Maurizio Atzori

ORCID: 0000-0001-6112-7310
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Semantic Web and Ontologies
  • Privacy-Preserving Technologies in Data
  • Natural Language Processing Techniques
  • Data Quality and Management
  • Topic Modeling
  • Biomedical Text Mining and Ontologies
  • Service-Oriented Architecture and Web Services
  • Advanced Database Systems and Queries
  • Internet Traffic Analysis and Secure E-voting
  • Data Mining Algorithms and Applications
  • Cryptography and Data Security
  • Pediatric Urology and Nephrology Studies
  • Ultrasound and Hyperthermia Applications
  • Scientific Computing and Data Management
  • Privacy, Security, and Data Protection
  • Urological Disorders and Treatments
  • Web Data Mining and Analysis
  • Imbalanced Data Classification Techniques
  • Data Management and Algorithms
  • Recommender Systems and Techniques
  • Wikis in Education and Collaboration
  • Kidney Stones and Urolithiasis Treatments
  • Advanced Clustering Algorithms Research
  • Big Data and Business Intelligence
  • Advanced Graph Neural Networks

Hôpital Edouard Herriot
2025

University of Cagliari
2013-2024

Vrije Universiteit Amsterdam
2019-2021

University of California, Irvine
2019-2021

Asia University
2019-2021

Sejong University
2021

Polytechnic University of Turin
2019

Nanjing University
2018

Azienda Ospedaliera San Camillo-Forlanini
2007-2013

Carlo Forlanini Hospital
2007-2013

Advances in information technology, and its use research, are increasing both the need for anonymized data risks of poor anonymization. We present a metric, δ-presence, that clearly links quality anonymization to risk posed by inadequate show existing techniques inappropriate situations where δ-presence is good metric (specifically, knowing an individual database poses privacy risk), algorithms effectively anonymizing meet δ-presence. The evaluated context real-world scenario, demonstrating...

10.1145/1247480.1247554 article EN 2007-06-11

Trajectory datasets are becoming more and popular due to the massive usage of GPS other location-based devices services. In this paper, we address privacy issues regarding identification individuals in static trajectory datasets. We provide protection by definig k-anonymity, meaning every released information refers at least k users/trajectories. propose a novel generalization-based approach that applies trajectories sequences general. also suggest use simple random reconstruction original...

10.1145/1503402.1503413 article EN 2008-11-04

In this paper we study when the disclosure of data mining results represents, per se, a threat to anonymity individuals recorded in analyzed database. The novelty our approach is that focus on an objective definition privacy compliance patterns without any reference preconceived knowledge what sensitive and not, basis rather intuitive realistic constraint should be guaranteed. particular, problem addressed here arises from possibility inferring output frequent itemset (i.e., set item-sets...

10.1109/icdm.2005.37 article EN 2006-01-05

10.1016/j.future.2015.04.018 article EN Future Generation Computer Systems 2015-05-08

This work explores using Large Language Models (LLMs) to translate user preferences into energy optimization constraints for home appliances. We describe a task where natural language utterances are converted formal smart appliances, within the broader context of renewable community (REC) and in Italian scenario. evaluate effectiveness various LLMs currently available translating these resorting classical zero-shot, one-shot, few-shot learning settings, pilot dataset requests paired with...

10.48550/arxiv.2503.21360 preprint EN arXiv (Cornell University) 2025-03-27

A novel method is demonstrated that allows semantic and well-structured knowledge bases (such as DBpedia) to be easily queried directly from Wikipedia's pages. Using Swipe, naive users with no of RDF triples SPARQL can query DBpedia powerful questions such as: "Who are the U.S. presidents who took office when they were 55-year old or younger, during last 60 years", "Find town in California less than 10 thousand people". This accomplished by a Search Example (SBE) approach where user enter...

10.1145/2187980.2188036 article EN 2012-04-16

The process of discovering relevant patterns holding in a database, was first indicated as threat to database security by O' Leary [20]. Since then, many different approaches for knowledge hiding have emerged over the years, mainly context association rules and frequent itemsets mining. Following real-world data applications demands, this paper we shift, problem contexts where both arid extracted sequential structure. We provide statement, some theoretical issues including NP-hardness...

10.1109/icdew.2007.4400985 article EN 2007-04-01

Ontologies have been widely used in numerous and varied applications, e.g. to support data modeling, information integration, knowledge management. With the increasing size of ontologies, ontology understanding, which is playing an important role different tasks, becoming more difficult. Consequently, summarization, as a way distill key from generate abridged version facilitate better getting growing attention. In this survey paper we review existing summarization techniques focus mainly on...

10.1142/s1793351x19300012 article EN International Journal of Semantic Computing 2019-06-01

Ensuring the security of personal accounts has become a key concern due to widespread password attack techniques. Although passwords are primary defense against unauthorized access, practice reusing easy-to-remember increases risks for people. Traditional methods evaluating strength often insufficient since they overlook public information that users frequently share on social networks. In addition, while tend limit access their data single profiles, is unintentionally shared across multiple...

10.1016/j.osnem.2024.100278 article EN cc-by-nc-nd Online Social Networks and Media 2024-06-15

Abstract In the generic setting of objects × attributes matrix data analysis, co‐clustering appears as an interesting unsupervised mining method. A task provides a bi‐partition made co‐clusters: each co‐cluster is group associated to and these associations can support expert interpretations. Many constrained clustering algorithms have been proposed exploit domain knowledge improve partition relevancy in mono‐dimensional case (e.g. using must‐link cannot‐link constraints on one two...

10.1002/sam.10064 article EN Statistical Analysis and Data Mining The ASA Data Science Journal 2009-12-30

This study aimed at estimating the prevalence of osteoporosis and osteopenia in a Sardinian isolated population using hand quantitative ultrasound investigating associated factors. The authors utilized subset data from large population-based epidemiologic survey carried out Ogliastra region Sardinia between 2003 2008. sample consists 6,326 men women aged ≥30 years, who underwent phalanges, bioelectrical impedance, anthropometric measurements, blood tests, standardized questionnaire...

10.1093/aje/kwr106 article EN American Journal of Epidemiology 2011-06-27
Coming Soon ...