Alessandro Mei

Orcid: 0000-0003-1215-9644

Affiliations:
  • Sapienza University of Rome, Italy


According to our database1, Alessandro Mei authored at least 102 papers between 1997 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations.
ACM Trans. Internet Techn., 2023

The Conspiracy Money Machine: Uncovering Telegram's Conspiracy Channels and their Profit Model.
CoRR, 2023

TGDataset: a Collection of Over One Hundred Thousand Telegram Channels.
CoRR, 2023

Ready, Aim, Snipe! Analysis of Sniper Bots and their Impact on the DeFi Ecosystem.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB).
Proceedings of the 32nd USENIX Security Symposium, 2023

Balance-aware Cost-efficient Routing in the Payment Channel Network.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

Translated Texts Under the Lens: From Machine Translation Detection to Source Language Identification.
Proceedings of the Advances in Intelligent Data Analysis XXI, 2023

It's a Trap! Detection and Analysis of Fake Channels on Telegram.
Proceedings of the IEEE International Conference on Web Services, 2023

A Game of NFTs: Characterizing NFT Wash Trading in the Ethereum Blockchain.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

2022
Nationality and Geolocation-Based Profiling in the Dark(Web).
IEEE Trans. Serv. Comput., 2022

ROADS - Rover for Bituminous Pavement Distress Survey: An Unmanned Ground Vehicle (UGV) Prototype for Pavement Distress Evaluation.
Sensors, 2022

NFT Wash Trading in the Ethereum Blockchain.
CoRR, 2022

Token Spammers, Rug Pulls, and SniperBots: An Analysis of the Ecosystem of Tokens in Ethereum and the Binance Smart Chain (BNB).
CoRR, 2022

2021
Uncovering the Dark Side of Telegram: Fakes, Clones, Scams, and Conspiracy Movements.
CoRR, 2021

The parallel lives of autonomous systems: ASN allocations vs. BGP.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

2020
GDPR: When the Right to Access Personal Data Becomes a Threat.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020

A Light in the Dark Web: Linking Dark Web Aliases to Real Internet Identities.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2019
Scan-and-Pay on Android is Dangerous.
CoRR, 2019

Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.
Proceedings of the Working Notes of CLEF 2019, 2019

Bot and Gender Detection of Twitter Accounts Using Distortion and LSA.
Proceedings of the Working Notes of CLEF 2019, 2019

2018
Mobile Cloud Performance Evaluation Using Stochastic Models.
IEEE Trans. Mob. Comput., 2018

Uncovering hidden social relationships through location-based services: The Happn case study.
Proceedings of the IEEE INFOCOM 2018, 2018

Time-Zone Geolocation of Crowds in the Dark Web.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

2017
Using hover to compromise the confidentiality of user input on Android.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Consensus Robustness and Transaction De-Anonymization in the Ripple Currency Exchange System.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: review, challenges, and a case study.
IEEE Netw., 2016

Count on me: Reliable broadcast and efficient routing in DTNs through social skeletons.
J. Parallel Distributed Comput., 2016

Can't Touch This: Using Hover to Compromise the Confidentiality of User Input on Android.
CoRR, 2016

Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requests.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Social-Aware Stateless Routingin Pocket Switched Networks.
IEEE Trans. Parallel Distributed Syst., 2015

PET and PVC Separation with Hyperspectral Imagery.
Sensors, 2015

A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients.
Proc. Priv. Enhancing Technol., 2015

Planning Mobile Cloud Infrastructures Using Stochastic Petri Nets and Graphic Processing Units.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

2014
Large-Scale Synthetic Social Mobile Networks with SWIM.
IEEE Trans. Mob. Comput., 2014

Integration of Field and Laboratory Spectral Data with Multi-Resolution Remote Sensed Imagery for Asphalt Surface Differentiation.
Remote. Sens., 2014

Exploiting Delay Patterns for User IPs Identification in Cellular Networks.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

A Needle in the Haystack - Delay Based User Identification in Cellular Networks.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Triton: a peer-assisted cloud storage system.
Proceedings of the First Workshop on the Principles and Practice of Eventual Consistency, 2014

2013
Supporting interoperability of things in IoT systems.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

StreamSmart: P2P video streaming for smartphones through the cloud.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

To offload or not to offload? The bandwidth and energy costs of mobile cloud computing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Signals from the crowd: uncovering social relationships through smartphone probes.
Proceedings of the 2013 Internet Measurement Conference, 2013

Clone2Clone (C2C): Peer-to-Peer Networking of Smartphones on the Cloud.
Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing, 2013

2012
Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals.
IEEE Trans. Dependable Secur. Comput., 2012

Fine grained load balancing in multi-hop wireless networks.
J. Parallel Distributed Comput., 2012

Secure File Allocation and Caching in Large-scale Distributed Systems.
Proceedings of the SECRYPT 2012, 2012

CloudShield: Efficient anti-malware smartphone patching with a P2P network on the cloud.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012

When You Don't Trust Clients: Byzantine Proposer Fast Paxos.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Personal Marks and Community Certificates: Detecting Clones in Wireless Mobile Social Networks.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

