Gabriele Gianini

Orcid: 0000-0001-5186-0199

According to our database1, Gabriele Gianini authored at least 82 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Certifying Accuracy, Privacy, and Robustness of ML-Based Malware Detection.
SN Comput. Sci., August, 2024

A Decade of Churn Prediction Techniques in the TelCo Domain: A Survey.
SN Comput. Sci., April, 2024

2023
Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey.
Sensors, July, 2023

Heterogeneous Transfer Learning from a Partial Information Decomposition Perspective.
Proceedings of the Management of Digital EcoSystems - 15th International Conference, 2023

Detecting Cyberattacks to Federated Learning on Software-Defined Networks.
Proceedings of the Management of Digital EcoSystems - 15th International Conference, 2023

Lightweight Behavior-Based Malware Detection.
Proceedings of the Management of Digital EcoSystems - 15th International Conference, 2023

2022
An Efficient In-Memory Computing Architecture for Image Enhancement in AI Applications.
IEEE Access, 2022

Retinex by Autoencoders.
Proceedings of the 16th International Conference on Signal-Image Technology & Internet-Based Systems, 2022

A Multiple-Path Routing Model for Quality of Service in Software Defined Networking.
Proceedings of the 14th International Conference on Management of Digital EcoSystems, 2022

Inter-rater Agreement Based Risk Assessment Scheme for ICT Corporates.
Proceedings of the Intelligent Decision Technologies, 2022

Set-Based Counterfactuals in Partial Classification.
Proceedings of the Information Processing and Management of Uncertainty in Knowledge-Based Systems, 2022

2021
Robust Computationally-Efficient Wireless Emitter Classification Using Autoencoders and Convolutional Neural Networks.
Sensors, 2021

Multi-disease big data analysis using beetle swarm optimization and an adaptive neuro-fuzzy inference system.
Neural Comput. Appl., 2021

Guest Editorial: QoS and security in software for wireless and mobile micro-services.
Computing, 2021

Smart connected parking lots based on secured multimedia IoT devices.
Computing, 2021

2020
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem.
J. Inf. Secur. Appl., 2020

Managing a pool of rules for credit card fraud detection by a Game Theory based approach.
Future Gener. Comput. Syst., 2020

RRAM Crossbar-Based In-Memory Computation of Anisotropic Filters for Image Preprocessingloa.
IEEE Access, 2020

Hybrid Inspector-Inspectee-Agent Games in Mobile Cloud Computing.
Proceedings of the Q2SWinet '20: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2020

What can Machine Learning do for Radio Spectrum Management?
Proceedings of the Q2SWinet '20: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2020

Selection of Information Streams in Social Sensing: an Interdependence- and Cost-aware Ranking Method.
Proceedings of the MEDES '20: 12th International Conference on Management of Digital EcoSystems, 2020

2019
RACOON++: A Semi-Automatic Framework for the Selfishness-Aware Design of Cooperative Systems.
IEEE Trans. Dependable Secur. Comput., 2019

Long-term memory-induced synchronisation can impair collective performance in congested systems.
Swarm Intell., 2019

Glare removal as an ill-conditioned problem.
J. Electronic Imaging, 2019

An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning.
IEEE Access, 2019

A Deep Learning Approach to Radio Signal Denoising.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference Workshop, 2019

Improving Probabilistic Flooding Using Topological Indexes.
Proceedings of the 15th International Conference on Signal-Image Technology & Internet-Based Systems, 2019

A Watermark Inspection Game for IoT Settings.
Proceedings of the 2019 IEEE World Congress on Services, 2019

Using AutoEncoders for Radio Signal Denoising.
Proceedings of the 15th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2019

Gradient attenuation as an emergent property of reset-based Retinex models.
Proceedings of the 11th International Conference on Management of Digital EcoSystems, 2019

Signal reconstruction by means of Embedding, Clustering and AutoEncoder Ensembles.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Machine Learning-Based Framework for Log-Lifting in Business Process Mining Applications.
Proceedings of the Business Process Management - 17th International Conference, 2019

2018
Visual glare limits of HDR displays in medical imaging.
IET Comput. Vis., 2018

K-Means Clustering in Dual Space for Unsupervised Feature Partitioning in Multi-view Learning.
Proceedings of the 14th International Conference on Signal-Image Technology & Internet-Based Systems, 2018

Local Topology Aware Probabilistic Routing.
Proceedings of the 14th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2018

Analysing Neural Network Topologies: a Game Theoretic Approach.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018

All-Implicants Neural Networks for Efficient Boolean Function Representation.
Proceedings of the 2018 IEEE International Conference on Cognitive Computing, 2018

Toward IoT-Friendly Learning Models.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

2017
An evolutionary cluster-game approach for Wireless Sensor Networks in non-collaborative settings.
Pervasive Mob. Comput., 2017

