no code implementations • 12 Feb 2024 • Giacomo Zonneveld, Lorenzo Principi, Marco Baldi
In this paper, we propose instead to perform pre-processing of network traffic under analysis with the aim of extracting some new metrics on which we can perform more efficient detection and overcome some limitations of classical approaches.
no code implementations • 14 Dec 2020 • Aoife Boyle, Cora Uhlemann, Oliver Friedrich, Alexandre Barthelemy, Sandrine Codis, Francis Bernardeau, Carlo Giocoli, Marco Baldi
Pinning down the total neutrino mass and the dark energy equation of state is a key aim for upcoming galaxy surveys.
Cosmology and Nongalactic Astrophysics
no code implementations • 17 Jan 2020 • Linda Senigagliesi, Marco Baldi, Ennio Gambi
In order to face the worst case scenario of an authenticator provided with no forged messages during training, we consider one-class classifiers.
no code implementations • 16 Sep 2019 • Linda Senigagliesi, Marco Baldi, Ennio Gambi
In this paper we assess the security performance of key-less physical layer authentication schemes in the case of time-varying fading channels, considering both partial and no channel state information (CSI) on the receiver's side.
no code implementations • 25 Oct 2018 • Julian Merten, Carlo Giocoli, Marco Baldi, Massimo Meneghetti, Austin Peel, Florian Lalande, Jean-Luc Starck, Valeria Pettorino
Based on the DUSTGRAIN-pathfinder suite of simulations, we investigate observational degeneracies between nine models of modified gravity and massive neutrinos.
no code implementations • 25 Oct 2018 • Austin Peel, Florian Lalande, Jean-Luc Starck, Valeria Pettorino, Julian Merten, Carlo Giocoli, Massimo Meneghetti, Marco Baldi
We present a convolutional neural network to identify distinct cosmological scenarios based on the weak-lensing maps they produce.
Cosmology and Nongalactic Astrophysics
no code implementations • 11 Aug 2011 • Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani
This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the public key is no longer permutation-equivalent to the secret code.
Information Theory Cryptography and Security Information Theory
no code implementations • 8 Jul 2011 • Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani
The last decades have seen a growing interest in hash functions that allow some sort of tolerance, e. g. for the purpose of biometric authentication.
Information Theory Cryptography and Security Information Theory