Skip to main content

Showing 1–26 of 26 results for author: De Nicola, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.00388  [pdf, ps, other

    cs.CV

    Deepfake Media Forensics: State of the Art and Challenges Ahead

    Authors: Irene Amerini, Mauro Barni, Sebastiano Battiato, Paolo Bestagini, Giulia Boato, Tania Sari Bonaventura, Vittoria Bruni, Roberto Caldelli, Francesco De Natale, Rocco De Nicola, Luca Guarnera, Sara Mandelli, Gian Luca Marcialis, Marco Micheletto, Andrea Montibeller, Giulia Orru', Alessandro Ortis, Pericle Perazzo, Giovanni Puglisi, Davide Salvi, Stefano Tubaro, Claudia Melis Tonti, Massimo Villari, Domenico Vitulano

    Abstract: AI-generated synthetic media, also called Deepfakes, have significantly influenced so many domains, from entertainment to cybersecurity. Generative Adversarial Networks (GANs) and Diffusion Models (DMs) are the main frameworks used to create Deepfakes, producing highly realistic yet fabricated content. While these technologies open up new creative possibilities, they also bring substantial ethical… ▽ More

    Submitted 13 August, 2024; v1 submitted 1 August, 2024; originally announced August 2024.

  2. Mitigating and Analysis of Memory Usage Attack in IoE System

    Authors: Zainab Alwaisi, Simone Soderi, Rocco De Nicola

    Abstract: Internet of Everything (IoE) is a newly emerging trend, especially in homes. Marketing forces toward smart homes are also accelerating the spread of IoE devices in households. An obvious risk of the rapid adoption of these smart devices is that many lack controls for protecting the privacy and security of end users from attacks designed to disrupt lives and incur financial losses. Today the smart… ▽ More

    Submitted 15 October, 2024; v1 submitted 30 April, 2024; originally announced April 2024.

    Comments: cite as: Alwaisi, Z., Soderi, S., De Nicola, R. (2023). Mitigating and Analysis of Memory Usage Attack in IoE System. In: Vo, NS., Tran, HA. (eds) Industrial Networks and Intelligent Systems. INISCOM 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 531. Springer, Cham. https://doi.org/10.1007/978-3-031-47359-3_22

    Journal ref: Industrial Networks and Intelligent Systems,2023

  3. Detection of Energy Consumption Cyber Attacks on Smart Devices

    Authors: Zainab Alwaisi, Simone Soderi, Rocco De Nicola

    Abstract: With the rapid development of Internet of Things (IoT) technology, intelligent systems are increasingly integrating into everyday life and people's homes. However, the proliferation of these technologies raises concerns about the security of smart home devices. These devices often face resource constraints and may connect to unreliable networks, posing risks to the data they handle. Securing IoT t… ▽ More

    Submitted 15 October, 2024; v1 submitted 30 April, 2024; originally announced April 2024.

    Comments: Alwaisi, Z., Soderi, S., De Nicola, R. (2024). Detection of Energy Consumption Cyber Attacks on Smart Devices. In: Perakovic, D., Knapcikova, L. (eds) Future Access Enablers for Ubiquitous and Intelligent Infrastructures. FABULOUS 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 542. Springer, Cham. 10.1007/978-3-031-50051-0_12

    Journal ref: Springer Nature Switzerland,2023

  4. Energy Cyber Attacks to Smart Healthcare Devices: A Testbed

    Authors: Zainab Alwaisi, Simone Soderi, Rocco De Nicola

    Abstract: The Internet of Things (IoT) has garnered significant interest in both research and industry due to its profound impact on human life. The rapid expansion of IoT technology has ushered in smart healthcare, smart devices, smart cities, and smart grids. However, the security of IoT devices, particularly in healthcare, has become a major concern, with recent attacks revealing serious vulnerabilities.… ▽ More

    Submitted 15 October, 2024; v1 submitted 30 April, 2024; originally announced April 2024.

