


default search action
Michele Ianni
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j16]Mila Dalla Preda
, Claudia Greco
, Michele Ianni, Francesco Lupia
, Andrea Pugliese
:
Light sensor based covert channels on mobile devices. Inf. Sci. 690: 121581 (2025) - 2024
- [j15]Pian Qi, Diletta Chiaro, Antonella Guzzo, Michele Ianni, Giancarlo Fortino, Francesco Piccialli
:
Model aggregation techniques in federated learning: A comprehensive survey. Future Gener. Comput. Syst. 150: 272-293 (2024) - [j14]Sakib Anwar Rieyan
, Md. Raisul Kabir News, A. B. M. Muntasir Rahman, Sadia Afrin Khan, Sultan Tasneem Jawad Zaarif, Md. Golam Rabiul Alam, Mohammad Mehedi Hassan, Michele Ianni, Giancarlo Fortino:
An advanced data fabric architecture leveraging homomorphic encryption and federated learning. Inf. Fusion 102: 102004 (2024) - [j13]Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia:
Editorial: Special issue on software protection and attacks. J. Inf. Secur. Appl. 86: 103889 (2024) - [j12]Mila Dalla Preda, Michele Ianni
:
Exploiting number theory for dynamic software watermarking. J. Comput. Virol. Hacking Tech. 20(1): 41-51 (2024) - [c29]Sebastian Schrittwieser
, Michele Ianni
:
CheckMATE '24 - Research on Offensive and Defensive Techniques in the context of Man At The End (MATE) Attacks. CCS 2024: 4901-4902 - [c28]Claudia Greco, Michele Ianni, Giuseppe Seminara, Antonella Guzzo, Giancarlo Fortino:
A Forensic Framework for Screen Capture Validation in Legal Contexts. CSR 2024: 127-132 - [e2]Sebastian Schrittwieser, Michele Ianni:
Proceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-1230-2 [contents] - [e1]Sokratis K. Katsikas
, Habtamu Abie
, Silvio Ranise
, Luca Verderame
, Enrico Cambiaso
, Rita Maria Ugarelli
, Isabel Praça
, Wenjuan Li
, Weizhi Meng
, Steven Furnell
, Basel Katt
, Sandeep Pirbhulal
, Ankur Shukla
, Michele Ianni
, Mila Dalla Preda
, Kim-Kwang Raymond Choo
, Miguel Pupo Correia, Abhishta Abhishta
, Giovanni Sileno, Mina Alishahi, Harsha K. Kalutarage
, Naoto Yanai
:
Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14399, Springer 2024, ISBN 978-3-031-54128-5 [contents] - [i2]Sakib Anwar Rieyan, Md. Raisul Kabir News, A. B. M. Muntasir Rahman, Sadia Afrin Khan, Sultan Tasneem Jawad Zaarif, Md. Golam Rabiul Alam, Mohammad Mehedi Hassan, Michele Ianni, Giancarlo Fortino:
An advanced data fabric architecture leveraging homomorphic encryption and federated learning. CoRR abs/2402.09795 (2024) - [i1]Sebastian Schrittwieser, Michele Ianni:
Software Security - Introduction to the Special Theme. ERCIM News 139(138) (2024) - 2023
- [j11]Michele Ianni, Elio Masciari:
SCOUT: Security by computing OUTliers on activity logs. Comput. Secur. 132: 103355 (2023) - [j10]Antonino Rullo, Michele Ianni, Edoardo Serra:
Editorial: Security and privacy for the Internet of Things. Frontiers Comput. Sci. 5 (2023) - [j9]Diletta Chiaro
, Edoardo Prezioso, Michele Ianni, Fabio Giampaolo:
FL-Enhance: A federated learning framework for balancing non-IID data with augmented and shared compressed samples. Inf. Fusion 98: 101836 (2023) - [j8]Jiahui Chen, Hang Xiao, Yushan Zheng, Mohammad Mehedi Hassan
, Michele Ianni, Antonella Guzzo, Giancarlo Fortino:
DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things. Internet Things 23: 100871 (2023) - [j7]Rabeya Khatun Muna, Muhammad Iqbal Hossain
, Md. Golam Rabiul Alam
, Mohammad Mehedi Hassan
, Michele Ianni
, Giancarlo Fortino:
Demystifying machine learning models of massive IoT attack detection with Explainable AI for sustainable and secure future smart cities. Internet Things 24: 100919 (2023) - [j6]Giancarlo Fortino, Claudia Greco
, Antonella Guzzo, Michele Ianni
:
Identification and prediction of attacks to industrial control systems using temporal point processes. J. Ambient Intell. Humaniz. Comput. 14(5): 4771-4783 (2023) - [c27]Claudia Greco, Michele Ianni, Antonella Guzzo, Giancarlo Fortino:
Explaining Binary Obfuscation. CSR 2023: 22-27 - [c26]Usman Tahir, Fiza Siyal, Michele Ianni, Antonella Guzzo, Giancarlo Fortino:
Exploiting Bytecode Analysis for Reentrancy Vulnerability Detection in Ethereum Smart Contracts. DASC/PiCom/CBDCom/CyberSciTech 2023: 779-783 - [c25]Giuseppe Beltrano, Claudia Greco, Michele Ianni, Giancarlo Fortino:
Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications. DASC/PiCom/CBDCom/CyberSciTech 2023: 916-920 - [c24]Giancarlo Fortino, Claudia Greco
, Antonella Guzzo, Michele Ianni
:
SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language. ESORICS Workshops (2) 2023: 256-266 - 2022
- [c23]Giancarlo Fortino, Claudia Greco
, Antonella Guzzo, Michele Ianni:
Neural Network based Temporal Point Processes for Attack Detection in Industrial Control Systems. CSR 2022: 221-226 - [c22]Giancarlo Fortino, Claudia Greco, Antonella Guzzo, Michele Ianni:
Enabling Faster Security Assessment of Re-hosted Firmware. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-6 - [c21]Michele Ianni, Elio Masciari:
Some Experiments on High Performance Anomaly Detection. PDP 2022: 226-229 - 2021
- [j5]Giancarlo Fortino, Antonella Guzzo
, Michele Ianni
, Francesco Leotta
, Massimo Mecella
:
Predicting activities of daily living via temporal point processes: Approaches and experimental results. Comput. Electr. Eng. 96(Part): 107567 (2021) - [j4]Michele Ianni, Elio Masciari, Giancarlo Sperlí:
A survey of Big Data dimensions vs Social Networks analysis. J. Intell. Inf. Syst. 57(1): 73-100 (2021) - [c20]Davide Quarta, Michele Ianni, Aravind Machiry, Yanick Fratantonio, Eric Gustafson, Davide Balzarotti, Martina Lindorfer, Giovanni Vigna, Christopher Kruegel:
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone. Checkmate@CCS 2021: 43-57 - [c19]Michele Ianni, Elio Masciari:
A compact encoding of security logs for high performance activity detection. PDP 2021: 240-244 - [c18]Michele Ianni, Elio Masciari:
Some experiments on activity outlier detection (Discussion Paper). SEBD 2021: 251-258 - [c17]Giancarlo Fortino, Antonella Guzzo, Michele Ianni, Francesco Leotta, Massimo Mecella:
Activity Daily Living prediction with Marked Temporal Point Processes (Discussion Paper). SEBD 2021: 387-394 - 2020
- [j3]Michele Ianni, Elio Masciari
, Giuseppe M. Mazzeo, Mario Mezzanzanica
, Carlo Zaniolo:
Fast and effective Big Data exploration by clustering. Future Gener. Comput. Syst. 102: 84-94 (2020) - [j2]Antonella Guzzo, Michele Ianni, Andrea Pugliese, Domenico Saccà:
