Follow
Andrea Marcelli
Title
Cited by
Cited by
Year
Countering android malware: A scalable semi-supervised approach for family-signature generation
A Atzeni, F Díaz, A Marcelli, A Sánchez, G Squillero, A Tonda
IEEE Access 6, 59540-59556, 2018
312018
Multi-objective evolutionary algorithms for influence maximization in social networks
D Bucur, G Iacca, A Marcelli, G Squillero, A Tonda
Applications of Evolutionary Computation: 20th European Conference …, 2017
302017
Improving multi-objective evolutionary influence maximization in social networks
D Bucur, G Iacca, A Marcelli, G Squillero, A Tonda
Applications of Evolutionary Computation: 21st International Conference …, 2018
222018
An evolutionary approach to hardware encryption and trojan-horse mitigation
A Marcelli, M Restifo, E Sanchez, G Squillero
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 …, 2017
162017
The maximum common subgraph problem: A parallel and multi-engine approach
S Quer, A Marcelli, G Squillero
Computation 8 (2), 48, 2020
142020
Defeating hardware trojan in microprocessor cores through software obfuscation
A Marcelli, E Sanchez, G Squillerò, MU Jamal, A Imtiaz, S Machetti, ...
2018 IEEE 19th Latin-American Test Symposium (LATS), 1-6, 2018
112018
An unsupervised and noninvasive model for predicting network resource demands
F Corno, L De Russis, A Marcelli, T Montanaro
IEEE Internet of Things Journal 5 (6), 4342-4350, 2018
62018
Evaluating surrogate models for multi-objective influence maximization in social networks
D Bucur, G Iacca, A Marcelli, G Squillero, A Tonda
Proceedings of the Genetic and Evolutionary Computation Conference Companion …, 2018
62018
On the mitigation of hardware trojan attacks in embedded processors by exploiting a hardware-based obfuscator
A Marcelli, E Sanchez, L Sasselli, G Squillero
2018 IEEE 3rd International Verification and Security Workshop (IVSW), 31-37, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–9