Machine learning for coronavirus covid-19 detection from chest x-rays
At the end of 2019, a new form of Coronavirus, called COVID-19, has widely spread in the
world. To quickly screen patients with the aim to detect this new form of pulmonary disease …
world. To quickly screen patients with the aim to detect this new form of pulmonary disease …
Deep learning for heart disease detection through cardiac sounds
Most of death causes are related to cardiovascular disease. In fact, there are several
anomalies afflicting the heart beat, for instance heart murmur or artefact. We propose a …
anomalies afflicting the heart beat, for instance heart murmur or artefact. We propose a …
Download malware? no, thanks: how formal methods can block update attacks
In mobile malware landscape there are many techniques to inject malicious payload in a
trusted application: one of the most common is represented by the so-called update attack …
trusted application: one of the most common is represented by the so-called update attack …
De novo reconstruction of gene regulatory networks from time series data, an approach based on formal methods
Reverse engineering of gene regulatory relationships from genomics data is a crucial task to
dissect the complex underlying regulatory mechanism occurring in a cell. From a …
dissect the complex underlying regulatory mechanism occurring in a cell. From a …
Evaluating model checking for cyber threats code obfuscation identification
Code obfuscation is a set of transformations that make code programs harder to understand.
The goal of code obfuscation is to make reverse engineering of programs infeasible, while …
The goal of code obfuscation is to make reverse engineering of programs infeasible, while …
Predicting risk of metastases and recurrence in soft-tissue sarcomas via Radiomics and Formal Methods
Abstract Objective Soft-tissue sarcomas (STSs) of the extremities are a group of
malignancies arising from the mesenchymal cells that may develop distant metastases or …
malignancies arising from the mesenchymal cells that may develop distant metastases or …
Formal equivalence checking for mobile malware detection and family classification
Several techniques to overcome the weaknesses of the current signature based detection
approaches adopted by free and commercial antimalware have been proposed by industrial …
approaches adopted by free and commercial antimalware have been proposed by industrial …
Grease: a tool for efficient “nonequivalence” checking
Equivalence checking plays a crucial role in formal verification to ensure the correctness of
concurrent systems. However, this method cannot be scaled as easily with the increasing …
concurrent systems. However, this method cannot be scaled as easily with the increasing …
A novel classification technique based on formal methods
In last years, we are witnessing a growing interest in the application of supervised machine
learning techniques in the most disparate fields. One winning factor of machine learning is …
learning techniques in the most disparate fields. One winning factor of machine learning is …
A method for automatic penetration testing and mitigation: A red hat approach
Recently in the cybersecurity landscape, various figures have spread with different
peculiarities. For instance there are the Black Hat hackers, aimed to perpetrate damage on …
peculiarities. For instance there are the Black Hat hackers, aimed to perpetrate damage on …