Topic: ITS applications

Published:

# Topic: ITS applications

Advanced applications Application fields Computer applications Critical applications High level applications ITS applications Pervasive applications Software frameworks

2024

  1. Barzegar, A., Campanile, L., Marrone, S., Marulli, F., Verde, L., & Mastroianni, M. (2024). Fuzzy-based Severity Evaluation in Privacy Problems: An Application to Healthcare [Conference paper]. Proceedings - 2024 19th European Dependable Computing Conference, EDCC 2024, 147–154. https://doi.org/10.1109/EDCC61798.2024.00037
    Abstract
    The growing diffusion of smart pervasive applications is starting to mine personal privacy: from Internet of Things to Machine Learning, the opportunities for privacy loss are many. As for other concerns involving people and goods as financial, safety and security, researchers and practitioners have defined in time different risk assessment procedures to have repeatable and accurate ways of detecting, quantifying and managing the (possible) source of privacy loss. This paper defines a methodology to deal with privacy risk assessment, overcoming the traditional dichotomy between qualitative (easy to apply) and quantitative (accurate) approaches. The present paper introduces an approach based on fuzzy logic, able to conjugate the benefits of both techniques. The feasibility of the proposed methodology is demonstrated using a healthcare case study. © 2024 IEEE.
    DOI Publisher Details
    Details
  2. Campanile, L., De Fazio, R., Di Giovanni, M., & Marulli, F. (2024). Beyond the Hype: Toward a Concrete Adoption of the Fair and Responsible Use of AI [Conference paper]. CEUR Workshop Proceedings, 3762, 60–65. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85205601768&partnerID=40&md5=99140624de79e37b370ed4cf816c24e7
    Abstract
    Artificial Intelligence (AI) is a fast-changing technology that is having a profound impact on our society, from education to industry. Its applications cover a wide range of areas, such as medicine, military, engineering and research. The emergence of AI and Generative AI have significant potential to transform society, but they also raise concerns about transparency, privacy, ownership, fair use, reliability, and ethical considerations. The Generative AI adds complexity to the existing problems of AI due to its ability to create machine-generated data that is barely distinguishable from human-generated data. Bringing to the forefront the issue of responsible and fair use of AI. The security, safety and privacy implications are enormous, and the risks associated with inappropriate use of these technologies are real. Although some governments, such as the European Union and the United States, have begun to address the problem with recommendations and proposed regulations, it is probably not enough. Regulatory compliance should be seen as a starting point in a continuous process of improving the ethical procedures and privacy risk assessment of AI systems. The need to have a baseline to manage the process of creating an AI system even from an ethics and privacy perspective becomes progressively more important In this study, we discuss the ethical implications of these advances and propose a conceptual framework for the responsible, fair, and safe use of AI. © 2024 Copyright for this paper by its authors.
    Publisher Details
    Details

2023

  1. Campanile, L., Di Bonito, L. P., Gribaudo, M., & Iacono, M. (2023). A Domain Specific Language for the Design of Artificial Intelligence Applications for Process Engineering [Conference paper]. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 482 LNICST, 133–146. https://doi.org/10.1007/978-3-031-31234-2_8
    Abstract
    Processes in chemical engineering are frequently enacted by one-of-a-kind devices that implement dynamic processes with feedback regulations designed according to experimental studies and empirical tuning of new devices after the experience obtained on similar setups. While application of artificial intelligence based solutions is largely advocated by researchers in several fields of chemical engineering to face the problems deriving from these practices, few actual cases exist in literature and in industrial plants that leverage currently available tools as much as other application fields suggest. One of the factors that is limiting the spread of AI-based solutions in the field is the lack of tools that support the evaluation of the needs of plants, be those existing or to-be settlements. In this paper we provide a Domain Specific Language based approach for the evaluation of the basic performance requirements for cloud-based setups capable of supporting chemical engineering plants, with a metaphor that attempts to bridge the two worlds. © 2023, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
    DOI Publisher Details
    Details

2021

  1. Marulli, F., Verde, L., & Campanile, L. (2021). Exploring data and model poisoning attacks to deep learning-based NLP systems [Conference paper]. Procedia Computer Science, 192, 3570–3579. https://doi.org/10.1016/j.procs.2021.09.130
    Abstract
    Natural Language Processing (NLP) is being recently explored also to its application in supporting malicious activities and objects detection. Furthermore, NLP and Deep Learning have become targets of malicious attacks too. Very recent researches evidenced that adversarial attacks are able to affect also NLP tasks, in addition to the more popular adversarial attacks on deep learning systems for image processing tasks. More precisely, while small perturbations applied to the data set adopted for training typical NLP tasks (e.g., Part-of-Speech Tagging, Named Entity Recognition, etc..) could be easily recognized, models poisoning, performed by the means of altered data models, typically provided in the transfer learning phase to a deep neural networks (e.g., poisoning attacks by word embeddings), are harder to be detected. In this work, we preliminary explore the effectiveness of a poisoned word embeddings attack aimed at a deep neural network trained to accomplish a Named Entity Recognition (NER) task. By adopting the NER case study, we aimed to analyze the severity of such a kind of attack to accuracy in recognizing the right classes for the given entities. Finally, this study represents a preliminary step to assess the impact and the vulnerabilities of some NLP systems we adopt in our research activities, and further investigating some potential mitigation strategies, in order to make these systems more resilient to data and models poisoning attacks. © 2021 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0) Peer-review under responsibility of the scientific committee of KES International.
    DOI Publisher Details
    Details

2020

  1. Abate, C., Campanile, L., & Marrone, S. (2020). A flexible simulation-based framework for model-based/data-driven dependability evaluation [Conference paper]. Proceedings - 2020 IEEE 31st International Symposium on Software Reliability Engineering Workshops, ISSREW 2020, 261–266. https://doi.org/10.1109/ISSREW51248.2020.00083
    Abstract
    Modern predictive maintenance is the convergence of several technological trends: developing new techniques and algorithms can be very costly due to the need for a physical prototype. This research has the final aim to build a simulation-based software framework for modeling and analysing complex systems and for defining predictive maintenance algorithms. By the usage of simulation, quantitative evaluation of the dependability of such systems will be possible. The ERTMS/ETCS dependability case study is presented to prove the applicability of the software. © 2020 IEEE.
    DOI Publisher Details
    Details
  2. Campanile, L., Iacono, M., Marulli, F., & Mastroianni, M. (2020). A simulation study on a WSN for emergency management [Conference paper]. Proceedings - European Council for Modelling and Simulation, ECMS, 34(1), 384–392. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85094937629&partnerID=40&md5=69ee7b771d76c72bd5012883b86e67ca
    Abstract
    Wireless Sensors Networks (WSN) are one of the ways to provide the communication infrastructure for advanced applications based on the Internet of Things (IoT) paradigm. IoT supports high level applications over WSN to provide services in a number of fields. WSN are also suitable to support critical applications, as the supporting technologies are consolidated and standard network services can be used on top of the specific layers. Furthermore, generic distributed or network-enabled software can be run over the nodes of a WSN. In this paper we evaluate and compare performances of IEEE 802.llg and 802.1 In, two implementations of the popular Wi-Fi technology, to support the deployment and utilization of an energy management support system, used to monitor the field by a team of firefighters during a mission. Evaluation on an example scenario is done by using ns-3, an open network simulator characterized by its realistic details, to understand the actual limitations of the two standards besides theoretical limits. © ECMS Mike Steglich, Christian Mueller, Gaby Neumann, Mathias Walther.
    Publisher Details
    Details
  3. Campanile, L., Gribaudo, M., Iacono, M., & Mastroianni, M. (2020). Performance evaluation of a fog WSN infrastructure for emergency management [Article]. Simulation Modelling Practice and Theory, 104. https://doi.org/10.1016/j.simpat.2020.102120
    Abstract
    Advances in technology and the rise of new computing paradigms, such as Fog computing, may boost the definition of a new generation of advanced support services in critical applications. In this paper we explore the possibilities of a Wireless Sensor Network support (WSN) for a Fog computing system in an emergency management architecture that has been previously presented. Disposable intelligent wireless sensors, capable of processing tasks locally, are deployed and used to support and protect the intervention of a squad of firemen equipped with augmented reality and life monitoring devices to provide an environmental monitoring system and communication infrastructure,in the framework of a next-generation, cloud-supported emergency management system. Simulation is used to explore the design parameter space and dimension the workloads and the extension of the WSN, according to an adaptive behavior of the resulting Fog computing system that varies workloads to save the integrity of the WSN. © 2020 Elsevier B.V.
    DOI Publisher Details
    Details

2019

  1. Campanile, L., Iacono, M., Gribaudo, M., & Mastroianni, M. (2019). Quantitative modeling of the behaviour of an autonomic router [Conference paper]. ACM International Conference Proceeding Series, 193–194. https://doi.org/10.1145/3306309.3306344
    Abstract
    Autonomic routers are the main component on which autonomic networking is founded. Our goal is to provide a first approach performance modeling method that can be usable by networking professionals that are not part of the Performance Evaluation community. © 2019 Copyright held by the owner/author(s).
    DOI Publisher Details
    Details

← Back to all publications

2024

  1. Barzegar, A., Campanile, L., Marrone, S., Marulli, F., Verde, L., & Mastroianni, M. (2024). Fuzzy-based Severity Evaluation in Privacy Problems: An Application to Healthcare [Conference paper]. Proceedings - 2024 19th European Dependable Computing Conference, EDCC 2024, 147–154. https://doi.org/10.1109/EDCC61798.2024.00037
    Abstract
    The growing diffusion of smart pervasive applications is starting to mine personal privacy: from Internet of Things to Machine Learning, the opportunities for privacy loss are many. As for other concerns involving people and goods as financial, safety and security, researchers and practitioners have defined in time different risk assessment procedures to have repeatable and accurate ways of detecting, quantifying and managing the (possible) source of privacy loss. This paper defines a methodology to deal with privacy risk assessment, overcoming the traditional dichotomy between qualitative (easy to apply) and quantitative (accurate) approaches. The present paper introduces an approach based on fuzzy logic, able to conjugate the benefits of both techniques. The feasibility of the proposed methodology is demonstrated using a healthcare case study. © 2024 IEEE.
    DOI Publisher Details
    Details
  2. Campanile, L., De Fazio, R., Di Giovanni, M., & Marulli, F. (2024). Beyond the Hype: Toward a Concrete Adoption of the Fair and Responsible Use of AI [Conference paper]. CEUR Workshop Proceedings, 3762, 60–65. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85205601768&partnerID=40&md5=99140624de79e37b370ed4cf816c24e7
    Abstract
    Artificial Intelligence (AI) is a fast-changing technology that is having a profound impact on our society, from education to industry. Its applications cover a wide range of areas, such as medicine, military, engineering and research. The emergence of AI and Generative AI have significant potential to transform society, but they also raise concerns about transparency, privacy, ownership, fair use, reliability, and ethical considerations. The Generative AI adds complexity to the existing problems of AI due to its ability to create machine-generated data that is barely distinguishable from human-generated data. Bringing to the forefront the issue of responsible and fair use of AI. The security, safety and privacy implications are enormous, and the risks associated with inappropriate use of these technologies are real. Although some governments, such as the European Union and the United States, have begun to address the problem with recommendations and proposed regulations, it is probably not enough. Regulatory compliance should be seen as a starting point in a continuous process of improving the ethical procedures and privacy risk assessment of AI systems. The need to have a baseline to manage the process of creating an AI system even from an ethics and privacy perspective becomes progressively more important In this study, we discuss the ethical implications of these advances and propose a conceptual framework for the responsible, fair, and safe use of AI. © 2024 Copyright for this paper by its authors.
    Publisher Details
    Details

2023

  1. Campanile, L., Di Bonito, L. P., Gribaudo, M., & Iacono, M. (2023). A Domain Specific Language for the Design of Artificial Intelligence Applications for Process Engineering [Conference paper]. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 482 LNICST, 133–146. https://doi.org/10.1007/978-3-031-31234-2_8
    Abstract
    Processes in chemical engineering are frequently enacted by one-of-a-kind devices that implement dynamic processes with feedback regulations designed according to experimental studies and empirical tuning of new devices after the experience obtained on similar setups. While application of artificial intelligence based solutions is largely advocated by researchers in several fields of chemical engineering to face the problems deriving from these practices, few actual cases exist in literature and in industrial plants that leverage currently available tools as much as other application fields suggest. One of the factors that is limiting the spread of AI-based solutions in the field is the lack of tools that support the evaluation of the needs of plants, be those existing or to-be settlements. In this paper we provide a Domain Specific Language based approach for the evaluation of the basic performance requirements for cloud-based setups capable of supporting chemical engineering plants, with a metaphor that attempts to bridge the two worlds. © 2023, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
    DOI Publisher Details
    Details

