Picture for Francesco Zola

Francesco Zola

Enhancing Law Enforcement Training: A Gamified Approach to Detecting Terrorism Financing

Add code
Mar 20, 2024
Viaarxiv icon

NeuralSentinel: Safeguarding Neural Network Reliability and Trustworthiness

Add code
Feb 12, 2024
Viaarxiv icon

Conditional Generative Adversarial Network for keystroke presentation attack

Add code
Dec 16, 2022
Viaarxiv icon

Verification system based on long-range iris and Graph Siamese Neural Networks

Add code
Jul 28, 2022
Figure 1 for Verification system based on long-range iris and Graph Siamese Neural Networks
Figure 2 for Verification system based on long-range iris and Graph Siamese Neural Networks
Figure 3 for Verification system based on long-range iris and Graph Siamese Neural Networks
Figure 4 for Verification system based on long-range iris and Graph Siamese Neural Networks
Viaarxiv icon

NBcoded: network attack classifiers based on Encoder and Naive Bayes model for resource limited devices

Add code
Sep 15, 2021
Figure 1 for NBcoded: network attack classifiers based on Encoder and Naive Bayes model for resource limited devices
Figure 2 for NBcoded: network attack classifiers based on Encoder and Naive Bayes model for resource limited devices
Figure 3 for NBcoded: network attack classifiers based on Encoder and Naive Bayes model for resource limited devices
Figure 4 for NBcoded: network attack classifiers based on Encoder and Naive Bayes model for resource limited devices
Viaarxiv icon

Temporal graph-based approach for behavioural entity classification

Add code
May 11, 2021
Figure 1 for Temporal graph-based approach for behavioural entity classification
Figure 2 for Temporal graph-based approach for behavioural entity classification
Figure 3 for Temporal graph-based approach for behavioural entity classification
Figure 4 for Temporal graph-based approach for behavioural entity classification
Viaarxiv icon

Generative Adversarial Networks for Bitcoin Data Augmentation

Add code
May 27, 2020
Figure 1 for Generative Adversarial Networks for Bitcoin Data Augmentation
Figure 2 for Generative Adversarial Networks for Bitcoin Data Augmentation
Figure 3 for Generative Adversarial Networks for Bitcoin Data Augmentation
Figure 4 for Generative Adversarial Networks for Bitcoin Data Augmentation
Viaarxiv icon

Cascading Machine Learning to Attack Bitcoin Anonymity

Add code
Oct 15, 2019
Figure 1 for Cascading Machine Learning to Attack Bitcoin Anonymity
Figure 2 for Cascading Machine Learning to Attack Bitcoin Anonymity
Figure 3 for Cascading Machine Learning to Attack Bitcoin Anonymity
Figure 4 for Cascading Machine Learning to Attack Bitcoin Anonymity
Viaarxiv icon