Sara Narteni

Orcid: 0000-0002-0579-647X

According to our database1, Sara Narteni authored at least 17 papers between 2021 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Trustworthy artificial intelligence classification-based equivalent bandwidth control.
Comput. Commun., September, 2023

Dual-View Single-Shot Multibox Detector at Urban Intersections: Settings and Performance Evaluation.
Sensors, March, 2023

CONFIDERAI: a novel CONFormal Interpretable-by-Design score function for Explainable and Reliable Artificial Intelligence.
CoRR, 2023

Rule-based Out-Of-Distribution Detection.
CoRR, 2023

Weighted Mutual Information for Out-Of-Distribution Detection.
Proceedings of the Explainable Artificial Intelligence, 2023

CONFIDERAI: CONFormal Interpretable-by-Design score function for Explainable and Reliable Artificial Intelligence.
Proceedings of the Conformal and Probabilistic Prediction with Applications, 2023

2022
Sensitivity of Logic Learning Machine for Reliability in Safety-Critical Systems.
IEEE Intell. Syst., 2022

eXplainable and Reliable Against Adversarial Machine Learning in Data Analytics.
IEEE Access, 2022

On the Intersection of Explainable and Reliable AI for Physical Fatigue Prediction.
IEEE Access, 2022

Bag-of-Words Similarity in eXplainable AI.
Proceedings of the Intelligent Systems and Applications, 2022

On The Detection Of Adversarial Attacks Through Reliable AI.
Proceedings of the IEEE INFOCOM 2022, 2022

A New XAI-based Evaluation of Generative Adversarial Networks for IMU Data Augmentation.
Proceedings of the IEEE International Conference on E-health Networking, 2022

2021
Evaluating the Possibility to Perpetrate Tunneling Attacks Exploiting Short-Message-Service.
J. Internet Serv. Inf. Secur., 2021

Exploiting Internet of Things Protocols for Malicious Data Exfiltration Activities.
IEEE Access, 2021

Perpetrate Cyber-threats using IoT Devices as Attack Vector: The ESP8266 Use Case.
Proceedings of the Italian Conference on Cybersecurity, 2021

On the Feasibility of Covert Channels through Short-Message-Service.
Proceedings of the Italian Conference on Cybersecurity, 2021

From Explainable to Reliable Artificial Intelligence.
Proceedings of the Machine Learning and Knowledge Extraction, 2021


  Loading...