default search action
Antonio Nucci
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c53]Antonio Nucci, Matthew Hibberd:
Eco-activism, Human-Computer Interaction and Fast Fashion. HCI (19) 2021: 519-530
2010 – 2019
- 2017
- [j29]Amedeo Sapio, Mario Baldi, Fulvio Risso, Narendra Anand, Antonio Nucci:
Packet Capture and Analysis on MEDINA, A Massively Distributed Network Data Caching Platform. Parallel Process. Lett. 27(3-4): 1750010:1-1750010:18 (2017) - 2016
- [c52]Qiang Ma, Han Hee Song, S. Muthukrishnan, Antonio Nucci:
Joining user profiles across online social networks: From the perspective of an adversary. ASONAM 2016: 178-185 - 2015
- [j28]Alok Tongaonkar, Ruben Torres, Marios Iliofotou, Ram Keralapura, Antonio Nucci:
Towards self adaptive network traffic classification. Comput. Commun. 56: 35-46 (2015) - [j27]Jiangtao Yin, Yong Liao, Mario Baldi, Lixin Gao, Antonio Nucci:
GOM-Hadoop: A distributed framework for efficient analytics on ordered datasets. J. Parallel Distributed Comput. 83: 58-69 (2015) - [c51]Pengkui Luo, Ruben Torres, Zhi-Li Zhang, Sabyasachi Saha, Sung-Ju Lee, Antonio Nucci, Marco Mellia:
Leveraging client-side DNS failure patterns to identify malicious behaviors. CNS 2015: 406-414 - [c50]Qiang Xu, Yong Liao, Stanislav Miskovic, Zhuoqing Morley Mao, Mario Baldi, Antonio Nucci, Thomas Andrews:
Automatic generation of mobile app signatures from traffic observations. INFOCOM 2015: 1481-1489 - 2014
- [c49]Lei Liu, Sabyasachi Saha, Ruben Torres, Jianpeng Xu, Pang-Ning Tan, Antonio Nucci, Marco Mellia:
Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information. ASONAM 2014: 150-157 - [c48]Amedeo Sapio, Mario Baldi, Yong Liao, Gyan Ranjan, Fulvio Risso, Alok Tongaonkar, Ruben Torres, Antonio Nucci:
MAPPER: A Mobile Application Personal Policy Enforcement Router for Enterprise Networks. EWSDN 2014: 131-132 - [c47]Hesham Mekky, Ruben Torres, Zhi-Li Zhang, Sabyasachi Saha, Antonio Nucci:
Detecting malicious HTTP redirections using trees of user browsing activity. INFOCOM 2014: 1159-1167 - [c46]Amedeo Sapio, Yong Liao, Mario Baldi, Gyan Ranjan, Fulvio Risso, Alok Tongaonkar, Ruben Torres, Antonio Nucci:
Per-user policy enforcement on mobile apps through network functions virtualization. MobiArch 2014: 37-42 - [c45]Qiang Xu, Thomas Andrews, Yong Liao, Stanislav Miskovic, Zhuoqing Morley Mao, Mario Baldi, Antonio Nucci:
FLOWR: a self-learning system for classifying mobileapplication traffic. SIGMETRICS 2014: 569-570 - [c44]Ning Xia, Stanislav Miskovic, Mario Baldi, Aleksandar Kuzmanovic, Antonio Nucci:
GeoEcho: Inferring User Interests from Geotag Reports in Network Traffic. WI-IAT (1) 2014: 1-8 - 2013
- [j26]Yakun Hu, Dapeng Wu, Antonio Nucci:
Fuzzy-Clustering-Based Decision Tree Approach for Large Population Speaker Identification. IEEE Trans. Speech Audio Process. 21(4): 762-774 (2013) - [c43]Jiangtao Yin, Yong Liao, Mario Baldi, Lixin Gao, Antonio Nucci:
Efficient analytics on ordered datasets using MapReduce. HPDC 2013: 125-126 - [c42]Shuaifu Dai, Alok Tongaonkar, Xiaoyin Wang, Antonio Nucci, Dawn Song:
