Skip to main content

Showing 1–50 of 109 results for author: Di, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.10543  [pdf, other

    cs.CR

    Characterizing Polkadot's Transactions Ecosystem: methodology, tools, and insights

    Authors: Maurantonio Caprolu, Roberto Di Pietro, Flavio Lombardi, Elia Onofri

    Abstract: The growth potential of a crypto(currency) project can be measured by the use cases spurred by the underlying technology. However, these projects are usually distributed, with a weak feedback schemes. Hence, a metric that is widely used as a proxy for their healthiness is the number of transactions and related volumes. Nevertheless, such a metric can be subject to manipulation (the crypto market b… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

  2. arXiv:2403.08944  [pdf

    cs.GT cs.AI cs.CY econ.TH

    Language-based game theory in the age of artificial intelligence

    Authors: Valerio Capraro, Roberto Di Paolo, Matjaz Perc, Veronica Pizziol

    Abstract: Understanding human behaviour in decision problems and strategic interactions has wide-ranging applications in economics, psychology, and artificial intelligence. Game theory offers a robust foundation for this understanding, based on the idea that individuals aim to maximize a utility function. However, the exact factors influencing strategy choices remain elusive. While traditional models try to… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

    Journal ref: Journal of the Royal Society Interface 21, 20230720 (2024)

  3. arXiv:2403.05876  [pdf, other

    physics.soc-ph cs.CY

    The rise and fall of WallStreetBets: social roles and opinion leaders across the GameStop saga

    Authors: Anna Mancini, Antonio Desiderio, Giovanni Palermo, Riccardo Di Clemente, Giulio Cimini

    Abstract: Nowadays human interactions largely take place on social networks, with online users' behavior often falling into a few general typologies or "social roles". Among these, opinion leaders are of crucial importance as they have the ability to spread an idea or opinion on a large scale across the network, with possible tangible consequences in the real world. In this work we extract and characterize… ▽ More

    Submitted 9 March, 2024; originally announced March 2024.

    Comments: main text: 15 pages, 4 figures. supplementary materials: 15 pages, 12 figures

  4. arXiv:2403.01470  [pdf, other

    cs.CV

    Is in-domain data beneficial in transfer learning for landmarks detection in x-ray images?

    Authors: Roberto Di Via, Matteo Santacesaria, Francesca Odone, Vito Paolo Pastore

    Abstract: In recent years, deep learning has emerged as a promising technique for medical image analysis. However, this application domain is likely to suffer from a limited availability of large public datasets and annotations. A common solution to these challenges in deep learning is the usage of a transfer learning framework, typically with a fine-tuning protocol, where a large-scale source dataset is us… ▽ More

    Submitted 3 March, 2024; originally announced March 2024.

    Comments: Accepted to ISBI 2024

  5. arXiv:2402.11987  [pdf, other

    cs.LO

    Type Isomorphisms for Multiplicative-Additive Linear Logic

    Authors: RĂ©mi Di Guardia, Olivier Laurent

    Abstract: We characterize type isomorphisms in the multiplicative-additive fragment of linear logic (MALL), and thus in *-autonomous categories with finite products, extending a result for the multiplicative fragment by Balat and Di Cosmo. This yields a much richer equational theory involving distributivity and cancellation laws. The unit-free case is obtained by relying on the proof-net syntax introduced b… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

  6. arXiv:2312.16781  [pdf, other

    cs.IT eess.SP

    Study of Adaptive LLR-based AP selection for Grant-Free Random Access in Cell-Free Networks

    Authors: R. Di Renna, R. C. de Lamare

    Abstract: This paper presents an iterative detection and decoding scheme along with an adaptive strategy to improve the selection of access points (APs) in a grant-free uplink cell-free scenario. With the requirement for the APs to have low-computational power in mind, we introduce a low-complexity scheme for local activity and data detection. At the central processing unit (CPU) level, we propose an adapti… ▽ More

    Submitted 27 December, 2023; originally announced December 2023.

    Comments: 3 figures, 8 pages

  7. arXiv:2312.15528  [pdf, other

    cs.IT eess.SP

    Study of Iterative Detection and Decoding with Log-Likelihood Ratio Based Access Point Selection for Cell-Free Networks

    Authors: R. B. Di Renna, R. C. de Lamare

    Abstract: This paper proposes an iterative detection and decoding (IDD) scheme and an approach to improve the selection of access points (APs) in uplink cell-free massive multiple-antenna systems. A cost-effective scheme for selection of APs based on local log-likelihood ratios (LLRs) is developed that provides sufficient statistics to the central processing unit and selects which APs should be considered f… ▽ More

    Submitted 24 December, 2023; originally announced December 2023.

