基本信息
views: 0

Bio
Machine Learning and Deep Learning techniques are some of my main interests. Their use in various fields, from Computer Vision to Data Analysis, shows their potential. In particular, a solid interest in this area is aimed at artificial intelligence for computationally inefficient devices
I am interested in the set of techniques enabling complex interaction among intelligent agents and between agents and human counterparts, focusing specifically on extracting and processing agents’ knowledge. In this context, I am also interested in the procedures to integrate human-understandable knowledge into intelligent agents relying on ML and DL approaches.
Many of the Artificial Intelligence techniques turn out to be unexplainable. One of my research interests focuses precisely on identifying techniques that make it possible to understand and explain AI algorithms that otherwise would not be explainable.
The world of information security is one of my main research interests. This interest includes both the defence mechanisms adopted by telecommunication systems to avoid hacking, interception, data loss, breach of confidentiality and the offensive mechanisms used by attackers.
I am interested in the set of techniques enabling complex interaction among intelligent agents and between agents and human counterparts, focusing specifically on extracting and processing agents’ knowledge. In this context, I am also interested in the procedures to integrate human-understandable knowledge into intelligent agents relying on ML and DL approaches.
Many of the Artificial Intelligence techniques turn out to be unexplainable. One of my research interests focuses precisely on identifying techniques that make it possible to understand and explain AI algorithms that otherwise would not be explainable.
The world of information security is one of my main research interests. This interest includes both the defence mechanisms adopted by telecommunication systems to avoid hacking, interception, data loss, breach of confidentiality and the offensive mechanisms used by attackers.
Research Interests
Papers共 20 篇Author StatisticsCo-AuthorSimilar Experts
By YearBy Citation主题筛选期刊级别筛选合作者筛选合作机构筛选
时间
引用量
主题
期刊级别
合作者
合作机构
KNOWLEDGE-BASED SYSTEMS (2025)
COMPUTER SECURITY ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II (2024): 198-213
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024): 288-303
Workshop From Objects to Agentspp.20-32, (2024)
Cited0Views0EIBibtex
0
0
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024): 219-234
ACM COMPUTING SURVEYSno. 6 (2024)
Workshop From Objects to Agentspp.49-65, (2023)
Cited0Views0EIBibtex
0
0
2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&Ppp.615-630, (2023)
Load More
Author Statistics
#Papers: 20
#Citation: 56
H-Index: 3
G-Index: 7
Sociability: 3
Diversity: 2
Activity: 10
Co-Author
Co-Institution
D-Core
- 合作者
- 学生
- 导师
Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn