0000000000223558

AUTHOR

Federico Concone

0000-0001-7638-3624

Towards a Smart Campus Through Participatory Sensing

In recent years, the percentage of the population owning a smartphone has increased significantly. These devices provide users with more and more functions that make them real sensing platforms. Exploiting the capabilities offered by smartphones, users can collect data from the surrounding environment and share them with other entities in the network thanks to existing communication infrastructures, i.e., 3G/4G/5G or WiFi. In this work, we present a system based on participatory sensing paradigm using smartphones to collect and share local data in order to monitor make a campus 'smart'. In particular, our system infers the activities performed by users (e.g., students) in a campus in order …

research product

A Smart Assistant for Visual Recognition of Painted Scenes

Nowadays, smart devices allow people to easily interact with the surrounding environment thanks to existing communication infrastructures, i.e., 3G/4G/5G or WiFi. In the context of a smart museum, data shared by visitors can be used to provide innovative services aimed to improve their cultural experience. In this paper, we consider as case study the painted wooden ceiling of the Sala Magna of Palazzo Chiaramonte in Palermo, Italy and we present an intelligent system that visitors can use to automatically get a description of the scenes they are interested in by simply pointing their smartphones to them. As compared to traditional applications, this system completely eliminates the need for…

research product

Smartphone data analysis for human activity recognition

In recent years, the percentage of the population owning a smartphone has increased significantly. These devices provide the user with more and more functions, so that anyone is encouraged to carry one during the day, implicitly producing that can be analysed to infer knowledge of the user’s context. In this work we present a novel framework for Human Activity Recognition (HAR) using smartphone data captured by means of embedded triaxial accelerometer and gyroscope sensors. Some statistics over the captured sensor data are computed to model each activity, then real-time classification is performed by means of an efficient supervised learning technique. The system we propose also adopts a …

research product

A Fog-Based Application for Human Activity Recognition Using Personal Smart Devices

The diffusion of heterogeneous smart devices capable of capturing and analysing data about users, and/or the environment, has encouraged the growth of novel sensing methodologies. One of the most attractive scenarios in which such devices, such as smartphones, tablet computers, or activity trackers, can be exploited to infer relevant information is human activity recognition (HAR). Even though some simple HAR techniques can be directly implemented on mobile devices, in some cases, such as when complex activities need to be analysed timely, users’ smart devices can operate as part of a more complex architecture. In this article, we propose a multi-device HAR framework that exploits the fog c…

research product

EFFICIENT AND SECURE ALGORITHMS FOR MOBILE CROWDSENSING THROUGH PERSONAL SMART DEVICES.

The success of the modern pervasive sensing strategies, such as the Social Sensing, strongly depends on the diffusion of smart mobile devices. Smartwatches, smart- phones, and tablets are devices capable of capturing and analyzing data about the user’s context, and can be exploited to infer high-level knowledge about the user himself, and/or the surrounding environment. In this sense, one of the most relevant applications of the Social Sensing paradigm concerns distributed Human Activity Recognition (HAR) in scenarios ranging from health care to urban mobility management, ambient intelligence, and assisted living. Even though some simple HAR techniques can be directly implemented on mo- bil…

research product

A fog-assisted system to defend against Sybils in vehicular crowdsourcing

Technological advancements in vehicular transportation systems have led to the growth of novel paradigms, in which vehicles and infrastructures collaborate to infer high-level knowledge about phenomena of interest. Vehicular Social Network (VSN) is one such paradigm in which vehicular network entities are considered as part of an Online Social Network (OSN), paving the way for new services derived from social context. Although vehicular crowdsourcing has tremendous benefits, its deployment in real systems requires to solve important challenges including defense against Sybil attacks. This paper proposes a novel fog-assisted system that uses SybilDriver to minimize the presence of Sybil enti…

research product

Modeling Efficient and Effective Communications in VANET through Population Protocols

Vehicular Ad-hoc NETworks (VANETs) enable a countless set of next-generation applications thanks to the technological progress of the last decades. These applications rely on the assumption that a simple network of vehicles can be extended with more complex and powerful network infrastructure, in which several Road Side Units (RSUs) are employed to achieve application-specific goals. However, this assumption is not always satisfied as in many real-world scenarios it is unfeasible to have a conspicuous deployment of RSUs, due to both economic and environmental constraints. With the aim to overcome this limitation, in this paper we investigate how the only Vehicle-to-Vehicle (V2V) communicati…

research product

SpADe: Multi-Stage Spam Account Detection for Online Social Networks

In recent years, Online Social Networks (OSNs) have radically changed the way people communicate. The most widely used platforms, such as Facebook, Youtube, and Instagram, claim more than one billion monthly active users each. Beyond these, news-oriented micro-blogging services, e.g., Twitter, are daily accessed by more than 120 million users sharing contents from all over the world. Unfortunately, legitimate users of the OSNs are mixed with malicious ones, which are interested in spreading unwanted, misleading, harmful, or discriminatory content. Spam detection in OSNs is generally approached by considering the characteristics of the account under analysis, its connection with the rest of …

research product

Twitter spam account detection by effective labeling

In the last years, the widespread diffusion of Online Social Networks (OSNs) has enabled new forms of communications that make it easier for people to interact remotely. Unfortunately, one of the first consequences of such a popularity is the increasing number of malicious users who sign-up and use OSNs for non-legit activities. In this paper we focus on spam detection, and present some preliminary results of a system that aims at speeding up the creation of a large-scale annotated dataset for spam account detection on Twitter. To this aim, two different algorithms capable of capturing the spammer behaviors, i.e., to share malicious urls and recurrent contents, are exploited. Experimental r…

