They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors.

Ivan Martinovic , Sebastian Köhler , Giulio Lovisotto , Simon Birnbach
arXiv: Computer Vision and Pattern Recognition

13
2021
SLAP: Improving Physical Adversarial Examples with Short−Lived Adversarial Perturbations

Ivan Martinovic , Martin Strohmeier , Giulio Lovisotto , Ivo Sluganovic
usenix security symposium

2021
Attacking Speaker Recognition Systems with Phoneme Morphing

Henry Turner , Giulio Lovisotto , Ivan Martinovic
european symposium on research in computer security 471 -492

5
2019
FADEWICH: Fast Deauthentication Over the Wireless Channel

Mauro Conti , Giulio Lovisotto , Ivan Martinovic , Gene Tsudik
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) 2294 -2301

6
2017
It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features

Mauro Conti , Daniele Lain , Riccardo Lazzeretti , Giulio Lovisotto
2017 IEEE Workshop on Information Forensics and Security (WIFS) 1 -6

15
2017
Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating

Giulio Lovisotto , Simon Eberz , Ivan Martinovic
arXiv: Cryptography and Security

34
2019
Boten ELISA: A novel approach for botnet C&C in Online Social Networks

Alberto Compagno , Mauro Conti , Daniele Lain , Giulio Lovisotto
communications and networking symposium 74 -82

7
2015
28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics

Simon Eberz , Giulio Lovisotto , Kasper B. Rasmussen , Vincent Lenders
computer and communications security 1187 -1199

5
2019
Seeing Red: PPG Biometrics Using Smartphone Cameras

Giulio Lovisotto , Henry Turner , Simon Eberz , Ivan Martinovic
computer vision and pattern recognition 3565 -3574

1
2020
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts

Simon Eberz , Giulio Lovisotto , Andrea Patane , Marta Kwiatkowska
2018 IEEE Symposium on Security and Privacy (SP) 889 -905

10
2018
Give me your attention: Dot-product attention considered harmful for adversarial patch robustness

Giulio Lovisotto , Nicole Finnie , Mauricio Munoz , Chaithanya Kumar Mummadi
Smpte Journal 15234 -15243

5
2022
2-hop Neighbor Class Similarity (2NCS): A graph structural metric indicative of graph neural network performance

Andrea Cavallo , Claas Grohnfeldt , Michele Russo , Giulio Lovisotto
arXiv preprint arXiv:2212.13202

2022
Common evaluation pitfalls in touch-based authentication systems

Martin Georgiev , Simon Eberz , Henry Turner , Giulio Lovisotto
1049 -1063

10
2022
FETA: Fair Evaluation of Touch-based Authentication

Martin Georgiev , Simon Eberz , Henry Turner , Giulio Lovisotto
arXiv preprint arXiv:2201.10606

2
2022
Widen the backdoor to let more attackers in

Siddhartha Datta , Giulio Lovisotto , Ivan Martinovic , Nigel Shadbolt
arXiv preprint arXiv:2110.04571

2
2021
Long Range Propagation on Continuous-Time Dynamic Graphs

Alessio Gravina , Giulio Lovisotto , Claudio Gallicchio , Davide Bacciu
arXiv preprint arXiv:2406.02740

2024
Mobile biometrics in financial services: A five factor framework

Giulio Lovisotto , Raghav Malik , Ivo Sluganovic , Marc Roeschlin
University of Oxford, Oxford, UK

32
2017
Speaker anonymization with distribution-preserving x-vector generation for the VoicePrivacy challenge 2020

Henry Turner , Giulio Lovisotto , Ivan Martinovic
arXiv preprint arXiv:2010.13457

22
2020
Generating identities with mixture models for speaker anonymization

Henry Turner , Giulio Lovisotto , Ivan Martinovic
Computer Speech & Language 72 101318 -101318

10
2022
I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy

Henry Turner , Giulio Lovisotto , Simon Eberz , Ivan Martinovic
arXiv preprint arXiv:2202.06278

2
2022