default search action
Alberto Ferrante
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Luca Butera, Andrea Cini, Alberto Ferrante, Cesare Alippi:
Object-Centric Relational Representations for Image Generation. Trans. Mach. Learn. Res. 2024 (2024) - [c35]Luca Crupi, Luca Butera, Alberto Ferrante, Daniele Palossi:
A Deep Learning-based Pest Insect Monitoring System for Ultra-low Power Pocket-sized Drones. DCOSS-IoT 2024: 323-330 - [i4]Luca Crupi, Luca Butera, Alberto Ferrante, Daniele Palossi:
A Deep Learning-based Pest Insect Monitoring System for Ultra-low Power Pocket-sized Drones. CoRR abs/2407.00815 (2024) - 2023
- [i3]Luca Butera, Andrea Cini, Alberto Ferrante, Cesare Alippi:
Relational Inductive Biases for Object-Centric Image Generation. CoRR abs/2303.14681 (2023) - 2022
- [j5]Luca Butera, Alberto Ferrante, Mauro Jermini, Mauro Prevostini, Cesare Alippi:
Precise Agriculture: Effective Deep Learning Strategies to Detect Pest Insects. IEEE CAA J. Autom. Sinica 9(2): 246-258 (2022)
2010 – 2019
- 2019
- [j4]Jelena Milosevic, Miroslaw Malek, Alberto Ferrante:
Time, accuracy and power consumption tradeoff in mobile malware detection systems. Comput. Secur. 82: 314-328 (2019) - 2018
- [c34]Filippo Maria Bianchi, Lorenzo Livi, Alberto Ferrante, Jelena Milosevic, Miroslaw Malek:
Time Series Kernel Similarities for Predicting Paroxysmal Atrial Fibrillation from ECGs. IJCNN 2018: 1-8 - [i2]Filippo Maria Bianchi, Lorenzo Livi, Alberto Ferrante, Jelena Milosevic, Miroslaw Malek:
Time series kernel similarities for predicting Paroxysmal Atrial Fibrillation from ECGs. CoRR abs/1801.06845 (2018) - 2017
- [c33]Alberto Ferrante, Miroslaw Malek, Fabio Martinelli, Francesco Mercaldo, Jelena Milosevic:
Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection. FPS 2017: 242-258 - 2016
- [c32]Alberto Ferrante, Eric Medvet, Francesco Mercaldo, Jelena Milosevic, Corrado Aaron Visaggio:
Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features. ARES 2016: 372-381 - [c31]Jelena Milosevic, Alberto Ferrante, Miroslaw Malek:
What does the memory say? Towards the most indicative features for efficient malware detection. CCNC 2016: 759-764 - [c30]Jelena Milosevic, Alberto Ferrante, Miroslaw Malek:
MalAware: Effective and Efficient Run-Time Mobile Malware Detector. DASC/PiCom/DataCom/CyberSciTech 2016: 270-277 - [c29]Jelena Milosevic, Miroslaw Malek, Alberto Ferrante:
Runtime Classification of Mobile Malware for Resource-Constrained Devices. ICETE (Selected Papers) 2016: 195-215 - [c28]Jelena Milosevic, Miroslaw Malek, Alberto Ferrante:
A Friend or a Foe? Detecting Malware using Memory and CPU Features. SECRYPT 2016: 73-84 - 2015
- [i1]Jelena Milosevic, Alberto Ferrante, Miroslaw Malek:
A general practitioner or a specialist for your infected smartphone? CoRR abs/1505.03329 (2015) - 2014
- [c27]Jelena Milosevic, Andreas Dittrich, Alberto Ferrante, Miroslaw Malek:
A Resource-Optimized Approach to Efficient Early Detection of Mobile Malware. ARES 2014: 333-340 - [c26]Jelena Milosevic, Andreas Dittrich, Alberto Ferrante, Miroslaw Malek, Camilo Rojas Quiros, Rubén Braojos, Giovanni Ansaloni, David Atienza:
Risk Assessment of Atrial Fibrillation: a Failure Prediction Approach. CinC 2014: 801-804 - [c25]Alberto Ferrante, Igor Kaitovic, Jelena Milosevic:
Modeling Requirements for Security-enhanced Design of Embedded Systems. SECRYPT 2014: 315-320 - 2013
- [c24]Alberto Ferrante, Jelena Milosevic, Marija Janjusevic:
A Security-enhanced Design Methodology for Embedded Systems. SECRYPT 2013: 39-50 - [c23]Alberto Ferrante, Massimo Chelodi, Francesco Bruschi, Valeria Mozzetti:
An Algorithm for Extended Dynamic Range Video in Embedded Systems. SENSORNETS 2013: 181-186 - 2012
- [c22]Leandro Fiorin, Alberto Ferrante, Konstantinos Padarnitsas, Francesco Regazzoni:
Security Enhanced Linux on embedded systems: A hardware-accelerated implementation. ASP-DAC 2012: 29-34 - 2011