    Comments: 4 figures, 7 pages

  8. arXiv:2311.10045  [pdf, other

    physics.soc-ph cond-mat.dis-nn cs.SI nlin.AO

    Spontaneous Opinion Swings in the Voter Model with Latency

    Authors: Giovanni Palermo, Anna Mancini, Antonio Desiderio, Riccardo Di Clemente, Giulio Cimini

    Abstract: The cognitive process of opinion formation is often characterized by stubbornness or resistance of agents to changes of opinion. To capture such a feature we introduce a constant latency time in the standard voter model of opinion dynamics: after switching opinion, an agent must keep it for a while. This seemingly simple modification drastically changes the stochastic diffusive behavior of the ori… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

  9. The Software Heritage Open Science Ecosystem

    Authors: Roberto Di Cosmo, Stefano Zacchiroli

    Abstract: Software Heritage is the largest public archive of software source code and associated development history, as captured by modern version control systems. As of July 2023, it has archived more than 16 billion unique source code files coming from more than 250 million collaborative development projects. In this chapter, we describe the Software Heritage ecosystem, focusing on research and open scie… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

    Journal ref: Software Ecosystems, Springer International Publishing, pp.33-61, 2023

  10. arXiv:2309.17294  [pdf, other

    physics.soc-ph cs.CY

    Time-space dynamics of income segregation: a case study of Milan's neighbourhoods

    Authors: Lavinia Rossi Mori, Vittorio Loreto, Riccardo Di Clemente

    Abstract: Traditional approaches to urban income segregation focus on static residential patterns, often failing to capture the dynamic nature of social mixing at the neighborhood level. Leveraging high-resolution location-based data from mobile phones, we capture the interplay of three different income groups (high, medium, low) based on their daily routines. We propose a three-dimensional space to analyze… ▽ More

    Submitted 28 February, 2024; v1 submitted 29 September, 2023; originally announced September 2023.

  11. arXiv:2308.10598  [pdf, other

    eess.SP cs.OH

    Inferring Power Grid Information with Power Line Communications: Review and Insights

    Authors: Abdulah Jarouf, Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro

    Abstract: High-frequency signals were widely studied in the last decade to identify grid and channel conditions in PLNs. PLMs operating on the grid's physical layer are capable of transmitting such signals to infer information about the grid. Hence, PLC is a suitable communication technology for SG applications, especially suited for grid monitoring and surveillance. In this paper, we provide several contri… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: IEEE Communication Surveys and Tutorials Journal

  12. arXiv:2307.12776  [pdf

    econ.GN cs.AI cs.CY cs.GT

    Assessing Large Language Models' ability to predict how humans balance self-interest and the interest of others

    Authors: Valerio Capraro, Roberto Di Paolo, Veronica Pizziol

    Abstract: Generative artificial intelligence (AI) holds enormous potential to revolutionize decision-making processes, from everyday to high-stake scenarios. By leveraging generative AI, humans can benefit from data-driven insights and predictions, enhancing their ability to make informed decisions that consider a wide array of factors and potential outcomes. However, as many decisions carry social implicat… ▽ More

    Submitted 16 February, 2024; v1 submitted 21 July, 2023; originally announced July 2023.

  13. arXiv:2307.12643  [pdf, other

    cs.NI cs.ET eess.SP

    Expanding Boundaries: Cross-Media Routing for Seamless Underwater and Aerial Communication

    Authors: Waqas Aman, Flavio Giorgi, Giulio Attenni, Saif Al-Kuwari, Elmehdi Illi, Marwa Qaraqe, Gaia Maselli, Roberto Di Pietro

    Abstract: The colossal evolution of wireless communication technologies over the past few years has driven increased interest in its integration in a variety of less-explored environments, such as the underwater medium. In this magazine paper, we present a comprehensive discussion on a novel concept of routing protocol known as cross-media routing, incorporating the marine and aerial interfaces. In this reg… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

    Comments: Submitted to IEEE Communications Magazine

  14. arXiv:2307.05812  [pdf, ps, other

    eess.SY cs.LG

    Safe Reinforcement Learning for Strategic Bidding of Virtual Power Plants in Day-Ahead Markets

    Authors: Ognjen Stanojev, Lesia Mitridati, Riccardo de Nardis di Prata, Gabriela Hug

    Abstract: This paper presents a novel safe reinforcement learning algorithm for strategic bidding of Virtual Power Plants (VPPs) in day-ahead electricity markets. The proposed algorithm utilizes the Deep Deterministic Policy Gradient (DDPG) method to learn competitive bidding policies without requiring an accurate market model. Furthermore, to account for the complex internal physical constraints of VPPs we… ▽ More

    Submitted 12 September, 2023; v1 submitted 11 July, 2023; originally announced July 2023.

