Picture for Luca Pajola

Luca Pajola

Can LLMs Understand Computer Networks? Towards a Virtual System Administrator

Add code
Apr 19, 2024
Viaarxiv icon

"All of Me": Mining Users' Attributes from their Public Spotify Playlists

Add code
Jan 25, 2024
Viaarxiv icon

Invisible Threats: Backdoor Attack in OCR Systems

Add code
Oct 12, 2023
Viaarxiv icon

Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability

Add code
Jun 27, 2023
Figure 1 for Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability
Figure 2 for Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability
Figure 3 for Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability
Figure 4 for Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability
Viaarxiv icon

Boosting Big Brother: Attacking Search Engines with Encodings

Add code
Apr 27, 2023
Viaarxiv icon

Social Honeypot for Humans: Luring People through Self-managed Instagram Pages

Add code
Mar 31, 2023
Viaarxiv icon

Going In Style: Audio Backdoors Through Stylistic Transformations

Add code
Nov 11, 2022
Viaarxiv icon

SoK: Explainable Machine Learning for Computer Security Applications

Add code
Aug 22, 2022
Figure 1 for SoK: Explainable Machine Learning for Computer Security Applications
Figure 2 for SoK: Explainable Machine Learning for Computer Security Applications
Figure 3 for SoK: Explainable Machine Learning for Computer Security Applications
Figure 4 for SoK: Explainable Machine Learning for Computer Security Applications
Viaarxiv icon

The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

Add code
Mar 09, 2022
Figure 1 for The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Figure 2 for The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Figure 3 for The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Figure 4 for The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Viaarxiv icon

Captcha Attack: Turning Captchas Against Humanity

Add code
Jan 13, 2022
Figure 1 for Captcha Attack: Turning Captchas Against Humanity
Figure 2 for Captcha Attack: Turning Captchas Against Humanity
Figure 3 for Captcha Attack: Turning Captchas Against Humanity
Figure 4 for Captcha Attack: Turning Captchas Against Humanity
Viaarxiv icon