Publications

You are here

Journal Article
M. Becker, Caminiti, S., Fiorella, D., Francis, L., Gravino, P., Haklay, M. Muki, Hotho, A., Loreto, V., Mueller, J., Ricchiuti, F., Servedio, V. D. P., Sirbu, A., and Tria, F., Awareness and learning in participatory noise sensing., PLoS One, vol. 8, p. e81638, 2013.
B. Dong, Wang, H., Monreale, A., Pedreschi, D., Giannotti, F., and Guo, W., Authenticated Outlier Mining for Outsourced Databases, IEEE Transactions on Dependable and Secure Computing, vol. 17, pp. 222 - 235, 2020.
B. Dong, Wang, H. Wendy, Monreale, A., Pedreschi, D., Giannotti, F., and Guo, W., Authenticated Outlier Mining for Outsourced Databases, IEEE Transactions on Dependable and Secure Computing, 2017.
A. Failla, Citraro, S., and Rossetti, G., Attributed Stream Hypergraphs: temporal modeling of node-attributed high-order interactions, Applied Network Science, vol. 8, pp. 1–19, 2023.
C. Panigutti, Tizzoni, M., Bajardi, P., Smoreda, Z., and Colizza, V., Assessing the use of mobile phone data to describe recurrent mobility patterns in spatial epidemic models, Royal Society open science, vol. 4, p. 160950, 2017.
R. Guidotti and Ruggieri, S., Assessing the Stability of Interpretable Models, arXiv preprint arXiv:1810.09352, 2018.
A. S. Furtado, Fileto, R., and Renso, C., Assessing the Attractiveness of Places with Movement Data , Journal of Information and Data Management, vol. 4, 2013.
D. Aquilino, Asirelli, P., Renso, C., and Turini, F., Applying Restriction Constraints to Deductive Databases, Ann. Math. Artif. Intell., vol. 19, pp. 3-25, 1997.
D. Aquilino, Asirelli, P., Renso, C., and Turini, F., Applying Restriction Constraint to Deductive Databases, Annals of Mathematics and Artificial Intelligence, pp. 3–25, 1997.
T. Ceccarelli, Centeno, D., Giannotti, F., Massolo, A., Parent, C., Raffaetà, A., Renso, C., Spaccapietra, S., and Turini, F., An Application of Advanced Spatio-Temporal Formalisms to Behavioural Ecology, 2008.
A. Raffaetà, Ceccarelli, T., Centeno, D., Giannotti, F., Massolo, A., Parent, C., Renso, C., Spaccapietra, S., and Turini, F., An Application of Advanced Spatio-Temporal Formalisms to Behavioural Ecology, GeoInformatica, vol. 12, pp. 37-72, 2008.
A. Monreale, Pedreschi, D., Pensa, R. G., and Pinelli, F., Anonymity preserving sequential pattern mining, Artif. Intell. Law, vol. 22, pp. 141–173, 2014.
M. Atzori, Bonchi, F., Giannotti, F., and Pedreschi, D., Anonymity preserving pattern discovery, VLDB J., vol. 17, pp. 703-727, 2008.
M. Atzori, Bonchi, F., Giannotti, F., and Pedreschi, D., Anonymity and data mining, Comput. Syst. Sci. Eng., vol. 20, 2005.
G. Rossetti, ANGEL: efficient, and effective, node-centric community discovery in static and dynamic networks, Applied Network Science, vol. 5, pp. 1–23, 2020.
L. Pappalardo, Vanhoof, M., Gabrielli, L., Smoreda, Z., Pedreschi, D., and Giannotti, F., An analytical framework to nowcast well-being using mobile phone data, International Journal of Data Science and Analytics, vol. 2, pp. 75–92, 2016.
D. Morelli, Rossi, A., Cairo, M., and Clifton, D. A., Analysis of the Impact of Interpolation Methods of Missing RR-intervals Caused by Motion Artifacts on HRV Features Estimations, Sensors, vol. 19, p. 3163, 2019.
A. Sirbu, Pedreschi, D., Giannotti, F., and Kertész, J., Algorithmic bias amplifies opinion fragmentation and polarization: A bounded confidence model, PloS one, vol. 14, p. e0213246, 2019.
R. Guidotti, Monreale, A., and Pedreschi, D., The AI black box Explanation Problem, ERCIM NEWS, pp. 12–13, 2019.
L. Milli, Rossetti, G., Pedreschi, D., and Giannotti, F., Active and passive diffusion processes in complex networks, Applied network science, vol. 3, p. 42, 2018.

Pages