Skip to main content

Showing 1–14 of 14 results for author: Esposito, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2412.04120  [pdf, other

    cs.CV

    CrossSDF: 3D Reconstruction of Thin Structures From Cross-Sections

    Authors: Thomas Walker, Salvatore Esposito, Daniel Rebain, Amir Vaxman, Arno Onken, Changjian Li, Oisin Mac Aodha

    Abstract: Reconstructing complex structures from planar cross-sections is a challenging problem, with wide-reaching applications in medical imaging, manufacturing, and topography. Out-of-the-box point cloud reconstruction methods can often fail due to the data sparsity between slicing planes, while current bespoke methods struggle to reconstruct thin geometric structures and preserve topological continuity.… ▽ More

    Submitted 24 March, 2025; v1 submitted 5 December, 2024; originally announced December 2024.

    Journal ref: 2025 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)

  2. arXiv:2410.14320  [pdf, other

    cs.CR cs.ET

    Not Sure Your Car Withstands Cyberwarfare

    Authors: Giampaolo Bella, Gianpietro Castiglione, Sergio Esposito, Mario Raciti, Salvatore Riccobene

    Abstract: Data and derived information about target victims has always been key for successful attacks, both during historical wars and modern cyber wars. Ours turns out to be an era in which modern cars generate a plethora of data about their drivers, and such data could be extremely attractive for offenders. This paper seeks to assess how well modern cars protect their drivers' data. It pursues its goal a… ▽ More

    Submitted 18 October, 2024; originally announced October 2024.

  3. arXiv:2409.02482  [pdf, other

    cs.CV cs.GR cs.LG

    Volumetric Surfaces: Representing Fuzzy Geometries with Layered Meshes

    Authors: Stefano Esposito, Anpei Chen, Christian Reiser, Samuel Rota Bulò, Lorenzo Porzi, Katja Schwarz, Christian Richardt, Michael Zollhöfer, Peter Kontschieder, Andreas Geiger

    Abstract: High-quality view synthesis relies on volume rendering, splatting, or surface rendering. While surface rendering is typically the fastest, it struggles to accurately model fuzzy geometry like hair. In turn, alpha-blending techniques excel at representing fuzzy materials but require an unbounded number of samples per ray (P1). Further overheads are induced by empty space skipping in volume renderin… ▽ More

    Submitted 27 March, 2025; v1 submitted 4 September, 2024; originally announced September 2024.

  4. An evidence-based methodology for human rights impact assessment (HRIA) in the development of AI data-intensive systems

    Authors: Alessandro Mantelero, Maria Samantha Esposito

    Abstract: Different approaches have been adopted in addressing the challenges of Artificial Intelligence (AI), some centred on personal data and others on ethics, respectively narrowing and broadening the scope of AI regulation. This contribution aims to demonstrate that a third way is possible, starting from the acknowledgement of the role that human rights can play in regulating the impact of data-intensi… ▽ More

    Submitted 30 July, 2024; originally announced July 2024.

    Journal ref: 2021. 41 Computer Law & Security Review 105561

  5. The IoT Breaches your Household Again

    Authors: Davide Bonaventura, Sergio Esposito, Giampaolo Bella

    Abstract: Despite their apparent simplicity, devices like smart light bulbs and electrical plugs are often perceived as exempt from rigorous security measures. However, this paper challenges this misconception, uncovering how vulnerabilities in these seemingly innocuous devices can expose users to significant risks. This paper extends the findings outlined in previous work, introducing a novel attack scenar… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

    Journal ref: In Proceedings of the 21st International Conference on Security and Cryptography (2024), ISBN 978-989-758-709-2, ISSN 2184-7711, pages 475-482

  6. arXiv:2407.04699  [pdf, other

    cs.CV cs.AI

    LaRa: Efficient Large-Baseline Radiance Fields

    Authors: Anpei Chen, Haofei Xu, Stefano Esposito, Siyu Tang, Andreas Geiger

    Abstract: Radiance field methods have achieved photorealistic novel view synthesis and geometry reconstruction. But they are mostly applied in per-scene optimization or small-baseline settings. While several recent works investigate feed-forward reconstruction with large baselines by utilizing transformers, they all operate with a standard global attention mechanism and hence ignore the local nature of 3D r… ▽ More

    Submitted 15 July, 2024; v1 submitted 5 July, 2024; originally announced July 2024.

    Comments: Project Page: https://apchenstu.github.io/LaRa/

  7. arXiv:2406.04254  [pdf, other

    cs.CV cs.AI

    GeoGen: Geometry-Aware Generative Modeling via Signed Distance Functions

    Authors: Salvatore Esposito, Qingshan Xu, Kacper Kania, Charlie Hewitt, Octave Mariotti, Lohit Petikam, Julien Valentin, Arno Onken, Oisin Mac Aodha

    Abstract: We introduce a new generative approach for synthesizing 3D geometry and images from single-view collections. Most existing approaches predict volumetric density to render multi-view consistent images. By employing volumetric rendering using neural radiance fields, they inherit a key limitation: the generated geometry is noisy and unconstrained, limiting the quality and utility of the output meshes… ▽ More

    Submitted 14 June, 2024; v1 submitted 6 June, 2024; originally announced June 2024.

