Michele Ianni

Orcid: 0000-0003-0562-7462

According to our database1, Michele Ianni authored at least 42 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An advanced data fabric architecture leveraging homomorphic encryption and federated learning.
Inf. Fusion, February, 2024

Model aggregation techniques in federated learning: A comprehensive survey.
Future Gener. Comput. Syst., January, 2024

Exploiting number theory for dynamic software watermarking.
J. Comput. Virol. Hacking Tech., 2024

2023
Demystifying machine learning models of massive IoT attack detection with Explainable AI for sustainable and secure future smart cities.
Internet Things, December, 2023

DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things.
Internet Things, October, 2023

SCOUT: Security by computing OUTliers on activity logs.
Comput. Secur., September, 2023

Identification and prediction of attacks to industrial control systems using temporal point processes.
J. Ambient Intell. Humaniz. Comput., 2023

FL-Enhance: A federated learning framework for balancing non-IID data with augmented and shared compressed samples.
Inf. Fusion, 2023

Editorial: Security and privacy for the Internet of Things.
Frontiers Comput. Sci., 2023

SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Exploiting Bytecode Analysis for Reentrancy Vulnerability Detection in Ethereum Smart Contracts.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Explaining Binary Obfuscation.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Some Experiments on High Performance Anomaly Detection.
Proceedings of the 30th Euromicro International Conference on Parallel, 2022

Enabling Faster Security Assessment of Re-hosted Firmware.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

Neural Network based Temporal Point Processes for Attack Detection in Industrial Control Systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
A survey of Big Data dimensions vs Social Networks analysis.
J. Intell. Inf. Syst., 2021

Predicting activities of daily living via temporal point processes: Approaches and experimental results.
Comput. Electr. Eng., 2021

Some experiments on activity outlier detection (Discussion Paper).
Proceedings of the 29th Italian Symposium on Advanced Database Systems, 2021

Activity Daily Living prediction with Marked Temporal Point Processes (Discussion Paper).
Proceedings of the 29th Italian Symposium on Advanced Database Systems, 2021

A compact encoding of security logs for high performance activity detection.
Proceedings of the 29th Euromicro International Conference on Parallel, 2021

Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone.
Proceedings of the Checkmate@CCS 2021, 2021

2020
Fast and effective Big Data exploration by clustering.
Future Gener. Comput. Syst., 2020

Modeling and efficiently detecting security-critical sequences of actions.
Future Gener. Comput. Syst., 2020

Smart Data Exchange.
Proceedings of the 28th Italian Symposium on Advanced Database Systems, 2020

Exploiting Marked Temporal Point Processes for Predicting Activities of Daily Living.
Proceedings of the IEEE International Conference on Human-Machine Systems, 2020

2019
Exotic Compilers as a Malware Evasion Technique.
Proceedings of the 27th Italian Symposium on Advanced Database Systems, 2019

How to implement a big data clustering algorithm: a brief report on lesson learned.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

An Overview of the Endless Battle between Virus Writers and Detectors: How Compilers Can Be Used as an Evasion Technique.
Proceedings of the 8th International Conference on Data Science, 2019

High Performance Computing by the Crowd.
Proceedings of the Intelligent Methods and Big Data in Industrial Applications., 2019

2018
Distributed computing by leveraging and rewarding idling user resources from P2P networks.
J. Parallel Distributed Comput., 2018

Clustering Goes Big: CLUBS-P, an Algorithm for Unsupervised Clustering Around Centroids Tailored For Big Data Applications.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

Trusted Environments for Volunteer Computing.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

Efficient Big Data Clustering.
Proceedings of the 22nd International Database Engineering & Applications Symposium, 2018

Clustering Big Data.
Proceedings of the 7th International Conference on Data Science, 2018

2017
Trusted Volunteer Computing.
Proceedings of the 25th Italian Symposium on Advanced Database Systems, 2017

Efficient High Performance Computing by user networks.
Proceedings of the 25th Italian Symposium on Advanced Database Systems, 2017

A Peer to Peer Approach to Efficient High Performance Computing.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Effective High Performance Computing using Peer To Peer Networks.
Proceedings of the 2017 International Conference on High Performance Computing & Simulation, 2017

2015
Hierarchical Big Data Clustering (Discussion Paper).
Proceedings of the 23rd Italian Symposium on Advanced Database Systems, 2015

VIPOC Project Research Summary (Discussion Paper).
Proceedings of the 23rd Italian Symposium on Advanced Database Systems, 2015

Big Data Techniques For Supporting Accurate Predictions of Energy Production From Renewable Sources.
Proceedings of the 19th International Database Engineering & Applications Symposium, 2015


  Loading...