Graziano Blasilli

Graziano Blasilli
  • Sapienza University of Rome

About

17
Publications
6,367
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
183
Citations
Introduction
Skills and Expertise
Current institution
Sapienza University of Rome

Publications

Publications (17)
Article
Full-text available
Machine learning techniques are a driving force for research in various fields, from credit card fraud detection to stock analysis. Recently, a growing interest in increasing human involvement has emerged, with the primary goal of improving the interpretability of machine learning models. Among different techniques, Partial Dependence Plots (PDP) r...
Article
Full-text available
The use and creation of machine‐learning‐based solutions to solve problems or reduce their computational costs are becoming increasingly widespread in many domains. Deep Learning plays a large part in this growth. However, it has drawbacks such as a lack of explainability and behaving as a black‐box model. During the last few years, Visual Analytic...
Article
RadViz contributes to multidimensional analysis by using 2D points for encoding data elements and interpreting them along the original data dimensions. For these characteristics it is used in different application domains, like clustering, anomaly detection, and software visualization. However, it is likely that using the dimension arrangement that...
Conference Paper
Full-text available
Filtering is one of the basic interaction techniques in Information Visualization, with the main objective of limiting the amount of dis- played information using constraints on attribute values. Research focused on direct manipulation selection means or on simple interactors like sliders or check-boxes: while the interaction with a single attribut...
Conference Paper
Full-text available
RadViz plots are commonly used to represent multidimensional data because they use the familiar notion of 2D points for encoding data elements, displaying the original data dimensions that act as springs for setting the x and y coordinates. However, this intuitive approach implies several drawbacks and produces misleading visualizations that can co...
Conference Paper
Full-text available
Modern software systems require the support of automatic program analyses to answer questions about their correctness, reliability, and safety. In recent years, symbolic execution techniques have played a pivotal role in this field, backing research in different domains such as software testing and software security. Like other powerful machine ana...
Poster
Full-text available
Filtering is one of the basic interaction techniques in information visualization. To better support a filtering activity, the visu-alization should be enriched by selectors composed of different visual elements and data distribution (i.e., scented widgets), in order to improve the navigation of information spaces and the comprehension of the filte...
Conference Paper
Full-text available
The emerging Network Medicine domain is causing a shift between diagnosis based on the conventional reductionist approach, arguing that biological factors work in a simple linear way, and the analysis of perturbations within the comprehensive network map of molecular components and their interactions, i.e., the "Interactome". As a consequence, clin...
Conference Paper
Full-text available
Exploits based on ROP (Return-Oriented Programming) are increasingly present in advanced attack scenarios. Testing systems for ROP-based attacks can be valuable for improving the security and reliability of software. In this paper, we propose ROPMATE, the first Visual Analytics system specifically designed to assist human red team ROP exploit build...
Article
Full-text available
Vulnerabilities represent one of the main weaknesses of IT systems and the availability of consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for using them to compute the paths an attacker is likely to follow. However, even if patches are available, business constraints or lack of resources create obstacles to thei...
Conference Paper
Full-text available
This paper presents a system that prioritizes user actions according to the domain context and user preferences, in order to provide the adaptation process with a partial order of functionalities, useful to optimize the user interface with the main goal of minimizing screen usage and user interaction. The solution is instantiated in a smart home en...
Conference Paper
Full-text available
The evaluation of an information visualization system is a complex activity, involving the understanding of both the visual-ization itself and the process that it is meant to support. Moreover, if the evaluation activity includes a task based user study, it requires a considerable effort, involving both conceptual (e.g., the definition of user task...
Conference Paper
In the last years, several standards and frameworks have been developed to help organizations to increase the security of their Information Technology (IT) systems. In order to deal with the continuous evolution of the cyber-attacks complexity, such solutions have to cope with an overwhelming set of concepts, and are perceived as complex and hard t...

Network

Cited By