Fiammetta Marulli

Fiammetta Marulli
  • Assistant Professor at University of Campania "L. Vanvitelli"
  • Professor (Assistant) at University of Campania "Luigi Vanvitelli"

About

86
Publications
15,732
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,206
Citations
Current institution
University of Campania "Luigi Vanvitelli"
Current position
  • Professor (Assistant)
Additional affiliations
May 2013 - May 2016
University of Naples Federico II
Position
  • Ph. D.
May 2013 - March 2016
University of Naples Federico II
Position
  • PhD Student
October 2011 - June 2012
Hewlett -Packard Enterprise Services, Italy
Position
  • Software Engineer

Publications

Publications (86)
Article
This work explores the use of generative adversarial networks (GANs) to tackle cyber-security challenges, including threat identification, anomaly detection, and mitigation strategies, particularly in complex systems and critical infrastructures like industrial control systems for energy production and distribution. GANs address a key obstacle in m...
Chapter
Process Mining is getting a growing interest in many contexts where performance bottlenecks are critical for the business. Unfortunately, real cyber-physical systems are usually not implemented to easily address these techniques. One of the most frequent problems to face is transforming acquired data, often heterogeneous and unlabeled to allow the...
Article
Full-text available
Sustainability is one of the main goals to pursue in several aspects of everyday life; the recent energy shortage and the price raise worsen this problem, especially in the management of energy in buildings. As the Internet of Things (IoT) is an assessed computing paradigm able to capture meaningful data from the field and send them to cloud infras...
Preprint
Full-text available
The events of the past 2 years related to the pandemic have shown that it is increasingly important to find new tools to help mental health experts in diagnosing mood disorders. Leaving aside the longcovid cognitive (e.g., difficulty in concentration) and bodily (e.g., loss of smell) effects, the short-term covid effects on mental health were a sig...
Chapter
The present study aims to explore user’ acceptance and perceptions toward different quality levels of synthetical voices. To achieve this, four voices have been exploited considering two main factors: the quality of the voices (low vs high) and their gender (male and female). 186 volunteers were recruited and subsequently allocated into four groups...
Chapter
The events of the past 2 years related to the pandemic have shown that it is increasingly important to find new tools to help mental health experts in diagnosing mood disorders. Leaving aside the long-covid cognitive (e.g., difficulty in concentration) and bodily (e.g., loss of smell) effects, the short-term covid effects on mental health were a si...
Chapter
The need to establish an intelligent tool for semi-automatic diagnosis of depression on high-quality data, requires trustworthy, interoperable and multimodal data repositories. Such databases should be based on common collection and storage criteria and should enable advanced and open analysis modes without sacrificing data privacy. This paper laun...
Article
Currently, research in Artificial Intelligence, both in Machine Learning and Deep Learning, paves the way for promising innovations in several areas. In healthcare, especially, where large amounts of quantitative and qualitative data are transferred to support studies and early diagnosis and monitoring of any diseases, potential security and privac...
Conference Paper
The diffusion of intelligent services and the push for the integration of computing systems and services in the environment in which they operate require a constant sensing activity and the acquisition of di↵erent information from the environment and the users. Health monitoring, domotics, Industry 4.0 and environmental challenges leverage the avai...
Article
Full-text available
Machine Learning models are susceptible to attacks, such as noise, privacy invasion, replay, false data injection, and evasion attacks, which affect their reliability and trustworthiness. Evasion attacks, performed to probe and identify potential ML-trained models’ vulnerabilities, and poisoning attacks, performed to obtain skewed models whose beha...
Article
Full-text available
The wide use of IT resources to assess and manage the recent COVID-19 pandemic allows to increase the effectiveness of the countermeasures and the pervasiveness of monitoring and prevention. Unfortunately, the literature reports that IoT devices, a widely adopted technology for these applications, are characterized by security vulnerabilities that...
Chapter
Protecting and safeguarding privacy has become increasingly important, especially in recent years. The increasing possibilities of acquiring and sharing personal information and data through digital devices and platforms, such as apps or social networks, have increased the risks of privacy breaches. In order to effectively respect and guarantee the...
Chapter
Misinformation and Fake News are hard to dislodge. According to experts on this phenomenon, to fight disinformation a less credulous public is needed; so, current AI techniques can support misleading information debunking, given the human tendency to believe “facts” that confirm biases. Much effort has been recently spent by the research community...
Article
Full-text available
In this paper a Big Data Pipeline is presented, taking in consideration both structured and unstructured data made available by the Italian Ministry of Justice, regarding their Telematic Civil Process. Indeed, the complexity and volume of the data provided by the Ministry requires the application of Big Data analysis techniques, in concert with Mac...