A fuzzy set approach to Retinex spray sampling.
Multim. Tools Appl., 2017

Special Section Guest Editorial: Retinex at 50.
J. Electronic Imaging, 2017

From samples to populations in retinex models.
J. Electronic Imaging, 2017

An App-based Assessment of SiChaRDa, an Image Enhancer for Color-Blind People.
Proceedings of the 25th Color and Imaging Conference, 2017

Analysing Selfishness Flooding with SEINE.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Possibilistic Assessment of Process-Related Disclosure Risks on the Cloud.
Proceedings of the Computational Intelligence and Quantitative Software Engineering, 2016

A Retinex model based on Absorbing Markov Chains.
Inf. Sci., 2016

Selecting Feature-Words in Tag Sense Disambiguation Based on Their Shapley Value.
Proceedings of the 12th International Conference on Signal-Image Technology & Internet-Based Systems, 2016

Statistical Aspects of Space Sampling in Retinex models.
Proceedings of the Retinex at 50, San Francisco, CA, USA, February 14-18, 2016, 2016

2015
Toward Economic-Aware Risk Assessment on the Cloud.
IEEE Secur. Priv., 2015

A delay and cost balancing protocol for message routing in mobile delay tolerant networks.
Ad Hoc Networks, 2015

A Framework for the Design Configuration of Accountable Selfish-Resilient Peer-to-Peer Systems.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

Unsupervised cue-words discovery for tag-sense disambiguation: comparing dissimilarity metrics.
Proceedings of the 7th International Conference on Management of computational and collective intElligence in Digital EcoSystems, Caraguatatuba, Brazil, October 25, 2015

Improving gossiping performance by means of local topology information.
Proceedings of the 7th International Conference on Management of computational and collective intElligence in Digital EcoSystems, Caraguatatuba, Brazil, October 25, 2015

Toward behavioral business process analysis.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

The effect of node selfishness on the performance of WSN cluster-based routing algorithms.
Proceedings of the AFRICON 2015, Addis Ababa, Ethiopia, September 14-17, 2015, 2015

2014
A risk model for cloud processes.
ISC Int. J. Inf. Secur., 2014

Tag relatedness in image folksonomies.
Document Numérique, 2014

Tag Relatedness Using Laplacian Score Feature Selection and Adapted Jensen-Shannon Divergence.
Proceedings of the MultiMedia Modeling - 20th Anniversary International Conference, 2014

2013
Tag Similarity in Folksonomies.
Proceedings of the Actes du XXXIème Congrès INFORSID, Paris, France, 29-31 Mai 2013., 2013

Many-player inspection games in networked environments.
Proceedings of the 7th IEEE International Conference on Digital Ecosystems and Technologies, 2013

The cover time of neighbor-avoiding gossiping on geometric random networks.
Proceedings of the 7th IEEE International Conference on Digital Ecosystems and Technologies, 2013

2012
SOAP Processing Performance and Enhancement.
IEEE Trans. Serv. Comput., 2012

Geo-based automatic image annotation.
Proceedings of the International Conference on Multimedia Retrieval, 2012

Risk assessment of credit securities: The notion and the issues.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

2010
A Distributed and Privacy-Preserving Method for Network Intrusion Detection.
Proceedings of the On the Move to Meaningful Internet Systems, 2010

Using incentive schemes to alleviate supply chain risks.
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010

Representing Immaterial Value in Business Model.
Proceedings of the Workshops Proceedings of the 14th IEEE International Enterprise Distributed Object Computing Conference, 2010

2009
Landscape-aware location-privacy protection in location-based services.
J. Syst. Archit., 2009

Privacy Preserving Risk Assessment of Credit Securities.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009

Supply Chain Risk Analysis: Open Source Simulator.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009

2008
Assessing Separation of Duty Policies through the Interpretation of Sampled Video Sequences: A Pair Programming Case Study.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008

Global consensus emergence in an unstructured semantic network.
Proceedings of the CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, 2008

Cloaking games in location based services.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

Consensus Emergence from Naming Games in Representative AgentSemantic Overlay Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008

2007
Poisson-noise removal in self-similarity studies based on packet-counting: factorial-moment/strip-integral approach.
SIGMETRICS Perform. Evaluation Rev., 2007

A Non-invasive Method for the Conformance Assessment of Pair Programming Practices Based on Hierarchical Hidden Markov Models.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2007

Navigation Dynamics as a Biometrics for Authentication.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

2006
Discovering the software process by means of stochastic workflow analysis.
J. Syst. Archit., 2006

Open Source in Web-Based Applications: A Case Study on Single Sign-On.
Int. J. Inf. Technol. Web Eng., 2006

Special issue: Web service security.
Comput. Syst. Sci. Eng., 2006

2004
An Ontology-Driven Approach to Metadata Design in the Mining of Software Process Events.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004


  Loading...