Follow
Luca Arnaboldi
Title
Cited by
Cited by
Year
Modelling Load-Changing Attacks in Cyber-Physical Systems
L Arnaboldi, RM Czekster, C Morisset, R Metere
Electronic Notes in Theoretical Computer Science 353, 39-60, 2020
312020
The benefits of reusing batches for gradient descent in two-layer networks: Breaking the curse of information and leap exponents
Y Dandi, E Troiani, L Arnaboldi, L Pesce, L Zdeborová, F Krzakala
arXiv preprint arXiv:2402.03220, 2024
202024
Interpretable Trading Pattern Designed for Machine Learning Applications
A Sokolovsky, L Arnaboldi, J Bacardit, T Gross
Machine Learning with Applications, 100448, 2023
11*2023
Generating Synthetic Data for Real World Detection of DoS Attacks in the IoT
L Arnaboldi, C Morisset
Federation of International Conferences on Software Technologies …, 2018
112018
A Review of Intrusion Detection Systems and their Evaluation in the IoT
L Arnaboldi, C Morisset
arXiv preprint arXiv:2105.08096, 2021
102021
A Formal Model for Delegated Authorization of IoT Devices Using ACE-OAuth
L Arnaboldi, H Tschofenig
4th OAuth Security Workshop 2019 (OSW 2019), 2019
102019
Quantitative Analysis of DoS Attacks and Client Puzzles in IoT systems
L Arnaboldi, C Morisset
International Workshop on Security and Trust Management, 224-233, 2017
102017
Escaping mediocrity: how two-layer networks learn hard single-index models with SGD
L Arnaboldi, F Krzakala, B Loureiro, L Stephan
CoRR, 2023
9*2023
Repetita iuvant: Data repetition allows sgd to learn high-dimensional multi-index functions
L Arnaboldi, Y Dandi, F Krzakala, L Pesce, L Stephan
arXiv preprint arXiv:2405.15459, 2024
72024
Compiling higher-order specifications to SMT solvers: How to deal with rejection constructively
ML Daggitt, R Atkey, W Kokke, E Komendantskaya, L Arnaboldi
Proceedings of the 12th ACM SIGPLAN International Conference on Certified …, 2023
72023
Garbage in, toxic data out: a proposal for ethical artificial intelligence sustainability impact statements
R Bogani, A Theodorou, L Arnaboldi, RH Wortham
AI and Ethics, 1, 2022
72022
Poster: Towards a data centric approach for the design and verification of cryptographic protocols
L Arnaboldi, R Metere
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
62019
The Vehicle Tutorial: Neural Network Verification with Vehicle
M Daggitt, W Kokke, E Komendantskaya, R Atkey, L Arnaboldi, N Slusarz, ...
Proceedings of the 6th Workshop on Formal Methods for ML-Enabled Autonomous …, 2023
52023
A generic methodology for the statistically uniform & comparable evaluation of Automated Trading Platform components
A Sokolovsky, L Arnaboldi
Expert Systems with Applications 223, 119836, 2023
5*2023
Vehicle: Interfacing Neural Network Verifiers with Interactive Theorem Provers
ML Daggitt, W Kokke, R Atkey, L Arnaboldi, E Komendantskaya
arXiv preprint arXiv:2202.05207, 2022
52022
Automating Cryptographic Protocol Language Generation from Structured Specifications
R Metere, L Arnaboldi
2022 IEEE/ACM 10th International Conference on Formal Methods in Software …, 2022
5*2022
Towards interdependent safety security assessments using bowties
L Arnaboldi, D Aspinall
International Conference on Computer Safety, Reliability, and Security, 211-229, 2022
42022
Vehicle: Bridging the Embedding Gap in the Verification of Neuro-Symbolic Programs
ML Daggitt, W Kokke, R Atkey, N Slusarz, L Arnaboldi, ...
arXiv preprint arXiv:2401.06379, 2024
32024
Online Learning and Information Exponents: On The Importance of Batch size, and Time/Complexity Tradeoffs
L Arnaboldi, Y Dandi, F Krzakala, B Loureiro, L Pesce, L Stephan
arXiv preprint arXiv:2406.02157, 2024
22024
Antonio: Towards a systematic method of generating NLP benchmarks for verification
M Casadio, L Arnaboldi, ML Daggitt, O Isac, T Dinkar, D Kienitz, V Rieser, ...
arXiv preprint arXiv:2305.04003, 2023
22023
The system can't perform the operation now. Try again later.
Articles 1–20