Article
Recent years have seen the widespread adoption of Artificial Intelligence techniques in several domains, including healthcare, justice, assisted driving and Natural Language Processing (NLP) based applications (e.g., the Fake News detection). Those mentioned are just a few examples of some domains that are particularly critical and sensitive to the...
Preprint
Artificial intelligence (AI) systems are becoming critical components of today's IT landscapes. Their resilience against attacks and other environmental influences needs to be ensured just like for other IT assets. Considering the particular nature of AI, and machine learning (ML) in particular, this paper provides an overview of the emerging field...
Chapter
Internet Service Providers technical support needs personal data to predict potential anomalies. In this paper, we performed a comparative study of forecasting performance using raw data and anonymized data, in order to assess how much performance may vary, when plain personal data are replaced by anonymized personal data.
Chapter
Blockchains provide a valid and profitable support for the implementation of trustable and secure distributed ledgers, in support to groups of subjects that are potentially competitors in conflict of interest but need to share progressive information recording processes. Blockchains prevent data stored in blocks from being altered or deleted, but t...
Conference Paper
Authorship Attribution (AA) is currently applied in several applications, among which fraud detection and anti-plagiarism checks: this task can leverage stylometry and Natural Language Processing techniques. In this work, we explored some strategies to enhance the performance of an AA task for the automatic detection of false and misleading informa...
Chapter
Labeled data are required for feeding machine learning algorithms and training effectively performing models. Handcrafted annotations of data, made by human experts, require much effort and this task is made heavier when some comfortable tools, for making annotations over the objects, are not available or easily accessible. Furthermore, annotations...
Chapter
This work describes the architecture of the “Obserbot Cluster”. Obserbot is the name of a long term project resulting from the crasis of the terms “observe” and “bot” (abridged form for robot). The Obserbot Cluster is formed by a number of different components running as micro-services on an dependable and scalable platform. Obserbot main objective...
Conference Paper
Local pollution is a problem that affects urban areas and has effects on the quality of life and on health conditions. In order to not develop strict measures and to better manage territories, the national authorities have applied a vast range of predictive models. Actually, the application of machine learning has been studied in the last decades i...
Conference Paper
In this paper, we introduce a solution aiming to improve the accuracy of the surface temperature detection in an outdoor environment. The temperature sensing subsystem relies on Mobotix thermal camera without the black body, the automatic compensation subsystem relies on Raspberry Pi with Node-RED and TensorFlow 2.x. The final results showed that i...
Article
Full-text available
Recent times have demonstrated how much the modern critical infrastructures (e.g., energy, essential services, people and goods transportation) depend from the global communication networks. However, in the current Cyber-Physical World convergence, sophisticated attacks to the cyber layer can provoke severe damages to both physical structures and t...
Article
Full-text available
The proliferation of info-entertainment systems in nowadays vehicles has provided a really cheap and easy-to-deploy platform with the ability to gather information about the vehicle under analysis. With the purpose to provide an architecture to increase safety and security in automotive context, in this paper we propose a fully connected neural net...
Article
Blockchain technologies and distributed ledgers enable the design and implementation of trustable data logging systems that can be used by multiple parties to produce a non-repudiable database. The case of Internet of Vehicles may greatly benefit of such a possibility to track the chain of responsibility in case of accidents or damages due to bad o...
Chapter
Textual resources annotation is currently performed both manually by human experts selecting hand-crafted features and automatically by any trained systems. Human experts annotations are very accurate but require heavy effort in compilation and most often are not publicly accessible. Automatic approaches save efforts but don’t perform yet with the...
Chapter
Machine learning is widely used for detecting and classifying malware. Unfortunately, machine learning is vulnerable to adversarial attacks. In this chapter, we investigate how generative adversarial approaches could affect the performance of a detection system based on machine learning. In our evaluation, we trained several neural networks for mal...
Article
Natural Language Processing (NLP) is being recently explored also to its application in supporting malicious activities and objects detection. Furthermore, NLP and Deep Learning have become targets of malicious attacks too. Very recent researches evidenced that adversarial attacks are able to affect also NLP tasks, in addition to the more popular a...
Article
Full-text available
Technological development and market expansion offer an increased availability of resources and computing power on IoT nodes at affordable cost. The edge computing paradigm allows keeping locally on the edge of the network a part of computing, while keeping all advantages of the cloud and adding support for privacy, real-time and network resilience...
