Skip to main content

Showing 1–25 of 25 results for author: Liotta, A

.
  1. arXiv:2401.12632  [pdf, other

    cs.SE cs.AI cs.RO

    Modeling Resilience of Collaborative AI Systems

    Authors: Diaeddin Rimawi, Antonio Liotta, Marco Todescato, Barbara Russo

    Abstract: A Collaborative Artificial Intelligence System (CAIS) performs actions in collaboration with the human to achieve a common goal. CAISs can use a trained AI model to control human-system interaction, or they can use human interaction to dynamically learn from humans in an online fashion. In online learning with human feedback, the AI model evolves by monitoring human interaction through the system… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

    Comments: This paper is accepted at the 3rd International Conference on AI Engineering - Software Engineering for AI (CAIN 2024), Lisbon, Portugal

  2. GResilience: Trading Off Between the Greenness and the Resilience of Collaborative AI Systems

    Authors: Diaeddin Rimawi, Antonio Liotta, Marco Todescato, Barbara Russo

    Abstract: A Collaborative Artificial Intelligence System (CAIS) works with humans in a shared environment to achieve a common goal. To recover from a disruptive event that degrades its performance and ensures its resilience, a CAIS may then need to perform a set of actions either by the system, by the humans, or collaboratively together. As for any other system, recovery actions may cause energy adverse eff… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

    Journal ref: Testing Software and Systems. ICTSS 2023. Lecture Notes in Computer Science, vol 14131. Springer, Cham

  3. arXiv:2307.06645  [pdf, other

    cs.NI cs.LG stat.ML

    Multivariate Time Series characterization and forecasting of VoIP traffic in real mobile networks

    Authors: Mario Di Mauro, Giovanni Galatro, Fabio Postiglione, Wei Song, Antonio Liotta

    Abstract: Predicting the behavior of real-time traffic (e.g., VoIP) in mobility scenarios could help the operators to better plan their network infrastructures and to optimize the allocation of resources. Accordingly, in this work the authors propose a forecasting analysis of crucial QoS/QoE descriptors (some of which neglected in the technical literature) of VoIP traffic in a real mobile environment. The p… ▽ More

    Submitted 13 July, 2023; originally announced July 2023.

    Comments: 15 pages

  4. arXiv:2203.06935  [pdf

    cs.MM

    A Systematic Review on Affective Computing: Emotion Models, Databases, and Recent Advances

    Authors: Yan Wang, Wei Song, Wei Tao, Antonio Liotta, Dawei Yang, Xinlei Li, Shuyong Gao, Yixuan Sun, Weifeng Ge, Wei Zhang, Wenqiang Zhang

    Abstract: Affective computing plays a key role in human-computer interactions, entertainment, teaching, safe driving, and multimedia integration. Major breakthroughs have been made recently in the areas of affective computing (i.e., emotion recognition and sentiment analysis). Affective computing is realized based on unimodal or multimodal data, primarily consisting of physical information (e.g., textual, a… ▽ More

    Submitted 20 March, 2022; v1 submitted 14 March, 2022; originally announced March 2022.

    Comments: Accepted for Information Fusion

  5. arXiv:2106.15329  [pdf, other

    cs.CV

    Cloud based Scalable Object Recognition from Video Streams using Orientation Fusion and Convolutional Neural Networks

    Authors: Muhammad Usman Yaseen, Ashiq Anjum, Giancarlo Fortino, Antonio Liotta, Amir Hussain

    Abstract: Object recognition from live video streams comes with numerous challenges such as the variation in illumination conditions and poses. Convolutional neural networks (CNNs) have been widely used to perform intelligent visual object recognition. Yet, CNNs still suffer from severe accuracy degradation, particularly on illumination-variant datasets. To address this problem, we propose a new CNN method… ▽ More

    Submitted 19 June, 2021; originally announced June 2021.

  6. Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review

    Authors: Mario Di Mauro, Giovanni Galatro, Giancarlo Fortino, Antonio Liotta

    Abstract: Machine Learning (ML) techniques are becoming an invaluable support for network intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats. Typically, ML algorithms are exploited to classify/recognize data traffic on the basis of statistical features such as inter-arrival times, packets length distribution, mean number of flows, etc. Dealing with the vast diversit… ▽ More

    Submitted 11 April, 2021; originally announced April 2021.