2011
Distributed Detection of Clone Attacks in Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2011

Personal Marks and Community Certificates: Detecting Clones in Mobile Wireless Networks of Smart-Phones
CoRR, 2011

Brief Announcement: When You Don't Trust Clients: Byzantine Proposer Fast Paxos.
Proceedings of the Distributed Computing - 25th International Symposium, 2011

Social-aware stateless forwarding in pocket switched networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

FAN: friendship based anonymous routing in wireless social mobile networks of malicious communities.
Proceedings of the 3rd Extreme Conference on Communication - The Amazon Expedition, 2011

2010
Hierarchies of keys in secure multicast communications.
J. Comput. Secur., 2010

Small World in Motion (SWIM): Modeling Communities in Ad-Hoc Mobile Networking.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

The smallville effect: social ties make mobile networks more secure against node capture attack.
Proceedings of the 8th ACM International Workshop on Mobility Management & Wireless Access, 2010

Flexible key exchange negotiation for wireless sensor networks.
Proceedings of the Fifth ACM International Workshop on Wireless Network Testbeds, 2010

2009
Routing in Outer Space: Fair Traffic Load in Multihop Wireless Networks.
IEEE Trans. Computers, 2009

Distributed data source verification in wireless sensor networks.
Inf. Fusion, 2009

Mobility and Cooperation to Thwart Node Capture Attacks in MANETs.
EURASIP J. Wirel. Commun. Netw., 2009

The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks.
Proceedings of the Wired/Wireless Internet Communications, 7th International Conference, 2009

SWIM: A Simple Model to Generate Small Mobile Worlds.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

On Active Attacks on Sensor Network Key Distribution Schemes.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2009

2008
Redoubtable Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

Emergent properties: detection of the node-capture attack in mobile wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Unassailable sensor networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Routing in outer space: fair traffic load in multi-hop wireless networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

Routing in Outer Space.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

2007
Routing in Outer Space: Improved Security and Energy-Efficiency in Multi-Hop Wireless Networks
CoRR, 2007

A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

Towards threat-adaptive dynamic fragment replication in large scale distributed systems.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Addressing interoperability issues in access control models.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks.
Wirel. Networks, 2006

Hypercube Computations on Partitioned Optical Passive Stars Networks.
IEEE Trans. Parallel Distributed Syst., 2006

Online Permutation Routing in Partitioned Optical Passive Star Networks.
IEEE Trans. Computers, 2006

Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN.
Proceedings of the IEEE International Conference on Systems, 2006

Sensor Networks that Are Provably Resilient.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

A Secure and Efficient Large Scale Distributed System for Data Sharing.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

2005
Fast distributed algorithms for (weakly) connected dominating sets and linear-size skeletons.
J. Comput. Syst. Sci., 2005

2004
Time and work optimal simulation of basic reconfigurable meshes on hypercubes.
J. Parallel Distributed Comput., 2004

Key management for high bandwidth secure multicast.
J. Comput. Secur., 2004

Connectivity properties of secure wireless sensor networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

Towards a secure dynamic allocation of files in large scale distributed file systems.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004

2003
Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems.
IEEE Trans. Parallel Distributed Syst., 2003

Routing permutations in Partitioned Optical Passive Stars Networks.
J. Parallel Distributed Comput., 2003

A Time Driven Methodology for Key Dimensioning in Multicast Communications.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Random key-assignment for secure Wireless Sensor Networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

Mapping Hypercube Computations onto Partitioned Optical Passive Star Networks.
Proceedings of the High Performance Computing - HiPC 2003, 10th International Conference, 2003

2002
Routing Permutations in Partitioned Optical Passive Star Networks.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

2000
A Residue Number System on Reconfigurable Mesh with Applications to Prefix Sums and Approximate String Matching.
IEEE Trans. Parallel Distributed Syst., 2000

Constant Time Dynamic Programming on Directed Reconfigurable Networks.
IEEE Trans. Parallel Distributed Syst., 2000

Optimal Segmented Scan and Simulation of Reconfigurable Architectures on Fixed Connection Networks.
Proceedings of the High Performance Computing, 2000

A Self-Reconfigurable Gate Array Architecture.
Proceedings of the Field-Programmable Logic and Applications, 2000

1999
Domain Specific Mapping for Solving Graph Problems on Reconfigurable Devices.
Proceedings of the Parallel and Distributed Processing, 1999

Genetic Programming Using Self-Reconfigurable FPGAs.
Proceedings of the Field-Programmable Logic and Applications, 9th International Workshop, 1999

String Natching on Nulticontext FPGAs Using Self-Reconfiguration.
Proceedings of the 1999 ACM/SIGDA Seventh International Symposium on Field Programmable Gate Arrays, 1999

1998
New number representation and conversion techniques on reconfigurable mesh.
Proceedings of the 5th International Conference On High Performance Computing, 1998

1997
P-Bandwidth Priority Queues on Reconfigurable Tree of Meshes.
J. Parallel Distributed Comput., 1997


  Loading...