research product

WiP: Smart services for an augmented campus

Technological progress in recent years has allowed the design of new intelligent learning systems in smart environments aiming to facilitate users' lives. As a consequence, besides making use of traditional sensors for monitoring the quantities of interest, such systems can also benefit from information obtained from the users' smart devices, which can now be considered as additional sensing tools. In this article, we present the design of a novel system based on the fog computing paradigm that can improve the services offered to users on a smart campus by using different smart devices, i.e., smartphones, smartwatches, tablets, smartcameras and so on. In particular, we will describe a syste…

research product

Assisted labeling for spam account detection on twitter

Online Social Networks (OSNs) have become increasingly popular both because of their ease of use and their availability through almost any smart device. Unfortunately, these characteristics make OSNs also target of users interested in performing malicious activities, such as spreading malware and performing phishing attacks. In this paper we address the problem of spam detection on Twitter providing a novel method to support the creation of large-scale annotated datasets. More specifically, URL inspection and tweet clustering are performed in order to detect some common behaviors of spammers and legitimate users. Finally, the manual annotation effort is further reduced by grouping similar u…

research product

A Federated Learning Approach for Distributed Human Activity Recognition

In recent years, the widespread diffusion of smart pervasive devices able to provide AI-based services has encouraged research in the definition of new distributed learning paradigms. Federated Learning (FL) is one of the most recent approaches which allows devices to collaborate to train AI-based models, whereas guarantying privacy and lower communication costs. Although different studies on FL have been conducted, a general and modular architecture capable of performing well in different scenarios is still missing. Following this direction, this paper proposes a general FL framework whose validity is assessed by considering a distributed activity recognition scenario in which users' perso…

research product

SmartWave: A Smart Platform for Marine Environmental Monitoring

In recent years, the interest in the study of seas and oceans has dramatically increased as they are considered of primary importance for forecasting catastrophic events or for supporting blue economy, as well as the marine tourism, improving the tourist reception or enhancing any marine-related activity. This led to the development of IT platforms that allow to monitor the marine environment and provide a number of services to different kinds of final users, whether they are private individuals interested in the status of the seas, or companies whose business depends on the marine environmental monitoring. The main limitations of current platforms are due to such a difference between free …

research product

A Hybrid Recommender System for Cultural Heritage Promotion

Assisting users during their cultural trips is paramount in promoting the heritage of a territory. Recommender Systems offer the automatic tools to guide users in their decision process, by maximizing the adherence of the proposed contents with the particular preferences of every single user. However, traditional recommendation paradigms suffer from several drawbacks which are exacerbated in Cultural Heritage scenarios, due to the extremely wide range of users behaviors, which may also depend on their different educational backgrounds. In this paper, we propose a Hybrid recommender system which combines the four most common recommendation paradigms, namely collaborative filtering, popularit…

research product

Bayesian Modeling for Differential Cryptanalysis of Block Ciphers: A DES Instance

Encryption algorithms based on block ciphers are among the most widely adopted solutions for providing information security. Over the years, a variety of methods have been proposed to evaluate the robustness of these algorithms to different types of security attacks. One of the most effective analysis techniques is differential cryptanalysis, whose aim is to study how variations in the input propagate on the output. In this work we address the modeling of differential attacks to block cipher algorithms by defining a Bayesian framework that allows a probabilistic estimation of the secret key. In order to prove the validity of the proposed approach, we present as case study a differential att…

research product

SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications

Abstract The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP…

research product

A Novel Recruitment Policy to Defend against Sybils in Vehicular Crowdsourcing

Vehicular Social Networks (VSNs) is an emerging communication paradigm, derived by merging the concepts of Online Social Networks (OSNs) and Vehicular Ad-hoc Networks (VANETs). Due to the lack of robust authentication mechanisms, social-based vehicular applications are vulnerable to numerous attacks including the generation of sybil entities in the networks. We address this important issue in vehicular crowdsourcing campaigns where sybils are usually employed to increase their influence and worsen the functioning of the system. In particular, we propose a novel User Recruitment Policy (URP) that, after extracting the participants within the event radius of a crowdsourcing campaign, detects …

research product

A Resilient Smart Architecture for Road Surface Condition Monitoring

Nowadays, road surface condition monitoring is a challenging problem that cannot be addressed with traditional techniques. In this paper we propose an architecture for monitoring the condition of road surfaces based on the paradigm of Mobile Crowdsensing. First, a surface detection module extracts high level features from raw data, indicating the presence of hazards. Then, in order to make the system resilient to attacks, the system exploits a reputation module to identify malicious users and filter out unreliable data. Finally, a truth discovery module aggregates the resulting information to obtain the desired truth values. Experiments carried out on a real world dataset prove the resilien…

research product

Twitter Analysis for Real-Time Malware Discovery

In recent years, the increasing number of cyber-attacks has gained the development of innovative tools to quickly detect new threats. A recent approach to this problem is to analyze the content of Social Networks to discover the rising of new malicious software. Twitter is a popular social network which allows millions of users to share their opinions on what happens all over the world. The subscribers can insert messages, called tweet, that are usually related to international news. In this work, we present a system for real-time malware alerting using a set of tweets captured through the Twitter API’s, and analyzed by means of a Bayes naïve classifier. Then, groups of tweets discussing th…

research product

Three-dimensional matching based resource provisioning for the design of low-latency heterogeneous IoT networks

Internet-of-Things (IoT) is a networking architecture where promising, intelligent services are designed via leveraging information from multiple heterogeneous sources of data within the network. However, the availability of such information in a timely manner requires processing and communication of raw data collected from these sources. Therefore, the economic feasibility of IoT-enabled networks relies on the efficient allocation of both computational and communication resources within the network. Since fog computing and 5G cellular networks approach this problem independently, there is a need for joint resource-provisioning of both communication and computational resources in the networ…

research product