    Journal ref: Engineering Applications of Artificial Intelligence Volume 101, May 2021, 104216

  7. Correlation analysis of node and edge centrality measures in artificial complex networks

    Authors: Annamaria Ficara, Giacomo Fiumara, Pasquale De Meo, Antonio Liotta

    Abstract: The importance of a node in a social network is identified through a set of measures called centrality. Degree centrality, closeness centrality, betweenness centrality and clustering coefficient are the most frequently used metrics to compute node centrality. Their computational complexity in some cases makes unfeasible, when not practically impossible, their computations. For this reason we focus… ▽ More

    Submitted 5 August, 2021; v1 submitted 9 March, 2021; originally announced March 2021.

    Journal ref: Proceedings of Sixth International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems, vol 216. Springer, Singapore (2021)

  8. arXiv:2103.02504  [pdf, ps, other

    cs.SI physics.soc-ph

    Graph and Network Theory for the analysis of Criminal Networks

    Authors: Lucia Cavallaro, Ovidiu Bagdasar, Pasquale De Meo, Giacomo Fiumara, Antonio Liotta

    Abstract: Social Network Analysis is the use of Network and Graph Theory to study social phenomena, which was found to be highly relevant in areas like Criminology. This chapter provides an overview of key methods and tools that may be used for the analysis of criminal networks, which are presented in a real-world case study. Starting from available juridical acts, we have extracted data on the interactions… ▽ More

    Submitted 4 March, 2021; v1 submitted 3 March, 2021; originally announced March 2021.

    Comments: 13 pages, 4 figures. In: Data Science and Internet of Things. Springer, Cham. (2021)

  9. Criminal Networks Analysis in Missing Data scenarios through Graph Distances

    Authors: Annamaria Ficara, Lucia Cavallaro, Francesco Curreri, Giacomo Fiumara, Pasquale De Meo, Ovidiu Bagdasar, Wei Song, Antonio Liotta

    Abstract: Data collected in criminal investigations may suffer from: (i) incompleteness, due to the covert nature of criminal organisations; (ii) incorrectness, caused by either unintentional data collection errors and intentional deception by criminals; (iii) inconsistency, when the same information is collected into law enforcement databases multiple times, or in different formats. In this paper we analys… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

    Comments: 18 pages, 4 figures, submitted to PLoS ONE Journal

    Journal ref: PLOS ONE 16(8):1-18. 2021

  10. Correlations among Game of Thieves and other centrality measures in complex networks

    Authors: Annamaria Ficara, Giacomo Fiumara, Pasquale De Meo, Antonio Liotta

    Abstract: Social Network Analysis (SNA) is used to study the exchange of resources among individuals, groups, or organizations. The role of individuals or connections in a network is described by a set of centrality metrics which represent one of the most important results of SNA. Degree, closeness, betweenness and clustering coefficient are the most used centrality measures. Their use is, however, severely… ▽ More

    Submitted 23 December, 2020; originally announced December 2020.

    Journal ref: Data Science and Internet of Things, pp 43-62, Springer International Publishing (2021)

  11. Smart Anomaly Detection in Sensor Systems: A Multi-Perspective Review

    Authors: L. Erhan, M. Ndubuaku, M. Di Mauro, W. Song, M. Chen, G. Fortino, O. Bagdasar, A. Liotta

    Abstract: Anomaly detection is concerned with identifying data patterns that deviate remarkably from the expected behaviour. This is an important research problem, due to its broad set of application domains, from data analysis to e-health, cybersecurity, predictive maintenance, fault prevention, and industrial automation. Herein, we review state-of-the-art methods that may be employed to detect anomalies i… ▽ More

    Submitted 31 October, 2020; v1 submitted 27 October, 2020; originally announced October 2020.

  12. Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: a Queueing Networks Approach

    Authors: Mario Di Mauro, Antonio Liotta

    Abstract: The Next Generation 5G Networks can greatly benefit from the synergy between virtualization paradigms, such as the Network Function Virtualization (NFV), and service provisioning platforms such as the IP Multimedia Subsystem (IMS). The NFV concept is evolving towards a lightweight solution based on containers that, by contrast to classic virtual machines, do not carry a whole operating system and… ▽ More

    Submitted 28 September, 2020; originally announced September 2020.

  13. An experimental evaluation and characterization of VoIP over an LTE-A network

    Authors: Mario Di Mauro, Antonio Liotta

    Abstract: Mobile telecommunications are converging towards all-IP solutions. This is the case of the Long Term Evolution (LTE) technology that, having no circuit-switched bearer to support voice traffic, needs a dedicated VoIP infrastructure, which often relies on the IP Multimedia Subsystem architecture. Most telecom operators implement LTE-A, an advanced version of LTE often marketed as 4G+, which achieve… ▽ More

    Submitted 26 September, 2020; originally announced September 2020.