NetworkProfiler: Towards automatic fingerprinting of Android apps. INFOCOM 2013: 809-817 - [c41]Prakash Mandayam Comar, Lei Liu, Sabyasachi Saha, Pang-Ning Tan, Antonio Nucci:
Combining supervised and unsupervised learning for zero-day malware detection. INFOCOM 2013: 2022-2030 - [c40]Alok Tongaonkar, Ram Keralapura, Antonio Nucci:
SANTaClass: A Self Adaptive Network Traffic Classification system. Networking 2013: 1-9 - [c39]Alok Tongaonkar, Shuaifu Dai, Antonio Nucci, Dawn Song:
Understanding Mobile App Usage Patterns Using In-App Advertisements. PAM 2013: 63-72 - [c38]Lei Liu, Prakash Mandayam Comar, Antonio Nucci, Sabyasachi Saha, Pang-Ning Tan:
Missing or Inapplicable: Treatment of Incomplete Continuous-valued Features in Supervised Learning. SDM 2013: 46-54 - [c37]Ning Xia, Han Hee Song, Yong Liao, Marios Iliofotou, Antonio Nucci, Zhi-Li Zhang, Aleksandar Kuzmanovic:
Mosaic: quantifying privacy leakage in mobile networks. SIGCOMM 2013: 279-290 - [c36]Jiangtao Yin, Yong Liao, Mario Baldi, Lixin Gao, Antonio Nucci:
A Scalable Distributed Framework for Efficient Analytics on Ordered Datasets. UCC 2013: 131-138 - 2012
- [j25]Yakun Hu, Dapeng Wu, Antonio Nucci:
Pitch-based gender identification with two-stage classification. Secur. Commun. Networks 5(2): 211-225 (2012) - [j24]Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuzmanovic, Antonio Nucci:
Taming the Mobile Data Deluge With Drop Zones. IEEE/ACM Trans. Netw. 20(4): 1010-1023 (2012) - [c35]Prakash Mandayam Comar, Lei Liu, Sabyasachi Saha, Antonio Nucci, Pang-Ning Tan:
Weighted linear kernel with tree transformed features for malware detection. CIKM 2012: 2287-2290 - [c34]Soheil Hassas Yeganeh, Milad Eftekhar, Yashar Ganjali, Ram Keralapura, Antonio Nucci:
CUTE: Traffic Classification Using TErms. ICCCN 2012: 1-9 - [c33]Lei Liu, Prakash Mandayam Comar, Sabyasachi Saha, Pang-Ning Tan, Antonio Nucci:
Recursive NMF: Efficient label tree learning for large multi-class problems. ICPR 2012: 2148-2151 - [c32]Ignacio Bermudez, Marco Mellia, Maurizio M. Munafò, Ram Keralapura, Antonio Nucci:
DNS to the rescue: discerning content and services in a tangled web. Internet Measurement Conference 2012: 413-426 - [c31]Guowu Xie, Marios Iliofotou, Ram Keralapura, Michalis Faloutsos, Antonio Nucci:
SubFlow: Towards practical flow-level traffic classification. INFOCOM 2012: 2541-2545 - [c30]Alok Tongaonkar, Ram Keralapura, Antonio Nucci:
Challenges in Network Application Identification. LEET 2012 - 2011
- [j23]Jieyan Fan, Dapeng Wu, Antonio Nucci, Ram Keralapura, Lixin Gao:
Protocol oblivious classification of multimedia traffic. Secur. Commun. Networks 4(4): 357-371 (2011) - [j22]Hossein Kaffash Bokharaei, Yashar Ganjali, Ram Keralapura, Antonio Nucci:
Poster: telephony network characterization for spammer identification. SIGMETRICS Perform. Evaluation Rev. 39(2): 69 (2011) - [c29]Zhichao Zhu, Guohong Cao, Ram Keralapura, Antonio Nucci:
Characterizing Data Services in a 3G Network: Usage, Mobility and Access Issues. ICC 2011: 1-6 - [c28]Hossein Kaffash Bokharaei, Alireza Sahraei, Yashar Ganjali, Ram Keralapura, Antonio Nucci:
