Marco Anisetti

Orcid: 0000-0002-5438-9467

According to our database1, Marco Anisetti authored at least 125 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Certifying Accuracy, Privacy, and Robustness of ML-Based Malware Detection.
SN Comput. Sci., August, 2024

A structure and texture revealing retinex model for low-light image enhancement.
Multim. Tools Appl., January, 2024

A Transparent Certification Scheme Based on Blockchain for Service-Based Systems.
Proceedings of the IEEE International Conference on Web Services, 2024

A Methodology for Web Cache Deception Vulnerability Discovery.
Proceedings of the 14th International Conference on Cloud Computing and Services Science, 2024

MUSA: A Platform for Data-Intensive Services in Edge-Cloud Continuum.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
FPANet: feature pyramid attention network for crowd counting.
Appl. Intell., August, 2023

On the Robustness of Random Forest Against Untargeted Data Poisoning: An Ensemble-Based Approach.
IEEE Trans. Sustain. Comput., 2023

Multi-Dimensional Certification of Modern Distributed Systems.
IEEE Trans. Serv. Comput., 2023

A Multilayer Deep Learning Approach for Malware Classification in 5G-Enabled IIoT.
IEEE Trans. Ind. Informatics, 2023

Real-time risk and behavioral monitoring in IoT applications using soft computing techniques.
J. Ambient Intell. Humaniz. Comput., 2023

Rethinking Certification for Trustworthy Machine-Learning-Based Applications.
IEEE Internet Comput., 2023

An assurance process for Big Data trustworthiness.
Future Gener. Comput. Syst., 2023

Managing ML-Based Application Non-Functional Behavior: A Multi-Model Approach.
CoRR, 2023

Towards Certification of Machine Learning-Based Distributed Systems.
CoRR, 2023

Advanced IoT Edge Architecture for Smart City.
Proceedings of the 17th International Conference on Signal-Image Technology & Internet-Based Systems, 2023

Lightweight Behavior-Based Malware Detection.
Proceedings of the Management of Digital EcoSystems - 15th International Conference, 2023

Continuous Certification of Non-functional Properties Across System Changes.
Proceedings of the Service-Oriented Computing - 21st International Conference, 2023

QoS-Aware Deployment of Service Compositions in 5G-Empowered Edge-Cloud Continuum.
Proceedings of the 16th IEEE International Conference on Cloud Computing, 2023

2022
Object Counting in Remote Sensing via Triple Attention and Scale-Aware Network.
Remote. Sens., December, 2022

An IoT-based human detection system for complex industrial environment with deep learning architectures and transfer learning.
Int. J. Intell. Syst., December, 2022

A Security Certification Scheme for Information-Centric Networks.
IEEE Trans. Netw. Serv. Manag., 2022

A Modelling Framework for Evidence-Based Public Health Policy Making.
IEEE J. Biomed. Health Informatics, 2022

A fairness-aware distributed dual-hop heterogeneous half and full-duplex link scheduling for 6G network.
Trans. Emerg. Telecommun. Technol., 2022

On the Robustness of Ensemble-Based Machine Learning Against Data Poisoning.
CoRR, 2022

An Artificial Intelligence Outlook for Colorectal Cancer Screening.
CoRR, 2022

Orchestration of data-intensive pipeline in 5G-enabled Edge Continuum.
Proceedings of the IEEE World Congress on Services, 2022

Inter-rater Agreement Based Risk Assessment Scheme for ICT Corporates.
Proceedings of the Intelligent Decision Technologies, 2022

A DevSecOps-based Assurance Process for Big Data Analytics.
Proceedings of the IEEE International Conference on Web Services, 2022

Cancer Screening.
Proceedings of the Eighth IEEE International Conference on Big Data Computing Service and Applications, 2022

2021
Image super-resolution via enhanced multi-scale residual network.
J. Parallel Distributed Comput., 2021

Image enhancement in embedded devices for internet of things.
Concurr. Comput. Pract. Exp., 2021

A trust assurance technique for Internet of things based on human behavior compliance.
Concurr. Comput. Pract. Exp., 2021

Gradient-based multi-focus image fusion method using convolution neural network.
Comput. Electr. Eng., 2021

Dynamic and Scalable Enforcement of Access Control Policies for Big Data.
Proceedings of the MEDES '21: Proceedings of the 13th International Conference on Management of Digital EcoSystems, Virtual Event, Tunisia, November 1, 2021

An Assurance-Based Risk Management Framework for Distributed Systems.
Proceedings of the 2021 IEEE International Conference on Web Services, 2021

Towards an Assurance Framework for Edge and IoT Systems.
Proceedings of the IEEE International Conference on Edge Computing, 2021

