Search Results for author: Luca Pajola

Found 12 papers, 7 papers with code

Can LLMs Understand Computer Networks? Towards a Virtual System Administrator

no code implementations19 Apr 2024 Denis Donadel, Francesco Marchiori, Luca Pajola, Mauro Conti

Private LLMs achieve noteworthy results in small and medium networks, while challenges persist in comprehending complex network topologies, particularly for open-source models.

Prompt Engineering

"All of Me": Mining Users' Attributes from their Public Spotify Playlists

1 code implementation25 Jan 2024 Pier Paolo Tricomi, Luca Pajola, Luca Pasa, Mauro Conti

In this work, we investigate the relationship between Spotify users' attributes and their public playlists.

Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability

1 code implementation27 Jun 2023 Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola

An alarming side-effect of evasion attacks is their ability to transfer among different models: this property is called transferability.

Boosting Big Brother: Attacking Search Engines with Encodings

1 code implementation27 Apr 2023 Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross Anderson, Mauro Conti

Search engines are vulnerable to attacks against indexing and searching via text encoding manipulation.

Chatbot Text Summarization

Social Honeypot for Humans: Luring People through Self-managed Instagram Pages

no code implementations31 Mar 2023 Sara Bardi, Mauro Conti, Luca Pajola, Pier Paolo Tricomi

However, by choosing an appropriate content topic, this attractive mechanism could be extended to any OSN users, rather than only luring malicious actors.


Going In Style: Audio Backdoors Through Stylistic Transformations

1 code implementation6 Nov 2022 Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti

This work explores stylistic triggers for backdoor attacks in the audio domain: dynamic transformations of malicious samples through guitar effects.

Backdoor Attack

SoK: Explainable Machine Learning for Computer Security Applications

1 code implementation22 Aug 2022 Azqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, Sicco Verwer

The security literature sometimes also fails to disentangle the role of the various stakeholders, e. g., by providing explanations to model users and designers while also exposing them to adversaries.

Computer Security Explainable artificial intelligence +1

The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

1 code implementation9 Mar 2022 Giovanni Apruzzese, Luca Pajola, Mauro Conti

By using XeNIDS on six well-known datasets, we demonstrate the concealed potential, but also the risks, of cross-evaluations of ML-NIDS.

BIG-bench Machine Learning Network Intrusion Detection

Captcha Attack: Turning Captchas Against Humanity

no code implementations11 Jan 2022 Mauro Conti, Luca Pajola, Pier Paolo Tricomi

Content moderators constantly monitor these online platforms to prevent the spreading of inappropriate content (e. g., hate speech, nudity images).

Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack

1 code implementation13 Apr 2021 Luca Pajola, Mauro Conti

The increased demand for machine learning applications made companies offer Machine-Learning-as-a-Service (MLaaS).

BIG-bench Machine Learning Sentence

All You Need is "Love": Evading Hate-speech Detection

no code implementations28 Aug 2018 Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan

With the spread of social networks and their unfortunate use for hate speech, automatic detection of the latter has become a pressing problem.

Hate Speech Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.