  8. arXiv:2311.06284  [pdf, other

    physics.comp-ph cs.GR physics.flu-dyn

    Efficient Generation of Multimodal Fluid Simulation Data

    Authors: Daniele Baieri, Donato Crisostomi, Stefano Esposito, Filippo Maggioli, Emanuele Rodolà

    Abstract: In this work, we introduce an efficient generation procedure to produce synthetic multi-modal datasets of fluid simulations. The procedure can reproduce the dynamics of fluid flows and allows for exploring and learning various properties of their complex behavior, from distinct perspectives and modalities. We employ our framework to generate a set of thoughtfully designed training datasets, which… ▽ More

    Submitted 8 March, 2024; v1 submitted 30 October, 2023; originally announced November 2023.

    Comments: 10 pages, 7 figures

    MSC Class: 68U20 ACM Class: I.2.6; I.3; I.6.3

  9. Smart Bulbs can be Hacked to Hack into your Household

    Authors: Davide Bonaventura, Sergio Esposito, Giampaolo Bella

    Abstract: The IoT is getting more and more pervasive. Even the simplest devices, such as a light bulb or an electrical plug, are made "smart" and controllable by our smartphone. This paper describes the findings obtained by applying the PETIoT kill chain to conduct a Vulnerability Assessment and Penetration Testing session on a smart bulb, the Tapo L530E by Tp-Link, currently best seller on Amazon Italy. We… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Journal ref: In Proceedings of the 20th International Conference on Security and Cryptography (2023), ISBN 978-989-758-666-8, ISSN 2184-7711, pages 218-229

  10. arXiv:2303.09871  [pdf, other

    cs.CV cs.GR

    Fluid Dynamics Network: Topology-Agnostic 4D Reconstruction via Fluid Dynamics Priors

    Authors: Daniele Baieri, Stefano Esposito, Filippo Maggioli, Emanuele Rodolà

    Abstract: Representing 3D surfaces as level sets of continuous functions over $\mathbb{R}^3$ is the common denominator of neural implicit representations, which recently enabled remarkable progress in geometric deep learning and computer vision tasks. In order to represent 3D motion within this framework, it is often assumed (either explicitly or implicitly) that the transformations which a surface may unde… ▽ More

    Submitted 17 March, 2023; originally announced March 2023.

    Comments: 9 pages, 10 figures

    ACM Class: I.2.6; I.3.7; I.3.5

  11. arXiv:2302.04900  [pdf, other

    cs.CR

    PETIoT: PEnetration Testing the Internet of Things

    Authors: Giampaolo Bella, Pietro Biondi, Stefano Bognanni, Sergio Esposito

    Abstract: Attackers may attempt exploiting Internet of Things (IoT) devices to operate them unduly as well as to gather personal data of the legitimate device owners'. Vulnerability Assessment and Penetration Testing (VAPT) sessions help to verify the effectiveness of the adopted security measures. However, VAPT over IoT devices, namely VAPT targeted at IoT devices, is an open research challenge due to the… ▽ More

    Submitted 9 February, 2023; originally announced February 2023.

  12. arXiv:2206.10885  [pdf, other

    cs.CV cs.GR cs.LG

    KiloNeuS: A Versatile Neural Implicit Surface Representation for Real-Time Rendering

    Authors: Stefano Esposito, Daniele Baieri, Stefan Zellmann, André Hinkenjann, Emanuele Rodolà

    Abstract: NeRF-based techniques fit wide and deep multi-layer perceptrons (MLPs) to a continuous radiance field that can be rendered from any unseen viewpoint. However, the lack of surface and normals definition and high rendering times limit their usage in typical computer graphics applications. Such limitations have recently been overcome separately, but solving them together remains an open problem. We p… ▽ More

    Submitted 21 November, 2022; v1 submitted 22 June, 2022; originally announced June 2022.

    Comments: 9 pages, 8 figures

    ACM Class: I.2.10; I.3.7; I.2.6

  13. arXiv:2202.08619  [pdf, other

    cs.CR

    Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands

    Authors: Sergio Esposito, Daniele Sgandurra, Giampaolo Bella

    Abstract: We present Alexa versus Alexa (AvA), a novel attack that leverages audio files containing voice commands and audio reproduction methods in an offensive fashion, to gain control of Amazon Echo devices for a prolonged amount of time. AvA leverages the fact that Alexa running on an Echo device correctly interprets voice commands originated from audio files even when they are played by the device itse… ▽ More

    Submitted 17 February, 2022; originally announced February 2022.

    Comments: 15 pages, 5 figures, published in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIA CCS '22)

  14. arXiv:1302.1402  [pdf, other

    cs.DM math.CO

    Clique cycle-transversals in distance-hereditary graphs

    Authors: Andreas Brandstädt, Simone Esposito, Loana Tito Nogueira, Fábio Protti

    Abstract: A cycle-transversal of a graph G is a subset T of V(G) such that T intersects every cycle of G. A clique cycle-transversal, or cct for short, is a cycle-transversal which is a clique. Recognizing graphs which admit a cct can be done in polynomial time; however, no structural characterization of such graphs is known. We characterize distance-hereditary graphs admitting a cct in terms of forbidden i… ▽ More

    Submitted 7 February, 2013; v1 submitted 6 February, 2013; originally announced February 2013.

    MSC Class: 05C75