Search Results for author: Roberto Di Pietro

Found 13 papers, 3 papers with code

Inferring Power Grid Information with Power Line Communications: Review and Insights

no code implementations21 Aug 2023 Abdulah Jarouf, Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro

PLMs operating on the grid's physical layer are capable of transmitting such signals to infer information about the grid.

Anomaly Detection

Adversarial Attacks Neutralization via Data Set Randomization

no code implementations21 Jun 2023 Mouna Rabhi, Roberto Di Pietro

Other than detailing and providing a thorough characterization of our defense mechanism, we also provide a proof of concept of using four optimization-based adversarial attacks (PGD, FGSM, IGSM, and C\&W) and a generative adversarial attack testing them on the MNIST dataset.

Adversarial Attack

Demystifying Misconceptions in Social Bots Research

no code implementations30 Mar 2023 Stefano Cresci, Kai-Cheng Yang, Angelo Spognardi, Roberto Di Pietro, Filippo Menczer, Marinella Petrocchi

Research on social bots aims at advancing knowledge and providing solutions to one of the most debated forms of online manipulation.

Misconceptions Misinformation

Privacy-Preserving and Sustainable Contact Tracing Using Batteryless Bluetooth Low-Energy Beacons

no code implementations10 Mar 2021 Pietro Tedeschi, Kang Eun Jeon, James She, Simon Wong, Spiridon Bakiras, Roberto Di Pietro

Contact tracing is the techno-choice of reference to address the COVID-19 pandemic.

Cryptography and Security Computers and Society Networking and Internet Architecture

PAST-AI: Physical-layer Authentication of Satellite Transmitters via Deep Learning

1 code implementation12 Oct 2020 Gabriele Oligeri, Simone Raponi, Savio Sciancalepore, Roberto Di Pietro

Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms.

A Survey on Computational Propaganda Detection

no code implementations15 Jul 2020 Giovanni Da San Martino, Stefano Cresci, Alberto Barron-Cedeno, Seunghak Yu, Roberto Di Pietro, Preslav Nakov

Propaganda campaigns aim at influencing people's mindset with the purpose of advancing a specific agenda.

Propaganda detection

Noise2Weight: On Detecting Payload Weight from Drones Acoustic Emissions

1 code implementation4 May 2020 Omar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro

In this paper, we investigate the possibility to remotely detect the weight of the payload carried by a commercial drone by analyzing its acoustic fingerprint.

MAGNETO: Fingerprinting USB Flash Drives via Unintentional Magnetic Emissions

no code implementations14 Feb 2020 Omar Adel Ibrahim, Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro

Overall, MAGNETO proves that unintentional magnetic emissions can be considered as a viable and reliable means to fingerprint read-only USB flash drives.

Privacy Preserving

Crypto Mining Makes Noise

no code implementations21 Oct 2019 Maurantonio Caprolu, Simone Raponi, Gabriele Oligeri, Roberto Di Pietro

A new cybersecurity attack (cryptojacking) is emerging, in both the literature and in the wild, where an adversary illicitly runs Crypto-clients software over the devices of unaware users.

Cryptography and Security Networking and Internet Architecture

Social Fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling

no code implementations13 Mar 2017 Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi

We build upon digital DNA and the similarity between groups of users to characterize both genuine accounts and spambots.

DNA analysis

DNA-inspired online behavioral modeling and its application to spambot detection

no code implementations30 Jan 2016 Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi

We propose a strikingly novel, simple, and effective approach to model online user behavior: we extract and analyze digital DNA sequences from user online actions and we use Twitter as a benchmark to test our proposal.

DNA analysis

Fame for sale: efficient detection of fake Twitter followers

no code implementations14 Sep 2015 Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi

$\textit{Fake followers}$ are those Twitter accounts specifically created to inflate the number of followers of a target account.

Spam detection

CONCISE: Compressed 'n' Composable Integer Set

1 code implementation3 Apr 2010 Alessandro Colantonio, Roberto Di Pietro

Bit arrays, or bitmaps, are used to significantly speed up set operations in several areas, such as data warehousing, information retrieval, and data mining, to cite a few.

Data Structures and Algorithms

Cannot find the paper you are looking for? You can Submit a new open access paper.