Marco Pistoia

Orcid: 0000-0001-9002-1128

Affiliations:
  • JPMorgan Chase, New York, NY, USA
  • IBM Research (former)


According to our database1, Marco Pistoia authored at least 93 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Parameter Setting in Quantum Approximate Optimization of Weighted Problems.
Quantum, January, 2024

Q-CHOP: Quantum constrained Hamiltonian optimization.
CoRR, 2024

Ranking Distance Metric for Privacy Budget in Distributed Learning of Finite Embedding Data.
Proceedings of the Advances in Information Retrieval, 2024

Absolute Variation Distance: An Inversion Attack Evaluation Metric for Federated Learning.
Proceedings of the Advances in Information Retrieval, 2024

2023
Quantum Deep Hedging.
Quantum, November, 2023

Privacy-preserving quantum federated learning via gradient hiding.
CoRR, 2023

Blind quantum machine learning with quantum bipartite correlator.
CoRR, 2023

Expressive variational quantum circuits provide inherent privacy in federated learning.
CoRR, 2023

Des-q: a quantum algorithm to construct and efficiently retrain decision trees for regression and binary classification.
CoRR, 2023

Evidence of Scaling Advantage for the Quantum Approximate Optimization Algorithm on a Classically Intractable Problem.
CoRR, 2023

Alignment between Initial State and Mixer Improves QAOA Performance for Constrained Portfolio Optimization.
CoRR, 2023

QAOA with N·p≥200.
CoRR, 2023

Fast Simulation of High-Depth QAOA Circuits.
Proceedings of the SC '23 Workshops of The International Conference on High Performance Computing, 2023

QAOAwith $N\cdot p\geq 200$.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2023

2022
Numerical evidence against advantage with quantum fidelity kernels on classical data.
CoRR, 2022

Exploiting In-Constraint Energy in Constrained Variational Quantum Optimization.
CoRR, 2022

MaSS: Multi-attribute Selective Suppression.
CoRR, 2022

Constrained Quantum Optimization for Extractive Summarization on a Trapped-ion Quantum Computer.
CoRR, 2022

Paving the Way towards 800 Gbps Quantum-Secured Optical Channel Deployment in Mission-Critical Environments.
CoRR, 2022

Multiangle QAOA Does Not Always Need All Its Angles.
Proceedings of the 7th IEEE/ACM Symposium on Edge Computing, 2022

Utility-Preserving Biometric Information Anonymization.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
The Efficient Preparation of Normal Distributions in Quantum Registers.
Quantum, 2021

Quantum Machine Learning for Finance.
CoRR, 2021

On the Exponential Sample Complexity of the Quantum State Sign Estimation Problem.
CoRR, 2021

Quantum Machine Learning for Finance ICCAD Special Session Paper.
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2021

2020
Optimizing Quantum Search with a Binomial Version of Grover's Algorithm.
CoRR, 2020

Canonical Construction of Quantum Oracles.
CoRR, 2020

Optimizing Quantum Search Using a Generalized Version of Grover's Algorithm.
CoRR, 2020

Parallelization of Classical Numerical optimization in Quantum Variational Algorithms.
Proceedings of the 13th IEEE International Conference on Software Testing, 2020

2019
A Domain-agnostic, Noise-resistant Evolutionary Variational Quantum Eigensolver for Hardware-efficient Optimization in the Hilbert Space.
CoRR, 2019

Stochastic Optimization of Quantum Programs.
Computer, 2019

Reduction-Based Problem Mapping for Quantum Computing.
Computer, 2019

More Is Less: Learning Efficient Video Representations by Big-Little Network and Depthwise Temporal Aggregation.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Efficient Circuits for Quantum Search over 2D Square Lattice Architecture.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
Efficient Fusion of Sparse and Complementary Convolutions for Object Recognition and Detection.
CoRR, 2018

SC-Conv: Sparse-Complementary Convolution for Efficient Model Utilization on CNNs.
Proceedings of the 2018 IEEE International Symposium on Multimedia, 2018

Automatically solving NP-complete problems on a quantum computer.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

ARES: triggering payload of evasive Android malware.
Proceedings of the 5th International Conference on Mobile Software Engineering and Systems, MOBILESoft@ICSE 2018, Gothenburg, Sweden, May 27, 2018

2017
Foraging goes mobile: Foraging while debugging on mobile devices.
Proceedings of the 2017 IEEE Symposium on Visual Languages and Human-Centric Computing, 2017

UI X-Ray: Interactive Mobile UI Testing Based on Computer Vision.
Proceedings of the 22nd International Conference on Intelligent User Interfaces, 2017

Automatic text input generation for mobile testing.
Proceedings of the 39th International Conference on Software Engineering, 2017

