Michele Cirillo

ORCID: 0000-0001-8262-7007
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Complex Network Analysis Techniques
  • Network Security and Intrusion Detection
  • Opinion Dynamics and Social Influence
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Malware Detection Techniques
  • Distributed Sensor Networks and Detection Algorithms
  • Control Systems and Identification
  • Neural Networks and Applications
  • Neural Networks Stability and Synchronization
  • Chaos-based Image/Signal Encryption
  • Software-Defined Networks and 5G
  • Advanced Graph Neural Networks
  • Game Theory and Applications
  • Gaussian Processes and Bayesian Inference
  • Spam and Phishing Detection
  • Health and Well-being Studies
  • Gene Regulatory Network Analysis

University of Salerno
2019-2023

Consorzio Nazionale Interuniversitario per le Telecomunicazioni
2021-2022

In a Distributed Denial of Service (DDoS) attack, network (botnet) dispersed agents (bots) sends requests to website saturate its resources. Since the are sent by automata, typical way detect them is look for some repetition pattern or commonalities between same user from different users. For this reason, recent DDoS variants exploit communication layers that offer broader possibility in terms admissible request patterns, such as, e.g., application layer. case, malicious can pick legitimate...

10.1109/tifs.2021.3082290 article EN IEEE Transactions on Information Forensics and Security 2021-01-01

A network attacker wants to transmit Voice-over-IP (VoIP) traffic streams covertly. He tries evade the detection system by manipulating VoIP through padding, shifting, and splitting operations, so as conceal them amidst Internet traffic. defender detect manipulated streams. Tackling this problem from an adversarial perspective, we provide two contributions: 1) obtain a highly stylized representation of in terms transmission frequency F packet length L, characterize (F, L) region achievable...

10.1109/tifs.2019.2922398 article EN IEEE Transactions on Information Forensics and Security 2019-06-12

This work examines a social learning problem, where dispersed agents connected through network topology interact locally to form their opinions ( <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">beliefs</i> ) as regards certain hypotheses of interest. These evolve over time, since the collect observations from environment, and update current beliefs by accounting for: past beliefs, innovation contained in new data, received neighbors. The...

10.1109/tsp.2023.3294615 article EN IEEE Transactions on Signal Processing 2023-01-01

In social learning, a group of agents linked by graph topology collect data and exchange opinions on some topic interest, represented finite set hypotheses. Traditional learning algorithms allow all in the network to gain full confidence true underlying hypothesis as number observations increases. Under partial information sharing, can only single hypothesis. This introduces significant challenges compared standard case opinion sharing. We propose novel strategy where each agent forms valid...

10.1109/icassp49357.2023.10096186 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2023-05-05

We consider the problem of identifying members a botnet under an application-layer (L7) DDoS attack, where target site is flooded with large number requests that emulate legitimate users' patterns. This challenging has been recently addressed reference to two simplified scenarios, either all bots pick from same emulation dictionary (total overlap), or they are divided in separate clusters corresponding distinct dictionaries (no overlap at all). However, over real networks these extreme...

10.1109/icassp39728.2021.9413570 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2021-05-13

This work examines the problem of learning topology a network (graph learning) from signals produced at subset nodes (partial observability). challenging was recently tackled assuming that is drawn according to an Erdős-Rényi model, for which it shown graph under partial observability achievable, exploiting in particular homogeneity across and independence edges. However, several real-world networks do not match optimistic assumptions homogeneity/independence, example, high het-erogeneity...

10.1109/icassp39728.2021.9414217 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2021-05-13

This work addresses the problem of learning topology a network from signals emitted by nodes. These are generated over time through linear diffusion process, where neighboring nodes exchange messages according to underlying topology, and aggregate them certain combination matrix. We consider demanding setting graph under partial observability, available only limited fraction nodes, we want establish whether these can be estimated faithfully, despite presence possibly many latent Recent...

10.1109/tit.2022.3211078 article EN cc-by IEEE Transactions on Information Theory 2022-10-06

Objective: Hyperuricemia can be both determined by overproduction (due to xanthine oxidase hyperactivity) or renal hypoexcretion. In this latter case, also diuretic use (particularly hydrochlorotiazhide) involved. While the relationship between hyperuricemia and CardioVascular (CV) events has been definitively linked in many studies, data on related are still lacking. The objective of analysis is assess induced CV events. Design method: URic acid Right for heArt Health study a nationwide,...

10.1097/01.hjh.0000744828.15487.be article EN Journal of Hypertension 2021-04-01

network attacker wants to transmit VoIP traffic streams covertly. He tries evade the detection system by manipulating through padding and shifting operations, so as conceal them amidst Internet traffic. A defender (the system) detect manipulated streams. Tackling this problem from an adversarial perspective, we provide two contributions: i) obtain a highly stylized representation of in terms transmission frequency $\mathcal{F}$ payload $\mathcal{L}$, characterize $(\mathcal{F},\...

10.1109/iccnc.2019.8685492 article EN 2016 International Conference on Computing, Networking and Communications (ICNC) 2019-02-01

This work deals with cyber-threat propagation across a communication network designed according to the network-slicing paradigm. Exploiting multi-dimensional Birth-Death-Immigration model, we examine threat percolation from vulnerable slice virtually secured slice. The analysis quantifies role played by slice-coupling on propagation, revealing how cross-slice attacks can be particularly dangerous in applications where attacker opens door some relative, e.g., ordinary services, breaking...

10.1109/icassp43922.2022.9746448 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2022-04-27

The detection of encrypted multimedia traffic (like VoIP or Video) is a crucial task for both TELCO operators and authorities involved in lawful interception issues. As an example, Skype that cannot be detected through classical methods as port-based (because random based choice port option) nor payload inspection encryption mechanisms adopted). Dwelling on Skype, the aim this work to propose novel technique that, by recasting regularities data streams terms recurrence plots (a...

10.12783/dteees/seeie2016/4538 article EN DEStech Transactions on Environment Energy and Earth Science 2016-12-21

This work examines a social learning problem, where dispersed agents connected through network topology interact locally to form their opinions (beliefs) as regards certain hypotheses of interest. These evolve over time, since the collect observations from environment, and update current beliefs by accounting for: past beliefs, innovation contained in new data, received neighbors. The distinguishing feature present is that are constrained share regarding only single hypothesis. We devise...

10.48550/arxiv.2301.10688 preprint EN other-oa arXiv (Cornell University) 2023-01-01

This work examines the problem of learning a network graph from signals emitted by nodes, according to diffusion model ruled Laplacian combination policy. The challenging regime partial observability is considered, where are collected limited subset and we wish estimate subgraph connections between these probed nodes. For static setting fixed during estimation process, examine sample complexity (number time samples necessary achieve consistent as size grows) Erdős-Rényi Bollobás-Riordan...

10.1109/icassp49357.2023.10097221 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2023-05-05

In this brief we investigate the generalization properties of a recently-proposed class non-parametric activation functions, kernel functions (KAFs). KAFs introduce additional parameters in learning process order to adapt nonlinearities individually on per-neuron basis, exploiting cheap expansion every value. While increase flexibility has been shown provide significant improvements practice, theoretical proof for its capability not addressed yet literature. Here, leverage recent literature...

10.48550/arxiv.1903.11990 preprint EN other-oa arXiv (Cornell University) 2019-01-01
Coming Soon ...