2021

  1. Marulli, F., Verde, L., & Campanile, L. (2021). Exploring data and model poisoning attacks to deep learning-based NLP systems [Conference paper]. Procedia Computer Science, 192, 3570–3579. https://doi.org/10.1016/j.procs.2021.09.130
    Abstract
    Natural Language Processing (NLP) is being recently explored also to its application in supporting malicious activities and objects detection. Furthermore, NLP and Deep Learning have become targets of malicious attacks too. Very recent researches evidenced that adversarial attacks are able to affect also NLP tasks, in addition to the more popular adversarial attacks on deep learning systems for image processing tasks. More precisely, while small perturbations applied to the data set adopted for training typical NLP tasks (e.g., Part-of-Speech Tagging, Named Entity Recognition, etc..) could be easily recognized, models poisoning, performed by the means of altered data models, typically provided in the transfer learning phase to a deep neural networks (e.g., poisoning attacks by word embeddings), are harder to be detected. In this work, we preliminary explore the effectiveness of a poisoned word embeddings attack aimed at a deep neural network trained to accomplish a Named Entity Recognition (NER) task. By adopting the NER case study, we aimed to analyze the severity of such a kind of attack to accuracy in recognizing the right classes for the given entities. Finally, this study represents a preliminary step to assess the impact and the vulnerabilities of some NLP systems we adopt in our research activities, and further investigating some potential mitigation strategies, in order to make these systems more resilient to data and models poisoning attacks. © 2021 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0) Peer-review under responsibility of the scientific committee of KES International.
    DOI Publisher Details
    Details

2020

  1. Abate, C., Campanile, L., & Marrone, S. (2020). A flexible simulation-based framework for model-based/data-driven dependability evaluation [Conference paper]. Proceedings - 2020 IEEE 31st International Symposium on Software Reliability Engineering Workshops, ISSREW 2020, 261–266. https://doi.org/10.1109/ISSREW51248.2020.00083
    Abstract
    Modern predictive maintenance is the convergence of several technological trends: developing new techniques and algorithms can be very costly due to the need for a physical prototype. This research has the final aim to build a simulation-based software framework for modeling and analysing complex systems and for defining predictive maintenance algorithms. By the usage of simulation, quantitative evaluation of the dependability of such systems will be possible. The ERTMS/ETCS dependability case study is presented to prove the applicability of the software. © 2020 IEEE.
    DOI Publisher Details
    Details
  2. Campanile, L., Iacono, M., Marulli, F., & Mastroianni, M. (2020). A simulation study on a WSN for emergency management [Conference paper]. Proceedings - European Council for Modelling and Simulation, ECMS, 34(1), 384–392. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85094937629&partnerID=40&md5=69ee7b771d76c72bd5012883b86e67ca
    Abstract
    Wireless Sensors Networks (WSN) are one of the ways to provide the communication infrastructure for advanced applications based on the Internet of Things (IoT) paradigm. IoT supports high level applications over WSN to provide services in a number of fields. WSN are also suitable to support critical applications, as the supporting technologies are consolidated and standard network services can be used on top of the specific layers. Furthermore, generic distributed or network-enabled software can be run over the nodes of a WSN. In this paper we evaluate and compare performances of IEEE 802.llg and 802.1 In, two implementations of the popular Wi-Fi technology, to support the deployment and utilization of an energy management support system, used to monitor the field by a team of firefighters during a mission. Evaluation on an example scenario is done by using ns-3, an open network simulator characterized by its realistic details, to understand the actual limitations of the two standards besides theoretical limits. © ECMS Mike Steglich, Christian Mueller, Gaby Neumann, Mathias Walther.
    Publisher Details
    Details
  3. Campanile, L., Gribaudo, M., Iacono, M., & Mastroianni, M. (2020). Performance evaluation of a fog WSN infrastructure for emergency management [Article]. Simulation Modelling Practice and Theory, 104. https://doi.org/10.1016/j.simpat.2020.102120
    Abstract
    Advances in technology and the rise of new computing paradigms, such as Fog computing, may boost the definition of a new generation of advanced support services in critical applications. In this paper we explore the possibilities of a Wireless Sensor Network support (WSN) for a Fog computing system in an emergency management architecture that has been previously presented. Disposable intelligent wireless sensors, capable of processing tasks locally, are deployed and used to support and protect the intervention of a squad of firemen equipped with augmented reality and life monitoring devices to provide an environmental monitoring system and communication infrastructure,in the framework of a next-generation, cloud-supported emergency management system. Simulation is used to explore the design parameter space and dimension the workloads and the extension of the WSN, according to an adaptive behavior of the resulting Fog computing system that varies workloads to save the integrity of the WSN. © 2020 Elsevier B.V.
    DOI Publisher Details
    Details

2019

  1. Campanile, L., Iacono, M., Gribaudo, M., & Mastroianni, M. (2019). Quantitative modeling of the behaviour of an autonomic router [Conference paper]. ACM International Conference Proceeding Series, 193–194. https://doi.org/10.1145/3306309.3306344
    Abstract
    Autonomic routers are the main component on which autonomic networking is founded. Our goal is to provide a first approach performance modeling method that can be usable by networking professionals that are not part of the Performance Evaluation community. © 2019 Copyright held by the owner/author(s).
    DOI Publisher Details
    Details

← Back to all publications