Search

Your search keyword '"Di Pietro, Roberto"' showing total 1,035 results

Search Constraints

Start Over You searched for: Author "Di Pietro, Roberto" Remove constraint Author: "Di Pietro, Roberto"
1,035 results on '"Di Pietro, Roberto"'

Search Results

1. Hallucination Detection: A Probabilistic Framework Using Embeddings Distance Analysis

2. A Survey and Comparison of Post-quantum and Quantum Blockchains

3. Cellular Privacy

5. Mix Networks

6. Anonymity

7. Recipient Anonymity

8. Characterizing Polkadot's Transactions Ecosystem: methodology, tools, and insights

9. Unlinkability

10. Pseudonyms

12. Inferring Power Grid Information with Power Line Communications: Review and Insights

13. Expanding Boundaries: Cross-Media Routing for Seamless Underwater and Aerial Communication

14. Adversarial Attacks Neutralization via Data Set Randomization

15. Confidentiality Technique for PLC Networks

17. Authentication Method for PLC Network

18. PLC Network Integrity Solution

19. Power Line Communication Security

20. Power Line Communication Channel Characteristics

21. Physical Layer Security in Power Line Communications

22. Introduction

23. PLC Availability Scheme

24. An Overview of Power Line Communication Networks

25. Open Web Proxies

26. Demystifying Misconceptions in Social Bots Research

27. $A^2RID$ -- Anonymous Direct Authentication and Remote Identification of Commercial Drones

28. MAG-JAM: Jamming Detection via Magnetic Emissions

30. Characterizing the 2022 Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Preliminary Findings

31. Analysis of Polkadot: Architecture, Internals, and Contradictions

32. Sanitization of Visual Multimedia Content: A Survey of Techniques, Attacks, and Future Directions

34. Content Privacy Enforcement Models in Decentralized Online Social Networks: State of Play, Solutions, Limitations, and Future Directions

35. Metaverse: Security and Privacy Issues

36. Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges

37. Conclusions

40. Serverless Computing: A Security Perspective

41. A Novel Framework for the Analysis of Unknown Transactions in Bitcoin: Theory, Model, and Experimental Results

42. Privacy-Preserving and Sustainable Contact Tracing Using Batteryless Bluetooth Low-Energy Beacons

43. SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol

44. PAST-AI: Physical-layer Authentication of Satellite Transmitters via Deep Learning

45. IoTrace: A Flexible, Efficient, and Privacy-Preserving IoT-enabled Architecture for Contact Tracing

46. A Survey on Computational Propaganda Detection

47. GNSS Spoofing Detection via Opportunistic IRIDIUM Signals

48. Noise2Weight: On Detecting Payload Weight from Drones Acoustic Emissions

49. Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges

50. MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT

Catalog

Books, media, physical & digital resources