Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 19 di 19
Titolo Data di pubblicazione Autori Rivista Serie Titolo libro
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication 2023 Cardaioli, MConti, MOrazi, GTricomi, PP + PERVASIVE AND MOBILE COMPUTING - -
Interazioni Umane in Cybersecurity: Minacce e Opportunità 2022 CARDAIOLI, MATTEO - - -
Human Interactions in Cybersecurity: Threats and Opportunities 2022 CARDAIOLI, MATTEO - - -
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand 2022 Matteo CardaioliStefano CecconelloMauro ContiStjepan PicekSimone MilaniEugen Saraci - - 31th USENIX Security Symposium
Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection 2022 Cardaioli, MConti, MTricomi, PP + - - 2022 IEEE International Conference on Pervasive Computing and Communications (PerCom)
Face the Truth: Interpretable Emotion Genuineness Detection 2022 Cardaioli, MatteoMiolla, AlessioConti, MauroSartori, GiuseppeMonaro, MerylinScarpazza, CristinaNavarin, Nicolo - - 2022 International Joint Conference on Neural Networks (IJCNN)
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads 2022 Cardaioli M.Conti M. + - - Computer Security – ESORICS 2022: 27th European Symposium on Research in Computer Security
For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection 2022 Cardaioli M.Conti M. + - - ESORICS 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part III
Malingering Scraper: A novel framework to reconstruct honest profiles from malingerer psychopathological tests. 2021 Matteo CardaioliStefano CecconelloMerylin MonaroGiuseppe SartoriMauro Conti + - - Communications in Computer and Information Science
It's a Matter of Style: Detecting Social Bots through Writing Style Consistency 2021 Cardaioli M.Conti M. + - PROCEEDINGS - INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS Proceedings - International Conference on Computer Communications and Networks, ICCCN
Predicting Twitter Users' Political Orientation: An Application to the Italian Political Scenario 2020 Cardaioli M.Kaliyar P.Capuozzo P.Conti M.Sartori G.Monaro M. - - 2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics 2020 Cardaioli MatteoMonaro MerylinSartori GiuseppeConti Mauro - - Advances in Intelligent Systems and Computing
Fake News Spreaders Profiling through Behavioural Analysis Notebook for PAN at CLEF 2020 2020 Cardaioli M.Conti M. + - CEUR WORKSHOP PROCEEDINGS CEUR Workshop Proceedings
Your pin sounds good! augmentation of pin guessing strategies via audio leakage 2020 Cardaioli M.Conti M. + - LECTURE NOTES IN ARTIFICIAL INTELLIGENCE Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Fake News Spreaders Profiling Through Behavioural Analysis 2020 Matteo CardaioliStefano CecconelloMauro ContiLuca PajolaFederico Turrin - - CLEF 2020 Conference and Labs of the Evaluation Forum
PILOT: Password and PIN information leakage from obfuscated typing videos 2019 Cardaioli M.Conti M.Gasti P.Lain D.SARACI, EUGENTsudik G. + JOURNAL OF COMPUTER SECURITY - -
Equilibrioception: A method to evaluate the sense of balance 2017 Cardaioli, MatteoSCATTOLIN, MARINABisiacchi, Patrizia CEUR WORKSHOP PROCEEDINGS - CEUR Workshop Proceedings
A contribution to the validation of the Wii Balance Board for the assessment of standing balance 2015 PAVAN, PIEROMatteo CardaioliFERRI, ILARIAGOBBI, ERICACARRARO, ATTILIO EUROPEAN JOURNAL OF SPORT SCIENCE - -
NON CONVENTIONAL METHODS FOR ASSESSING STANDING BALANCE: RELIABILITY EVALUATION OF THE NINTENDO WII BALANCE BOARD 2013 CARRARO, ATTILIOCARDAIOLI, MATTEOFERRI, ILARIAGOBBI, ERICAPAVAN, PIERO + - - ECSS 2013 Book of Abstract
Mostrati risultati da 1 a 19 di 19
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile