Volgen
Gaetano Cimino
Titel
Geciteerd door
Geciteerd door
Jaar
Identifying security and privacy violation rules in trigger-action IoT platforms with NLP models
B Breve, G Cimino, V Deufemia
IEEE Internet of Things Journal 10 (6), 5607-5622, 2022
402022
Towards Explainable Security for ECA Rules.
B Breve, G Cimino, V Deufemia
EMPATHY@ AVI, 26-30, 2022
92022
Malicious Account Identification in Social Network Platforms
L Caruccio, G Cimino, S Cirillo, D Desiato, G Polese, G Tortora
ACM Transactions on Internet Technology 23 (4), 1-25, 2023
52023
On the User Perception of Security Risks of TAP Rules: A User Study
B Breve, G Cimino, G Desolda, V Deufemia, A Elefante
International Symposium on End User Development, 162-179, 2023
52023
Brain tumors classification from MRI images: A comparative study between different neural networks
B Breve, L Caruccio, G Cimino, S Cirillo, G Iuliano, G Polese
DMSVIVA 2022-Proceedings of the 28th International DMS conference on …, 2022
32022
Towards a Classification Model for Identifying Risky IFTTT Applets.
B Breve, G Cimino, V Deufemia
EMPATHY@ INTERACT, 33-37, 2021
32021
Surveying federated learning approaches through a multi-criteria categorization
L Caruccio, G Cimino, V Deufemia, G Iuliano, R Stanzione
Multimedia Tools and Applications 83 (12), 36921-36951, 2024
12024
A BERT-based Model for Semantic Consistency Checking of Automation Rules (S).
B Breve, G Cimino, V Deufemia, A Elefante
DMSVIVA, 87-93, 2023
12023
On Privacy Disclosure from User-Generated Content of Automation Rules.
B Breve, G Cimino, V Deufemia, A Elefante
IS-EUD Workshops, 2023
12023
Hybrid Prompt Learning for Generating Justifications of Security Risks in Automation Rules
B Breve, G Cimino, V Deufemia
ACM Transactions on Intelligent Systems and Technology 15 (5), 1-26, 2024
2024
Coherence-based Dialogue Discourse Structure Extraction using Open-Source Large Language Models
G Cimino, C Li, G Carenini, V Deufemia
Proceedings of the 25th Annual Meeting of the Special Interest Group on …, 2024
2024
Advancing Privacy in Data Mining: Seamless Homomorphic Searches and Precision-Preserving Encryption
MJ Khan, B Fang, G Cimino, S Cirillo, L Yang, D Zhao
2024
Privacy-Preserving Artificial Intelligence on Edge Devices: A Homomorphic Encryption Approach
MJ Khan, B Fang, G Cimino, S Cirillo, L Yang, D Zhao
2024 IEEE International Conference on Web Services (ICWS), 395-405, 2024
2024
Improving Malicious Accounts Discrimination through a New Feature Engineering Approach Using Relaxed Functional Dependencies
L Caruccio, G Cimino, S Cirillo, D Desiato, G Polese, G Tortora
CEUR WORKSHOP PROCEEDINGS 3741, 565-573, 2024
2024
Unleashing the Power of NLP Models for Semantic Consistency Checking of Automation Rules.
B Breve, G Cimino, V Deufemia, A Elefante
J. Vis. Lang. Comput. 2023 (2), 1-14, 2023
2023
User Perception of Risks Associated with IFTTT Applets: A Preliminary User Study.
B Breve, G Cimino, V Deufemia, A Elefante
ITASEC, 2023
2023
Model-Decoupled Federated Learning: Exploring Database Adaptability and Neural Architectural Dynamics in Federated Learning
MJ Khan, AL Lang, OT Tawose, G Cimino, S Cirillo, L Yang, D Zhao
Towards Enhanced Human Mitigation of Vishing Attacks: Leveraging Large Language Models for Real-Time User Guidance
G Cimino, V Deufemia
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–18