Picture for Mauro Conti

Mauro Conti

Università di Padova, Italy, Delft University of Technology, the Netherlands and

Fingerprint Membership and Identity Inference Against Generative Adversarial Networks

Add code
Jun 21, 2024
Viaarxiv icon

GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction

Add code
May 20, 2024
Figure 1 for GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction
Figure 2 for GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction
Figure 3 for GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction
Figure 4 for GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction
Viaarxiv icon

Can LLMs Understand Computer Networks? Towards a Virtual System Administrator

Add code
Apr 19, 2024
Viaarxiv icon

FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids

Add code
Mar 26, 2024
Figure 1 for FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids
Figure 2 for FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids
Figure 3 for FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids
Figure 4 for FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids
Viaarxiv icon

Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks

Add code
Mar 05, 2024
Figure 1 for Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Figure 2 for Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Figure 3 for Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Figure 4 for Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Viaarxiv icon

"All of Me": Mining Users' Attributes from their Public Spotify Playlists

Add code
Jan 25, 2024
Viaarxiv icon

Privacy-Preserving in Blockchain-based Federated Learning Systems

Add code
Jan 07, 2024
Figure 1 for Privacy-Preserving in Blockchain-based Federated Learning Systems
Figure 2 for Privacy-Preserving in Blockchain-based Federated Learning Systems
Figure 3 for Privacy-Preserving in Blockchain-based Federated Learning Systems
Figure 4 for Privacy-Preserving in Blockchain-based Federated Learning Systems
Viaarxiv icon

Topology-Based Reconstruction Prevention for Decentralised Learning

Add code
Dec 08, 2023
Viaarxiv icon

Dr. Jekyll and Mr. Hyde: Two Faces of LLMs

Add code
Dec 06, 2023
Figure 1 for Dr. Jekyll and Mr. Hyde: Two Faces of LLMs
Figure 2 for Dr. Jekyll and Mr. Hyde: Two Faces of LLMs
Figure 3 for Dr. Jekyll and Mr. Hyde: Two Faces of LLMs
Figure 4 for Dr. Jekyll and Mr. Hyde: Two Faces of LLMs
Viaarxiv icon

Invisible Threats: Backdoor Attack in OCR Systems

Add code
Oct 12, 2023
Figure 1 for Invisible Threats: Backdoor Attack in OCR Systems
Figure 2 for Invisible Threats: Backdoor Attack in OCR Systems
Figure 3 for Invisible Threats: Backdoor Attack in OCR Systems
Figure 4 for Invisible Threats: Backdoor Attack in OCR Systems
Viaarxiv icon