default search action
Angelica Liguori
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Nunziato Cassavia, Luca Caviglione, Massimo Guarascio, Angelica Liguori, Marco Zuppelli:
Learning autoencoder ensembles for detecting malware hidden communications in IoT ecosystems. J. Intell. Inf. Syst. 62(4): 925-949 (2024) - [j2]Angelica Liguori, Ettore Ritacco, Francesco Sergio Pisani, Giuseppe Manco:
Robust anomaly detection via adversarial counterfactual generation. Knowl. Inf. Syst. 66(12): 7437-7468 (2024) - [c16]Marco Zuppelli, Massimo Guarascio, Luca Caviglione, Angelica Liguori:
No Country for Leaking Containers: Detecting Exfiltration of Secrets Through AI and Syscalls. ARES 2024: 78:1-78:8 - [c15]Angelica Liguori, Marco Zuppelli, Daniela Gallo, Massimo Guarascio, Luca Caviglione:
Erasing the Shadow: Sanitization of Images with Malicious Payloads Using Deep Autoencoders. ISMIS 2024: 115-125 - [c14]Angelica Liguori, Ettore Ritacco, Giuseppe Benvenuto, Salvatore Iiritano, Giuseppe Manco, Massimiliano Ruffolo:
Siamese Networks for Unsupervised Failure Detection in Smart Industry. ISMIS 2024: 191-200 - [c13]Luca Caviglione, Carmela Comito, Erica Coppolillo, Daniela Gallo, Massimo Guarascio, Angelica Liguori, Giuseppe Manco, Marco Minici, Simone Mungari, Francesco Sergio Pisani, Ettore Ritacco, Antonino Rullo, Paolo Zicari, Marco Zuppelli:
Dawn of LLM4Cyber: Current Solutions, Challenges, and New Perspectives in Harnessing LLMs for Cybersecurity. Ital-IA 2024: 170-175 - [i2]Daniela Gallo, Angelica Liguori, Ettore Ritacco, Luca Caviglione, Fabrizio Durante, Giuseppe Manco:
CAP: Detecting Unauthorized Data Usage in Generative Models via Prompt Generation. CoRR abs/2410.05819 (2024) - 2023
- [j1]Nunziato Cassavia, Luca Caviglione, Massimo Guarascio, Angelica Liguori, Giuseppe Manco, Marco Zuppelli:
A federated approach for detecting data hidden in icons of mobile applications delivered via web and multiple stores. Soc. Netw. Anal. Min. 13(1): 114 (2023) - [c12]Angelica Liguori, Simone Mungari, Marco Zuppelli, Carmela Comito, Enrico Cambiaso, Matteo Repetto, Massimo Guarascio, Luca Caviglione, Giuseppe Manco:
Using AI to face covert attacks in IoT and softwarized scenarios: challenges and opportunities. Ital-IA 2023: 397-402 - [c11]Carmela Comito, Francesco Sergio Pisani, Erica Coppolillo, Angelica Liguori, Massimo Guarascio, Giuseppe Manco:
Towards Self-Supervised Cross-Domain Fake News Detection. ITASEC 2023 - [c10]Erica Coppolillo, Daniela Gallo, Angelica Liguori, Simone Mungari, Ettore Ritacco, Giuseppe Manco:
Siamese Network for Fake Item Detection. SEBD 2023: 430-438 - [c9]Angelica Liguori, Simone Mungari, Ettore Ritacco, Francesco Ricca, Giuseppe Manco, Salvatore Iiritano:
Neuro-Symbolic techniques for Predictive Maintenance. SEBD 2023: 459-468 - [i1]Angelica Liguori, Luciano Caroprese, Marco Minici, Bruno Veloso, Francesco Spinnato, Mirco Nanni, Giuseppe Manco, João Gama:
Modeling Events and Interactions through Temporal Processes - A Survey. CoRR abs/2303.06067 (2023) - 2022
- [c8]Erica Coppolillo, Angelica Liguori, Massimo Guarascio, Francesco Sergio Pisani, Giuseppe Manco:
Generative Methods for Out-of-distribution Prediction and Applications for Threat Detection and Analysis: A Short Review. CyberSec4Europe 2022: 65-79 - [c7]Nunziato Cassavia, Luca Caviglione, Massimo Guarascio, Angelica Liguori, Marco Zuppelli:
Ensembling Sparse Autoencoders for Network Covert Channel Detection in IoT Ecosystems. ISMIS 2022: 209-218 - [c6]Nunziato Cassavia, Luca Caviglione, Massimo Guarascio, Angelica Liguori, Giuseppe Surace, Marco Zuppelli:
Federated Learning for the Efficient Detection of Steganographic Threats Hidden in Image Icons. PerSOM 2022: 83-95 - 2021
- [c5]Angelica Liguori, Giuseppe Manco, Francesco Sergio Pisani, Ettore Ritacco:
Adversarial Regularized Reconstruction for Anomaly Detection and Generation. ICDM 2021: 1204-1209 - [c4]Angelica Liguori, Giuseppe Manco, Ettore Ritacco, Massimilano Ruffolo, Salvatore Iiritano:
A Deep Learning Approach for Unsupervised Failure Detection in Smart Industry (Discussion Paper). SEBD 2021: 474-481 - 2020
- [c3]Francesco Scicchitano, Angelica Liguori, Massimo Guarascio, Ettore Ritacco, Giuseppe Manco:
Deep Autoencoder Ensembles for Anomaly Detection on Blockchain. ISMIS 2020: 448-456 - [c2]Francesco Scicchitano, Angelica Liguori, Massimo Guarascio, Ettore Ritacco, Giuseppe Manco:
A Deep Learning Approach for Detecting Security Attacks on Blockchain. ITASEC 2020: 212-222 - [c1]Francesco Folino, Massimo Guarascio, Angelica Liguori, Giuseppe Manco, Luigi Pontieri, Ettore Ritacco:
Exploiting Temporal Convolution for Activity Prediction in Process Analytics. PKDD/ECML Workshops 2020: 263-275
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint