Detecting masquerade attacks in controller area networks using graph machine learning

W Marfo, P Moriano, DK Tosh, SV Moore - arxiv preprint arxiv:2408.05427, 2024 - arxiv.org
Modern vehicles rely on a myriad of electronic control units (ECUs) interconnected via
controller area networks (CANs) for critical operations. Despite their ubiquitous use and …

Whole-graph representation learning for the classification of signed networks

N Cecillon, V Labatut, R Dufour, N Arinik - IEEE Access, 2024 - ieeexplore.ieee.org
Graphs are ubiquitous for modeling complex systems involving structured data and
relationships. Consequently, graph representation learning, which aims to automatically …

Netpro2vec: a graph embedding framework for biomedical applications

I Manipur, M Manzo, I Granata… - IEEE/ACM …, 2021 - ieeexplore.ieee.org
The ever-increasing importance of structured data in different applications, especially in the
biomedical field, has driven the need for reducing its complexity through projections into a …

Adversarial attacks on graph-level embedding methods: A case study

M Giordano, L Maddalena, M Manzo… - Annals of Mathematics …, 2023 - Springer
As the number of graph-level embedding techniques increases at an unprecedented speed,
questions arise about their behavior and performance when training data undergo …

A distance covariance-based kernel for nonlinear causal clustering in heterogeneous populations

A Markham, R Das… - Conference on Causal …, 2022 - proceedings.mlr.press
We consider the problem of causal structure learning in the setting of heterogeneous
populations, ie, populations in which a single causal structure does not adequately …

Whole-graph embedding and adversarial attacks for life sciences

L Maddalena, M Giordano, M Manzo… - … on Mathematical and …, 2021 - Springer
Networks provide a suitable model for many scientific and technological problems that
require the representation of complex entities and their relations. Life sciences applications …

Offline EEG hyper-scanning using anonymous walk embeddings in tacit coordination games

I Zuckerman, D Mizrahi, I Laufer - PloS one, 2023 - journals.plos.org
In this paper we present a method to examine the synchrony between brains without the
need to carry out simultaneous recordings of EEG signals from two people which is the …

Network-Based Computational Modeling to Unravel Gene Essentiality

I Granata, M Giordano, L Maddalena, M Manzo… - … on Mathematical and …, 2022 - Springer
Essential genes are reductively defined as those fundamental for an organism's
reproductive success and growth. Still, the so-called essentiality of a gene is a context …

Dictionary learning on graph data with weisfieler-lehman sub-tree kernel and ksvd

K Liyanage, R Pearsall, C Izurieta… - ICASSP 2023-2023 …, 2023 - ieeexplore.ieee.org
Graph representation has gained wide popularity as a data representation method in many
applications. Graph embedding methods convert graphs to a vector representation and are …

Performance evaluation of adversarial attacks on whole-graph embedding models

M Manzo, M Giordano, L Maddalena… - Learning and Intelligent …, 2021 - Springer
Graph embedding techniques are becoming increasingly common in many fields ranging
from scientific computing to biomedical applications and finance. These techniques aim to …