  15. arXiv:2306.14735  [pdf, other

    physics.soc-ph cs.CY cs.SI

    Recurring patterns in online social media interactions during highly engaging events

    Authors: Antonio Desiderio, Anna Mancini, Giulio Cimini, Riccardo Di Clemente

    Abstract: People nowadays express their opinions in online spaces, using different forms of interactions such as posting, sharing and discussing with one another. These digital traces allow to capture how people dynamically react to the myriad of events occurring in the world. By unfolding the structure of Reddit conversations, we describe how highly engaging events happening in the society affect user inte… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

  16. arXiv:2306.12161  [pdf, other

    cs.LG cs.AI cs.CR

    Adversarial Attacks Neutralization via Data Set Randomization

    Authors: Mouna Rabhi, Roberto Di Pietro

    Abstract: Adversarial attacks on deep-learning models pose a serious threat to their reliability and security. Existing defense mechanisms are narrow addressing a specific type of attack or being vulnerable to sophisticated attacks. We propose a new defense mechanism that, while being focused on image-based classifiers, is general with respect to the cited category. It is rooted on hyperspace projection. In… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

  17. arXiv:2304.12840  [pdf, other

    physics.soc-ph cs.CY

    Spatiotemporal gender differences in urban vibrancy

    Authors: Thomas Collins, Riccardo Di Clemente, Mario Gutiérrez-Roig, Federico Botta

    Abstract: Urban vibrancy is the dynamic activity of humans in urban locations. It can vary with urban features and the opportunities for human interactions, but it might also differ according to the underlying social conditions of city inhabitants across and within social surroundings. Such heterogeneity in how different demographic groups may experience cities has the potential to cause gender segregation… ▽ More

    Submitted 11 October, 2023; v1 submitted 25 April, 2023; originally announced April 2023.

    Comments: 20 pages, 10 figures: 1 figure and 1 table in main, 7 figures in supplementary material, 3 tables in supplementary material. Submitted to Environment and Planning B: Urban Analytics and City Science special issue on Spatial Inequalities and Cities

    Journal ref: Environment and Planning B: Urban Analytics and City Science (2023)

  18. arXiv:2303.17251  [pdf, other

    cs.SI cs.AI cs.CY cs.LG

    Demystifying Misconceptions in Social Bots Research

    Authors: Stefano Cresci, Kai-Cheng Yang, Angelo Spognardi, Roberto Di Pietro, Filippo Menczer, Marinella Petrocchi

    Abstract: Research on social bots aims at advancing knowledge and providing solutions to one of the most debated forms of online manipulation. Yet, social bot research is plagued by widespread biases, hyped results, and misconceptions that set the stage for ambiguities, unrealistic expectations, and seemingly irreconcilable findings. Overcoming such issues is instrumental towards ensuring reliable solutions… ▽ More

    Submitted 27 March, 2024; v1 submitted 30 March, 2023; originally announced March 2023.

  19. arXiv:2210.12906  [pdf, other

    cs.IT

    Iterative Detection and Decoding for Cell-Free Massive Multiuser MIMO with LDPC Codes

    Authors: T. Ssettumba, R. Di Renna, L. Landau, R. C. de Lamare

    Abstract: This paper proposes an iterative detection and decoding (IDD) scheme for a cell free massive multiple input multiple output (CF-mMIMO) system. Users send coded data to the access points (APs), which is jointly detected at central processing unit (CPU). The symbols are exchanged iteratively in the form of log likelihood ratios (LLRs) between the detector and the low-density parity check codes (LPDC… ▽ More

    Submitted 23 October, 2022; originally announced October 2022.

    Comments: 4 figures, 8 pages

  20. $A^2RID$ -- Anonymous Direct Authentication and Remote Identification of Commercial Drones

    Authors: Eva Wisse, Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro

    Abstract: The recent worldwide introduction of RemoteID (RID) regulations forces all Unmanned Aircrafts (UAs), a.k.a. drones, to broadcast in plaintext on the wireless channel their identity and real-time location, for accounting and monitoring purposes. Although improving drones' monitoring and situational awareness, the RID rule also generates significant privacy concerns for UAs' operators, threatened by… ▽ More

    Submitted 1 February, 2023; v1 submitted 21 October, 2022; originally announced October 2022.

