Sotabase
Home
Researchers
Career
·
ML Research Engineer
,
DeepL
2024–
·
PhD Student
,
University of Oxford, System Security Lab
2022–
Publications
(24)
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations
USENIX Security Symposium · 2020
118
cited
Give Me Your Attention: Dot-Product Attention Considered Harmful for Adversarial Patch Robustness
Computer Vision and Pattern Recognition · 2022
49
cited
They See Me Rollin’: Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors
Asia-Pacific Computer Systems Architecture Conference · 2021
43
cited
Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating
European Symposium on Security and Privacy · 2019
41
cited
Seeing Red: PPG Biometrics Using Smartphone Cameras
2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) · 2020
38
cited
28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics
Conference on Computer and Communications Security · 2019
37
cited
It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features
International Workshop on Information Forensics and Security · 2017
30
cited
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts
IEEE Symposium on Security and Privacy · 2018
29
cited
Long Range Propagation on Continuous-Time Dynamic Graphs
International Conference on Machine Learning · 2024
27
cited
Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020
arXiv.org · 2020
22
cited
Generating identities with mixture models for speaker anonymization
Computer Speech and Language · 2021
20
cited
2-hop Neighbor Class Similarity (2NCS): A graph structural metric indicative of graph neural network performance
arXiv.org · 2022
17
cited
Boten ELISA: A novel approach for botnet C&C in Online Social Networks
IEEE Conference on Communications and Network Security · 2015
15
cited
GCNH: A Simple Method For Representation Learning On Heterophilous Graphs
IEEE International Joint Conference on Neural Network · 2023
14
cited
Common Evaluation Pitfalls in Touch-Based Authentication Systems
ACM Asia Conference on Computer and Communications Security · 2022
11
cited
Attacking Speaker Recognition Systems with Phoneme Morphing
European Symposium on Research in Computer Security · 2019
10
cited
FADEWICH: Fast Deauthentication Over the Wireless Channel
IEEE International Conference on Distributed Computing Systems · 2016
9
cited
Anomaly Detection in Continuous-Time Temporal Provenance Graphs
7
cited
Learning-Based Link Anomaly Detection in Continuous-Time Dynamic Graphs
Trans. Mach. Learn. Res. · 2024
4
cited
Widen The Backdoor To Let More Attackers In
arXiv.org · 2021
3
cited
Show all 24 papers →
Sotabase
Giulio Lovisotto | Researcher Profile | Sotabase | Sotabase