Edoardo Serra

According to our database1, Edoardo Serra authored at least 58 papers between 2009 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities.
CoRR, 2021

2020
PIE: A Data-Driven Payoff Inference Engine for Strategic Security Applications.
IEEE Trans. Comput. Soc. Syst., 2020

Multi-modal social and psycho-linguistic embedding via recurrent neural networks to identify depressed users in online forums.
Netw. Model. Anal. Health Informatics Bioinform., 2020

Top-k user-specified preferred answers in massive graph databases.
Data Knowl. Eng., 2020

A Framework for the Multi-modal Analysis of Novel Behavior in Business Processes.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2020, 2020

vSwitchGuard: Defending OpenFlow Switches Against Saturation Attacks.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Large-scale Sparse Structural Node Representation.
Proceedings of the IEEE International Conference on Big Data, 2020

An Innovative Framework for Supporting Remote Sensing in Image Processing Systems via Deep Transfer Learning.
Proceedings of the IEEE International Conference on Big Data, 2020

Validating Bad Entity Ranking in the Panama Papers via Open-source Intelligence.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

2019
Detecting suspicious entities in Offshore Leaks networks.
Soc. Netw. Anal. Min., 2019

Extending inverse frequent itemsets mining to generate realistic datasets: complexity, accuracy and emerging applications.
Data Min. Knowl. Discov., 2019

Detecting Saturation Attacks in SDN via Machine Learning.
Proceedings of the 2019 4th International Conference on Computing, 2019

Framework for Detecting Control Command Injection Attacks on Industrial Control Systems (ICS).
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

RIBS: Risky Blind-Spots for Attack Classification Models.
Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), 2019

Number of Minimal Hypergraph Transversals and Complexity of IFM with Infrequency: High in Theory, but Often Not so Much in Practice!
Proceedings of the AI*IA 2019 - Advances in Artificial Intelligence, 2019

Optimal Placement of Security Resources for the Internet of Things.
Proceedings of the Internet of Things for Smart Urban Ecosystems., 2019

2018
SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine.
ACM Trans. Internet Techn., 2018

Hybrid adversarial defense: Merging honeypots and traditional security methods.
J. Comput. Secur., 2018

Inverse Tree-OLAP: Definition, Complexity and First Solution.
Proceedings of the 26th Italian Symposium on Advanced Database Systems, 2018

Estimation of Remote Sensing Imagery Atmospheric Conditions Using Deep Learning and Image Classification.
Proceedings of the Intelligent Systems and Applications, 2018

The Inverse Tree-OLAP Problem: Definitions, Models, Complexity Analysis, and a Possible Solution.
Proceedings of the 22nd International Database Engineering & Applications Symposium, 2018

A Crowdsourcing Semi-Supervised LSTM Training Approach to Identify Novel Items in Emerging Artificial Intelligent Environments.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018

Redundancy as a Measure of Fault-Tolerance for the Internet of Things: A Review.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

Convolutional Neural Network Ensemble Fine-Tuning for Extended Transfer Learning.
Proceedings of the Big Data - BigData 2018, 2018

Unknown Landscape Identification with CNN Transfer Learning.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

Inferring Bad Entities Through the Panama Papers Network.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
Pareto Optimal Security Resource Allocation for Internet of Things.
ACM Trans. Priv. Secur., 2017

A Probabilistic Logic of Cyber Deception.
IEEE Trans. Inf. Forensics Secur., 2017

Evaluating the Privacy Implications of Frequent Itemset Disclosure.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

A Game of Things: Strategic Allocation of Security Resources for IoT.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

Shortfall-Based Optimal Security Provisioning for Internet of Things.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Using temporal probabilistic logic for optimal monitoring of security events with limited resources.
J. Comput. Secur., 2016

Ensemble Models for Data-driven Prediction of Malware Infections.
Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, 2016

ChoiceGAPs: Competitive Diffusion as a Massive Multi-player Game in Social Networks.
Proceedings of the Scalable Uncertainty Management - 10th International Conference, 2016

Metric Logic Program Explanations for Complex Separator Functions.
Proceedings of the Scalable Uncertainty Management - 10th International Conference, 2016

Strategic Security Resource Allocation for Internet of Things.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Evaluating the impact of social media in detecting health-violating restaurants.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

Multi-Sorted Inverse Frequent Itemsets Mining: On-Going Research.
Proceedings of the 10th Alberto Mendelzon International Workshop on Foundations of Data Management, 2016

2015
An Effective GPU-Based Approach to Probabilistic Query Confidence Computation.
IEEE Trans. Knowl. Data Eng., 2015

Pareto-Optimal Adversarial Defense of Enterprise Systems.
ACM Trans. Inf. Syst. Secur., 2015

APE: A Data-Driven, Behavioral Model-Based Anti-Poaching Engine.
IEEE Trans. Comput. Soc. Syst., 2015

Saving Rhinos with Predictive Analytics.
IEEE Intell. Syst., 2015

2014
A Survey of Quantitative Models of Terror Group Behavior and an Analysis of Strategic Disclosure of Behavioral Models.
IEEE Trans. Comput. Soc. Syst., 2014

Behavior Informatics: A New Perspective.
IEEE Intell. Syst., 2014

2013
Extending the power of datalog recursion.
VLDB J., 2013

A declarative extension of horn clauses, and its significance for datalog and its applications.
Theory Pract. Log. Program., 2013

Solving inverse frequent itemset mining with infrequency constraints via large-scale linear programs.
ACM Trans. Knowl. Discov. Data, 2013

Multi-Sorted Inverse Frequent Itemsets Mining.
CoRR, 2013

Data Posting: a New Frontier for Data Exchange in the Big Data Era.
Proceedings of the 7th Alberto Mendelzon International Workshop on Foundations of Data Management, 2013

A Monotonic Extension for Horn-Clauses and its Significance in Datalog's Renaissance.
Proceedings of the 7th Alberto Mendelzon International Workshop on Foundations of Data Management, 2013

2012
Count Constraints for Inverse OLAP and Aggregate Data Exchange.
Proceedings of the Twentieth Italian Symposium on Advanced Database Systems, 2012

An Extension of Datalog for Graph Queries.
Proceedings of the Twentieth Italian Symposium on Advanced Database Systems, 2012

Count Constraints and the Inverse OLAP Problem: Definition, Complexity and a Step toward Aggregate Data Exchange.
Proceedings of the Foundations of Information and Knowledge Systems, 2012

Data Exchange in Datalog Is Mainly a Matter of Choice.
Proceedings of the Datalog in Academia and Industry - Second International Workshop, 2012

2011
A Decomposition Technique for the Inverse Frequent Itemset Mining Problem.
Proceedings of the Sistemi Evoluti per Basi di Dati, 2011

2009
An Effective Approach to Inverse Frequent Set Mining.
Proceedings of the ICDM 2009, 2009


  Loading...