Search Results - "Castiglione, Arcangelo"

Refine Results
  1. 1

    An intrusion detection approach based on improved deep belief network by Tian, Qiuting, Han, Dezhi, Li, Kuan-Ching, Liu, Xingao, Duan, Letian, Castiglione, Arcangelo

    “…In today’s interconnected society, cyberattacks have become more frequent and sophisticated, and existing intrusion detection systems may not be adequate in…”
    Get full text
    Journal Article
  2. 2

    A Systematic Review of Consensus Mechanisms in Blockchain by Zhou, Sisi, Li, Kuanching, Xiao, Lijun, Cai, Jiahong, Liang, Wei, Castiglione, Arcangelo

    Published in Mathematics (Basel) (01-05-2023)
    “…Since the birth of Bitcoin, blockchain has shifted from a critical cryptocurrency technology to an enabling technology. Due to its immutability and…”
    Get full text
    Journal Article
  3. 3

    Secure group communication schemes for dynamic heterogeneous distributed computing by Castiglione, Arcangelo, D’Arco, Paolo, De Santis, Alfredo, Russo, Rosario

    Published in Future generation computer systems (01-09-2017)
    “…Nowadays Sensor Networks and Ad Hoc Networks are widely used communication facilities, mainly because of their many application settings. Again, though above…”
    Get full text
    Journal Article
  4. 4

    On the protection of consumer genomic data in the Internet of Living Things by Pizzolante, Raffaele, Castiglione, Arcangelo, Carpentieri, Bruno, De Santis, Alfredo, Palmieri, Francesco, Castiglione, Aniello

    Published in Computers & security (01-05-2018)
    “…•Many companies are emerging to provide direct-to-consumer DNA sequencing and analysis.•Internet of Living Things characterize networks of biological…”
    Get full text
    Journal Article
  5. 5

    An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree by Yin, Xinming, He, Junhui, Guo, Yi, Han, Dezhi, Li, Kuan-Ching, Castiglione, Arcangelo

    Published in Sensors (Basel, Switzerland) (09-10-2020)
    “…The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In this algorithm, a shared secret is used to derive a…”
    Get full text
    Journal Article
  6. 6
  7. 7

    A Cluster-Based Multidimensional Approach for Detecting Attacks on Connected Vehicles by D'Angelo, Gianni, Castiglione, Arcangelo, Palmieri, Francesco

    Published in IEEE internet of things journal (15-08-2021)
    “…Nowadays, modern vehicles are becoming even more connected, intelligent, and smart. A modern vehicle encloses several cyber-physical systems, such as actuators…”
    Get full text
    Journal Article
  8. 8

    A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment by Gupta, Brij B., Yadav, Krishna, Razzak, Imran, Psannis, Konstantinos, Castiglione, Arcangelo, Chang, Xiaojun

    Published in Computer communications (01-07-2021)
    “…In recent times, we can see a massive increase in the number of devices that are being connected to the internet. These devices include but are not limited to…”
    Get full text
    Journal Article
  9. 9

    DNS tunnels detection via DNS-images by D’Angelo, Gianni, Castiglione, Arcangelo, Palmieri, Francesco

    Published in Information processing & management (01-05-2022)
    “…DNS tunneling is a typical attack adopted by cyber-criminals to compromise victims’ devices, steal sensitive data, or perform fraudulent actions against third…”
    Get full text
    Journal Article
  10. 10

    Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey by Li, Dun, Han, Dezhi, Weng, Tien-Hsiung, Zheng, Zibin, Li, Hongzhi, Liu, Han, Castiglione, Arcangelo, Li, Kuan-Ching

    Published in Soft computing (Berlin, Germany) (01-05-2022)
    “…Federated learning ( FL ) is a promising decentralized deep learning technology, which allows users to update models cooperatively without sharing their data…”
    Get full text
    Journal Article
  11. 11

    A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control by Li, Jiatao, Han, Dezhi, Wu, Zhongdai, Wang, Junxiang, Li, Kuan-Ching, Castiglione, Arcangelo