    Comments: Cite: Alwaisi, Z., Soderi, S., Nicola, R.D. (2023). Energy Cyber Attacks to Smart Healthcare Devices: A Testbed. In: Chen, Y., Yao, D., Nakano, T. (eds) Bio-inspired Information and Communications Technologies. BICT 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 512. Springer, Cham. https://doi.org/10.1007/978-3-031-43135-7_24

    Journal ref: Bio-inspired Information and Communications Technologies, 2023

  5. CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN

    Authors: Simone Soderi, Rocco De Nicola

    Abstract: Covert channel networks are a well-known method for circumventing the security measures organizations put in place to protect their networks from adversarial attacks. This paper introduces a novel method based on bit-rate modulation for implementing covert channels between devices connected over a wide area network. This attack can be exploited to exfiltrate sensitive information from a machine (i… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Journal ref: Emerging Information Security and Applications, 2024

  6. Online disinformation in the 2020 U.S. Election: swing vs. safe states

    Authors: Manuel Pratelli, Marinella Petrocchi, Fabio Saracco, Rocco De Nicola

    Abstract: For U.S. presidential elections, most states use the so-called winner-take-all system, in which the state's presidential electors are awarded to the winning political party in the state after a popular vote phase, regardless of the actual margin of victory. Therefore, election campaigns are especially intense in states where there is no clear direction on which party will be the winning party. The… ▽ More

    Submitted 12 March, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

    Comments: arXiv admin note: text overlap with arXiv:2303.12474

  7. arXiv:2303.12474  [pdf, other

    cs.SI

    Swinging in the States: Does disinformation on Twitter mirror the US presidential election system?

    Authors: Manuel Pratelli, Marinella Petrocchi, Fabio Saracco, Rocco De Nicola

    Abstract: For more than a decade scholars have been investigating the disinformation flow on social media contextually to societal events, like, e.g., elections. In this paper, we analyze the Twitter traffic related to the US 2020 pre-election debate and ask whether it mirrors the electoral system. The U.S. electoral system provides that, regardless of the actual vote gap, the premier candidate who received… ▽ More

    Submitted 22 March, 2023; originally announced March 2023.

    Comments: 9 pages, 2 figures; Accepted @CySoc 2023, International Workshop on Cyber Social Threats, co-located with the ACM Web conference 2023, April 30, 2023. The present version is a preprint

  8. arXiv:2101.10782  [pdf, other

    cs.SI

    A Behavioural Analysis of Credulous Twitter Users

    Authors: Alessandro Balestrucci, Rocco De Nicola, Marinella Petrocchi, Catia Trubiani

    Abstract: Thanks to platforms such as Twitter and Facebook, people can know facts and events that otherwise would have been silenced. However, social media significantly contribute also to fast spreading biased and false news while targeting specific segments of the population. We have seen how false information can be spread using automated accounts, known as bots. Using Twitter as a benchmark, we investig… ▽ More

    Submitted 26 January, 2021; originally announced January 2021.

    Comments: Under submission

  9. Flow of online misinformation during the peak of the COVID-19 pandemic in Italy

    Authors: Guido Caldarelli, Rocco de Nicola, Marinella Petrocchi, Manuel Pratelli, Fabio Saracco

    Abstract: The COVID-19 pandemic has impacted on every human activity and, because of the urgency of finding the proper responses to such an unprecedented emergency, it generated a diffused societal debate. The online version of this discussion was not exempted by the presence of d/misinformation campaigns, but differently from what already witnessed in other debates, the COVID-19 -- intentional or not -- fl… ▽ More

    Submitted 23 February, 2021; v1 submitted 5 October, 2020; originally announced October 2020.

    Comments: 25 pages, 4 figures. The Abstract, the Introduction, the Results, the Conclusions and the Methods were substantially rewritten. The plot of the network have been changed, as well as tables

    Journal ref: EPJ Data Sci. 10, 34 (2021)

  10. arXiv:2005.03550  [pdf, ps, other

    cs.SI cs.IR

    Credulous Users and Fake News: a Real Case Study on the Propagation in Twitter

    Authors: Alessandro Balestrucci, Rocco De Nicola

    Abstract: Recent studies have confirmed a growing trend, especially among youngsters, of using Online Social Media as favourite information platform at the expense of traditional mass media. Indeed, they can easily reach a wide audience at a high speed; but exactly because of this they are the preferred medium for influencing public opinion via so-called fake news. Moreover, there is a general agreement tha… ▽ More

    Submitted 7 May, 2020; originally announced May 2020.