Security Certification Scheme for Content-centric Networks.
Proceedings of the IEEE International Conference on Services Computing, 2021

2020
A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification.
IEEE Trans. Serv. Comput., 2020

Artificial intelligence in deep learning algorithms for multimedia analysis.
Multim. Tools Appl., 2020

I3D: a new dataset for testing denoising and demosaicing algorithms.
Multim. Tools Appl., 2020

Cost-effective deployment of certified cloud composite services.
J. Parallel Distributed Comput., 2020

Special issue on dense surveillance systems for urban traffic.
J. Intell. Transp. Syst., 2020

A trusted medical image super-resolution method based on feedback adaptive weighted dense network.
Artif. Intell. Medicine, 2020

Requirements and Challenges for Secure and Trustworthy UAS Collaboration.
Proceedings of the Second IEEE International Conference on Trust, 2020

A Methodology for Non-Functional Property Evaluation of Machine Learning Models.
Proceedings of the MEDES '20: 12th International Conference on Management of Digital EcoSystems, 2020

An Assurance Framework and Process for Hybrid Systems.
Proceedings of the E-Business and Telecommunications, 2020

Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

A Blockchain-based Trustworthy Certification Process for Composite Services.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020

2019
Test-Based Security Certification of Composite Services.
ACM Trans. Web, 2019

Reconstruction of missing color-channel data using a three-step back propagation neural network.
Int. J. Mach. Learn. Cybern., 2019

Special issue on real-time image and video processing in mobile embedded systems.
J. Real Time Image Process., 2019

Glare removal as an ill-conditioned problem.
J. Electronic Imaging, 2019

Reliability and capability based computation offloading strategy for vehicular ad hoc clouds.
J. Cloud Comput., 2019

A polling access control with exhaustive service in wireless body area networks for mobile healthcare using the sleeping schema.
J. Ambient Intell. Humaniz. Comput., 2019

Improving Hearing Healthcare with Big Data Analytics of Real-Time Hearing Aid Data.
Proceedings of the 2019 IEEE World Congress on Services, 2019

A Continuous Certification Methodology for DevOps.
Proceedings of the 11th International Conference on Management of Digital EcoSystems, 2019

RTRD: Real-Time Route Discovery for Urban Scenarios Using Internet of Things.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Real-time image processing systems using fuzzy and rough sets techniques.
Soft Comput., 2018

Modeling time, probability, and configuration constraints for continuous cloud service certification.
Comput. Secur., 2018

Moon Cloud: A Cloud Platform for ICT Security Governance.
Proceedings of the IEEE Global Communications Conference, 2018

A Knowledge-Based IoT Security Checker.
Proceedings of the Euro-Par 2018: Parallel Processing Workshops, 2018

2017
Hadoop-Based Intelligent Care System (HICS): Analytical Approach for Big Data in IoT.
ACM Trans. Internet Techn., 2017

An interval type-2 fuzzy active contour model for auroral oval segmentation.
Soft Comput., 2017

Computational intelligence for multimedia and industrial applications.
Multim. Tools Appl., 2017

Lossless compression for aurora spectral images using fast online bi-dimensional decorrelation method.
Inf. Sci., 2017

Towards Transparent and Trustworthy Cloud.
IEEE Cloud Comput., 2017

Effects of avatar character performances in virtual reality dramas used for teachers' education.
Behav. Inf. Technol., 2017

Big data platform for public health policies.
Proceedings of the 2017 IEEE SmartWorld, 2017

A Security Benchmark for OpenStack.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Bayer Demosaicking With Polynomial Interpolation.
IEEE Trans. Image Process., 2016

Real-time signal processing in embedded systems.
J. Syst. Archit., 2016

Image Enlargement Using Multiple Sensors.
J. Sensors, 2016

Embedded Systems for Mobile Sensors.
J. Sensors, 2016

Locally estimated heterogeneity property and its fuzzy filter application for deinterlacing.
Inf. Sci., 2016

A certification framework for cloud-based services.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

A Cost-Effective Certification-Based Service Composition for the Cloud.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
A Test-Based Incremental Security Certification Scheme for Cloud-Based Systems.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

Toward Security and Performance Certification of Open Stack.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Trustworthy Cloud Certification: A Model-Based Approach.
Proceedings of the Data-Driven Process Discovery and Analysis, 2014

A Certification-Based Trust Model for Autonomic Cloud Computing Systems.
Proceedings of the 2014 International Conference on Cloud and Autonomic Computing, 2014

E-Auctions for Multi-Cloud Service Provisioning.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

A Certification-Aware Service-Oriented Architecture.
Proceedings of the Advanced Web Services, 2014

