L
Luigi V. Mancini
Researcher at Sapienza University of Rome
Publications - 48
Citations - 4310
Luigi V. Mancini is an academic researcher from Sapienza University of Rome. The author has contributed to research in topics: Wireless sensor network & Key distribution in wireless sensor networks. The author has an hindex of 25, co-authored 42 publications receiving 3850 citations.
Papers
More filters
Proceedings ArticleDOI
Scalable and efficient provable data possession
TL;DR: In this article, a provably secure storage outsourced data possession (PDP) technique based on symmetric key cryptography was proposed, which allows outsourcing of dynamic data, such as block modification, deletion and append.
Journal ArticleDOI
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers
Giuseppe Ateniese,Luigi V. Mancini,Angelo Spognardi,Antonio Villani,Domenico Vitali,Giovanni Felici +5 more
TL;DR: It is shown that it is possible to infer unexpected but useful information from ML classifiers and that this kind of information leakage can be exploited by a vendor to build more effective classifiers or to simply acquire trade secrets from a competitor's apparatus, potentially violating its intellectual property rights.
Proceedings ArticleDOI
Random key-assignment for secure Wireless Sensor Networks
TL;DR: A probabilistic model and two protocols to establish a secure pair-wise communication channel between any pair of sensors in the WSN, by assigning a small set of random keys to each sensor, are described.
Proceedings ArticleDOI
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
TL;DR: A new Randomized, Efficient, and Distributed (RED) protocol for the detection of node replication attacks is proposed and it is shown that it is completely satisfactory with respect to the requirements.
Journal ArticleDOI
Analyzing Android Encrypted Network Traffic to Identify User Actions
TL;DR: This paper investigates to what extent an external attacker can identify the specific actions that a user is performing on her mobile apps, and design a system that achieves this goal using advanced machine learning techniques, and compares the solution with the three state-of-the-art algorithms.