Edoardo Serra
Orcid: 0000-0003-0689-5063Affiliations:
- Boise State University, ID, USA
According to our database1,
Edoardo Serra
authored at least 95 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Joint Credibility Estimation of News, User, and Publisher via Role-relational Graph Convolutional Networks.
ACM Trans. Web, February, 2024
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
Evaluating the Robustness of Fake News Detectors to Adversarial Attacks with Real User Comments (Extended Abstract).
Proceedings of the 11th IEEE International Conference on Data Science and Advanced Analytics, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Temporal SIR-GN: Efficient and Effective Structural Representation Learning for Temporal Graphs.
Proc. VLDB Endow., 2023
Frontiers Comput. Sci., 2023
Data Min. Knowl. Discov., 2023
Proceedings of the 31st Symposium of Advanced Database Systems, 2023
Proceedings of the 31st Symposium of Advanced Database Systems, 2023
A Graph-Representation-Learning Framework for Supporting Android Malware Identification and Polymorphic Evolution.
Proceedings of the 10th IEEE Swiss Conference on Data Science, 2023
Proceedings of the Computational Science and Its Applications - ICCSA 2023, 2023
Prediction of Future Nation-initiated Cyberattacks from News-based Political Event Graph.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023
An AI Framework for Modelling and Evaluating Attribution Methods in Enhanced Machine Learning Interpretability.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
2022
WIREs Data Mining Knowl. Discov., 2022
Proceedings of the 30th Italian Symposium on Advanced Database Systems, 2022
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022
Anomaly Detection in Cybersecurity Events Through Graph Neural Network and Transformer Based Model: A Case Study with BETH Dataset.
Proceedings of the IEEE International Conference on Big Data, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Predicting RNA Mutation Effects through Machine Learning of High-Throughput Ribozyme Experiments (Student Abstract).
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
Identifying ATT&CK Tactics in Android Malware Control Flow Graph through Graph Representation Learning and Interpretability (Student Abstract).
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
Deep Learning Based Side Channel Attacks on Lightweight Cryptography (Student Abstract).
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
SIR-GN: A Fast Structural Iterative Representation Learning Approach For Graph Nodes.
ACM Trans. Knowl. Discov. Data, 2021
A multi-perspective approach for the analysis of complex business processes behavior.
Expert Syst. Appl., 2021
The geometrical shapes of violence: predicting and explaining terrorist operations through graph embeddings.
J. Complex Networks, 2021
Proceedings of the 29th Italian Symposium on Advanced Database Systems, 2021
Multi-Sorted Inverse Frequent Itemsets Mining for Generating Realistic No-SQL Datasets (Discussion Paper).
Proceedings of the 29th Italian Symposium on Advanced Database Systems, 2021
cuTS: scaling subgraph isomorphism on distributed multi-GPU systems using trie based data structure.
Proceedings of the International Conference for High Performance Computing, 2021
V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities.
Proceedings of the 8th IEEE International Conference on Data Science and Advanced Analytics, 2021
A Few Shot Transfer Learning Approach Identifying Private Images With Fast User Personalization.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Android Malware Identification and Polymorphic Evolution Via Graph Representation Learning.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Identifying ATT&CK Tactics in Android Malware Control Flow Graph Through Graph Representation Learning and Interpretability.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Identifying Malicious Users in the Offshore Leaks Networks via Structural Node Representation Learning.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
IEEE Trans. Comput. Soc. Syst., 2020
Multi-modal social and psycho-linguistic embedding via recurrent neural networks to identify depressed users in online forums.
Netw. Model. Anal. Health Informatics Bioinform., 2020
Data Knowl. Eng., 2020
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2020, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
An Innovative Framework for Supporting Remote Sensing in Image Processing Systems via Deep Transfer Learning.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020
2019
Soc. Netw. Anal. Min., 2019
Extending inverse frequent itemsets mining to generate realistic datasets: complexity, accuracy and emerging applications.
Data Min. Knowl. Discov., 2019
Proceedings of the 2019 4th International Conference on Computing, 2019
Framework for Detecting Control Command Injection Attacks on Industrial Control Systems (ICS).
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Number of Minimal Hypergraph Transversals and Complexity of IFM with Infrequency: High in Theory, but Often Not so Much in Practice!
Proceedings of the AI*IA 2019 - Advances in Artificial Intelligence, 2019
Proceedings of the Internet of Things for Smart Urban Ecosystems., 2019
2018
ACM Trans. Internet Techn., 2018
J. Comput. Secur., 2018
Proceedings of the 26th Italian Symposium on Advanced Database Systems, 2018
Estimation of Remote Sensing Imagery Atmospheric Conditions Using Deep Learning and Image Classification.
Proceedings of the Intelligent Systems and Applications, 2018
The Inverse Tree-OLAP Problem: Definitions, Models, Complexity Analysis, and a Possible Solution.
Proceedings of the 22nd International Database Engineering & Applications Symposium, 2018
A Crowdsourcing Semi-Supervised LSTM Training Approach to Identify Novel Items in Emerging Artificial Intelligent Environments.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018
Proceedings of the Big Data - BigData 2018, 2018
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
2017
ACM Trans. Priv. Secur., 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
Using temporal probabilistic logic for optimal monitoring of security events with limited resources.
J. Comput. Secur., 2016
Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, 2016
Proceedings of the Scalable Uncertainty Management - 10th International Conference, 2016
Proceedings of the Scalable Uncertainty Management - 10th International Conference, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016
Proceedings of the 10th Alberto Mendelzon International Workshop on Foundations of Data Management, 2016
2015
IEEE Trans. Knowl. Data Eng., 2015
ACM Trans. Inf. Syst. Secur., 2015
IEEE Trans. Comput. Soc. Syst., 2015
2014
A Survey of Quantitative Models of Terror Group Behavior and an Analysis of Strategic Disclosure of Behavioral Models.
IEEE Trans. Comput. Soc. Syst., 2014
2013
A declarative extension of horn clauses, and its significance for datalog and its applications.
Theory Pract. Log. Program., 2013
Solving inverse frequent itemset mining with infrequency constraints via large-scale linear programs.
ACM Trans. Knowl. Discov. Data, 2013
Proceedings of the 7th Alberto Mendelzon International Workshop on Foundations of Data Management, 2013
A Monotonic Extension for Horn-Clauses and its Significance in Datalog's Renaissance.
Proceedings of the 7th Alberto Mendelzon International Workshop on Foundations of Data Management, 2013
2012
Proceedings of the Twentieth Italian Symposium on Advanced Database Systems, 2012
Proceedings of the Twentieth Italian Symposium on Advanced Database Systems, 2012
Count Constraints and the Inverse OLAP Problem: Definition, Complexity and a Step toward Aggregate Data Exchange.
Proceedings of the Foundations of Information and Knowledge Systems, 2012
Proceedings of the Datalog in Academia and Industry - Second International Workshop, 2012
2011
A Decomposition Technique for the Inverse Frequent Itemset Mining Problem.
Proceedings of the Sistemi Evoluti per Basi di Dati, 2011
2009
Proceedings of the ICDM 2009, 2009