Edoardo Serra

Orcid: 0000-0003-0689-5063

Affiliations:
  • Boise State University


According to our database1, Edoardo Serra authored at least 92 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Joint Credibility Estimation of News, User, and Publisher via Role-relational Graph Convolutional Networks.
ACM Trans. Web, February, 2024

Power Grid Anomaly Detection via Hybrid LSTM-GIN Model (Student Abstract).
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Temporal SIR-GN: Efficient and Effective Structural Representation Learning for Temporal Graphs.
Proc. VLDB Endow., 2023

Editorial: Security and privacy for the Internet of Things.
Frontiers Comput. Sci., 2023

Structural iterative lexicographic autoencoded node representation.
Data Min. Knowl. Discov., 2023

Attribution Methods Assessment for Interpretable Machine Learning.
Proceedings of the 31st Symposium of Advanced Database Systems, 2023

Graph Representation Learning for Complex Security Problems.
Proceedings of the 31st Symposium of Advanced Database Systems, 2023

A Graph-Representation-Learning Framework for Supporting Android Malware Identification and Polymorphic Evolution.
Proceedings of the 10th IEEE Swiss Conference on Data Science, 2023

Structural Node Representation Learning for Detecting Botnet Nodes.
Proceedings of the Computational Science and Its Applications - ICCSA 2023, 2023

Prediction of Future Nation-initiated Cyberattacks from News-based Political Event Graph.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

An AI Framework for Modelling and Evaluating Attribution Methods in Enhanced Machine Learning Interpretability.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

A Novel Method to Enable Transfer Learning of Structural Graph Representations.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Machine learning methods for generating high dimensional discrete datasets.
WIREs Data Mining Knowl. Discov., 2022

Generating Synthetic Discrete Datasets with Machine Learning.
Proceedings of the 30th Italian Symposium on Advanced Database Systems, 2022

COVID-19 and Haters - A User Model Perspective.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022

Anomaly Detection in Cybersecurity Events Through Graph Neural Network and Transformer Based Model: A Case Study with BETH Dataset.
Proceedings of the IEEE International Conference on Big Data, 2022

VWC-BERT: Scaling Vulnerability-Weakness-Exploit Mapping on Modern AI Accelerators.
Proceedings of the IEEE International Conference on Big Data, 2022

GAPS: Generality and Precision with Shapley Attribution.
Proceedings of the IEEE International Conference on Big Data, 2022

Predicting RNA Mutation Effects through Machine Learning of High-Throughput Ribozyme Experiments (Student Abstract).
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

Identifying ATT&CK Tactics in Android Malware Control Flow Graph through Graph Representation Learning and Interpretability (Student Abstract).
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

Deep Learning Based Side Channel Attacks on Lightweight Cryptography (Student Abstract).
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
SIR-GN: A Fast Structural Iterative Representation Learning Approach For Graph Nodes.
ACM Trans. Knowl. Discov. Data, 2021

A multi-perspective approach for the analysis of complex business processes behavior.
Expert Syst. Appl., 2021

Inferential SIR-GN: Scalable Graph Representation Learning.
CoRR, 2021

The geometrical shapes of violence: predicting and explaining terrorist operations through graph embeddings.
J. Complex Networks, 2021

An Effective and Efficient Graph Representation Learning Approach for Big Graphs.
Proceedings of the 29th Italian Symposium on Advanced Database Systems, 2021

Multi-Sorted Inverse Frequent Itemsets Mining for Generating Realistic No-SQL Datasets (Discussion Paper).
Proceedings of the 29th Italian Symposium on Advanced Database Systems, 2021

cuTS: scaling subgraph isomorphism on distributed multi-GPU systems using trie based data structure.
Proceedings of the International Conference for High Performance Computing, 2021

V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities.
Proceedings of the 8th IEEE International Conference on Data Science and Advanced Analytics, 2021

A Few Shot Transfer Learning Approach Identifying Private Images With Fast User Personalization.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Evaluating Attribution Methods in Machine Learning Interpretability.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Android Malware Identification and Polymorphic Evolution Via Graph Representation Learning.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Identifying ATT&CK Tactics in Android Malware Control Flow Graph Through Graph Representation Learning and Interpretability.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Identifying Malicious Users in the Offshore Leaks Networks via Structural Node Representation Learning.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Detecting Botnet Nodes via Structural Node Representation Learning.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
PIE: A Data-Driven Payoff Inference Engine for Strategic Security Applications.
IEEE Trans. Comput. Soc. Syst., 2020

Multi-modal social and psycho-linguistic embedding via recurrent neural networks to identify depressed users in online forums.
Netw. Model. Anal. Health Informatics Bioinform., 2020

Top-k user-specified preferred answers in massive graph databases.
Data Knowl. Eng., 2020

A Framework for the Multi-modal Analysis of Novel Behavior in Business Processes.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2020, 2020

vSwitchGuard: Defending OpenFlow Switches Against Saturation Attacks.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Large-scale Sparse Structural Node Representation.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

An Innovative Framework for Supporting Remote Sensing in Image Processing Systems via Deep Transfer Learning.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Validating Bad Entity Ranking in the Panama Papers via Open-source Intelligence.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

2019
Detecting suspicious entities in Offshore Leaks networks.
Soc. Netw. Anal. Min., 2019

Extending inverse frequent itemsets mining to generate realistic datasets: complexity, accuracy and emerging applications.
Data Min. Knowl. Discov., 2019

