Gioacchino Tangari

Orcid: 0000-0002-6282-5994

According to our database1, Gioacchino Tangari authored at least 14 papers between 2016 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
On the Adversarial Inversion of Deep Biometric Representations.
CoRR, 2023

2021
Analyzing security issues of android mobile health and medical applications.
J. Am. Medical Informatics Assoc., 2021

Longitudinal Compliance Analysis of AndroidApplications with Privacy Policies.
CoRR, 2021

Longitudinal Compliance Analysis of Android Applications with Privacy Policies.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2021

2020
Accuracy-Aware Adaptive Traffic Monitoring for Software Dataplanes.
IEEE/ACM Trans. Netw., 2020

Classification-assisted Query Processing for Network Telemetry.
Proceedings of the 4th Network Traffic Measurement and Analysis Conference, 2020

2019
Generalizing Critical Path Analysis on Mobile Traffic.
CoRR, 2019

Tackling Mobile Traffic Critical Path Analysis With Passive and Active Measurements.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2019

2018
Self-Adaptive Decentralized Monitoring in Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018

A Northbound Interface for Software-based Networks.
Proceedings of the 14th International Conference on Network and Service Management, 2018

2017
Decentralized monitoring for large-scale Software-Defined Networks.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Adaptive traffic monitoring for software dataplanes.
Proceedings of the 13th International Conference on Network and Service Management, 2017

2016
Enhancing Content Distribution through Information-Aware Mechanisms.
Proceedings of the 5th IEEE International Conference on Cloud Networking, 2016

Decentralized Solutions for Monitoring Large-Scale Software-Defined Networks.
Proceedings of the Management and Security in the Age of Hyperconnectivity, 2016


  Loading...