Loading [MathJax]/extensions/MathMenu.js
Domenico Ciuonzo - IEEE Xplore Author Profile

Showing 1-25 of 115 results

Filter Results

Show

Results

This study examines the prediction of key economic and financial indicators for publicly owned Italian companies using historical time-series data. Four machine learning regression models-Linear Regression, Decision Tree, Random Forest, and XGBoost-are implemented with a sliding window approach to uncover patterns while addressing challenges like missing data and optimal window size. Performance i...Show More
This paper investigates channel-aware decision fusion empowered by massive MIMO systems and reconfigurable intelligent surfaces (RIS). By integrating both, we aim to improve goal-oriented (fusion) performance despite the unique propagation challenges introduced. Specifically, we investigate traditional favorable propagation properties in the context of RIS-aided Massive MIMO decision fusion. The a...Show More
Generative Artificial Intelligence (GenAI) models such as LLMs, GPTs, and Diffusion Models have recently gained widespread attention from both the research and the industrial communities. This survey explores their application in network monitoring and management, focusing on prominent use cases, as well as challenges and opportunities. We discuss how network traffic generation and classification,...Show More
Mobile Traffic Classification (TC) increasingly relies on Machine Learning (ML) and Deep Learning (DL) to enhance network management. Yet, these methods face challenges in (i) classifying new apps, (ii) handling data scarcity from frequent app releases/updates, and (iii) explaining their decisions due to their opaqueness. Class Incremental Learning (CIL) and Few-Shot Learning (FSL) enable to quick...Show More
Network traffic analysis is essential for modern communication systems, focusing on tasks like traffic classification, prediction, and anomaly detection. While classical Machine Learning (ML) and Deep Learning (DL) methods have proven effective, their scalability and real-time performance can be limited by evolving traffic patterns and computational demands. Quantum Machine-Learning (QML) offers a...Show More
This paper presents MIRAGE-App×AcT-2024, a novel dataset originating from the efforts of the MIRAGE project, which collects traffic and corresponding ground-truth data from human-generated mobile-app interactions. By providing detailed insights into traffic patterns, the dataset supports advancements in mobile network optimization, security, and application performance evaluation. To this aim, we ...Show More
With the increasing complexity and scale of modern networks, the demand for transparent and interpretable Artificial Intelligence (AI) models has surged. This survey comprehensively reviews the current state of eXplainable Artificial Intelligence (XAI) methodologies in the context of Network Traffic Analysis (NTA) (including tasks such as traffic classification, intrusion detection, attack classif...Show More
The interrupted sampling repeater jamming (ISRJ) is adept at generating multiple false targets with high fidelity at radar receivers through subsampling, leading to significant challenges in detecting actual targets. This article presents a novel approach to mitigate such jamming by jointly designing the transmit waveform and receive filter of a fully polarimetric wideband radar system. In this st...Show More
Significant in lifestyle have reshaped the Internet landscape, resulting in notable shifts in both the magnitude of Internet traffic and the diversity of apps utilized. The increased adoption of communication-and-collaboration apps, also fueled by lockdowns in the COVID pandemic years, has heavily impacted the management of network infrastructures and their traffic. A notable characteristic of the...Show More
This work proposes a data fusion approach for quickest fault detection and localization within industrial plants via wireless sensor networks. Two approaches are proposed, each exploiting different network architectures. In the first approach, multiple sensors monitor a plant section and individually report their local decisions to a fusion center (FC). The FC provides a global decision after spat...Show More
Traffic classification (TC) is pivotal for network traffic management and security. Over time, TC solutions leveraging artificial intelligence (AI) have undergone significant advancements, primarily fueled by machine learning (ML). This article analyzes the history and current state of AI-powered TC on the Internet, highlighting unresolved research questions. Indeed, despite extensive research, ke...Show More
Traffic Classification (TC) is experiencing a renewed interest, fostered by the growing popularity of Deep Learning (DL) approaches. In exchange for their proved effectiveness, DL models are characterized by a computationally-intensive training procedure that badly matches the fast-paced release of new (mobile) applications, resulting in significantly limited efficiency of model updates. To addres...Show More