Detecting Saturation Attacks in SDN via Machine Learning.
Proceedings of the 2019 4th International Conference on Computing, 2019

Framework for Detecting Control Command Injection Attacks on Industrial Control Systems (ICS).
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

RIBS: Risky Blind-Spots for Attack Classification Models.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Number of Minimal Hypergraph Transversals and Complexity of IFM with Infrequency: High in Theory, but Often Not so Much in Practice!
Proceedings of the AI*IA 2019 - Advances in Artificial Intelligence, 2019

Optimal Placement of Security Resources for the Internet of Things.
Proceedings of the Internet of Things for Smart Urban Ecosystems., 2019

2018
SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine.
ACM Trans. Internet Techn., 2018

Hybrid adversarial defense: Merging honeypots and traditional security methods.
J. Comput. Secur., 2018

Inverse Tree-OLAP: Definition, Complexity and First Solution.
Proceedings of the 26th Italian Symposium on Advanced Database Systems, 2018

Estimation of Remote Sensing Imagery Atmospheric Conditions Using Deep Learning and Image Classification.
Proceedings of the Intelligent Systems and Applications, 2018

The Inverse Tree-OLAP Problem: Definitions, Models, Complexity Analysis, and a Possible Solution.
Proceedings of the 22nd International Database Engineering & Applications Symposium, 2018

A Crowdsourcing Semi-Supervised LSTM Training Approach to Identify Novel Items in Emerging Artificial Intelligent Environments.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018

Redundancy as a Measure of Fault-Tolerance for the Internet of Things: A Review.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

Convolutional Neural Network Ensemble Fine-Tuning for Extended Transfer Learning.
Proceedings of the Big Data - BigData 2018, 2018

Unknown Landscape Identification with CNN Transfer Learning.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

Inferring Bad Entities Through the Panama Papers Network.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
Pareto Optimal Security Resource Allocation for Internet of Things.
ACM Trans. Priv. Secur., 2017

A Probabilistic Logic of Cyber Deception.
IEEE Trans. Inf. Forensics Secur., 2017

Evaluating the Privacy Implications of Frequent Itemset Disclosure.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

A Game of Things: Strategic Allocation of Security Resources for IoT.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

Shortfall-Based Optimal Security Provisioning for Internet of Things.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Using temporal probabilistic logic for optimal monitoring of security events with limited resources.
J. Comput. Secur., 2016

Ensemble Models for Data-driven Prediction of Malware Infections.
Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, 2016

ChoiceGAPs: Competitive Diffusion as a Massive Multi-player Game in Social Networks.
Proceedings of the Scalable Uncertainty Management - 10th International Conference, 2016

Metric Logic Program Explanations for Complex Separator Functions.
Proceedings of the Scalable Uncertainty Management - 10th International Conference, 2016

Strategic Security Resource Allocation for Internet of Things.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Evaluating the impact of social media in detecting health-violating restaurants.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

Multi-Sorted Inverse Frequent Itemsets Mining: On-Going Research.
Proceedings of the 10th Alberto Mendelzon International Workshop on Foundations of Data Management, 2016

2015
An Effective GPU-Based Approach to Probabilistic Query Confidence Computation.
IEEE Trans. Knowl. Data Eng., 2015

Pareto-Optimal Adversarial Defense of Enterprise Systems.
ACM Trans. Inf. Syst. Secur., 2015

APE: A Data-Driven, Behavioral Model-Based Anti-Poaching Engine.
IEEE Trans. Comput. Soc. Syst., 2015

Saving Rhinos with Predictive Analytics.
IEEE Intell. Syst., 2015

2014
A Survey of Quantitative Models of Terror Group Behavior and an Analysis of Strategic Disclosure of Behavioral Models.
IEEE Trans. Comput. Soc. Syst., 2014

Behavior Informatics: A New Perspective.
IEEE Intell. Syst., 2014

2013
Extending the power of datalog recursion.
VLDB J., 2013

A declarative extension of horn clauses, and its significance for datalog and its applications.
Theory Pract. Log. Program., 2013

Solving inverse frequent itemset mining with infrequency constraints via large-scale linear programs.
ACM Trans. Knowl. Discov. Data, 2013

Multi-Sorted Inverse Frequent Itemsets Mining.
CoRR, 2013

Data Posting: a New Frontier for Data Exchange in the Big Data Era.
Proceedings of the 7th Alberto Mendelzon International Workshop on Foundations of Data Management, 2013

A Monotonic Extension for Horn-Clauses and its Significance in Datalog's Renaissance.
Proceedings of the 7th Alberto Mendelzon International Workshop on Foundations of Data Management, 2013

2012
Count Constraints for Inverse OLAP and Aggregate Data Exchange.
Proceedings of the Twentieth Italian Symposium on Advanced Database Systems, 2012

An Extension of Datalog for Graph Queries.
Proceedings of the Twentieth Italian Symposium on Advanced Database Systems, 2012

Count Constraints and the Inverse OLAP Problem: Definition, Complexity and a Step toward Aggregate Data Exchange.
Proceedings of the Foundations of Information and Knowledge Systems, 2012

Data Exchange in Datalog Is Mainly a Matter of Choice.
Proceedings of the Datalog in Academia and Industry - Second International Workshop, 2012

2011
A Decomposition Technique for the Inverse Frequent Itemset Mining Problem.
Proceedings of the Sistemi Evoluti per Basi di Dati, 2011

2009
An Effective Approach to Inverse Frequent Set Mining.
Proceedings of the ICDM 2009, 2009


  Loading...