Article
Technological development and market expansion offer an increased availability of resources and computing power on IoT nodes at affordable cost. The edge computing paradigm allows keeping locally on the edge of the network a part of computing, while keeping all advantages of the cloud and adding support for privacy, real-time and network resilience...
Article
Smart streets promise widely available traffic information to help improve people’s safety. Unfortunately, gathering that data may threaten privacy. We describe an architecture that exploits a blockchain and the Internet of Vehicles and show its compliance with the General Data Protection Regulation.
Conference Paper
hese last years have seen a rapid growth of applica-tions able to interact with humans in a sophisticated way: moodinterpretation and adaptation is the next research frontier andit gets closer day by day. This paper introduces a model-drivenprocess able to automate the creation of modern Human-MachineInterfaces. In particular, by proposing a probab...
Conference Paper
Internet of Things (IoTs) services and data-centric systems allow smart and efficient information exchanging. Anyway, even if existing IoTs and cyber security architectures are enforcing, they are still vulnerable to security issues, as unauthorized access, data breaches, intrusions. They can't provide yet sufficiently robust and secure solutions t...
Chapter
Federate architectures are able to provide a scalable and shared environment for the distributed training and testing of machine learning applications. However, federated learning architectures shows potential security vulnerabilities in particular to the data poisoning attacks, incoming from participants to the federation. In such a scenario, a ma...
Chapter
The role of remote resources, such as the ones provided by Cloud infrastructures, is of paramount importance for the implementation of cost effective, yet reliable software systems to provide services to third parties. Cost effectiveness is a direct consequence of a correct estimation of resource usage, to be able to define a budget and estimate th...
Article
Full-text available
Complexity of current computer networks, including e.g., local networks, large structured networks, wireless sensor networks, datacenter backbones, requires a thorough study to perform analysis and support design. Simulation is a tool of paramount importance to encompass all the different aspects that contribute to design quality and network perfor...
Conference Paper
Full-text available
In recent years the application of Machine Learning (ML) and Artificial Intelligence (AI) techniques in healthcare helped clinicians to improve the management of chronic patients. Diabetes is among the most common chronic illness in the world for which often is still challenging do early detection and correct classification of the type of diabetes...
Chapter
Word representations are mathematical items capturing a word’s meaning and its grammatical properties in a machine-readable way. They map each word into equivalence classes including words sharing similar properties. Word representations can be obtained automatically by using unsupervised learning algorithms that rely on the distributional hypothes...
Chapter
The cloud is emerging as a data-centric, intelligent platform ready to deal with the next generation of applications and workloads. At the center of this emerging intelligent cloud is deep learning, which is undoubtedly the most disruptive technology of this decade, supported by the rise of powerful computing and storage environments. As customers...
Conference Paper
Part-of-speech (POS) tagging is a Natural Language Processing (NLP) technique extremely relevant in Question Answering systems and becomes more complex when these systems operate on spoken language. For the use case of Italian spoken language, here considered, enclitic forms are very difficult to be tagged, since they consist of one or more pronoun...
Article
Natural Language Processing (NLP) field is taking great advantage from adopting models and methodologies from Artificial Intelligence. In particular, Part-Of-Speech (POS) tagging is a building block for many NLP applications. In this paper, a POS tagging system based on a deep neural network is proposed. It is made of a static and task-independent...
Conference Paper
Smart IoT technologies have the potential to make a breakthrough in the sup-port of Cultural Heritage (CH), by providing information and communication technology to effectively enhance current models of art recreation and enjoyment. To turn such potential into reality, IoT-based technological solutions for CH should be designed by taking into accou...
Article
In last years smartphone and tablet devices have been handling an increasing variety of sensitive resources. As a matter of fact, these devices store a plethora of information related to our every-day life, from the contact list, the received email, and also our position during the day (using not only the GPS chipset that can be disabled but only t...
Conference Paper
Social Networks activities offer rooms a non-trivial testbed for linguistic analysis, introducing significant revolutions into the creation of textual content. Linguistic solecisms, blunders, and generally speaking deviations from standard linguistic norms, are becoming the rule rather than the exception. Social Networks instantly and virally propa...
Article
Full-text available
Knowledge is information that has been contextualised in a certain domain, to be used or applied. It represents the basic core of our Cultural Heritage and Natural Language provides us with prime versatile means of construing experience at multiple levels of organization. The natural language generation field consists in the creation of texts provi...