    Published in Future generation computer systems (01-05-2023)
    “…With the increasing sales of the medical device market, the medical incidents caused by passive medical devices are increasing, which needs to be solved from…”
    Get full text
    Journal Article
  12. 12

    Effective classification of android malware families through dynamic features and neural networks by D'Angelo, Gianni, Palmieri, Francesco, Robustelli, Antonio, Castiglione, Arcangelo

    Published in Connection science (03-07-2021)
    “…Due to their open nature and popularity, Android-based devices have attracted several end-users around the World and are one of the main targets for attackers…”
    Get full text
    Journal Article
  13. 13

    MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning by Li, Dun, Han, Dezhi, Zheng, Zibin, Weng, Tien-Hsiung, Li, Hongzhi, Liu, Han, Castiglione, Arcangelo, Li, Kuan-Ching

    Published in Computer standards and interfaces (01-04-2022)
    “…•A Blockchain-based secure storage and sharing scheme for ELRs in MOOCs learning systems is proposed.•Aimed to leverage Blockchain, the proposed scheme can…”
    Get full text
    Journal Article
  14. 14

    Secure weighted possibilistic c-means algorithm on cloud for clustering big data by Zhang, Qingchen, Yang, Laurence T., Castiglione, Arcangelo, Chen, Zhikui, Li, Peng

    Published in Information sciences (01-04-2019)
    “…The weighted possibilistic c-means algorithm is an important soft clustering technique for big data analytics with cloud computing. However, the private data…”
    Get full text
    Journal Article
  15. 15

    Modeling and analysis of port supply chain system based on Fabric blockchain by Gao, Na, Han, Dezhi, Weng, Tien-Hsiung, Xia, Benhui, Li, Dun, Castiglione, Arcangelo, Li, Kuan-Ching

    Published in Computers & industrial engineering (01-10-2022)
    “…With the development of international trade, the core position of port transportation progressively emerges. However, most current port supply chain systems…”
    Get full text
    Journal Article
  16. 16

    One-pass lossless data hiding and compression of remote sensing data by Carpentieri, Bruno, Castiglione, Arcangelo, De Santis, Alfredo, Palmieri, Francesco, Pizzolante, Raffaele

    Published in Future generation computer systems (01-01-2019)
    “…The information obtained by means of spectral remote sensing (i.e., the hyperspectral images) are involved in several real-life scenarios and applications…”
    Get full text
    Journal Article
  17. 17

    High-precision linearized interpretation for fully connected neural network by Lei, Xia, Fan, Yongkai, Li, Kuan-Ching, Castiglione, Arcangelo, Hu, Qian

    Published in Applied soft computing (01-09-2021)
    “…Despite the widespread application of deep neural networks in finance, medical treatment, and autonomous driving, these networks face multiple security…”
    Get full text
    Journal Article
  18. 18

    Securing the internet of vehicles through lightweight block ciphers by Castiglione, Arcangelo, Palmieri, Francesco, Colace, Francesco, Lombardi, Marco, Santaniello, Domenico, D’Aniello, Giuseppe

    Published in Pattern recognition letters (01-07-2020)
    “…•We discuss and analyze the main security issues affecting the CAN bus in the automotive.•We study the feasibility of using encryption algorithms for securing…”
    Get full text
    Journal Article
  19. 19

    Quantum technique for access control in cloud computing II: Encryption and key distribution by Zhou, Lu, Wang, Quanlong, Sun, Xin, Kulicki, Piotr, Castiglione, Arcangelo

    “…This is the second paper of the series of papers dealing with access control problems in cloud computing by adopting quantum techniques. In this paper we study…”
    Get full text
    Journal Article
  20. 20

    Cloud-based adaptive compression and secure management services for 3D healthcare data by Castiglione, Arcangelo, Pizzolante, Raffaele, De Santis, Alfredo, Carpentieri, Bruno, Castiglione, Aniello, Palmieri, Francesco

    Published in Future generation computer systems (01-02-2015)
    “…Several studies show that the lack of access to resources and shared data is one of the main causes of errors in the healthcare sector. In particular, 3D…”
    Get full text
    Journal Article