Search Results for author: Massimo Bernaschi

Found 7 papers, 5 papers with code

Onion under Microscope: An in-depth analysis of the Tor network

no code implementations20 Jan 2021 Massimo Bernaschi, Alessandro Celestini, Marco Cianfriglia, Stefano Guarino, Flavio Lombardi, Enrico Mastrostefano

The Tor web is the set of web resources that exist on the Tor network, and Tor websites are part of the so-called dark web.

Social and Information Networks

Unleashing the Tiger: Inference Attacks on Split Learning

3 code implementations4 Dec 2020 Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi

We investigate the security of Split Learning -- a novel collaborative machine learning framework that enables peak performance by requiring minimal resources consumption.

Federated Learning

Interpretable Probabilistic Password Strength Meters via Deep Learning

1 code implementation15 Apr 2020 Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi

Probabilistic password strength meters have been proved to be the most accurate tools to measure password strength.

Adversarial Out-domain Examples for Generative Models

1 code implementation7 Mar 2019 Dario Pasquini, Marco Mingione, Massimo Bernaschi

Deep generative models are rapidly becoming a common tool for researchers and developers.

Adversarial Attack Image Generation

BitCracker: BitLocker meets GPUs

1 code implementation4 Jan 2019 Elena Agostini, Massimo Bernaschi

BitLocker is a full-disk encryption feature available in recent Windows versions.

Cryptography and Security

Algorithms and Heuristics for Scalable Betweenness Centrality Computation on Multi-GPU Systems

no code implementations2 Feb 2016 Flavio Vella, Giancarlo Carbone, Massimo Bernaschi

Betweenness Centrality (BC) is steadily growing in popularity as a metrics of the influence of a vertex in a graph.

Distributed, Parallel, and Cluster Computing Data Structures and Algorithms Social and Information Networks

Cannot find the paper you are looking for? You can Submit a new open access paper.