Skip to main content

Showing 1–11 of 11 results for author: Martinelli, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.12794  [pdf, other

    cs.NE

    Expand-and-Cluster: Parameter Recovery of Neural Networks

    Authors: Flavio Martinelli, Berfin Simsek, Wulfram Gerstner, Johanni Brea

    Abstract: Can we identify the weights of a neural network by probing its input-output map**? At first glance, this problem seems to have many solutions because of permutation, overparameterisation and activation function symmetries. Yet, we show that the incoming weight vector of each neuron is identifiable up to sign or scaling, depending on the activation function. Our novel method 'Expand-and-Cluster'… ▽ More

    Submitted 27 June, 2024; v1 submitted 25 April, 2023; originally announced April 2023.

    Comments: Accepted paper at ICML '24

  2. arXiv:2301.10638  [pdf, ps, other

    cs.LG

    MLPGradientFlow: going with the flow of multilayer perceptrons (and finding minima fast and accurately)

    Authors: Johanni Brea, Flavio Martinelli, Berfin Şimşek, Wulfram Gerstner

    Abstract: MLPGradientFlow is a software package to solve numerically the gradient flow differential equation $\dot θ= -\nabla \mathcal L(θ; \mathcal D)$, where $θ$ are the parameters of a multi-layer perceptron, $\mathcal D$ is some data set, and $\nabla \mathcal L$ is the gradient of a loss function. We show numerically that adaptive first- or higher-order integration methods based on Runge-Kutta schemes h… ▽ More

    Submitted 25 January, 2023; originally announced January 2023.

  3. arXiv:2010.07759  [pdf, other

    cs.RO

    alurity, a toolbox for robot cybersecurity

    Authors: Víctor Mayoral-Vilches, Irati Abad-Fernández, Martin Pinzger, Stefan Rass, Bernhard Dieber, Alcino Cunha, Francisco J. Rodríguez-Lera, Giovanni Lacava, Angelica Marotta, Fabio Martinelli, Endika Gil-Uriarte

    Abstract: The reuse of technologies and inherent complexity of most robotic systems is increasingly leading to robots with wide attack surfaces and a variety of potential vulnerabilities. Given their growing presence in public environments, security research is increasingly becoming more important than in any other area, specially due to the safety implications that robot vulnerabilities could cause on huma… ▽ More

    Submitted 16 October, 2020; v1 submitted 15 October, 2020; originally announced October 2020.

  4. A Bin Encoding Training of a Spiking Neural Network-based Voice Activity Detection

    Authors: Giorgia Dellaferrera, Flavio Martinelli, Milos Cernak

    Abstract: Advances of deep learning for Artificial Neural Networks(ANNs) have led to significant improvements in the performance of digital signal processing systems implemented on digital chips. Although recent progress in low-power chips is remarkable, neuromorphic chips that run Spiking Neural Networks (SNNs) based applications offer an even lower power consumption, as a consequence of the ensuing sparse… ▽ More

    Submitted 28 October, 2019; originally announced October 2019.

    Comments: 5 pages, 3 figures, 1 table

    Journal ref: ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

  5. Spiking neural networks trained with backpropagation for low power neuromorphic implementation of voice activity detection

    Authors: Flavio Martinelli, Giorgia Dellaferrera, Pablo Mainar, Milos Cernak

    Abstract: Recent advances in Voice Activity Detection (VAD) are driven by artificial and Recurrent Neural Networks (RNNs), however, using a VAD system in battery-operated devices requires further power efficiency. This can be achieved by neuromorphic hardware, which enables Spiking Neural Networks (SNNs) to perform inference at very low energy consumption. Spiking networks are characterized by their ability… ▽ More

    Submitted 30 April, 2020; v1 submitted 22 October, 2019; originally announced October 2019.

    Comments: 5 pages, 2 figures, 2 tables

    Journal ref: ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Barcelona, Spain, 2020, pp. 8544-8548

  6. On the Effectiveness of System API-Related Information for Android Ransomware Detection

    Authors: Michele Scalas, Davide Maiorca, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto

    Abstract: Ransomware constitutes a significant threat to the Android operating system. It can either lock or encrypt the target devices, and victims are forced to pay ransoms to restore their data. Hence, the prompt detection of such attacks has a priority in comparison to other malicious threats. Previous works on Android malware detection mainly focused on Machine Learning-oriented approaches that were ta… ▽ More

    Submitted 26 June, 2019; v1 submitted 24 May, 2018; originally announced May 2018.

