Skip to main content

Showing 1–16 of 16 results for author: Arazzi, M

.
  1. arXiv:2504.21700  [pdf, other

    cs.CR cs.AI cs.LG

    XBreaking: Explainable Artificial Intelligence for Jailbreaking LLMs

    Authors: Marco Arazzi, Vignesh Kumar Kembu, Antonino Nocera, Vinod P

    Abstract: Large Language Models are fundamental actors in the modern IT landscape dominated by AI solutions. However, security threats associated with them might prevent their reliable adoption in critical application scenarios such as government organizations and medical institutions. For this reason, commercial LLMs typically undergo a sophisticated censoring mechanism to eliminate any harmful output they… ▽ More

    Submitted 30 April, 2025; originally announced April 2025.

  2. arXiv:2503.15866  [pdf, other

    cs.CR

    DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence

    Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti

    Abstract: The widespread adoption of Android devices for sensitive operations like banking and communication has made them prime targets for cyber threats, particularly Advanced Persistent Threats (APT) and sophisticated malware attacks. Traditional malware detection methods rely on binary classification, failing to provide insights into adversarial Tactics, Techniques, and Procedures (TTPs). Understanding… ▽ More

    Submitted 20 March, 2025; originally announced March 2025.

  3. arXiv:2503.04451  [pdf, other

    cs.LG cs.AI cs.CR

    Privacy Preserving and Robust Aggregation for Cross-Silo Federated Learning in Non-IID Settings

    Authors: Marco Arazzi, Mert Cihangiroglu, Antonino Nocera

    Abstract: Federated Averaging remains the most widely used aggregation strategy in federated learning due to its simplicity and scalability. However, its performance degrades significantly in non-IID data settings, where client distributions are highly imbalanced or skewed. Additionally, it relies on clients transmitting metadata, specifically the number of training samples, which introduces privacy risks a… ▽ More

    Submitted 6 March, 2025; originally announced March 2025.

  4. arXiv:2502.13728  [pdf, other

    cs.CR cs.AI

    Secure Federated Data Distillation

    Authors: Marco Arazzi, Mert Cihangiroglu, Serena Nicolazzo, Antonino Nocera

    Abstract: Dataset Distillation (DD) is a powerful technique for reducing large datasets into compact, representative synthetic datasets, accelerating Machine Learning training. However, traditional DD methods operate in a centralized manner, which poses significant privacy threats and reduces its applicability. To mitigate these risks, we propose a Secure Federated Data Distillation (SFDD) framework to dece… ▽ More

    Submitted 6 March, 2025; v1 submitted 19 February, 2025; originally announced February 2025.

  5. arXiv:2502.01298  [pdf, other

    cs.IR

    Augmented Knowledge Graph Querying leveraging LLMs

    Authors: Marco Arazzi, Davide Ligari, Serena Nicolazzo, Antonino Nocera

    Abstract: Adopting Knowledge Graphs (KGs) as a structured, semantic-oriented, data representation model has significantly improved data integration, reasoning, and querying capabilities across different domains. This is especially true in modern scenarios such as Industry 5.0, in which the integration of data produced by humans, smart devices, and production processes plays a crucial role. However, the mana… ▽ More

    Submitted 3 February, 2025; originally announced February 2025.

  6. arXiv:2409.19417  [pdf, other

    cs.CR cs.AI

    Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning

    Authors: Jiaxin Li, Marco Arazzi, Antonino Nocera, Mauro Conti

    Abstract: Source Inference Attack (SIA) in Federated Learning (FL) aims to identify which client used a target data point for local model training. It allows the central server to audit clients' data usage. In cross-silo FL, a client (silo) collects data from multiple subjects (e.g., individuals, writers, or devices), posing a risk of subject information leakage. Subject Membership Inference Attack (SMIA) t… ▽ More

    Submitted 28 September, 2024; originally announced September 2024.

  7. arXiv:2404.19420  [pdf, other

    cs.LG cs.CR

    Let's Focus: Focused Backdoor Attack against Federated Transfer Learning

    Authors: Marco Arazzi, Stefanos Koffas, Antonino Nocera, Stjepan Picek

    Abstract: Federated Transfer Learning (FTL) is the most general variation of Federated Learning. According to this distributed paradigm, a feature learning pre-step is commonly carried out by only one party, typically the server, on publicly shared data. After that, the Federated Learning phase takes place to train a classifier collaboratively using the learned feature extractor. Each involved client contri… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  8. KDk: A Defense Mechanism Against Label Inference Attacks in Vertical Federated Learning

    Authors: Marco Arazzi, Serena Nicolazzo, Antonino Nocera

    Abstract: Vertical Federated Learning (VFL) is a category of Federated Learning in which models are trained collaboratively among parties with vertically partitioned data. Typically, in a VFL scenario, the labels of the samples are kept private from all the parties except for the aggregating server, that is the label owner. Nevertheless, recent works discovered that by exploiting gradient information return… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