  21. Characterizing the 2022 Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Preliminary Findings

    Authors: Maurantonio Caprolu, Alireza Sadighian, Roberto Di Pietro

    Abstract: Online social networks (OSNs) play a crucial role in today's world. On the one hand, they allow free speech, information sharing, and social-movements organization, to cite a few. On the other hand, they are the tool of choice to spread disinformation, hate speech, and to support propaganda. For these reasons, OSNs data mining and analysis aimed at detecting disinformation campaigns that may arm t… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

    Journal ref: 2023 32nd International Conference on Computer Communications and Networks (ICCCN)

  22. arXiv:2207.14128  [pdf, other

    cs.CR cs.SI

    Analysis of Polkadot: Architecture, Internals, and Contradictions

    Authors: Hanaa Abbas, Maurantonio Caprolu, Roberto Di Pietro

    Abstract: Polkadot is a network protocol launched in 2020 with the ambition of unlocking the full potential of blockchain technologies. Its novel multi-chain protocol allows arbitrary data to be transferred across heterogeneous blockchains, enabling the implementation of a wide range of novel use cases. The Polkadot architecture is based on the principles of sharding, which promises to solve scalability and… ▽ More

    Submitted 28 July, 2022; originally announced July 2022.

  23. arXiv:2207.02051  [pdf, other

    cs.CR

    Sanitization of Visual Multimedia Content: A Survey of Techniques, Attacks, and Future Directions

    Authors: Hanaa Abbas, Roberto Di Pietro

    Abstract: The exploding rate of multimedia publishing in our networked society has magnified the risk of sensitive information leakage and misuse, pushing the need to secure data against possible exposure. Data sanitization -- the process of obfuscating or removing sensitive content related to the data -- helps to mitigate the severe impact of potential security and privacy risks. This paper presents a revi… ▽ More

    Submitted 5 July, 2022; originally announced July 2022.

  24. arXiv:2206.03084  [pdf, other

    cs.SI

    Content Privacy Enforcement Models in Decentralized Online Social Networks: State of Play, Solutions, Limitations, and Future Directions

    Authors: Andrea De Salve, Paolo Mori, Laura Ricci, Roberto Di Pietro

    Abstract: In recent years, Decentralized Online Social Networks (DOSNs) have been attracting the attention of many users because they reduce the risk of censorship, surveillance, and information leakage from the service provider. In contrast to the most popular Online Social Networks, which are based on centralized architectures (e.g., Facebook, Twitter, or Instagram), DOSNs are not based on a single servic… ▽ More

    Submitted 7 June, 2022; originally announced June 2022.

  25. Metaverse: Security and Privacy Issues

    Authors: Roberto Di Pietro, Stefano Cresci

    Abstract: The metaverse promises a host of bright opportunities for business, economics, and society. Though, a number of critical aspects are still to be considered and the analysis of their impact is almost non-existent. In this paper, we provide several contributions. We start by analysing the foundations of the metaverse, later we focus on the novel privacy and security issues introduced by this new par… ▽ More

    Submitted 16 May, 2022; originally announced May 2022.

    Comments: The 3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS'21)

  26. arXiv:2202.11278  [pdf, other

    cs.IT

    Joint Channel Estimation, Activity Detection and Decoding using Dynamic Message-Scheduling for Machine-Type Communications

    Authors: R. B. Di Renna, R. C. de Lamare

    Abstract: In this work, we present a joint channel estimation, activity detection and data decoding scheme for massive machine-type communications. By including the channel and the a priori activity factor in the factor graph, we present the bilinear message-scheduling GAMP (BiMSGAMP), a message-passing solution that uses the channel decoder beliefs to refine the activity detection and data decoding. We inc… ▽ More

    Submitted 22 February, 2022; originally announced February 2022.

    Comments: 17 pages, 7 figures

  27. arXiv:2202.03899  [pdf, other

    cs.IT eess.SP

    Covert backscatter communication with directional MIMO

    Authors: Roberto Di Candia, Saneea Malik, Huseyin YiÄŸitler, Riku Jäntti

    Abstract: We study a backscatter communication protocol over a AWGN channel, where a transmitter illuminates a tag with a directional multi-antenna. The tag performs load modulation on the signal while hiding its physical presence from a warden. We show that, if the transmitter-to-tag channel is inaccessible to the warden, then $Θ(n)$ reliable and covert bits can be transmitted over $n$ channel usages. This… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

    Comments: 4 pages, 2 figures

  28. arXiv:2202.01828  [pdf, ps, other

    astro-ph.IM cs.DC

    Astronomical data organization, management and access in Scientific Data Lakes

    Authors: Y. G. Grange, V. N. Pandey, X. Espinal, R. Di Maria, A. P. Millar

    Abstract: The data volumes stored in telescope archives is constantly increasing due to the development and improvements in the instrumentation. Often the archives need to be stored over a distributed storage architecture, provided by independent compute centres. Such a distributed data archive requires overarching data management orchestration. Such orchestration comprises of tools which handle data storag… ▽ More

    Submitted 3 February, 2022; originally announced February 2022.

