Fabio Martinelli
YOU?
Author Swipe
View article: An Explainable Method for Automatic Extraction of Natural Language Access Control Policy Key Components
An Explainable Method for Automatic Extraction of Natural Language Access Control Policy Key Components Open
Access control schemes and models are essential tools for system administrators to protect the integrity of the information. However, they are frequently articulated in natural language, which is a powerful form that guarantees flexibility…
View article: NeoNet: A Novel Deep Learning Model for Retinal Disease Diagnosis and Localization
NeoNet: A Novel Deep Learning Model for Retinal Disease Diagnosis and Localization Open
Retinal diseases are among the leading causes of vision impairment worldwide, and early detection is essential for enabling personalized treatments and preventing irreversible vision loss. In this paper, we propose a method aimed to identi…
View article: A method for smart grid intrusion detection through explainable deep learning
A method for smart grid intrusion detection through explainable deep learning Open
Over the years, cyber-attacks have increased drastically, and their execution changed with time. One of the targets of cyber criminals is trying to obtain sensitive information from mobile, cloud, or generally IoT devices. To avoid those r…
View article: Explainable Security Requirements Classification Through Transformer Models
Explainable Security Requirements Classification Through Transformer Models Open
Security and non-security requirements are two critical issues in software development. Classifying requirements is crucial as it aids in recalling security needs during the early stages of development, ultimately leading to enhanced secur…
View article: A Method for Packed (and Unpacked) Malware Detection by Means of Convolutional Neural Networks
A Method for Packed (and Unpacked) Malware Detection by Means of Convolutional Neural Networks Open
View article: Towards Quantum Machine Learning in Ransomware Detection
Towards Quantum Machine Learning in Ransomware Detection Open
View article: Explainable Deep Learning for Breast Cancer Classification and Localization
Explainable Deep Learning for Breast Cancer Classification and Localization Open
Breast cancer is a kind of cancer that forms in the cells of the breasts. After skin cancer, breast cancer represents the most common cancer diagnosed in women in the United States. As a matter of fact, in January 2022, there are more than…
View article: Toward the Adoption of Explainable Pre-Trained Large Language Models for Classifying Human-Written and AI-Generated Sentences
Toward the Adoption of Explainable Pre-Trained Large Language Models for Classifying Human-Written and AI-Generated Sentences Open
Pre-trained large language models have demonstrated impressive text generation capabilities, including understanding, writing, and performing many tasks in natural language. Moreover, with time and improvements in training and text generat…
View article: Deep Convolutional Generative Adversarial Networks in Image-Based Android Malware Detection
Deep Convolutional Generative Adversarial Networks in Image-Based Android Malware Detection Open
The recent advancements in generative adversarial networks have showcased their remarkable ability to create images that are indistinguishable from real ones. This has prompted both the academic and industrial communities to tackle the cha…
View article: Extreme Learning Machine for Biomedical Image Classification: A Multi-Case Study
Extreme Learning Machine for Biomedical Image Classification: A Multi-Case Study Open
In the current realm of biomedical image classification, the predominant choice remains deep learning networks, particularly convolutional neural network (CNN) models. However, deep learning suffers from a notable drawback in terms of its …
View article: A Method for Real-World Privacy-Preserving Android Malware Detection Through Federated Machine Learning
A Method for Real-World Privacy-Preserving Android Malware Detection Through Federated Machine Learning Open
View article: A Method for Finding Distance in Real-Time Car Detection through Object Detection
A Method for Finding Distance in Real-Time Car Detection through Object Detection Open
View article: Detecting Retinal Fundus Image Synthesis by Means of Generative Adversarial Network
Detecting Retinal Fundus Image Synthesis by Means of Generative Adversarial Network Open
View article: Spiral Drawing Test and Explainable Convolutional Neural Networks for Parkinson’s Disease Detection
Spiral Drawing Test and Explainable Convolutional Neural Networks for Parkinson’s Disease Detection Open
View article: A Method for AI-generated sentence detection through Large Language Models
A Method for AI-generated sentence detection through Large Language Models Open
View article: An Approach for Privacy-Preserving Mobile Malware Detection Through Federated Machine Learning
An Approach for Privacy-Preserving Mobile Malware Detection Through Federated Machine Learning Open
