Pubblicato il 7 marzo 2025
Pubblicazioni scientifiche
From Models to Network Topologies: A Topology Inference Attack in Decentralized Federated Learning
PDF4.97 MB6 gennaio 2025
ColNet: Collaborative Optimization in Decentralized Federated Multi-task Learning Systems
PDF605.63 kB17 gennaio 2025
A test environment for evaluating the cybersecurity of building automation
PDF1.04 MB31 gennaio 2025
S-VOTE: Similarity-based Voting for Client Selection in Decentralized Federated Learning
PDF418.01 kB31 gennaio 2025
DMPA: Model Poisoning Attacks on Decentralized Federated Learning for Model Differences
PDF1.18 MB7 febbraio 2025
Assessing the Sustainability and Trustworthiness of Federated Learning Models
PDF621.99 kB11 febbraio 2025
LeoCommon – A Ground Station Observatory Network for LEO Satellite Research
PDF4.26 MB24 febbraio 2025
GreenDFL: a Framework for Assessing the Sustainability of Decentralized Federated Learning Systems
PDF1.55 MB27 febbraio 2025
Multimodal Deep Learning for Android Malware Classification
PDF2.69 MB28 febbraio 2025
OrbID: Identifying Orbcomm Satellite RF Fingerprints
PDF5.83 MB6 marzo 2025
Threats and Opportunities in AI-generated Images for Armed Forces
PDF1.85 MB26 marzo 2025
It's a Match - Enhancing the Fit between Users and Phishing Training through Personalisation
PDF2.00 MB25 aprile 2025
Stop the Clock - Counteracting Bias Exploited by Attackers through an Interactive Augmented Reality Phishing Training
PDF7.99 MB25 aprile 2025
Demo: A Practical Testbed for Decentralized Federated Learning on Physical Edge Devices
PDF554.45 kB12 maggio 2025
Towards the ideals of Self-Recovery and Metadata Privacy in Social Vault Recovery
PDF2.92 MB14 maggio 2025
Multi-Agent Reinforcement Learning in Cybersecurity: From Fundamentals to Applications
PDF2.85 MB26 maggio 2025
Next Steps in Cyber Blue Team Automation - Leveraging the Power of LLMs
PDF838.18 kB27 maggio 2025
SATversary: Adversarial Attacks on Satellite Fingerprinting
PDF2.61 MB6 giugno 2025
A Manually Annotated Image-Caption Dataset for Detecting Children in the Wild
PDF14.02 MB11 giugno 2025
Rethinking Backdoor Unlearning Through Linear Task Decomposition
PDF1.27 MB11 giugno 2025
GuardFS: A file system for integrated detection and mitigation of Linux-based ransomware
PDF1.80 MB24 giugno 2025
SpaceJam: Protocol-aware Jamming Attacks against Space Communications
PDF2.72 MB30 giugno 2025
Universal Spoofing of Real-World Aircraft Multilateration
PDF3.29 MB30 giugno 2025
Aircraft Take-off Weight Estimation: The EUROCONTROL PRC 2024Data Challenge
PDF1.55 MB12 luglio 2025
A Crowdsensing Intrusion Detection Dataset For Decentralized Federated Learning Models
PDF435.06 kB17 luglio 2025
Swushroomsia at SemEval-2025 Task 3: Probing LLMs’ Collective Intelligence for Multilingual Hallucination Detection
PDF1.48 MB31 luglio 2025
SoK: Automating Kernel Vulnerability Discovery and Exploit Generation
PDF734.22 kB11 agosto 2025
Bluetooth Security Testing with BlueToolkit: a Large-Scale Automotive Case Study
PDF1.53 MB11 agosto 2025
Exploring the Role of Artificial Intelligence in Enhancing Security Operations: A Systematic Review
PDF928.14 kB9 settembre 2025
NEBULA - Decentralized Federated Learning for Heterogeneous Networks
PDF730.08 kB10 settembre 2025
Secure and Scalable Rerouting in LEO SatelliteNetworks
PDF883.96 kB12 settembre 2025
Exploring Data and Parameter Efficient Strategies for Arabic DialectIdentifications
PDF315.56 kB18 settembre 2025
TRIP: Coercion-resistant Registration for E-Voting with Verifiability and Usability in Votegral
PDF1.19 MB12 ottobre 2025
TypePilot: Leveraging the Scala Type System for Secure LLM-generated Code
PDF1.64 MB13 ottobre 2025
Reassessing the market impact of cyber incidents: A bias-adjusted event study approach
PDF1.19 MB22 ottobre 2025
2510.21561v1.pdf
PDF19.72 MB24 ottobre 2025
DSNS: The Deep Space Network Simulator
PDF4.12 MB29 ottobre 2025
Monitoring Transformative Technological Convergence Through LLM-Extracted Semantic Entity Triple Graphs
PDF1.86 MB29 ottobre 2025
Understanding Citizen Science: Insights from the 2024/2025 OpenSky Network User Survey
PDF1.60 MB3 novembre 2025
Tokenization and Representation Biases in Multilingual Models on Dialectal NLP Tasks
PDF1.06 MB4 novembre 2025
Low-Resource Languages LLM Disinformation is Within Reach: The Case of Walliserdeutsch
PDF576.24 kB4 novembre 2025
Are cybersecurity firms different Intra-sector and cross-industry comparisons of financial performance
PDF1.19 MB6 novembre 2025
From Model to Breach: Towards Actionable LLM-Generated Vulnerabilities Reporting
PDF748.14 kB6 novembre 2025
Extreme Multi-Label Completion for Semantic Document Tagging with Taxonomy-Aware Parallel Learning
PDF1.21 MB10 novembre 2025
Evaluating Concept Filtering Defenses against Child Sexual Abuse Material Generation by Text-to-Image Models
PDF9.78 MB5 dicembre 2025
Practical Challenges in Executing Shor's Algorithm on Existing Quantum Platforms
PDF567.95 kB20 dicembre 2025
Sentinel: An aggregation function to secure decentralized federated learning
PDF809.80 kB1 gennaio 2024
MTFS: a Moving Target Defense-Enabled File System for Malware Mitigation
PDF260.07 kB1 gennaio 2024
X-Attack 2.0: The Risk of Power Wasters and Satisfiability Don’t-Care Hardware Trojans to Shared Cloud FPGAs
PDF1.80 MB22 gennaio 2024
A Cost-Efficient RFI Localization Approach to Detect GNSS Jamming and Spoofing
PDF1.18 MB23 gennaio 2024
Mitigating communications threats in decentralized federated learning through moving target defense
PDF2.07 MB28 gennaio 2024
GuardFS: A file system for integrated detection and mitigation of linux-based ransomware
PDF777.17 kB31 gennaio 2024
Robust Federated Learning for execution time-based device model identification under label-flipping attack
PDF1.17 MB1 febbraio 2024
Single-board device individual authentication based on hardware performance and autoencoder transformer models
PDF1.11 MB1 febbraio 2024
Adversarial attacks and defenses on ML-and hardware-based IoT device fingerprinting and identification
PDF1.24 MB1 marzo 2024
Federatedtrust: A solution for trustworthy federated learning
PDF1.92 MB1 marzo 2024
On the Security of Satellite-Based Air Traffic Control (ADS-C)
PDF12.54 MB1 marzo 2024
Trends in Large Language Models: Actors, Applications, and Impact on Cybersecurity
PDF745.92 kB13 marzo 2024
Graph Language Model (GLM): A new graph-based approach to detect social instabilities
PDF2.81 MB26 marzo 2024
Fedstellar: A Platform for Decentralized Federated Learning
PDF2.48 MB8 aprile 2024
LLM-Resilient Bibliometrics: Factual Consistency Through Entity Triplet Extraction
PDF1.00 MB22 aprile 2024
Automated Identification of Emerging Technologies: Open Data Approach
PDF710.32 kB23 aprile 2024
Neural Exec: Learning (and Learning from) Execution Triggers for Prompt Injection Attacks
PDF2.00 MB2 maggio 2024
Reputation System based on Distributed Ledge to Secure Decentralized Federated Learning
PDF948.69 kB1 ottobre 2024
Secret Collusion among AI Agents: Multi-Agent Deception via Steganography
PDF1.33 MB8 novembre 2024
Corrections to ‘‘Dynamic Security Analysis onAndroid: A Systematic Literature Review’’
PDF210.10 kB12 novembre 2024
You Know What-Evaluation of a Personalised Phishing Training Based on Users’ Phishing Knowledge and Detection Skills
PDF1.14 MB20 novembre 2024
Let’s Take This Upstairs: Localizing Ground Transmitters With High-Altitude Balloons?