    Comments: 15 pages and 8 tables. Accepted to appear in the Proceedings at IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS2020)

  11. arXiv:1912.01289  [pdf, other

    cs.PL cs.FL cs.LO cs.SE

    A Formal Approach to the Engineering of Domain-Specific Distributed Systems

    Authors: Rocco De Nicola, Gianluigi Ferrari, Rosario Pugliese, Francesco Tiezzi

    Abstract: We review some results regarding specification, programming and verification of different classes of distributed systems which stemmed from the research of the Concurrency and Mobility Group at University of Firenze. More specifically, we examine the distinguishing features of network-aware programming, service-oriented computing, autonomic computing, and collective adaptive systems programming. W… ▽ More

    Submitted 3 December, 2019; originally announced December 2019.

    Comments: In Press

    Journal ref: Journal of Logical and Algebraic Methods in Programming, Elsevier, 2019

  12. arXiv:1909.03851  [pdf, ps, other

    cs.SI cs.CY

    Do you really follow them? Automatic detection of credulous Twitter users

    Authors: Alessandro Balestrucci, Rocco De Nicola, Marinella Petrocchi, Catia Trubiani

    Abstract: Online Social Media represent a pervasive source of information able to reach a huge audience. Sadly, recent studies show how online social bots (automated, often malicious accounts, populating social networks and mimicking genuine users) are able to amplify the dissemination of (fake) information by orders of magnitude. Using Twitter as a benchmark, in this work we focus on what we define credulo… ▽ More

    Submitted 9 September, 2019; originally announced September 2019.

    Comments: 8 pages, 2 tables. Accepted for publication at IDEAL 2019 (20th International Conference on Intelligent Data Engineering and Automated Learning, Manchester, UK, 14-16 November, 2019). The present version is the accepted version, and it is not the final published version

  13. The role of bot squads in the political propaganda on Twitter

    Authors: Guido Caldarelli, Rocco De Nicola, Fabio Del Vigna, Marinella Petrocchi, Fabio Saracco

    Abstract: Social Media are nowadays the privileged channel for information spreading and news checking. Unexpectedly for most of the users, automated accounts, also known as social bots, contribute more and more to this process of news spreading. Using Twitter as a benchmark, we consider the traffic exchanged, over one month of observation, on a specific topic, namely the migration flux from Northern Africa… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

    Comments: Under Submission

    Journal ref: Commun Phys 3, 81 (2020)

  14. arXiv:1805.03724  [pdf, other

    cs.FL cs.SE

    DReAM: Dynamic Reconfigurable Architecture Modeling (full paper)

    Authors: Rocco De Nicola, Alessandro Maggi, Joseph Sifakis

    Abstract: Modern systems evolve in unpredictable environments and have to continuously adapt their behavior to changing conditions. The "DReAM" (Dynamic Reconfigurable Architecture Modeling) framework, has been designed for modeling reconfigurable dynamic systems. It provides a rule-based language, inspired from Interaction Logic, which is expressive and easy to use encompassing all aspects of dynamicity in… ▽ More

    Submitted 23 October, 2018; v1 submitted 9 May, 2018; originally announced May 2018.

    Comments: 29 pages, 10 figures

  15. Towards formal models and languages for verifiable Multi-Robot Systems

    Authors: Rocco De Nicola, Luca Di Stefano, Omar Inverso

    Abstract: Incorrect operations of a Multi-Robot System (MRS) may not only lead to unsatisfactory results, but can also cause economic losses and threats to safety. These threats may not always be apparent, since they may arise as unforeseen consequences of the interactions between elements of the system. This call for tools and techniques that can help in providing guarantees about MRSs behaviour. We think… ▽ More

    Submitted 8 May, 2018; v1 submitted 22 April, 2018; originally announced April 2018.

