Alfredo Cuzzocrea

ORCID: 0000-0002-7104-6415
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Database Systems and Queries
  • Data Management and Algorithms
  • Data Mining Algorithms and Applications
  • Data Quality and Management
  • Data Stream Mining Techniques
  • Cloud Computing and Resource Management
  • Semantic Web and Ontologies
  • Privacy-Preserving Technologies in Data
  • Network Security and Intrusion Detection
  • Big Data and Business Intelligence
  • Peer-to-Peer Network Technologies
  • Advanced Malware Detection Techniques
  • Distributed and Parallel Computing Systems
  • Anomaly Detection Techniques and Applications
  • Advanced Data Storage Technologies
  • Scientific Computing and Data Management
  • Complex Network Analysis Techniques
  • Cryptography and Data Security
  • Service-Oriented Architecture and Web Services
  • Time Series Analysis and Forecasting
  • Traffic Prediction and Management Techniques
  • Graph Theory and Algorithms
  • Sentiment Analysis and Opinion Mining
  • IoT and Edge/Fog Computing
  • Human Mobility and Location-Based Analysis

University of Calabria
2013-2025

Université Paris Cité
2023-2025

Université de Lorraine
2022-2024

Laboratoire Lorrain de Recherche en Informatique et ses Applications
2020-2024

Universidad de Deusto
2024

National Institute of Information and Communications Technology
2023

Western Washington University
2023

University of Nottingham Ningbo China
2023

DATA4 (France)
2023

Los Alamitos Medical Center
2020-2023

In this paper, we provide an overview of state-of-the-art research issues and achievements in the field analytics over big data, extend discussion to multidimensional data as well, by highlighting open problems actual trends. Our analytical contribution is finally completed several novel directions arising field, which plays a leading role next-generation Data Warehousing OLAP research.

10.1145/2064676.2064695 article EN 2011-10-28

Privacy and security of Big Data is gaining momentum in the research community, also due to emerging technologies like Cloud Computing, analytics engines social networks. In response this novel challenge, several privacy big data models, techniques algorithms have been proposed recently, mostly adhering algorithmic paradigms or model-oriented paradigms. Following major trend, paper we provide an overview state-of-the-art issues achievements field data, by highlighting open problems actual...

10.1145/2663715.2669614 article EN 2014-11-03

In this paper, we highlight open problems and actual research trends in the field of Data Warehousing OLAP over Big Data, an emerging term research. We also derive several novel directions arising field, put emphasis on possible contributions to be achieved by future efforts.

10.1145/2513190.2517828 article EN 2013-10-28

Recently, a great deal of interest for Big Data has risen, mainly driven from widespread number research problems strongly related to real-life applications and systems, such as representing, modeling, processing, querying mining massive, distributed, large-scale repositories (mostly being unstructured nature). Inspired by this main trend, in paper we discuss three important aspects research, namely OLAP over Data, Posting, Privacy Data. We also depict future directions, hence implicitly...

10.1145/2513591.2527071 article EN 2013-01-01

Business analytics use techniques from data science, mining, artificial intelligence (especially, machine learning), mathematics and statistics to gain insights understanding on the performance of business processes. The gained knowledge help driving planning. As employees play important roles in process, having a tool classify predict their wage levels is desirable. Such classification prediction enables public or private sector offer competitive wages for recruiting retaining employees. In...

10.1109/fuzz-ieee.2019.8858791 article EN 2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) 2019-06-01

In the current era of big data, huge quantities valuable which may be different levels veracity, are being generated at a rapid rate. Embedded into these data implicit, previously unknown and potentially useful information knowledge that can discovered by science solutions, apply techniques like mining. There has been trend more collections have made openly available in science, government non-profit organizations so people could collaboratively study analysis open data. this article, we...

10.1016/j.procs.2020.09.202 article EN Procedia Computer Science 2020-01-01

In this paper we present how fake news spread in the current online social networks. We discuss existing network technologies such as influence maximization, information diffusion, and epidemiological models contributes to creation spreading. Solutions reducing spreading of are also reviewed. make recommendations regarding future areas research field.

10.1109/bigdata.2017.8258484 article EN 2021 IEEE International Conference on Big Data (Big Data) 2017-12-01

With the rapid technological advancement, security has become a major issue due to increase in malware activity that poses serious threat and safety of both computer systems stakeholders. To maintain stakeholders, particularly, end users security, protecting data from fraudulent efforts is one most pressing concerns. A set malicious programming code, scripts, active content, or intrusive software designed destroy intended programs mobile web applications referred as malware. According study,...