    Journal ref: Neurocomputing 2025

  9. A Deep Reinforcement Learning Approach for Security-Aware Service Acquisition in IoT

    Authors: Marco Arazzi, Serena Nicolazzo, Antonino Nocera

    Abstract: The novel Internet of Things (IoT) paradigm is composed of a growing number of heterogeneous smart objects and services that are transforming architectures and applications, increasing systems' complexity, and the need for reliability and autonomy. In this context, both smart objects and services are often provided by third parties which do not give full transparency regarding the security and pri… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Journal ref: Journal of Information Security and Applications 2024

  10. The SemIoE Ontology: A Semantic Model Solution for an IoE-based Industry

    Authors: Marco Arazzi, Antonino Nocera, Emanuele Storti

    Abstract: Recently, the Industry 5.0 is gaining attention as a novel paradigm, defining the next concrete steps toward more and more intelligent, green-aware and user-centric digital systems. In an era in which smart devices typically adopted in the industry domain are more and more sophisticated and autonomous, the Internet of Things and its evolution, known as the Internet of Everything (IoE, for short),… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

    Journal ref: IEEE Internet of Things Journal 2024

  11. Privacy-Preserving in Blockchain-based Federated Learning Systems

    Authors: Sameera K. M., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Rafidha Rehiman K. A., Vinod P, Mauro Conti

    Abstract: Federated Learning (FL) has recently arisen as a revolutionary approach to collaborative training Machine Learning models. According to this novel framework, multiple participants train a global model collaboratively, coordinating with a central aggregator without sharing their local data. As FL gains popularity in diverse domains, security, and privacy concerns arise due to the distributed nature… ▽ More

    Submitted 7 January, 2024; originally announced January 2024.

    Comments: 44 pages, 11 figures

    Report number: 2401.03552

    Journal ref: computer-communications/2024

  12. arXiv:2311.08807  [pdf, other

    cs.CR

    NLP-Based Techniques for Cyber Threat Intelligence

    Authors: Marco Arazzi, Dincy R. Arikkat, Serena Nicolazzo, Antonino Nocera, Rafidha Rehiman K. A., Vinod P., Mauro Conti

    Abstract: In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and analysis useful to understand a threat actor's targets and attack behavior. Currently, CTI is assuming an always more crucial role in identifying and… ▽ More

    Submitted 15 November, 2023; originally announced November 2023.

  13. A Novel IoT Trust Model Leveraging Fully Distributed Behavioral Fingerprinting and Secure Delegation

    Authors: Marco Arazzi, Serena Nicolazzo, Antonino Nocera

    Abstract: With the number of connected smart devices expected to constantly grow in the next years, Internet of Things (IoT) solutions are experimenting a booming demand to make data collection and processing easier. The ability of IoT appliances to provide pervasive and better support to everyday tasks, in most cases transparently to humans, is also achieved through the high degree of autonomy of such devi… ▽ More

    Submitted 2 October, 2023; originally announced October 2023.

  14. arXiv:2308.02465  [pdf, other

    cs.LG cs.CR

    Label Inference Attacks against Node-level Vertical Federated GNNs

    Authors: Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu

    Abstract: Federated learning enables collaborative training of machine learning models by keeping the raw data of the involved workers private. Three of its main objectives are to improve the models' privacy, security, and scalability. Vertical Federated Learning (VFL) offers an efficient cross-silo setting where a few parties collaboratively train a model without sharing the same features. In such a scenar… ▽ More

    Submitted 18 April, 2024; v1 submitted 4 August, 2023; originally announced August 2023.

  15. arXiv:2305.10103  [pdf, other

    cs.SI cs.AI cs.LG

    Predicting Tweet Engagement with Graph Neural Networks

    Authors: Marco Arazzi, Marco Cotogni, Antonino Nocera, Luca Virgili

    Abstract: Social Networks represent one of the most important online sources to share content across a world-scale audience. In this context, predicting whether a post will have any impact in terms of engagement is of crucial importance to drive the profitable exploitation of these media. In the literature, several studies address this issue by leveraging direct features of the posts, typically related to t… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

    Comments: Accepted in ACM ICMR2023

    Journal ref: Proceedings of the 2023 ACM International Conference on Multimedia Retrieval

  16. Turning Privacy-preserving Mechanisms against Federated Learning

    Authors: Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek

    Abstract: Recently, researchers have successfully employed Graph Neural Networks (GNNs) to build enhanced recommender systems due to their capability to learn patterns from the interaction between involved entities. In addition, previous studies have investigated federated learning as the main solution to enable a native privacy-preserving mechanism for the construction of global GNN models without collecti… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

    Journal ref: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security