    Comments: Changed formatting

  16. arXiv:1711.09762  [pdf, other

    cs.LO

    A Behavioural Theory for Interactions in Collective-Adaptive Systems

    Authors: Yehia Abd Alrahman, Rocco De Nicola, Michele Loreti

    Abstract: We propose a process calculus, named AbC, to study the behavioural theory of interactions in collective-adaptive systems by relying on attribute-based communication. An AbC system consists of a set of parallel components each of which is equipped with a set of attributes. Communication takes place in an implicit multicast fashion, and interaction among components is dynamically established by taki… ▽ More

    Submitted 29 July, 2018; v1 submitted 23 November, 2017; originally announced November 2017.

    Comments: 30 pages, preprint submitted to Elsevier. arXiv admin note: text overlap with arXiv:1711.06092 and arXiv:1602.05635

  17. arXiv:1711.06092  [pdf, other

    cs.PL

    Programming the Interactions of Collective Adaptive Systems by Relying on Attribute-based Communication

    Authors: Yehia Abd Alrahman, Rocco De Nicola, Michele Loreti

    Abstract: Collective adaptive systems are new emerging computational systems consisting of a large number of interacting components and featuring complex behaviour. These systems are usually distributed, heterogeneous, decentralised and interdependent, and are operating in dynamic and possibly unpredictable environments. Finding ways to understand and design these systems and, most of all, to model the inte… ▽ More

    Submitted 29 November, 2017; v1 submitted 26 October, 2017; originally announced November 2017.

  18. Multiparty testing preorders

    Authors: Rocco de Nicola, HernĂ¡n Melgratti

    Abstract: Variants of the must testing approach have been successfully applied in service oriented computing for analysing the compliance between (contracts exposed by) clients and servers or, more generally, between two peers. It has however been argued that multiparty scenarios call for more permissive notions of compliance because partners usually do not have full coordination capabilities. We propose tw… ▽ More

    Submitted 4 January, 2023; v1 submitted 9 December, 2016; originally announced December 2016.

    Journal ref: Logical Methods in Computer Science, Volume 19, Issue 1 (January 5, 2023) lmcs:2598

  19. arXiv:1612.02979  [pdf, other

    cs.DC

    Tuple spaces implementations and their efficiency

    Authors: Vitaly Buravlev, Rocco De Nicola, Claudio Antares Mezzina

    Abstract: Among the paradigms for parallel and distributed computing, the one popularized with Linda, and based on tuple spaces, is one of the least used, despite the fact of being intuitive, easy to understand and to use. A tuple space is a repository, where processes can add, withdraw or read tuples by means of atomic operations. Tuples may contain different values, and processes can inspect their content… ▽ More

    Submitted 9 December, 2016; originally announced December 2016.

  20. arXiv:1602.05635  [pdf, other

    cs.LO

    On the Power of Attribute-based Communication

    Authors: Yehia Abd Alrahman, Rocco De Nicola, Michele Loreti

    Abstract: In open systems, i.e. systems operating in an environment that they cannot control and with components that may join or leave, behaviors can arise as side effects of intensive components interaction. Finding ways to understand and design these systems and, most of all, to model the interactions of their components, is a difficult but important endeavor. To tackle these issues, we present AbC, a ca… ▽ More

    Submitted 17 February, 2016; originally announced February 2016.

    Comments: Extended Technical Report, All proofs are included in the appendix

  21. arXiv:1509.08560  [pdf, other

    cs.PL cs.DC cs.PF

    CARMA: Collective Adaptive Resource-sharing Markovian Agents

    Authors: Luca Bortolussi, Rocco De Nicola, Vashti Galpin, Stephen Gilmore, Jane Hillston, Diego Latella, Michele Loreti, Mieke Massink

    Abstract: In this paper we present CARMA, a language recently defined to support specification and analysis of collective adaptive systems. CARMA is a stochastic process algebra equipped with linguistic constructs specifically developed for modelling and programming systems that can operate in open-ended and unpredictable environments. This class of systems is typically composed of a huge number of interact… ▽ More

    Submitted 28 September, 2015; originally announced September 2015.

