This repository contains data and information regarding the paper: F. Bertone, L. Vassio, and M. Trevisan, “The Stock Exchange of Influencers: A Financial Approach for Studying Fanbase Variation Trends” Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2021, 0.1145/3487351.3488413 Download paper Download presentation […]
Open Datasets & Libraries
This page collects the open datasets and code used in the papers: L. Vassio, D. Giordano, M. Trevisan, M. Mellia, A.P.C. da Silva. Users’ Fingerprinting Techniques from TCP Traffic. ACM SIGCOMM Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, Los Angeles, USA, pp. 49-54, 2017. DOI: […]
Introduction ODySSEUS is a data management and simulation software for mobility data, focused mostly on shared fleets in urban environments. Its goal is to provide a general, easy-to-use framework to simulate shared mobility scenarios across different cities using real-world data. Internally, it makes use of several open-source Python libraries such […]
This webpage contains additional material of the paper: “Real-Time Classification of Real-Time Communications“ (currently under revision) Year: 2021 Authors: Gianluca Perna, Dena Markudova, Martino Trevisan, Michela Meo, Paolo Garza, Maurizio Munafò, Giovanna Carofiglio The data You can find the dataset and the classifiers on this link: Data and classifiers The […]
This repository contains data and information regarding the paper: Stefano Berrone and Francesco Della Santa, “Performance Analysis of Multi-Task Deep Learning Models for Flux Regression in Discrete Fracture Networks” (to appear on the special issue “Quantitative Fractured Rock Hydrology” of Geosciences, ISSN 2076-3263). Summary: Analysis of underground flows in fractured […]
By: Tommaso Rescio, Thomas Favale, Francesca Soro, Idilio Drago and Marco Mellia Having a clear insight on the protocols carryingtraffic is crucial for network security. Deep Packet Inspection (DPI) has been a key technique to provide visibility into traffic. DPI has proven effective in various scenarios, and indeed several open […]
This repository contains data and information regarding the paper: Anna Maria Mandalari, Andra Lutu, Ana Custura, Ali Safari Khatouni, Özgü Alay, Marcelo Bagnulo, Vaibhav Bajpai, Anna Brunstrom, Jörg Ott, Martino Trevisan, Marco Mellia, Gorry Fairhurst. “Measuring Roaming in Europe: Infrastructure and Implications on Users’ QoE“. Currently under revision Summary “Roam […]
This repository contains data and information regarding for the paper M. Trevisan, L. Vassio, D. Giordano. Debate on online social networks at the time of COVID-19: An Italian case study. Online Social Networks and Media, Elsevier, 23, 100136, 2021. DOI: 10.1016/j.osnem.2021.100136 You can enjoy a video presentation of the paper […]
This page describes PREPIPE: PREdictive maintenance PIPEline PREPIPE is an advanced predictive pipeline evaluated in the context of predictive maintenance with an automotive case study. The code is given to support the paper: Danilo Giordano, Flavio Giobergia, Eliana Pastor, Antonio La Macchia,Tania Cerquitelli, Elena Baralis, Marco Mellia, Davide Tricarico, (2020), […]
In this page we provide further results and the script to replicate the figures of the papers: M. Barulli, A. Ciociola, M. Cocca, L. Vassio, D. Giordano, M. Mellia. On Scalability of Electric Car Sharing in Smart Cities. In: 2020 IEEE International Smart Cities Conference (ISC2), pp. 1-8, 2020. DOI: […]
This repository contains data and information regarding the paper: Ali Safari Khatouni and Martino Trevisan and Danilo Giordano and Mohammad Rajiullah and Stefan Alfredsson and Anna Brunstrom and Cise Midoglu and Ozgu Alay, “An Open Dataset of Operational Mobile Networks”, submitted in the 18th ACM International Symposium on Mobility Management […]
Packet measurements at scale are essential for several applications, such as cyber-security, accounting and troubleshooting. They, however, threaten users’ privacy by exposing sensitive information. Anonymization has been the answer to this challenge, i.e., replacing sensitive information with obfuscated copies. Anonymization of packet traces, however, comes with some challenges and drawbacks: […]