- [c21]Antonio Vincenzo Taddeo, Luis Germán García Morales, Alberto Ferrante:
A Framework for Dynamic Optimization of Security and Performances. ICETE (Selected Papers) 2011: 315-329 - [c20]Antonio Vincenzo Taddeo, Luis Germán García Morales, Alberto Ferrante:
A Framework for Security and Workload Gradual Adaptation. SECRYPT 2011: 178-187 - [c19]Antonio Vincenzo Taddeo, Luis Germán García Morales, Alberto Ferrante:
System policies for gradual tuning of security and workload in wireless sensor networks. WTS 2011: 1-6 - 2010
- [c18]Leandro Fiorin, Alberto Ferrante, Konstantinos Padarnitsas, Stefano Carucci:
Hardware-assisted security enhanced Linux in embedded systems: a proposal. WESS 2010: 3 - [c17]Antonio Vincenzo Taddeo, Alberto Ferrante:
Security and Packets Delivery Trade-Off for WSN. CCNC 2010: 1-2 - [c16]Antonio Vincenzo Taddeo, Marcello Mura, Alberto Ferrante:
Dynamic Adaptation of Security and QoS in Energy-Harvesting Sensors Nodes. ICETE (Selected Papers) 2010: 243-258 - [c15]Antonio Vincenzo Taddeo, Marcello Mura, Alberto Ferrante:
QoS and Security in Energy-harvesting Wireless Sensor Networks. SECRYPT 2010: 241-250 - [c14]Antonio Vincenzo Taddeo, Laura Micconi, Alberto Ferrante:
Gradual adaptation of security for sensor networks. WOWMOM 2010: 1-9
2000 – 2009
- 2009
- [j3]Onur Derin, Alberto Ferrante, Antonio Vincenzo Taddeo:
Coordinated management of hardware and software self-adaptivity. J. Syst. Archit. 55(3): 170-179 (2009) - [j2]Onur Derin, Alberto Ferrante:
Enabling self-adaptivity in component-based streaming applications. SIGBED Rev. 6(3): 14 (2009) - [c13]Antonio Vincenzo Taddeo, Pierpaolo Marcon, Alberto Ferrante:
Negotiation of security services: a multi-criteria decision approach. WESS 2009 - [c12]Antonio Vincenzo Taddeo, Alberto Ferrante:
A Security Service Protocol for MANETs. CCNC 2009: 1-2 - [c11]Antonio Vincenzo Taddeo, Alberto Ferrante:
Run-time selection of security algorithms for networked devices. Q2SWinet 2009: 92-96 - 2008
- [c10]Alberto Ferrante, Simone Medardoni, Davide Bertozzi:
Network Interface Sharing Techniques for Area Optimized NoC Architectures. DSD 2008: 10-17 - [c9]Alberto Ferrante, Roberto Pompei, Anastasia Stulova, Antonio Vincenzo Taddeo:
A Protocol for Pervasive Distributed Computing Reliability. WiMob 2008: 574-579 - 2007
- [j1]Antonio Vincenzo Taddeo, Alberto Ferrante, Vincenzo Piuri:
Scheduling Small Packets in IPSec Multi-accelerator Based Systems. J. Commun. 2(2): 53-60 (2007) - [c8]Luigi Dadda, Alberto Ferrante, Marco Macchetti:
A Memory Unit for Priority Management in IPSec Accelerators. ICC 2007: 1533-1538 - [c7]Alberto Ferrante, Satish Chandra, Vincenzo Piuri:
IPSec Database Query Acceleration. ICETE (Selected Papers) 2007: 188-200 - [c6]Alberto Ferrante, Antonio Vincenzo Taddeo, Mariagiovanna Sami, Fabrizio Mantovani, Jurijs Fridkins:
Self-adaptive Security at Application Level: a Proposal. ReCoSoC 2007: 154-160 - [c5]Alberto Ferrante, Sathish Chandra, Vincenzo Piuri:
A Query Unit for The IPSec Databases. SECRYPT 2007: 133-139 - 2006
- [b1]Alberto Ferrante:
A design methodology for HW/SW security protocols. University of Milan, Italy, 2006 - [c4]Antonio Vincenzo Taddeo, Alberto Ferrante, Vincenzo Piuri:
Scheduling small packets in IPSec-based systems. CCNC 2006: 676-680 - 2005
- [c3]Alberto Ferrante, Vincenzo Piuri, Fabien Castanier:
A QoS-enabled packet scheduling algorithm for IPSec multi-accelerator based systems. Conf. Computing Frontiers 2005: 221-229 - [c2]Alberto Ferrante, Giuseppe Piscopo, Stefano Scaldaferri:
Application-Driven Optimization of VLIW Architectures: A Hardware-Software Approach. IEEE Real-Time and Embedded Technology and Applications Symposium 2005: 128-137 - 2004
- [c1]Fabien Castanier, Alberto Ferrante, Vincenzo Piuri:
A Packet Scheduling Algorithm for IPSec Multi-Accelerator Based Systems. ASAP 2004: 387-397
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint