default search action
Francesco Bergadano
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j33]Francesco Bergadano, Giorgio Giacinto:
Special Issue "AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection". Algorithms 16(7): 327 (2023) - [c41]Maqsood Ahmad, Francesco Bergadano, Valerio Costamagna, Bruno Crispo, Giovanni Russello:
AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions. ISCC 2023: 1-7 - 2022
- [c40]Luca Degani, Francesco Bergadano, Seyed Ali Mirheidari, Fabio Martinelli, Bruno Crispo:
Generative adversarial networks for subdomain enumeration. SAC 2022: 1636-1645 - 2020
- [j32]Francesco Bergadano, Milena Boetti, Fabio Cogno, Valerio Costamagna, Mario Leone, Marco Evangelisti:
A modular framework for mobile security analysis. Inf. Secur. J. A Glob. Perspect. 29(5): 220-243 (2020) - [j31]Maqsood Ahmad, Valerio Costamagna, Bruno Crispo, Francesco Bergadano, Yury Zhauniarovich:
StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications. J. Syst. Softw. 159 (2020)
2010 – 2019
- 2019
- [j30]Francesco Bergadano, Fabio Carretto, Fabio Cogno, Dario Ragno:
Defacement Detection with Passive Adversaries. Algorithms 12(8): 150 (2019) - [i4]Francesco Bergadano, Roberto Bertilone, Daniela Paolotti, Giancarlo Ruffo:
Learning Real Estate Automated Valuation Models from Heterogeneous Data Sources. CoRR abs/1909.00704 (2019) - 2017
- [c39]Francesco Bergadano, Fabio Carretto, Fabio Cogno, Dario Ragno:
Defacement response via keyed learning. IISA 2017: 1-6 - [c38]Maqsood Ahmad, Valerio Costamagna, Bruno Crispo, Francesco Bergadano:
TeICC: targeted execution of inter-component communications in Android. SAC 2017: 1747-1752 - 2014
- [j29]Francesco Bergadano, Gianni Bosio, Stefano Spagnolo:
Supporting Collaboration between Customers and Developers: A Framework for Distributed, Agile Software Development. Int. J. Distributed Syst. Technol. 5(2): 1-16 (2014) - 2013
- [c37]Francesco Bergadano:
Communication Setup in Anonymous Messaging. Security Protocols Workshop 2013: 161-169 - [c36]Francesco Bergadano:
Communication Setup in Anonymous Messaging (Transcript of Discussion). Security Protocols Workshop 2013: 170-175 - 2011
- [c35]Renato Accornero, Daniele Rispoli, Francesco Bergadano:
Privacy-enhanced identity via browser extensions and linking services. NSS 2011: 89-96 - 2010
- [p2]Alessandro Basso, Francesco Bergadano:
Anti-bot Strategies Based on Human Interactive Proofs. Handbook of Information and Communication Security 2010: 273-291
2000 – 2009
- 2009
- [j28]Alessandro Basso, Francesco Bergadano, Davide Cavagnino, Victor Pomponiu, Annamaria Vernone:
A Novel Block-based Watermarking Scheme Using the SVD Transform. Algorithms 2(1): 46-75 (2009) - 2008
- [r1]Amos Beimel, Francesco Bergadano, Nader H. Bshouty, Eyal Kushilevitz, Stefano Varricchio:
Learning Automata. Encyclopedia of Algorithms 2008 - 2007
- [j27]Paolo Dal Checco, Francesco Bergadano, Davide Cavagnino, Pasquale Andrea Nesta, Michele Miraglia, Pier Luigi Zaccone:
Secure Logging for Irrefutable Administration. Int. J. Netw. Secur. 4(3): 340-347 (2007) - 2005
- [j26]Francesco Bergadano, Davide Cavagnino:
Dealing with packet loss in the Interactive Chained Stream Authentication protocol. Comput. Secur. 24(2): 139-146 (2005) - [c34]Giancarlo Ruffo, Francesco Bergadano:
EnFilter: A Password Enforcement and Filter Tool Based on Pattern Recognition Techniques. ICIAP 2005: 75-82 - 2004
- [c33]Alessandro Basso, Francesco Bergadano, Ilaria Coradazzi, Paolo Dal Checco:
Lightweight security for Internet polls. EGCDMAS 2004: 46-55 - [c32]Francesco Bergadano, Davide Cavagnino, Pasquale Andrea Nesta:
Server-Based Access Verification. EGCDMAS 2004: 91-103 - 2003
- [j25]Francesco Bergadano, Daniele Gunetti, Claudia Picardi:
Identity verification through dynamic keystroke analysis. Intell. Data Anal. 7(5): 469-496 (2003) - 2002
- [j24]Francesco Bergadano, Davide Cavagnino, Bruno Crispo:
Individual Authentication in Multiparty Communications. Comput. Secur. 21(8): 719-735 (2002) - [j23]Francesco Bergadano, Daniele Gunetti, Claudia Picardi:
User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. 5(4): 367-397 (2002) - 2000
- [j22]Amos Beimel, Francesco Bergadano, Nader H. Bshouty, Eyal Kushilevitz, Stefano Varricchio:
Learning functions represented as multiplicity automata. J. ACM 47(3): 506-530 (2000) - [c31]Francesco Bergadano, Davide Cavagnino, Bruno Crispo:
Individual Single Source Authentication on the MBone. IEEE International Conference on Multimedia and Expo (I) 2000: 541-544 - [c30]Francesco Bergadano, Davide Cavagnino, Bruno Crispo:
Chained Stream Authentication. Selected Areas in Cryptography 2000: 144-157
1990 – 1999
- 1999
- [j21]Francesco Bergadano, Antonio Puliafito, Salvatore Riccobene, Giancarlo Ruffo, Lorenzo Vita:
Java-Based and Secure Learning Agents for Information Retrieval in Distributed Systems. Inf. Sci. 113(1-2): 55-84 (1999) - [c29]Francesco Bergadano, Davide Cavagnino, Bruno Crispo:
Issues in Multicast Security. Security Protocols Workshop 1999: 119-139 - 1998
- [j20]Ross J. Anderson, Francesco Bergadano, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Roger M. Needham:
A New Family of Authentication Protocols. ACM SIGOPS Oper. Syst. Rev. 32(4): 9-20 (1998) - [j19]Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo:
High Dictionary Compression for Proactive Password Checking. ACM Trans. Inf. Syst. Secur. 1(1): 3-25 (1998) - [c28]Francesco Bergadano, P. De Mauro:
Third Party Certification of HTTP Service Access Statistics (Position Paper). Security Protocols Workshop 1998: 95-99 - [c27]Francesco Bergadano:
Third Party Certification of HTTP Service Access Statistics (Transcript of Discussion). Security Protocols Workshop 1998: 100-107 - [c26]Francesco Bergadano, Bruno Crispo, M. Eccettuato:
Secure WWW Transactions Using Standard HTTP and Java Applets. USENIX Workshop on Electronic Commerce 1998 - 1997
- [j18]Francesco Bergadano, Bruno Crispo, T. Mark A. Lomas:
Strong Authentication and Privacy with Standard Browsers. J. Comput. Secur. 5(3): 191-212 (1997) - [j17]Francesco Bergadano, A. Giallombardo, Antonio Puliafito, Giancarlo Ruffo, Lorenzo Vita:
Security Agents for Information Retrieval in Distributed Systems. Parallel Comput. 22(13): 1719-1731 (1997) - [c25]Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo:
Proactive Password Checking with Decision Trees. CCS 1997: 67-77 - [c24]Francesco Bergadano, Nader H. Bshouty, Christino Tamon, Stefano Varricchio:
On Learning Programs and Small Depth Circuits. EuroCOLT 1997: 150-161 - 1996
- [b2]Francesco Bergadano, Daniele Gunetti:
Inductive logic programming - from machine learning to software engineering. MIT Press 1996, ISBN 978-0-262-02393-1, pp. I-VII, 1-240 - [j16]Francesco Bergadano, Stefano Varricchio:
Learning Behaviors of Automata from Multiplicity and Equivalence Queries. SIAM J. Comput. 25(6): 1268-1280 (1996) - [j15]Francesco Bergadano, Daniele Gunetti:
Testing by Means of Inductive Program Learning. ACM Trans. Softw. Eng. Methodol. 5(2): 119-145 (1996) - [c23]Amos Beimel, Francesco Bergadano, Nader H. Bshouty, Eyal Kushilevitz, Stefano Varricchio:
On the Applications of Multiplicity Automata in Learning. FOCS 1996: 349-358 - [c22]Francesco Bergadano, Dario Catalano, Stefano Varricchio:
Learning Sat-k-DNF Formulas from Membership Queries. STOC 1996: 126-130 - [i3]Francesco Bergadano, Nader H. Bshouty, Stefano Varricchio:
Learning Multivariate Polynomials from Substitution and Equivalence Queries. Electron. Colloquium Comput. Complex. TR96 (1996) - [i2]Francesco Bergadano, Nader H. Bshouty, Christino Tamon, Stefano Varricchio:
On Learning Branching Programs and Small Depth Circuits. Electron. Colloquium Comput. Complex. TR96 (1996) - 1995
- [j14]Francesco Bergadano, Vincenzo Cutello:
Probably approximately correct learning in fuzzy classification systems. IEEE Trans. Fuzzy Syst. 3(4): 473-478 (1995) - [c21]Francesco Bergadano, S. Varrichio:
Learning behaviors of automata from shortest counterexamples. EuroCOLT 1995: 380-391 - 1994
- [j13]Francesco Bergadano, Daniele Gunetti:
Learning relations and logic programs. Knowl. Eng. Rev. 9(1): 73-77 (1994) - [j12]Katharina Morik, Francesco Bergadano, Wray L. Buntine:
Guest Editorial. Mach. Learn. 14(1): 137-138 (1994) - [c20]Francesco Bergadano, Stefano Varricchio:
Learning Behaviors of Automata from Multiplicity and Equivalence Queries. CIAC 1994: 54-62 - [e1]Francesco Bergadano, Luc De Raedt:
Machine Learning: ECML-94, European Conference on Machine Learning, Catania, Italy, April 6-8, 1994, Proceedings. Lecture Notes in Computer Science 784, Springer 1994, ISBN 3-540-57868-4 [contents] - 1993
- [j11]Francesco Bergadano, Daniele Gunetti, Umberto Trinchero:
The Difficulties of Learning Logic Programs with Cut. J. Artif. Intell. Res. 1: 91-107 (1993) - [j10]Francesco Bergadano:
Machine Learning and the foundations of inductive inference. Minds Mach. 3(1): 31-51 (1993) - [j9]Lorenza Saitta, Francesco Bergadano:
Pattern Recognition and Valiant's Learning Framework. IEEE Trans. Pattern Anal. Mach. Intell. 15(2): 145-155 (1993) - [j8]Attilio Giordana, Lorenza Saitta, Francesco Bergadano, Filippo Brancadori, Davide De Marchi:
ENIGMA: A System That Learns Diagnostic Knowledge. IEEE Trans. Knowl. Data Eng. 5(1): 15-28 (1993) - [j7]Francesco Bergadano:
Inductive Database Relations. IEEE Trans. Knowl. Data Eng. 5(6): 969-972 (1993) - [c19]Francesco Bergadano, Daniele Gunetti:
Logic Programming by Examples. GULP 1993: 393-405 - [c18]Francesco Bergadano, Daniele Gunetti:
Learning Relations: Basing Top-Down Methods on Inverse Resolution. AI*IA 1993: 190-201 - [c17]Francesco Bergadano, Daniele Gunetti:
Funtional Inductive Logic Programming with Queries to the User. ECML 1993: 323-328 - [c16]Francesco Bergadano, Vincenzo Cutello:
Learning Membership Functions. ECSQARU 1993: 25-32 - [c15]Francesco Bergadano, Daniele Gunetti:
An Interactive System to Learn Functional Logic Programs. IJCAI 1993: 1044-1049 - [c14]Francesco Bergadano, Daniele Gunetti:
Inductive Synthesis of Logic Programs and Inductive Logic Programming. LOPSTR 1993: 45-56 - [c13]Francesco Bergadano:
Test Case Generation by Means of Learning Techniques. SIGSOFT FSE 1993: 149-162 - [i1]Francesco Bergadano, Daniele Gunetti, Umberto Trinchero:
The Difficulties of Learning Logic Programs with Cut. CoRR cs.AI/9311101 (1993) - 1992
- [j6]Francesco Bergadano, Yves Kodratoff, Katharina Morik:
Machine Learning and Knowledge Acquisition, Summary of Research Contributions Presented at IJCAI'91. AI Commun. 5(1): 19-24 (1992) - [j5]Francesco Bergadano:
Learning Two-Tiered Descriptions of Flexible Concepts: The POSEIDON System. Mach. Learn. 8: 5-43 (1992) - 1991
- [b1]Francesco Bergadano, Attilio Giordana, Lorenza Saitta:
Machine learning - an integrated framework and its applications. Ellis Horwood series in artificial intelligence, Ellis Horwood 1991, ISBN 978-0-13-541749-2, pp. I-VI, 1-146 - [c12]Francesco Bergadano, Floriana Esposito, Céline Rouveirol, Stefan Wrobel:
Panel: Evaluating and Changing Representation in Concept Acquisition. EWSL 1991: 89-100 - [c11]Francesco Bergadano:
The Problem of Induction and Machine Learning. IJCAI 1991: 1073-1080 - [p1]Francesco Bergadano, Attilio Giordana, Lorenza Saitta, Filippo Brancadori, Davide De Marchi:
Integrated Learning in a Real Domain. Knowledge Discovery in Databases 1991: 277-288 - 1990
- [c10]Francesco Bergadano, Attilio Giordana, Lorenza Saitta:
Biasing Induction by Using a Domain Theory: An Experimental Evaluation. ECAI 1990: 84-89 - [c9]Francesco Bergadano, Attilio Giordana, Lorenza Saitta, Davide De Marchi, Filippo Brancadori:
Integrated Learning in a real Domain. ML 1990: 322-329 - [d1]Francesco Bergadano, Attilio Giordana, Lorenza Saitta:
Mechanical Analysis. UCI Machine Learning Repository, 1990
1980 – 1989
- 1989
- [j4]Francesco Bergadano, Attilio Giordana:
Concept recognition: An approximate reasoning framework. Int. J. Intell. Syst. 4(1): 23-44 (1989) - [j3]Francesco Bergadano, Attilio Giordana, Lorenza Saitta:
Knowledge representation and use in pattern analysis. Inf. Sci. 47(1): 1-16 (1989) - [c8]Francesco Bergadano, Attilio Giordana, S. Ponsero:
Deduction in Top-Down Inductive Learning. ML 1989: 23-25 - 1988
- [j2]Francesco Bergadano, Attilio Giordana, Lorenza Saitta:
Automated Concept Acquisition in Noisy Environments. IEEE Trans. Pattern Anal. Mach. Intell. 10(4): 555-578 (1988) - [c7]Francesco Bergadano, Attilio Giordana, Lorenza Saitta:
Concept Acquisition in an Integrated EBL and SBL Environment. ECAI 1988: 363-368 - [c6]Francesco Bergadano, Stan Matwin, Ryszard S. Michalski, Jianping Zhang:
Measuring Quality of Concept Descriptions. EWSL 1988: 1-14 - [c5]Francesco Bergadano, Attilio Giordana:
A Knowledge Intensive Approach to Concept Induction. ML 1988: 305-317 - [c4]Francesco Bergadano, R. Bisio:
Constructive Learning with Continuous-Valued Attributes. IPMU 1988: 154-162 - [c3]Francesco Bergadano, Stan Matwin, Ryszard S. Michalski, Jianping Zhang:
Representing and Acquiring Imprecise and Context-dependent Concepts in Knowledge-Based Systems. ISMIS 1988: 270-280 - 1987
- [j1]Francesco Bergadano, Lorenza Saitta:
A General Framework for Knowledge-Based Pattern Recognition. Int. J. Pattern Recognit. Artif. Intell. 1(2): 189-206 (1987) - [c2]Francesco Bergadano, Attilio Giordana, Lorenza Saitta:
Integrating EBL and SBL Approaches to Knowledge Base Refinement. ISMIS 1987: 309-316 - 1986
- [c1]Francesco Bergadano, Attilio Giordana:
A framework for knowledge representation and use in pattern analysis. ISMIS 1986: 423-431
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint