Stefano Braghin

Orcid: 0000-0001-5519-1674

According to our database1, Stefano Braghin authored at least 47 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:



Online Learning and Model Pruning Against Concept Drifts in Edge Devices.
Proceedings of the 10th IEEE International Conference on Network Softwarization, 2024

Pruning Federated Learning Models for Anomaly Detection in Resource-Constrained Environments.
Proceedings of the IEEE International Conference on Big Data, 2023

Adaptive Replication Strategy in Highly Distributed Data Management Systems.
Proceedings of the IEEE International Conference on Cloud Engineering, 2022

Robust Learning Protocol for Federated Tumor Segmentation Challenge.
Proceedings of the Brainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain Injuries, 2022

DLPFS: The Data Leakage Prevention FileSystem.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

Secure Random Sampling in Differential Privacy.
Proceedings of the Computer Security - ESORICS 2021, 2021

Privacy-Preserving Distributed Support Vector Machines.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2021

Secure k-Anonymization over Encrypted Databases.
Proceedings of the 14th IEEE International Conference on Cloud Computing, 2021

The Bounded Laplace Mechanism in Differential Privacy.
J. Priv. Confidentiality, 2020

PrivLeAD: Privacy Leakage Detection on the Web.
Proceedings of the Intelligent Systems and Applications, 2020

Computing Multi-Modal Journey Plans under Uncertainty.
J. Artif. Intell. Res., 2019

Diffprivlib: The IBM Differential Privacy Library.
CoRR, 2019

AnonTokens: tracing re-identification attacks through decoy records.
CoRR, 2019

Anatomy and Deployment of Robust AI-Centric Indoor Positioning System.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

An Extensible De-Identification Framework for Privacy Protection of Unstructured Health Information: Creating Sustainable Privacy Infrastructures.
Proceedings of the MEDINFO 2019: Health and Wellbeing e-Networks for All, 2019

PRIMA: An End-to-End Framework for Privacy at Scale.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

(k, ε)-Anonymity: k-Anonymity with ε-Differential Privacy.
CoRR, 2017

IPV: A system for identifying privacy vulnerabilities in datasets.
IBM J. Res. Dev., 2016

A Multi-Scale Approach to Data-Driven Mass Migration Analysis.
Proceedings of the First Workshop on Data Science for Social Good co-located with European Conference on Machine Learning and Principles and Practice of Knowledge Dicovery in Databases, 2016

FPVI: A scalable method for discovering privacy vulnerabilities in microdata.
Proceedings of the IEEE International Smart Cities Conference, 2016

S&P360: Multidimensional Perspective on Companies from Online Data Sources.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2015

Mobility Mining for Journey Planning in Rome.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2015

Efficient algorithms for identifying privacy vulnerabilities.
Proceedings of the IEEE First International Smart Cities Conference, 2015

Managing travels with PETRA: The Rome use case.
Proceedings of the 31st IEEE International Conference on Data Engineering Workshops, 2015

Contingent versus Deterministic Plans in Multi-Modal Journey Planning.
Proceedings of the Twenty-Fifth International Conference on Automated Planning and Scheduling, 2015

Mosco: a privacy-aware middleware for mobile social computing.
J. Syst. Softw., 2014

The zen of multidisciplinary team recommendation.
J. Assoc. Inf. Sci. Technol., 2014

Answering queries using pairings.
CoRR, 2014

Predicting User Engagement in Twitter with Collaborative Ranking.
CoRR, 2014

Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

Multidimensional Reputation Network for Service Composition in the Internet of Things.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

Distributed access control policies for spectrum sharing.
Secur. Commun. Networks, 2013

A Framework for Trust-Based Multidisciplinary Team Recommendation.
Proceedings of the User Modeling, Adaptation, and Personalization, 2013

A Flexible Approach to Multisession Trust Negotiations.
IEEE Trans. Dependable Secur. Comput., 2012

PriSM: A Private Social Mesh for Leveraging Social Networking at Workplace
CoRR, 2012

SWAT: Social Web Application for Team Recommendation.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

A Method and Guidelines for the Cooperation of Ontologies and Relational Databases in Semantic Web Applications.
Proceedings of the 2nd International Workshop on Semantic Digital Archives, 2012

Advanced languages and techniques for trust negotiation.
PhD thesis, 2011

Secure and Policy-Private Resource Sharing in an Online Social Network.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

A rule-based policy language for selective trust propagation in social networks.
Proceedings of the First ACM SIGMOD Workshop on Databases and Social Networks, 2011

Group-Based Negotiations in P2P Systems.
IEEE Trans. Parallel Distributed Syst., 2010

Advanced trust negotiations in critical infrastructures.
Int. J. Crit. Infrastructures, 2010

Combining access control and trust negotiations in an On-line Social Network.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Adaptive and Distributed Access Control in Cognitive Radio Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Introducing privacy in a hospital information system.
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008

Identity-based long running negotiations.
Proceedings of the 4th Workshop on Digital Identity Management, 2008