    Journal ref: Computers & Security 86C (2019) pp. 168-182

  7. arXiv:1805.07600  [pdf, other

    cs.NI

    Practical Location Validation in Participatory Sensing Through Mobile WiFi Hotspots

    Authors: Francesco Restuccia, Andrea Saracino, Fabio Martinelli

    Abstract: The reliability of information in participatory sensing (PS) systems largely depends on the accuracy of the location of the participating users. However, existing PS applications are not able to efficiently validate the position of users in large-scale outdoor environments. In this paper, we present an efficient and scalable Location Validation System (LVS) to secure PS systems from location-spoof… ▽ More

    Submitted 19 May, 2018; originally announced May 2018.

    Comments: IEEE TrustCom 2018, New York City, NY, USA

  8. arXiv:1509.08565  [pdf, ps, other

    cs.LO cs.CR cs.FL cs.PL

    Semiring-based Specification Approaches for Quantitative Security

    Authors: Fabio Martinelli, Ilaria Matteucci, Francesco Santini

    Abstract: Our goal is to provide different semiring-based formal tools for the specification of security requirements: we quantitatively enhance the open-system approach, according to which a system is partially specified. Therefore, we suppose the existence of an unknown and possibly malicious agent that interacts in parallel with the system. Two specification frameworks are designed along two different (b… ▽ More

    Submitted 28 September, 2015; originally announced September 2015.

    Comments: In Proceedings QAPL 2015, arXiv:1509.08169

    ACM Class: D.2.4 Software/Program Verification F.4.1 Mahematical Logic F.4.3 Formal Languages K.6.5 Security and Protection

    Journal ref: EPTCS 194, 2015, pp. 95-109

  9. arXiv:1505.06161  [pdf, other

    math.PR cs.DM math.CO

    Dynamics of Lattice Triangulations on Thin Rectangles

    Authors: Pietro Caputo, Fabio Martinelli, Alistair Sinclair, Alexandre Stauffer

    Abstract: We consider random lattice triangulations of $n\times k$ rectangular regions with weight $λ^{|σ|}$ where $λ>0$ is a parameter and $|σ|$ denotes the total edge length of the triangulation. When $λ\in(0,1)$ and $k$ is fixed, we prove a tight upper bound of order $n^2$ for the mixing time of the edge-flip Glauber dynamics. Combined with the previously known lower bound of order $\exp(Ω(n^2))$ for… ▽ More

    Submitted 22 May, 2015; originally announced May 2015.

  10. arXiv:1212.3876  [pdf, other

    cs.CR cs.DC cs.FL

    Metric-Aware Secure Service Orchestration

    Authors: Gabriele Costa, Fabio Martinelli, Artsiom Yautsiukhin

    Abstract: Secure orchestration is an important concern in the internet of service. Next to providing the required functionality the composite services must also provide a reasonable level of security in order to protect sensitive data. Thus, the orchestrator has a need to check whether the complex service is able to satisfy certain properties. Some properties are expressed with metrics for precise definitio… ▽ More

    Submitted 16 December, 2012; originally announced December 2012.

    Comments: In Proceedings ICE 2012, arXiv:1212.3458

    Journal ref: EPTCS 104, 2012, pp. 32-46

  11. arXiv:1008.0125  [pdf, other

    math-ph cs.DS math.PR

    Mixing Time for the Solid-on-Solid Model

    Authors: Fabio Martinelli, Alistair Sinclair

    Abstract: We analyze the mixing time of a natural local Markov chain (the Glauber dynamics) on configurations of the solid-on-solid model of statistical physics. This model has been proposed, among other things, as an idealization of the behavior of contours in the Ising model at low temperatures. Our main result is an upper bound on the mixing time of $O~(n^{3.5})$, which is tight within a factor of… ▽ More

    Submitted 31 July, 2010; originally announced August 2010.

    Comments: A preliminary version of this paper appeared in Proceedings of the 41st ACM Symposium on Theory of Computer Science (STOC), 2009, pages 571-580