Conference Paper
Current smart IoT technologies have the potential to make a breakthrough in the support of Cultural Heritage (CH), by providing information and communication technology to enhance effectively current models of art recreation and enjoyment. To turn such potential into reality, IoT-based technological solutions for CH should be designed by taking int...
Conference Paper
Smart IoT technologies set a milestone in supporting new enjoyment models for Art and Cultural Heritage, providing amazing technological experiences. However, users, while interacting almost purely by mediation of smart devices or augmented VR displays, practically keep themselves out from living the fullness of the surrounding cultural sites exper...
Research
Full-text available
Ph.D. Thesis Introduction - 2016
Article
In this paper we illustrate an integrated approach combining Business Intelligence, Big Data and Internet of Things (IoT), which is applied to information resources including structured and unstructured contents, Geo-Spatial and Social Network data, Multimedia (MM), multiple domain vocabularies, classifiers and ontologies. This is implemented in an...
Conference Paper
Full-text available
Internet of Things (IoT) is a perspective and an infrastructure allowing everything to turn into a sensor capable of acquiring and pouring data into the cloud, where they can be aggregated with other data and analysed to extract decision-supportive information. However, going in the opposite direction is at least as useful and exciting, by exploiti...
Article
The remarkable opportunities of discovering interesting knowledge from Big Data can be exploited in the Cultural Heritage (CH) domain, where Social Data Mining could advantage cultural organizations and operators with strategical elements for enjoying and attracting and enjoy visitors, as well as to support knowledge sharing and diffusion processes...
Conference Paper
Full-text available
In 2015, Twitter introduced the hashtag #culturalheritage, thus giving an empirical evidence of the increasing interest of users towards cultural topics and events. In the last years, while an increasing number of studies and initiatives about tweets, in both the academic and business worlds, raised, a lack of quantitative studies devoted to assess...
Conference Paper
Full-text available
In this paper we illustrate an integrated approach supporting an information system which combines Business Intelligence, Big Data, Internet of Things, GeoSpatial information processing, multimedia resources, structured and unstructured content analysis with Semantic techniques, and Social Network Analysis. This system exploits the specific opportu...
Conference Paper
Full-text available
Cultural Heritage has got great importance in recent years, in order to preserve countries history and traditions and to support social and economic improvements. Typical IoT smart technologies represent an effective mean to support understanding of Cultural Heritage, by their capability to involve different users and to catch their explicit and im...
Conference Paper
Full-text available
In this paper, we present "SmARTweet", a Location-based application developed within DATABENC, a high technol-ogy district for Cultural Heritage management. In particular, the project aims at exploiting several location-based services and technologies to realize a smart multimedia guide system able to detect the closest artworks to an user, make th...
Conference Paper
Full-text available
In this paper we focus on the issue of pervasive applications and service development supporting cultural heritage. Modeling and creation of unified, structured and extensible artwork badge, here referred as booklet, repre-sents the base to exploit such structured information as the building block for innovative amazing and more involving multimedi...
Conference Paper
Full-text available
In this paper, we present an ongoing project developed within DATABENC, a high technology district for Cultural Heritage management. In particular, the project aims at exploiting several location-based services and technologies to realize a smart multimedia guide system able to detect user position and make objects of a museum exhibition able to "t...
Article
The relationship existing between a business process and the supporting software system is a critical concern for organizations, as it directly affects their performance. The knowledge regarding this relationship plays an important role in the software evolution process, as it helps to identify the software components involved by a software change...
Conference Paper
The relationships existing between a business process and the supporting software system is a critical concern for the organizations, as it directly affects their performance. The research described in this paper is concerned with the use of information retrieval techniques to software maintenance and, in particular, to the problem of recovering t...
Conference Paper
The relationships existing between a business process and the supporting software system is a critical concern for the organizations, as it directly affects their performance. The research described in this paper is concerned with the use of information retrieval techniques to software maintenance and, in particular, to the problem of recovering tr...
Article
Full-text available
Modern Digital Rights Management (DRM) systems are often developed as web software platforms designed as service oriented architectures composed of a federation of coordinated web entities that play distinct roles and dynamically interact within a trusted environment. Such a design approach requires that trustu relationships have to be dynamically...

Network

Cited By