Marco Pistoia
Orcid: 0000-0001-9002-1128Affiliations:
- JPMorgan Chase, New York, NY, USA
- IBM Research (former)
According to our database1,
Marco Pistoia
authored at least 105 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., August, 2024
Quantum, January, 2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Parameter Setting Heuristics Make the Quantum Approximate Optimization Algorithm Suitable for the Early Fault-Tolerant Era.
CoRR, 2024
QC-Forest: a Classical-Quantum Algorithm to Provably Speedup Retraining of Random Forest.
CoRR, 2024
Variational Quantum Algorithm Landscape Reconstruction by Low-Rank Tensor Completion.
CoRR, 2024
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2024
MaSS: Multi-attribute Selective Suppression for Utility-preserving Data Transformation from an Information-theoretic Perspective.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Ranking Distance Metric for Privacy Budget in Distributed Learning of Finite Embedding Data.
Proceedings of the Advances in Information Retrieval, 2024
Absolute Variation Distance: An Inversion Attack Evaluation Metric for Federated Learning.
Proceedings of the Advances in Information Retrieval, 2024
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
2023
Expressive variational quantum circuits provide inherent privacy in federated learning.
CoRR, 2023
Des-q: a quantum algorithm to construct and efficiently retrain decision trees for regression and binary classification.
CoRR, 2023
Evidence of Scaling Advantage for the Quantum Approximate Optimization Algorithm on a Classically Intractable Problem.
CoRR, 2023
Alignment between Initial State and Mixer Improves QAOA Performance for Constrained Portfolio Optimization.
CoRR, 2023
Proceedings of the SC '23 Workshops of The International Conference on High Performance Computing, 2023
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2023
2022
Numerical evidence against advantage with quantum fidelity kernels on classical data.
CoRR, 2022
CoRR, 2022
Constrained Quantum Optimization for Extractive Summarization on a Trapped-ion Quantum Computer.
CoRR, 2022
Paving the Way towards 800 Gbps Quantum-Secured Optical Channel Deployment in Mission-Critical Environments.
CoRR, 2022
Proceedings of the 7th IEEE/ACM Symposium on Edge Computing, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
Quantum, 2021
CoRR, 2021
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2021
2020
CoRR, 2020
Parallelization of Classical Numerical optimization in Quantum Variational Algorithms.
Proceedings of the 13th IEEE International Conference on Software Testing, 2020
2019
A Domain-agnostic, Noise-resistant Evolutionary Variational Quantum Eigensolver for Hardware-efficient Optimization in the Hilbert Space.
CoRR, 2019
More Is Less: Learning Efficient Video Representations by Big-Little Network and Depthwise Temporal Aggregation.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
2018
Efficient Fusion of Sparse and Complementary Convolutions for Object Recognition and Detection.
CoRR, 2018
Proceedings of the 2018 IEEE International Symposium on Multimedia, 2018
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Proceedings of the 5th International Conference on Mobile Software Engineering and Systems, MOBILESoft@ICSE 2018, Gothenburg, Sweden, May 27, 2018
2017
Proceedings of the 2017 IEEE Symposium on Visual Languages and Human-Centric Computing, 2017
Proceedings of the 22nd International Conference on Intelligent User Interfaces, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
Proceedings of the Fundamental Approaches to Software Engineering, 2017
2016
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016
Proceedings of the Ambient Assisted Living, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2015
Automatic detection, correction, and visualization of security vulnerabilities in mobile apps.
Proceedings of the 3rd International Workshop on Mobile Development Lifecycle, 2015
ShamDroid: gracefully degrading functionality in the presence of limited resource access.
Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, 2015
Proceedings of the 16th IEEE International Conference on Mobile Data Management, 2015
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015
Proceedings of the 2nd ACM International Conference on Mobile Software Engineering and Systems, 2015
Proceedings of the 29th European Conference on Object-Oriented Programming, 2015
Proceedings of the Computer Information Systems and Industrial Management, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Integrating Security, Analytics and Application Management into the Mobile Development Lifecycle.
Proceedings of the 2nd International Workshop on Mobile Development Lifecycle, 2014
Proceedings of the International Symposium on Software Testing and Analysis, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
ACM Trans. Softw. Eng. Methodol., 2013
IBM J. Res. Dev., 2013
IBM J. Res. Dev., 2013
IBM J. Res. Dev., 2013
Proceedings of the Fundamental Approaches to Software Engineering, 2013
2012
2011
Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2011
Proceedings of the 20th International Symposium on Software Testing and Analysis, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
2010
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010
2009
Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, 2009
A language for information flow: dynamic tracking in multiple interdependent dimensions.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009
Proceedings of the 31st International Conference on Software Engineering, 2009
2008
IEEE Trans. Software Eng., 2008
ACM SIGPLAN Notices, 2008
ACM SIGPLAN Notices, 2008
Proceedings of the Verification, 2008
2007
A survey of static analysis methods for identifying security vulnerabilities in software systems.
IBM Syst. J., 2007
Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007
Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2006
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2006
Proceedings of the Object-Oriented Technology, ECOOP 2006 Workshop Reader, 2006
2005
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection.
Proceedings of the ECOOP 2005, 2005
2004
Enterprise Java security : Building secure J2EE applications.
Addison-Wesley, ISBN: 978-0321118899, 2004
2002
Proceedings of the 2002 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 2002
2001
IBM Syst. J., 2001
Proceedings of the Poster Proceedings of the Tenth International World Wide Web Conference, 2001
1999
JAVA 2 Network Security (2nd Edition)
Prentice-Hall, ISBN: 0130155926, 1999