    Comments: 4 pages, 1 figure, to appear in the proceedings of Astronomical Data Analysis Software and Systems XXXI published by ASP

  29. arXiv:2201.06527  [pdf, other

    physics.soc-ph cs.CY

    COVID-19 is linked to changes in the time-space dimension of human mobility

    Authors: Clodomir Santana, Federico Botta, Hugo Barbosa, Filippo Privitera, Ronaldo Menezes, Riccardo Di Clemente

    Abstract: Socio-economic constructs and urban topology are crucial drivers of human mobility patterns. During the coronavirus disease 2019 pandemic, these patterns were reshaped in their components: the spatial dimension represented by the daily travelled distance, and the temporal dimension expressed as the synchronization time of commuting routines. Here, leveraging location-based data from de-identified… ▽ More

    Submitted 27 July, 2023; v1 submitted 17 January, 2022; originally announced January 2022.

    Comments: 29 pages, 14 figures. Peer-revied version: Santana, C., Botta, F., Barbosa, H. et al. COVID-19 is linked to changes in the time-space dimension of human mobility. Nat Hum Behav (2023)

    Journal ref: Nature Human Behaviour, 7, 1729-1739 (2023)

  30. Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges

    Authors: Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro

    Abstract: Satellite-based Communication systems are gaining renewed momentum in Industry and Academia, thanks to innovative services introduced by leading tech companies and the promising impact they can deliver towards the global connectivity objective tackled by early 6G initiatives. On the one hand, the emergence of new manufacturing processes and radio technologies promises to reduce service costs while… ▽ More

    Submitted 29 July, 2022; v1 submitted 21 December, 2021; originally announced December 2021.

    Comments: 72 pages

  31. arXiv:2112.07059  [pdf, other

    physics.soc-ph cond-mat.dis-nn cs.SI nlin.AO

    Self-induced consensus of Reddit users to characterise the GameStop short squeeze

    Authors: Anna Mancini, Antonio Desiderio, Riccardo Di Clemente, Giulio Cimini

    Abstract: The short squeeze of GameStop (GME) shares in mid-January 2021 has been primarily orchestrated by retail investors of the Reddit r/wallstreetbets community. As such, it represents a paramount example of collective coordination action on social media, resulting in large-scale consensus formation and significant market impact. In this work we characterise the structure and time evolution of Reddit c… ▽ More

    Submitted 8 August, 2022; v1 submitted 13 December, 2021; originally announced December 2021.

    Journal ref: Scientific Reports, 12(1):13780, 2022

  32. arXiv:2110.13432  [pdf

    eess.IV cs.CV

    Deep Learning-based Segmentation of Cerebral Aneurysms in 3D TOF-MRA using Coarse-to-Fine Framework

    Authors: Meng Chen, Chen Geng, Dongdong Wang, Jiajun Zhang, Ruoyu Di, Fengmei Li, Zhiyong Zhou, Sirong Piao, Yuxin Li, Yaikang Dai

    Abstract: BACKGROUND AND PURPOSE: Cerebral aneurysm is one of the most common cerebrovascular diseases, and SAH caused by its rupture has a very high mortality and disability rate. Existing automatic segmentation methods based on DLMs with TOF-MRA modality could not segment edge voxels very well, so that our goal is to realize more accurate segmentation of cerebral aneurysms in 3D TOF-MRA with the help of D… ▽ More

    Submitted 26 October, 2021; originally announced October 2021.

  33. arXiv:2110.13367  [pdf

    eess.IV cs.CV

    An Automatic Detection Method Of Cerebral Aneurysms In Time-Of-Flight Magnetic Resonance Angiography Images Based On Attention 3D U-Net

    Authors: Chen Geng, Meng Chen, Ruoyu Di, Dongdong Wang, Liqin Yang, Wei Xia, Yuxin Li, Daoying Geng

    Abstract: Background:Subarachnoid hemorrhage caused by ruptured cerebral aneurysm often leads to fatal consequences.However,if the aneurysm can be found and treated during asymptomatic periods,the probability of rupture can be greatly reduced.At present,time-of-flight magnetic resonance angiography is one of the most commonly used non-invasive screening techniques for cerebral aneurysm,and the application o… ▽ More

    Submitted 25 October, 2021; originally announced October 2021.