View article: Cybersecurity-Related Tweet Classification by Explainable Deep Learning
Cybersecurity-Related Tweet Classification by Explainable Deep Learning Open
View article: ICSOC 2020 special issue on service-oriented computing
ICSOC 2020 special issue on service-oriented computing Open
View article: Benchmarking YOLO Models for Automatic Reading in Smart Metering Systems: A Performance Comparison Analysis
Benchmarking YOLO Models for Automatic Reading in Smart Metering Systems: A Performance Comparison Analysis Open
In the smart grid ecosystem, the automated reading of water meters is a critical task that can be accomplished with deep learning algorithms instead of the traditional way that relies on the physical presence of employees or utility repres…
View article: Generative Adversarial Networks in Retinal Image Classification
Generative Adversarial Networks in Retinal Image Classification Open
The recent introduction of generative adversarial networks has demonstrated remarkable capabilities in generating images that are nearly indistinguishable from real ones. Consequently, both the academic and industrial communities have rais…
View article: Explainable Convolutional Neural Networks for Brain Cancer Detection and Localisation
Explainable Convolutional Neural Networks for Brain Cancer Detection and Localisation Open
Brain cancer is widely recognised as one of the most aggressive types of tumors. In fact, approximately 70% of patients diagnosed with this malignant cancer do not survive. In this paper, we propose a method aimed to detect and localise br…
View article: Object Detection for Brain Cancer Detection and Localization
Object Detection for Brain Cancer Detection and Localization Open
Brain cancer is acknowledged as one of the most aggressive tumors, with a significant impact on patient survival rates. Unfortunately, approximately 70% of patients diagnosed with this malignant cancer do not survive. This paper introduces…
View article: Application of Secure Two-Party Computation in a Privacy-Preserving Android App
Application of Secure Two-Party Computation in a Privacy-Preserving Android App Open
Data privacy has become increasingly important in recent years, with the rise of cyber threats and the unauthorized sharing of sensitive information. Our work within the E-Corridor project has focused on developing a secure framework for s…
View article: Experimenting with Extreme Learning Machine for Biomedical Image Classification
Experimenting with Extreme Learning Machine for Biomedical Image Classification Open
Currently, deep learning networks, with particular regard to convolutional neural network models, are typically exploited for biomedical image classification. One of the disadvantages of deep learning is that is extremely expensive to trai…
View article: Object Detection and Localisation in Thermal Images by means of UAV/Drone
Object Detection and Localisation in Thermal Images by means of UAV/Drone Open
Object detection is one of the crucial tasks that has made deep learning of fundamental importance in last years, also thanks to the use of drones and unmanned aerial vehicles able to obtain images and videos in real-time from any location…
View article: A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep Learning
A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep Learning Open
In light of the growing reliance on digital technology, the security of digital devices and networks has become a critical concern in the information technology industry. Network analysis can be helpful for identifying and mitigating netwo…
View article: Explainable Deep Learning for Face Mask Detection
Explainable Deep Learning for Face Mask Detection Open
The COVID-19 pandemic has radically changed our daily habits. One of these habits introduced is the use of a face mask, to avoid the spread of the infection, to be used especially in closed and crowded environments. To protect people and t…
View article: TriAD: A Deep Ensemble Network for Alzheimer Classification and Localization
TriAD: A Deep Ensemble Network for Alzheimer Classification and Localization Open
Alzheimer’s disease is a hereditary neuro-degenerative disorder whose typical form causes amnestic cognitive impairment and less common variants cause non-amnestic cognitive impairment. The aim of the paper is to classify and localize magn…
View article: Damage Detection and Localisation using UAV/ Drone with Object Detection
Damage Detection and Localisation using UAV/ Drone with Object Detection Open
Detecting structural damage is a fundamental process for visually assessing the quality of any building, such as a bridge or skyscraper. Unfortunately, access to inspect buildings, especially in the case of very tall buildings, is usually …
View article: Water Meter Reading for Smart Grid Monitoring
Water Meter Reading for Smart Grid Monitoring Open
Many tasks that require a large workforce are automated. In many areas of the world, the consumption of utilities, such as electricity, gas and water, is monitored by meters that need to be read by humans. The reading of such meters requir…