PDF3.17 MB12 marzo 2025
Robust federated learning for execution time-based device model identification under label-flipping attack
PDF1.17 MB2 gennaio 2023
A methodology to identify identical single-board computers based on hardware behavior fingerprinting
PDF1.39 MB3 gennaio 2023
Measuring Security Development in Information Technologies: A Scientometric framework using ARXIV e-Prints
PDF3.79 MB11 gennaio 2023
Adaptive uplink data compression in spectrum crowdsensing systems
PDF2.37 MB18 gennaio 2023
Analysis of GNSS disruptions in European airspace
PDF1.08 MB26 gennaio 2023
Spoofing Earth Observation Satellite Data through Radio Overshadowing
PDF1.89 MB1 febbraio 2023
QPEP in the Real World: A Testbed for Secure Satellite Communication Performance
PDF4.52 MB27 febbraio 2023
Targeted Adversarial Attacks Against Neural Machine Translation
PDF573.11 kB2 marzo 2023
Forecasting Labor Needs for Digitalization: A bi-partite graph Machine learning approach
PDF1.11 MB28 marzo 2023
Capturing Trends Using OpenAlex and Wikipedia Page Views as Science Indicators The Case of Data Protection and Encryption Technologies
PDF684.32 kB1 aprile 2023
Robust and explainable identification of logical fallacies in natural language arguments
PDF885.44 kB22 aprile 2023
In Pursuit of Aviation Cybersecurity: Experiences and lessons from a Competitive approach
PDF2.15 MB27 aprile 2023
TaxoComplete: Self-Supervised Taxonomy Completion Leveraging Position-Enhanced Semantic Matching
PDF1.04 MB4 maggio 2023
Optimizing the Size of Subword Vocabularies in Dialect Classification
PDF362.45 kB5 maggio 2023
A Simplified Training Pipeline for Low-Resource and Unsupervised Machine Translation
PDF253.03 kB6 maggio 2023
From scattered sources to Comprehensive Technology Landscape: A recommendation-based retrieval approach
PDF1.19 MB11 maggio 2023
FirmwareDroid: Towards Automated Static Analysis of Pre-Installed Android Apps
PDF887.68 kB15 maggio 2023
Towards Generalizing Machine Learning Models to Detect Command and Control Attack Traffic
PDF14.20 MB2 giugno 2023
Modeling 5G Threat Scenarios for Critical Infrastructure Protection
PDF2.01 MB2 giugno 2023
Building Collaborative cybersecurity for Critical Infrastructure Protection: Empirical evidence of Collective intelligence information sharing Dynamics on ThreatFox
PDF554.67 kB8 giugno 2023
A Relaxed Optimization Approach for Adversarial Attacks Against Neural Machine Translation Models
PDF397.69 kB14 giugno 2023
GraphINC: Graph Pattern mining at network speed
PDF1.45 MB20 giugno 2023
LLM-Based Entity Extraction is Not for Cybersecurity
PDF1.67 MB26 giugno 2023
A Summary of RansomAI: AI-powered Ransomware for Stealthy Encryption
PDF392.73 kB27 giugno 2023
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks
PDF3.17 MB28 giugno 2023
Byzantine-Resilient Learning Beyond Gradients: Distributing Evolutionary Search
PDF660.82 kB19 luglio 2023
LWHBench: a low-level hardware component benchmark and dataset for single board computers
PDF1.61 MB22 luglio 2023
Evolutionary Algorithms in the Light of SGD: Limit Equivalence, Minima Flatness, and Transfer Learning
PDF723.34 kB24 luglio 2023
FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks
PDF1.79 MB11 agosto 2023
P3LI5: Practical and confidEntial Lawful Interception on the 5G core
PDF3.63 MB27 agosto 2023
Contrastive learning with self-reconstruction for channel-resilient modulation classification
PDF642.15 kB29 agosto 2023
Efficient collective action for tacklingtime-critical cybersecurity threats
PDF2.27 MB12 settembre 2023
Decentralized Federated Learning: fundamentals, state of the art, frameworks, trends, and challenges
PDF2.07 MB13 settembre 2023
Behavioral fingerprinting to detect ransomware in resource-constrained devices
PDF1.03 MB24 settembre 2023
OpenSky Report 2023: Low Altitude Traffic Awareness for Light Aircraft with FLARM
PDF3.65 MB5 ottobre 2023
SKYPOS: Real-world evaluation of self-positioning with aircraft signals for IoT devices
PDF3.73 MB9 ottobre 2023
Lessons learned in transcribing 5000 h of air traffic control communications for robust automatic speech Understanding
PDF2.37 MB20 ottobre 2023
Scaling the Timing-Based detection of anomalies in Real-World aircraft trajectories
PDF1.72 MB24 ottobre 2023
Watch This Space Securing Satellite Communication through Resilient Transmitter Fingerprinting
PDF1.79 MB30 novembre 2023
A first look at exploiting the Automatic Dependent Surveillance-Contract Protocol for open aviation research
PDF3.33 MB17 dicembre 2023
Federated learning for malware detection in IoT devices
PDF769.96 kB1 febbraio 2022
Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Surveyand Implications in the Heterogeneous Era
PDF2.06 MB1 febbraio 2022
Understanding realistic attacks on airborne collisionavoidance systems
PDF1.44 MB14 febbraio 2022
FPGA-to-CPU Undervolting Attacks
PDF3.81 MB1 marzo 2022
ditto: WAN Traffic Obfuscation at Line Rate
PDF7.63 MB24 aprile 2022
Block-sparse Adversarial Attack to fool Transformer-based Text Classifiers
PDF479.21 kB11 maggio 2022
Early Warning Signals in Open Source Intelligence: Two Use Cases of the 2019 Iraqi and 2020 Indian Farmers' Protests
PDF3.28 MB19 maggio 2022
Evolutionary Optimization of Residual Neural Network Architectures for Modulation Classification
PDF677.94 kB1 giugno 2022
Security and Privacy Issues of Satellite Communication in the Aviation Domain
PDF1.84 MB1 giugno 2022
On the Security of the FLARM Collision Warning System
PDF5.51 MB3 giugno 2022
Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection
PDF852.28 kB6 giugno 2022
Efficient Collective Action for Tackling Time-Critical Cybersecurity Threats
PDF1.09 MB30 giugno 2022
Communicating via Markov Decision Processes
PDF1.72 MB17 luglio 2022
Intelligent and behavioral-based detection of malware in IoT spectrum sensors
PDF1.11 MB29 luglio 2022
Building an Avionics Laboratory for Cybersecurity Testing
PDF25.55 MB8 agosto 2022
An Experimental Study of GPS Spoofing and Takeover Attacks on UAV
PDF1.72 MB10 agosto 2022
Aggregate-based Congestion Control for Pulse-Wave DDoS Defense
PDF1.33 MB22 agosto 2022
Building collaborative cybersecurity for critical infrastructure protection
PDF554.67 kB14 settembre 2022
High Data Throughput Exfiltration throughVideo Cable Emanations
PDF3.27 MB15 settembre 2022
RITUAL: a Platform Quantifying the Trustworthiness of Supervised Machine Learning
PDF228.24 kB1 ottobre 2022
Privacy-preserving and Syscall-based Intrusion Detection System for IoT Spectrum Sensors Affected by Data Falsification Attacks
PDF755.24 kB1 ottobre 2022
SpecForce: A Framework to Secure IoT SpectrumSensors in the Internet of Battlefield Things
PDF3.64 MB1 ottobre 2022
TechRank
PDF2.89 MB14 ottobre 2022
Measuring 5G Electric Fields Strength With Software Defined Radios
PDF3.85 MB18 novembre 2022
A Methodology for Evaluating the Robustness of Anomaly Detectors to Adversarial Attacks in Industrial Scenarios
PDF1.24 MB28 novembre 2022
Beyond S-curves: Recurrent Neural Networks for Technology Forecasting
PDF530.03 kB29 novembre 2022
Early Guessing for Dialect Identification
PDF225.53 kB1 dicembre 2022
RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT
PDF8.67 MB30 dicembre 2022
Cybersecurity Technologies: An Overview of Trends & Activities in Switzerlandand Abroad
PDF9.25 MB28 novembre 2023