Visual Configuration of Mobile Privacy Policies.
Proceedings of the Fundamental Approaches to Software Engineering, 2017

2016
Pinpointing mobile malware using code analysis.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

Cognitive mobile security: invited conference keynote.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

Improving design validation of mobile application user interface implementation.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

A framework for automatic anomaly detection in mobile applications.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

ASTRO: Autism Support Therapy by RObot Interaction.
Proceedings of the Ambient Assisted Living, 2016

FASE: functionality-aware security enforcement.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2015

Automatic detection, correction, and visualization of security vulnerabilities in mobile apps.
Proceedings of the 3rd International Workshop on Mobile Development Lifecycle, 2015

ShamDroid: gracefully degrading functionality in the presence of limited resource access.
Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, 2015

Labyrinth: Visually Configurable Data-Leakage Detection in Mobile Applications.
Proceedings of the 16th IEEE International Conference on Mobile Data Management, 2015

Dynamic detection of inter-application communication vulnerabilities in Android.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Application- and User-Sensitive Privacy Enforcement in Mobile Systems.
Proceedings of the 2nd ACM International Conference on Mobile Software Engineering and Systems, 2015

Access-rights Analysis in the Presence of Subjects.
Proceedings of the 29th European Conference on Object-Oriented Programming, 2015

Privacy Analysis of Android Apps: Implicit Flows and Quantitative Analysis.
Proceedings of the Computer Information Systems and Industrial Management, 2015

Program Analysis for Mobile Application Integrity and Privacy Enforcement.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

MorphDroid: Fine-grained Privacy Verification.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Integrating Security, Analytics and Application Management into the Mobile Development Lifecycle.
Proceedings of the 2nd International Workshop on Mobile Development Lifecycle, 2014

Hybrid security analysis of web JavaScript code via dynamic partial evaluation.
Proceedings of the International Symposium on Software Testing and Analysis, 2014

ALETHEIA: Improving the Usability of Static Security Analysis.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Path- and index-sensitive string analysis based on monadic second-order logic.
ACM Trans. Softw. Eng. Methodol., 2013

Automatic detection of inter-application permission leaks in Android applications.
IBM J. Res. Dev., 2013

Enabling Bring-Your-Own-Device using mobile application instrumentation.
IBM J. Res. Dev., 2013

Runtime adaptive multi-factor authentication for mobile devices.
IBM J. Res. Dev., 2013

Andromeda: Accurate and Scalable Security Analysis of Web Applications.
Proceedings of the Fundamental Approaches to Software Engineering, 2013

2012
Fault Localization for Dynamic Web Applications.
IEEE Trans. Software Eng., 2012

2011
F4F: taint analysis of framework-based web applications.
Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2011

Saving the world wide web from vulnerable JavaScript.
Proceedings of the 20th International Symposium on Software Testing and Analysis, 2011

Static discovery and remediation of code-embedded resource dependencies.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

2010
Directed test generation for effective fault localization.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Practical fault localization for dynamic web applications.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

2009
TAJ: effective taint analysis of web applications.
Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, 2009

A language for information flow: dynamic tracking in multiple interdependent dimensions.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009

Modular string-sensitive permission analysis with demand-driven precision.
Proceedings of the 31st International Conference on Software Engineering, 2009

2008
Static Specification Mining Using Automata-Based Abstractions.
IEEE Trans. Software Eng., 2008

Programming languages and program analysis for security: a three-year retrospective.
ACM SIGPLAN Notices, 2008

PLAS 2008 paper abstracts.
ACM SIGPLAN Notices, 2008

Workshop on programming languages and analysis for security (PLAS 2008).
ACM SIGPLAN Notices, 2008

Program Analysis and Programming Languages for Security.
Proceedings of the Verification, 2008

2007
A survey of static analysis methods for identifying security vulnerabilities in software systems.
IBM Syst. J., 2007

Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

When Role Models Have Flaws: Static Validation of Enterprise Security Policies.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
The case for analysis preserving language transformation.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2006

Role-Based access control consistency validation.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2006

Program Analysis for Security and Privacy.
Proceedings of the Object-Oriented Technology, ECOOP 2006 Workshop Reader, 2006

2005
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection.
Proceedings of the ECOOP 2005, 2005

2004
Enterprise Java security : Building secure J2EE applications.
Addison-Wesley, ISBN: 978-0321118899, 2004

2002
Access rights analysis for Java.
Proceedings of the 2002 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 2002

2001
Security challenges for Enterprise Java in an e-business environment.
IBM Syst. J., 2001

WebGuard: A System for Web Content Protection.
Proceedings of the Poster Proceedings of the Tenth International World Wide Web Conference, 2001

1999
JAVA 2 Network Security (2nd Edition)
Prentice-Hall, ISBN: 0130155926, 1999


  Loading...