Skip to content

Commit

Permalink
deploy: caeefbe
Browse files Browse the repository at this point in the history
  • Loading branch information
goemon07 committed Jul 19, 2024
1 parent e916587 commit 1fac805
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion publications/index.html
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
<!doctype html><html lang=en-us><head><meta charset=utf-8><meta http-equiv=x-ua-compatible content="IE=edge"><title>Publications | Gabriele Orazi</title><meta name=description content="Cybersecurity Ph.D. Student in SPRITZ Group (UniPd). Strongly unprofessional climber, gravel cyclist and trail runner."><meta name=viewport content="width=device-width,initial-scale=1"><meta name=robots content="all,follow"><meta name=googlebot content="index,follow,snippet,archive"><meta property="og:title" content="Publications"><meta property="og:description" content="Publications My research areas are focused on privacy and private data leaks. I&rsquo;m primarely working on obfuscation techniques, forensics and malware detection.
RedactBuster: Entity Type Recognition from Redacted Documents Context analysis on sentences with redacted information can enable entity recognition. @ ESORICS 2024 M. Beltrame, M. Conti, P. Guglielmin, F. Marchiori, G. Orazi Acoustic Side-Channel Attacks on a Computer Mouse An innovative information leakage attack based on mice noise. @ DIMVA 2024 M."><meta property="og:type" content="article"><meta property="og:url" content="/publications/"><meta property="article:section" content><meta property="article:published_time" content="2021-06-10T17:51:42+00:00"><meta property="article:modified_time" content="2021-06-10T17:51:42+00:00"><meta name=twitter:card content="summary"><meta name=twitter:title content="Publications"><meta name=twitter:description content="Publications My research areas are focused on privacy and private data leaks. I&rsquo;m primarely working on obfuscation techniques, forensics and malware detection.
RedactBuster: Entity Type Recognition from Redacted Documents Context analysis on sentences with redacted information can enable entity recognition. @ ESORICS 2024 M. Beltrame, M. Conti, P. Guglielmin, F. Marchiori, G. Orazi Acoustic Side-Channel Attacks on a Computer Mouse An innovative information leakage attack based on mice noise. @ DIMVA 2024 M."><link rel=stylesheet href=/css/style-dark.css><link rel=stylesheet href=/css/custom.css><!--[if lt IE 9]><script src=https://oss.maxcdn.com/html5shiv/3.7.2/html5shiv.min.js></script>
<script src=https://oss.maxcdn.com/respond/1.4.2/respond.min.js></script><![endif]--><link rel=icon type=image/png href=/images/favicon.ico></head><body class="max-width mx-auto px3 ltr"><div class="content index py4"><header id=header><a href=/><div id=logo style=background-image:url(/images/logo.png)></div><div id=title><h1>Gabriele Orazi</h1></div></a><div id=nav><ul><li class=icon><a href=#><i class="fas fa-bars fa-2x"></i></a></li><li><a href=/shortbio>Short Bio</a></li><li><a href=/publications>Publications</a></li><li><a href=/teaching>Teaching</a></li><li><a href=/posts>Posts</a></li><li><a href=/suggestions>Suggestions</a></li><li><a href=/about>About</a></li></ul></div></header><article class=post itemscope itemtype=http://schema.org/BlogPosting><div class=content itemprop=articleBody><h1 id=publications>Publications</h1><p>My research areas are focused on privacy and private data leaks. I&rsquo;m primarely working on obfuscation techniques, forensics and malware detection.</p><h2 id=redactbuster-entity-type-recognition-from-redacted-documentshttpsarxivorgabs240412991><a href=https://arxiv.org/abs/2404.12991>RedactBuster: Entity Type Recognition from Redacted Documents</a></h2><ul><li>Context analysis on sentences with redacted information can enable entity recognition.</li><li>@ <a href=https://esorics2024.org/>ESORICS 2024</a></li><li>M. Beltrame, M. Conti, P. Guglielmin, F. Marchiori, G. Orazi</li></ul><h2 id=acoustic-side-channel-attacks-on-a-computer-mousehttpssprouticsuciedupubsdimva_acoustic_side_channel_attacks_on_a_computer_mousepdf><a href=https://sprout.ics.uci.edu/pubs/DIMVA_Acoustic_Side_Channel_Attacks_on_a_Computer_Mouse.pdf>Acoustic Side-Channel Attacks on a Computer Mouse</a></h2><ul><li>An innovative information leakage attack based on mice noise.</li><li>@ <a href=https://www.dimva.org/dimva2024/>DIMVA 2024</a></li><li>M. Conti, M. Duroyon, G. Orazi, G. Tsudik</li></ul><h2 id=invoice-31415-attached-automated-analysis-of-malicious-microsoft-office-documentshttpswwwsciencedirectcomsciencearticlepiis0167404821004053><a href=https://www.sciencedirect.com/science/article/pii/S0167404821004053>Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents</a></h2><ul><li>Malware detection on Microsoft Office documents.