default search action
Giulio Lovisotto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Alessio Gravina, Giulio Lovisotto, Claudio Gallicchio, Davide Bacciu, Claas Grohnfeldt:
Long Range Propagation on Continuous-Time Dynamic Graphs. ICML 2024 - [i15]Tim Postuvan, Claas Grohnfeldt, Michele Russo, Giulio Lovisotto:
Learning-Based Link Anomaly Detection in Continuous-Time Dynamic Graphs. CoRR abs/2405.18050 (2024) - [i14]Alessio Gravina, Giulio Lovisotto, Claudio Gallicchio, Davide Bacciu, Claas Grohnfeldt:
Long Range Propagation on Continuous-Time Dynamic Graphs. CoRR abs/2406.02740 (2024) - 2023
- [c14]Jakub Reha, Giulio Lovisotto, Michele Russo, Alessio Gravina, Claas Grohnfeldt:
Continuous-Time Temporal Graph Learning on Provenance Graphs. ICDM (Workshops) 2023: 1131-1140 - [c13]Andrea Cavallo, Claas Grohnfeldt, Michele Russo, Giulio Lovisotto, Luca Vassio:
GCNH: A Simple Method For Representation Learning On Heterophilous Graphs. IJCNN 2023: 1-8 - [i13]Andrea Cavallo, Claas Grohnfeldt, Michele Russo, Giulio Lovisotto, Luca Vassio:
GCNH: A Simple Method For Representation Learning On Heterophilous Graphs. CoRR abs/2304.10896 (2023) - 2022
- [j1]Henry Turner, Giulio Lovisotto, Ivan Martinovic:
Generating identities with mixture models for speaker anonymization. Comput. Speech Lang. 72: 101318 (2022) - [c12]Martin Georgiev, Simon Eberz, Henry Turner, Giulio Lovisotto, Ivan Martinovic:
Common Evaluation Pitfalls in Touch-Based Authentication Systems. AsiaCCS 2022: 1049-1063 - [c11]Giulio Lovisotto, Nicole Finnie, Mauricio Munoz, Chaithanya Kumar Mummadi, Jan Hendrik Metzen:
Give Me Your Attention: Dot-Product Attention Considered Harmful for Adversarial Patch Robustness. CVPR 2022: 15213-15222 - [i12]Martin Georgiev, Simon Eberz, Henry Turner, Giulio Lovisotto, Ivan Martinovic:
Common Evaluation Pitfalls in Touch-Based Authentication Systems. CoRR abs/2201.10606 (2022) - [i11]Henry Turner, Giulio Lovisotto, Simon Eberz, Ivan Martinovic:
I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy. CoRR abs/2202.06278 (2022) - [i10]Giulio Lovisotto, Nicole Finnie, Mauricio Munoz, Chaithanya Kumar Mummadi, Jan Hendrik Metzen:
Give Me Your Attention: Dot-Product Attention Considered Harmful for Adversarial Patch Robustness. CoRR abs/2203.13639 (2022) - [i9]Andrea Cavallo, Claas Grohnfeldt, Michele Russo, Giulio Lovisotto, Luca Vassio:
2-hop Neighbor Class Similarity (2NCS): A graph structural metric indicative of graph neural network performance. CoRR abs/2212.13202 (2022) - 2021
- [c10]Sebastian Köhler, Giulio Lovisotto, Simon Birnbach, Richard Baker, Ivan Martinovic:
They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors. ACSAC 2021: 399-413 - [c9]Giulio Lovisotto, Henry Turner, Ivo Sluganovic, Martin Strohmeier, Ivan Martinovic:
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations. USENIX Security Symposium 2021: 1865-1882 - [i8]Sebastian Köhler, Giulio Lovisotto, Simon Birnbach, Richard Baker, Ivan Martinovic:
They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors. CoRR abs/2101.10011 (2021) - [i7]Siddhartha Datta, Giulio Lovisotto, Ivan Martinovic, Nigel Shadbolt:
Widen The Backdoor To Let More Attackers In. CoRR abs/2110.04571 (2021) - 2020
- [c8]Giulio Lovisotto, Henry Turner, Simon Eberz, Ivan Martinovic:
Seeing Red: PPG Biometrics Using Smartphone Cameras. CVPR Workshops 2020: 3565-3574 - [c7]Giulio Lovisotto, Simon Eberz, Ivan Martinovic:
Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating. EuroS&P 2020: 184-197 - [i6]Giulio Lovisotto, Henry Turner, Simon Eberz, Ivan Martinovic:
Seeing Red: PPG Biometrics Using Smartphone Cameras. CoRR abs/2004.07088 (2020) - [i5]Giulio Lovisotto, Henry Turner, Ivo Sluganovic, Martin Strohmeier, Ivan Martinovic:
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations. CoRR abs/2007.04137 (2020) - [i4]Henry Turner, Giulio Lovisotto, Ivan Martinovic:
Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020. CoRR abs/2010.13457 (2020)
2010 – 2019
- 2019
- [c6]Simon Eberz, Giulio Lovisotto, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics. CCS 2019: 1187-1199 - [c5]Henry Turner, Giulio Lovisotto, Ivan Martinovic:
Attacking Speaker Recognition Systems with Phoneme Morphing. ESORICS (1) 2019: 471-492 - [i3]Giulio Lovisotto, Simon Eberz, Ivan Martinovic:
Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating. CoRR abs/1905.09162 (2019) - 2018
- [c4]Simon Eberz, Giulio Lovisotto, Andrea Patane, Marta Kwiatkowska, Vincent Lenders, Ivan Martinovic:
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts. IEEE Symposium on Security and Privacy 2018: 889-905 - 2017
- [c3]Mauro Conti, Giulio Lovisotto, Ivan Martinovic, Gene Tsudik:
FADEWICH: Fast Deauthentication Over the Wireless Channel. ICDCS 2017: 2294-2301 - [c2]Mauro Conti, Daniele Lain, Riccardo Lazzeretti, Giulio Lovisotto, Walter Quattrociocchi:
It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features. WIFS 2017: 1-6 - [i2]Mauro Conti, Daniele Lain, Riccardo Lazzeretti, Giulio Lovisotto, Walter Quattrociocchi:
It's Always April Fools' Day! On the Difficulty of Social Network Misinformation Classification via Propagation Features. CoRR abs/1701.04221 (2017) - 2016
- [i1]Mauro Conti, Giulio Lovisotto, Ivan Martinovic, Gene Tsudik:
FADEWICH: Fast Deauthentication over the Wireless Channel. CoRR abs/1612.08593 (2016) - 2015
- [c1]Alberto Compagno, Mauro Conti, Daniele Lain, Giulio Lovisotto, Luigi Vincenzo Mancini:
Boten ELISA: A novel approach for botnet C&C in Online Social Networks. CNS 2015: 74-82
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint