Aniello Castiglione

Aniello Castiglione
Parthenope University of Naples | Università Parthenope · Department of Science and Technology

PhD

About

238
Publications
36,761
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,656
Citations
Additional affiliations
November 2004 - May 2008
Association for Computing Machinery
Position
  • PhD Student

Publications

Publications (238)
Article
Full-text available
Recent years have witnessed a dramatic evolution in small-scale remote sensors such as Unmanned aerial vehicles (UAVs). Characteristics such as automatic flight control, flight time, and image acquisition have fueled various computer-vision tasks, providing better efficiency and usefulness than fixed viewing surveillance cameras. However, in constr...
Article
Full-text available
Biometric based systems are involved in many areas, from surveillance to user authentication, from autonomous systems to human-robot interactions. Head pose estimation (HPE) is the task to support biometric systems in which any of the biometric traits of the head is involved, as face, ear or iris. This particular biometric branch finds its applicat...
Article
Facial expression recognition system can provide quick assistance to the healthcare system and exceptional services to the patients. A facial expression recognition system has been proposed in this work. The implementation of the proposed approach has been divided into three components. In the first component, landmark points on the facial region h...
Article
Full-text available
Deep knowledge about user characteristics and behaviors opens new and promising landscapes to the User Experience. Thanks to emerging machine learning techniques, a new form of communication channel among users and applications may be exploited for customizing and finely tuning the dynamic behavior of applications to the peculiarities of their user...
Article
Full-text available
As known, security system administrators need to be aware of the security risks and abnormal behaviors in a network system. Given the exploitation probability value of each vulnerability, the cumulative probability of an attack path from an attacker to a target node can be quantified and calculated, namely as the K maximum probability attack paths...
Article
Social robots adopt an emotional touch to interact with users inducing and transmitting humanlike emotions. Natural interaction with humans needs to be in real time and well grounded on the full availability of information on the environment. These robots base their way of communicating on direct interaction (touch, listening, view), supported by a...
Article
Cloud storage services allow data owners to outsource their potentially sensitive data (e.g., private genome data) to remote cloud servers in a ciphertext form. To enable data owners to further share the data encrypted in ciphertexts, many proxy re-encryption (PRE) schemes are proposed. However, most schemes only support single-recipient or coarse-...
Article
Web user behavioral recognition is the process by which web users are identified and distinguished through behavioral features. In this work, two sources of behavioral biometric data are analyzed for the development of this web user identification model, touch dynamics and the characteristics extracted from the periocular area related to the pupils...
Article
Full-text available
Currently COVID-19 pandemic is the major cause of disease burden globally. So, there is a need for an urgent solution to fight against this pandemic. Internet of Things (IoT) has the ability of data transmission without human interaction. This technology enables devices to connect in the hospitals and other planned locations to combat this situatio...
Article
IoT devices generate data over time, which is going to be shared with other parties to provide high-level services. Smart City is one of its applications which aims to manage cities automatically. Because of the large number of devices, three critical challenges come up: heterogeneity, privacy-preserving of generated data, and providing high-level...
Article
Ultra-reliable low-latency communication supports powerful mission-critical applications such as artificial intelligence-enabled mobile cloud applications designed to deliver the quality of service and quality of experience to their users. However, whether existing security mechanisms are ready to address the risks emerging from these applications...
Article
Full-text available
It is widely known that a quick disclosure of the COVID-19 can help to reduce its spread dramatically. Transcriptase Polymerase Chain Reaction (RT-PCR) could be a more useful, rapid, and trustworthy technique for the evaluation and classification of COVID-19 disease. Currently, an computerized method for classifying Computed Tomography images of ch...
Article
Recently, due to unexpected conditions introduced by the COVID-19 outbreak, collaborative tools are widely adopted in almost all sectors of our daily lifestyle. Almost all tools rely mainly on the World Wide Web technologies that, in turn, are built upon the HTTP protocol. The HTTP protocol is considered as the “bricks” of all kind of communication...
Article
Artificial Intelligence and Machine Learning based Ambient Assisted Living systems play an important role in smart cities by improving the quality of life of the elderly population. Many Ambient Assisted Living systems are coupled with Android Apps for command-and-control purposes. Consequently, the privacy and security of Ambient Assisted Living s...
Article
Viral Marketing can be considered as the modern version of the ancient "word-of-mouth" advertising, in which companies choose a restricted number of persons, considered "influential", recommending them products or services that will be thus iteratively suggested. In this paper, we propose cognitive models and algorithms for marketing applications t...
Article
The rise of the Internet of Things has generated high expectations about the improvement in people's lifestyles. In the last decade, we saw several examples of instrumented cities where different types of data were gathered, processed, and made available to inspire the next generation of scientists and engineers. In this framework, sensors and actu...
Article
Vehicular Ad-hoc Networks (VANETs) have become the one of the most, reassuring, encouraging and the quickest developing subsets of Mobile Ad-hoc Networks (MANETs). They are involved smart vehicles, On-board Units (OBUs), and Roadside Units (RSUs) which convey by the temperamental wirless media. Other than lacking frameworks, forwarding elements mov...
Article
In Industrial Internet of Things environments, dependability of complex manufacturing process in which human operators play a key role can be improved by identity recognition/authentication of whoever is involved in the various stages of a production process, according to where and when he/she is supposed to be. To this aim we propose an approach t...
Chapter
The computational effort required to guarantee the security of a communication, due to the complexity of the cryptographic algorithms, heavily influences the energy consumption and consequently the energy demand of the involved parties. This energy request makes secure communication with low energy consumption a non-trivial issue. The aim of this w...
Article
Nowadays, more than ever, digital forensics activities are involved in any criminal, civil or military investigation and represent a fundamental tool to support cyber-security. Investigators use a variety of techniques and proprietary software forensics applications to examine the copy of digital devices, searching hidden, deleted, encrypted, or da...
Chapter
Sensors and actuators became first class citizens in technologically pervasive urban environments. However, the full potential of data crowdsourcing is still unexploited in marine coastal areas, due to the challenging operational conditions, extremely unstable network connectivity and security issues in data movement. In this paper, we present the...
Article
Forest border crossing animals creates major societal related issues, in addition to endangering their own lives. This is the objective focused in this paper targeting the species “The Elephant”, incorporating with technical methodologies namely, multi-sensor data fusion, cognition theories and computational intelligence techniques. Multi-sensor da...
Chapter
Full-text available
This paper illustrates a multibiometric method to optimize the fusion of multiple biometries at the score level. The fused score is a linear combination of the individual scores. As a consequence, well-known traditional linear optimization techniques become suitable to determine the constants to be used in the linear combination. The proposed metho...
Chapter
In this work, a complementary approach that adds a dynamic component to face biometrics is proposed. The dynamic appearance and the time-dependent local features characterizing the face of an individual during speech utterance are indeed considered in their spatial and temporal components. Ultimately, the aim is to capture, represent and compare fa...
Chapter
Browser Fingerprinting is the process in which the device and browser-related properties (or attributes) are collected through the browser for various reasons, especially, for user identification. The user is monitored through the tracking and collection of technical information, also detecting intrinsic properties of the device being analyzed. In...
Article
We are living an era in which each of us is immersed in a fully connected environment. The smart devices worn everyday by everyone let the users be projected into the so called IoT world, whose main aim is to provide tools and strategies to solve problems of everyday life as well as to improve well-being and quality of life. Such a goal can be achi...
Article
Full-text available
The target of smart houses and enhanced living environments is to increase the quality of life further. In this context, more supporting platforms for smart houses were developed, some of them using cloud systems for remote supervision, control and data storage. An important aspect, which is an open issue for both industry and academia, is represen...
Article
Information flow control (IFC) mechanisms regulate where information is allowed to travel. To enhance IFC, access control encryption (ACE) was proposed where both the no write-down rule and the no read-up rule are supported. Nevertheless, there are still two issues: (1) how to determine whether a communication request should be permitted or denied...
Article
An exciting piece of information was tweeted at the Microsoft Build 2017 conference, regarding the global Internet traffic. While in 1992 the global Internet traffic was about 0.001 GB/s, today the global Internet traffic is estimated to 20,000 GB/s. This significant figure sets the plot for an interconnected environment that shares media content a...
Article
In an era of fully digitally interconnected people and machines, IoT devices become a real target for attackers. Recent incidents such as the well-known Mirai botnet, have shown that the risks incurred are huge and therefore a risk assessment is mandatory. In this paper we present a novel approach on collecting relevant data about IoT attacks. We d...
Article
Smart city applications are increasingly popular due to their potential to improve quality of life in an urbanized society, and such applications typically leverage on cloud computing for data and computation offloading from the sensing infrastructure. Despite the capability of achieving scalability and flexibility, the use of cloud computing impos...
Article
Edge computing can potentially play a crucial role in enabling user authentication and monitoring through context-aware biometrics in military/battlefield applications. For example, in Internet of Military Things (IoMT) or Internet of Battlefield Things (IoBT), an increasing number of ubiquitous sensing and computing devices worn by military person...
Article
Link prediction has steadily become an important research topic in the area of complex networks. However, the current link prediction algorithms typically neglect the evolution process and they tend to exhibit low accuracy and scalability when applied to large-scale networks. In this article, we propose a novel distributed temporal link prediction...
Article
Is biometrics as a service the next giant leap, as Jeremy Rose asks? New trends in consumer applications seem to testify this revolution. However, it is worth wondering to what extent both company infrastructures and the market are actually ready for this. This article explores the potential of cloud-based biometrics (biometrics as a service) for s...
Chapter
There are numerous potential digital range arrangements and situations that a very much outlined range can achieve. We have experienced several use cases, and we acknowledged that every last mechanism requires distinctive human components, scale, and assault and safeguard standards. What you will likewise discover is that these things devour a lot...
Chapter
Biometrics and cloud computing are converging towards a common application context aiming at deploying biometric authentication as a remote service (Biometrics as a Service - BaaS). The advantages for the final user is to be relieved from the burden related to acquire/maintain specific software, and to gain the ability of building personalized appl...
Article
Full-text available
In this work, we propose a novel multimedia summarization technique from Online Social Networks (OSNs). In particular, we model each Multimedia Social Network (MSN)—i.e. an OSN focusing on the management and sharing of multimedia information—using an hypergraph based approach and exploit influence analysis methodologies to determine the most import...
Article
In an increasingly connected world, energy efficiency has become a significant problem. Online electronic transactions are booming based on shopping convenience, fast payments, and lower prices. Electronic trading systems are one of the main sources of energy consumption because the so-called contract signing protocol (CSP) is a crucial part of e-c...
Article
In this paper, we present a memory-efficient and scalable implementation of elliptic-curve cryptography (ECC; P256, P384, P521) on ARMv6--M processors (Cortex--M0, M0+, and M1). Specifically, we propose a refined approach to perform Multiply--ACcumulate (MAC) operations using hardware multiplier on ARMv6--M processors, and a compact doubling routin...
Article
The paper aims at proposing an original summarization technique from Online Social Networks (OSNs) for multimedia stories’ creation. In particular, for each Multimedia Social Network (MuSN) - i.e. an OSN focusing on the management and sharing of multimedia information - we leverage a graph-based modeling approach and exploit influence analysis meth...
Article
Examines the new challenges posed by human-driven edge computing. The massive proliferation of personal computing devices is opening new human-centered designs that blur the boundaries between man and machine. In addition, edge services are also used to exchange the data collected and processed within the context of the IoT towards external service...
Article
Many hybrid and multimodal biometric recognition techniques have been presented to provide secure and authentic systems, incorporating both soft and hard biometric schemes. This article proposes a new hybrid technique which ensures the authenticity of the user to the system, as well as monitors whether the user has passed the biometric system as a...
Article
Internet of Things (IoT) is a promising technology for improving our lives and society by integrating smart devices in our environment and paving the way for novel ICT application spanning from smart cities to energy efficiency and home automation. However, such a vision encompasses the availability of thousands of smart devices, or even more, that...
Article
There is an increasing involvement of the Internet of Things (IoT) in many of our daily activities, with the aim of improving their efficiency and effectiveness. We are witnessing the advent of smart cities, in which IoT is exploited to improve the management of a city's assets, as well as smart factories, where IoT is paving the way for the forth...
Article
In the last years, academic research has been focused also on the security requirements, threat models, and attack taxonomies from the perspective of the application of Internet of Things in critical applications. Since such systems are strongly data-intensive, it is of pivotal importance to provide integrity for the messages moving throughout the...
Article
Blockchain uses a peer-to-peer (P2P) network, rather than a central authority (e.g., a central bank or financial institution), to conduct transactions (e.g., financial transactions). Due to the decentralized nature, blockchain allows one to undertake and verify transactions in real-time. In recent times, a number of blockchain-based applications ha...
Article
Full-text available
Internet of Things (IoT) is one of the key technologies paving the way for the next industrial revolution named as Industry 4.0, since it promises to realize smarter factories by optimizing costs and productivity. Traditionally, the adopted communication protocols among the sensors are required to manage the large scale of the infrastructure in ter...
Article
With the prevalence of cloud computing, the resource constrained clients are trended to outsource their computation-intensive tasks to the cloud server. Although outsourcing computation paradigm brings many benefits for both clients and cloud server, it causes some security challenges. In this paper, we focus on the outsourcing computation of matri...
Article
Most of the application involving the study of EEG (Electroencephalogram) and ECG (Electrocardiogram) are focused on their usefulness from a medical point of view. In the last decade, these signals have been extensively studied also from other perspectives, like biometric recognition, sleep disorder analysis and brain computer interface application...
Article
Storage is one of the main services that the cloud provides users. Utilizing the cloud to store large amounts of data can alleviate the cost of storage and the hardware investment on the local side, which is very important for resource-restricted clients. An emerging issue for clients is how to verify the database in the could after outsourcing the...
Article
The application of BF techniques in power domain non-orthogonal multiple access (NOMA) schemes allows users to share the same single BF vector for operational reliability. The occurrence of inter-beam interference (IBI) is highly probable in a congested cell (i.e., a cell with high user density and active users). IBI cancellation by using 3D polari...
Article
Lately, the technology has been developed quickly causing the appearance of smart software products in many domains such as agriculture which are designed to ease people's work. Due to bad weather phenomena and growing demand for agricultural products, have started to appear a lot of greenhouses, where there is a strict control around each paramete...
Article
The articles in this special section focus on edge computing. The vision of edge computing considers that tasks are not exclusively allocated on centralized cloud platforms, but are distributed toward the edge of the network (as in the Internet of Things and fog computing paradigms), and transferred closer to the business thanks to content delivery...