    Comments: Data available at: https://www.researchgate.net/publication/342276809_DATASETS

    Journal ref: IEEE Transactions on Network and Service Management, vol. 17, no. 3, pp. 1626-1639, Sept. 2020

  14. Experimental Review of Neural-based approaches for Network Intrusion Management

    Authors: Mario Di Mauro, Giovanni Galatro, Antonio Liotta

    Abstract: The use of Machine Learning (ML) techniques in Intrusion Detection Systems (IDS) has taken a prominent role in the network security management field, due to the substantial number of sophisticated attacks that often pass undetected through classic IDSs. These are typically aimed at recognising attacks based on a specific signature, or at detecting anomalous events. However, deterministic, rule-bas… ▽ More

    Submitted 18 September, 2020; originally announced September 2020.

    Comments: Early Access on IEEE Transactions on Network and Service Management

  15. Network connectivity under a probabilistic node failure model

    Authors: Lucia Cavallaro, Stefania Costantini, Pasquale De Meo, Antonio Liotta, Giovanni Stilo

    Abstract: Centrality metrics have been widely applied to identify the nodes in a graph whose removal is effective in decomposing the graph into smaller sub-components. The node--removal process is generally used to test network robustness against failures. Most of the available studies assume that the node removal task is always successful. Yet, we argue that this assumption is unrealistic. Indeed, the remo… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

    Comments: 16 pages, 36 figures, submitted to IEEE Transaction

    Journal ref: IEEE Trans. on Network Science and Engineering (2022) 1-18

  16. Disrupting Resilient Criminal Networks through Data Analysis: The case of Sicilian Mafia

    Authors: Lucia Cavallaro, Annamaria Ficara, Pasquale De Meo, Giacomo Fiumara, Salvatore Catanese, Ovidiu Bagdasar, Antonio Liotta

    Abstract: Compared to other types of social networks, criminal networks present hard challenges, due to their strong resilience to disruption, which poses severe hurdles to law-enforcement agencies. Herein, we borrow methods and tools from Social Network Analysis to (i) unveil the structure of Sicilian Mafia gangs, based on two real-world datasets, and (ii) gain insights as to how to efficiently disrupt the… ▽ More

    Submitted 10 March, 2020; originally announced March 2020.

    Comments: 12 pages, 4 figures, paper submitted to PLOS ONE Journal

    Journal ref: PLoS ONE 15(8): e0236476 (2020)

  17. arXiv:1907.03246  [pdf

    eess.IV cs.CV cs.MM

    An Experimental-based Review of Image Enhancement and Image Restoration Methods for Underwater Imaging

    Authors: Yan Wang, Wei Song, Giancarlo Fortino, Lizhe Qi, Wenqiang Zhang, Antonio Liotta

    Abstract: Underwater images play a key role in ocean exploration, but often suffer from severe quality degradation due to light absorption and scattering in water medium. Although major breakthroughs have been made recently in the general area of image enhancement and restoration, the applicability of new methods for improving the quality of underwater images has not specifically been captured. In this pape… ▽ More

    Submitted 7 July, 2019; originally announced July 2019.

    Comments: 19

  18. arXiv:1906.08673  [pdf

    eess.IV cs.MM

    Enhancement of Underwater Images with Statistical Model of Background Light and Optimization of Transmission Map

    Authors: Wei Song, Yan Wang, Dongmei Huang, Antonio Liotta, Cristian Perra

    Abstract: Underwater images often have severe quality degradation and distortion due to light absorption and scattering in the water medium. A hazed image formation model is widely used to restore the image quality. It depends on two optical parameters: the background light and the transmission map. Underwater images can also be enhanced by color and contrast correction from the perspective of image process… ▽ More

    Submitted 19 June, 2019; originally announced June 2019.

    Comments: 17 pages

  19. arXiv:1707.05878  [pdf, other

    cs.LG cs.AI math.OC

    On-line Building Energy Optimization using Deep Reinforcement Learning

    Authors: Elena Mocanu, Decebal Constantin Mocanu, Phuong H. Nguyen, Antonio Liotta, Michael E. Webber, Madeleine Gibescu, J. G. Slootweg

    Abstract: Unprecedented high volumes of data are becoming available with the growth of the advanced metering infrastructure. These are expected to benefit planning and operation of the future power system, and to help the customers transition from a passive to an active role. In this paper, we explore for the first time in the smart grid context the benefits of using Deep Reinforcement Learning, a hybrid ty… ▽ More

    Submitted 18 July, 2017; originally announced July 2017.