</li><li>@ Computers & Security 2021</li><li>V.Koutsokostas, N. Lykousas, T. Apostolopoulos, G. Orazi, A. Ghosal, F. Casino, M. Conti, C. Patsakis</li></ul><h2 id=blufader-blurred-face-detection--recognition-for-privacy-friendly-continuous-authenticationhttpswwwsciencedirectcomsciencearticlepiis1574119223000597><a href=https://www.sciencedirect.com/science/article/pii/S1574119223000597>BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication</a></h2><ul><li>User continuous and automatic authentication and de-authentication.</li><li>@ Pervasive and Mobile Computing Journal 2023</li><li>M. Cardaioli, M. Conti, G. Orazi, P. P. Tricomi, G. Tsudik</li></ul></div></article><footer id=footer><div class=footer-left>Copyright &copy; 2024 Gabriele Orazi</div><div class=footer-right><nav><ul><li><a href=/shortbio>Short Bio</a></li><li><a href=/publications>Publications</a></li><li><a href=/teaching>Teaching</a></li><li><a href=/posts>Posts</a></li><li><a href=/suggestions>Suggestions</a></li><li><a href=/about>About</a></li></ul></nav></div></footer></div></body><link rel=stylesheet href=/lib/font-awesome/css/all.min.css><script src=/lib/jquery/jquery.min.js></script>
<script src=https://oss.maxcdn.com/respond/1.4.2/respond.min.js></script><![endif]--><link rel=icon type=image/png href=/images/favicon.ico></head><body class="max-width mx-auto px3 ltr"><div class="content index py4"><header id=header><a href=/><div id=logo style=background-image:url(/images/logo.png)></div><div id=title><h1>Gabriele Orazi</h1></div></a><div id=nav><ul><li class=icon><a href=#><i class="fas fa-bars fa-2x"></i></a></li><li><a href=/shortbio>Short Bio</a></li><li><a href=/publications>Publications</a></li><li><a href=/teaching>Teaching</a></li><li><a href=/posts>Posts</a></li><li><a href=/suggestions>Suggestions</a></li><li><a href=/about>About</a></li></ul></div></header><article class=post itemscope itemtype=http://schema.org/BlogPosting><div class=content itemprop=articleBody><h1 id=publications>Publications</h1><p>My research areas are focused on privacy and private data leaks. I&rsquo;m primarely working on obfuscation techniques, forensics and malware detection.</p><h2 id=redactbuster-entity-type-recognition-from-redacted-documentshttpsarxivorgabs240412991><a href=https://arxiv.org/abs/2404.12991>RedactBuster: Entity Type Recognition from Redacted Documents</a></h2><ul><li>Context analysis on sentences with redacted information can enable entity recognition.</li><li>@ <a href=https://esorics2024.org/>ESORICS 2024</a></li><li>M. Beltrame, M. Conti, P. Guglielmin, F. Marchiori, G. Orazi</li></ul><h2 id=acoustic-side-channel-attacks-on-a-computer-mousehttpslinkspringercomchapter101007978-3-031-64171-8_3><a href=https://link.springer.com/chapter/10.1007/978-3-031-64171-8_3>Acoustic Side-Channel Attacks on a Computer Mouse</a></h2><ul><li>An innovative information leakage attack based on mice noise.</li><li>@ <a href=https://www.dimva.org/dimva2024/>DIMVA 2024</a></li><li>M. Conti, M. Duroyon, G. Orazi, G. Tsudik</li></ul><h2 id=invoice-31415-attached-automated-analysis-of-malicious-microsoft-office-documentshttpswwwsciencedirectcomsciencearticlepiis0167404821004053><a href=https://www.sciencedirect.com/science/article/pii/S0167404821004053>Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents</a></h2><ul><li>Malware detection on Microsoft Office documents.</li><li>@ Computers & Security 2021</li><li>V.Koutsokostas, N. Lykousas, T. Apostolopoulos, G. Orazi, A. Ghosal, F. Casino, M. Conti, C. Patsakis</li></ul><h2 id=blufader-blurred-face-detection--recognition-for-privacy-friendly-continuous-authenticationhttpswwwsciencedirectcomsciencearticlepiis1574119223000597><a href=https://www.sciencedirect.com/science/article/pii/S1574119223000597>BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication</a></h2><ul><li>User continuous and automatic authentication and de-authentication.</li><li>@ Pervasive and Mobile Computing Journal 2023</li><li>M. Cardaioli, M. Conti, G. Orazi, P. P. Tricomi, G. Tsudik</li></ul></div></article><footer id=footer><div class=footer-left>Copyright &copy; 2024 Gabriele Orazi</div><div class=footer-right><nav><ul><li><a href=/shortbio>Short Bio</a></li><li><a href=/publications>Publications</a></li><li><a href=/teaching>Teaching</a></li><li><a href=/posts>Posts</a></li><li><a href=/suggestions>Suggestions</a></li><li><a href=/about>About</a></li></ul></nav></div></footer></div></body><link rel=stylesheet href=/lib/font-awesome/css/all.min.css><script src=/lib/jquery/jquery.min.js></script>
<script src=/js/main.js></script></html>

0 comments on commit 1fac805

Please sign in to comment.