In the evolving landscape of Internet of Things (IoT) security, the need for continuous adaptation of defenses is critical. Class Incremental Learning (CIL) can provide a viable solution by enabling Machine Learning (ML) and Deep Learning (DL) models to $( i)$ learn and adapt to new attack types (0-day attacks), $( ii)$ retain their ability to detect known threats, (iii) safeguard computational ef...Show More
The rapid adoption of Internet-of-Things (IoT) and digital twins (DTs) technologies within industrial environments has highlighted diverse critical issues related to safety and security. Sensor failure is one of the major threats compromising DTs operations. In this article, for the first time, we address the problem of sensor fault detection, isolation, and accommodation (SFDIA) in large-size net...Show More
The lifestyle change originated from the COVID-19 pandemic has caused a measurable impact on Internet traffic in terms of volume and application mix, with a sudden increase in usage of communication-and-collaboration apps. In this work, we focus on four of these apps (Skype, Teams, Webex, and Zoom), whose traffic we collect, reliably label at fine (i.e. per-activity) granularity, and analyze from ...Show More
This work addresses the problem of detecting gas dispersions through concentration sensors with wireless transmission capabilities organized as a distributed Wireless Sensor Network (WSN). The concentration sensors in the WSN perform local sequential detection (SD) and transmit their individual decisions to the Fusion Center (FC) according to a transmission rule designed to meet the low-energy req...Show More
Since the Cramér-Rao lower bounds (CRLB) of target localization depends on the sensor geometry explicitly, sensor placement becomes a crucial issue in many target or source localization applications. In the context of simultaneous time-of-arrival (TOA) based multi-target localization, we consider the sensor placement for multiple sensor clusters in the presence of shared sensors. To minimize the m...Show More
In this study, we address the challenge of non-cooperative target detection by federating two wireless sensor networks. The objective is to capitalize on the diversity achievable from both sensing and reporting phases. The target's presence results in an unknown signal that is influenced by unknown distances between the sensors and target, as well as by symmetrical and single-peaked noise. The fus...Show More
In polarimetric radars, corresponding to the polarized antennas, exploiting waveform diversity along the polarization dimension becomes accessible. In this article, we aim to maximize the signal-to-interference plus noise ratio (SINR) of a polarimetric radar by optimizing the transmit polarimetric waveform, the power allocation on its horizontal and vertical polarization segments, and the receivin...Show More
This paper investigates decision fusion in millimeter wave (mmWave) massive multiple-input multiple-output (MIMO) wireless sensor network (WSNs), where the sparse Bayesian learning (SBL) algorithm is employed to estimate the channel between the sensors and the fusion center (FC). We present low-complexity fusion rules based on the hybrid combining architecture for the considered framework. Further...Show More
The promise of Deep Learning (DL) in solving hard problems such as network Traffic Classification (TC) is being held back by the severe lack of transparency and explainability of this kind of approaches. To cope with this strongly felt issue, the field of eXplainable Artificial Intelligence (XAI) has been recently founded, and is providing effective techniques and approaches. Accordingly, in this ...Show More
Sensor technologies empower Industry 4.0 by enabling integration of in-field and real-time raw data into digital twins (DTs). However, sensors might be unreliable due to inherent issues and/or environmental conditions. This article aims at detecting anomalies instantaneously in measurements from sensors, identifying the faulty ones and accommodating them with appropriate estimated data, thus pavin...Show More
For an extended target with different polarimetric responses, one way of improving the detection performance is to exploit waveform diversity on the dimension of polarization. In this article, we focus on the joint design of transmit signal and receive filter for polarimetric radars with local waveform constraints. Considering the signal-to-interference-plus-noise ratio (SINR) as the figure of mer...Show More
Decision-support systems rely on data exchange between digital twins (DTs) and physical twins (PTs). Faulty sensors (e.g, due to hardware/software failures) deliver unreliable data and potentially generate critical damages. Prompt sensor fault detection, isolation and accommodation (SFDIA) plays a crucial role in DT design. In this respect, data-driven approaches to SFDIA have recently shown to be...Show More
Current intrusion detection techniques cannot keep up with the increasing amount and complexity of cyber attacks. In fact, most of the traffic is encrypted and does not allow to apply deep packet inspection approaches. In recent years, Machine Learning techniques have been proposed for post-mortem detection of network attacks, and many datasets have been shared by research groups and organizations...Show More