Aniello Castiglione

ORCID: 0000-0003-0571-1074
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Cryptography and Data Security
  • Advanced Steganography and Watermarking Techniques
  • Advanced Malware Detection Techniques
  • Cloud Data Security Solutions
  • User Authentication and Security Systems
  • Internet Traffic Analysis and Secure E-voting
  • Privacy-Preserving Technologies in Data
  • Opportunistic and Delay-Tolerant Networks
  • Caching and Content Delivery
  • Peer-to-Peer Network Technologies
  • Digital and Cyber Forensics
  • Chaos-based Image/Signal Encryption
  • Cloud Computing and Resource Management
  • Blockchain Technology Applications and Security
  • Biometric Identification and Security
  • Digital Media Forensic Detection
  • Access Control and Trust
  • Cryptographic Implementations and Security
  • Context-Aware Activity Recognition Systems
  • Mobile Ad Hoc Networks
  • Advanced Authentication Protocols Security
  • Complex Network Analysis Techniques
  • Security in Wireless Sensor Networks

University of Salerno
2012-2024

Parthenope University of Naples
2019-2023

University of Naples Federico II
2017-2019

Fordham University
2017

Ingegneria dei Trasporti (Italy)
2017

Bassano Bresciano Astronomical Observatory
2014

Polytechnic University of Turin
2010

A facial expression recognition system that can provide quick assistance to the healthcare and exceptional services patients is proposed in this article. The implementation of work divided into three components. In first component, landmark points on region are detected; a fixed-sized rectangular box obtained by normalizing detected face region, then, down sampled its varying sizes producing multiresolution images. Different convolution neural network architectures second component for...

10.1109/tii.2022.3141400 article EN IEEE Transactions on Industrial Informatics 2022-01-07

Cloud platforms encompass a large number of storage services that can be used to manage the needs customers. Each these services, offered by different provider, is characterized specific features, limitations and prices. In presence multiple options, it crucial select best solution fitting customer requirements in terms quality service costs. Most available approaches are not able handle uncertainty expression subjective preferences from customers, result wrong (or sub-optimal) selections...

10.1109/tc.2015.2389952 article EN IEEE Transactions on Computers 2015-01-08

A key benefit of connecting edge and cloud computing is the capability to achieve high-throughput under high concurrent accesses, mobility support, real-time processing guarantees, data persistency. For example, elastic provisioning storage capabilities provided by allow us cope with scalability, persistency reliability requirements adapt infrastructure capacity exacting needs based on amount generated data.

10.1109/mcc.2017.30 article EN IEEE Cloud Computing 2017-03-01

Cloud computing benefits from widespread adoption in every sector of our society and economy, due, at least part, to the promise cost-effective elastic provisioning resources. Manufacturing is one domain where cloud starting be seen as a promising solution strengthen collaboration cooperation capabilities, fostered by novel organization models strategies. The combination manufacturing domains has brought advent "cloud manufacturing," which rethinking way enterprises are organized how they...

10.1109/mcc.2016.79 article EN IEEE Cloud Computing 2016-07-01

Microservices can be broadly defined as the design of service-oriented software using a set small services. In microservice architecture, application complexity is distributed among narrowly focused and independently deployable units computation. Such result in security vulnerabilities. Trustworthiness also an issue when dealing with microservices. Moreover, there may gaps existing legal frameworks regard to this technology. Solutions these issues must seek balance between performance.

10.1109/mcc.2016.105 article EN IEEE Cloud Computing 2016-09-01

It is widely known that a quick disclosure of the COVID-19 can help to reduce its spread dramatically. Transcriptase polymerase chain reaction could be more useful, rapid, and trustworthy technique for evaluation classification disease. Currently, computerized method classifying computed tomography (CT) images chests crucial speeding up detection while epidemic rapidly spreading. In this article, authors have proposed an optimized convolutional neural network model (ADECO-CNN) divide...

10.1109/tii.2021.3057524 article EN IEEE Transactions on Industrial Informatics 2021-02-09

A key issue in electronic health systems is the underlying security and privacy risk. For example, confidential patient information or medical records ending up hands of a person not privy to could have far-reaching consequences. With trend toward cloud computing use healthcare industry continuing grow (for using platforms digitally manage health-related data including records), concerns must be adequately addressed, regulations on protections made compliance. This column examines several...

10.1109/mcc.2016.139 article EN IEEE Cloud Computing 2016-11-01

Deep learning methods have achieved great success in medical image analysis domain. However, most of them suffer from slow convergency and high computing cost, which prevents their further widely usage practical scenarios. Moreover, it has been proved that exploring embedding context knowledge deep network can significantly improve accuracy. To emphasize these tips, we present CDT-CAD, i.e., context-aware deformable transformers for end-to-end chest abnormality detection on X-Ray images....

10.1109/tcbb.2023.3258455 article EN IEEE/ACM Transactions on Computational Biology and Bioinformatics 2023-03-17

SUMMARY Network anomalies, circumstances in which the network behavior deviates from its normal operational baseline, can be due to various factors such as overload conditions, malicious/hostile activities, denial of service attacks, and intrusions. New detection schemes based on machine learning principles are therefore desirable they learn nature traffic autonomously adapt variations structure ‘normality’ well recognize significant deviations suspicious or anomalous events. The main...

10.1002/cpe.3061 article EN Concurrency and Computation Practice and Experience 2013-06-20

A hierarchical key assignment scheme is a method to assign some private information and encryption keys set of classes in partially ordered hierarchy, such way that the higher class can be used derive all lower down hierarchy. Sometimes, it necessary make dynamic updates order implement an access control policy which evolves with time. All security models for schemes have been designed cope static hierarchies do not consider issue performing In this paper, we define concept supporting...

10.1109/tifs.2016.2581147 article EN IEEE Transactions on Information Forensics and Security 2016-06-15

Access control ensures that only the authorized users of a system are allowed to access certain resources or tasks. Usually, according their roles and responsibilities, organized in hierarchies formed by number disjoint classes. Such implemented assigning key each class, so keys for descendant classes can be efficiently derived from higher hierarchy. However, pure hierarchical may represent limitation many real-world cases. In fact, sometimes it is necessary ensure resource task considering...

10.1109/tifs.2015.2512533 article EN IEEE Transactions on Information Forensics and Security 2015-12-25
Coming Soon ...