Deep-learning-enhanced multitarget detection for end–edge–cloud surveillance in smart IoT
Along with the rapid development of cloud computing, IoT, and AI technologies, cloud video
surveillance (CVS) has become a hotly discussed topic, especially when facing the …
surveillance (CVS) has become a hotly discussed topic, especially when facing the …
CHAT-Bot: A cultural heritage aware teller-bot for supporting touristic experiences
Cultural heritage is an important resource that allows us to know and promote a territory. In
this respect, it is important to experiment with the enhancement of cultural heritage by …
this respect, it is important to experiment with the enhancement of cultural heritage by …
A context-aware chatbot for tourist destinations
The cultural heritage is one of the most important resources of the territory. It represents one
of the scenarios where new technologies can provide more interesting contributions. In …
of the scenarios where new technologies can provide more interesting contributions. In …
One-pass lossless data hiding and compression of remote sensing data
B Carpentieri, A Castiglione, A De Santis… - Future generation …, 2019 - Elsevier
The information obtained by means of spectral remote sensing (ie, the hyperspectral
images) are involved in several real-life scenarios and applications. Historical research …
images) are involved in several real-life scenarios and applications. Historical research …
On the protection of consumer genomic data in the Internet of Living Things
R Pizzolante, A Castiglione, B Carpentieri… - Computers & …, 2018 - Elsevier
Several companies have recently emerged to provide online Direct-To-Consumer (DTC)
DNA analysis and sequencing. Those activities will be, in the near future, the foundations of …
DNA analysis and sequencing. Those activities will be, in the near future, the foundations of …
Efficient compression and encryption for digital data transmission
B Carpentieri - Security and Communication Networks, 2018 - Wiley Online Library
We live in a digital era in which communication is largely based on the exchange of digital
information on data networks. Communication is often pictured as a sender that transmits a …
information on data networks. Communication is often pictured as a sender that transmits a …
Protection of microscopy images through digital watermarking techniques
R Pizzolante, A Castiglione… - 2014 international …, 2014 - ieeexplore.ieee.org
Nowadays microscopy confocal images are becoming more and more a fundamental tool for
many application fields, including biology, forensic analysis, medicine, industrial research …
many application fields, including biology, forensic analysis, medicine, industrial research …
An effective grouping method for privacy-preserving bike sharing data publishing
ASMT Hasan, Q Jiang, C Li - Future Internet, 2017 - mdpi.com
Bike sharing programs are eco-friendly transportation systems that are widespread in smart
city environments. In this paper, we study the problem of privacy-preserving bike sharing …
city environments. In this paper, we study the problem of privacy-preserving bike sharing …
Compression‐based steganography
B Carpentieri, A Castiglione, A De Santis… - Concurrency and …, 2020 - Wiley Online Library
Conventional privacy‐enforcement mechanisms, such as encryption‐based ones, are
frequently used to prevent third‐party eavesdroppers to intercept confidential information …
frequently used to prevent third‐party eavesdroppers to intercept confidential information …
Energy-efficient relay tracking with multiple mobile camera sensors
Abstract Camera Sensor Networks (CSNs) has been deployed for many applications of
video surveillance. In urban road or large buildings, camera sensors are deployed in public …
video surveillance. In urban road or large buildings, camera sensors are deployed in public …