Hate Speech Detection: An Analysis of Existing Architectures

Luca PAJOLA , Mauro CONTI , N Asokan , Roberto Navigli

SIoT 2018

Costas PATSAKIS , Mihai CHIROIU , Alysson BESSANI , Mauro CONTI

SIoT 2017

Samuel MARCHAL , Costas PATSAKIS , Sofiane LAGRAA , Mihai CHIROIU

SIoT 2014

Gabriel Ghiniță , Răzvan Rughiniș , Ahmad-Reza Sadeghi , Mihai BUCICOIU

Workshop Co-Chairs

Gabriel GHINIŢĂ , Pedro PERIS-LOPEZ , Guillermo SUAREZ DE TANGIL , Mihai BUCICOIU

emerging topics in digital forensics: A review of reviews

FRAN CASINO , THOMAS K DASAKLIS , GEORGE SPATHOULAS , AMRITA GHOSAL ANAGNOSTOPOULOS

Efficient Routing Protocol via Ant Colony Optimization (ACO) and Breadth First Search (BFS)

Mauro Conti , Syroos Zaboli , Reza Khoshkangini
green computing and communications 374 -380

30
2014
FlowFence: practical data protection for emerging IoT application frameworks

Amir Rahmati , Justin Paupore , Earlence Fernandes , Mauro Conti
usenix security symposium 531 -548

321
2016
Efficient Classification of Android Malware in the wild using Robust Static Features

Hossein Fereidooni , Lejla Batina , Veelasha Moonsamy , Mauro Conti
Weizhi, M. (ed.), Protecting Mobile Networks and Devices: Challenges and Solutions 179 -208

7
2016
FOCAN: A Fog-supported Smart City Network Architecture for Management of Applications in the Internet of Everything Environments

Paola G Vinueza Naranjo , Zahra Pooranian , Mohammad Shojafar , Mauro Conti
arXiv: Distributed, Parallel, and Cluster Computing

227
2017
Advertising in the IoT Era: Vision and Challenges.

Leonardo Babun , A. Selcuk Uluagac , Gabriele Tolomei , Hidayet Aksu
arXiv: Computers and Society

117
2018
Peek-a-Boo: I see your smart home activities, even encrypted!

A. Selcuk Uluagac , Markus Miettinen , Hossein Fereidooni , Ahmad-Reza Sadeghi
arXiv: Cryptography and Security

234
2018
The guard's dilemma: efficient code-reuse attacks against intel SGX

Lucas Davi , Ahmad-Reza Sadeghi , Mauro Conti , Tommaso Frassetto
usenix security symposium 1213 -1227

112
2018
Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages

Mauro Conti , Ankit Gangwal , Michele Todero
arXiv: Cryptography and Security

1
2019
A Survey on Homomorphic Encryption Schemes: Theory and Implementation

A. Selcuk Uluagac , Hidayet Aksu , Mauro Conti , Abbas Acar
arXiv: Cryptography and Security

729
2017
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks

Moreno Ambrosin , Radha Poovendran , Mauro Conti , Fabio De Gaspari
arXiv: Networking and Internet Architecture

70
2015
On the Feasibility of Attribute-Based Encryption on Internet of Things Devices

Moreno Ambrosin , Pasi Liljeberg , Tooska Dargahi , Sanaz Rahimi Moosavi
arXiv: Cryptography and Security

125
2016
Know Your Enemy: Stealth Configuration-Information Gathering in SDN

Mauro Conti , Fabio De Gaspari , Luigi V. Mancini
arXiv: Cryptography and Security

13
2016
All You Need is "Love": Evading Hate-speech Detection.

Mauro Conti , N. Asokan , Mika Juuti , Tommi Gröndahl
arXiv: Computation and Language

1
2018