2013
A test-based security certification scheme for web services.
ACM Trans. Web, 2013

A Rank-Ordered Marginal Filter for Deinterlacing.
Sensors, 2013

An efficient language pipeline for flexible rule-based context representation.
J. Ambient Intell. Humaniz. Comput., 2013

Machine-Readable Privacy Certificates for Services.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013

Security Certification of Composite Services: A Test-Based Approach.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

2012
Toward Sensor-Based Context Aware Systems.
Sensors, 2012

Landmark-assisted location and tracking in outdoor mobile network.
Multim. Tools Appl., 2012

Web Service Assurance: The Notion and the Issues.
Future Internet, 2012

Security certification-aware service discovery and selection.
Proceedings of the 2012 Fifth IEEE International Conference on Service-Oriented Computing and Applications (SOCA), 2012

A Low-Cost Security Certification Scheme for Evolving Services.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

2011
Map-Based Location and Tracking in Multipath Outdoor Mobile Networks.
IEEE Trans. Wirel. Commun., 2011

Augmented reality technologies, systems and applications.
Multim. Tools Appl., 2011

Towards Pattern-Based Reliability Certification of Services.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011, 2011

Towards an agent-based architecture for managing uncertainty in situation awareness.
Proceedings of the 2011 IEEE Symposium on Intelligent Agent, 2011

Defining and Matching Test-Based Certificates in Open SOA.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

Fine-Grained Modeling of Web Services for Test-Based Security Certification.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
Container-Level Security Certification of Services.
Proceedings of the Business System Management and Engineering, 2010

ASSERT4SOA: Toward Security Certification of Service-Oriented Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010 Workshops, 2010

Using incentive schemes to alleviate supply chain risks.
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010

Multimodality in Pervasive Environment.
Proceedings of the Semantic Challenges in Sensor Networks, 24.01. - 29.01.2010, 2010

2009
Concept of Linguistic Variable-Based Fuzzy Ensemble Approach: Application to Interlaced HDTV Sequences.
IEEE Trans. Fuzzy Syst., 2009

Fuzzy rough sets hybrid scheme for motion and scene complexity adaptive deinterlacing.
Image Vis. Comput., 2009

Designing of a type-2 fuzzy logic filter for improving edge-preserving restoration of interlaced-to-progressive conversion.
Inf. Sci., 2009

Supply Chain Risk Analysis: Open Source Simulator.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009

Emotional State Inference Using Face Related Features.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009

RSVP-TE Based Impairments Collection Mechanism in DWDM Network.
Proceedings of the Communications Infrastructure. Systems and Applications in Europe, 2009

Fast and robust Face Detection.
Proceedings of the Multimedia Techniques for Device and Ambient Intelligence, 2009

2008
Assessing Separation of Duty Policies through the Interpretation of Sampled Video Sequences: A Pair Programming Case Study.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008

Advanced Localization of Mobile Terminal in Cellular Network.
Int. J. Commun. Netw. Syst. Sci., 2008

Robust Fuzzy Filter for Noise Reduction in Video Deinterlacing.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

2007
Learning Computer Networking on Open Paravirtual Laboratories.
IEEE Trans. Educ., 2007

Fuzzy Rule-Based Edge-Restoration Algorithm in HDTV Interlaced Sequences.
IEEE Trans. Consumer Electron., 2007

Fuzzy Weighted Approach to Improve Visual Quality of Edge-Based Filtering.
IEEE Trans. Consumer Electron., 2007

Rough Sets-Assisted Subfield Optimization for Alternating Current Plasma Display Panel.
IEEE Trans. Consumer Electron., 2007

L-VCONF: A Location-Aware Infrastructure for Battlefield Videoconferences.
Proceedings of the IEEE International Conference on Virtual Environments, 2007

Full Controllable Face Detection System Architecture for Robotic Vision.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Improvement of Moving Image Quality on AC-PDP by Rough Set Based Dynamic False Contour Reduction.
Proceedings of the Rough Sets, 2007

Designing Rough Sets Attributes Reduction Based Video Deinterlacing System.
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007

Anomalies Detection in Mobile Network Management Data.
Proceedings of the Advances in Databases: Concepts, 2007

2006
Psychology-Aware Video-Enabled Workplace.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

3D Expressive Face Model-based Tracking Algorithm.
Proceedings of the IASTED International Conference on Signal Processing, 2006

2005
Facial identification problem: A tracking based approach.
Proceedings of the 1st International Conference on Signal-Image Technology and Internet-Based Systems, 2005

Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies.
Proceedings of the Information Systems Security, First International Conference, 2005


  Loading...