  20. Scalable Training of Artificial Neural Networks with Adaptive Sparse Connectivity inspired by Network Science

    Authors: Decebal Constantin Mocanu, Elena Mocanu, Peter Stone, Phuong H. Nguyen, Madeleine Gibescu, Antonio Liotta

    Abstract: Through the success of deep learning in various domains, artificial neural networks are currently among the most used artificial intelligence methods. Taking inspiration from the network properties of biological neural networks (e.g. sparsity, scale-freeness), we argue that (contrary to general practice) artificial neural networks, too, should not have fully-connected layers. Here we propose spars… ▽ More

    Submitted 20 June, 2018; v1 submitted 15 July, 2017; originally announced July 2017.

    Comments: 18 pages

    Journal ref: Nature Communications, 2018

  21. arXiv:1610.05555  [pdf, other

    cs.LG cs.NE

    Online Contrastive Divergence with Generative Replay: Experience Replay without Storing Data

    Authors: Decebal Constantin Mocanu, Maria Torres Vega, Eric Eaton, Peter Stone, Antonio Liotta

    Abstract: Conceived in the early 1990s, Experience Replay (ER) has been shown to be a successful mechanism to allow online learning algorithms to reuse past experiences. Traditionally, ER can be applied to all machine learning paradigms (i.e., unsupervised, supervised, and reinforcement learning). Recently, ER has contributed to improving the performance of deep reinforcement learning. Yet, its application… ▽ More

    Submitted 18 October, 2016; originally announced October 2016.

  22. arXiv:1604.07322  [pdf, other

    cs.MM cs.AI

    Predictive No-Reference Assessment of Video Quality

    Authors: Maria Torres Vega, Decebal Constantin Mocanu, Antonio Liotta

    Abstract: Among the various means to evaluate the quality of video streams, No-Reference (NR) methods have low computation and may be executed on thin clients. Thus, NR algorithms would be perfect candidates in cases of real-time quality assessment, automated quality control and, particularly, in adaptive mobile streaming. Yet, existing NR approaches are often inaccurate, in comparison to Full-Reference (FR… ▽ More

    Submitted 27 April, 2016; v1 submitted 25 April, 2016; originally announced April 2016.

    Comments: 13 pages, 8 figures, IEEE Selected Topics on Signal Processing

  23. A topological insight into restricted Boltzmann machines

    Authors: Decebal Constantin Mocanu, Elena Mocanu, Phuong H. Nguyen, Madeleine Gibescu, Antonio Liotta

    Abstract: Restricted Boltzmann Machines (RBMs) and models derived from them have been successfully used as basic building blocks in deep artificial neural networks for automatic features extraction, unsupervised weights initialization, but also as density estimators. Thus, their generative and discriminative capabilities, but also their computational time are instrumental to a wide range of applications. Ou… ▽ More

    Submitted 18 July, 2016; v1 submitted 20 April, 2016; originally announced April 2016.

    Comments: http://link.springer.com/article/10.1007/s10994-016-5570-z, Machine Learning, issn=1573-0565, 2016

  24. Estimating 3D Trajectories from 2D Projections via Disjunctive Factored Four-Way Conditional Restricted Boltzmann Machines

    Authors: Decebal Constantin Mocanu, Haitham Bou Ammar, Luis Puig, Eric Eaton, Antonio Liotta

    Abstract: Estimation, recognition, and near-future prediction of 3D trajectories based on their two dimensional projections available from one camera source is an exceptionally difficult problem due to uncertainty in the trajectories and environment, high dimensionality of the specific trajectory states, lack of enough labeled data and so on. In this article, we propose a solution to solve this problem base… ▽ More

    Submitted 29 April, 2017; v1 submitted 20 April, 2016; originally announced April 2016.

    Comments: Pattern Recognition, ISSN 0031-3203, Elsevier, 2017

  25. Relevance As a Metric for Evaluating Machine Learning Algorithms

    Authors: Aravind Kota Gopalakrishna, Tanir Ozcelebi, Antonio Liotta, Johan J. Lukkien

    Abstract: In machine learning, the choice of a learning algorithm that is suitable for the application domain is critical. The performance metric used to compare different algorithms must also reflect the concerns of users in the application domain under consideration. In this work, we propose a novel probability-based performance metric called Relevance Score for evaluating supervised learning algorithms.… ▽ More

    Submitted 8 April, 2013; v1 submitted 28 March, 2013; originally announced March 2013.

    Comments: To Appear at International Conference on Machine Learning and Data Mining (MLDM 2013), 14 pages, 6 figures