10.1109/bigdata52589.2021.9671434 article EN 2021 IEEE International Conference on Big Data (Big Data) 2021-12-15

Abstract We analyze a case study in the field of smart agriculture exploiting Explainable AI (XAI) approach, that aims to provide interpretations and explanations behaviour systems. The regards multiclass classification problem on Crop Recommendation dataset. original task is prediction most adequate crop, according seven features. In addition predictions, two well-known XAI approaches have been used order obtain models: SHAP ( SH apley A dditive Ex P lanations), LIME (Local Interpretable...

10.1007/s11042-023-17978-z article EN cc-by Multimedia Tools and Applications 2024-01-15

With technological advancements, big data can be easily generated and collected in many applications. Embedded these are useful information knowledge that discovered by machine learning mining models, techniques or algorithms. A rich source of is stock exchange. The ability to effectively predict future prices improves the economic growth development a country. Traditional linear approaches for prediction (e.g., Kalman filters) may not practical handling like due highly nonlinear chaotic...

10.1109/icmla.2018.00242 article EN 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA) 2018-12-01

Since its debut in May 2016, Overwatch has quickly become a popular team-based online video game. Despite the popularity of Overwatch, many new players—who join game unsure how to compete with game’s veterans—feel overwhelmed vast knowledge required properly play at higher skill levels. In this paper, data mining algorithm is designed and developed for clustering visualization cyber-physical world boundary. Scientifically, uses affinity propagation two-dimensional graphs visualizing data....

10.1016/j.procs.2017.08.141 article EN Procedia Computer Science 2017-01-01

This paper explores the convergence of Data Warehousing, OLAP and data-intensive Cloud Infrastructures in context so-called analytics over Big Data. The briefly reviews some state-of-the-art proposals, highlights open research issues and, finally, it draws possible directions this scientific field.

10.1109/compsac.2013.152 article EN 2013-07-01

Social influence is referred to as the phenomenon that one's opinions or behaviors be affected by others. Nowadays, potential impact of social analysis (SIA) significant. For example, SIA applications can include viral marketing, online content recommendation. Convention uses hand-crafted features and requires domain expert knowledge. Such an approach not scalable introduces a high cost. To overcome these disadvantages, deep learning based approaches was introduced. One most recent DeepInf,...

10.1109/bigdata47090.2019.9005969 article EN 2021 IEEE International Conference on Big Data (Big Data) 2019-12-01

In the current era of big data, a huge amount data has been generated and collected from wide variety rich sources. Embedded in these are useful information valuable knowledge. An example is healthcare epidemiological such as related to patients who suffered epidemic diseases like coronavirus disease 2019 (COVID-19). Knowledge discovered helps researchers, epidemiologists policy makers get better understanding disease, which may inspire them come up ways detect, control combat disease. As "a...

10.1109/iv51561.2020.00073 article EN 2020 24th International Conference Information Visualisation (IV) 2020-09-01

In the current technological era, huge amounts of big data are generated and collected from a wide variety rich sources. These can be different levels veracity in sense that some them precise while others imprecise uncertain. Embedded these useful information valuable knowledge to discovered. An example is healthcare epidemiological such as related patients who suffered epidemic diseases like coronavirus disease 2019 (COVID-19). Knowledge discovered data-via science techniques machine...

10.1109/bigdata50022.2020.9378407 article EN 2021 IEEE International Conference on Big Data (Big Data) 2020-12-10

In recent years, artificial intelligence (AI) and its subarea of deep learning have drawn the attention many researchers. At same time, advances in technologies enable generation or collection large amounts valuable data (e.g., sensor data) from various sources different applications, such as those for Internet Things (IoT), which turn aims towards development smart cities. With availability sources, information fusion is demand effective integration big data. this article, we present an...

10.3390/s19061345 article EN cc-by Sensors 2019-03-18

Traditional network intrusion detection approaches encounter feasibility and sustainability issues to combat modern, sophisticated, unpredictable security attacks. Deep neural networks (DNN) have been successfully applied for problems. The optimal use of DNN-based classifiers requires careful tuning the hyper-parameters. Manually hyperparameters is tedious, time-consuming, computationally expensive. Hence, there a need an automatic technique find best DNN in detection. This paper proposes...

10.1109/bigdata52589.2021.9671576 article EN 2021 IEEE International Conference on Big Data (Big Data) 2021-12-15

With the ever-growing concern for internet security, field of quantum cryptography emerges as a promising solution enhancing security networking systems. In this paper, 20 notable papers from leading conferences and journals are reviewed categorized based on their focus various aspects cryptography, including key distribution, bit commitment, post-quantum counterfactual distribution. The paper explores motivations challenges employing addressing privacy concerns along with existing...

10.1109/bigdata59044.2023.10386889 article EN 2021 IEEE International Conference on Big Data (Big Data) 2023-12-15
Coming Soon ...