You can SPIT, but you can't hide: Spammer identification in telephony networks. INFOCOM 2011: 41-45 - [c27]Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuzmanovic, Antonio Nucci:
Taming user-generated content in mobile networks via Drop Zones. INFOCOM 2011: 2840-2848 - 2010
- [j21]Ram Keralapura, Antonio Nucci, Chen-Nee Chuah:
A novel self-learning architecture for p2p traffic classification in high speed networks. Comput. Networks 54(7): 1055-1068 (2010) - [j20]Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuzmanovic, Antonio Nucci:
Googling the internet: profiling internet endpoints via the world wide web. IEEE/ACM Trans. Netw. 18(2): 666-679 (2010) - [c26]Ram Keralapura, Antonio Nucci, Zhi-Li Zhang, Lixin Gao:
Profiling users in a 3g network using hourglass co-clustering. MobiCom 2010: 341-352
2000 – 2009
- 2009
- [j19]Hui Zang, Antonio Nucci:
Traffic monitor deployment in IP networks. Comput. Networks 53(14): 2491-2501 (2009) - [j18]Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal, Antonio Nucci, Edward W. Knightly:
DDoS-shield: DDoS-resilient scheduling to counter application layer attacks. IEEE/ACM Trans. Netw. 17(1): 26-39 (2009) - [c25]Jieyan Fan, Dapeng Wu, Antonio Nucci, Ram Keralapura, Lixin Gao:
Identifying hidden voice and video streams. Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009: 73440F - [c24]Ram Keralapura, Antonio Nucci, Chen-Nee Chuah:
Self-Learning Peer-to-Peer Traffic Classifier. ICCCN 2009: 1-8 - [c23]Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuzmanovic, Antonio Nucci:
Measuring serendipity: connecting people, locations and interests in a mobile 3G network. Internet Measurement Conference 2009: 267-279 - [c22]Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya Ranjan, Antonio Nucci:
A Social Network Based Patching Scheme for Worm Containment in Cellular Networks. INFOCOM 2009: 1476-1484 - 2008
- [b1]Antonio Nucci, Konstantina Papagiannaki:
Design, Measurement and Management of Large-Scale IP Networks - Bridging the Gap between Theory and Practice. Cambridge University Press 2008, ISBN 978-0-521-88069-5, pp. I-XII, 1-392 - [j17]Jieyan Fan, Dapeng Wu, Kejie Lu, Antonio Nucci:
An efficient data structure for network anomaly detection. Secur. Commun. Networks 1(2): 107-124 (2008) - [c21]Su Chen, Supranamaya Ranjan, Antonio Nucci:
IPzip: A Stream-Aware IP Compression Algorithm. DCC 2008: 182-191 - [c20]Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuzmanovic, Antonio Nucci:
Unconstrained endpoint profiling (googling the internet). SIGCOMM 2008: 279-290 - 2007
- [j16]Kejie Lu, Dapeng Wu, Jieyan Fan, Sinisa Todorovic, Antonio Nucci:
Robust and efficient detection of DDoS attacks for large-scale internet. Comput. Networks 51(18): 5036-5056 (2007) - [j15]Su Chen, Antonio Nucci:
Dynamic Nonuniform Data Approximation in Databases with Haar Wavelet. J. Comput. 2(8): 64-76 (2007) - [j14]Augustin Soule, Antonio Nucci, Rene L. Cruz, Emilio Leonardi, Nina Taft:
