Identifying security and privacy violation rules in trigger-action IoT platforms with NLP models B Breve, G Cimino, V Deufemia IEEE Internet of Things Journal 10 (6), 5607-5622, 2022 | 26 | 2022 |
Towards Explainable Security for ECA Rules. B Breve, G Cimino, V Deufemia EMPATHY@ AVI, 26-30, 2022 | 5 | 2022 |
On the User Perception of Security Risks of TAP Rules: A User Study B Breve, G Cimino, G Desolda, V Deufemia, A Elefante International Symposium on End User Development, 162-179, 2023 | 4 | 2023 |
Brain tumors classification from MRI images: A comparative study between different neural networks B Breve, L Caruccio, G Cimino, S Cirillo, G Iuliano, G Polese DMSVIVA 2022-Proceedings of the 28th International DMS conference on …, 2022 | 3 | 2022 |
Towards a Classification Model for Identifying Risky IFTTT Applets. B Breve, G Cimino, V Deufemia EMPATHY@ INTERACT, 33-37, 2021 | 3 | 2021 |
A BERT-based Model for Semantic Consistency Checking of Automation Rules B Breve, G Cimino, V Deufemia, A Elefante DMSVIVA 2023-Proceedings of the 29th International DMS Conference on …, 2023 | 1 | 2023 |
On Privacy Disclosure from User-Generated Content of Automation Rules. B Breve, G Cimino, V Deufemia, A Elefante IS-EUD Workshops, 2023 | 1 | 2023 |
Surveying federated learning approaches through a multi-criteria categorization L Caruccio, G Cimino, V Deufemia, G Iuliano, R Stanzione Multimedia Tools and Applications 83 (12), 36921-36951, 2024 | | 2024 |
Malicious Account Identification in Social Network Platforms L Caruccio, G Cimino, S Cirillo, D Desiato, G Polese, G Tortora ACM Transactions on Internet Technology 23 (4), 1-25, 2023 | | 2023 |
User Perception of Risks Associated with IFTTT Applets: A Preliminary User Study B Breve, G Cimino, V Deufemia, A Elefante CEUR WORKSHOP PROCEEDINGS 3488, 1-13, 2023 | | 2023 |