiv icon

Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability

Add code
Bookmark button
Alert button
Jun 27, 2023
Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola

Figure 1 for Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability
Figure 2 for Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability
Figure 3 for Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability
Figure 4 for Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability
Viaarxiv icon

Boosting Big Brother: Attacking Search Engines with Encodings

Add code
Bookmark button
Alert button
Apr 27, 2023
Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross Anderson, Mauro Conti

Figure 1 for Boosting Big Brother: Attacking Search Engines with Encodings
Figure 2 for Boosting Big Brother: Attacking Search Engines with Encodings
Figure 3 for Boosting Big Brother: Attacking Search Engines with Encodings
Figure 4 for Boosting Big Brother: Attacking Search Engines with Encodings
Viaarxiv icon

Social Honeypot for Humans: Luring People through Self-managed Instagram Pages

Add code
Bookmark button
Alert button
Mar 31, 2023
Sara Bardi, Mauro Conti, Luca Pajola, Pier Paolo Tricomi

Figure 1 for Social Honeypot for Humans: Luring People through Self-managed Instagram Pages
Figure 2 for Social Honeypot for Humans: Luring People through Self-managed Instagram Pages
Figure 3 for Social Honeypot for Humans: Luring People through Self-managed Instagram Pages
Figure 4 for Social Honeypot for Humans: Luring People through Self-managed Instagram Pages
Viaarxiv icon

Going In Style: Audio Backdoors Through Stylistic Transformations

Add code
Bookmark button
Alert button
Nov 11, 2022
Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti

Figure 1 for Going In Style: Audio Backdoors Through Stylistic Transformations
Figure 2 for Going In Style: Audio Backdoors Through Stylistic Transformations
Figure 3 for Going In Style: Audio Backdoors Through Stylistic Transformations
Viaarxiv icon

SoK: Explainable Machine Learning for Computer Security Applications

Add code
Bookmark button
Alert button
Aug 22, 2022
Azqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, Sicco Verwer

Figure 1 for SoK: Explainable Machine Learning for Computer Security Applications
Figure 2 for SoK: Explainable Machine Learning for Computer Security Applications
Figure 3 for SoK: Explainable Machine Learning for Computer Security Applications
Figure 4 for SoK: Explainable Machine Learning for Computer Security Applications
Viaarxiv icon

The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

Add code
Bookmark button
Alert button
Mar 09, 2022
Giovanni Apruzzese, Luca Pajola, Mauro Conti

Figure 1 for The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Figure 2 for The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Figure 3 for The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Figure 4 for The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Viaarxiv icon