Estimating dynamic traffic matrices by using viable routing changes. IEEE/ACM Trans. Netw. 15(3): 485-498 (2007) - [j13]Antonio Nucci, Supratik Bhattacharyya, Nina Taft, Christophe Diot:
IGP link weight assignment for operational Tier-1 backbones. IEEE/ACM Trans. Netw. 15(4): 789-802 (2007) - [c19]Su Chen, Antonio Nucci:
Nonuniform Compression in Databases with Haar Wavelet. DCC 2007: 223-232 - [c18]Supranamaya Ranjan, Shaleen Shah, Antonio Nucci, Maurizio M. Munafò, Rene L. Cruz, S. Muthukrishnan:
DoWitcher: Effective Worm Detection and Containment in the Internet Core. INFOCOM 2007: 2541-2545 - [c17]Hun-Jeong Kang, Zhi-Li Zhang, Supranamaya Ranjan, Antonio Nucci:
SIP-based VoIP traffic behavior profiling and its applications. MineNet 2007: 39-44 - [c16]Jian Qiu, Lixin Gao, Supranamaya Ranjan, Antonio Nucci:
Detecting bogus BGP route information: Going beyond prefix hijacking. SecureComm 2007: 381-390 - 2006
- [j12]Marco Ajmone Marsan, Carla-Fabiana Chiasserini, Antonio Nucci:
Forming optimal topologies for Bluetooth-based wireless personal area networks. IEEE Trans. Wirel. Commun. 5(4): 763-773 (2006) - [c15]Jieyan Fan, Dapeng Wu, Kejie Lu, Antonio Nucci:
Design of Bloom Filter Array for Network Anomaly Detection. GLOBECOM 2006 - [c14]Julien Ridoux, Antonio Nucci, Darryl Veitch:
Seeing the Difference in IP Traffic: Wireless Versus Wireline. INFOCOM 2006 - [c13]Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah:
BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies. VizSEC 2006: 81-90 - 2005
- [j11]Antonio Nucci, Ashwin Sridharan, Nina Taft:
The problem of synthetically generating IP traffic matrices: initial recommendations. Comput. Commun. Rev. 35(3): 19-32 (2005) - [j10]Antonio Nucci, Nina Taft, Patrick Thiran, Hui Zang, Christophe Diot:
Increasing the Link Utilization in IP over WDM Networks Using Availability as QoS. Photonic Netw. Commun. 9(1): 55-75 (2005) - [j9]Augustin Soule, Kavé Salamatian, Antonio Nucci, Nina Taft:
Traffic matrix tracking using Kalman filters. SIGMETRICS Perform. Evaluation Rev. 33(3): 24-31 (2005) - [c12]Sharad Agarwal, Antonio Nucci, Supratik Bhattacharyya:
Measuring the Shared Fate of IGP Engineering and Interdomain Traffic. ICNP 2005: 236-245 - [c11]Augustin Soule, Anukool Lakhina, Nina Taft, Konstantina Papagiannaki, Kavé Salamatian, Antonio Nucci, Mark Crovella, Christophe Diot:
Traffic matrices: balancing measurements, inference and modeling. SIGMETRICS 2005: 362-373 - [c10]Sridhar Machiraju, Darryl Veitch, François Baccelli, Antonio Nucci, Jean Bolot:
Theory and practice of cross-traffic estimation. SIGMETRICS 2005: 400-401 - 2004
- [j8]Antonio Nucci, Nina Taft, Chadi Barakat, Patrick Thiran:
Controlled use of excess backbone bandwidth for providing new services in IP-over-WDM networks. IEEE J. Sel. Areas Commun. 22(9): 1692-1707 (2004) - [j7]Antonio Nucci, Brunilde Sansò, Teodor Gabriel Crainic, Emilio Leonardi, Marco Ajmone Marsan:
On the design of fault-tolerant logical topologies in wavelength-routed packet networks. IEEE J. Sel. Areas Commun. 22(9): 1884-1895 (2004) - [j6]Carla-Fabiana Chiasserini, Imrich Chlamtac, Paolo Monti, Antonio Nucci:
An Energy-Efficient Method for Nodes Assignment in Cluster-Based Ad Hoc Networks. Wirel. Networks 10(3): 223-231 (2004) - [c9]Antonio Nucci, Rene L. Cruz, Nina Taft, Christophe Diot:
Design of IGP Link Weights for Estimation of Traffic Matrices. INFOCOM 2004: 2341-2351 - [c8]Augustin Soule, Antonio Nucci, Rene L. Cruz, Emilio Leonardi, Nina Taft:
How to identify and estimate the largest traffic matrix elements in a dynamic environment. SIGMETRICS 2004: 73-84 - 2003
- [j5]Andrea Bianco, Giulio Galante, Emilio Leonardi, Fabio Neri, Antonio Nucci:
Scheduling algorithms for multicast traffic in TDM/WDM networks with arbitrary tuning latencies. Comput. Networks 41(6): 727-742 (2003) - [c7]Frédéric Giroire, Antonio Nucci, Nina Taft, Christophe Diot:
Increasing the Robustness of IP Backbones in the Absence of Optical Level Protection. INFOCOM 2003: 1-11 - 2002
- [j4]Marco Ajmone Marsan, Emilio Leonardi, Marco Mellia, Antonio Nucci, Andrea Grosso:
Design of Logical Topologies in Wavelength-Routed IP Networks. Photonic Netw. Commun. 4(3-4): 423-442 (2002) - [c6]Marco Ajmone Marsan, Carla-Fabiana Chiasserini, Antonio Nucci, Giuliana Carello, Luigi De Giovanni:
Optimizing the Topology of Bluetooth Wireless Personal Area Networks. INFOCOM 2002: 572-579 - [c5]Carla-Fabiana Chiasserini, Imrich Chlamtac, Paolo Monti, Antonio Nucci:
Energy Efficient Design of Wireless Ad Hoc Networks. NETWORKING 2002: 376-386 - 2001
- [j3]Andrea Grosso, Emilio Leonardi, Marco Mellia, Antonio Nucci:
Logical topologies design over WDM wavelength routed networks robust to traffic uncertainties. IEEE Commun. Lett. 5(4): 172-174 (2001) - [c4]Marco Mellia, Antonio Nucci, Andrea Grosso, Emilio Leonardi, Marco Ajmone Marsan:
Optimal design of logical topologies in wavelength-routed optical networks with multicast traffic. GLOBECOM 2001: 1520-1525 - [c3]Andrea Bianco, Giulio Galante, Emilio Leonardi, Fabio Neri, Antonio Nucci:
Scheduling algorithms for multicast traffic in TDM/WDM networks with arbitrary tuning latencies. GLOBECOM 2001: 1551-1556 - [c2]Antonio Nucci, Brunilde Sansò, Teodor Gabriel Crainic, Emilio Leonardi, Marco Ajmone Marsan:
Design of fault-tolerant logical topologies in wavelength-routed optical IP networks. GLOBECOM 2001: 2098-2103 - 2000
- [j2]Marco Ajmone Marsan, Andrea Bianco, Emilio Leonardi, Fabio Neri, Antonio Nucci:
Simple On-Line Scheduling Algorithms for All-Optical Broadcast-and-Select Networks. Eur. Trans. Telecommun. 11(1): 109-116 (2000) - [j1]Marco Ajmone Marsan, Andrea Bianco, Emilio Leonardi, Fabio Neri, Antonio Nucci:
Multihop packet scheduling in WDM/TDM networks with nonnegligible transceiver tuning times. IEEE Trans. Commun. 48(4): 692-703 (2000)
1990 – 1999
- 1998
- [c1]Marco Ajmone Marsan, Andrea Bianco, Emilio Leonardi, Antonio Nucci:
Efficient Multi-Hop Scheduling Algorithms for All-Optical WDM/TDM Broadcast-and-Select Networks with Arbitrary Transceiver Tuning Latencies. ONDM 1998: 57-72
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-09 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint