no code implementations • 21 Aug 2023 • Abdulah Jarouf, Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro
PLMs operating on the grid's physical layer are capable of transmitting such signals to infer information about the grid.
no code implementations • 21 Jun 2023 • Mouna Rabhi, Roberto Di Pietro
Other than detailing and providing a thorough characterization of our defense mechanism, we also provide a proof of concept of using four optimization-based adversarial attacks (PGD, FGSM, IGSM, and C\&W) and a generative adversarial attack testing them on the MNIST dataset.
no code implementations • 30 Mar 2023 • Stefano Cresci, Kai-Cheng Yang, Angelo Spognardi, Roberto Di Pietro, Filippo Menczer, Marinella Petrocchi
Research on social bots aims at advancing knowledge and providing solutions to one of the most debated forms of online manipulation.
no code implementations • 10 Mar 2021 • Pietro Tedeschi, Kang Eun Jeon, James She, Simon Wong, Spiridon Bakiras, Roberto Di Pietro
Contact tracing is the techno-choice of reference to address the COVID-19 pandemic.
Cryptography and Security Computers and Society Networking and Internet Architecture
1 code implementation • 12 Oct 2020 • Gabriele Oligeri, Simone Raponi, Savio Sciancalepore, Roberto Di Pietro
Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms.
no code implementations • 15 Jul 2020 • Giovanni Da San Martino, Stefano Cresci, Alberto Barron-Cedeno, Seunghak Yu, Roberto Di Pietro, Preslav Nakov
Propaganda campaigns aim at influencing people's mindset with the purpose of advancing a specific agenda.
1 code implementation • 4 May 2020 • Omar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro
In this paper, we investigate the possibility to remotely detect the weight of the payload carried by a commercial drone by analyzing its acoustic fingerprint.
no code implementations • 14 Feb 2020 • Omar Adel Ibrahim, Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro
Overall, MAGNETO proves that unintentional magnetic emissions can be considered as a viable and reliable means to fingerprint read-only USB flash drives.
no code implementations • 21 Oct 2019 • Maurantonio Caprolu, Simone Raponi, Gabriele Oligeri, Roberto Di Pietro
A new cybersecurity attack (cryptojacking) is emerging, in both the literature and in the wild, where an adversary illicitly runs Crypto-clients software over the devices of unaware users.
Cryptography and Security Networking and Internet Architecture
no code implementations • 13 Mar 2017 • Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi
We build upon digital DNA and the similarity between groups of users to characterize both genuine accounts and spambots.
no code implementations • 30 Jan 2016 • Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi
We propose a strikingly novel, simple, and effective approach to model online user behavior: we extract and analyze digital DNA sequences from user online actions and we use Twitter as a benchmark to test our proposal.
no code implementations • 14 Sep 2015 • Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi
$\textit{Fake followers}$ are those Twitter accounts specifically created to inflate the number of followers of a target account.
1 code implementation • 3 Apr 2010 • Alessandro Colantonio, Roberto Di Pietro
Bit arrays, or bitmaps, are used to significantly speed up set operations in several areas, such as data warehousing, information retrieval, and data mining, to cite a few.
Data Structures and Algorithms