Modeling and efficiently detecting security-critical sequences of actions. Future Gener. Comput. Syst. 113: 196-206 (2020) - [c16]Giancarlo Fortino, Antonella Guzzo, Michele Ianni, Francesco Leotta
, Massimo Mecella:
Exploiting Marked Temporal Point Processes for Predicting Activities of Daily Living. ICHMS 2020: 1-6 - [c15]Sergio Greco, Michele Ianni, Elio Masciari, Domenico Saccà, Irina Trubitsyna:
Smart Data Exchange. SEBD 2020: 24-31
2010 – 2019
- 2019
- [c14]Michele Ianni, Elio Masciari, Domenico Saccà:
An Overview of the Endless Battle between Virus Writers and Detectors: How Compilers Can Be Used as an Evasion Technique. DATA 2019: 203-208 - [c13]Michele Ianni, Elio Masciari
, Giuseppe M. Mazzeo, Carlo Zaniolo:
How to implement a big data clustering algorithm: a brief report on lesson learned. SAC 2019: 1073-1080 - [c12]Michele Ianni, Elio Masciari, Domenico Saccà:
Exotic Compilers as a Malware Evasion Technique. SEBD 2019 - [p1]Nunziato Cassavia, Sergio Flesca, Michele Ianni, Elio Masciari, Giuseppe Papuzzo, Chiara Pulice:
High Performance Computing by the Crowd. Intelligent Methods and Big Data in Industrial Applications 2019: 91-101 - 2018
- [j1]Nunziato Cassavia
, Sergio Flesca, Michele Ianni
, Elio Masciari
, Chiara Pulice:
Distributed computing by leveraging and rewarding idling user resources from P2P networks. J. Parallel Distributed Comput. 122: 81-94 (2018) - [c11]Michele Ianni, Elio Masciari, Giuseppe M. Mazzeo, Carlo Zaniolo:
Clustering Big Data. DATA 2018: 276-282 - [c10]Michele Ianni, Elio Masciari
, Giuseppe M. Mazzeo, Carlo Zaniolo:
Efficient Big Data Clustering. IDEAS 2018: 103-109 - [c9]Michele Ianni, Elio Masciari
:
Trusted Environments for Volunteer Computing. IRI 2018: 526-529 - [c8]Michele Ianni, Elio Masciari
, Giuseppe Massimiliano Mazzeo, Carlo Zaniolo:
Clustering Goes Big: CLUBS-P, an Algorithm for Unsupervised Clustering Around Centroids Tailored For Big Data Applications. PDP 2018: 558-561 - 2017
- [c7]Nunziato Cassavia, Sergio Flesca, Michele Ianni, Elio Masciari
, Giuseppe Papuzzo
, Chiara Pulice:
Effective High Performance Computing using Peer To Peer Networks. HPCS 2017: 32-36 - [c6]Nunziato Cassavia, Sergio Flesca, Michele Ianni, Elio Masciari
, Giuseppe Papuzzo
, Chiara Pulice:
A Peer to Peer Approach to Efficient High Performance Computing. PDP 2017: 539-542 - [c5]Michele Ianni, Elio Masciari:
Trusted Volunteer Computing. SEBD 2017: 73 - [c4]Nunziato Cassavia, Sergio Flesca, Michele Ianni, Elio Masciari, Giuseppe Papuzzo, Chiara Pulice:
Efficient High Performance Computing by user networks. SEBD 2017: 309 - 2015
- [c3]Michelangelo Ceci
, Roberto Corizzo
, Fabio Fumarola, Michele Ianni, Donato Malerba, Gaspare Maria, Elio Masciari
, Marco Oliverio, Aleksandra Rashkovska
:
Big Data Techniques For Supporting Accurate Predictions of Energy Production From Renewable Sources. IDEAS 2015: 62-71 - [c2]Michelangelo Ceci, Roberto Corizzo, Fabio Fumarola, Michele Ianni, Donato Malerba, Gaspare Maria, Elio Masciari, Marco Oliverio, Aleksandra Rashkovska:
VIPOC Project Research Summary (Discussion Paper). SEBD 2015: 208-215 - [c1]Michele Ianni, Elio Masciari, Giuseppe Massimiliano Mazzeo, Marco Oliverio, Carlo Zaniolo:
Hierarchical Big Data Clustering (Discussion Paper). SEBD 2015: 224-231
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint