Volgen
Domenico Desiato
Titel
Geciteerd door
Geciteerd door
Jaar
Social network data analysis to highlight privacy threats in sharing data
F Cerruto, S Cirillo, D Desiato, SM Gambardella, G Polese
Journal of Big Data 9 (1), 19, 2022
542022
Fake account identification in social networks
L Caruccio, D Desiato, G Polese
2018 IEEE international conference on big data (big data), 5078-5085, 2018
522018
A decision-support framework for data anonymization with application to machine learning processes
L Caruccio, D Desiato, G Polese, G Tortora, N Zannone
Information Sciences 613, 1-32, 2022
412022
GDPR compliant information confidentiality preservation in big data processing
L Caruccio, D Desiato, G Polese, G Tortora
IEEE Access 8, 205034-205050, 2020
372020
A multi classifier approach for supporting Alzheimer’s diagnosis based on handwriting analysis
G De Gregorio, D Desiato, A Marcelli, G Polese
Pattern Recognition. ICPR International Workshops and Challenges: Virtual …, 2021
272021
A methodology for GDPR compliant data processing
D Desiato, G Tortora
CEUR workshop proceedings 2161, 1-4, 2018
232018
CHRAVAT-chronology awareness visual analytic tool
S Cirillo, D Desiato, B Breve
2019 23rd International Conference Information Visualisation (IV), 255-260, 2019
172019
A Visual Privacy Tool to Help Users in Preserving Social Network Data.
S Cirillo, D Desiato, M Scalera, G Solimando
IS-EUD Workshops, 2023
132023
Enhancing spatial perception through sound: mapping human movements into MIDI
B Breve, S Cirillo, M Cuofano, D Desiato
Multimedia Tools and Applications 81 (1), 73-94, 2022
82022
Malicious Account Identification in Social Network Platforms
L Caruccio, G Cimino, S Cirillo, D Desiato, G Polese, G Tortora
ACM Transactions on Internet Technology 23 (4), 1-25, 2023
52023
Perceiving space through sound: mapping human movements into MIDI.
B Breve, S Cirillo, D Desiato, M Cuofano
DMSVIVA, 49-56, 2020
52020
Cross-Social Network Investigation to Highlight Privacy Violations in Data Sharing Activities.
F Cerruto, S Cirillo, D Desiato, MS Gambardella, G Polese
SEBD, 593-600, 2022
22022
Unlocking the Potential of Simulated Phishing Campaigns: Measuring the Impact of Interaction among Different Human Factors
F Greco, P Buono, D Desiato, G Desolda, R Lanzilotti, G Ragone
DAMOCLES: Detection And Mitigarion of Cyber attacks that exploit human …, 2024
12024
VIPAT-A Visual Interactive Privacy Analytics Tool
B Breve, S Cirillo, D Desiato, V Deufemia, G Polese
Proceedings of the International Workshop on Human-Centered Cybersecurity …, 2019
12019
Exploring the ability of emerging large language models to detect cyberbullying in social posts through new prompt-based classification approaches
S Cirillo, D Desiato, G Polese, G Solimando, V Sugumaran, ...
Information Processing & Management 62 (3), 104043, 2025
2025
Towards a human factors assessment questionnaire for cybersecurity incidents
G Ragone, P Buono, D Desiato, G Desolda, F Greco, R Lanzillotti
Proceedings of the 2024 International Conference on Advanced Visual …, 2024
2024
Improving Malicious Accounts Discrimination through a New Feature Engineering Approach Using Relaxed Functional Dependencies
L Caruccio, G Cimino, S Cirillo, D Desiato, G Polese, G Tortora
CEUR WORKSHOP PROCEEDINGS 3741, 565-573, 2024
2024
An Approach to Trade-off Privacy and Classification Accuracy in Machine Learning Processes.
L Caruccio, D Desiato, G Polese, G Tortora, N Zannone
SEBD, 420-429, 2023
2023
Enhancing the Sharing and the Management of Personal Data in the Big Data Era
D Desiato
Universita degli studi di Salerno, 2022
2022
Classification benchmarking of fake account datasets using machine learning models and feature selection strategies
D Caivano, M Cerullo, D Desiato, G Polese
2021
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20