  34. arXiv:2110.06510  [pdf, other

    cs.CL cs.AI cs.CV cs.LG quant-ph

    The Dawn of Quantum Natural Language Processing

    Authors: Riccardo Di Sipio, Jia-Hong Huang, Samuel Yen-Chi Chen, Stefano Mangini, Marcel Worring

    Abstract: In this paper, we discuss the initial attempts at boosting understanding human language based on deep-learning models with quantum computing. We successfully train a quantum-enhanced Long Short-Term Memory network to perform the parts-of-speech tagging task via numerical simulations. Moreover, a quantum-enhanced Transformer is proposed to perform the sentiment analysis based on the existing datase… ▽ More

    Submitted 13 October, 2021; originally announced October 2021.

  35. arXiv:2108.02595  [pdf, other

    cs.CY physics.data-an stat.AP

    R\&D evaluation methodology based on group-AHP with uncertainty

    Authors: Alberto Garinei, Emanuele Piccioni, Massimiliano Proietti, Andrea Marini, Stefano Speziali, Marcello Marconi, Raffaella Di Sante, Sara Casaccia, Paolo Castellini, Milena Martarelli, Nicola Paone, Gian Marco Revel, Lorenzo Scalise, Marco Arnesano, Paolo Chiariotti, Roberto Montanini, Antonino Quattrocchi, Sergio Silvestri, Giorgio Ficco, Emanuele Rizzuto, Andrea Scorza, Matteo Lancini, Gianluca Rossi, Roberto Marsili, Emanuele Zappa , et al. (3 additional authors not shown)

    Abstract: In this paper, we present an approach to evaluate Research \& Development (R\&D) performance based on the Analytic Hierarchy Process (AHP) method. Through a set of questionnaires submitted to a team of experts, we single out a set of indicators needed for R\&D performance evaluation. The indicators, together with the corresponding criteria, form the basic hierarchical structure of the AHP method.… ▽ More

    Submitted 22 November, 2021; v1 submitted 5 August, 2021; originally announced August 2021.

    Comments: 13 pages, 2 figures

  36. arXiv:2107.14297  [pdf, other

    cs.CY cs.SI physics.soc-ph

    Mobilkit: A Python Toolkit for Urban Resilience and Disaster Risk Management Analytics using High Frequency Human Mobility Data

    Authors: Enrico Ubaldi, Takahiro Yabe, Nicholas K. W. Jones, Maham Faisal Khan, Satish V. Ukkusuri, Riccardo Di Clemente, Emanuele Strano

    Abstract: Increasingly available high-frequency location datasets derived from smartphones provide unprecedented insight into trajectories of human mobility. These datasets can play a significant and growing role in informing preparedness and response to natural disasters. However, limited tools exist to enable rapid analytics using mobility data, and tend not to be tailored specifically for disaster risk m… ▽ More

    Submitted 16 September, 2021; v1 submitted 29 July, 2021; originally announced July 2021.

    Comments: 3 pages, 1 figure, KDD KDD Workshop on Data-driven Humanitarian Map**, 27th ACM SIGKDD Conference

    ACM Class: J.2

    Journal ref: Journal of Open Source Software, 9(95), 5201, 2024

  37. arXiv:2107.03832  [pdf, other

    cs.CR

    Serverless Computing: A Security Perspective

    Authors: Eduard Marin, Diego Perino, Roberto Di Pietro

    Abstract: Serverless Computing is a virtualisation-related paradigm that promises to simplify application management and to solve the last challenges in the field: scale down and easy to use. The implied cost reduction, coupled with a simplified management of underlying applications, are expected to further push the adoption of virtualisation-based solutions, including cloud-computing or telco-cloud solutio… ▽ More

    Submitted 27 January, 2022; v1 submitted 8 July, 2021; originally announced July 2021.

  38. arXiv:2106.06978  [pdf, other

    cs.IT eess.SP

    Study of Joint Activity Detection and Channel Estimation Based on Message Passing with RBP Scheduling for MTC

    Authors: R. B. Di Renna, R. C. de Lamare

    Abstract: In this work, based on the hybrid generalized approximate message passing (HyGAMP) algorithm, we propose the message-scheduling GAMP (MSGAMP) algorithm in order to address the problem of joint active device detection and channel estimation in an uplink grant-free massive MIMO system scenario. In MSGAMP, we apply three different scheduling techniques based on the Residual Belief Propagation (RBP) i… ▽ More

    Submitted 13 June, 2021; originally announced June 2021.

    Comments: 6 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:2103.04486

  39. arXiv:2103.09459  [pdf, other

    cs.CR

    A Novel Framework for the Analysis of Unknown Transactions in Bitcoin: Theory, Model, and Experimental Results

    Authors: Maurantonio Caprolu, Matteo Pontecorvi, Matteo Signorini, Carlos Segarra, Roberto Di Pietro

    Abstract: Bitcoin (BTC) is probably the most transparent payment network in the world, thanks to the full history of transactions available to the public. Though, Bitcoin is not a fully anonymous environment, rather a pseudonymous one, accounting for a number of attempts to beat its pseudonimity using clustering techniques. There is, however, a recurring assumption in all the cited deanonymization technique… ▽ More

    Submitted 17 March, 2021; originally announced March 2021.

  40. Privacy-Preserving and Sustainable Contact Tracing Using Batteryless Bluetooth Low-Energy Beacons

    Authors: Pietro Tedeschi, Kang Eun Jeon, James She, Simon Wong, Spiridon Bakiras, Roberto Di Pietro

    Abstract: Contact tracing is the techno-choice of reference to address the COVID-19 pandemic. Many of the current approaches have severe privacy and security issues and fail to offer a sustainable contact tracing infrastructure. We address these issues introducing an innovative, privacy-preserving, sustainable, and experimentally tested architecture that leverages batteryless BLE beacons.

    Submitted 21 December, 2021; v1 submitted 10 March, 2021; originally announced March 2021.

    Comments: 8 pages

  41. arXiv:2103.04486  [pdf, other

    cs.IT eess.SP

    Dynamic Message Scheduling With Activity-Aware Residual Belief Propagation for Asynchronous mMTC Systems

    Authors: R. B. Di Renna, R. C. de Lamare

    Abstract: In this letter, we propose a joint active device detection and channel estimation framework based on factor graphs for asynchronous uplink grant-free massive multiple-antenna systems. We then develop the message-scheduling GAMP (MSGAMP) algorithm to perform joint active device detection and channel estimation. In MSGAMP we apply scheduling techniques based on the residual belief propagation (RBP)… ▽ More

    Submitted 7 March, 2021; originally announced March 2021.

    Comments: 5 figures, 2 tables, 6 pages

  42. arXiv:2102.01832  [pdf

    cs.NE cs.DB cs.SE

    Optimization meets Big Data: A survey

    Authors: Ricardo Di Pasquale, Javier Marenco

    Abstract: This paper reviews recent advances in big data optimization, providing the state-of-art of this emerging field. The main focus in this review are optimization techniques being applied in big data analysis environments. Integer linear programming, coordinate descent methods, alternating direction method of multipliers, simulation optimization and metaheuristics like evolutionary and genetic algorit… ▽ More

    Submitted 2 February, 2021; originally announced February 2021.

    Comments: 8 pages, 3 figures, IEEE CEC DSO 2017

  43. arXiv:2102.01830  [pdf, other

    cs.NE stat.AP

    Machine learning for improving performance in an evolutionary algorithm for minimum path with uncertain costs given by massively simulated scenarios

    Authors: Ricardo Di Pasquale, Javier Marenco

    Abstract: In this work we introduce an implementation for which machine learning techniques helped improve the overall performance of an evolutionary algorithm for an optimization problem, namely a variation of robust minimum-cost path in graphs. In this big data optimization problem, a path achieving a good cost in most scenarios from an available set of scenarios (generated by a simulation process) must b… ▽ More

    Submitted 2 February, 2021; originally announced February 2021.

    Comments: 6 pages, 7 figures, IEEE IJCAI DSO 2020

  44. Dependency Solving Is Still Hard, but We Are Getting Better at It

    Authors: Pietro Abate, Roberto Di Cosmo, Georgios Gousios, Stefano Zacchiroli

    Abstract: Dependency solving is a hard (NP-complete) problem in all non-trivial component models due to either mutually incompatible versions of the same packages or explicitly declared package conflicts. As such, software upgrade planning needs to rely on highly specialized dependency solvers, lest falling into pitfalls such as incompleteness-a combination of package versions that satisfy dependency constr… ▽ More

    Submitted 16 November, 2020; originally announced November 2020.

    Journal ref: 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER), Feb 2020, London, Canada. pp.547-551

  45. SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol

    Authors: Pietro Tedeschi, Spiridon Bakiras, Roberto Di Pietro

    Abstract: A plethora of contact tracing apps have been developed and deployed in several countries around the world in the battle against Covid-19. However, people are rightfully concerned about the security and privacy risks of such applications. To this end, the contribution of this work is twofold. First, we present an in-depth analysis of the security and privacy characteristics of the most prominent co… ▽ More

    Submitted 12 January, 2021; v1 submitted 14 November, 2020; originally announced November 2020.

  46. arXiv:2010.13778  [pdf

    physics.ed-ph cs.ET cs.GL quant-ph

    Achieving a quantum smart workforce

    Authors: Clarice D. Aiello, D. D. Awschalom, Hannes Bernien, Tina Brower-Thomas, Kenneth R. Brown, Todd A. Brun, Justin R. Caram, Eric Chitambar, Rosa Di Felice, Michael F. J. Fox, Stephan Haas, Alexander W. Holleitner, Eric R. Hudson, Jeffrey H. Hunt, Robert Joynt, Scott Koziol, H. J. Lewandowski, Douglas T. McClure, Jens Palsberg, Gina Passante, Kristen L. Pudenz, Christopher J. K. Richardson, Jessica L. Rosenberg, R. S. Ross, Mark Saffman , et al. (7 additional authors not shown)

    Abstract: Interest in building dedicated Quantum Information Science and Engineering (QISE) education programs has greatly expanded in recent years. These programs are inherently convergent, complex, often resource intensive and likely require collaboration with a broad variety of stakeholders. In order to address this combination of challenges, we have captured ideas from many members in the community. Thi… ▽ More

    Submitted 23 October, 2020; originally announced October 2020.

    Comments: 18 pages, 2 figures, 1 table

    Journal ref: Quantum Sci. Technol. 6 030501 (2021)

  47. arXiv:2010.05470  [pdf, other

    cs.CR cs.AI cs.CY

    PAST-AI: Physical-layer Authentication of Satellite Transmitters via Deep Learning

    Authors: Gabriele Oligeri, Simone Raponi, Savio Sciancalepore, Roberto Di Pietro

    Abstract: Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms. This is particularly true for sender authentication in wireless communications via radio fingerprinting. However, previous research efforts mainly focused on terrestrial wireless devices while, to the best of our knowledge, none of the previou… ▽ More

    Submitted 12 October, 2020; originally announced October 2020.

  48. arXiv:2007.12836  [pdf, ps, other

    cs.IT eess.SP

    Iterative List Detection and Decoding for mMTC

    Authors: R. B. Di Renna, R. C. de Lamare

    Abstract: The main challenge of massive machine-type communications (mMTC) is the joint activity and signal detection of devices. The mMTC scenario with many devices transmitting data intermittently at low data rates and via very short packets enables its modelling as a sparse signal processing problem. In this work, we consider a grant-free system and propose a detection and decoding scheme that jointly de… ▽ More

    Submitted 24 July, 2020; originally announced July 2020.

    Comments: 11 figures, 15 pages

  49. IoTrace: A Flexible, Efficient, and Privacy-Preserving IoT-enabled Architecture for Contact Tracing

    Authors: Pietro Tedeschi, Spiridon Bakiras, Roberto Di Pietro

    Abstract: Contact tracing promises to help fight the spread of Covid-19 via an early detection of possible contagion events. To this end, most existing solutions share the following architecture: smartphones continuously broadcast random beacons that are intercepted by nearby devices and stored into their local contact logs. In this paper, we propose an IoT-enabled architecture for contact tracing that rela… ▽ More

    Submitted 2 January, 2021; v1 submitted 23 July, 2020; originally announced July 2020.

    Comments: 7 pages

  50. arXiv:2007.08024  [pdf, other

    cs.CL cs.IR cs.LG

    A Survey on Computational Propaganda Detection

    Authors: Giovanni Da San Martino, Stefano Cresci, Alberto Barron-Cedeno, Seunghak Yu, Roberto Di Pietro, Preslav Nakov

    Abstract: Propaganda campaigns aim at influencing people's mindset with the purpose of advancing a specific agenda. They exploit the anonymity of the Internet, the micro-profiling ability of social networks, and the ease of automatically creating and managing coordinated networks of accounts, to reach millions of social network users with persuasive messages, specifically targeted to topics each individual… ▽ More

    Submitted 15 July, 2020; originally announced July 2020.

    Comments: propaganda detection, disinformation, misinformation, fake news, media bias

    MSC Class: 68T50 ACM Class: I.2.7

    Journal ref: IJCAI-2020