The laboratory develops new technologies and solutions based on Artificial Intelligence for cyber and security applications. Specifically, the research activities focus on new solutions and methods for computer-vision, the extraction of information from text and voice, and the analysis of audio sources. A research unit specialises in the study and implementation of post-quantum algorithms, which are robust and resilient against attacks from quantum computers.
Future Security and Safety Technologies
Research Unit
Artificial Intelligence applied to security
The unit develops Artificial Intelligence architectures that can be applied to functions that classify audio threats, to voice interaction systems and to high-performance systems for cataloguing and extracting information. The processing and analysis of audio sources and spoken language are essential for virtual assistant and drone classification applications.
Researchers: Federico Di Martino, Sara Piscitelli
Analysis of images and behaviours
The research unit studies how to apply Artificial Intelligence to improve images and to the automatic recognition of the behaviours of individuals or groups of people. In the first case, it is necessary to recognise and improve the details of the subjects of interest, to classify them and carry out detailed analyses. In the second case, it is essential to design algorithms that can analyse actions and behaviours.
Researcher: Muhammad Atique
Artificial Intelligence applied to cyber security
The unit is dedicated to the design and study of malware genes to attribute and analyse similarity through deep learning. Studying malware is made easier by the information obtained through analysing software similarity in terms of origin and possible evolution.
Researcher: Francesco Bonanni
Quantum encryption and post-quantum algorithms
The research unit designs, develops and tests Post Quantum Computing (PQC) algorithms, certifying and validating their use in applications the company is interested in. These algorithms are essential tools (jointly with physical components, protocols and QKD -Quantum Key Distribution connections) to deal with the potential threats deriving from conventional encryption algorithms, represented by Quantum Computers.