Titolo |
Pubblicato in |
Anno |
DARD: Deceptive Approaches for Robust Defense Against IP Theft |
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY |
2024 |
The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations |
ACM TRANSACTIONS ON INTERNET TECHNOLOGY |
2023 |
Translated Texts Under the Lens: From Machine Translation Detection to Source Language Identification |
Advances in Intelligent Data Analysis XXI |
2023 |
Ready, Aim, Snipe! Analysis of Sniper Bots and their Impact on the DeFi Ecosystem |
ACM Web Conference 2023 - Companion of the World Wide Web Conference, WWW 2023 |
2023 |
BBT, Lot Mules 2–3. Application of machine learning on TBM parameters for risk prediction tools |
Expanding Underground-Knowledge and Passion to Make a Positive Impact on the World |
2023 |
OpenSeesPy-based web application for pushover curve computation of RC bridge piers subject to arbitrarily non-uniform corrosion patterns |
Lecture Notes in Civil Engineering |
2023 |
Token Spammers, Rug Pulls, and SniperBots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB) |
Proceedings of the USENIX Security Symposium |
2023 |
Artificial intelligence for tunnel boring machine penetration rate prediction |
TUNNELLING AND UNDERGROUND SPACE TECHNOLOGY |
2023 |
It's a Trap! Detection and Analysis of Fake Channels on Telegram |
2023 {IEEE} International Conference on Web Services ({ICWS}) |
2023 |
A Game of NFTs: Characterizing NFT Wash Trading in the Ethereum Blockchain |
Proceedings - International Conference on Distributed Computing Systems 2023 |
2023 |
Hard Rock TBMs—The Experience of Brenner Basis Tunnel, Construction Lot Mules 2-3, for the Evaluation of Risk Prediction Tools |
Rapid Excavation and Tunneling Conference |
2023 |
The parallel lives of autonomous systems: ASN allocations vs. BGP |
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC |
2021 |
Pump and dumps in the Bitcoin era: real time detection of cryptocurrency market manipulations |
Proceedings - International Conference on Computer Communications and Networks (ICCCN) |
2020 |
GDPR: When the Right to Access Personal Data Becomes a Threat |
Proceedings - 2020 IEEE 13th International Conference on Web Services, ICWS 2020 |
2020 |
A Light in the Dark Web: Linking Dark Web aliases to real internet identities |
Proceedings - International Conference on Distributed Computing Systems |
2020 |
Cross-domain authorship attribution combining instance-based and profile-based features notebook for PAN at CLEF 2019 |
CEUR Workshop Proceedings |
2019 |
Bot and gender detection of twitter accounts using distortion and LSA notebook for PAN at CLEF 2019 |
CEUR Workshop Proceedings |
2019 |
Nationality and geolocation-based profiling in the Dark(Web) |
IEEE TRANSACTIONS ON SERVICES COMPUTING |
2019 |
Mobile cloud performance evaluation using stochastic models |
IEEE TRANSACTIONS ON MOBILE COMPUTING |
2018 |
Uncovering Hidden Social Relationships Through Location-Based Services: The Happn Case Study |
Proceedings - IEEE INFOCOM |
2018 |