    Comments: In Proceedings QAPL 2015, arXiv:1509.08169

    ACM Class: C.4; B.8.2

    Journal ref: EPTCS 194, 2015, pp. 16-31

  22. Domain-specific queries and Web search personalization: some investigations

    Authors: Van Tien Hoang, Angelo Spognardi, Francesco Tiezzi, Marinella Petrocchi, Rocco De Nicola

    Abstract: Major search engines deploy personalized Web results to enhance users' experience, by showing them data supposed to be relevant to their interests. Even if this process may bring benefits to users while browsing, it also raises concerns on the selection of the search results. In particular, users may be unknowingly trapped by search engines in protective information bubbles, called "filter bubbles… ▽ More

    Submitted 16 August, 2015; originally announced August 2015.

    Comments: In Proceedings WWV 2015, arXiv:1508.03389

    Journal ref: EPTCS 188, 2015, pp. 51-58

  23. Revisiting Trace and Testing Equivalences for Nondeterministic and Probabilistic Processes

    Authors: Marco Bernardo, Rocco De Nicola, Michele Loreti

    Abstract: Two of the most studied extensions of trace and testing equivalences to nondeterministic and probabilistic processes induce distinctions that have been questioned and lack properties that are desirable. Probabilistic trace-distribution equivalence differentiates systems that can perform the same set of traces with the same probabilities, and is not a congruence for parallel composition. Probabili… ▽ More

    Submitted 4 March, 2014; v1 submitted 21 February, 2014; originally announced February 2014.

    Journal ref: Logical Methods in Computer Science, Volume 10, Issue 1 (March 3, 2014) lmcs:1137

  24. The Spectrum of Strong Behavioral Equivalences for Nondeterministic and Probabilistic Processes

    Authors: Marco Bernardo, Rocco De Nicola, Michele Loreti

    Abstract: We present a spectrum of trace-based, testing, and bisimulation equivalences for nondeterministic and probabilistic processes whose activities are all observable. For every equivalence under study, we examine the discriminating power of three variants stemming from three approaches that differ for the way probabilities of events are compared when nondeterministic choices are resolved via determini… ▽ More

    Submitted 11 June, 2013; originally announced June 2013.

    Comments: In Proceedings QAPL 2013, arXiv:1306.2413

    Journal ref: EPTCS 117, 2013, pp. 81-96

  25. arXiv:1305.0538  [pdf, other

    cs.LO

    A Companion of "Relating Strong Behavioral Equivalences for Processes with Nondeterminism and Probabilities"

    Authors: Marco Bernardo, Rocco De Nicola, Michele Loreti

    Abstract: In the paper "Relating Strong Behavioral Equivalences for Processes with Nondeterminism and Probabilities" to appear in TCS, we present a comparison of behavioral equivalences for nondeterministic and probabilistic processes. In particular, we consider strong trace, failure, testing, and bisimulation equivalences. For each of these groups of equivalences, we examine the discriminating power of thr… ▽ More

    Submitted 12 December, 2013; v1 submitted 2 May, 2013; originally announced May 2013.

  26. arXiv:1108.1865  [pdf, ps, other

    cs.DC cs.LO cs.SE

    Uniform Labeled Transition Systems for Nondeterministic, Probabilistic, and Stochastic Process Calculi

    Authors: Marco Bernardo, Rocco De Nicola, Michele Loreti

    Abstract: Labeled transition systems are typically used to represent the behavior of nondeterministic processes, with labeled transitions defining a one-step state to-state reachability relation. This model has been recently made more general by modifying the transition relation in such a way that it associates with any source state and transition label a reachability distribution, i.e., a function mapping… ▽ More

    Submitted 9 August, 2011; originally announced August 2011.

    Comments: In Proceedings PACO 2011, arXiv:1108.1452

    Journal ref: EPTCS 60, 2011, pp. 66-75